text
stringlengths 2.85k
2.55M
| label
class label 11
classes |
---|---|
arXiv:1604.04973v1 [math.GR] 18 Apr 2016
Factorization numbers of finite rank 3
abelian p-groups
Marius Taฬrnaฬuceanu
March 22, 2016
Abstract
In this short note we give a formula for the factorization number
F2 (G) of a finite rank 3 abelian p-group G. This extends a result in
our previous work [9].
MSC (2010): Primary 20D40; Secondary 20D60.
Key words: factorization number, subgroup commutativity degree, Moฬbius
function, finite abelian p-group.
1
Introduction
Let G be a finite group, L(G) be the subgroup lattice of G and H, K be two
subgroups of G. If G = HK, then G is said to be factorized by H and K
and the expression G = HK is said to be a factorization of G. Denote by
F2 (G) the factorization number of G, that is the number of all factorizations
of G.
The starting point for our discussion is given by the papers [6, 1], where
F2 (G) has been computed for certain classes of finite groups. Then, in [9],
we have obtained explicit formulas for the factorization numbers of an elementary abelian p-group and of a rank 2 abelian p-group. These are based
on the connection between F2 (G) and the subgroup commutativity degree
sd(G) of G (see [7, 8]), namely
sd(G) =
X
1
F2 (H).
|L(G)|2 HโคG
1
Obviously, by applying the well-known Moฬbius inversion formula to the above
equality, one obtains
X
(1)
F2 (G) =
sd(H)|L(H)|2ยต(H, G).
HโคG
In particular, if G is abelian, then we have sd(H) = 1 for all H โ L(G), and
consequently
X
X
(2)
F2 (G) =
|L(H)|2ยต(H, G) =
|L(G/H)|2 ยต(H).
HโคG
HโคG
This formula will be used in the following to calculate the factorization number of a rank 3 abelian p-group.
First of all, we recall a theorem due to P. Hall [2] (see also [4]), that
permits us to compute explicitly the Moฬbius function of a finite p-group.
Theorem 1. Let G be a finite p-group of order pn . Then ยต(G) = 0 unless
n
G is elementary abelian, in which case we have ยต(G) = (โ1)n p ( 2 ) .
We also need to know the total number of subgroups of a finite rank
3 abelian p-group. It has been determined by using different methods in
[3, 5, 10].
Theorem 2. The total number of subgroups of Zpฮป1 รZpฮป2 รZpฮป3 , where ฮป1 โฅ
ฮป2 โฅ ฮป3 โฅ 1, is
(3)
f (ฮป1 , ฮป2 , ฮป3 ) =
(p2
A
,
โ 1)2 (p โ 1)
where
A =(ฮป3 +1)(ฮป1 โฮป2 +1)pฮป2 +ฮป3 +5 +2(ฮป3 +1)pฮป2 +ฮป3 +4 โ2(ฮป3 +1)(ฮป1 โฮป2 )pฮป2 +ฮป3 +3
โ2(ฮป3 +1)pฮป2 +ฮป3 +2 +(ฮป3 +1)(ฮป1 โฮป2 โ1)pฮป2 +ฮป3 +1 โ(ฮป1 +ฮป2 โฮป3 +3)p2ฮป3 +4
โ2p2ฮป3 +3 +(ฮป1 +ฮป2 โฮป3 โ1)p2ฮป3 +2 +(ฮป1 +ฮป2 +ฮป3 +5)p2 +2pโ(ฮป1 +ฮป2 +ฮป3 +1).
We are now able to give the main result of our note.
2
Theorem 3. The following equality holds
F2 (Zpฮป1 รZpฮป2 รZpฮป3 )=โp3 f 2 (ฮป1 โ1, ฮป2 โ1, ฮป3 โ1)+p(f 2 (ฮป1 โ1, ฮป2 โ1, ฮป3 )
+pf 2 (ฮป1 โ1, ฮป2 , ฮป3 โ1)+p2 f 2 (ฮป1 , ฮป2 โ1, ฮป3 โ1))
โ(f 2 (ฮป1 โ1, ฮป2, ฮป3 )+pf 2 (ฮป1 , ฮป2 โ1, ฮป3 )
+p2 f 2 (ฮป1 , ฮป2 , ฮป3 โ1))+f 2 (ฮป1 , ฮป2 , ฮป3 ),
where the quantities f (ฮป1 , ฮป2 , ฮป3 ) are given by (3).
We remark that for ฮป3 = 0 the above equality leads to the formula in
Theorem 3 of [9]. It simplifies in the particular case ฮป1 = ฮป2 = ฮป3 = ฮป.
Corollary 4. We have
F2 (Zpฮป รZpฮป รZpฮป )=โp3 f 2 (ฮปโ1, ฮปโ1, ฮปโ1)+p(1+p+p2 )f 2 (ฮป, ฮปโ1, ฮปโ1)
โ(1+p+p2 )f 2 (ฮป, ฮป, ฮปโ1)+f 2 (ฮป, ฮป, ฮป).
However, even in this case, an explicit formula for the factorization number is too difficult to be written, but we can do it for small values of ฮป1 , ฮป2 , ฮป3 .
Examples.
a) F2 (Zp3 รZp2 รZp ) = 9p6 + 15p5 + 21p4 + 16p3 + 20p2 + 11p + 13.
b) F2 (Zp2 รZp2 รZp2 ) = 5p8 +7p7 +16p6 +15p5 +21p4 +16p3 +20p2 +11p+13.
2
Proof of Theorem 3
It is well-known that G = Zpฮป1 รZpฮป2 รZpฮป3 has a unique elementary abelian
subgroup of order p3 , say M, and that
G/M โผ
= Zpฮป1 โ1 รZpฮป2 โ1 รZpฮป3 โ1 ,
= ฮฆ(G) โผ
where ฮฆ(G) is the Frattini subgroup of G. Moreover, all elementary abelian
subgroups of G are contained in M. Denote by Mi , i = 1, 2, ..., p2 + p + 1, the
subgroups of order p and by Miโฒ , i = 1, 2, ..., p2 + p + 1, the subgroups of order
p2 in M. Then every quotient G/Mi is isomorphic to a maximal subgroup
of G, which are: p2 of type (ฮป1 , ฮป2 , ฮป3 โ 1), p of type (ฮป1 , ฮป2 โ 1, ฮป3), and
3
1 of type (ฮป1 โ 1, ฮป2 , ฮป3 ). Similarly, every quotient G/Miโฒ is isomorphic to
a subgroup of index p2 of G that contains ฮฆ(G), and these are: p2 of type
(ฮป1 , ฮป2 โ1, ฮป3 โ1), p of type (ฮป1 โ1, ฮป2 , ฮป3 โ1), and 1 of type (ฮป1 โ1, ฮป2 โ1, ฮป3 ).
In this way the equality (2) becomes
X
p2 +p+1
F2 (G) =|L(G/M)|2 ยต(M) +
|L(G/Mi )|2 ยต(Mi )
i=1
X
p2 +p+1
+
|L(G/Miโฒ )|2 ยต(Miโฒ ) + |L(G)|2 ยต(1),
i=1
in view of Theorem 1. Since we have ยต(M) = ยต(Z3p ) = โp3 , ยต(Mi ) = ยต(Zp ) =
โ1, ยต(Miโฒ ) = ยต(Z2p ) = p, โ i = 1, 2, ..., p2 + p + 1, and ยต(1) = 1, one obtains
F2 (G)=โp3 |L(Zpฮป1 โ1 รZpฮป2 โ1 รZpฮป3 โ1 )|2 +p(|L(Zpฮป1 โ1 รZpฮป2 โ1 รZpฮป3 )|2
+p|L(Zpฮป1 โ1 รZpฮป2 รZpฮป3 โ1 )|2 +p2 |L(Zpฮป1 รZpฮป2 โ1 รZpฮป3 โ1 )|2 )
โ(|L(Zpฮป1 โ1 รZpฮป2 รZpฮป3 )|2 +p|L(Zpฮป1 รZpฮป2 โ1 รZpฮป3 )|2
+p2 |L(Zpฮป1 รZpฮป2 รZpฮป3 โ1 )|2 )+|L(Zpฮป1 รZpฮป2 รZpฮป3 )|2 .
Under the notation of Theorem 2 this leads to the desired formula.
References
[1] M. Farrokhi D.G., Factorization numbers of finite abelian groups, Int. J.
Group Theory 2 (2013), 1-8.
[2] P. Hall, A contribution to the theory of groups of prime-power order,
Proc. London Math. Soc. 36 (1933), 29-95.
[3] M. Hampejs and L. Toฬth, On the subgroups of finite abelian groups of
rank three, Annales Univ. Sci. Budapest., Sect. Comp., 39 (2013), 111124.
[4] T. Hawkes, I.M. Isaacs and M. Oฬzaydin, On the Moฬbius function of a
finite group, Rocky Mountain J. Math. 19 (1989), 1003-1033.
[5] J.M. Oh, An explicit formula for the number of subgroups of a finite
abelian p-group up to rank 3, Commun. Korean Math. Soc. 28 (2013),
649-667.
4
[6] F. Saeedi and M. Farrokhi D.G., Factorization numbers of some finite
groups, Glasgow Math. J. 54 (2012), 345-354.
[7] M. Taฬrnaฬuceanu, Subgroup commutativity degrees of finite groups, J.
Algebra 321 (2009), 2508-2520.
[8] M. Taฬrnaฬuceanu, Addendum to โSubgroup commutativity degrees of finite groupsโ, J. Algebra 337 (2011), 363-368.
[9] M. Taฬrnaฬuceanu, On the factorization numbers of some finite p-groups,
accepted for publication in Ars Combin., arXiv:1502.04778.
[10] M. Taฬrnaฬuceanu and L. Toฬth, On the number of subgroups of a given
exponent in a finite abelian group, accepted for publication in Publ. Inst.
Math. Beograd, arXiv:1507.00532.
Marius Taฬrnaฬuceanu
Faculty of Mathematics
โAl.I. Cuzaโ University
Iasฬงi, Romania
e-mail: [email protected]
5
| 4math.GR
|
On deep-holes of Gabidulin codes
arXiv:1711.11202v2 [cs.IT] 28 Feb 2018
Weijun Fanga Li-Ping Wangbโ Daqing Wanc
a
Chern Institute of Mathematics and LPMC, Nankai University, Tianjin 300071, China
Email: [email protected]
bโ
Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China
Data Assurance and Communications Security Research Center,
Chinese Academy of Sciences, Beijing 100093, China,
University of Chinese Academy of Sciences, Beijing, China, Email: [email protected]
c
Department of Mathematics, University of California, Irvine CA 92697, USA,
Email: [email protected]
Abstract
In this paper, we determine a class of deep holes for Gabidulin codes
with both rank metric and Hamming metric. Moreover, we give a necessary
and sufficient condition for deciding whether a word is not a deep hole for
Gabidulin codes, by which we study the error distance of two special classes
of words to certain Gabidulin codes.
Keywords: Gabidulin codes, rank metric, deep holes, covering radius, error rank
distance
1
Introduction
Let q be a power of a prime p, m โฅ 1 an integer and let Fnqm be an n-dimensional vector
space over the finite field Fqm . In this paper we only consider the case when n โค m. Let
ฮฒ = (ฮฒ1 , . . . , ฮฒm ) be a basis of Fqm over Fq . Let Fi be the map from Fqm to Fq where Fi (u)
is the i-th coordinate of u in the basis ฮฒ. To any u = (u1 , . . . , un ) in Fnqm , we associate
the matrix uฬ โ Mm,n (Fq ) in which uฬi,j = Fi (uj ). The rank weight of a vector u can be
defined as the rank of the associated matrix uฬ, denoted by wR (u). Thus we can define
the rank distance between two vectors u and v as dR (u, v) = wR (u โ v). We refer to [18]
for more details on codes for the rank distance.
For integers 1 โค k โค n, a rank code C of length n and dimension k over Fqm is a
subspace of dimension k of Fnqm embedded with rank metric. The minimum rank distance
of the code C, denoted by dR (C), is the minimum rank weight of the non-zero vectors in
C. A k ร n matrix is called the generator matrix of C if its rows span the code C.
A rank code of length n and dimension k over Fqm is called a maximum rank distance
separable (MRDS) code if dR (C) = n โ k + 1. The error rank distance of any word
u โ Fnqm to C is defined as dR (u, C) = min{dR (u, c)|c โ C}. The error rank distance
plays an important role in the decoding of rank codes. The maximum error rank distance
ฯR (C) = max{dR (u, C)|u โ Fnqm }
is called the covering radius of C. If the rank distance from a word to the code C achieves
the covering radius of the code, the word is called a deep hole of the code C.
Covering radius and deep holes of linear code embedded with Hamming metric were
studied extensively [1, 2, 3, 4, 5, 10, 12, 14, 16, 21, 22, 23, 24, 25, 26], in which MDS
codes such as generalized Reed-Solomon codes, standard Reed-Solomon codes and projective Reed-Solomon codes were explored deeply. Gabiduli codes were first introduced by
Gabidulin in [7] and independently by Delsarte in [6]. Gabidulin codes can be seen as the
q-analog of Reed-Solomon codes. Furthermore, Gabidulin codes are MRDS codes. Over
the last decade there has been increased interest in Gabidulin codes, mainly because of
their relevance to network coding [15, 19]. Covering radius for Gabidulin codes also were
studied in [8, 9, 20]. However, little is known about the deep holes for such codes. In
this paper we determine a class of deep holes for Gabidulin codes with both rank metric and Hamming metric. Meanwhile we also obtain the covering radius by our method.
Moreover, we give a necessary and sufficient condition for deciding whether a word is not
a deep hole for Gabidulin codes, by which we study the error rank distance of a special
class of words to certain Gabidulin codes. Note that we refer to rank metric if Hamming
metric is not explicitly pointed out in this paper.
2
Linearized polynomials
Gabidulin codes exploit linearized polynomials instead of arbitrary polynomials and so we
recall some results about linearized polynomials.
A q-linearized polynomial over Fqm is defined to be a polynomial of the form
L(x) =
d
X
i
ai xq , ai โ Fqm , ad 6= 0
i=0
where d is called the q-degree of f (x), denoted by degq (f (x)). Note that L(x) has no constant term. One can easily check that L(x1 + x2 ) = L(x1 ) + L(x2 ) and L(ฮปx1 ) = ฮปL(x1 )
for any x1 , x2 โ Fqm and ฮป โ Fq , from which the name stems. In particular, L(x) induces
an Fq -linear endomorphism of the Fq -vector space Fqm . The set of all q-linearized polynomials over Fqm is denoted by Lq (x, Fqm ). The ordinary product of linearized polynomials
need not be a linearized polynomial. However, the composition L1 (x) โฆ L2 (x) = L1 (L2 (x))
is also a linearized polynomial. The set Lq (x, Fqm ) forms a non-commutative ring under
the operations of composition โฆ and ordinary addition. It is also an Fq -algebra.
Lemma 1. [17] Let f (x) โ Lq (x, Fqm ) and Fqs be the smallest extension field of Fqm that
contains all roots of f (x). Then the set of all roots of f (x) forms an Fq -linear vector space
in Fqs .
2
Let U be an Fq -linear subspace of Fqm . Then
polynomial of U .
Q
gโU (x
โ g) is called the q-annihilator
Lemma 2. [17] Let U be an Fq -linear subspace of Fqm . Then
polynomial over Fqm .
Let ฮฒ1 , . . . , ฮฒn โ Fqm and denote the k ร n Moore
๏ฃซ
ฮฒ1
ฮฒ2
๏ฃฌ ฮฒ1q
ฮฒ2q
๏ฃฌ
Mk (ฮฒ1 , . . . , ฮฒn ) := ๏ฃฌ ..
..
๏ฃญ .
.
q kโ1
q kโ1
ฮฒ1
ฮฒ2
Q
gโU (xโg)
is a q-linearized
matrix by
...
...
..
.
ฮฒn
ฮฒnq
..
.
kโ1
. . . ฮฒnq
๏ฃถ
๏ฃท
๏ฃท
๏ฃท.
๏ฃธ
Furthermore, if g1 , . . . , gn is a basis of U , one can write
Y
(x โ g) = ฮป det(Mn+1 (g1 , . . . , gn , x))
gโU
for some non-zero constant ฮป โ Fqm . Clearly, its q-degree is n.
In addition, we have the notion of q-Lagrange polynomials.
Let g = {g1 , . . . , gn } โ Fqm and r = {r1 , . . . , rn } โ Fqm , where g1 , . . . , gn are Fq linearly independent. For 1 โค i โค n, we define the matrix Di (g, x) as Mn (g1 , . . . , gn , x)
without the ith column. The q-Lagrange polynomial with respect to g and r is defined to
be
n
X
det(Di (g, x))
(โ1)nโi ri
ฮg,r (x) =
โ Fqm [x].
det(Mn (g))
i=1
Proposition 1. [13] The q-Lagrange polynomial ฮg,r (x) is a q-linearized polynomial in
Fqm [x] and ฮg,r (gi ) = ri for i = 1, . . . , n.
Proposition 2. [13] Let L(x) โ Lq (x, Fqm ) be such that
Q L(gi ) = 0 for all i. Then there
exists an H(x) โ Lq (x, Fqm ) such that L(x) = H(x) โฆ gโ<g> (x โ g), where < g > is the
Fq -vector space spanned by g.
3
Deep holes of Gabidulin codes
Let g1 , . . . , gn โ Fqm be linearly independent over Fq , which also implies that n โค m.
Let g = {g1 , . . . , gn } and < g > is the Fq -vector space spanned by g. A Gabidulin code
G โ Fnqm is defined as the linear block code with generator matrix Mk (g1 , . . . , gn ), where
1 โค k โค n. Using the isomorphic matrix representation, we can interpret G as a matrix
. The rank distance is defined as above.
code in Fmรn
q
The Gabidulin code G with length n has dimension k over Fqm and minimum rank
distance n โ k + 1, and so G is an MRDS code [7]. The Gabidulin code G can also be
defined as follow:
G = {(m(g1 ), . . . , m(gn )) โ Fnqm | m(x) โ Lq (x, Fqm )
and degq (m(x)) < k}.
3
(1)
Note that this interpretation of the code G will be used throughout the rest of the paper.
It is the q-analogue of the generalized Reed-Solomon code.
Let
Y
Y
(
(x โ g)) = Lq (x, Fqm ) โฆ
(x โ g)
gโ<g>
gโ<g>
Q
be the left ideal generated by the element gโ<g> (x โ g) in the non-commutative
ring
Q
Lq (x, Fqm ) with respect to the composition product. In particular, ( gโ<g>
(x
โ
g))
is
an
Q
m
m
Fq -linear additive subgroup of Lq (x, Fq ). It follows that Lq (x, Fq )/( gโ<g> (x โ g)) is
an Fq -vector space. Define an Fq -linear evaluation map
Y
ฯ : Lq (x, Fqm )/(
(x โ g)) โโ Fnqm
gโ<g>
given by
ฯ(f (x)) = (f (g1 ), . . . , f (gn )).
We have the following property.
Proposition 3. The above defined map ฯ is an Fq -vector space isomorphism.
Q
Proof. First, ฯ is well-defined since the polynomial gโ<g> (x โ g) vanishes at every gi .
Second, if f (gQ
i ) = 0 for all i = 1, . . . , n, then there exists H(x) โ Lq (x, Fq m ) such that
f (x) = H(x)โฆ gโ<g> (xโg) by Proposition 2 and so ฯ is one-to-one. Third, we show that
ฯ is surjective. For a given r = (r1 , . . . , rn ) โ Fnqm , we have the q-Lagrange polynomial
ฮg,r (x) satisfying ฮg,r (gi ) = ri for i = 1, . . . , n by Proposition 1. The result is proved.
Q
The q-linearized polynomial gโ<g> (xโg) has q-degree n. It follows that any element
f (x) โ Lq (x, Fqm ) can be written uniquely in the form
Y
f (x) = h(x) โฆ
(x โ g) + r(x),
gโ<g>
where h(x), r(x) โ Lq (x, Fqm ) and r(x) has q-degree smaller than n. This is the q-division
algorithm inQthe non-commutative ring Lq (x, Fqm ). As Fq -vector spaces, the quotient
Lq (x, Fm
q )/( gโ<g> (x โ g)) is thus represented by all q-linearized polynomials of q-degree
less than n. That is,
Y
Lq (x, Fqm )/(
(x โ g)) = {f โ Lq (x, Fqm )| degq (f ) < n}.
gโ<g>
Using the isomorphism ฯ, we can identify any word u โ Fnqm with ฯ(f ) for a unique
polynomial f (x) โ Lq (x, Fqm ) with degq (f ) < n. When degq (f ) โค k โ 1, it is easy to see
that the error distance dR (ฯf , G) = 0 by the definition. Thus, when k โค degq (f ) < n, we
provide the following upper and lower bounds for dR (ฯf , G).
4
Theorem 1. Let f (x) โ Lq (x, Fqm ) with degq (f ) < n and let ฯf = ฯ(f ) โ Fnqm be the
corresponding word. If k โค degq (f ) < n, then
n โ degq (f ) โค dR (ฯf , G) โค n โ k.
Furthermore, we suppose f is monic, then dR (ฯf , G) = n โ degq (f ) if and only if there
exists a degq (f )-dimensional subspace H of < g > such that
f (x) โ v(x) =
Y
(x โ h),
hโH
for some v(x) โ Lq (x, Fqm ) with degq (v) โค k โ 1.
Proof. Applying the q-division algorithm, we can write
Y
f (x) โ r(x) = h(x) โฆ
(x โ g),
gโ<g1 ,ยทยทยท ,gk >
for some unique r(x) with degq (r) < k. This implies that dR (ฯf , G) โค n โ k. The right
hand of the inequality holds.
For the lower bound, let u(x) be any q-polynomial over Fqm . We consider the Fq -linear
map defined by
ฯu : < g1 , ยท ยท ยท , gn >โ< u(g1 ), ยท ยท ยท , u(gn ) >
n
n
n
X
X
X
ฮพi gi ).
ฮพi u(gi ) = u(
ฮพi gi 7โ
i=1
i=1
i=1
It is clear that the map ฯu is surjective and ker(ฯu ) โ Root(u) (the set of roots of u(x)).
So dimFq ker(ฯu ) โคdimFq Root(u) โค degq (u). Then
dimFq < u(g1 ), ยท ยท ยท , u(gn ) >
= dimFq < g1 , ยท ยท ยท , gn > โdimFq ker(ฯu )
โฅ n โ degq (u).
Thus
dR (ฯf , G)
=
=
โฅ
min
rank((f โ v)(g1 ), ยท ยท ยท , (f โ v)(gn ))
min
dimFq < (f โ v)(g1 ), ยท ยท ยท , (f โ v)(gn ) >
degq (v)<k
degq (v)<k
min (n โ degq (f โ v)) = n โ degq (f ).
degq (v)<k
The last equality holds since degq (f โ v) = degq (f ) for any q-polynomial v(x) with
degq (v) < k.
5
Furthermore, from the above proof, we know that dR (ฯf , G) = n โ degq (f ) if and only
if
dimFq Root(f โ v) = dimFq ker(ฯf โv )
= degq (f โ v) = degq (f )
for some q-polynomial v(x) with degq (v) < k, which is equivalent to
f (x) โ v(x) =
Y
(x โ h),
hโH
for some degq (f )-dimensional subspace H of < g1 , ยท ยท ยท , gn >. The theorem is proved.
By Theorem 1, we immediately deduce the following two corollaries.
Corollary 1. For the Gabidulin code G, the covering radius of G is n โ k.
This corollary had also been obtained in [9].
Corollary 2. The set {ฯf : degq (f (x)) = k, f (x) โ Lq (x, Fqm )} are deep holes of the
Gabidulin code G and so the number of deep holes of G is at least (q m โ 1)q mk .
According to the definition in (1), we may also study the Gabidulin codes under the
Hamming metric. It was showed that the Gabidulin codes are MDS codes in [7]. We use
dH (u, v) and dH (u, G) to denote Hamming distance between vectors u and v and Hamming
distance of a word u to G, respectively. Similarly, we have the following theorem.
Theorem 2. Let f (x) โ Lq (x, Fqm ) with degq (f ) < n and let ฯf = ฯ(f ) โ Fnqm be the
corresponding word. If k โค degq (f ) < n, then
n โ degq (f ) โค dH (ฯf , G) โค n โ k.
Furthermore, suppose f is monic, then dH (ฯf , G) = n โ degq (f ) if and only if there exists
a subset E = {gi1 , . . . , gidegq (f ) } of {g1 , ยท ยท ยท , gn } such that
f (x) โ v(x) =
Y
(x โ g),
gโ<E>
for some v(x) โ Lq (x, Fqm ) with degq (v) โค k โ 1.
Proof. The proof of dH (ฯf , G) โค n โ k is same as Theorem 1.
Let now t = n โ dH (ฯf , G). By definition of the Hamming distance, there exists some
v(x) and non-zero H(x) โ Lq (x, Fqm ) with degq (v) < k such that
f (x) โ v(x) = H(x) โฆ
Y
gโ<gi1 ,...,git >
6
(x โ g)
for some indices 1 โค i1 < ยท ยท ยท < it โค n. Comparing the q-degrees of both sides, we deduce
that t โค degq (f ). This proves that n โ degq (f ) โค dH (ฯf , G). Furthermore, if f is monic,
the equality t = degq (f ) holds if and only if H(x) = x, in which case, we obtain
Y
f (x) โ v(x) =
(x โ g)
gโ<gi1 ,...,git >
The theorem is proved.
By Theorem 2, we deduce the results in Corollaries 1 and 2 still hold under Hamming
metric.
4
The error distance of a special class of words to
certain Gabidulin codes
We hope to obtain more deep holes of Gabidulin codes and so consider monic f (x) of
k
k+dโ2
k+dโ1
k+d
+ยท ยท ยท+(โ1)d ad xq +ยท ยท ยท .
+a2 xq
degq (f ) = k +d, d โฅ 1, where f (x) = xq โa1 xq
Q
k
k+dโ1
k+d
+ ยท ยท ยท + (โ1)d hd xq + ยท ยท ยท and
โ h1 xq
In Theorem 1, if we write hโH (x โ h) = xq
let ฮฒ1 , ฮฒ2 , . . . , ฮฒk+d โ Fqm be a basis of H, then dR (ฯf , G) = n โ degq (f ) is equivalent to
ai = hi =
det(Rk+dโi (ฮฒ1 , ยท ยท ยท , ฮฒk+d ))
, for all 1 โค i โค d,
det(Mk+d (ฮฒ1 , ยท ยท ยท , ฮฒk+d ))
where Rk+dโi (ฮฒ1 , ยท ยท ยท , ฮฒk+d ) denotes the matrix Mk+d+1 (ฮฒ1 , ยท ยท ยท , ฮฒk+d ) deleting the row
k+dโi
q k+dโi
). As a result, we have dR (ฯf , G) = n โ (k + d) if and only if there
(ฮฒ1q
, ยท ยท ยท , ฮฒk+d
exist k + d linearly independent elements ฮฒ1 , ฮฒ2 , . . . , ฮฒk+d of < g1 , ยท ยท ยท , gn > such that
ai =
det(Rk+dโi (ฮฒ1 , ยท ยท ยท , ฮฒk+d ))
, for all 1 โค i โค d,
det(Mk+d (ฮฒ1 , ยท ยท ยท , ฮฒk+d ))
where Rk+dโi (ฮฒ1 , ยท ยท ยท , ฮฒk+d ) denotes as the above.
When d = 1 i.e., degq (f ) = k + 1, then by Theorem 1, ฯf is not a deep hole of G if
and only if dR (ฯf , G) = n โ (k + 1). Thus, we have
k+1
k
โ a1 xq + ยท ยท ยท . Then ฯf is not a deep hole of G if and
Proposition 4. Let f (x) = xq
only if there exist k + 1 linearly independent elements ฮฒ1 , ฮฒ2 , . . . , ฮฒk+1 of < g1 , ยท ยท ยท , gn >
such that
det(Rk (ฮฒ1 , ยท ยท ยท , ฮฒk+1 ))
,
a1 =
det(Mk+1 (ฮฒ1 , ยท ยท ยท , ฮฒk+1 ))
k
where Rk (ฮฒ1 , ยท ยท ยท , ฮฒk+1 ) denotes the matrix Mk+2 (ฮฒ1 , ยท ยท ยท , ฮฒk+1 ) without the row (ฮฒ1q , ยท ยท ยท ,
qk
).
ฮฒk+1
7
Similar to the above discussion, we get the result for Hamming metric case by Theorem
k
k+dโ2
k+dโ1
k+d
+ ยท ยท ยท + (โ1)d ad xq + ยท ยท ยท . Then dH (ฯf , G) =
+ a2 x q
โ a1 x q
2. Let f (x) = xq
n โ (k + d) if and only if there exist k + d distinct elements gi1 , gi2 , . . . , gik+d of {g1 , ยท ยท ยท , gn }
such that
det(Rk+dโi (gi1 , ยท ยท ยท , gik+d ))
ai =
, for all 1 โค i โค d,
det(Mk+d (gi1 , ยท ยท ยท , gik+d ))
where Rk+dโi (gi1 , ยท ยท ยท , gik+d ) denotes as the above.
k+1
k
โ a1 xq + ยท ยท ยท . Then ฯf is not a deep hole of G with
Proposition 5. Let f (x) = xq
Hamming metric if and only if there exist k + 1 distinct elements gi1 , gi2 , . . . , gik+1 of
{g1 , ยท ยท ยท , gn } such that
det(Rk (gi1 , ยท ยท ยท , gik+1 ))
a1 =
,
det(Mk+1 (gi1 , ยท ยท ยท , gik+d ))
k
where Rk (gi1 , ยท ยท ยท , gik+d ) denotes the matrix Mk+2 (gi1 , ยท ยท ยท , gik+d ) without the row (giq1 , ยท ยท ยท ,
k
giqk+1 ).
In the following we discuss the error distance of a special class of words to certain
Gabidulin codes by using the above results. Before that, we give two lemmas.
Lemma 3. [17] Let a be in a finite field Fq and p be the characteristic of Fq . Then the
trinomial xp โ x โ a is irreducible in Fq [x] if and only if TrFq /Fp (a) 6= 0.
For a finite field Fq , the integer-valued function v on Fq is defined by v(b) = โ1 for
b โ Fโq and v(0) = q โ 1.
Lemma 4. [17] For even q, let a โ Fq with trFq (a) = 1 and b โ Fq , then the number of
solutions of the equation x21 + x1 x2 + ax22 = b is q โ v(b).
We first consider the finite field F2m . Let
h(x1 , x2 ) = x21 + x1 x2 + x22 .
For any b โ F2m , let the set
S(h(x1 , x2 ) = b) = {(c1 , c2 ) โ F2m ร F2m |h(c1 , c2 ) = b, c1 6= c2 , ci 6= 0, i = 1, 2}
and N (h(x1 , x2 ) = b) = |S(h(x1 , x2 ) = b)|.
We consider two cases:
Case 1: m is odd, which implies that Tr2m (1) = 1.
If b = 0, the number of solutions of the equation h(x1 , x2 ) = b is 2m โ v(b) = 1 by
Lemma 4. Since (0, 0) is a solution, S(h(x1 , x2 ) = b) = โ
and N (h(x1 , x2 ) = b) = 0.
If b 6= 0, the number of solutions of the equation h(x1 , x2 ) = b is 2m + 1 by Lemma 4.
Thus, N (h(x1 , x2 ) = b) = 2m + 1 โ 2 since any element in F2m is a square. We also obtain
the corresponding S(h(x1 , x2 ) = b).
8
Case 2: m is even, which implies that Tr2m (1) = 0.
By Lemma 3, x2 + x + 1 is reducible over F2m and so it can be written as x2 + x + 1 =
(x + ฮฑ)(x + ฮฒ) where ฮฑ, ฮฒ โ F2m , ฮฑ 6= 1, ฮฒ 6= 1 and ฮฑ 6= ฮฒ. Thus, x21 + x1 x2 + x22 =
(x1 + ฮฑx2 )(x1 + ฮฒx2 ) = b and so the number of solutions of h(x1 , x2 ) = b is 2m + 2m โ 1
if b = 0 or 2m โ 1 if b 6= 0.
If b = 0, then N (h(x1 , x2 ) = b) = 2m+1 โ 2 and also we get S(h(x1 , x2 ) = b).
If b 6= 0, N (h(x1 , x2 ) = b) = 2m โ 1 โ 2 since any element in F2m is a square. We also
get S(h(x1 , x2 ) = b).
From the above discussion, we get the following result.
Proposition 6. Let G be the Gabidulin code over F2m with g = {g1 , . . . , gn }, dimension
k = 1 and 3 โค n โค m. Let f (x) = x4 + bx2 + cx, where b, c โ F2m . Then ฯf is not a
deep hole of G if and only if there are two elements ฮฒ1 and ฮฒ2 in < g1 , ยท ยท ยท , gn > such that
(ฮฒ1 , ฮฒ2 ) โ S(h(x1 , x2 ) = b). In particular, if n = m, then ฯf is a deep hole of G if and
only if b = 0 and m is odd.
Proof. Note that two nonzero elements ฮฒ1 and ฮฒ2 are linearly independent over F2 if and
only if ฮฒ1 6= ฮฒ2 . Thus, by Proposition 4, ฯf is not a deep hole of G if and only if there are
two distinct nonzero elements ฮฒ1 and ฮฒ2 in < g1 , ยท ยท ยท , gn > such that
b = ฮฒ12 + ฮฒ1 ฮฒ2 + ฮฒ22 ,
i.e., (ฮฒ1 , ฮฒ2 ) โ S(h(x1 , x2 ) = b). In particular, if n = m, then < g1 , ยท ยท ยท , gn >= F2m . By
the above discussion, ฯf is a deep hole only when b = 0 and m is odd. For the other cases,
N (h(x1 , x2 ) = b) is at least 1. Therefore, the desired result is obtained.
Remark 1. Proposition 6 may not hold for the case of Hamming metric by Proposition 5
since it is possible that h(x1 , x2 ) = b has no solutions in {g1 , ยท ยท ยท , gn } when b 6= 0 although
h(x1 , x2 ) = b always has solutions in F2m .
Proposition 7. Let G be the Gabidulin code over Fqm where m is odd, 3 โค n โค m, any
2
linearly independent set g = {g1 , . . . , gn } and dimension k = 1. Let f (x) = xq + cx with
c โ Fqm . Then ฯf is a deep hole of G.
Proof. Suppose that ฯf is not a deep hole of G. By Proposition 4, there are two linearly
2
2
independent elements ฮฒ1 and ฮฒ2 in < g1 , ยท ยท ยท , gn > such that b = 0 = ฮฒ1 ฮฒ2 (ฮฒ2q โ1 โ ฮฒ1q โ1 ).
2
Thus, (ฮฒ2 ฮฒ1โ1 )q โ1 = 1. Since m is odd, gcd(q 2 โ 1, q m โ 1) = q โ 1. So we have
(ฮฒ2 ฮฒ1โ1 )qโ1 = 1, which implies that ฮฒฮฒ21 โ Fq i.e., ฮฒ1 and ฮฒ2 are linearly dependent over Fq .
This contradicts with the assumption of ฮฒ1 and ฮฒ2 .
Finally, we consider the deep holes of the Gabidulin codes with large dimension k =
n โ 2 and m = n.
9
Proposition 8. Let G be the Gabidulin code over Fqn with linearly independent set g =
nโ1
+ fโคnโ3 , where fโคnโ3 is a q{g1 , . . . , gn } and dimension k = n โ 2. Let f (x) = xq
linearized polynomial over Fqn of degree less than or equals to n โ 3. Then ฯf is a deep
hole of G.
Proof. Suppose that ฯf is not a deep hole of G. By Proposition 4, there are n โ 1 linearly
independent elements ฮฒ1 , . . . , ฮฒnโ1 in < g1 , ยท ยท ยท , gn > such that
det(Rnโ2 (ฮฒ1 , ยท ยท ยท , ฮฒnโ1 ))
= 0.
det(Mnโ1 (ฮฒ1 , ยท ยท ยท , ฮฒnโ1 ))
(2)
For any matrix A = (aij ), denote by A(q) the matrix (aqij ). Then
๏ฃซ
ฮฒ1q
2
ฮฒ1q
..
.
๏ฃฌ
๏ฃฌ
๏ฃฌ
(q)
Rnโ2 (ฮฒ1 , ยท ยท ยท , ฮฒnโ1 ) = ๏ฃฌ
๏ฃฌ
๏ฃฌ qnโ2
๏ฃญ ฮฒ1
n
ฮฒ1q
ฮฒ2q
2
ฮฒ2q
..
.
nโ2
ฮฒ2q
n
ฮฒ2q
...
...
..
.
q
ฮฒnโ1
q2
ฮฒnโ1
..
.
nโ2
q
. . . ฮฒnโ1
qn
. . . ฮฒnโ1
๏ฃถ
๏ฃท
๏ฃท
๏ฃท
๏ฃท.
๏ฃท
๏ฃท
๏ฃธ
n
Note that ฮฒiq = ฮฒi . Thus
๏ฃซ
ฮฒ1q
2
ฮฒ1q
..
.
๏ฃฌ
๏ฃฌ
๏ฃฌ
(q)
Rnโ2 (ฮฒ1 , ยท ยท ยท , ฮฒnโ1 ) = ๏ฃฌ
๏ฃฌ
๏ฃฌ qnโ2
๏ฃญ ฮฒ1
ฮฒ1
ฮฒ2q
2
ฮฒ2q
..
.
nโ2
ฮฒ2q
ฮฒ2
...
...
..
.
q
ฮฒnโ1
q2
ฮฒnโ1
..
.
nโ2
q
. . . ฮฒnโ1
. . . ฮฒnโ1
๏ฃถ
๏ฃท
๏ฃท
๏ฃท
๏ฃท,
๏ฃท
๏ฃท
๏ฃธ
(q)
and det(Rnโ2 (ฮฒ1 , ยท ยท ยท , ฮฒnโ1 )) = (โ1)nโ1 det(Mnโ1 (ฮฒ1 , ยท ยท ยท , ฮฒnโ1 )). It is easy to see that
det(A(q) ) = (det(A))q , for any matrix A over finite field with characteristic p. Thus
(q)
(det(Rnโ2 (ฮฒ1 , ยท ยท ยท , ฮฒnโ1 )))q = det(Rnโ2 (ฮฒ1 , ยท ยท ยท , ฮฒnโ1 ))
= (โ1)nโ1 (det(Mnโ1 (ฮฒ1 , ยท ยท ยท , ฮฒnโ1 )))q 6= 0,
i.e., det(Rnโ2 (ฮฒ1 , ยท ยท ยท , ฮฒnโ1 )) 6= 0, which contradicts to Eq. (2). Thus ฯf is a deep hole
of G. The proposition holds.
Remark 2. Indeed, according to the process of the above proof, the conclusion of Proposinโ2
nโ1
+ fโคnโ3 over Fqn ,
โ axq
tion 8 still holds for any q-linearized polynomial f (x) = xq
nโ1
1โq
โ
where a 6= (โ1)
b
for all b โ Fqn .
Propositions 7 and 8 still hold for Hamming metric after similar analysis.
10
5
Conclusions
In this paper, we study the deep-holes of Gabidulin codes with both Hamming metric and
rank metric. The general results for Hamming metric case (see Theorem 2 and Proposition
5) depend on the choice of the set {g1 , . . . , gn }, while the results for rank metric case (see
Theorem 1 and Proposition 4) only depend on the subspace of Fqm spanned by g1 , . . . , gn .
In particular, when n = m, the latter case does not depend on the choice of g1 , . . . , gn
since < g1 , . . . , gn > equals to the whole space Fqm . Hence the problem about deep-holes
of Gabidulin codes with Hamming metric seems more complicated than the rank metric
case.
On the other hand, for generalized Reed-Solomon codes, it has been proved that the
problem of determining if a received word is a deep hole is NP-hard [11]. For Gabidulin
codes, the problem seems more complicated although we give a necessary and sufficient
condition for this problem. So we state it as a conjecture.
Conjecture 1. Deciding deep holes of the Gabidulin code is NP-hard.
References
[1] D. Bartoli, M. Giulietti and I. Platoni, On the covering radius of MDS codes, IEEE
Transactions on Information Theory, vol. 6, No. 2, pp. 801-811, 2015.
[2] Q. Cheng and E. Murray, On deciding deep holes of Reed-Solomon codes, Lecture
notes in Computer Science, vol. 4484, pp. 296-305, 2007.
[3] Q. Cheng and D. Wan, On the list and bounded distance decodability of Reed-Solomon
codes, SIAM Journal on Computing, vol. 37, no. 1, pp. 195-209, 2007.
[4] G. Cohen, M. Karpovsky, H. Mattson and J. Schatz, Covering radiusโsurvey and
recent results, IEEE Transactions on Information Theory, vol. 31, No. 3, pp: 328-343,
1985.
[5] G. Cohen, A. C. Lobstein and N. Sloane, Further results on the covering radius of
codes, IEEE Transactions on Information Theory, vol. 32, no. 5, pp: 680-694, 1986.
[6] P. Delsarte, Bilinear forms over a finite field with applications to coding theory, Journal
of Combinatorial Theory, Series A, vol. 25, No.3, pp: 226-241, 1978.
[7] E. M. Gabidulin, Theory of codes with maximum rank distance, Problemy Peredachi
Informatsii, vol. 21, No. 1, pp: 3-16, 1985.
[8] M. Gadouleau and Z. Yan, Packing and covering properties of rank metric codes, IEEE
Transactions on Information Theory, vol. 54, no. 9, pp. 3873-3883, 2008.
[9] M. Gadouleau and Z. Yan, Properties of codes with the rank metric, in Proc. IEEE
Globecom 2006, San Francisco, CA, 2006.
11
[10] R. Graham and N. Sloane, On the covering radius of codes, IEEE Transactions on
Information Theory, vol. 31, no. 3, pp: 385-401, 1985.
[11] V. Guruswami and A. Vardy, Maximum-likelihood decoding of Reed-Solomon codes
is NP-hard, In Proceeding of SODA, pp. 2249-2256, 2005.
[12] T. Helleseth, T. Klove and J. Mykkeltveit, On the covering radius of binary codes,
IEEE Transactions on Information Theory, vol. 24, no. 5, pp: 627-628, 1978.
[13] A. Horlemann-Trautmann and M. Kuijper, Gabidulin decoding via minimal bases of
linearized polynomial modules, Mathmatics, 2014.
[14] M. Keti and D. Wan, Deep holes in Reed-Solomon codes based on Dickson polynomials, Finite Fields & Applications, Vol. 40, pp: 110-125, 2016.
[15] R. Koฬtter and R. R. Kschischang, Coding for errors and erasures in random networking coding, IEEE Transactions on Information Theory, vol. 54, No. 8, pp. 3579-3591,
2008 .
[16] Q. Liao, On Reed-Solomon codes, Chinese Annals of Mathematics, no. 1, pp. 89-98,
2011.
[17] R. Lidl and H. Niederreiter, Finite fields, Cambridge University Press, Cambridge,
London.
[18] P. Loidreau, Properties of codes in rank metric, http://arxiv.org/abs/cs/ 0610057.
[19] D. Silva, F. R. Kschischang and R. Koฬtter, A rank-metric approach to error control
in random network coding, IEEE Transactions on Information Theory, vol. 54, No.9,
pp: 3951-3967, 2008.
[20] W. B. Vasantha, N. Suresh Babu, On the covering radius of rank-distance codes.
Gaita Sandesh 13 (1999), no. 1, 4348.
[21] D. Wan and Y. Li, On error distance of Reed-Solomon codes, Science in China, vol.
51, no. 11, pp: 1982-1988, 2008.
[22] R. Wu and S. Hong, On deep holes of standard Reed-Solomon codes, Science China
Mathematics, vol. 55, no. 12, pp. 2447-2455, 2012.
[23] J. Zhang, F.-W. Fu and Q. Liao, New deep holes of generalized Reed-Solomon codes,
Scientia Sinica, vol. 43, no. 7, pp. 727-740, 2013.
[24] J. Zhang and D. Wan, On deep holes of projective Reed-Solomon codes, International
Symposium on Information Theory, pp: 925-929, 2016.
[25] J. Zhang and D. Wan, Explicit Deep Holes of Reed-Solomon Codes, arXiv:1711.02292.
[26] J. Zhuang, Q. Cheng and J. Li, On determining deep holes of generalized ReedSolomon codes, IEEE Transactions on Information Theory, vol. 62, no. 1, pp. 199-207,
2016.
12
| 7cs.IT
|
ASYMPTOTIC BOUNDS ON THE GLOBALLY OPTIMAL POSITIONS OF ORTHOGONAL
STIFFENERS FOR RECTANGULAR PLATES IN ELASTOSTATIC BENDING
Nathan Perchikovโ
School of Mechanical Engineering, Faculty of Engineering, Tel Aviv University, Ramat Aviv, Tel Aviv 69978, Israel
Abstract The present paper treats the problem of finding the asymptotic bounds for the globally optimal
locations of orthogonal stiffeners minimizing the compliance of a rectangular plate in elastostatic bending.
The essence of the paper is the utilization of a method of analysis of orthogonally stiffened rectangular plates
first presented by Mazurkiewicz in 1962, and obtained herein in a closed form for several special cases in the
approximation of stiffeners having zero torsional rigidity. Asymptotic expansions of the expressions for the
deflection field of a stiffened plate are used to derive limit-case globally optimal stiffening layouts for highly
flexible and highly rigid stiffeners. A central result obtained in this work is an analytical proof of the fact that
an array of flexible enough orthogonal stiffeners of any number, stiffening a simply-supported rectangular
plate subjected to any lateral loading, is best to be put in the form of exactly two orthogonal stiffeners, one in
each direction.
Keywords Elastic plate bending; Orthogonal stiffeners; Fredholm's 2nd kind integral equation;
Asymptotic analysis; Globally optimal positions
1
INTRODUCTION
This paper addresses the well-known problem of optimal positioning of straight, uniform, orthogonal
beam-stiffeners of a given number or, integrally attached to a thin, rectangular, isotropic and homogeneous
plate subjected to lateral, elastic, quazistatic loading, in a layout minimizing the total work done by the loads,
in a formulation resembling an earlier version by Dems et al. (1989). Herein, as in a majority of previous
works, it is assumed that the neutral lines of the stiffeners coincide with the neutral surface of the plate.
Both the analysis and the optimal design problems have gained substantial attention in the literature. The
early papers of Nowacki (1954a,1954b) and Mazurkiewicz (1962a,1962b) solved the analysis problem by
assuming the stiffeners positioned symmetrically about the neutral surface of the plate and enforcing
geometric compatibility between the plate and the stiffeners as well as the static equilibrium of both the
stiffeners (the Euler-Bernoulli equation) and the plate (the Love-Kirchhoff equation). In the work of
Mazurkiewicz (1962), the case of a simply-supported plate was treated and the influence of the stiffeners
was viewed as effective distributed line loads expressed as double sine series. The procedure employed by
Mazurkiewicz for bidirectional stiffening with beams having non-negligible torsional rigidity produced
infinite sets of linear algebraic equations that had to be cut off and solved simultaneously. A proof of the
convergence of such algebraic systems is given by Fletcher and Thorne (1955), within the context of the
analysis of unstiffened plates having arbitrary boundary conditions. In the work of Dems et al. (1989), the
equilibrium equations for the plate and the stiffeners are replaced by the use of the Green functions of the
bending of simply-supported plate and beams, and the compatibility equation is formulated as Fredholm's
integral equation of the 1st kind, which is solved numerically by assuming that the stiffeners are attached to
the plate in a finite number of points and the effective point loads corresponding to geometric compatibility
at those points are computed, again by the simultaneous solution of cut infinite linear algebraic equations.
Various aspects of the analysis of quazistatic bending, free vibrations and buckling of orthogonally stiffened
rectangular simply-supported plates using double sine series representations were examined (Konchkovskii
1984; Savin et al. 1964; Grigolyuk et al. 1980; Andrianov et al. 1985; Kalamkarov 1992).
The (sometimes called inverse) optimization problem, of optimal positioning of stiffeners has gained not
less an extensive coverage. In the work of Dems et al. (1989) the locations of the stiffeners are varied to
decrease the work done by a given quazistatic lateral loading, where the optimization procedure utilizes an
optimality criterion derived variationally. In their work, Grayhack and Mahar (1990) consider highly flexible
stiffeners positioned in a layout increasing the minimum buckling load and obtain an analytic form of the
equations determining the optimal locations.
The objective of the present paper is the derivation of a closed-form expression for the elastic strain
โ
E-mail: [email protected]
1
energy in a simply supported thin rectangular plate stiffened with a single set of parallel stiffeners and
subjected to a harmonic loading, an asymptotic expansion of the elastic strain energy with respect to a nondimensional parameter representing the ratio of the bending rigidity of the stiffeners and the plate, and
analytical globally optimal minimization of the compliance with respect to the locations of the stiffeners. In
addition, a closed form, globally optimal bound for the optimal layout of asymptotically flexible stiffeners is
derived for the case of bidirectional stiffening. The essence of the results presented herein is the explicitness,
simplicity and global optimality of the expressions for the optimal layouts of highly flexible and highly rigid
stiffeners. In the present work, in contrast to the procedure followed by Dems et al. (1989), the geometric
compatibility equation (between the plate and the stiffeners) is formulated as Fredholm's 2nd kind integral
equation, which, unlike the 1st kind equation can be solved analytically for the case of a double-sine
expressible Green's kernel function. This method is equivalent to the method used by Nowacki (1954) and
Mazurkiewicz (1962) with the exception that here a closed form expression is obtained, mainly (but not
solely) due to the restriction to unidirectional stiffening. A thorough review of solutions of contact problems
in plate and shell bending by reformulation of the governing equations into 2nd kind Fredholm's equations
can be found in the work of Grigolyuk et al. (1980).
A different approach is described in the books of Andrianov et al. (1980) and Kalamkarov (1992), where
the method of homogenization is applied. Finding an anisotropic plate structurally equivalent to a ribstiffened isotropic plate is widely used in development of finite elements, topological optimization and
analysis of uniformly stiffened panels. Although obviously advantageous in the aforementioned cases, the
method of homogenization is not necessarily more suitable for the purpose of finding the globally optimal
locations of asymptotically rigid stiffeners. A discussion on certain mathematical aspects of the method is
given by Andrianov et al. (1980). A review of applications of the method is carried out by Kalamkarov
(1992). The outline of the present paper is as follows. In section 2, the deflection field of a stiffened plate is
derived self-consistently, assuming continuous interfaces between the plate and the stiffeners, resulting in a
closed form expression for a unidirectionally stiffened simply supported plate subjected to bisinusoidal
loading, and in double-sine series for general loading cases. In section 3, the solution is generalized to
account for bidirectional stiffening. In section 4, torsional rigidity is taken into account for the simpler case
of unidirectional stiffening. In section 5, on the basis of the results of sections 2, 3 and 4, asymptotic, explicit
and globally optimal bounds for the optimal locations of highly flexible and highly rigid uni- or bidirectional
stiffeners with or without torsional rigidity are obtained analytically.
2
ANALYSIS OF UNIDIRECTIONALLY STIFFENED PLATES
This section outlines the procedure of derivation of the linear elastic deflection field of a thin, rectangular,
homogenous, isotropic, simply supported plate of a uniform thickness, subjected to a prescribed lateral
loading and stiffened with straight uniform parallel open-section beams, all perpendicular to one of the sides
of the plate, and having locations specified parametrically.
Graphical representation of the problem follows in Fig. 1, where ฮพ and ฮท denote the planar Cartesian
coordinates, a, b and t the dimensions of the plate, p(ฮพ,ฮท) the distribution of the lateral loading and x1, x2 the
locations of the stiffeners. The bending rigidities of the plate and the stiffeners are denoted by D, E1I1 and
E2I2, respectively.
Fig. 1 Representation of the problem (the lower half of a plate stiffened symmetrically with respect to its neutral
surface)
2
The Love-Kirchhoff model is used to describe the bending of the plate. The stiffeners are assumed to
behave as Euler-Bernoulli beams, positioned symmetrically with respect to the neutral surface of the plate
and having the same deflection as the neutral surface, along their longitudinal axes. The influence of the ith
stiffener on the plate is represented by a distributed force per unit length, qi(xi,ฮท), defined as positive when
acting upwards. The stiffeners and the plate are assumed to have the same boundary conditions. In the case
considered in the present section the beams are all simply supported. Each beam is assumed to be subjected
to a distributed force per unit length qi(xi,ฮท), defined as positive acting when downwards, as shown in Fig. 2.
(a)
(b)
Fig. 2 (a) The distributed force that the plate applies on the ith stiffener and (b) The distributed force that the ith stiffener
applies on the plate
The solution procedure presented here is based on the infinitesimal deformation assumption, according to
which the deflection of the plate is small relatively to its thickness, and the thickness, in turn, is small
relatively to the (say, geometric) average of the lengths of the edges of the plate. According to this
assumption, the bending of the plate is uncoupled with the in-plane stretch and can therefore be described by
a single force balance equation for the static equilibrium deflection of the neutral surface (usually the middle
surface) of the plate, and the appropriate boundary conditions. This paper treats the problem of small-strain
elastic bending of a thin, simply supported plate. This means that the plate is treated as if it had a line of
hinges on each of two of its adjacent edges and a line of moving supports, say, moving bearings, on each of
the other two edges. Accordingly, the deflection field of the plate would follow from the Love-Kirchhoff
assumptions. The derivation of the elastic infinitesimal deflection field will follow from linear superposition:
N
w(ฮพ ,ฮท , x) = w p (ฮพ ,ฮท ) + โ wqi (ฮพ ,ฮท , x) =
(2.1)
i =1
=โซ
b
โซ
a
0 0
N
a
i =1
0
p (ฮฑ , ฮฒ ) w1 (ฮพ ,ฮท ,ฮฑ , ฮฒ )dฮฒdฮฑ +โ โซ qi ( xi , ฮฒ , x) w1 (ฮพ ,ฮท , xi , ฮฒ )dฮฒ
where w(ฮพ,ฮท,x) is the total deflection of the stiffened plate at a point which coordinates are denoted by ฮพ and
ฮท, namely, at (ฮพ,ฮท), wp(ฮพ,ฮท) is the deflection of the plate alone due to the external load alone at (ฮพ,ฮท),
w1(ฮพ,ฮท,ฮฑ,ฮฒ) is the deflection of the unstiffened plate at (ฮพ,ฮท) due to a unit lateral force acting at (ฮฑ,ฮฒ), p(ฮพ,ฮท) is
the function describing the distribution of the given external lateral load, x is the vector of the ฮพ coordinates
of the stiffening beams and q(ฮพ,ฮท,x) is the vector of the distributed forces per unit length representing the
forces acting between the plate and the stiffeners (due to the external load) when the system is in
equilibrium, each of which components corresponds to each of the N stiffeners.
Equation (2.1) assumes that p(ฮพ,ฮท) is everywhere small enough for the deflection of the plate to be small
relatively to its thickness. According to Newton's third law,
qi ( xi ,ฮท , x ) = โ qiB ( xi ,ฮท , x )
(2.2)
where the superscript B represents the fact that the distributed force is applied at the beams representing the
stiffeners. It is now due to geometric compatibility, representing the fact that the stiffeners are considered
integrally attached to the plate, that the deflection fields of the stiffeners are equal to the deflection field of
the stiffened plate, along their interfaces, namely:
w( xi ,ฮท , x) = wiB ( xi ,ฮท , x )
(2.3)
Next, assuming that the stiffeners can be treated as Euler-Bernoulli beams, one can write:
qiB ( xi ,ฮท , x) = Ei I i
โ 4 wiB ( xi ,ฮท , x)
โฮท 4
Substituting equations (2.2) and (2.3) into the above relation, results in:
3
(2.4)
q i ( xi , ฮท , x ) = โ E i I i
โ 4 w( xi ,ฮท , x)
โก โ Ei I i wฮท( IV ) ( xi ,ฮท , x)
โฮท 4
(2.5)
Next, substituting equation (2.5) into equation (2.1) produces the integro-differential equation for the
deflection field of the stiffened plate (which can be turned into a standard Fredholm integral equation of the
2nd kind โ and solved using the standard procedure โ either by differentiating or by performing integration by
parts four times consecutively):
w(ฮพ ,ฮท , x) = โซ
b a
โซ
0 0
N
a
i =1
0
p(ฮฑ , ฮฒ ) w1 (ฮพ ,ฮท ,ฮฑ , ฮฒ )dฮฒdฮฑ โ โ Ei I i โซ wฮฒ( IV ) ( xi , ฮฒ , x)w1 (ฮพ ,ฮท , xi , ฮฒ ) dฮฒ
(2.6)
Here, use is made of Greenโs function for the bending of a Love-Kirchhoff simply-supported plate as
obtained by Navier (Szilard (1974)):
โ
4
sin(nฯฮฑ / b)sin( sฯฮฒ / a )sin(nฯฮพ / b)sin( sฯฮท / a )
โ
4
ฯ abD n,s =1
( n 2 / b2 + s 2 / a 2 ) 2
w1 (ฮพ ,ฮท , ฮฑ , ฮฒ ) =
(2.7)
and uniform beams are assumed:
E j I j (ฮท ) = E j I j
โ 1โค j โค N
(2.8)
Next, taking a double-sine transform of the loading,
4 b a
p(ฮฑ , ฮฒ ) sin(nฯฮฑ / b) sin( rฯฮฒ / a )d ฮฒ dฮฑ
ab โซ0 โซ0
Pnr =
(2.9)
and introducing the auxiliary function:
ฮป jn โก E j I j sin(nฯ x j / b)
(2.10)
the deflection field of a unidirectionally stiffened simply supported plate for a general loading becomes:
w(ฮพ ,ฮท , x) =
T
1 โ sin(mฯฮพ / b) sin(rฯฮท / a) ๏ฃซ
2r 4 ๏ฃฑ โ ฮป m sin(nฯx / b) ๏ฃฎ 2r 4
๏ฃฌ
P
+
ร
๏ฃฒ
โ
โ
mr
๏ฃฏ
a 4 bD ๏ฃณ n =1 (n 2 / b 2 + r 2 / a 2 ) 2 ๏ฃฐ a 4 bD
ฯ 4 D m, r =1 (m 2 / b 2 + r 2 / a 2 ) 2 ๏ฃฌ๏ฃญ
โ
๏ฃซ
ฮป ยต sin( ยตฯx / b)
2r
sin(nฯx T / b)๏ฃฌ 1 + 4
โ
๏ฃฌ a bD ยต =1 ( ยต 2 / b 2 + r 2 / a 2 ) 2
๏ฃญ
T
4
๏ฃถ
๏ฃท
๏ฃท
๏ฃธ
โ1
โ
โ
(ฮฝ
ฮฝ
=1
(2.11)
๏ฃน ๏ฃผ๏ฃด ๏ฃถ
โ Pnr ๏ฃบ ๏ฃฝ ๏ฃท
/b +r /a )
๏ฃป ๏ฃด๏ฃพ ๏ฃท๏ฃธ
ฮป ฮฝ Pฮฝr
2
2
2
2
2
The elastic strain energy stored in the deformed structure, consistent of the energy stored in the stiffened
plate and the energy stored in the stiffeners, is equal to the work done by the external loads, and can be
obtained accordingly as:
U=
1 a b
p (ฮพ ,ฮท ) w(ฮพ ,ฮท , x)dฮพdฮท
2 โซ0 โซ0
(2.12)
Next, if one assumes a sinusoidal loading distribution,
p(ฮพ ,ฮท ) = Pgh sin( gฯฮพ / b) sin(hฯฮท / a) โ Pkr = Pghฮด gk ฮด hr
(2.13)
The deflection field of the stiffened plate becomes:
w(ฮพ ,ฮท , x) =
+
Pgh sin( gฯฮพ / b) sin(hฯฮท / a)
+
ฯ 4 D (g 2 / b 2 + h 2 / a 2 ) 2
4h 8 Pgh
ฯ a b D
4
8
2
โ
3
โ
m =1
ฮป Tm sin(mฯฮพ / b) sin(hฯฮท / a)
(m / b + h / a )
2
2
2
2
2
โ
โ (n
n =1
2
โ1
sin(nฯx / b)
ร
/ b2 + h2 / a2 )2
T
๏ฃซ
ฮปg
2h 4 โ ฮป ยต sin( ยตฯx / b) ๏ฃถ๏ฃท
ร sin(nฯx T / b)๏ฃฌ 1 + 4
โ
2
2
2
2
2
2
2
๏ฃฌ a bD ยต =1 ( ยต / b + h / a ) ๏ฃท ( g / b + h 2 / a 2 ) 2
๏ฃญ
๏ฃธ
4
T
2h Pgh โ ฮป sin(mฯฮพ / b) sin(hฯฮท / a)
sin( gฯx / b)
โ 4 4 2โ m
2
2
2
2 2
2
ฯ a bD m =1
(m / b + h / a )
(g / b 2 + h 2 / a 2 ) 2
4
(2.14)
Hence, more compact a form of the deflection field of a stiffened plate can be obtained. First, using a
well-known trigonometric identity:
โ
โ
n =1
2 sin( nฯx j / b) sin( nฯxi / b)
(n / b + r / a )
2
2
2
2 2
โ
=โ
n =1
cos[ nฯ ( x j โ xi ) / b]
(n / b + r / a )
2
2
2
2 2
โ
โโ
cos[ nฯ ( x j + xi ) / b]
(n 2 / b 2 + r 2 / a 2 ) 2
n =1
(2.15)
the double sine sums in (2.14) can be written as a difference between two single cosine sums. Then,
summing the cosine series analytically by relating them to a function that produces a known sine series, the
following result is obtained (this matter is further addressed in section 5.2):
โ
d โ
cos(nฯx / b)
( nฯ / b) sin( nฯx / b)
=
โ
=
โ
โ
2
2
2
2 2
dx n =1 ( n 2 / b 2 + r 2 / a 2 ) 2
n =1 ( n / b + r / a )
=
(2.16)
ab 2 sinh(ฯrx / a ) โ abx sinh(ฯrb / a ) cosh(ฯr[b โ x ] / a )
4ฯ โ3 r sinh 2 (ฯrb / a )
By integrating (2.16) and substituting the result into (2.14), an expression with no infinite sums is
obtained. Defining, component-wise, the following quantities (i and j being the indices related to the
numbers of the stiffeners):
B jir =
cosh(ฯr[b โ x j โ x i ] / a)
r 2 E j I j ๏ฃฑ cosh(ฯr[ x j โ x i ] / a) โ cosh(ฯr[ x j + x i ] / a )
+a
๏ฃฒb
3 2
2
ฯr sinh(ฯrb / a)
2ฯ a D ๏ฃณ
sinh (ฯrb / a)
(2.17)
cosh(ฯr[b โ xi โ x j ] / a) x j โ x i sinh(ฯr[b โ x j โ x i ] / a) โ ( x j + x i ) sinh(ฯr[b โ x i โ x j ] / a) ๏ฃผ๏ฃด
โa
+
๏ฃฝ
ฯr sinh(ฯrb / a)
sinh(ฯrb / a)
๏ฃด๏ฃพ
cosh(ฯh[b โ x j โ ฮพ ] / a)
Pgh h 2 sin( hฯฮท / a) E j I j ๏ฃฑ cosh(ฯh[ x j โ ฮพ ] / a ) โ cosh(ฯh[ x j + ฮพ ] / a )
+a
๏ฃฒb
3 2
2
ฯh sinh(ฯhb / a)
2ฯ a D
sinh (ฯhb / a )
๏ฃณ
(2.18)
cosh(ฯh[b โ ฮพ โ x j ] / a) x j โ ฮพ sinh(ฯh[b โ x j โ ฮพ ] / a) โ ( x j + ฮพ 0 ) sinh(ฯh[b โ ฮพ โ x j ] / a) ๏ฃผ๏ฃด
โa
+
๏ฃฝ
ฯh sinh(ฯhb / a)
sinh(ฯhb / a)
๏ฃด๏ฃพ
s jh =
S jih =
๏ฃฑ๏ฃด cosh(ฯh[ x j โ x i ] / a ) โ cosh(ฯh[ x j + x i ] / a )
cosh(ฯh[b โ x j โ x i ] / a )
h2
+a
๏ฃฒb
3 2
2
ฯh sinh(ฯrb / a )
2ฯ a D ๏ฃด
sinh (ฯhb / a )
๏ฃณ
(2.19)
cosh(ฯh[b โ x i โ x j ] / a ) x j โ x i sinh(ฯh[b โ x j โ x i ] / a ) โ ( x j + x i ) sinh(ฯh[b โ x i โ x j ] / a ) ๏ฃผ๏ฃด
โa
+
๏ฃฝ
ฯh sinh(ฯrb / a )
sinh(ฯhb / a )
๏ฃด๏ฃพ
the deflection field for a bisinusoidal loading in a closed form โ although not totally explicitly, as a solution
of a finite linear system of equations is required โ becomes:
Pgh sin( gฯฮพ / b) sin( hฯฮท / a ) + s Th [S h (1 + B h ) ฮป g โ sin( gฯx / b)]
โ1
wgh (ฮพ ,ฮท , x) =
ฯ 4 D( g 2 / b 2 + h 2 / a 2 ) 2
(2.20)
Having the deflection field corresponding to a bisinusoidal loading, the deflection field for a general
loading (expressible as a double sine series) can be derived by superposition:
w(ฮพ ,ฮท , x) =
โ
โ
g , h =1
Pgh sin( gฯฮพ / b) sin(hฯฮท / a) + s Th [S h (1 + B h ) ฮป g โ sin( gฯx / b)]
โ1
ฯ 4 D( g 2 / b 2 + h 2 / a 2 ) 2
(2.21)
Numerical verification of the presented method is omitted here, as an equivalent method has been
presented before by Nowacki (1954) and Mazurkiewicz (1962). The analytical summations performed here
can only improve convergence and help avoid the Gibbs phenomena.
However, in the present paper, the above operations are needed in order to obtain closed-form asymptotic
expansions rather than in order to produce a better numerical analysis module. Therefore, no comparison of
deflections and stresses of stiffened plates for various loading cases (calculated once with the employed
method and once with commercial software tools), is given here.
5
3
GENERALIZATION OF THE ANALYSIS FOR BIDIRECTIONAL STIFFENING
The treatment of bidirectional stiffening is not much different from that of the unidirectional one.
The deflection field can be obtained using linear superposition:
N
b
i =1
0
w(ฮพ ,ฮท , x) = w p (ฮพ ,ฮท ) + โ wqi (ฮพ ,ฮท , x) = โซ
Nฮท
a
+ โ โซ qi ( xi , ฮฒ , x) w1 (ฮพ ,ฮท , xi , ฮฒ )dฮฒ +
0
i =1
โซ
a
p(ฮฑ , ฮฒ ) w1 (ฮพ ,ฮท , ฮฑ , ฮฒ )dฮฒdฮฑ +
0
Nฮท + N ฮพ
(3.1)
โโซ
b
qi (ฮฑ , xi , x) w1 (ฮพ ,ฮท , ฮฑ , xi )dฮฑ
0
i = Nฮท +1
where qi are the distributed forces per unit length exerted on the plate by the stiffeners, N is the total number
of the stiffeners, Nฮท is the number of ฮท-axis aligned stiffeners, and Nฮพ is the number of ฮพ -axis aligned
stiffeners. Denoting the interaction forces applied on the ฮพ-axis aligned stiffeners by the ฮท-axis aligned
stiffeners by fij, one can write the following relations:
Ei I i
Nฮท
โ 4 wi 's Beam (ฮพ )
โ 4 w(ฮพ , xi )
=
E
I
=
q
(
ฮพ
)
=
โ
q
(
ฮพ
,
x
)
+
f ij ฮด (ฮพ โ x j )
โ
i i
on i ' s
i
i
โฮพ 4
โฮพ 4
Beam
j =1
(3.2)
where the first equality sign is due to the assumption that the neutral axes of the stiffeners coincide with the
neutral surface of the plate, the second is due to the Euler-Bernoulli beam theory for uniform beams and the
third is obtained by summing up all the forces exerted on the iโs, ฮพ-axis aligned stiffener. The first term after
the third equality sign is the distributed force per unit length exerted by the plate on the iโs, ฮพ-axis aligned
stiffener, as arises from Newtonโs third law. The function ฮด(x) denotes Diracโs Delta function. For the ฮท-axis
aligned stiffeners one can write:
Ei I i
Nฮท + Nฮพ
โ 4 w( xi ,ฮท )
=
โ
q
(
x
,
ฮท
)
+
โ (โ f ij )ฮด (ฮท โ x j )
i
i
โฮท 4
j = Nฮท +1
(3.3)
using the same arguments as before and having (โ fij) instead of fij this time, due to Newtonโs third law.
Next, deriving qi from (3.2) and (3.3) and substituting them into (3.1), one has:
w(ฮพ ,ฮท , x) = โซ
b
0
Nฮท
โ โโซ
i =1
+
a
0
Nฮท + N ฮพ
Nฮพ
0
Nฮพ
p (ฮฑ , ฮฒ ) w1 (ฮพ ,ฮท , ฮฑ , ฮฒ )dฮฒdฮฑ โ โ โซ Ei I i wฮฒ( IV ) ( xi , ฮฒ , x)w1 (ฮพ ,ฮท , xi , ฮฒ )dฮฒ
โ f ฮด (ฮฒ โ x
ij
j
)w1 (ฮพ ,ฮท , xi , ฮฒ )dฮฒ โ
i = Nฮท +1
Nฮท
b
0
ij
i =1
Nฮท + N ฮพ
i =1
+
ฮด (ฮฑ โ x j )w1 (ฮพ ,ฮท , ฮฑ , xi )dฮฑ = โซ
0
โ โf
Nฮท Nฮท + N ฮพ
ij
b
0
a
i = Nฮท +1 i =1
0
โโซ
i = Nฮท +1
โ โ โซ Ei I i wฮฒ( IV ) ( xi , ฮฒ , x)w1 (ฮพ ,ฮท , xi , ฮฒ ) dฮฒ โ
Nฮท + N ฮพ Nฮท
a
i =1
Nฮท + N ฮพ
โ โซ โf
i = Nฮท +1
โซ
a
w1 (ฮพ ,ฮท , x j , xi ) โ โ
โf
ij
โซ
b
0
a
0
Ei I i wฮฑ( IV ) (ฮฑ , xi , x)w1 (ฮพ ,ฮท , ฮฑ , xi ) dฮฑ +
p (ฮฑ , ฮฒ ) w1 (ฮพ ,ฮท , ฮฑ , ฮฒ )dฮฒdฮฑ
Nฮท + N ฮพ
โโซ
i = Nฮท +1
b
0
(3.4)
Ei I i wฮฑ( IV ) (ฮฑ , xi , x)w1 (ฮพ ,ฮท , ฮฑ , xi )dฮฑ
w1 (ฮพ ,ฮท , xi , x j )
i =1 i = Nฮท +1
Owing to the fact that the influence function for the bending of a simply-supported plate, w1, is symmetric
(insensitive to an interchange of the arguments), as one can learn from (2.7), the last two terms in (3.4)
cancel each other. Therefore, in deriving the compatibility equation for the bending of an orthogonally
stiffened simply-supported plate, one can disregard the interaction forces between the stiffeners, as they
cancel out in the final governing equation. Consequently, the governing equation becomes:
w(ฮพ ,ฮท , x) = โซ
b
0
โซ
a
0
Nฮพ
a
p (ฮฑ , ฮฒ ) w1 (ฮพ ,ฮท , ฮฑ , ฮฒ )dฮฒdฮฑ โ โ โซ E i I i wฮฒ( IV ) ( xi , ฮฒ , x)w1 (ฮพ ,ฮท , xi , ฮฒ )dฮฒ
i =1
โ
Nฮท + N ฮพ
โโซ
i = Nฮท +1
b
0
0
Ei I i wฮฑ( IV) (ฮฑ , xi , x)w1 (ฮพ ,ฮท , ฮฑ , xi ) dฮฑ
6
(3.5)
Hence, using expressions (2.7)-(2.10) and the orthogonality of the sine functions, and following the
strategy for the solution of integro-differential equations mentioned in section 2, one obtains two sets of
compatibility equations for the distributed forces between the stiffeners and the plate, one for each stiffening
direction.
Making use of (2.17) and introducing the following quantities:
b
a
0
0
z in โก Ei I i โซ wฮฑ( IV) (ฮฑ , xi , x) sin(nฯฮฑ / b) dฮฑ ; vis โก Ei I i โซ wฮฒ( IV ) ( xi , ฮฒ , x) sin( sฯฮฒ / a)dฮฒ
u jr โก
ฮป jn Pnr
ยต js Pms
r4 โ
bm 4 โ
; y jm โก 4 โ 2 2
; ยต js โก E j I j sin( sฯx j / a)
โ
3
2
2
2
2 2
2a D n =1 (n / b + r / a )
2a D s =1 (m / b + s 2 / a 2 ) 2
C jirn โก
2r 4 ฮป jn sin(rฯxi / a)
a 4 bD(n 2 / b 2 + r 2 / a 2 )
; D jims โก
2
2m 4 ยต js sin(mฯxi / b)
a 5 D(m 2 / b 2 + s 2 / a 2 )
โ
; F jim โก โ
2
s =1
(3.6)
2m 4 ยต js sin( sฯxi / a)
a 5 D( m 2 / b 2 + s 2 / a 2 ) 2
and (analytically) decoupling the two sets of compatibility equations mentioned above, one gets a single
system defined by the quantities:
โ
๏ฃฎ
๏ฃน
g n โก (1 + Fn ) โ1 ๏ฃฏy n โ โ D ns (1 + B s ) โ1 u s ๏ฃบ
s =1
๏ฃฐ
๏ฃป
(3.7)
โ
ฮ nm โก โ (1 + Fn ) โ1 D ns (1 + B s ) โ1C sm
s =1
which are, respectively, the vector and matrix infinite sets representing the final form of the compatibility
equation for the bidirectionally stiffened simply supported thin rectangular plate:
โ
z n = g n + โ M nm z m
(3.8)
m =1
Equation (3.8) is an infinite inhomogeneous linear system of equations in which every equation is by
itself a finite system of equations where the number of equations is equal to the number of the stiffeners in
the direction parallel to the ฮพ axis.
Obviously the relation M nm = M nฮด mn does not hold for any Mn and therefore the infinite system cannot be
solved exactly and one has to truncate it in order to solve it. Thus, the system that would have to be solved
would be:
mf
z n = g n + โ M nm z m ; 1 โค n โค m f << โ
(3.9)
m =1
In order to solve the system, it is necessary to write the finite systems of equations one beneath the other,
resulting in a total number of mTot = N y m f unknowns and equations. That is if one has 17 stiffeners in the
direction parallel to the ฮพ axis and they taking 100 harmonics in the Fourier series representation of the
Green influence function of the bending of the plate, then one would write the first 17 equations for m = 1,
and then the 17 equations for m = 2 and so forth up to m = 100, so that eventually they would have 1700
equations or rows in the representing matrix. Similarly, in the vectors one would have 17 components for m
= 1 and then 17 components for m = 2 and so forth, with resultant vectors of 1700 components,
corresponding to 1700 columns in the representative matrix.
Naturally, one could have written the 100 equations corresponding to the 1st stiffener first and have 17
bunches of 100 and not 100 bunches of 17. However, it is better to keep the equations corresponding to the
different stiffeners in bunches so that the truncation error will affect them as similarly as possible, so that no
stiffener is represented worse than the other.
Of course, there still remains the order within each bunch, but this is a smaller effect, there has to be some
order anyway. Now, if the solution of the system of equations is achieved by Gauss elimination, then the last
equations will have the smallest round-off error as the first to be solved, so that it would be beneficiary to put
the first, more important harmonics in the end, that is, to reverse the order described above.
Anyhow, defining:
7
๏ฃฎ M m f ,m f
๏ฃซ gmf ๏ฃถ
๏ฃซ z mf ๏ฃถ
๏ฃท
๏ฃฌ
๏ฃท
๏ฃฌ
๏ฃฏM
๏ฃฌ z m f โ1 ๏ฃท
๏ฃฌ g m f โ1 ๏ฃท
๏ฃฏ m f โ1,m f
๏ฃฌg
๏ฃท
๏ฃฌz
๏ฃท
๏ฃฏM m f โ 2 , m f
z โก ๏ฃฌ m f โ2 ๏ฃท ; g โก ๏ฃฌ m f โ2 ๏ฃท ; M โก ๏ฃฏ
.
๏ฃฌ . ๏ฃท
๏ฃฌ . ๏ฃท
๏ฃฏ
๏ฃฌ . ๏ฃท
๏ฃฌ . ๏ฃท
๏ฃฏ
.
๏ฃท
๏ฃฌ
๏ฃท
๏ฃฌ
๏ฃฏ
๏ฃฌ z ๏ฃท
๏ฃฌ g ๏ฃท
๏ฃฏ๏ฃฐ M 1,m f
๏ฃญ 1 ๏ฃธ
๏ฃญ 1 ๏ฃธ
M m f ,m f โ1
M m f โ1,m f โ1
M m f ,m f โ 2
M m f โ1,m f โ 2
M m f โ 2 ,m f โ1
.
.
.
.
.
M 1,m f โ1
.
. . M m f ,1 ๏ฃน
. . M m f โ1,1 ๏ฃบ๏ฃบ
. .
. ๏ฃบ
๏ฃบ
. .
. ๏ฃบ
. .
. ๏ฃบ
๏ฃบ
. . M 1,1 ๏ฃป๏ฃบ
(3.10)
every component in the vectors being a column vector itself and every component in the matrix being a
matrix itself, results in the equation:
(3.11)
z = g + M z โ (1 โ M ) z = g
m รm
where the unit matrix is 1 โ R f f .
The solution of equation (3.8) would produce a series of the approximate values of a finite number of the
necessary integrals for the evaluation of the deflection field. If the matrix (1 โ M ) is regular and the system is
convergent, then the solution can be written as:
z = (1 โ M ) โ1 g
(3.12)
Obviously, this is only formal writing. The solution of a system of equations is not achieved by taking the
inverse of a large matrix. The system can be solved with the Matlab solver based on LU factorization and
Gauss elimination.
Next, the question of convergence can be addressed in a two-fold way. First, a proof by Fletcher and
Thorne [2] guarantees that a system equivalent to (3.8)-(3.11) is convergent and may be solved to any
desired degree of accuracy (unlike, say, an asymptotic system, which can only be solved to a certain, limited
degree of accuracy).
Second, the system in (3.11) was solved by the author for realistic problem parameters, showing
monotonic convergence upon increase in the number of considered harmonics and correlating well with a
FEM solution.
Now, whereas the solution of a unidirectionally stiffened plate presented in section 2 can be considered
analytical and exact, the solution of a bidirectionally stiffened plate may be considered exact and semianalytical. โExactโ due to the convergence of the above series, since exactness of a solution is oneโs ability to
have it up to any desired degree, which is possible in the present case and โsemi-analyticโ due to the
truncation of the infinite series.
The procedure one has to follow in order to obtain a solution after (3.12) is not discussed thoroughly here.
Shortly, one has to solve (3.11)-(3.12) and substitute the solution into (3.5) using definitions (3.10) and (3.6)
and (2.7), thus obtaining the third row in (3.5).
For the second row in (3.5) one has to substitute the solution of (3.11) along with the definitions in (3.6)
into the following relation, obtained from the analytical decoupling of (3.5):
mf
๏ฃซ
๏ฃถ
v r = (1 + B r ) โ1 ๏ฃฌ๏ฃฌ u r โ โ C rn z n ๏ฃท๏ฃท
n =1
๏ฃญ
๏ฃธ
4
(3.13)
UNIDIRECTIONAL STIFFENERS WITH NON-NEGLIGIBLE TORSIONAL RIGIDITY
One can account for the torsional rigidities of the stiffeners (which are relevant especially for the case of
stiffeners having closed cross-sections). The torques that the stiffeners apply on the plate can be related to
the twisting angles of the plate along the plate-stiffeners interfaces, as follows: for each stiffener, one can
employ the constitutional relation of a linear elastic shaft, denoting the torque applied on the plate by T, the
shear modulus and the geometric torsion rigidity parameter by G and C respectively, the coordinate changing
along the stiffener being ฮท and the perpendicular being ฮพ, assuming small twisting angles. The superscript b
implies that a quantity is related to the stiffener.
Ti ( xi ,ฮท , x) = โ Ti b ( xi ,ฮท , x) = โ C i Gi
Newton
3rd Law
Shaft
Law
โฮธ ib
โฮธ
โฒโฒ ( xi ,ฮท , x)
= โ C i Gi i = โ C i Gi wฮพฮท
โฮท wb = w
โฮท ฮธ i <<1
Superimposing, the deflection field of the (for simplicity, unidirectionally) stiffened plate becomes:
8
(4.1)
N
N
b
i =1
i =1
0 0
w(ฮพ ,ฮท , x) = w p (ฮพ ,ฮท ) + โ wqi (ฮพ ,ฮท , x) + โ wTi (ฮพ ,ฮท , x) = โซ
N
a
N
a
i =1
0
i =1
0
โซ
a
p(ฮฑ , ฮฒ ) w1 (ฮพ ,ฮท ,ฮฑ , ฮฒ ) dฮฒdฮฑ +
(4.2)
+ โ โซ qi ( xi , ฮฒ , x) w1 (ฮพ ,ฮท , xi , ฮฒ )dฮฒ + โ โซ Ti ( xi , ฮฒ , x) wT =1 (ฮพ ,ฮท , xi , ฮฒ ) dฮฒ
Substituting (4.1) and (2.5) into (4.2) one gets the following integro-differential equation for the
deflection field, where only the deflection due to a unit couple, wT =1 , is yet to be determined:
w(ฮพ ,ฮท , x) = โซ
b
0
โซ
a
0
N
a
i =1
0
p(ฮฑ , ฮฒ ) w1 (ฮพ ,ฮท , ฮฑ , ฮฒ )dฮฒdฮฑ โ โ Ei I i โซ wฮฒ( IV) ( xi , ฮฒ , x)w1 (ฮพ ,ฮท , xi , ฮฒ )dฮฒ
N
a
i =1
0
(4.3)
โฒโฒ ( xi , ฮฒ , x)wT =1 (ฮพ ,ฮท , xi , ฮฒ )dฮฒ
โ โ Gi Ci โซ wฮพฮฒ
By Bettiโs theorem, the deflection of an elastic structure due to a unit couple at a point is equal to the
rotation angle (in the direction of the couple โ perpendicular to the stiffeners, in the present case) โ or the
slope, for small rotation angles โ due to a unit force at that point, namely:
โw (ฮพ ,ฮท , ฮฑ , ฮฒ )
(4.4)
wT =1 (ฮพ ,ฮท , xi , ฮฒ ) = 1
โฮฑ
ฮฑ =x
i
Substituting (4.4) into (2.7) this yields:
wT =1 (ฮพ ,ฮท , x i , ฮฒ ) =
โ
n cos( nฯxi / b ) sin( sฯฮฒ / a ) sin( nฯฮพ / b ) sin( sฯฮท / a )
4
โ
2
(n 2 / b 2 + s 2 / a 2 ) 2
ฯ ab D n , s =1
3
(4.5)
Substituting (2.7) and (4.5) into (4.3) produces a fully defined integro-differential equation for the
deflection field. Naturally, similar steps can be taken if a second, perpendicular, stiffening array is present.
Treating the obtained integro-differential equation in a manner similar to the one described in the
previous sections, and introducing the following quantities (referring to definition (2.10) again):
ฯ jn โก G j C j cos( nฯx j / b) , Tr โก
2ฯr 4 โ nฮป n cos( nฯx T / b)
โ
a 4 b 2 D n =1 ( n 2 / b 2 + r 2 / a 2 ) 2
(4.6)
one obtains a first set of compatibility equations:
v r = u r โ B r v r โ Tr t r
(4.7)
where use is made of the definitions of Br from (2.17) and ur and vr from (3.6) and:
a
โฒโฒ ( xi , ฮฒ , x) sin(sฯฮฒ / a)dฮฒ
t is โก Gi Ci โซ wฮพฮฒ
(4.8)
0
The equation in (4.7) is obtained by calculating the distributed forces-induced deflections at the platestiffeners interfaces from the left-hand side of (4.3). Calculating the distributed torques-induced deflections
at the plate-stiffeners interfaces from (4.3) results in a second set of compatibility equations:
โ
โ
s =1
s =1
t r = ฯ
r โ โ ฮ rs v s โ โ โฆ rs t s
(4.9)
where the following definitions have been made:
ฯ
r โก
1 โ rs โ (โ1) r + s s 2
โ r2 โ s2
ฯ 3 bD s =1
ฮ rs โก
โฆ rs โก
โ
โ (n
n =1
r+s
2
r+s
2
4
rs โ (โ1) s
3
2
ฯ ab D
r2 โ s2
4
rs โ ( โ1) s
2
3
ฯ ab D
r2 โ s2
โ
nฯ n Pns
/ b2 + s 2 / a2 )2
nฯ n sin(nฯx T / b)
2
/ b2 + s 2 / a2 )2
โ (n
n =1
n 2 ฯ n cos(nฯx T / b)
2
/ b2 + s 2 / a2 )2
n =1
โ
โ (n
One can decouple the two systems (4.7) and (4.9) analytically.
9
2
(4.10)
Defining the following auxiliary quantities:
โ
ฮจ rs โก โฆ rs โ ฮ rs (1 + B s ) โ1 Ts + ฮด rs 1 , ฯ r โก ฯ
r โ โ ฮ rs (1 + B s ) โ1 u s
(4.11)
s =1
where ฮดrs is Kroneckerโs Delta, the following infinite set of equations is obtained for tr:
โ
โฮจ
t = ฯr
rs s
(4.12)
s =1
Now, naturally, in order to be solved, this system has to be truncated. If the system is convergent, and we
assume that it is, as we had assumed for the other systems in this paper (relying on a proof of convergence by
Fletcher and Thorne (1955)), then an approximate solution with any desired degree of accuracy, can be
obtained from:
sf
โฮจ
t = ฯ r ; 1 โค r โค s f << โ
rs s
(4.13)
s =1
Next, applying the argumentation from section 3 and denoting by t the truncated vector (t1T , t T2 ,..., t Tsf ) T
and doing the same for the other quantities in (4.13), one can write the last form of the compatibility
equation for a rectangular, simply supported plate stiffened with a single set of uniform stiffeners, parallel to
one of the sides of the plate, taking the torsional rigidity of the stiffeners into account, as follows:
ฮจt = ฯ
(4.14)
This system would have to be solved numerically, after defining the auxiliary quantities introduced above.
Hence,
(4.15)
ฮธ r โก (1 + B r ) โ1 u r ; ฮ r โก (1 + B r ) โ1 Tr
and denoting by a corresponding symbol but with an upper bar the truncated vectors ( v1T , v T2 ,..., v Ts f ) T and
(ฮธ1T , ฮธ T2 ,..., ฮธ Ts f ) T and constructing the truncated matrix ฮ in a manner similar to the one employed in
equation (3.10) in section 3, we obtain the second set of unknowns required for the solution:
v = ฮธ โ ฮt
(4.16)
And the solution becomes:
f
4
sin(nฯฮพ / b) sin( sฯฮท / a) ๏ฃฎ ab
nฯ
๏ฃน
Pns โ sin(nฯx T / b) v s โ
cos(nฯx T / b)t s ๏ฃบ
โ
4
b
ฯ abD n ,s =1 ( n 2 / b 2 + s 2 / a 2 ) 2 ๏ฃฏ๏ฃฐ 4
๏ฃป
s
w(ฮพ ,ฮท , x) =
(4.17)
Last, in order to be substituted into (4.17), the solutions of (4.14) and (4.16) should be separated into the
appropriate sub-vectors again, in a way similar to the way they were constructed.
5
ASYMPTOTIC ANALYSIS: GLOBALLY OPTIMAL LAYOUTS OF HIGHLY FLEXIBLE
AND HIGHLY RIGID STIFFENERS
This section is concerned with the determination of the optimal layout of stiffeners in the limit case where
the stiffeners are much less or much more rigid than the ground structure.
The examination of this limit case is important for the estimation of the correct asymptotic behavior of
the optimal locations of stiffeners with respect to their rigidities and the determination of the bounds for the
optimal positions of realistic stiffeners. The derivation assumes a thin, isotropic, homogenous, rectangular
plate in elastostatic bending, subjected to a lateral pressure and stiffened with two sets of straight, parallel
uniform stiffeners.
10
5.1 Highly flexible bidirectional stiffeners with no torsional rigidity โ 1st order asymptotics
The linear elastostatic strain energy for the case can be derived, using the results of sections 2 and 3, as
follows. Introducing the small parameter ฮต โก EI /(aD) and deriving the auxiliary quantities required for the
calculation of the strain energy for the asymptotic case, one gets:
โ
โ
๏ฃฎ
๏ฃน
g n = (1 + Fn ) โ1 ๏ฃฏy n โ โ D ns (1 + B s ) โ1 u s ๏ฃบ โ y n โ โ D ns u s โ y n
๏ฃฏ
ฮต <<1
( 3.7 )
๏ฃบ๏ฃป ฮต <<1O
s =1
s =1 O (ฮต ) O (ฮต )
(ฮต )
O (ฮต )
O (ฮต )
๏ฃฐ
O (ฮต )
(5.1.1)
O (ฮต 2 )
ฮ nm =
โ
( 3.7 )
โ (1 + F )
โ1
n
s =1
O (ฮต )
โ
D ns (1 + B s ) โ1C sm โ โ D ns C sm = O(ฮต 2 )
ฮต <<1
s =1
O (ฮต )
O (ฮต ) O (ฮต )
โ1
โ z = (1 โ M
g โ y โ zn โ yn
) g ฮตโ
( 3.9 )
<<1 ฮต <<1
ฮต <<1
(5.1.2)
O (ฮต 2 )
mf
mf
mf
v r = (1 + B r ) โ1 (u r โ โ C rn z n ) โ u r โ โ C rn z n โ u r โ โ C rn y n โ u r โ v r โ u r
ฮต <<1
( 3.13)
ฮต <<1
ฮต <<1
ฮต <<1
n =1
n =1
n =1
O (ฮต )
O (ฮต )
(5.1.3)
O (ฮต ) O (ฮต )
Recalling the expression for the deflection (which is not given explicitly in section 3 but can easily be
derived):
w(ฮพ ,ฮท , x) =
mf
Nฮท
Nฮท + N ฮพ
๏ฃน
4
sin( nฯฮพ / b )in ( sฯฮท / a ) ๏ฃฎ abPns
โ
sin(
n
ฯ
x
/
b
)
v
โ
sin( sฯxi / a ) z in ๏ฃบ
๏ฃฏ
โ
โ
โ
i
is
4
2
2
2
2 2
ฯ abD n, s =1 (n / b + s / a ) ๏ฃฐ๏ฃฏ 4
i =1
i = Nฮท +1
๏ฃป๏ฃบ
(5.1.4)
integrating it multiplied by half the loading, thus obtaining an expression for the work or the strain energy,
U ( x, N ฮพ , N ฮท ) =
1
2ฯ 4
mf
โ (n
D
n , s =1
Pns
2
2
/ b + s 2 / a 2 )2
Nฮท + N ฮพ
๏ฃฎ abPns Nฮท
๏ฃน
โ โ sin( nฯxi / b)vis โ โ sin( sฯxi / a ) z in ๏ฃบ
๏ฃฏ
i =1
i = Nฮท +1
๏ฃฏ๏ฃฐ 4
๏ฃบ๏ฃป
(5.1.5)
and substituting (5.1.3) into (5.1.5), one gets an explicit expression for the strain energy of the stiffened
plate:
m
Nฮท + N ฮพ
๏ฃฎ abPns Nฮท
๏ฃน
Pns
1
U (x, N ฮพ , Nฮท )
โ
โ
n
x
b
u
โ
s
x
a
y
sin(
/
)
sin(
/
)
ฯ
ฯ
๏ฃฏ
๏ฃบ
โ
โ
โ
i
is
i
in
2
2
2
2 2
min{ E I }<< aD 2ฯ 4 D
n , s =1 ( n / b + s / a ) ๏ฃฏ
i =1
i = Nฮท +1
๏ฃบ๏ฃป
๏ฃฐ 4
f
j
j j
mf
m
f
abPns2
Pns
1
=
โ
โ
โ
4
2
2
2
2 2
4
2
2
2ฯ D n ,s =1 4( n / b + s / a )
2ฯ D n ,s =1(n / b + s 2 / a 2 ) 2
1
โ
1
2ฯ
4
1
mf
โ (n
D
n , s =1
1
โ
4
2ฯ D 2a 2
2
Pns
/ b + s 2 / a 2 )2
2
Nฮท + N ฮพ
โ sin( sฯx
i
/ a ) y in =
i = Nฮท +1
๏ฃซ m f P sin( nฯxi / b)
ฮต i โ s ๏ฃฌ๏ฃฌ โ 2ns 2
โ
2
2 2
i =1
s =1
๏ฃญ n =1 (n / b + s / a )
Nฮท
mf
4
( 3..3),
( 2.1.10 )
2
1
2ฯ
4
Nฮท
โ sin(nฯx
mf
โ 4( n
D
๏ฃถ
1
b
๏ฃท โ
4
๏ฃท
2ฯ D 2a 3
๏ฃธ
i
/ b)u is
(5.1.6)
i =1
n , s =1
2
ns
2
abP
/ b2 + s 2 / a 2 )2
๏ฃซ m f Pns sin( sฯx j / a)
ฮต j โ n ๏ฃฌ๏ฃฌ โ 2 2
โ
2
2 2
j = Nฮท +1
n =1
๏ฃญ s =1 (n / b + s / a )
Nฮท + N ฮพ
mf
4
๏ฃถ
๏ฃท
๏ฃท
๏ฃธ
2
This asymptotic expansion obtained for the energy, U, consists of a constant term, U0, from which two
other terms are subtracted. Naturally then the energy, U, attains a minimum if and only if the terms that are
subtracted from the constant, U0, attain maxima with respect to x. As the domain is unconstrained,
obviously, the subtracted sums of squares attain their maxima when each of the squares in the sums attains
its maximum. As the first sum in the rightmost part of (5.1.6) is symmetric with respect to i and the second
sum is symmetric with respect to j, clearly:
(5.1.7)
xi = xฮท โ 1 โค i โค Nฮท ; x j = xฮพ โ Nฮท + 1 โค j โค Nฮท + N ฮพ
is a globally optimal solution.
In other words, the energy of a bidirectionally stiffened plate attains a global minimum with respect to the
locations of two orthogonal sets of straight, parallel, uniform, infinitesimally rigid stiffeners, for the case of a
general lateral loading distribution, if all of the stiffeners in each of the two sets are located at the same
place. Knowing the optimal layout one can calculate the energy at the global optimum, substituting (5.1.7)
into (5.1.6):
11
U min ( N ฮพ , Nฮท ) โ
min ฮต i << 1
i
mf
1
2ฯ
4
โ 4(n
D
n , s =1
2
abPns2
/ b2 + s 2 / a2 )2
๏ฃซ
Pns sin(nฯxฮพ / b)
1
1
โ
s 4 ๏ฃฌ๏ฃฌ โ 2 2
4
2 โ
2ฯ D 2a s =1 ๏ฃญ n =1 (n / b + s 2 / a 2 ) 2
mf
mf
๏ฃถ
๏ฃท
๏ฃท
๏ฃธ
(5.1.8)
2 N
ฮท
๏ฃซ m f Pns sin( sฯxฮท / a )
1
b
4
ฮต
โ
n
โ
โ ๏ฃฌโ
i
2ฯ 4 D 2a 3 n =1 ๏ฃฌ๏ฃญ s =1 (n 2 / b 2 + s 2 / a 2 ) 2
i =1
mf
๏ฃถ
๏ฃท
๏ฃท
๏ฃธ
2 N +N
ฮท
ฮพ
โฮต
j
j = Nฮท +1
The same energy corresponds to a plate stiffened with one "horizontal" stiffener and one "vertical"
stiffener having, respectively, the following bending rigidities:
Nฮท
Nฮท + N ฮพ
i =1
j = Nฮท +1
Eฮท Iฮท โก aD โ ฮต i ; Eฮพ I ฮพ โก aD
โฮต
(5.1.9)
j
Therefore if one has a certain amount of material in the form of two orthogonal sets of parallel highly
flexible stiffeners that can be integrally attached to a given plate to minimize the work done by external
loads, a globally optimal way to use this material is to split it between exactly two orthogonal beams.
For the special case of a symmetric loading, Pns=Psn, and a square plate, a = b, the result given in (5.1.8)
shows that for flexible enough stiffeners, stiffening with two orthogonal beams is energetically equivalent to
stiffening with a single beam, having twice the bending rigidity.
This analytically obtained result coincides with numerical observation concerning the same matter, given
in the work of Dems et al. (1989).
The power of this result is that a globally optimal stiffening layout is determined analytically for
bidirectional stiffening for an arbitrary number of stiffeners having arbitrary cross-sectional parameters and
for a general loading case. The limitation of this result is that it is only relevant for highly flexible stiffeners
and that it does not say for what actual bending rigidities it is true, for what relative bending rigidities does it
cease to be true, and what happens to the optimal positions of the stiffeners for stiffeners having higher
bending rigidities.
The reason for this shortcoming is the fact that first order asymptotics with respect to the stiffeners do not
capture the โsplitโ of the stiffeners as an optimal stiffening topology. The relative stiffness for which the first
order approximation is valid is not high enough for it to be optimal for the stiffeners to be positioned
separately.
The following section shows that, at least for the special case of a bisinusoidal loading and unidirectional
stiffening, with two beams positioned symmetrically with respect to the mid-span of the plate, even for a
second order asymptotic expansion of the energy of the stiffened plate with respect to the relative stiffness of
the beams, the degenerated layout given in (5.1.7) is still globally optimal.
A comparison between the first and the second order expansions of the energy enables one to determine
for what actual rigidities it is still optimal to place the stiffeners together.
5.2 Highly flexible unidirectional stiffeners with no torsional rigidity โ 2nd order asymptotics
Repeating the procedure shown in the preceding subsection and retaining terms up to the order of O(ฮต2),
โ
โ
๏ฃฎ
๏ฃน
g n = (1 + Fn ) โ1 ๏ฃฏy n โ โ D ns (1 + B s ) โ1 u s ๏ฃบ โ y n โ Fn y n โ โ D ns u s
๏ฃฏ
s =1
( 3.7 )
๏ฃบ๏ฃป ฮต <<1O
s =1
O (ฮต )
O (ฮต )
(ฮต )
O (ฮต ) O (ฮต )
O (ฮต ) O ( ฮต )
๏ฃฐ
ฮ nm =
( 3 .7 )
โ
โ (1 + F )
n
s =1
O (ฮต )
โ1
D ns (1 + B s ) โ1C sm โ โ D ns C sm
ฮต <<1
s =1
O (ฮต )
O (ฮต ) O (ฮต )
โ
โ1
โ z = (1 โ M
(1 + M
g +M
y n โ Fn y n โ โ D ns u s
) g ฮตโ
) g ฮตโ
g โ g โ z n ฮตโ
(3.9 )
<<1
<<1
<<1
2
2
s =1
O (ฮต )
(5.2.1)
โ
O (ฮต ) O (ฮต )
O (ฮต )
O (ฮต 3 )
(5.2.2)
O (ฮต )
mf
mf
โ
๏ฃซ
๏ฃถ
v r = (1 + B r ) โ1 ๏ฃฌ๏ฃฌ u r โ โ C rn z n ๏ฃท๏ฃท โ u r โ B r u r โ โ C rn z n โ u r โ B r u r โ โ C rn y n
( 3.13)
ฮต <<1
ฮต <<1
n =1
n =1
n =1
๏ฃญ
๏ฃธ
O (ฮต )
(5.2.3)
and substituting them into the expression for the work done by the external loads given in (5.1.5), one gets:
12
1
โ U ( x, N ฮท , N ฮพ ) โ
ฮต <<1
2ฯ 4
mf
โ (n
D
n , s =1
Nฮท + Nฮพ
๏ฃฎ abPns Nฮท
๏ฃน
Pns
โ
โ
sin(
n
x
/
b
)
u
sin( sฯxi / a) yin ๏ฃบ +
ฯ
๏ฃฏ
โ
โ
i
is
2
2
2
2 2
/ b + s / a ) ๏ฃฐ๏ฃฏ 4
i =1
i = Nฮท +1
๏ฃป๏ฃบ
+
Nฮท + Nฮพ
๏ฃฎ Nฮท
๏ฃน
Pns
sin(
n
x
/
b
)
B
u
+
sin( sฯxi / a) Fijn y jn ๏ฃบ +
ฯ
๏ฃฏ
โ
โ
i
ijs js
4
2
2
2
2 2 โ
2ฯ D n ,s =1( n / b + s / a ) ๏ฃฐ๏ฃฏi , j =1
i , j = Nฮท +1
๏ฃป๏ฃบ
+
Pns
โ
4
2
2
2ฯ D n ,s =1( n / b + s 2 / a 2 ) 2
1
1
mf
mf
(5.2.4)
m f Nฮท + N ฮพ Nฮท
๏ฃฎ m f Nฮท Nฮท + Nฮพ
๏ฃน
sin(
n
ฯ
x
/
b
)
C
y
+
sin( sฯxi / a ) Dijnk u jk ๏ฃบ
๏ฃฏโโ โ
โ
โ
โ
i
ijsr jr
k =1 i = Nฮท +1 j =1
๏ฃฏ๏ฃฐ r =1 i =1 j = Nฮท +1
๏ฃบ๏ฃป
Next, recalling (3.6) and rearranging, results in the following 2nd order asymptotic expansion of U:
ab โ
Pns2
โ 2 2 2 22
ฮต <<1 8ฯ 4 D
n ,s =1 ( n / b + s / a )
โ U (x, N ฮพ , Nฮท ) โ
1
โ 4 3 2
4ฯ a D
+
+
1
2ฯ 4 a 7bD 3
b
4 9 3
2ฯ a D
1
+ 4 8 3
2ฯ a D
+
1
2ฯ 4 a 8 D 3
2
๏ฃฎ โ s 2 sin(nฯx / b) P ๏ฃน
b
Ei I i โ ๏ฃฏโ 2 2 i 2 2 ns2 ๏ฃบ โ 4 4 2
โ
4ฯ a D
i =1
s =1 ๏ฃฐ n =1 ( n / b + s / a ) ๏ฃป
Nฮท
Nฮท
โ
โ
โ
โโ โ
sin( ยตฯxi / b) sin( ยตฯx j / b)
(ยต 2 / b2 + s 2 / a 2 )2
i , j =1 s =1 ยต =1
Nฮท + Nฮพ
โ
โ
โ โโ
i , j = Nฮท +1 n =1 w=1
Nฮท Nฮท + Nฮพ
โโ โ
i =1 j = Nฮท +1 r ,s =1
Nฮท Nฮท + Nฮพ
โ
โโ โ
j =1 i = Nฮท +1 n ,k =1
โ
sin( wฯxi / a) sin( wฯx j / a)
(n 2 / b 2 + w2 / a 2 ) 2
(r 2 / b 2 + s 2 / a 2 ) 2
sin(nฯx j / b) sin(kฯxi / a)
(n 2 / b 2 + k 2 / a 2 ) 2
2
๏ฃฎ โ n 2 sin( sฯx / a) P ๏ฃน
Ei I i โ ๏ฃฏโ 2 2 i 2 2 ns2 ๏ฃบ +
โ
i = Nฮท +1
n =1 ๏ฃฐ s =1 ( n / b + s / a ) ๏ฃป
โ
4
Ei I i s 4 sin(nฯxi / b) Pns โ E j I j s sin(mฯx j / b) Pms
+
โ
โ
( n 2 / b 2 + s 2 / a 2 ) 2 m=1 ( m 2 / b 2 + s 2 / a 2 ) 2
n =1
sin(rฯxi / b) sin( sฯx j / a)
โ
Nฮท + Nฮพ
โ
โ
s =1
(5.2.5)
4
Ei I i n 4 sin( sฯxi / a) Pns โ E j I j n sin(qฯx j / a) Pnq
+
โ
(n 2 / b 2 + s 2 / a 2 ) 2 q=1 (n 2 / b 2 + q 2 / a 2 ) 2
4
Ei I i s 4 sin(nฯxi / b) Pns โ E j I j r sin(qฯx j / a) Prq
+
โ
โ
(n 2 / b 2 + s 2 / a 2 ) 2 q =1 (r 2 / b 2 + q 2 / a 2 ) 2
n =1
โ
โ
โ
E j I j k 4 sin(mฯx j / b) Pmk
(m 2 / b 2 + k 2 / a 2 ) 2
m =1
Ei I i n 4 sin( sฯxi / a) Pns
โ
(n 2 / b 2 + s 2 / a 2 ) 2
s =1
โ
At this point, as the result is anyway an asymptotic one, several assumptions are made in order to get an
analytic form of the solution of the optimal stiffening problem. First, the loading is assumed to be
bisinusoidal, with half-periods equal to the lengths of the sides of the plate. Second, for simplicity and clarity
of illustration, unidirectional stiffening is assumed, with only two stiffeners, positioned symmetrically with
respect to the center of the plate (the a priori symmetry of the stiffening layout seems justified in view of the
symmetry of the loading). With these assumptions, the work done by the loading becomes:
abp 2
p02ฮต {sin 2 (ฯ [1 / 2 + ฮด ]) + sin 2 (ฯ [1 / 2 โ ฮด ])}
1
U (ฮด , ฮต , p0 , a, b, D) โ 4 0
โ
+
ฮต <<1 8ฯ D (1 / b 2 + 1 / a 2 ) 2
4ฯ 4 a 2 D
(1 / b 2 + 1 / a 2 ) 4
+
p02ฮต 2 sin 2 (ฯ [1 / 2 + ฮด ]) โ sin 2 (nฯ [1 / 2 + ฮด ])
+
โ
2ฯ 4 a 5bD (1 / b 2 + 1 / a 2 ) 4 n=1 (n 2 / b 2 + 1 / a 2 ) 2
+
p02ฮต 2 sin(ฯ [1 / 2 + ฮด ]) sin(ฯ [1 / 2 โ ฮด ]) โ sin(nฯ [1 / 2 + ฮด ]) sin(nฯ [1 / 2 โ ฮด ])
+
โ
ฯ 4 a 5bD
(1 / b 2 + 1 / a 2 ) 4
(n 2 / b 2 + 1 / a 2 ) 2
n =1
+
p02ฮต 2 sin 2 (ฯ [1 / 2 โ ฮด ]) โ sin 2 (nฯ [1 / 2 โ ฮด ])
โ
2ฯ 4 a 5bD (1 / b 2 + 1 / a 2 ) 4 n=1 (n 2 / b 2 + 1 / a 2 ) 2
(5.2.6)
where ฮด is the distance of each of the stiffeners from the center of the plate divided by b, ฮต โก EI / aD and a is
the length of each of the stiffeners. Employing trigonometric identities and recalling the definition: ฮฒ โก b / a
one can obtain a simpler expression for the (non-dimensionalized) elastic strain energy of the loaded
structure, consistent of the plate and the stiffeners:
โ
โ
cos 2 (ฯฮด ) ๏ฃฎ
1
cos(2nฯฮด ) ๏ฃน ๏ฃผ๏ฃด (5.2.7)
ฮฒ 5 ๏ฃฑ๏ฃด
Uห (ฮด , ฮต , ฮฒ ) โ 2
1 โ (4ฮฒ 3ฮต ) 2
1 + 2ฮฒ 3ฮต โ
+ 2ฮฒ 3ฮต โ
๏ฃฒ
๏ฃฏ
2
2
2
2
2
2
2 2 ๏ฃบ๏ฃฝ
ฮต <<1 ( ฮฒ + 1) ๏ฃด
( ฮฒ + 1) ๏ฃฐ
n =1,3, 5 ( ฮฒ + n )
n =1, 3, 5 ( ฮฒ + n ) ๏ฃป ๏ฃด
๏ฃณ
๏ฃพ
where the actual energy can be obtained from the non-dimensional form by:
U (ฮด , ฮต , ฮฒ , a, p0 , D ) =
13
a 6 p02 ห
U (ฮด , ฮต , ฮฒ )
8ฯ 4 D
(5.2.8)
Next, the series in (5.2.7) can be expressed in terms of the Fourier cosine series of coshz and zsinhz, z
being a linear function of |ฮด|. Thence, substituting these functions instead of their Fourier series
representations, one obtains:
Uห (ฮด , ฮฒ , ฮต ) โ
ฮต <<1
ฮฒ5
( ฮฒ + 1)
2
2
โ
4 ฮฒ 8ฮต cos 2 (ฯฮด )
( ฮฒ 2 + 1) 4
โ
8ฮฒ 11ฮต 2 cos 2 (ฯฮด ) ๏ฃฎ ฯ coth(ฯฮฒ ) ฯ 2 coth 2 (ฯฮฒ ) ฯ coth(ฯฮฒ / 2) ฯ 2 coth 2 (ฯฮฒ / 2) 3ฯ 2 ๏ฃน
+
โ
โ
โ
๏ฃฏ
๏ฃบ
3
( ฮฒ 2 + 1) 4
4ฮฒ 2
8ฮฒ 3
16 ฮฒ 2
16 ฮฒ 2 ๏ฃป
๏ฃฐ 4ฮฒ
โ
8ฮฒ 11ฮต 2 cos 2 (ฯฮด ) ๏ฃฑ๏ฃดฯ cosh[ฯฮฒ (1 โ 2 ฮด )] ฯ cosh(ฯฮฒ ) cosh[ฯฮฒ (1 โ 2 ฮด )] ฯ (1 โ 2 ฮด ) sinh[ฯฮฒ (1 โ 2 ฮด )]
+
โ
๏ฃฒ
3
( ฮฒ 2 + 1) 4
4ฮฒ 2 sinh 2 (ฯฮฒ )
4 ฮฒ 2 sinh(ฯฮฒ )
๏ฃด๏ฃณ 4 ฮฒ sinh(ฯฮฒ )
2
(5.2.9)
2
ฯ cosh[ฯฮฒ (1 / 2 โ 2 ฮด )] ฯ 2 cosh(ฯฮฒ / 2) cosh[ฯฮฒ (1 / 2 โ 2 ฮด )] ฯ 2 (1 โ 4 ฮด ) sinh[ฯฮฒ (1 / 2 โ 2 ฮด )] ๏ฃผ๏ฃด
โ
โ
+
๏ฃฝ
8ฮฒ 3 sinh(ฯฮฒ / 2)
16 ฮฒ 2 sinh 2 (ฯฮฒ / 2)
16 ฮฒ 2 sinh(ฯฮฒ / 2)
๏ฃด๏ฃพ
Differentiating with respect to ฮด one gets:
4ฯฮฒ 8 ฮต sin( 2ฯฮด )
โ ห
U (ฮด , ฮฒ , ฮต ) โ
+
ฮต <<1
โฮด
( ฮฒ 2 + 1) 4
+ [ 4 coth(ฯฮฒ ) + 4ฯฮฒ coth 2 (ฯฮฒ ) โ 2 coth(ฯฮฒ / 2) โ ฯฮฒ coth 2 (ฯฮฒ / 2) โ 3ฯฮฒ ]
+
โ
โ
+
ฯ 2 ฮฒ 8 ฮต 2 sin( 2ฯฮด )
+
2( ฮฒ 2 + 1) 4
ฯ 2 ฮฒ 8 ฮต 2 sin(2ฯฮด ) ๏ฃฑ 4[sinh(ฯฮฒ ) + ฯฮฒ cosh(ฯฮฒ )] cosh[ฯฮฒ (1 โ 2 ฮด )] 4ฯฮฒ (1 โ 2 ฮด ) sinh[ฯฮฒ (1 โ 2 ฮด )]
โ
๏ฃฒ
(5.2.10)
sinh(ฯฮฒ )
2( ฮฒ 2 + 1) 4
sinh 2 (ฯฮฒ )
๏ฃณ
[2 sinh(ฯฮฒ / 2) + ฯฮฒ cosh(ฯฮฒ / 2)] cosh[ฯฮฒ (1 / 2 โ 2 ฮด )]
sinh (ฯฮฒ / 2)
2
+
ฯฮฒ (1 โ 4 ฮด ) sinh[ฯฮฒ (1 / 2 โ 2 ฮด )] ๏ฃผ
๏ฃฝ
sinh(ฯฮฒ / 2)
๏ฃพ
3
3
ฮฒ 10 ฮต 2 cos 2 (ฯฮด ) ๏ฃฑ๏ฃด 4ฯ (1 โ 2 ฮด ) cosh[ฯฮฒ (1 โ 2 ฮด )] 4ฯ cosh(ฯฮฒ ) sinh[ฯฮฒ (1 โ 2 ฮด )]
โ
+
๏ฃฒ
sinh(ฯฮฒ )
( ฮฒ 2 + 1) 4
sinh 2 (ฯฮฒ )
๏ฃด๏ฃณ
ฯ 3 cosh(ฯฮฒ / 2) sinh[ฯฮฒ (1 / 2 โ 2 ฮด )]
sinh 2 (ฯฮฒ / 2)
โ
ฯ 3 (1 โ 4 ฮด ) cosh[ฯฮฒ (1 / 2 โ 2 ฮด )] ๏ฃผ๏ฃด
๏ฃฝ sgn(ฮด )
sinh(ฯฮฒ / 2)
๏ฃด๏ฃพ
Now, in order to determine whether placing the stiffeners together is optimal, one could have examined
whether the second derivative of the energy with respect to ฮด at ฮด =0 changes its sign as ฮต increases. Such a
change of sign would have indicated that unified stiffeners cease to correspond to a global minimum of the
energy and start to correspond to its local maximum as their rigidity is increased. This would imply that a
second order asymptotic expansion of the energy enables one to find a critical relative rigidity, ฮต, above
which the stiffeners are best to be split and that this critical relative rigidity is small enough for the second
order approximation to be a good one.
However, the second derivative with respect to ฮด of the second order expansion of the energy with respect
to ฮต is undefined at ฮด =0 due to the non-continuousness of the sign function.
Therefore, instead, one can check whether the first derivative vanishes anywhere besides at ฮด =0 as ฮต
increases. In fact, it is enough to check the sign of lim ฮด โ1โUห / โฮด . If the sign is positive for every positive ฮต,
ฮด โ0 +
then placing the stiffeners together never corresponds to a local maximum of the second order expansion of
the energy.
Section 5.1 shows that placing the stiffeners together is globally optimal in the limit of a small positive ฮต.
Therefore if ฮด =0 happens to be a local minimum of the energy for every ฮต in the range of the validity of the
second order asymptotics and there is another, global, minimum elsewhere then, due to the continuity of the
energy with respect to both ฮด and ฮต there has to be a local maximum between these two local minima.
Numerical examination shows that when ฮต is high enough such that ฮด =0 ceases to be the global optimum,
the globally optimal solution corresponds to ฮด continuously increasing with ฮต. Therefore in the limit case
where ฮต is only infinitesimally higher than its critical value, the energy would have three extrema (two local
minima and a local maximum in between) located at a line segment with a length tending to zero. This would
imply infinite derivatives and therefore contradict with the fact that the energy is Hรถlder continuous in the
vicinity of zero (as one can show by expanding ฮด โ1โUห / โฮด as a Taylor series around ฮด = 0. By expanding
14
ฮด โ1โUห / โฮด rather than โUฬ / โฮด one eliminates the non-continuous functions). This contradiction can only be
avoided by the assumption that wherever ฮด =0 is a local minimum of the energy, it is also a global minimum
and that in order for it not to be a global minimum it has to be a local maximum. Also, a function Hรถlder
continuous in the vicinity of zero behaves as a power function near zero and thus cannot have three extrema
within a line segment starting at zero and having an arbitrarily small length.
Hence, by proving that lim ฮด โ1โUห / โฮด is positive for every ฮต for which the second order expansion of the
ฮด โ0 +
energy is valid, one proves that placing the stiffeners together is globally optimal (within the
abovementioned range of rigidities).
Next, expanding the hyperbolic functions of ฮด in (5.2.10) using the identities of hyperbolic trigonometry,
dividing by ฮด and computing the limits, recalling that:
sinh( 2ฯฮฒ ฮด ) sgn(ฮด ) /[ 2ฯฮฒฮด ] = sinh( 2ฯฮฒฮด ) /[ 2ฯฮฒฮด ] โ 1
ฮด โ0
(5.2.11)
the following result is obtained:
8ฯ 2 ฮฒ 8ฮต (1 โ ฮต / ฮต cr )
ฮต <<1
( ฮฒ 2 + 1) 4
lim+ ฮด โ1โUห / โฮด โ
ฮด โ0
(5.2.12)
where
ฮต cr โก
4
ฯ {2(1 + ฮฒ )[coth(ฯฮฒ / 2) โ 2 coth(ฯฮฒ )] + ฯฮฒ ( ฮฒ 2 โ 1)[4 coth 2 (ฯฮฒ ) โ coth 2 (ฯฮฒ / 2) โ 3]}
2
(5.2.13)
Obviously, the limit in (5.2.13) is positive if ฮตcr is negative for every positive ฮฒ. Asymptotic expansions of
ฮตcr(ฮฒ) show that this is indeed the case for the limit cases of ฮฒ <<1, ฮฒ >>1 and |1โฮฒ| <<1:
ฮต cr โ โ
ฮฒ >>1
2
ฯ (1 + ฮฒ 2 )
< 0 , ฮต cr โ โ
ฮฒ <<1
๏ฃด๏ฃฑ
๏ฃฎ
24
ฯ 2 ฮฒ 3[12 + 5ฯ 2 ฮฒ (1 โ ฮฒ )]
ฮต cr โ โ ฯ โ1[2 coth(ฯ ) โ coth(ฯ / 2)]โ1 ๏ฃฒ1 + ๏ฃฏ1 + ฯ
1โ ฮฒ <<1
๏ฃด๏ฃณ ๏ฃฐ
โ
โ0.8831(1 โ 0.6069ฮฒ ) < 0 (โ ฮฒ < 1.6477)
<0
๏ฃผ๏ฃด
3 + coth 2 (ฯ / 2) โ 4 coth 2 (ฯ ) ๏ฃน
๏ฃบ (1 โ ฮฒ ) ๏ฃฝ โ
2 coth(ฯ ) โ coth(ฯ / 2) ๏ฃป
๏ฃด๏ฃพ
(5.2.14)
(5.2.15)
Numerical verification shows that ฮตcr(ฮฒ) is negative for all positive finite values of ฮฒ. Therefore the limit
in (5.2.12) is positive and thus for small enough positive finite values of ฮต it is globally optimal to stiffen a
simply supported thin rectangular plate in elastostatic bending under a lateral bisinusoidal loading with two
stiffeners positioned at the same place, in the geometric center of the plate, in parallel to one of the edges of
the plate. The fact that the global optimality of this stiffening layout holds for finite values of ฮต, at least for
the specified loading, is due to the fact that this result is true for both the first and the second order
asymptotic expansions of the elastic energy of the stiffened plate, and it is the essence of the present
subsection. The (non-dimensionalized) structural strain energy corresponding to the globally optimal layout
discussed above can be obtained in a second order approximation with respect to ฮต by setting ฮด =0 in (5.2.9):
Uห opt ( ฮฒ , ฮต ) โ
ฮต <<1
ฮฒ5
( ฮฒ + 1)
2
2
โ
4ฮฒ 8ฮต
[1 + f ( ฮฒ )ฮต ]
( ฮฒ 2 + 1)4
(5.2.16)
where:
f ( ฮฒ ) โก [4 coth(ฯฮฒ ) + 4ฯฮฒ coth 2 (ฯฮฒ ) โ 2 coth(ฯฮฒ / 2) โ ฯฮฒ coth 2 (ฯฮฒ / 2) โ 3ฯฮฒ ]ฯ / 4
(5.2.17)
Both the first and the second order approximations of the energy hold for small enough values of ฮต,
formally, when f(ฮฒ)ฮต = ฮณ = o(1). Then the higher orders contribute negligibly to the first and second order
approximations of the energy for which the degenerated stiffening layout is proven herein to be globally
optimal for general and bisinusoidal loadings, respectively. Recalling the definition of the relative bending
rigidity and assuming blade stiffeners with cross-sectional width d and static height h and a plate with
thickness t and Poisson's ratio ฮฝ, and that the plate and the stiffener have the same Young modulus, one can
obtain an approximation for the maximal static height of the stiffener for which it is still globally optimal not
to split it. Hence, assuming that the cross-sectional width of the stiffener is much smaller than its length, as
one might expect from a beam, namely that d/a = ฮถ = o(1), and making the approximation ฮณ~ ฮถ based on the
fact that both these quantities should be smaller than unity and are compliant to no additional restrictions (the
values of ฮณ and ฮถ can each be, say, 0.01), and, last, taking ฮฝ to be 1/3, which is typical for structural materials,
one obtains the following approximation:
15
1/ 3
h 1๏ฃฎ 9 ๏ฃน
<
t 2 ๏ฃฏ๏ฃฐ f ( ฮฒ ) ๏ฃบ๏ฃป
(5.2.18)
Taking the limit of (5.2.17) for ฮฒ>>1 one obtains the result that for a short stiffener the critical static
height is hmax ~ [9 /(4ฯ )]1/ 3 t โ
0.9t . For a square plate, ฮฒ = 1, hmax ~ t. That is, if the stiffener is not relatively
long, it can have about the same static height as the thickness of the plate and it would still be flexible
enough for it to be globally optimal not to split it. This result is impractical, since the stiffener is assumed to
be placed symmetrically with respect to the mid-surface of the plate and thus if its static height is equal to the
thickness of the plate and Youngโs modulus of the plate and the stiffener are the same, then it is as having no
stiffener at all, and it does not matter whether it is split or not. However, if the stiffener is longer, its length
makes it more flexible such that its static height can be larger for the optimality of stiffening with a single
stiffener yet to hold. For example, it follows from (5.2.17) and (5.2.18) that for the case ฮฒ = 1/2 the critical
static height is hmax ~ 1.5t, for ฮฒ = 1/3, hmax ~ 2t and for ฮฒ = 1/6, hmax ~ 4t.
This simple calculation shows that, at least for long stiffeners, the degenerated stiffening layout is
globally optimal for rather realistic parameters and not only, as one could presume, for stiffeners of
absolutely negligible bending rigidity.
In the results obtained above, the globally optimal layout corresponds to a thin plate with thin stiffeners.
The fact that the bending rigidity of the stiffeners normalized by the bending rigidity of the plate is small
does not imply that for the stiffeners to be realistic the plate should be thick, since a stiffener of width and
height of the order of the thickness of the plate has a much smaller bending rigidity than that of the plate, as
it appears from the definition of the relative rigidity, ฮต โก EI / aD , which is proportional to the ratio of the
width of the stiffener and the breadth of the plate, which is usually a small number. Thus the above
derivations do not contradict with the assumptions of the first order Love-Kirchhoff plate bending theory.
The following subsection examines the opposite case, where the stiffeners are highly rigid compared to
the plate. If flexible stiffeners have an asymptotically optimal layout in which they are combined to form a
single stiffener, then, as is it turns out, highly rigid stiffeners have their own asymptotically optimal layout,
where they are optimally spread, and to which they tend as their rigidities increase.
5.3 Highly rigid unidirectional stiffeners with no torsional rigidity โ 1st order asymptotics
The present subsection examines the case where the stiffeners are highly rigid with respect to the plate.
By means of a first order asymptotic analysis with respect to the flexibilities of the stiffeners, it is shown that
rigid enough stiffeners are best to be positioned separately, in locations determined by the functionality of
the loading. It is shown that the optimal positions of the stiffeners approach their asymptotic limits as the
rigidities of the stiffeners approach infinity. The functionality of this approach is given analytically for
bisinusoidal loading with half-periods equal to the lengths of the edges of the plate, unidirectional stiffening
with two stiffeners positioned symmetrically with respect to the mid-span of the plate and the condition that
the stiffeners are relatively long. Substituting the expression for the deflection field for the case, as given in
(2.20) into (2.12) and making use of (2.9), employing the definitions of ฮฒ and ฮต used in the previous
subsections, and defining xห โก x / b one obtains the strain energy of the stiffened plate, as follows:
(
)
โ1
P 2 a 6 sin(ฯ xห T ) ฮต โ11 + Bห sin(ฯ xห )
ฮฒ P2a6
ห
U ( x) = 4
โ
8ฯ D ( ฮฒ โ2 + 1) 2
4ฯ 4 D ( ฮฒ โ2 + 1) 4
(5.3.1)
where xห = ( xห ,1 โ xห )T .
Evaluating expression (2.17) for the abovementioned assumptions and dividing it by ฮต, the coefficients
defining the matrix in (5.3.1) can be readily obtained:
1 ๏ฃฑ 1 โ cosh(2ฯฮฒ xห ) cosh(ฯฮฒ ) โ cosh(ฯฮฒ [1 โ 2 xห ])
xห sinh(ฯฮฒ [1 โ 2 xห ]) ๏ฃผ
Bห11 = 3 ๏ฃฒ ฮฒ
+
โ 2ฮฒ
๏ฃฝ
2
ฯ sinh(ฯฮฒ )
2ฯ ๏ฃณ
sinh (ฯฮฒ )
sinh(ฯฮฒ )
๏ฃพ
1 ๏ฃฑ 1 โ cosh(2ฯฮฒ [1 โ xห ]) cosh(ฯฮฒ ) โ cosh(ฯฮฒ [1 โ 2 xห ])
[1 โ xห ]sinh(ฯฮฒ [1 โ 2 xห ]) ๏ฃผ
Bห 22 = 3 ๏ฃฒ ฮฒ
+
+ 2ฮฒ
๏ฃฝ
2
2ฯ ๏ฃณ
sinh (ฯฮฒ )
sinh(ฯฮฒ )
ฯ sinh(ฯฮฒ )
๏ฃพ
1 ๏ฃฑ cosh(ฯฮฒ [1 โ 2 xห ]) โ cosh(ฯฮฒ ) cosh(2ฯฮฒ xห ) โ 1
(1 โ 2 xห ) sinh(2ฯฮฒ xห ) ๏ฃผ
Bห12 = Bห 21 = 3 ๏ฃฒ ฮฒ
+
+ฮฒ
๏ฃฝ
2ฯ ๏ฃณ
sinh 2 (ฯฮฒ )
sinh(ฯฮฒ )
ฯ sinh(ฯฮฒ )
๏ฃพ
16
(5.3.2)
Considering ฮต large enough for the spectral norm of ฮต โ1Bห โ1 to be much smaller than unity and expanding
the expression for the energy in (5.3.1) into a first order Taylor series of the relative flexibility of the
stiffeners, ฮตโ1, one obtains the following asymptotic relation:
ฮฒ P2a6
P 2 a 6 [sin(ฯ xห T )Bห โ1 sin(ฯ xห ) โ ฮต โ1 sin(ฯ xห T )Bห โ2 sin(ฯ xห )]
โ
ฮต >>1 8ฯ 4 D ( ฮฒ โ2 + 1) 2
4ฯ 4 D ( ฮฒ โ2 + 1) 4
U ( xห ) โ
(5.3.3)
Noting the symmetry of the sine function, inverting the 2x2 matrices in (5.3.3) analytically, and
introducing the auxiliary variables,
(5.3.4)
Bij โก 2ฯ 4 sinh 2 (ฯฮฒ ) Bห ij
one gets the following representation of the energy:
2
2
ฮฒP 2 a 6
P 2 a 6 sinh 2 (ฯฮฒ ) ๏ฃฎ B22 โ 2 B12 + B11
โ1 ( B22 โ B12 ) + ( B11 โ B12 ) ๏ฃน
2
โ
โ
ฮต
๏ฃฏ
๏ฃบ sin (ฯxห ) (5.3.5)
ฮต >>1 8ฯ 4 D ( ฮฒ โ 2 + 1) 2
2 D( ฮฒ โ 2 + 1) 4 ๏ฃฐ B11 B22 โ B122
( B11 B22 โ B122 ) 2
๏ฃป
U ( xห ) โ
Taking a Taylor series expansion with respect to ฮฒ of the Bij components for a small ฮฒ and retaining only
the first non-vanishing powers of ฮฒ results in:
B12 = B21 = โ 2(ฯฮฒ )5 xห 2 (1 โ 2 xห 2 ) / 3 , B22 โ B11 โ 4(ฯฮฒ )5 xห 2 (1 โ xห )2 / 3
ฮฒ <<1
ฮฒ <<1
ฮฒ <<1
(5.3.6)
Substituting (5.3.6) into (5.3.5), one gets an asymptotic representation of the energy for ฮฒ<<1 (which, due
to the high order of the expansion, is a fair approximation for any ฮฒ<1):
ฮฒ P 2a6
P 2 a 6 sinh 2 (ฯฮฒ )
โ
ฮต >>1 8ฯ 4 D ( ฮฒ โ2 + 1) 2
2 D ( ฮฒ โ2 + 1) 4 (ฯฮฒ )5
ฮฒ <<1
U ( xห ) โ
๏ฃฎ 3sin 2 (ฯ xห )
9sin 2 (ฯ xห ) ๏ฃน
โ5 โ1
โ
(
)
ฯฮฒ
ฮต
๏ฃฏ ห2
๏ฃบ
3
2(3 xห 2 โ 4 xห 3 ) 2 ๏ฃป
๏ฃฐ 3 x โ 4 xห
(5.3.7)
The asymptotic limit for the optimal location of long rigid stiffeners can be obtained by minimization of
the limit of (5.3.7) for ฮต โ โ,0 < ฮฒ << 1, ฮฒ 5ฮต โ โ (that is finitely long and infinitely rigid stiffeners):
๏ฃฎ 12ฯ sin 2 (ฯxห ) ๏ฃน
as
xหopt
= arg min lim U ( xห ) = arg min ๏ฃฏ1 โ
๏ฃบ โ
0.3445
3xห 2 โ 4 xห 3 ๏ฃป
xหโ[ 0 ,1 / 2 ] ฮต โโ
xหโ[ 0 ,1 / 2 ] ๏ฃฐ
ฮฒ <<1
(5.3.8)
ฮฒ 5ฮต โโ
as
Next, substituting the definition ฮด โก xห โ xหopt
into (5.3.7), performing a 2nd order asymptotic expansion
with respect to ฮด around zero, and differentiating with respect to ฮด, noting that this derivative should vanish
for ฮด , ฮต โ1 โ 0 , one obtains an asymptotic expansion of โU (ฮต โ1 , ฮฒ , ฮด << 1) / โฮด (which in this case becomes a
linear function of ฮด). Finding the single root of the abovementioned derivative produces an expression for the
globally optimal location of a stiffener (the one closer to the origin of the coordinate system) in a nondimensional form, xฬ , as a function of ฮต and ฮฒ for ฮฒ , ฮต โ1 , ฮฒ โ5ฮต โ1 << 1 , as follows:
1 / 2 โ xหopt
as
1 / 2 โ xหopt
โ
1 โ qฮฒ โ5ฮต โ1
ฮต โ1 ,ฮฒ ,ฮฒ โ5ฮต โ1 <<1
(5.3.9)
where q is:
as
๏ฃฎ cot(ฯxห opt
๏ฃน
)
12
โ as
๏ฃฏ
5
as 2
as
as ๏ฃบ
2ฯ ( xห opt ) ๏ฃฐ๏ฃฏ (1 / 2 โ xหopt ) xห opt (3 โ 4 xห opt ) ๏ฃป๏ฃบ
q=
โ
0.268
as
as
as
12 xหopt โ 3
1 / 2 โ xหopt
1 / 2 โ xห opt
as
2
as
as
โ 12
+ (3 โ 4 xหopt )[cot (ฯxหopt ) โ 1] โ 24 cot(ฯxหopt )
as 2
as
as
( xหopt
)
xหopt
xหopt
3
1
(5.3.10)
As an illustration of the result obtained above, one might consider the following stiffening parameters: ฮฒ
= 0.9 (which seems acceptable due to the high order of the expansion with respect to ฮฒ), ฮฝ =1/3, d/a = 0.01
and h/t = 10, which imply ฮต = 11.25. According to (5.3.9) and (5.3.10), the corresponding optimal position is:
xหopt โ
0.35 . It is therefore established that the globally optimal stiffening layout for even moderately long
stiffeners consists of a single stiffener for a finite range of rigidities, and that for a certain value of the
relative rigidity, ฮต, the stiffener should be split into two. Then, for two rigid stiffeners in an optimal layout,
the distance between the stiffeners should increase (hyperbolically) with their rigidities until it approaches its
asymptotic limit. The rate of this increase would in case of an optimal layout be approximately proportional
17
to the 5th power of the aspect ratio of the plate, defined as the length of the stiffeners divided by the length of
the edge of the plate perpendicular to the stiffeners.
5.4 Highly flexible unidirectional stiffeners with non-negligible torsional rigidity โ 1st order
asymptotics
The linear elastostatic strain energy for the case can be derived, using the results of sections 3 and 4, as
follows. Introducing the small parameters ฮต โก EI /(aD) , ฮณ โก GC /(bD) and deriving the auxiliary quantities
required for the calculation of the strain energy for the asymptotic case, one gets:
โ
โ
ฯ r โก ฯ
r โ โ ฮ rs (1 + B s ) โ1 u s โ ฯ
r โ โ ฮ rs (1 โ B s ) u s โ ฯ
r
ฮต <<1
ฮต <<1
( 4.11)
s =1
s =1
O (ฮณ )
O (ฮณ )
O (ฮต )
O (ฮณ )
O (ฮต )
O (ฮณ )
O (ฮณ )
O ( ฮต ) O (ฮต )
(5.4.1)
โ1
ฮจ rs โก โฆ rs โ ฮ rs (1 + B s ) Ts + ฮด rs 1 โ โฆ rs โ ฮ rs (1 โ B s ) Ts + ฮด rs 1 โ ฮด rs 1
( 4.11)
ฮต << 1
ฮต << 1
O (ฮณ )
O (ฮณ )
O (ฮต )
O (ฮต )
O (ฮณ )
O (ฮณ )
O (ฮต ) O (ฮต )
โ1
ฮธ r โก (1 + B r ) u r โ (1 โ B r ) u r โ u r ; ฮ r โก (1 + B r ) โ1 Tr โ (1 โ B r ) Tr โ Tr
ฮต <<1
ฮต <<1
ฮต <<1
ฮต <<1
( 4.15 )
( 4.15)
O (ฮต )
O (ฮต )
O (ฮต ) O (ฮต )
โ
O (ฮต )
O (ฮต )
O (ฮต )
O (ฮต ) O (ฮต )
O (ฮต )
โ
โ ฯ
r โ ฯ r = โ ฮจ rs t s โ โ (ฮด rs 1)t s = t r โ t s โ ฯ
s
ฮณ <<1 ( 4.12) s =1
ฮณ <<1
ฮณ <<1
s =1
O (ฮณ )
(5.4.2)
O (ฮณ )
โ1
โ v r = (1 + B r ) ( u r โ Tr t r ) โ (1 โ B r )( u r โ Tr t r ) โ u r โ Tr ฯ
r โ u r
ฮต <<1
( 4.7 )
ฮต <<1
ฮต <<1
O (ฮต )
O (ฮต )
O (ฮต )
O (ฮต )
O (ฮต )
O (ฮต )
O (ฮต )
O ( ฮต ) O (ฮณ )
O (ฮต )
Then, substituting (5.4.1) and (5.4.2) into the expression for the deflection field given by (4.17), gives:
โ
4
sin(nฯฮพ / b) sin( sฯฮท / a) ๏ฃฎ ab
nฯ
๏ฃน
Pns โ sin( nฯx T / b)u s โ
cos(nฯx T / b) ฯ
s ๏ฃบ
โ
4
2
2
2
2
2
๏ฃฏ
ฮต ,ฮณ <<1 ฯ abD
4
b
(
n
/
b
+
s
/
a
)
๏ฃฐ
๏ฃป
n , s =1
w(ฮพ ,ฮท , x) โ
(5.4.3)
Integrating it multiplied by half the loading (thus obtaining the expression for the external work or the
total structural strain energy),
โ
Pns
1
nฯ
๏ฃฎ ab
๏ฃน
U ( x) โ
Pns โ sin( nฯx T / b)u s โ
cos( nฯx T / b)ฯ
s ๏ฃบ (5.4.4)
โ
4
2
2
2
2
2
๏ฃฏ
ฮต ,ฮณ <<1 2ฯ D
4
b
+
(
n
/
b
s
/
a
)
๏ฃฐ
๏ฃป
n , s =1
and recalling definitions (2.10, (3.6), (4.6) and (4.10), produces the following asymptotic expression:
๏ฃฑ๏ฃด abN โ1
U ( x) โ โ ๏ฃฒ 4
ฮต i ,ฮณ <<1
i =1 ๏ฃด 8ฯ D
๏ฃณ
N
โ
โ
๏ฃฎ โ s 2 Pns sin( nฯxi / b) ๏ฃน
ฮตi
Pns2
โ
โ 2 2 2 2 2 4ฯ 4 a 2 D โ
๏ฃฏโ 2 2
2
2 2 ๏ฃบ
n , s =1 ( n / b + s / a )
s =1 ๏ฃฐ n =1 ( n / b + s / a ) ๏ฃป
โ
2
(5.4.5)
โ
ฮณj
s โ q (โ1) s + q โ nPns cos(nฯxi / b) โ mPmq cos(mฯxi / b) ๏ฃผ
q
๏ฃฝ
โ
โ
โ
6
2ฯ bD s ,q =1 ( s โ q )( s + q ) n =1 ( n 2 / b 2 + s 2 / a 2 ) 2 m =1 (m 2 / b 2 + q 2 / a 2 ) 2 ๏ฃพ
As before, if the expression in the curved brackets attains its global minimum for a certain i at xi = x0,
there is no reason why for different values of i, xi should not be equal x0 if one wishes to find a global
minimum point of U. This is true whenever,
N
k
N
i =1
j =1 i =1
N
k
U (x) = โU i ( xi ) = โโU i j ( xi ) = โโU i j ( xi )
(5.4.6)
i =1 j =1
and there is no additional equality constraint on the variables. Then the principle of separation of variables
holds and the minimum of the sum is the sum of the minima (due to linearity, which always holds for a 1st
order asymptotics). Then, all the minima are attained at the same point due to the fact that U i j ( xi ) is the same
function of its argument for every i.
Hence, for flexible enough stiffeners โ and small enough bending rigidity necessarily implies small
enough torsional rigidity, since E and G are usually of the same order of magnitude and I and C for closed,
thin-walled sections are both approximately proportional to the smaller dimension and to the third power of
the larger dimension of the cross section โ the optimal layout, in the since of minimal structural compliance,
is a single stiffener. That is, there should be no splitting of stiffeners before a critical bending rigidity is
supplied. This phenomenon was shown for bidirectional stiffening when neglecting torsional rigidity and for
unidirectional stiffening when accounting for it. It is reasonable to believe that this should be at least
18
approximately true for bidirectional stiffening with beams of non-negligible torsional rigidity (when the
torsional rigidity is non-negligible with respect to the bending rigidity).
Moreover, in order to emphasize that the obtained result is not absolutely trivial, it should be noted that
the 2nd order expansion in section 5.2 showed coupling between the variables implying that the objective
function cannot be written as in (5.4.6). In the case examined there, it is not obvious that the stiffeners should
not be split. However, subsection 5.2 proves that this is still true even if not by the argument shown in (4.6),
but by a more delicate reasoning.
The combination of the results of sub-sections 5.1, 5.2, and 5.4 thus makes it not unreasonable to believe
that for realistic bidirectional stiffening with closed cross-sections of non-negligible torsional rigidity, it may
still be optimal to use only two orthogonal major stiffeners, for various loading distributions.
Beyond the abovementioned, numerical analysis of stiffened plates performed with the use of commercial
software, showed that the effect of torsional rigidity, at least for the blade stiffeners examined in section 5.2,
corresponds to no significant change in the total work done by the external loading. Numerical optimization
also showed that when the optimal layout consists of one or two perpendicular stiffeners, it is true for various
cross-sections, both when accounting for and neglecting the effect of torsional rigidity.
Last, in order to illustrate the result in (5.4.5), it should be pointed out that for a symmetric loading, xi =
1/2 makes the 2nd term in (5.4.5) maximal in absolute value and the third term zero. This coincides with the
understanding that for symmetric loading, the mid-span would not twist and therefore a stiffener placed there
would apply no torque and torsional rigidity would not contribute to the strain energy of the structure.
6
CONCLUSIONS
This paper presented several results of an investigation in the subject of optimal stiffening of rectangular
plates in elastostatic bending. A previously published method for the analysis of stiffened plate was obtained
in more compact forms in sections 2, 3 and 4 herein and utilized to derive globally optimal stiffening layouts
for limit-case parameters. It was shown that the optimal layout of each of two orthogonal sets of parallel,
highly flexible stiffeners with negligible torsional rigidity consists of two orthogonal beams having increased
rigidities positioned perpendicularly. In addition, the asymptotically globally optimal layouts for long
stiffeners were obtained for both highly flexible and highly rigid stiffeners, to the 1st and 2nd orders of
approximation for the former and the latter, respectively. The effect of the interaction of perpendicular
stiffeners was shown to cancel out for stiffeners of negligible torsional rigidity. The effect of torsional
rigidity was examined from the perspective of its ability to influence the optimal layout of asymptotically
flexible stiffeners and was found to be insufficient, at least for a 1st order asymptotic expansion of the
structural compliance with respect to the rigidities of the stiffeners, and for the special case of unidirectional
stiffening. In addition, it should be mentioned that, although not shown here, the structural compliance
minimization problem was solved for beams of different cross-sectional parameters, producing the result that
the higher the bending rigidity of the stiffeners with respect to that of the plate, the more unidirectional the
stiffening becomes in the optimum. Further noteworthy results correlating with the present work can be
found in the works of Schade (1940), Clarckson (1965), Mrรณz and Rozvany (1975), Fuchs (1976), Samsonov
(1978), Fuchs and Brull (1979), Cheng and Olhoff (1981), OโLeary and Harari (1985), Lam and
Santhikumar (2003), Lagaros et al. (2004), Perchikov and Fuchs (2006) and Szczepanik (2006).
The essence of the contribution of this work to the existing body of knowledge is the utilization of a
method of solution enforcing continuous interfaces between a plate and a set of stiffeners, including a
derivation of a compact form of the strain energy of the structure, based on the method, for the purpose of
the derivation of globally optimal positions of uniform stiffeners, at least for the asymptotic cases of highly
flexible and highly rigid stiffeners and under the simplifying assumptions that the loading is harmonic and
the stiffeners are at least relatively long. The obtained results seem to give insight into the structural behavior
of such widely used structural elements as stiffened panels.
As globally optimal layouts are hard to obtain either in geometric or in topological optimization, and even
more so when it comes to the determination of the symbolic dependence of the optimal layouts on the
parameters, asymptotic analysis, together with a closed form of the solution of the elastostatic bending
problem, are what it seems that might shed additional light on the area. Although asymptotic approach to the
optimal stiffening problem has been employed before, the specific combination of assumptions and the
results presented herein seem not too marginal to contribute to the understanding of the subject.
On another subject, the deflection field of a thin rectangular plate subjected to arbitrary boundary
conditions and a general double-sine-series-expressible loading is given by Fletcher and Thorne (1955) and
discussed by Goriupp (1947) and Timoshenko (1959). As the solution procedure given by Fletcher and
Thorne produces the deflection field of a plate having arbitrary boundary conditions given the deflection
19
field of a simply-supported plate subjected to a prescribed loading, clearly all one has to do is to supply the
solution procedure given by these authors with the deflection field of a simply-supported stiffened plate
instead of that of an unstiffened one.
In this paper, the effect of the torsional rigidity of the stiffeners was accounted for in a way similar to the
way it is done by Mazurkiewicz (1962). More compact expressions for the entities representing the solution
in the case where torsional rigidity is non-negligible can be obtained using analytic summation of the series
in section 4 in the same manner in which it is done in sections 2 and 3 and in the work of Fletcher and
Thorne (1955).
Acknowledgments The present work was partly supported by the Israeli Science Foundation under grant No. 13/05.
REFERENCES
1. Andrianov IV, Lesnichaya VA, Manevich LI (1985) Metod usrednienia v statikie i dinamike rebristikh
obolochek. Moskva , Nauka
2. Cheng KT, Olhoff N (1981) An investigation concerning optimal design of solid elastic plates. Int J
Solids Struct 17:304-323
3. Clarkson J (1965) The Elastic Analysis of Flat Grillage. Cambridge University Press, Cambridge
4. Dems K, Mrรณz Z, Szelag D (1989) Optimal design of rib-stiffeners in disks and plates. Int J solids Struct
25:973-998
5. Fletcher HJ, Thorne CJ (1955) Bending of thin rectangular plates. In: Proceedings of the 2nd U.S.
National Congress on Applied Mechanics, Ann Arbor, Michigan, 1954
6. Fuchs MB (1976) Substitute function methods in structural optimization and their application to
continuous beams. Sc.D. dissertation, Technion
7. Fuchs MB, Brull MA (1979) A new strain energy theorem and its use in the optimum design of
continuous beams. Comput Struct 10:647-657
8. Goriupp K (1947) Die dreiseitig gelagerte Rechteckplatte. Arch Appl Mech 16:153โ163
9. Grayhack WT, Mahar TJ (1990) Buckling of rib-stiffened plates: an asymptotic approach. SIAM J. appl.
Math. 50:1126-1133
10. Grigolyuk EI, Tolkachev VM (1980) Kontaktnyie zadachi teorii plastin i obolochek. Moskva,
Mashinostroenie
11. Kalamkarov AL (1992) Composite and reinforcement elements of construction. Wiley, New York
12. Konchkovskii Z (1984) Plity. Staticheskie raschety. Moskva, Stroiizdat
13. Lagaros ND, Fragiadakis M, Papadrakakis M (2004) Optimum design of shell structures with stiffening
beams. AIAA J 42:175-184
14. Lam YC, Santhikumar S (2003) Automated rib location and optimization for plate structures. Struct
Multidisc Opt 25:35-45
15. Mazurkiewicz Z (1962) Bending and buckling of rectangular plate reinforced transversely by ribs with
variable rigidities. Bull Acad Polon Sci Ser Sci Tech 10: 231-239
16. Mazurkiewicz Z (1962) Buckling of rectangular plate obliquely reinforced by ribs with variable flexural
rigidity. Bull Acad Polon Sci Ser Sci Tech. 10:329-339
17. Mrรณz Z, Rozvany GIN (1975) Optimal design of structures with variable support conditions. J Optim
Theory Applic 15:85-101
18. Nowacki W (1954) Statecznosc plyt prostokatnych wzmocnionych zebrami. Arch Mech Stos. 6:317342
19. Nowacki W (1954) Zagadnienia statyki i dynamiki plyt wzmocnionych zebrami. Arch Mech Stos
6:601-638
20. OโLeary JR, Harari I (1985) Finite element analysis of stiffened plates. Comput Struct 21:973-985
21. Perchikov N, Fuchs MB (2006) Optimal layouts of stiffeners for plates in bending โ Topology
optimization approach. Paper presented at the 3rd European conference on computational mechanics,
solids, structures and coupled problems in engineering, LNEC, Lisbon, 5-8 June 2006
22. Samsonov AM (1978) The Optimal Location of a Thin Rib for an Elastic Plate. Izv Acad Nauk USSR,
MTT (Mechanics of Solids) No.1, 132-138
23. Savin GN, Fleishman NP (1964) Plastinki i obolochki s rebrami zhestkosti. Kiev, Naukova Dumka
24. Schade HA (1940) The orthogonally stiffened plate under uniform lateral load. J Appl Mech 7
25. Szczepanik M (2006) Optimization of topology and stiffener locations in 2D structures using
evolutionary methods. Paper presented at the 3rd European conference on computational mechanics,
solids, structures and coupled problems in engineering, LNEC, Lisbon, 5-8 June 2006
26. Szilard R (1974) Theory and Analysis of Plates: Classical and numerical methods, Prentice Hall
27. Timoshenko SP, Woinowsky-Krieger S (1959) Theory of Plates and Shells, 2nd edn. McGraw Hill,
New York
20
| 5cs.CE
|
arXiv:1712.05181v2 [cs.CL] 15 Dec 2017
Rasa: Open Source Language Understanding and
Dialogue Management
Tom Bocklisch
Rasa
[email protected]
Joey Faulkner
Rasa
[email protected]
Nick Pawlowski
Rasa
[email protected]
Alan Nichol
Rasa
[email protected]
Abstract
We introduce a pair of tools, Rasa NLU and Rasa Core, which are open source
python libraries for building conversational software. Their purpose is to make
machine-learning based dialogue management and language understanding accessible to non-specialist software developers. In terms of design philosophy, we aim
for ease of use, and bootstrapping from minimal (or no) initial training data. Both
packages are extensively documented and ship with a comprehensive suite of tests.
The code is available at https://github.com/RasaHQ/
1
Introduction
Conversational systems are becoming pervasive as a basis for human computer interaction as we
seek more natural ways to integrate automation into everyday life. Well-known examples of conversational AI include Appleโs Siri, Amazonโs Alexa and Microsoftโs Cortana but conversational
systems are becoming widespread with platforms like Facebook Messenger opening up to chatbot
developers. Common tasks for conversational systems include scheduling meetings1 , booking flights2
and customer support tasks3 .
Modern open source libraries are held to a high standard of professionalism, and this extends to
implementations of machine learning algorithms. There is a large amount of non-research work
involved in maintaining a widely used project, and code produced by research groups often falls
short of expectations4 . Rasa NLU and Core aim to bridge the gap between research and application,
bringing recent advances in machine learning to non-experts who want to implement conversational
AI systems.
We introduce Rasa NLU and Core as easy to use tools for building conversational systems, since
until now there was no widely-used statistical dialogue system intended for non-specialists. Rasa is
already used by thousands of developers worldwide. As with many other conversational systems,
our tools are split into natural language understanding (Rasa NLU) and dialogue management (Rasa
Core). Section 3 describes the code architecture, in 4 we outline the developer experience, and in 5
demonstrate an example application.
1
e.g. Meekan, see https://meekan.com
e.g. KLMs BlueBot, see https://bb.klm.com/en
3
see http://rasa.ai/enterprise/case-studies/
4
see https://www.reddit.com/r/MachineLearning/comments/6l2esd/d_why_cant_you_guys_
comment_your_fucking_code/
2
NIPS 2017 Conversational AI workshop, Long Beach, CA, USA.
2
Related Work
Rasa takes inspiration from a number of sources.
Rasaโs API uses ideas from scikit-learn [8] (focus on consistent APIs over strict inheritance) and
Keras [4] (consistent APIs with different backend implementations), and indeed both of these libraries
are (optional) components of a Rasa application.
Text classification is loosely based on the fastText approach [5]. Sentences are represented by pooling
word vectors for each constituent token. Using pre-trained word embeddings such as GloVe [9], the
trained intent classifiers are remarkably robust to variations in phrasing when trained with just a few
examples for each intent. Braun et al [3] show that Rasa NLUโs performance compares favourably to
various closed-source solutions. Custom entities are recognised using a conditional random field [6].
Rasa Coreโs approach to dialogue management is most similar to [13], but takes a different direction
from many recent research systems. There is currently no support for end-to-end learning, as in [12]
or [2], where natural language understanding, state tracking, dialogue management, and response
generation are all jointly learned from dialogue transcripts. Rasaโs language understanding and
dialogue management are fully decoupled. This allows Rasa NLU and Core to be used independently
of one another, and allows trained dialogue models to be reused across languages. For language
generation, we encourage developers to generate a variety of responses by authoring multiple
templates for each response. This is currently easier and more reliable than using (for example) a
neural network to generate grammatically coherent and semantically correct responses as in [11].
Rasa Core also does not account for uncertainty in voice transcription and NLU, as would typically
be achieved with Partially Observable Markov Decision Processes (POMDP) [15]. While there is
support for training via reinforcement learning (currently in alpha), we do not emphasise this for new
users. Rather than implementing a reward function and a simulated user, or immediately placing
humans in the loop, we encourage developers to train the dialogue policy interactively (see section
4.2). Recent work by Williams follows a similar machine teaching approach [14], one difference being
that in that work the dialogue policy is directly exposed to the surface form of the user utterances,
whereas in Rasa Core the dialogue policy only receives the recognised intent and entities.
2.1
Related Software Libraries
As mentioned in the introduction, the large body of high-quality research into statistical dialogue
systems from the last decades has not translated into widely used software libraries. A notable
contribution is to this end is PyDial [10], a recently released toolkit for dialogue research. Compared
to PyDial, Rasa Core emphasises the needs of non-specialist software developers over those of
researchers in the field. Other open toolkits include OpenDial [7] and RavenClaw [1].
There are a number of general-purpose natural language processing (NLP) libraries in widespread
use, and it is not necessary to mention them all here. There are also a number of online services for
natural language understanding (NLU), as the term is understood in the dialogue research community:
converting short user messages into dialogue acts comprising an intent and a set of entities. Like
the online services, Rasa NLU hides implementation details from new users, but with the advantage
that slightly more experienced users can fully customise their NLU system. Language understanding
is performed by a number of components implementing a common API, and is therefore easily
configurable to suit the needs of a particular project.
3
Description of the Code
Rasaโs architecture is modular by design. This allows easy integration with other systems. For
example, Rasa Core can be used as a dialogue manager in conjunction with NLU services other than
Rasa NLU. While the code is implemented in Python, both services can expose HTTP APIs so they
can be used easily by projects using other programming languages.
3.1
Architecture
Dialogue state is saved in a tracker object. There is one tracker object per conversation session, and
this is the only stateful component in the system. A tracker stores slots, as well as a log of all the
2
events that led to that state and have occurred within a conversation. The state of a conversation can
be reconstructed by replaying all of the events.
When a user message is received Rasa takes a set of steps as described in figure 1. Step 1 is performed
by Rasa NLU, all subsequent steps are handled by Rasa Core.
Figure 1: 1. A message is received and passed to an Interpreter (e.g. Rasa NLU) to extract the intent,
entities, and any other structured information. 2. The Tracker maintains conversation state. It receives
a notification that a new message has been received. 3. The policy receives the current state of the
tracker. 4. The policy chooses which action to take next. 5. The chosen action is logged by the
tracker. 6. The action is executed (this may include sending a message to the user). 7. If the predicted
action is not โlistenโ, go back to step 3.
3.2
Actions
We frame the problem of dialogue management as a classification problem. At each iteration, Rasa
Core predicts which action to take from a predefined list. An action can be a simple utterance, i.e.
sending a message to the user, or it can be an arbitrary function to execute. When an action is
executed, it is passed a tracker instance, and so can make use of any relevant information collected
over the history of the dialogue: slots, previous utterances, and the results of previous actions.
Actions cannot directly mutate the tracker, but when executed may return a list of events. The
tracker consumes these events to update its state. There are a number of different event types, such
as SlotSet, AllSlotsReset, Restarted, etc. The full list is in the documentation at https:
//core.rasa.ai.
3.3
Natural Language Understanding
Rasa NLU is the natural language understanding module. It comprises loosely coupled modules
combining a number of natural language processing and machine learning libraries in a consistent
API. We aim for a balance between customisability and ease of use. To this end, there are pre-defined
pipelines with sensible defaults which work well for most use cases. For example, the recommended
pipeline, spacy_sklearn, processes text with the following components. First, the text is tokenised
and parts of speech (POS) annotated using the spaCy NLP library. Then the spaCy featuriser looks up
a GloVe vector for each token and pools these to create a representation of the whole sentence. Then
the scikit-learn classifier trains an estimator for the dataset, by default a mutliclass support vector
classifier trained with five-fold cross-validation. The ner_crf component then trains a conditional
random field to recognise the entities in the training data, using the tokens and POS tags as base
features. Since each of these components implements the same API, it is easy to swap (say) the
GloVe vectors for custom, domain-specific word embeddings, or to use a different machine learning
library to train the classifier. There are further components for handling out-of-vocabulary words and
3
many customisation options for more advanced users. All of these are detailed in the documentation
at https://nlu.rasa.ai.
3.4
Policies
The job of a policy is to select the next action to execute given the tracker object. A policy is
instantiated along with a featurizer, which creates a vector representation of the current dialogue state
given the tracker.
The standard featurizer concatentates features describing:
โข what the last action was
โข the intent and entities in the most recent user message
โข which slots are currently defined
The featurization of a slot may vary. In the simplest case, a slot is represented by a single binary
vector element indicating whether it is filled. Slots which are categorical variables are encoded as a
one-of-k binary vector, those which take on continuous values can specify thresholds which affect
their featurisation, or simply be passed to the featurizer as a float.
There is a hyperparameter max_history which specifies the number of previous states to include in
the featurisation. By default, the states are stacked to form a two-dimensional array, which can be
processed by a recurrent neural network or similar sequence model. In practice we find that for most
problems a max_history value between 3 and 6 works well.
4
Usage
4.1
Training Data Formats
Both Rasa NLU and Core work with human-readable training data formats. Rasa NLU requires a
list of utterances annotated with intents and entities. These can be specified either as a json structure
or in markdown format. The markdown syntax is especially compact and easy to read and can be
rendered by many text editors and web applications like GitHub.
## intent: restaurant_search
- show me [chinese](cuisine) restaurants
The json format is slightly more cumbersome to read, but is not whitespace sensitive and more
suitable for transmission of training data between applications and servers.
{
"text": "show me chinese restaurants",
"intent": "restaurant_search",
"entities": [
{
"start": 8,
"end": 15,
"value": "chinese",
"entity": "cuisine"
}
]
}
Rasa Core employs markdown to specify training dialogues (aka โstoriesโ).
## story_07715946
* greet
- utter_ask_howcanhelp
* inform{"location":"rome","price":"cheap"}
- utter_on_it
4
- utter_ask_cuisine
* inform{"cuisine":"spanish"}
- utter_ask_numpeople
* inform{"people":"six"}
- action_ack_dosearch
A story starts with a name preceeded by two hashes
## story_03248462
The choice of name is arbitrary but can be helpful for debugging. The body of a story is a sequence
of events, separated by newlines. An event such as
* inform{"location":"bombay", "price":"expensive"}
is a user utterance, annotated as a dialogue act. The general format is
* intent{"entity_name": "entity_value"}
where entities are key-value pairs separated by commas. System actions are also events and are
specified by lines starting with a dash. The end of a story is denoted by a newline.
4.2
Machine Teaching
In addition to supervised learning, Rasa Core supports a machine teaching approach where developers
correct actions made by the system. We find that this is a practical approach for generating training
data, and exploring the space of plausible conversations efficiently.
5
Here is an example of a user engaged in machine teaching of a restaurant recommender system
(described in Section 5) . The user is presented with the following prompt5 :
-----Chat history:
bot did:
[]
bot did:
action_listen
user said:
/greet
whose intent is:
greet
we currently have slots: cuisine: None, people: None,
price: None, location: None
-----The bot wants to [utter_ask_howcanhelp] due to the intent. Is this correct?
1.
2.
3.
0.
Yes
No, intent is right but the action is wrong
The intent is wrong
Export current conversations as stories and quit
>>
If the user inputs 2, indicating that the action is wrong, they will be provided with a prompt as below
which lists the possible actions and the probability assigned to them by the dialogue policy:
-----what is the next action for the bot?
0
action_listen
0.12
utter_ask_cuisine
utter_ask_helpmore
utter_ask_howcanhelp
utter_ask_location
utter_ask_moreupdates
utter_ask_numpeople
action_search_restaurants
0.03
0.03
0.19
0.04
0.03
0.05
0.03
...
8
9
10
11
12
13
14
...
>>
Choosing the correct action creates a new training data point. Rasa Core then partially trains the
dialogue policy and moves the conversation forward to the next step. Once completed, the trained
model is persisted and the newly generated training data is saved to a file.
4.3
Visualisation of Dialogue Graphs
Rasa Core also has the capability to visualise a graph of training dialogues. A story graph is a directed
graph with actions as nodes. Edges are labeled with the user utterances that occur in between the
execution of two actions. If there is no user interaction between two consecutive actions, the edge
label is omitted. Each graph has an initial node called START and a terminal node called END. Note
that the graph does not capture the full dialogue state and not all possible walks along the edges
necessarily occur in the training set. To simplify the visualization a heuristic is used to merge similar
nodes. A generated graph before and after running the simplification is shown in Figure 2. During
the simplification two nodes are merged by replacing them with a single node that inherits all the
5
In Rasa a conversational system is referred to as a โbotโ
6
incoming and outgoing edges, removing duplicates in the process. This makes the resulting graphs
easier to interpret.
Nodes are merged if these two conditions are met:
โข they represent the same action
โข the previous max_history turns are identical for all dialogues leading to the nodes.
START
greet
utter_ask_howcanhelp
START
greet
greet
utter_ask_howcanhelp
utter_ask_howcanhelp
inform{"location": "rome", "price": "cheap"}
inform{"cuisine": "spanish"}
inform{"location": "rome", "price": "cheap"}
inform{"cuisine": "spanish"}
utter_ask_cuisine
utter_ask_location
utter_ask_cuisine
utter_ask_location
inform{"cuisine": "spanish"}
inform{"location": "rome", "price": "cheap"}
inform{"cuisine": "spanish"}
action_ack_dosearch
action_ack_dosearch
inform{"location": "rome", "price": "cheap"}
action_ack_dosearch
END
END
(a) Example story graph without simplification
(b) Example story graph with simplification
Figure 2: Minimal example illustrating how story graphs are simplified. The training data contains
two stories with the same first interaction. These nodes are therefore considered equivalent and
merged.
4.4
Deployment in a Production Environment
The repositories for Rasa NLU and Core both contain Dockerfiles for producing static virtual machine
(VM) images. This aids in reproducibility and ease of deployment to a variety of server environments.
The web servers running the HTTP API support both thread-based and process-based parallelism,
allowing them to handle large request volumes in a production environment.
5
Demonstration
To demonstrate the usage of Rasa Core, we use the BAbl dialogue dataset [2]. This is a simple
slot-filling exercise where the system is asked to search for a restaurant and has to fill several slots
before being able to perform a successful search. The system may ask the user for their preference
for any slot. The available slots are location, the number of people, the cuisine and the price range.
This is an interesting dataset due to the inherent non-linearity of the problem - there are multiple
ways to get the same information so there isnโt a single โcorrectโ action in every case. Accuracy and
precision are therefore not the most appropriate metrics for evaluating a dialogue policy. Instead
we consider how the system chooses actions depending on what information is already available. It
should attempt to fill slots which are empty.
In Figure 3 we can see the probabilities which Rasa Core attaches to each action given the slots
it already knows. We see that Core follows a rough pattern of asking about cuisine, followed by
location, followed by number of people - as it does in the training data. However it recognises that it
could also ask about the other unfilled slots by attributing a non-zero probability to each one. The
filled slots (the lower diagonal of the โgridโ) are given vanishingly small probability. This illustrates
how Rasa Core can use contextual clues to learn non-linear conversations.
6
Outlook
Both Rasa NLU and Core are under active development. They serve as a platform for making applied
research in conversational AI usable by non-specialist developers, and as such will never be โfinishedโ.
A number of topics are under active development, including improved support for reinforcement
learning, making NLU robust to typos and slang, and supporting more languages. We also plan to
7
Figure 3: Here we plot the probabilities of choosing actions for the bAbl example (Section 5) . We
sequentially inform the system of the correct (top-bottom): cuisine, location, number of people and
price, and the system chooses the next action based on the information it already has (which is listed
in the box on the top left). The system favours asking about slots it has not been informed of, until all
of the slots are filled and it searches for the restaurant.
release real-world datasets for comparing the performance of different models. The authors welcome
external contributions to the project, the specifics of which can be found in the repositories on GitHub.
Acknowledgements
The authors are indebted to the users of both libraries for providing invaluable feedback and creating a supportive community around these tools. Special acknowledgement is owed to the external contributors to both libraries. Up-to-date lists of contributors may be viewed at https://
github.com/RasaHQ/rasa_nlu/graphs/contributors and https://github.com/RasaHQ/
rasa_core/graphs/contributors.
References
[1] D. Bohus and A. I. Rudnicky. The ravenclaw dialog management framework: Architecture and
systems. Comput. Speech Lang., 23(3):332โ361, July 2009.
[2] A. Bordes and J. Weston. Learning end-to-end goal-oriented dialog. CoRR, abs/1605.07683,
2016.
[3] D. Braun, A. Hernandez-Mendez, F. Matthes, and M. Langen. Evaluating natural language
understanding services for conversational question answering systems. In Proceedings of the
18th Annual SIGdial Meeting on Discourse and Dialogue, pages 174โ185, 2017.
[4] F. Chollet et al. Keras, 2015.
8
[5] A. Joulin, E. Grave, P. Bojanowski, and T. Mikolov. Bag of tricks for efficient text classification.
arXiv preprint arXiv:1607.01759, 2016.
[6] J. Lafferty, A. McCallum, and F. C. Pereira. Conditional random fields: Probabilistic models
for segmenting and labeling sequence data. 2001.
[7] P. Lison and C. Kennington. Opendial: A toolkit for developing spoken dialogue systems with
probabilistic rules. ACL 2016, page 67, 2016.
[8] F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion, O. Grisel, M. Blondel,
P. Prettenhofer, R. Weiss, V. Dubourg, et al. Scikit-learn: Machine learning in python. Journal
of Machine Learning Research, 12(Oct):2825โ2830, 2011.
[9] J. Pennington, R. Socher, and C. Manning. Glove: Global vectors for word representation.
In Proceedings of the 2014 conference on empirical methods in natural language processing
(EMNLP), pages 1532โ1543, 2014.
[10] S. Ultes, L. M. R. Barahona, P.-H. Su, D. Vandyke, D. Kim, I. Casanueva, P. Budzianowski,
N. Mrkลกicฬ, T.-H. Wen, M. Gasic, et al. Pydial: A multi-domain statistical dialogue system
toolkit. Proceedings of ACL 2017, System Demonstrations, pages 73โ78, 2017.
[11] T.-H. Wen, M. Gasic, N. Mrksic, P.-H. Su, D. Vandyke, and S. Young. Semantically conditioned lstm-based natural language generation for spoken dialogue systems. arXiv preprint
arXiv:1508.01745, 2015.
[12] T.-H. Wen, D. Vandyke, N. Mrksic, M. Gasic, L. M. Rojas-Barahona, P.-H. Su, S. Ultes, and
S. Young. A network-based end-to-end trainable task-oriented dialogue system. arXiv preprint
arXiv:1604.04562, 2016.
[13] J. D. Williams, K. Asadi, and G. Zweig. Hybrid code networks: practical and efficient end-to-end
dialog control with supervised and reinforcement learning. arXiv preprint arXiv:1702.03274,
2017.
[14] J. D. Williams and L. Liden. Demonstration of interactive teaching for end-to-end dialog control
with hybrid code networks. In Proceedings of the 18th Annual SIGdial Meeting on Discourse
and Dialogue, pages 82โ85, 2017.
[15] S. Young, M. Gaลกicฬ, B. Thomson, and J. D. Williams. Pomdp-based statistical spoken dialog
systems: A review. Proceedings of the IEEE, 101(5):1160โ1179, 2013.
9
| 2cs.AI
|
SENATE: A Permissionless Byzantine Consensus Protocol in Wireless Networks
Zhiyuan Jiang1 , Bhaskar Krishnamachari2 , Sheng Zhou1 , Zhisheng Niu1 ,
arXiv:1803.08694v1 [cs.IT] 23 Mar 2018
1
{zhiyuan, sheng.zhou, niuzhs}@tsinghua.edu.cn, Tsinghua University, Beijing, China
2
[email protected], University of Southern California, Los Angeles, USA
AbstractโThe blockchain technology has achieved tremendous success in open (permissionless) decentralized consensus
by employing proof-of-work (PoW) or its variants, whereby
unauthorized nodes cannot gain disproportionate impact on
consensus beyond their computational power. However, PoWbased systems incur a high delay and low throughput, making
them ineffective in dealing with real-time applications. On the
other hand, byzantine fault-tolerant (BFT) consensus algorithms with better delay and throughput performance have
been employed in closed (permissioned) settings to avoid Sybil
attacks. In this paper, we present Sybil-proof wirelEss Network
coordinAte based byzanTine consEnsus (SENATE), which is
based on the conventional BFT consensus framework yet works
in open systems of wireless devices where faulty nodes may
launch Sybil attacks. As in a Senate in the legislature where the
quota of senators per state (district) is a constant irrespective
with the population of the state, โsenatorsโ in SENATE are
selected from participating distributed nodes based on their
wireless network coordinates (WNC) with a fixed number of
nodes per district in the WNC space. Elected senators then
participate in the subsequent consensus reaching process and
broadcast the result. Thereby, SENATE is proof against Sybil
attacks since pseudonyms of a faulty node are likely to be
adjacent in the WNC space and hence fail to be elected.
Index TermsโByzantine fault-tolerant consensus, Sybil attack,
wireless network, permissionless blockchain, distance geometry
1. Introduction
Recent years have witnessed an explosive development
in digital cryptocurrency, both in academic fields and financial markets. Behind its tremendous success, the key enabling technology of digital cryptocurrency is the blockchain
[1], [2] which combines several judiciously designed techniques to facilitate trusted distributed ledgers such that intermediary can be eliminated during transactions. In particular,
the Bitcoin blockchain ingeniously adopts the proof-of-work
(PoW) for mining to, among other purposes, deal with identity attacks (Sybil attacks) in open (permissionless) systems
wherein the identities of participating nodes are not assumed
to be known a priori. Specifically, each node, whether it
is authentic or a pseudonym, must solve a cryptographic
puzzle to participate in the block generation process and
obtain rewards (mining). Therefore, the impact of a mining
Figure 1. Time-critical application scenarios, e.g., autonomous driving
systems wherein vehicles and pedestrians go through intersections based
on distributed consensus (left); Internet-of-Things where terminals (drones,
sensors and actuators) act based on coordinated and synchronized behavior
(right).
node is directly tied to its computational power, irrespective
of the number of identities it has.
According to the necessity of a prior identity authorization procedure, blockchain technologies can be categorized
by permissionless and permissioned blockchains. Permissionless blockchains, such as Bitcoin [1] and Ethereum [3],
are applied in open systems wherein faulty nodes may apply
Sybil attacks, the counteraction of which usually involves
enforcing a strict coupling between the consensus impact
of a node and the computational power (PoW for Bitcoin)
or the resources (proof-of-stake for Ethereum Casper) of the
node. Despite the robustness against Sybil attacks, a price is
payed that permissionless blockchains usually suffers from
high processing delay (6 blocks are recommended in Bitcoin
which amounts to one hour) and low throughput (at most
7 transactions per second [4] for Bitcoin). Many existing
works try to remedy this issue [4], [5], however, the inherent
mining based probabilistic consensus reaching technique is
the key limiting factor. On the other hand, permissioned
blockchains, such as Hyperledger Fabric [6], need not be
wary of Sybil attacks since all participating nodes have gone
through an explicit authentication process such that they
can be trusted. Adopting a long line of existing research
on byzantine fault-tolerant (BFT) protocols [7]โ[9], the processing delay and throughput of permissioned blockchains
can be dramatically improved; a nice comparison between
traditional BFT protocols and permissionless blockchains is
presented by Vukolicฬ [10].
In this paper, a large-scale dense wireless network scenario is considered, which is likely to be encountered in
the future in Internet-of-Things deployments as well as in
TABLE 1. C OMPARISONS WITH BLOCKCHAIN TECHNOLOGIES
Open system
Delay
Permissionless
blockchain
Yes
Large
Permissioned
blockchain
No
Small
SENATE
Yes
Small
the context of vehicle networks and intelligent transportation
(Figure 1). We come up with a solution for Sybil-proof BFT
consensus which offers the benefits of both permissioned
and permissionless blockchains (cf. Table 1 for details),
i.e., low-delay and high-throughput BFT consensus in permissionless systems. The proposed protocol, namely Sybilproof wireless network coordinate (WNC) based byzantine
consensus (SENATE), consists of three major phases: sortition, senator selection and byzantine agreement. SENATE
thwarts the Sybil attack by exploiting the fact that even a
faulty node cannot forge its wireless channel to other nodes
such that a unique wireless fingerprint can be leveraged to
identify nodes; a fully decentralized approach is proposed
to achieve this.
Notations: Throughout the paper, we use boldface uppercase letters, boldface lowercase letters and lowercase
letters to designate matrices, column vectors and scalars,
respectively. The transpose of a matrix is denoted by (ยท)T .
Xi,j and xi denotes the (i, j)-th entry and i-th element of
matrix X and vector x, respectively. The `p and nuclear
norm of a matrix are denoted by kยทkp and kยทkโ , respectively.
The vector consisting of the diagonal entries of a square
matrix is denoted by diag[ยท]. The trace of a matrix is denoted
by tr[ยท]. The matrix with all entries being one is denoted by
1, and likewise zero matrix is denoted by 0.
1.1. Related Work
The idea of only allowing selected nodes to participate
in BFT consensus reaching is shared by, e.g., NEO [11]
and Algorand [4]. NEO is a delegated BFT consensus based
blockchain in which a small number of servers are statically
configured to run consensus on behalf of a larger open
network. Similar with SENATE, Algorand counteracts Sybil
attacks by adopting a sortition phase; the difference is that
a random verifiable function based solution combining with
proof-of-stake (PoS) is leveraged by Algorand, whereas
SENATE is based on the underlying wireless channels.
Because SENATE is not employing PoS, it is not tied to
a digital currency and thus can be applied more broadly to
achieving consensus in wireless systems; moreover, it avoids
the unfairness introduced by PoS which intentionally favors
participants with more resources.
Proof-of-location (PoL) in wireless networks is adopted
by Dasu et al. [12] to replace PoW for faster transactions.
The PoLs are generated by authorities such as wireless
network operators and hence some notion of centralization is
introduced. SENATE also uses the concept of PoL whereas,
on a high level, nodes generate PoLs in a fully-decentralized
manner without any trusted authority.
There have been some work where wireless channel
fingerprints are utilized to protect against Sybil attacks (cf.
[13] for a survey and [14], [15] for a signalprint-based
approach). However, most existing work relies on a trusted
authority to verify the wireless channels of nodes [14], or
pre-distribute encrypted keys [13]. In [15], a wireless ad
hoc network of commodity 802.11 devices is considered; a
view selection policy based on signalprint observations is
proposed. Our work considers a fully decentralized wireless
network and a novel WNC based protocol (SENATE) is
proposed; compared with existing work, SENATE has much
lower running time and better understandability and hence
more favourable for real-world implementations.
2. System Model
We consider a wireless network consisting of N geographically distributed nodes with full connectivity, namely
any pair of nodes in the network are within each otherโs
radio communication range. The system is open, or permissionless, in the sense that any node can join the system
without prior identity authentication. The objective is for
the good nodes to reach a valid (the definition for validity
is addressed later) consensus on a set of values over a
certain time period such that deterministic concerted actions
can be carried out, in the meantime, subject to malicious
behaviors by faulty nodes. Note that the considered scenario
distinguishes from the state machine replication wherein a
log is proposed by a client and different nodes agree on the
same log record; here different nodes may have different
set of initial values, e.g., sensory data from environment,
and hence a reasonably good (valid) consensus needs to be
reached.
Unlike existing work on byzantine consensus which
mainly adopts the Internet as the overlay network, a wireless
overlay is considered. In this regard, the behavior of a
faulty node should be clarified. Specifically, the following
assumptions are made in this paper.
โข
โข
โข
The objective of a faulty node is to rig the consensus
reaching process to benefit itself, rather than halting
the process.
To achieve its purpose, possible malicious behaviors
include: (1) Byzantine node [7], namely it does not
comply with the protocol and can report arbitrary
messages; (2) Sybil attack [16]: it can generate
pseudonyms to gain inappropriate power in the process of reaching consensus.
In the overlay wireless network, a faulty node does
not block or interfere with other nodesโ transmissions and messages.
The first assumption describes the motive of a faulty
node and therefore has implications on the other two assumptions. The second assumption simply states that, on
a message level, there is no restriction on the behavior of
a faulty node, both from the perspectives of the message
content and the identity of the message sender. In most
existing byzantine agreement protocols with the Internet as
overlay [7], the third assumption is also implied which limits
the malicious behavior of a node to itself; whereas in wireless networks with the broadcast nature of electromagnetic
waves, this assumption has more implications, meaning that
a faulty node is assumed to comply with the communication
protocol. For instance, a faulty node would not transmit
when another node is scheduled (by the consensus protocol).
This assumption stems in large part from the first assumption, since messing with the communication protocol, e.g.,
transmitting with a high power and thus blocking other
nodes, leads to retransmissions and hence halting the consensus reaching process. Besides, the following two reasons
also justify the assumption: (1) an attack becomes trivially
devastating without this assumption, namely a faulty node
with sufficient transmit power can block other transmissions
all the time to prevent reaching consensus; (2) a node not
complying with the communication protocol is obviously
malicious and easy to spot.
In this work, we assume nodes can obtain ranging estimations based on othersโ pilot signals. However, we do not
focus on specific methods to obtain the distance estimations;
they can be based on receive signal strength (RSS), time of
arrival (ToA) or other approaches which have been studied
extensively [17]. The net effect of ranging estimations is
considered by a statistical model, i.e., dหij = ฯij dij + nij ,
where dij denotes the geographic distance between node-i
and node-j and hence dji = dij , the distance estimation at
node-j from node-i is denoted by dหij , the estimation error
is introduced by multiplicative and additive random coefficients ฯij and nij , respectively. In the wireless localization
literature, it is usually assumed that
โข
โข
For ToA-based ranging estimations, ฯij = 0 and nij
is modeled as a Gaussian distributed variable.
For RSS-based ranging estimations, the shadow fading is modeled as ฯij which is assumed to be
Gaussian distributed; it is often termed as log-normal
shadow fading by taking logarithm on both sides.
Considering the ranging estimation error, it is observed
thereby that the RSS-based approach is effective with short
distances since there is a multiplicative error component;
the ToA-based approach applies to a more wide range of
distances although it may require a central node to calibrate
the clocks of terminals to ensure synchronization.
In the ALOHA game, a critical requirement is that every
good player (node) knows the total number of users (including faulty nodes) in the system to determine its action; in
the considered scenario, this requirement poses a challenge
in the presence of faulty nodes, namely faulty nodes can let
good nodes believe there are fewer nodes in the system such
that good nodes may behave more conservatively and hence
benefit faulty nodes. To prevent this, a chorus procedure
is proposed which leverages the unique pattern of channel
power delay profile (PDP) to estimate the total number of
participating nodes. The key observation is that a faulty node
cannot forge multi-path components (MPCs) and hence this
feature can be utilized, especially with line-of-sight (LoS)
transmission environment, to estimate the node quantity.
Chorus: In this procedure consisting of T time slots,
each node is supposed to randomly select one time slot
to receive and, on the other hand, transmit pilot symbols
in the remaining T โ 1 time slots. An analysis in Section
4 shows that even in the presence of faulty nodes, this
procedure is robust. In the receive time slot of, e.g., nodei, it estimates the PDP of receive signal and calculates the
number of MPCs. In an LoS environment, this measurement
gives an accurate estimation of the number of transmitters
in the system; moreover, even a faulty node cannot generate
multiple MPCs given its location.
This is analogous to let all nodes perform chorus first
such that every node can have an estimation of the population based on nodesโ unique timbre. The procedure lasts
T time slots since we assume that nodes cannot operate
in the full-duplex mode; otherwise the procedure can be
shortened to one time slot wherein every node transmit and
receive simultaneously. The detailed procedure, as well as
the analysis for appropriate T , is given in Section 4.
ALOHA game based sortition: Given each nodeโs
estimations about the total number of nodes in the system,
we let every node be selfish in the ALOHA game to prevent
faulty nodes from gaining advantages; this all-be-selfish
methodology is essentially identical with the blockchain
technology which allows all miners to compete for the
opportunity to register a block. In particular, an ALOHA
random access game with selfish users is implemented. It is
roughly described as follows.
โข
3. Overview
SENATE consists of three major phases: sortition, senator selection and byzantine agreement.
3.1. Sortition
In the sortition process, the objective is to prevent faulty
nodes to generate arbitrarily many pseudonyms; note that
this does not mean we eliminate the Sybil attack by sortition
completely. The key to achieve this is by developing an
ALOHA game with selfish users [18] such that no one can
cheat based on the Nash equilibrium arguments.
โข
Every node is selfish, in the sense that they all want
to transmit as soon as possible in a collision-free
time slot. However, after a successful transmission,
a good node would stop competing whereas a faulty
node might keep on transmitting to launch Sybil
attacks.
Once a node successfully transmits in a time slot
(collision-free), it is selected as the s-th candidate
where s โ {1, ..., S} denotes the s-th successful
transmission in the ALOHA game; then it transmits
a pilot signal for ranging estimations immediately
afterwards.
By this definition, it can be shown (Section 4) that a
Nash equilibrium exists based on which every node adopts
the same mixed-strategy [18]: transmit in each time slot with
a probability p with 0 < p < 1, and no one can benefit by
changing the strategy unilaterally.
After a quorum of S candidates is reached, the sortition
phase terminates with S candidates going into the senator
selection in the next phase. Note that a Sybil attack is still
possible; a faulty node may occupy several seats among the
candidates.
3.2. Senator Selection
This phase is dedicated to further removing the
pseudonyms generated by faulty nodes, by cross-checking
the ranging estimations among nodes in a fully distributed
manner.
After S candidates are selected, they no longer follow
the ALOHA-based random access protocol. Instead, each
candidate is assigned a unique time slot to transmit in a
frame of S time slots in this phase.
Since every candidate has transmitted a pilot signal,
every candidate has obtained the distance estimations from
other candidates. For candidate-i, its distance estimations
are denoted by a vector
h
iT
dฬi = dห1i , ..., dห(iโ1)i , 0, dห(i+1)i , ..., dหSi , i = 1, ..., S.
(1)
The estimated Euclidean distance matrix (EDM) [19] with
squared norm is hence
h 2
i
2
Dฬ , dฬ1 , ..., dฬS .
(2)
Distance feedback and symmetry verification: Each
candidate feeds back its dฬi in its dedicated time slot. Afterwards, every candidate obtains the distance estimations
between any pair of candidates (double-directional) in the
network. Note that dij = dij , โi, j , and thereby every node
can remove suspicious distance feedback based on checking
the estimated EDM (here we assume the feedback is perfect)
dห2ij โ dห2ji <
(3)
where is a constant related to ฯij and nij . In this case,
as long as (3) does not hold, both dหij and dหij are removed
since we cannot tell if node-i or node-j is lying.
Robust WNC generation: Despite the fact that the symmetry verification can, to some extent depending on distance
estimation error, eliminate untruthful distance feedback, a
faulty node can still launch what we refer to as a โshout
attackโ1 .
Definition 1 (Shout Attack). A shout attack is that a faulty
node pretends to be further away to other nodes, by synchronously adding to the distance estimations to other
nodes. In particular, for ToA-based ranging estimations,
a faulty node can purposely transmit pilot signals later
than supposed, and, accordingly, feed back tampered
1. Likewise, a โwhisper attackโ can be defined by which the faulty node
pretends to be nearer to other nodes. For ease of exposition, we use the
shout attack for illustration henceforth.
(larger) distance estimations; for RSS-based ranging
estimations, a faulty node can purposely amplify its
pilot signal power and, accordingly, feed back tampered
(larger) distance estimations.
By definition, a shout attack cannot be detected by
symmetry verification and gives a faulty node arbitrarily
many fake geographical locations that are arbitrarily far
from its real one. The purpose of a shout attack is hence
to create pseudonyms and facilitate the Sybil attack, which
causes a severe challenge to SENATE since SENATE uses
the location information for Sybil protection.
To thwart the shout attack, we introduce the seesaw test
based on the following intuition. In the real world with (at
most) 3-dimensional space, it is increasingly unlikely that a
faulty node, which launches the shout attack, is further away
to other nodes proportionally, as the number of nodes grows.
This is analogous to placing elastic sticks between each pair
of nodes in the system, with the lengths of sticks given
by the distance estimations. The circumstance for a faulty
node launching shout attack in the 2-dimensional space is
illustrated in Figure 2; its related sticks are bent dramatically
and hence the elastic force levers it out (screened out by the
seesaw test), like being on the lighter side of seesaws. This
argument is mathematically formalized in Theorem 2 which
states the local error is proportional to the number of good
nodes.
Good Node
Node 1
Faulty Node
Node 4
Node
2
Node
3
Figure 2. A seesaw test. A faulty node launching the shout attack would
be โlevered outโ.
An iterative WNC calculation with seesaw tests is proposed, the essence of which can be illustrated as follows. In
each round of the iteration, every node, e.g., node-i, uses the
distance estimation to another node-j to push (resp. pull)
node-j if the distance estimation is larger (resp. smaller)
than the predicted distance between the two nodes by the
current WNC; then node-j moves accordingly. At the end
of each round, the node with the largest local error, i.e., its
related seesaws are bent the most, is identified as a faulty
node and therefore removed; note that a termination criterion
(specified later) is added such that the WNC calculation
terminates when the system has small prediction error.
K -means clustering. After obtaining the coordinates of
all candidates, a K -means clustering algorithm [20] is applied to the coordinates such that all candidates are divided
into K clusters. Then K representatives, each from one
cluster, are selected as senators; this prevents Sybil attacks
because pseudonyms of one faulty candidate are likely to
fall into the same cluster.
3.3. Byzantine Agreement
The K senators run a byzantine agreement protocol to
reach consensus. We primarily consider the median validity
for consensus, which is defined as follows [21].2 Assume a
single consensus value is to be reached upon. Denote by G
the sorted array of the initial values of good nodes. Among
n nodes, f nodes are faulty and it is assumed that f โค t
and hence G = [G[0], ..., G[n โ f โ 1]].
Definition 2 (Median Validity). We call a value x medianvalid, if it holds that
nโf
nโf
โ1โt โคxโคG
โ 1 + t .
G
2
2
(4)
Thereby, we adopt the Jack algorithm [21] which ensures
the following properties, as long as the number of faulty
senators, i.e., f , satisfies K โฅ 3f + 1.
โข
โข
โข
Agreement: For every selection of input values and
every selection of faulty senators, all good senators
can decide on the same value.
Termination: Every good senator can decide on a
value in finite time.
Median Validity: The decision is median-valid.
Upon agreement, every senator broadcasts its consensus
value, and every good node in the system adopts the majority
value. Since consensus is reached in the senate, the majority
value can reflect the consensus value and ensures safety and
agreement among all nodes.
Algorithm 1: Sortition
Input: Node-1, ..., N ;
Output: Candidate-1, ..., S ;
1 Chorus Procedure
2 Every node (node-i) uniform-randomly selects
1 โค ti โค T .
3 for t=1:T do
4
if t = ti then
5
Node-i transmits a pilot symbol in the t-th
time slot.
6
else
7
Node-i receives signals and estimates the
number of transmitting nodes based on the
receive PDP; the estimation is denoted by
ฯi .
8
The total number of nodes estimated by
node-i is Nฬi = 1 + T Tโ1 ฯi .
9
10
11
12
13
ALOHA Game based Sortition
Every node can transmit in every time slot.
for s=1:S do
The s-th candidate is selected when a new
successful transmission happens and the
corresponding node is candidate-s; afterwards, it
transmits a pilot signal.
return Candidate-1, ..., S .
all faulty nodes can conjure is by always transmitting, and
thereby,
4. Sortition
Nฬi โค 1 +
The sortition phase is described in Algorithm 1. We
elaborate on several details as follows.
4.1. Analysis on Chorus Duration
When a node, e.g., node-i, receives signals, assuming its
estimation on the number of transmitting nodes is correct,
the probability of a good node transmitting in this time slot
is
1
pj = 1 โ , node-j is a good node and j 6= i. (5)
T
Therefore, the unbiased estimate should be
T
qi ,
(6)
T โ1
where qi denotes the estimation of transmitting node in
node-iโs receive time slot. The optimal attack a faulty node
can launch is to let good nodes believe there are more nodes
in the system such that the transmission strategy of the latter
would be more conservative. Therefore, the worst effect
Nฬi = 1 +
2. Nevertheless, basically any BFT protocol can be plugged in to SENATE in this phase, and works well in an open system since we have
achieved Sybil-proof in the previous phases.
T
T
F+
T โ1
T โ1
N โF
Xโ1
mn ,
(7)
n=1
where mn is a Bernoulli random variable with parameter
1 โ T1 . By letting T be sufficiently large compared with N ,
then
T
N
Nฬi โค 1 +
F + (N โ F โ 1) + O
T โ1
T
F
N
=N+
+O
,F โคN
(8)
T โ1
T
where O (ยท) denotes infinitesimal. In an LTE system with
time slot of 0.5 ms and 100 nodes, a chorus procedure
lasting 1 s yields N
T = 0.05.
4.2. Nash Equilibrium of ALOHA Game
An ALOHA game is described as follows. Every node
participates in the game.
โข
In a time slot a node successfully transmits
(collision-free), the node receives a payoff of 1 โ c
where c โ [0, 1] denotes the one-time transmission
cost and leaves the game.3
3. A faulty node may otherwise stay in the game and keep playing.
โข
In a time slot if a collision happens, every transmitting node receives a payoff of โc.
A detailed payoff function is described in Table A. Every
nodeโs goal is to maximize its payoff in a single time slot
and the game is repeated. Based on the game setting, we
can prove the existence of Nash equilibrium.
Theorem 1. There exists a Nash equilibrium that every node
adopts the same mixed-strategy: transmit with probability p(c, N ) in each time slot, where
โ
(9)
p(c, N ) = 1 โ N โ1 c.
Algorithm 2: Senator Selection
Input: Candidate-1, ..., S ;
Output: Senator-1,...,K ; validSenate.
1 Distance estimation and feedback
2 for i=1:S do
3
Based on the pilot signals received in the sortition
phase, candidate-i estimtes its distance to other
candidates and feeds back its distance vector dฬi .
4 EDM symmetry verification
T
5
6
Proof: The proof is based on [18]. See Appendix A
for details.
Remark 1. Theorem 1 indicates that by allowing every node
to be selfish, a symmetric equilibria exists, namely even
a faulty node cannot improve its payoff by changing
its transmission probability unilaterally. Specifically, if
it increases its transmission probability, there would be
more collisions and the payoff decreases due to cost c;
if it decreases its chance then its success chance also
decreases. The transmission cost per time slot c clearly
plays a critical role here, which denotes the relative
cost per transmission as compared with one successful
transmission. In practice, we propose that, aside from the
power and resource cost due to wireless transmissions,
an economic approach can be applied whereby a small
fee is charged for every sortition transmission to enhance
the robustness of the process.
7
8
9
10
11
12
13
14
15
ฮฃ , |Dฬ โ Dฬ |.
for Every element Dij in Dฬ do
if ฮฃij > โd then
Dฬij โ invalidValue.
Robust WNC generation
At every terminal, generate the WNC simultaneously
based on the same following procedure:
terminate โ false; X , [x1 , ..., xS ]T โ 0Sร2 ;
e โ 0S .
while terminate = false do
for {i, j} โ {1, ..., S} ร {1, ..., S} do
if Dij 6= invalidValue or 0 then
i
w โ ei e+e
;
j
ei โ
fโ
xi โ xi + ฮณf .
16
maxError โ maxi {ei };
errIndex โ arg P
maxi {ei }.
if maxError > ฮฒ Sei then
Remove candidate-errIndex, and its
corresponding entries in X , e and Dฬ ;
S โ S โ 1.
else
terminate โ true
17
5. Senator Selection
18
In this phase, the S candidates transmit in a round-robin
fashion. The detailed algorithm description of the phase is
presented in Algorithm 2, and some explanations follow.
19
20
5.1. Robust WNC Generation
21
The rationale for robust WNC generation is as follows.
In the face of EDM estimation error introduced by faulty
nodes, i.e., denote
22
Dฬ = D + E,
25
(10)
where the entries of E can be arbitrarily large considering
malicious behavior, our goal is to recover D . Towards this
end, two structures can be exploited: (a) although the faulty
nodes can cause arbitrarily large error, the error is sparse
in terms of entries of E , i.e., majority is still good; (b) the
EDM stems from space of limited dimensionality4 and hence
there are mature tools in distance geometry [19] that can be
utilized to verify its authenticity. Thereby, considering 2dimensional space, the EDM can be written as
T
D = โ2XX T + 1diag XX T + diag XX T 1T ,
(11)
4. We use 2-dimensional space for ease of exposition in this paper.
However, the generalization to 3-dimensional is considered straightforward.
23
24
|kxi โxj k2 โdหij |
ฮดw + (1 โ ฮดw)ei ;
dหij
|kxi โxj k2 โdหij |
w
(xi โ xj );
ห
dij
K -means clustering
if S < K then
validSenate โ false.
26
else
S โ Kmeans(X, K); validSenate โ true
27
return S ; validSenate.
where X โ RSร2 is the geographical location coordinates
T
of candidates, i.e., X , [x1 , ..., xS ] . We then formulate the
WNC generation problem as follows, exploiting the sparse
error property.
P1: minimize kEk0 , subj. (10), (11) and rank(X) = 2.
X,E
(12)
0
The ` norm based formulation in P1 is notoriously nonconvex and in fact NP-complete based on compressive
sensing theory. Therefore, the `0 norm in P1 is relaxed to `1
norm which often exhibits near optimal performance [22],
i.e.,
P2: minimize kEk1 , subj. (10), (11) and rank(X) = 2.
X,E
(13)
We adopt a data-driven gradient-descend-based method to
solve P2. Based on an estimation dหij , we can update xi (or
xj ) based on the gradient of the objective function in P2:
xi โ xi + ยต
โ kxi โ xj k22 โ dห2ij
โxi
,
(14)
which corresponds to the 15-step in Algorithm 2. Also
note that in the algorithm, we keep track of the local error
array e whose element ei represents the squared distance
error related to candidate-i; that is how much candidate-i
is levered in the seesaw test (Figure 2). Therefore in the
15-step, we take into account the fact that a candidate with
small error should not be updated based on the location of a
candidate with large error; the latter is likely to be a faulty
node. Based on this argument, we remove the candidate with
the largest error at the end of each round, until the error is
evenly distributed among candidates which means the error
is introduced by ranging estimation instead of faulty nodes.
In the case that the selected senators do not reach a
quorum of K , Algorithm 2 returns validSenate = false.
Intriguingly, this method is similar with the spring network based method where any pair of nodes are connected
by a spring in, e.g., [17], [23]; the objective in those works
is to minimize the elastic potential energy of the system
(equivalent with the total square error (TSE) of distance
prediction) given the current lengths of springs (distance estimations) by placing the nodes (the distances among nodes
are the rest lengths of the springs) on a plane. Although the
objective in P2 is not minimizing the TSE, the presented
data-driven gradient-descend-based method turns out to be
similar with the Vivaldi algorithm [23], except for the faulty
detection.
5.2. Analysis on Seesaw Test
The seesaw test is based on the rationale that a faulty
node implementing the shout attack can be detected because
its resultant location would be out of the 2D space. A question arises accordingly: how out-of-space the faulty node is
given a certain strength of its shout attack, and moreover
the effect of the number of good nodes. This question is
important because its answer can quantitatively characterize
the effectiveness of the seesaw test against forged locations.
In seeking for a concise and illustrative answer, we
consider a simplified scenario where there is one faulty
node, without loss of generality located at x0 = (0, 0), who
is trying to launch a shout attack to M good nodes located
at xm = (xm , ym ), โm โ 1, ..., M . Concretely, we consider
that the faulty node adds an arbitrary (independent with real
node-locations) error vector to the entries in the EDM that
are related to it; note that this is more general than the
shout attack whereby the error is added synchronously. The
arbitrary error is written based on (10) as
0
eT
E=
.
(15)
e 0M รM
Note that no ranging estimation error is considered in this
subsection to focus on the synthetic error by the faulty node.
The level of out-of-space of the faulty node is measured by
2
h(ฯ 2 ) , EX
min
min 2 Xฬ โ Z
,
Z, rank(Z)=2 e, kek1 =M ฯ
2
(16)
where Xฬ denotes the reconstructed coordinates of nodes
given the tempered EDM in (10) and (15). In other words,
the level is quantified by the minimum squared Euclidean
distance from the reconstructed coordinate space to its
projection into any 2D space, given that the faulty node
implements the attack that minimizes this distance. It is
essential to note the sequence of minimization, meaning
that the faulty node first chooses the error then the closest
2D space is selected. Since this quantity is affected by the
locations of good nodes by noting that closer good nodes
produce stronger lever force in the seesaw test given the
same strength of shout attack, the expectation in (16) is
taken over a given location distribution. In the following
theorem, we adopt the 2D Gaussian distribution for ease of
exposition.
Theorem 2. Assume that the faulty node is at (0, 0) with
the attack strength of kek1 = M ฯ 2 , and the good nodesโ
coordinates are i.i.d. generated based on a Gaussian
distribution with zero mean and variance of ฯ 2 , i.e.,
(xm , ym ) โผ (0, ฯ 2 I), โm โ 1, ..., M . When the error
e is independent with (xm , ym ), โm โ 1, ..., M , then
h(ฯ 2 ) = min (M โ 1)ฯ 2 , (M โ 2)ฯ 2 .
(17)
Proof: See Appendix B.
Remark 2. It is shown that a faulty node cannot conceal its lie by noting that h(ฯ 2 ) scales with the attack
strength ฯ 2 , until ฯ 2 is comparable with the squared
distance measurement (ฯ 2 ) whereby the attack becomes
quite obvious. In addition, the effect is amplified by
approximately M times; this is intuitive since it becomes
increasingly more difficult to lie to more good nodes
when they form a concrete 2D space. Another note is
that h(ฯ 2 ) > 0 as long as M โฅ 3, because at least 3
nodes can determine a 2D space.
Remark 3. The theorem assumes that the error matrix E is
independent with the coordinates of good nodes, which
requires that a faulty node is not aware of the coordinates
of other nodes (assumed mostly good nodes) in the
sortition phase; this is reasonable because the coordinate
information is not accessible in the sortition phase before
any distance feedback occurs.
Corollary
1. In L-dimensional space,
min (M โ L + 1)ฯ 2 , (M โ L)ฯ 2 .
h(ฯ 2 )
=
1
Byzantine consensus w/o Sybil attack
SENATE
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0
10
20
30
40
50
60
70
80
90
100
Figure 3. The probability a valid consensus is reached with 100 nodes.
Remark 4. This corollary generates the effectiveness of the
seesaw test to higher dimensions, e.g., 3D scenarios with
applications for, e.g., drone swarms.
6. Byzantine Agreement
In this phase, since we have removed Sybil nodes from
the selected senators to a great extent, basically any byzantine agreement protocol can be implemented among the K
senators. In particular, we adopt the Jack scheme proposed
in [21] which consists of the following two major stages:
โข
โข
Setup stage: Each senator broadcasts its initial value
and receives other senatorsโ initial values. Thereby,
each senator broadcasts its acceptable values and
a proposed value, jointly considering its and other
senatorsโ initial values.
Search stage: Rotating among (t + 1) predetermined leaders, in each round a leader receives
proposals from other senators and accordingly proposes a value based on its acceptable values; if an
agreement is reached based on proposals, the leader
would propose the agreed value. It is proved that
as long as one leader among the (t + 1) leaders is
a good node, a valid agreement would be reached.
Therefore, at most t faulty nodes are allowed in this
phase.
The validity is assured by the median validity specified
in Section 2. The termination and agreement properties
are also proved in [21]. In fact, this protocol achieves the
optimum safety and 2-approximate of the optimum median
validity.
7. Simulations
We run a computer simulation to test the performance
of SENATE. The ranging estimations at nodes are assumed
to be perfect, and the information exchange is simulated by
direct modifications of data arrays for nodes.
In Figure 3, where there are N = 100 nodes and
SENATE selects S = 50 candidates and K = 7 senators,
the number of faulty nodes is shown by x-axis and the
performance of consensus probability is shown which is
obtained by running the algorithms for 1000 episodes. The
node locations are randomly generated in a square with a
side length of 200 meter in each episode. The faulty nodes
are assumed to always launch Sybil attacks and propose
randomly generated values which are deviating from the true
values; specifically, the good and faulty nodesโ initial values
are uniformly randomly generated from interval [โ1, 1] and
[99, 101], respectively. In the figure, we also simulate the
Jack algorithm [21] without faulty nodes launching Sybil
attacks for comparisons; the Jack algorithm under this scenario and attack assumptions can ensure consensus when the
number of faulty nodes does not reach majority (50%), and
cannot otherwise; this is direct consequences of the design
of the Jack algorithm and the definition of median validity. It
is observed that SENATE perform close-to the conventional
BFT protocol as if there is no Sybil attack; this verifies
that SENATE is Sybil-proof. We also observe that SENATE
perform better when faulty nodes reach majority, which is
because the SENATE randomly selects the senators such that
there is a probability that the selected senators are dominated
by good nodes; the Jack algorithm can also perform, at least,
as well as SENATE if a sortition phase is added, but the
effect is not shown in the figure to be in line with the original
Jack algorithm.
8. Conclusion
SENATE is a real-time distributed BFT protocol which
is applicable to fully-connected wireless-networked systems without prior identity authentication. In order to
prevent malicious nodes to generate an arbitrary number
of pseudonyms, SENATE leverages the wireless signals
transmitted by nodes to cross-verify their identities in a
fully-decentralized (no-trust) manner, based on the fact
that pseudonyms are likely to be adjacent geographically.
Thereby, only selected nodes, i.e., senators, participate in
the final consensus reaching process. Computer simulations
show that SENATE is Sybil-proof, by comparing the consensus probabilities between systems wherein faulty nodes
launch and do not launch Sybil attacks, respectively.
Acknowledgement
This work is sponsored in part by the Nature Science
Foundation of China (No. 61701275, No. 91638204, No.
61571265, No. 61621091), the China Postdoctoral Science
Foundation, and Hitachi Ltd.
Appendix A.
Proof of Theorem 1
First, we invoke the following lemma which ensures the
existence of a Nash equilibrium.
Lemma 1 ( [24]). A finite symmetric game has a symmetric
mixed-strategy equilibrium.
The finite symmetric game in Lemma 1 denotes a game
wherein every player has the same finite action set, and
the payoff received by each player given the same action
(and other playersโ actions) is identical, irrespective with
the specific player. A mixed strategy is in contrast with a
pure strategy; the latter employs a fixed action each time
whereas the former can be viewed as a mix (randomized
strategy) of the latter. The proof of Lemma 1 is based on
the Brouwer fixed point theorem and is omitted for brevity.
Provided the existence of symmetric equilibria, we are
ready to derive the transmission probability p for every node.
Due to symmetry, it suffices to consider a single node, whose
game choice is shown in Table A.
TABLE 2. PAYOFF FUNCTIONS
All other nodes
are silent (p1 )
1โc
0
Transmit
Silent
Some other node
transmits (p2 )
โc
0
T
T
rank(Xฬ Xฬ ) โค rank(Xฬ Xฬ ) + rank(1eT ) + rank(e1T )
= 4.
(21)
In addition, the eigenspace is spanned by
T
eigenspace(Xฬ Xฬ ) = span{x, y, 1, e},
(22)
where x , [x1 , ..., xK ]T and y , [y1 , ..., yK ]T ; this can be
seen from the following equation.
1
1eT + e1T
2
I 0
= [x, y, 1, e]
[x, y, e, 1]T .
0 12 I
T
Xฬ Xฬ +
(23)
Expected payoff
(1 โ c)p1 โ cp2
0
N โ1
p1 = Pr{success} = (1 โ p)
;
p2 = Pr{collision} = 1 โ (1 โ p)N โ1 .
Note that we assume E is independent with Xฬ , and that the
power of the error is ฯ 2 , i.e.,
1eT + e1T
2
The probability of each event is
(18)
Based on the principle of indifference [25], both expected
payoffs should be zero, which yields (9) and concludes the
proof.
Appendix B.
Proof of Theorem 2
Based on (11), the EDM without error can be written as
T
D = โ2XX T + 1diag XX T + diag XX T 1T
h
i h
iT
T
= โ2XX T + 1 0, ฮฒ T
+
0,
ฮฒ
1T ,
(19)
0
0
2
T
=
where ฮฒ 0
,
d , ..., d2M 0 , and X
T 10
0 x1 ยท ยท ยท xM
T T
, [0, Xฬ ] . The attack is
0 y1 ยท ยท ยท yM
implemented on EDM and we can derive the resultant
coordinate covariance, which is tampered by the attack,
based on [19]:
T
T
First, we notice that the eigenspace of Xฬ Xฬ in (20) is at
most 4-dimensional (the other eigenvalues are zeros) by the
rank inequality
Xฬ Xฬ
1
T
T
T T T
=โ
D + E โ 1[0, ฮฒ T
+
e
]
โ
[0,
ฮฒ
+
e
]
1
0
0
2
"
# "
#!
T
0 0T
0 0
1
T
+
= XX +
2
0 1eT
0 e1T
"
#
0
0T
=
(20)
.
T
0 Xฬ Xฬ + 12 1eT + e1T
= ฯ 2 M.
(24)
โ
Since the error is assumed to be independent with the
coordinates and that i.i.d. Gaussian coordinate vectors are
uniformly directed in space, a constant share of the error
power is leaked out of the coordinate eigenspace spanned
by [x, y]. Considering the objective of the faulty node is to
minimize the leakage power beyond any 2D space, which
in this case is equivalent to maximizing the power in the 2D
space given that the total power is fixed, the best attack the
faulty node can implement is to concentrate its error power
to the same linear space spanned by 1, i.e.,
eopt = ฯ 2 1.
(25)
Note that the solution e = โeopt also satisfies the conditions,
T
however, it results in a negative eigenvalue of Xฬ Xฬ . This
violates with [26, Theorem 2] which proves an important
T
property of EDM that if Xฬ Xฬ is not positive-semi-definite,
then there exists at least three distance measurements violating the triangle inequality. In other words, a shout attack
may put the faulty node in a higher-dimensional space
whereas a whisper attack would lead to violation of the
triangle inequality which is much easier to spot.
Let us consider the minimization inside the expectation
in (16), this is an optimal low-rank approximation problem whose solution is well known to be the dominant 2dimensional singular space of Xฬ , i.e., the eigenspace of
T
Xฬ Xฬ . Denoting the singular value decomposition (SVD)
T
of Xฬ as Xฬ = Uฬ ฮฃฬVฬ (singular values are always arranged
in non-increasing order), then
T
Z opt = Uฬ 2 ฮฃฬ2 Vฬ 2 ,
(26)
wherein Uฬ 2 and Vฬ 2 denote the first two columns of Uฬ and
Uฬ , respectively, and ฮฃฬ2 contains the two dominant singular
values. It follows that the minimum projection error is
2
min
ZโRM รM , rank(Z)=2
Xฬ โ Z
2
2
= Xฬ โ Z opt
=
2
M
X
ฮฃ2i,i ,
i=3
(27)
which is the coordinate power leakage beyond 2D space
due to tampered EDM. To solve for this quantity, we
adopt the GramโSchmidt orthogonalization process on the
set {x, y, |ฯ|1} (given the optimal attack derived in (25)).
Based on symmetry that x and y are both i.i.d. Gaussian
distributed, it is clear that the direction of the third vector isโnot relevant and hence it is replaced by w where
w , ฯ 2 M [1, ..., 0]T with the same power. For brevity, the
detailed process is omitted as the orthogonal basis vectors
and the expected leakage power h(ฯ 2 ) are given as below:
u1 = x;
uT y
u2 = y โ 1 2 u1 ;
ku1 k2
uT w
uT w
u3 = w โ 1 2 u1 โ 2 2 u2 ;
ku1 k2
ku2 k2
h(ฯ 2 ) = min {E[uT
u
]}
i i
i={1,2,3}
=
min {M ฯ 2 , (M โ 1)ฯ 2 , (M โ 2)ฯ 2 }, (28)
i={1,2,3}
[9]
R. Guerraoui, N. Kneลพevicฬ, V. Quรฉma, and M. Vukolicฬ, โThe next
700 BFT protocols,โ in Proceedings of the 5th European Conference
on Computer Systems, ser. EuroSys โ10. New York, NY, USA: ACM,
2010, pp. 363โ376.
[10] M. Vukolicฬ, โThe quest for scalable blockchain fabric: Proof-ofwork vs. BFT replication,โ in Open Problems in Network Security,
J. Camenisch and D. Kesdogฬan, Eds. Cham: Springer International
Publishing, 2016, pp. 112โ125.
[11] Online; accessed 20-Mar-2018; https://neo.org/.
[12] T. Dasu, Y. Kanza, and D. Srivastava, โUnchain your blockchain,โ
in Proc. Symposium on Foundations and Applications of Blockchain,
vol. 1, 2018, pp. 16โ23.
[13] J. Newsome, E. Shi, D. Song, and A. Perrig, โThe Sybil attack
in sensor networks: Analysis & defenses,โ in Proceedings of the
3rd International Symposium on Information Processing in Sensor
Networks, ser. IPSN โ04. New York, NY, USA: ACM, 2004, pp.
259โ268.
[14] D. B. Faria and D. R. Cheriton, โDetecting identity-based attacks in
wireless networks using signalprints,โ in Proceedings of the 5th ACM
Workshop on Wireless Security. New York, NY, USA: ACM, 2006,
pp. 43โ52.
[15] M. Demirbas and Y. Song, โAn RSSI-based scheme for sybil attack
detection in wireless sensor networks,โ in Proceedings of the International Symposium on on World of Wireless, Mobile and Multimedia
Networks, Washington, DC, USA, 2006, pp. 564โ570.
[16] J. R. Douceur, โThe Sybil attack,โ in International Workshop on Peerto-Peer Systems. Springer, 2002, pp. 251โ260.
[17] N. Patwari, J. N. Ash, S. Kyperountas, A. O. Hero, R. L. Moses,
and N. S. Correal, โLocating the nodes: cooperative localization in
wireless sensor networks,โ IEEE Signal Process. Mag., vol. 22, no. 4,
pp. 54โ69, Jul 2005.
and the conclusion follows immediately.
[18] A. B. MacKenzie and S. B. Wicker, โSelfish users in Aloha: a gametheoretic approach,โ in IEEE Veh. Tech. Conf., vol. 3, 2001, pp. 1354โ
1357.
References
[19] I. Dokmanic, R. Parhizkar, J. Ranieri, and M. Vetterli, โEuclidean
distance matrices: Essential theory, algorithms, and applications,โ
IEEE Signal Process. Mag., vol. 32, no. 6, pp. 12โ30, Nov 2015.
[1]
S. Nakamoto, โBitcoin: A peer-to-peer electronic cash system,โ 2008.
[2]
F. Tschorsch and B. Scheuermann, โBitcoin and beyond: A technical
survey on decentralized digital currencies,โ IEEE Communications
Surveys Tutorials, vol. 18, no. 3, pp. 2084โ2123, thirdquarter 2016.
[20] J. MacQueen et al., โSome methods for classification and analysis
of multivariate observations,โ in Proc. the fifth Berkeley symposium
on mathematical statistics and probability, vol. 1, no. 14. Oakland,
CA, USA., 1967, pp. 281โ297.
[3]
I. Bentov, C. Lee, A. Mizrahi, and M. Rosenfeld, โProof of activity:
Extending Bitcoinโs proof of work via proof of stake,โ SIGMETRICS
Performance Evaluation Review, vol. 42, no. 3, pp. 34โ37, 2014.
[4]
Y. Gilad, R. Hemo, S. Micali, G. Vlachos, and N. Zeldovich,
โAlgorand: Scaling byzantine agreements for cryptocurrencies,โ in
Proceedings of the 26th Symposium on Operating Systems Principles.
New York, NY, USA: ACM, 2017, pp. 51โ68.
[5]
I. Eyal, A. E. Gencer, E. G. Sirer, and R. V. Renesse, โBitcoinNG: A scalable blockchain protocol,โ in 13th USENIX Symposium on
Networked Systems Design and Implementation (NSDI 16). Santa
Clara, CA: USENIX Association, 2016, pp. 45โ59.
[21] D. Stolz and R. Wattenhofer, โByzantine agreement with median
validity,โ in International Conference on Principles of Distributed
Systems (OPODIS), 2016, pp. 1โ14.
[22] E. J. Candรจs et al., โCompressive sampling,โ in Proc. international
congress of mathematicians, vol. 3. Madrid, Spain, 2006, pp. 1433โ
1452.
[23] F. Dabek, R. Cox, F. Kaashoek, and R. Morris, โVivaldi: A decentralized network coordinate system,โ SIGCOMM Comput. Commun.
Rev., vol. 34, no. 4, pp. 15โ26, Aug. 2004.
[24] J. F. Nash, โEquilibrium points in n-person games,โ Proceedings of
the national academy of sciences, vol. 36, no. 1, pp. 48โ49, 1950.
[6]
C. Cachin, โArchitecture of the Hyperledger blockchain fabric,โ in
Workshop on Distributed Cryptocurrencies and Consensus Ledgers,
2016.
[25] S. fen Cheng, D. M. Reeves, Y. Vorobeychik, and M. P. Wellman,
โNotes on equilibria in symmetric games,โ in International Workshop
On Game Theoretic And Decision Theoretic Agents (GTDT), 2004,
pp. 71โ78.
[7]
M. Castro and B. Liskov, โPractical byzantine fault tolerance,โ in
OSDI. Berkeley, CA, USA: USENIX Association, 1999, pp. 173โ
186.
[26] J. C. Gower, โEuclidean distance geometry,โ Math. Sci, vol. 7, no. 1,
pp. 1โ14, 1982.
[8]
D. Ongaro and J. Ousterhout, โIn search of an understandable consensus algorithm,โ in 2014 USENIX Annual Technical Conference
(USENIX ATC 14). Philadelphia, PA: USENIX Association, 2014,
pp. 305โ319.
| 7cs.IT
|
IEEE TRANSACTIONS ON SIGNAL PROCESSING
1
Estimation and Mitigation of
Channel Non-Reciprocity in Massive MIMO
arXiv:1706.04626v1 [cs.IT] 14 Jun 2017
Orod Raeesi, Student Member, IEEE, Ahmet Gokceoglu, Member, IEEE,
and Mikko Valkama, Senior Member, IEEE
AbstractโTime-division duplex (TDD) based massive MIMO
systems rely on the reciprocity of the wireless propagation channels when calculating the downlink precoders based on uplink
pilots. However, the effective uplink and downlink channels
incorporating the analog radio front-ends of the base station
(BS) and user equipments (UEs) exhibit non-reciprocity due to
non-identical behavior of the individual transmit and receive
chains. When downlink precoder is not aware of such channel
non-reciprocity (NRC), system performance can be significantly
degraded due to NRC induced interference terms. In this work,
we consider a general TDD-based massive MIMO system where
frequency-response mismatches at both the BS and UEs, as well
as the mutual coupling mismatch at the BS large-array system
all coexist and induce channel NRC. Based on the NRC-impaired
signal models, we first propose a novel iterative estimation
method for acquiring both the BS and UE side NRC matrices and
then also propose a novel NRC-aware downlink precoder design
which utilizes the obtained estimates. Furthermore, an efficient
pilot signaling scheme between the BS and UEs is introduced
in order to facilitate executing the proposed estimation method
and the NRC-aware precoding technique in practical systems.
Comprehensive numerical results indicate substantially improved
spectral efficiency performance when the proposed NRC estimation and NRC-aware precoding methods are adopted, compared
to the existing state-of-the-art methods.
Index TermsโBeamforming, channel non-reciprocity, channel
state information, frequency-response mismatch, linear precoding, massive MIMO, mutual coupling, time division duplexing
(TDD).
I. I NTRODUCTION
M
ASSIVE MIMO is one of the key potential technologies
for upcoming 5G systems [1] where base stations (BSs)
deploy very large antenna arrays, e.g., several tens or hundreds
of antenna units per array, to facilitate high beamforming and
spatial multiplexing gains. In such systems, it is not feasible
to transmit downlink pilots from each BS antenna in order to
estimate the corresponding spatial channels at user equipments
(UEs) and feedback the channel state information (CSI) to BS,
as the amount of overhead in such approach is proportional
to the number of antennas in the BS side [2]. Massive MIMO
O. Raeesi, A. Gokceoglu, and M. Valkama are with the Department of Electronics and Communications Engineering, Tampere University of Technology,
Tampere 33720, Finland (e-mail: [email protected]; [email protected];
[email protected]).
This work was supported by the Finnish Funding Agency for Technology
and Innovation (Tekes) under the project โ5th Evolution Take of Wireless
Communication Networks (TAKE-5)โ, by the Academy of Finland under the
projects 284694 and 288670 and TUT Graduate School.
This work has been submitted to IEEE for possible publication. Copyright
may be transferred without notice, after which this version may no longer be
accessible.
systems are thus envisioned to primarily deploy time-division
duplex (TDD) based radio access and rely on the reciprocity
of the physical uplink and downlink channels when obtaining
CSI at BS. This, in turn, requires substantially smaller pilot
or reference signal overhead being only proportional to the
number of UEs [3].
While it is a common assumption in TDD systems that the
physical propagation channels are reciprocal within a coherence
interval [2], [3], the impacts of the BS and UE side transceiver
analog front-ends on the effective downlink and uplink channels
are not reciprocal. This hardware induced phenomenon is often
referred to as the channel non-reciprocity (NRC) problem [4],
[5]. Typically, the mismatches in the frequency-responses (FRs)
of both the BS and UE side radio front-ends at transmit and
receive modes are seen as the main cause of NRC. Another
source of NRC considered in literature is the differences in
mutual coupling (MC) of BS antenna units and associated RF
transceivers under transmit and receive modes [6], [7].
The impacts of the NRC on the achievable system performance have been studied in various works in the recent
literature. To this end, [5] provides downlink sum-rate analysis
for a general multi-user MIMO system with zero-forcing
(ZF) and eigen-beamforming types of precoding under NRC
due to FR mismatch. Then, specifically focusing on massive
MIMO systems, [8], [9] study achievable downlink sum-rates
for maximum-ratio transmission (MRT) and ZF precoding
schemes, demonstrating significant performance degradation
under practical values of the NRC parameters.
There is also a large amount of work reported in the literature
addressing the estimation and mitigation of NRC in TDD based
MIMO systems [2], [4], [6], [10]โ[16]. These studies can be
divided into three main categories as follows:
i) BS carries out โself-calibrationโ using a reference antenna
with the help of additional circuitry [4], [6]. This method
is capable of estimating BS side NRC only.
ii) BS carries out โself-calibrationโ without additional circuitry. Mutual coupling between antennas is utilized when
exchanging pilot signals with the reference antenna [2],
[10]โ[13]. Similar to i), also this method estimates only
the BS side NRC, and also commonly neglects the mutual
coupling mismatch.
iii) BS transmits specific pilot signals to UEs and UEs send
back the received signals in certain properly precoded
forms to facilitate BS side NRC parameter estimation,
which is often referred to as over-the-air (OTA) approach
[6], [14]โ[16].
2
In this work, we focus on OTA-based estimation and
mitigation of NRC in a multi-user massive MIMO system
context deploying MRT or ZF precoding. The novelty and
contributions of this paper can be summarized as follows:
IEEE TRANSACTIONS ON SIGNAL PROCESSING
element-wise and return real and imaginary parts of complexvalued arguments, respectively. The element in the iโth row
and jโth column of matrix V is represented by vij , whereas
the iโth element on the main diagonal of a diagonal matrix
C is shown by ci . The complex-valued zero-mean circularly
symmetric Gaussian
distribution with variance ฯ 2 is denoted
2
as CN 0, ฯ . Finally, In and 0n denote the n ร n identity
and all-zero matrices, respectively.
1) We consider generalized NRC induced by coexisting FR
mismatches of all associated radio transceivers at UE and
BS sides as well as the mutual coupling mismatches in
the BS side large-array antenna system, unlike many of
the earlier works that consider only FR mismatch such as
II. S YSTEM M ODEL AND P ROBLEM F ORMULATION
[2], [4], [10]โ[16]. In this respect, only [6] reports similar
We consider a TDD based single-cell multi-user downlink
modeling, however, the proposed mitigation scheme in
transmission
scenario where the BS with a large number of
[6] is suitable mainly for small scale MIMO systems, e.g.,
antenna
units,
denoted by N , transmits to K single-antenna UEs
2-4 BS antennas.
simultaneously
in the same time-frequency resource, where
2) We address the estimation and mitigation of the NRC
N
K.
All
signal
and system models are written for an
sources of both the UE and BS sides, unlike many other
arbitrary
subcarrier
of
the underlying orthogonal frequency
works that address only BS side NRC, e.g., [2], [4], [10]โ
division
multiplexing/multiple
access (OFDM/OFDMA) wave[13], [15]. As shown in [17], with popular assumption of
form,
that
is,
before
IFFT
and
after FFT on the TX and RX
not having downlink demodulation pilots, UE side NRC
sides,
respectively.
can be a major cause of performance degradation in multiIn an ideal TDD massive MIMO system, the effective uplink
user massive MIMO systems, thus strongly motivating
and
downlink channels consist of only the reciprocal physical
to incorporate such effects in the NRC estimation and
channels.
Building on that, the downlink transmission is done
mitigation processes.
by
beamforming
the multi-user downlink data based on the
3) Unlike other massive MIMO NRC mitigation works [2],
estimated
channels
from uplink pilot sequences of length ฯu
[10]โ[13] which all assume the availability of downlink
symbols
[2],
[3].
In
this work, we assume the same procedure
pilots in the UE side, we consider the appealing massive
for
the
downlink
transmission,
however, we consider more
MIMO scenario in which there are no downlink pilots
generalized
uplink
and
downlink
effective channel models
and thus UEs rely on the statistical properties of the
which
are
non-reciprocal
due
to
radio
front-end mismatches
beamformed channels to decode the received downlink
and
non-idealities.
In
this
respect,
the
uplink
model for channel
signals [8], [18]โ[21].
estimation
phase
[18]
and
the
corresponding
downlink
received
4) We demonstrate the performance of our proposed scheme
signal
model
in
beamformed
data
transmission
phase
under
under imperfect uplink CSI, unlike other works which
the
non-reciprocal
effective
channels
can
be
expressed
as
commonly rely on the perfect uplink CSI assumption [4],
โ
[11]โ[13], [15].
Uplink Training :
Y = ฯu ฯu G + Zu
(1)
โ
The organization of the paper is as follows. Fundamental
Downlink Transmission :
r = ฯd Hx + zd ,
signal models of the considered massive MIMO system with
where x denotes the precoded user data, whereas G and H
MRT and ZF-based precoding schemes under NRC are first
are the effective non-reciprocal uplink and downlink multipresented in Section II. Then, the NRC-aware downlink
user MIMO channels, respectively, which will be elaborated in
precoding approach is formulated for given NRC estimates. In
detail later in Section II-A. Zu is the processed noise matrix at
Section III, novel pilot signaling method between the BS and
the BS, while zd denotes the UE side multi-user thermal noise
UEs is introduced which is followed by the proposed novel
vector, both assumed to consist of i.i.d. CN (0, 1) elements.
iterative estimation of BS and UE side NRC matrices. The
The average signal to noise ratios (SNRs) in the uplink and
results of empirical performance evaluations in terms of the
downlink are denoted as ฯu and ฯd , respectively. This basic
achievable system spectral efficiency are presented in Section
system framework is largely based on and following the seminal
IV, incorporating the proposed estimation-mitigation scheme towork by Marzetta in [18], [22] where reciprocal channels were
gether with existing state-of-the-art NRC estimation/mitigation
assumed.
methods for reference. Finally, conclusions are drawn in Section
V.
A. Effective and Relative Uplink and Downlink Channels
Notations: Throughout the paper, vectors and matrices are
As illustrated in Fig. 1, the complete description of the
denoted with lower and upper case bold letters, respectively,
โ
T
H
uplink
and downlink effective channels appearing in (1) can
e.g., vector x, matrix Y. The superscripts (.) , (.) , (.) , and
โ
be
expressed
as
(.) indicate complex-conjugation, transposition, Hermitian)
transpose, and Moore-Penrose pseudo inverse operations,
G = Er PFt
โ H 6= GT ,
(2)
respectively. Expectation operator is shown by E[.], while
H = Fr PT Et
Tr (.) represents the trace operator. diag (.) operator transforms
a vector v to a diagonal matrix with the elements of v at with Er = Lr Mr and Et = Mt Lt . In above, F is the joint
its diagonal, and vice versa, reads the diagonal elements of frequency-response matrix of the UEs, L is the frequencythe input matrix into a column vector. <{.} and ={.} work response matrix of the BS, M is the mutual coupling matrix
MITIGATION OF CHANNEL NON-RECIPROCITY IN MASSIVE MIMO SYSTEMS
UE #1
f1TX
f 2TX
l1RX
RX
m21
mNRX1
UE #2
Multi-user
MIMO
Propagation
Channels
P
UE #K
f KTX
B = IN + B0 , where B0 accounts for the deviation of diagonal
and off-diagonal entries from the ideal reciprocal response.
The detailed modeling of the entries of the above matrices
is based on the practical NRC modeling introduced in [6], in
which ฯF2 is denoting the variance of diagonal elements in Ft
and Fr , while the corresponding variance of diagonal elements
in Lt and Lr is denoted by ฯL2 . The power of elements in Mt
and Mr is controlled by input reflection coefficients which
2
have the variance ฯM
.
The characterization as given in (2) and/or (3) is generally
referred to in literature as channel non-reciprocity [5], [6].
The ideal reciprocal channel model is a special case where
A = B = I, i.e., A0 = B0 = 0.
Base
Station
m11RX
Mutual
Coupling
l2RX
m12RX
mNRX2
RX
m22
m1RNX
m2RNX
3
lNRX
RX
mNN
(a)
Base
Station
l1TX
l2TX
lNTX
B. Channel Estimation and Beamforming under NRC
Mutual
Coupling
m11TX
UE #1
f1RX
TX
m21
mTNX1
m12TX
mTNX2
UE #2
Multi-user
MIMO
Propagation
Channels
TX
m22
f 2RX
PT
m1TNX
m2TXN
First, we shortly address the influence of NRC when the
downlink transmission is carried out without any processing
against the NRC, i.e., NRC-blind precoding is adopted. In
this respect, the required downlink channel estimate in BS is
obtained from the orthogonal uplink training signals, with
the observation model given already on the first line of
(1), complemented, e.g., with LMMSE channel estimator as
described in [18], [22]. This yields formally
UE #K
Hฬ = GฬT ,
f KRX
TX
NN
m
(b)
Fig. 1. Basic system models for (a) uplink and (b) downlink transmission
and reception including physical propagation channels, transceiver frequency
responses and antenna mutual coupling in the devices.
(4)
where Hฬ and Gฬ are the estimated downlink and uplink effective
channels, respectively.
Using the estimated downlink effective channel in (4),
T
the user data vector s = [s1 , ..., sK ] โ CK which is
assumedh to have
element-wise power normalization of the
i
2
form E |sk | = 1, is precoded as
of the BS, P is the reciprocal physical channel, while the
x = Us,
(5)
subscripts t and r denote the transmitting and receiving modes,
respectively. Note that the frequency-response matrices, F and where the NRC-blind linear precoding matrix U reads [22]
๏ฃฑ
L, are diagonal, while the mutual coupling matrix M in general
๏ฃฒฮฒ HฬH ,
for MRT
has both non-zero diagonal and off-diagonal entries.
โ1
U=
(6)
In general, the effective channels with above assumptions
๏ฃณฮฒ HฬH HฬHฬH
,
for ZF.
and modeling are clearly non-reciprocal, i.e., H 6= GT , due to
differences in the TX and RX modes of the radio front-end In above, without loss of generality, the scalar ฮฒ can be chosen
and array responses, i.e., Ft 6= Fr , Lt 6= Lr and Mt 6= MT
r . to satisfy unit average transmit power constraint as [18]
Hence, the effective uplink and downlink channels can be
q
โ1
described relative to each other as
ฮฒ=
E[Tr (UH U)]
.
(7)
H = AGT B,
(3)
C. Received Signal at UE under NRC
โ1
T โ1
where, A = Fr Fโ1
and
B
=
L
M
M
L
.
t t
t
r
r
The multi-user received downlink signal vector is given by
In general, A is a diagonal matrix and the kโth diagonal the second line of (1). Plugging the precoded symbol vector
entry, denoted as ak , corresponds to the frequency-response expression in (5) into (1), the received signal for kโth user
ratio of kโth UE at TX and RX modes. In the following, corresponding to the kโth element of r can be written as
similar to [5], [6], [8], we will use the decomposition of the
K
X
form A = IK + A0 , where the diagonal matrix A0 measures
โ
โ
rk = ฯd ฮฒhT
u
s
+
ฯ
ฮฒ
hT
(8)
d
k k k
k ui si + zd,k ,
the deviation from unity frequency-response ratio. The kโth
i=1,i6
=
k
diagonal entry of A0 is denoted as a0k , such that ak = 1 + a0k .
In (3), B is a full matrix that incorporates both the frequency- where uk and hT
k denote the kโth column and row vectors of the
responses and mutual coupling at the BS side. In the following, precoder and effective downlink channel matrices, respectively.
for notational convenience, we will use the decomposition Notice that by denoting the kโth column of the uplink effective
4
IEEE TRANSACTIONS ON SIGNAL PROCESSING
channel matrix as gk , the effective downlink channel towards
the kโth user can be expressed as
T
hT
k = ak gk B.
(9)
In general, conventional MIMO systems employ downlink
pilots to acquire downlink CSI for detection purposes. However,
in massive MIMO systems, as shown in [8], [18]โ[21], it
is generally assumed that UEs employ only the statistical
properties of the beamformed channel, namely E ฮฒhT
k uk ,
as the downlink CSI to decode the received signal. This
assumption is justified by the law
of large numbers which
T
implies that hT
u
โ
E
h
u
k k
k k , commonly known as the
channel hardening concept [22], [23]. Utilizing such approach
in acquiring downlink CSI in UEs eliminates the need for
sending downlink pilots which directly reduces downlink
overhead. Building on this and plugging (9) into (8), the
received signal under NRC can be re-written in a general
form as
โ
(10)
rk = ฯd E ฮฒhT
k uk sk + zSI,k + zIUI,k + zd,k ,
where the self-interference (SI), zSI,k , and inter-userinterference (IUI), zIUI,k , are given by
โ
zSI,k = ฯd ฮฒ ak gkT Buk โ E hT
sk
k uk
zIUI,k =
โ
ฯd ฮฒ
K
X
ak gkT Bui si .
(11)
i=1,i6=k
Based on (11), it can be clearly observed that the NRCblind precoder u which is constructed based on the estimated
uplink effective channel Gฬ, through Hฬ = GฬT , cannot take
into account the NRC effects from ak and B, which results
into increased interference levels and thus reduced downlink
spectral efficiency. This is illustrated through an elementary
system spectral efficiency evaluation in Fig. 2, with the detailed
evaluation assumptions being described in Section IV. It can be
noticed that in particular in the ZF precoder case, NRC-blind
precoding results into substantial performance degradation,
hence strongly motivating to develop efficient NRC estimation
and mitigation techniques.
D. NRC-Aware Downlink Precoding Principle
As shown in Section II-C above, if MRT and/or ZF precoders
are applied naively without accounting for NRC, there are
additional SI and IUI terms that can substantially degrade
the quality of the received signal at the UE side. Here, we
introduce a novel NRC mitigation approach, called NRC-aware
precoding, which seeks to cancel out the effects of NRC by
properly modifying the precoder.
Assuming that the BS has already estimates of the NRC
matrices A and B, denoted by Aฬ and Bฬ, the NRC-aware
precoding approach transforms the basic linear precoders given
in (6) as
Unrc = Bฬโ1 UAฬโ1 .
(12)
Note that, in the special case where the NRC estimation method
is capable of estimating the BS side NRC only, (12) reduces
to Unrc = Bฬโ1 U.
Fig. 2. Spectral efficiency vs. downlink SNR (ฯd ) for N = 100, K = 20,
ฯu = K, ฯu = 0 dB, T = 250.
The system spectral efficiency performance with the NRCaware precoder, assuming ideal NRC estimates, is shown in
Fig. 2. As can be observed, the NRC-aware precoder achieves
the ideal system performance, i.e., the performance with fully
reciprocal channels. The evaluation setup and details of spectral
efficiency calculations will be described in Section IV.
III. P ROPOSED E STIMATION OF NRC M ATRICES
The NRC mitigation method, i.e., the NRC-aware precoder
described in Section II-D requires the knowledge of the
matrices A and B at the BS. The information about these
matrices is not readily available, hence calling for efficient
estimation approaches. Thus, in this section, we will propose
a novel iterative OTA estimation framework for acquiring
accurate estimates of A and B, based on a novel pilot signaling
concept between the BS and UEs.
2
In general, the NRC variances ฯF2 , ฯL2 , ฯM
, and the corresponding realizations of the elements of A and B depend
on hardware characteristics and operating conditions, e.g.,
temperature, which vary slowly in time. Thus, the NRC
characteristics and the corresponding realizations of A and
B can be assumed to stay constant over many propagation
channel coherence intervals [14]. Therefore, it is sufficient to
perform the NRC estimation very infrequently, e.g, once in
every 10 minutes or once a day [2], [10], which makes the
estimation overhead negligible, when compared to signaling
and pilot overhead that commonly rises from channel estimation
procedures.
A. Proposed Pilot Signaling
In order to estimate the matrices A and B, we propose the
following round-trip pilot signaling approach:
1) BS transmits an N ร N orthonormal pilot matrix Xnrc .
2) Upon reception, without decoding, UEs send back the
conjugated versions of the received signals.
Based on the above scheme, the received multi-user signal
matrix at UE side can be written as
p
Rnrc = ฯฬd HXnrc + Zฬd ,
(13)
MITIGATION OF CHANNEL NON-RECIPROCITY IN MASSIVE MIMO SYSTEMS
5
CSI and NRC estimation
( test )
CSI
acquisition
Uplink
pilots
ttra
test
NRC
acquisition
Downlink
pilots
Uplink
pilots
Downlink
Uplink
Downlink
Uplink
Fig. 3. Assumed radio frame or sub-frame structure incorporating CSI and NRC estimation as well as actual data transmission phases.
where ฯฬd is the downlink SNR and Zฬd is the K ร N multiuser receiver noise matrix with i.i.d. CN (0, 1) entries. The
tilde sign is used in above and what follows to distinguish
these variables between the actual data transmission and pilot
signaling phases. Then, the corresponding received signal at
BS with the UEs sending back the conjugated version of (13)
reads
p
Ynrc = ฯฬu GRโnrc + Zฬu
p p
(14)
= ฯฬu ฯฬd GHโ Xโnrc + Zฬtot ,
processed received signal in (15) and the corresponding UL
channel estimate are available at multiple parallel sub-carriers
in an OFDM/OFDMA based radio system. Hence, the above
iterative estimation scheme can be carried out in a per subcarrier
manner as well. Furthermore, as mentioned in [6], transceiversโ
baseband-to-baseband behavior can be modeled by allpass-like
transfer functions, therefore it is reasonable to assume that
the NRC matrices A and B are largely similar over a set of
adjacent subcarriers Csc where typically Csc โค 10, whereas G
is subject to variations depending on the frequency selectivity
of the propagation channels. Based on these assumptions, the
estimates Aฬ and Bฬ can be obtained by averaging the per
subcarrier estimates over Csc neighboring subcarriers, i.e.,
where ฯฬu is the uplink SNR and Zฬu is the N ร N BS receiver
noise matrix with i.i.d. CN (0, 1) entries. Theโtotal effective
noise matrix seen at BS is denoted as Zฬtot = ฯฬu GZฬโd + Zฬu .
In above, the duration of the described overall NRC-related
Csc
1 X
pilot signaling is 2N symbols where the uplink and downlink
Aฬ =
Aฬl
channels are assumed to be fixed. The coherence time of the
Csc
l=1
(16)
physical channels is typically in the order of several hundred
Csc
X
1
symbol intervals, determined mostly by the mobility of the
Bฬ =
Bฬl ,
Csc
UEs and the system center-frequency. Hence, we assume
l=1
a scenario where the coherence time is at least 2N + K
where l denotes the subcarrier index. Next we will present the
symbols, taking into account both NRC-related pilot signaling
actual proposed methods to obtain the estimates for A and B.
and uplink channel estimation. As mentioned in the previous
To simplify the notation, we will drop the subcarrier index l.
section, matrices A and B are expected to change very slowly
compared to channel coherence time and hence it is assumed
that their values are fixed during the above pilot signaling. C. Proposed Estimation of B
Fig. 3 illustrates the overall assumed radio frame or subAs described earlier, Bฬ is iteratively refined using the current
frame structure of the considered massive MIMO TDD system estimate of A. The proposed estimator builds on solving the
including the proposed NRC estimation phase.
matrix equation in (15) based on minimizing the Frobenius
norm criterion. With this setting, the refined estimate of B can
be formulated as
B. Overall Estimation Framework
2
p p
โ
T
As the initial step in estimating A and B, the BS processes
Bฬ(m
+
1)
=
argmin
Q
โ
ฯฬ
ฯฬ
Gฬ
Aฬ(m)
Gฬ
B
,
u
d
โ
F
the received signal Ynrc in (14) as Q = Ynrc
XH
B
nrc . Since
(17)
the pilot matrix Xnrc has the property XH
nrc Xnrc = IN , the
where the subscript F denotesโthe โ
Frobenius norm.
processed signal can be expressed as
Next, by denoting T(m) = ฯฬu ฯฬd Gฬโ Aฬ(m)GฬT , we have
p p
Q = ฯฬu ฯฬd Gโ AGT B + V,
(15) the following identity
K
where the processed noise matrix is given by V = Zฬโtot XH
X
nrc .
2
2
||Q โ T(m)B||F =
||qj โ T(m)bj || ,
(18)
Now the target is to estimate A and B from (15) assuming
j=1
that the BS has the uplink channel estimate Gฬ. In this respect,
denoting the estimates at mโth iteration as Aฬ(m) and Bฬ(m), where qj and bj denote the jโth column of Q and B,
we propose the following iterative estimation framework:
respectively. Since the jโth term in the sum depends only
1) Initialize, Aฬ(0) = IK , obtain the estimate Bฬ(1).
on bj , minimizing the total sum is equivalent to separately
2) Substitute Bฬ(1) for B in (15) and obtain estimate Aฬ(1). minimizing each term ||qj โ T(m)bj ||2 . Thus, the estimation
3) Successively refine the estimates Aฬ and Bฬ by fixing the of matrix B is eventually simplified to estimation of each
current value of one and solving for the other from (15). column of B, independently.
In above, IK is used for initialization since the deviation
As mentioned earlier, the BS NRC matrix incorporates both
matrix A0 in A = IK + A0 is in practice small. Notice that the the frequency-responses and mutual coupling at the BS side.
6
IEEE TRANSACTIONS ON SIGNAL PROCESSING
๏ฌ /2
The solution to (20) is then given by
๏ฌ /2
โ
red
bฬred
j (m + 1) = Tj (m) qj .
๏ญ D ๏ฝ 0, C ( D ) ๏ฝ 0
๏ญ D ๏ฝ 1, C ( D ) ๏ฝ 4
๏ญ D ๏ฝ
2, C (D) ๏ฝ 8
corresponding antenna unit
Fig. 4. Illustration of sparsity threshold D on 10 ร 10 rectangular BS antenna
grid with ฮป/2 antenna spacing.
The power of mutual coupling between two different antenna
units is related to their physical distance, thus the off-diagonal
elements in B become smaller as the distance between the two
corresponding antenna units increases. Here, in estimating the
BS NRC matrix B, we treat those off-diagonal entries which
are corresponding to two antennas with a distance larger than
a pre-defined threshold, called sparsity threshold D, as zeros,
yielding a sparse matrix structure for Bฬ. We also define the
maximum number of coupled neighboring antenna elements as
C(D). In Fig. 4 an example 10 ร 10 rectangular antenna layout
with ฮป/2 antenna spacing between the neighboring elementsโis
shown with 3 different values of D, namely D = 0, 1 and 2,
measured as multiples of ฮป/2. When D = 0, it is assumed that
there is noโmutual coupling and C(D) = 0, whereas for D = 1
and D = 2, the central antenna elements are coupled with at
most C(D) = 4 and C(D) = 8 closest neighboring antenna
elements. Note that, the antenna elements close to the edges of
the grid are coupled with less number of antenna units. This is
illustrated in Fig. 4 where for D = 1, the bottom left antenna
element is assumed to be coupled with only 2 โค C(1) = 4
antennas.
The following column-wise estimator will build on the
assumption that B has a sparse structure and the number of
non-zero row entries in any column j, denoted as Rj , satisfies
Rj โค R (D) ,
(19)
where R(D) = C(D)+1. It is further assumed that the index of
non-zero entries of bj are known, which is directly determined
by the antenna system architecture and geometry, and the
assumed pre-defined coupling threshold discussed above. With
these assumptions, we define a reduced vector of dimension
Rj ร 1, bred
j , that contains the non-zero entries of bj . If the
jโth row is kept when constructing bred
j , then similarly, the
jโth column is kept to construct Tred
(m).
Based on these, we
j
can formulate the estimation of columns of Bฬ(m + 1) through
a reduced system of equations as
red
red
bฬred
j (m + 1) = argmin qj โ Tj (m)bj
bred
j
2
.
(20)
(21)
Once the bฬred
j (m + 1) is solved from (21), then bฬj (m + 1)
can be obtained straightforwardly by appending zeros to the
appropriate rows.
Note that, when A โ IK , we also have Gโ AGT โ Gโ GT ,
โ
where the matrix Gโ GT = GGH is positive semi-definite
matrix and of rank K if G is of rank K. The obtained bฬred
j
and the corresponding minimum expression from (20) depend
on the corresponding values of K and D. The column space of
Tred
j (m) has higher dimensionality for larger K. Thus, when
D is fixed, for larger K one can solve for bฬred
from (21)
j
red 2
which yields smaller values of qj โ Tred
(m)b
.
j
j
D. Proposed Estimation of A
Next, given Bฬ(m) from (17), the (refined) estimate of A
can be formulated based on minimizing the Frobenius norm
criterion as
2
p p
Aฬ(m) = argmin Q โ ฯฬu ฯฬd Gฬโ AGฬT Bฬ(m) . (22)
F
A
For diagonal A, the solution to (22) can be obtained as
Aฬ(m) = diag ฮพฬ .
(23)
where ฮพฬ = [IK , iIK ] ฯฬ and the vector ฯฬ is given as
๏ฃซ
๏ฃถโ1
N
N
X
X
ฯฬ = ๏ฃญ
WฬjT Wฬj ๏ฃธ
WฬjT qฬj .
j=1
(24)
j=1
T T
In above, qฬj = <{qT
and defining the
N ร
j }, ={qj } ,
h
i
โ โ
N matrix Wj =
ฯฬu ฯฬd Gฬโ diag GฬT Bฬ(m)
, with
j
h
i
GฬT Bฬ(m) being the jโth column of GฬT Bฬ(m), Wฬj is given
j
as
"
#
<{Wj }, โ={Wj }
Wฬj =
.
(25)
={Wj }, <{Wj }
Proof: See Appendix.
IV. N UMERICAL E VALUATIONS AND A NALYSIS
A. Basic Evaluation Settings and Performance Measures
In this section, by using extensive computer simulations,
we evaluate the performance of the proposed NRC estimation
and mitigation scheme. We also compare its performance to
the performance of two other existing schemes in literature,
namely the direct-path based least squares (LS) known as
โArgosโ [2] and the generalized neighbor LS [11]. The latter is
the optimized version of the generalized LS method presented
in [10] and is shown in [11] to have the best performance
amongst several existing NRC estimation methods. Both LS
based methods estimate the BS NRC by the means of mutual
coupling between BS antennas, while they depend on the
downlink pilots to compensate the NRC in the UE side.
where the expectation is over different NRC realizations and
channel coherence intervals. The length of downlink pilots in
symbols is denoted by ฯd and T is the total number of symbols
in a channel coherence interval. SINR is the instantaneous
signal to interference and noise ratio (SINR), which can be
written, based on (8), as
โ
2
ฯd ฮฑฬk sk
SINR =
(27)
โ
2,
rk โ ฯd ฮฑฬk sk
where ฮฑฬk is the scaling of the useful signal term available at
the receiver of the kโth UE. In the context of the proposed NRC
estimation and mitigation method, no DL CSI pilots are used.
Hence, for the proposed estimation method, ฮฑฬk = E ฮฒhT
k uk .
On the contrary, the other two estimation methods utilizes
ฯd โฅ K downlink pilots for DL CSI acquisition as described
in [22].
The other relevant performance metric is the normalized
mean squared error (MSE) for NRC estimation which is defined
as
๏ฃฑ
2
๏ฃด
๏ฃด
B โ Bฬ
๏ฃด
๏ฃด
F
๏ฃด
๏ฃด
,
for BS side
๏ฃฒ
2
||B||F
2
(28)
ฮดe =
2
๏ฃด
๏ฃด
diag (A) โ diag Aฬ
๏ฃด
๏ฃด
F
๏ฃด
๏ฃด
,
for UE side.
๏ฃณ
2
||diag (A)||F
10!1
Proposed method - D = 0
Proposed method - D = 1p
Proposed method - D = 2
BS
10!2
UE
10!3
-40
-35
-30
-25
-20
-15
-20
-15
2
<M
(dB)
(a)
120
Spectral E/ciency (bits/s/Hz)
We consider the DL spectral efficiency as the key performance metric, which is defined as
ฯu + ฯd
ฮทs = K 1 โ
E [log2 (1 + SINR)] ,
(26)
T
7
NRC Estimation Normalized MSE (/e2 )
MITIGATION OF CHANNEL NON-RECIPROCITY IN MASSIVE MIMO SYSTEMS
100
Reciprocal Channel
ZF
p
Proposed method - D = 2
Proposed method - D = 1
Proposed method - D = 0
No NRC mitigation
80
60
40
-40
MRT
-35
-30
-25
2
<M
(dB)
(b)
Fig. 5. (a) NRC estimation normalized MSE and (b) system spectral efficiency
2 ) for different values of the sparsity
vs. input reflection coefficients variance (ฯM
threshold D with N = 100, K = 20, ฯu = K, ฯu = 0 dB, T = 250.
As a baseline simulation scenario, we consider a BS which is
equipped with N = 100 infinitely thin ฮป/2 dipole antennas in a
10 ร 10 square layout with ฮป/2 spacing as illustrated in Fig. 4.
The input and the mutual impedances are computed based
subcarriers, Csc = 10, over which the NRC realizations are
on [24] for the assumed carrier-frequency of fc = 3.5 GHz.
assumed to be constant. Finally, the variances of transceivers
The impedances are assumed to be frequency-independent, as
frequency-responses in both BS and UE side are assumed to
the modulated signal RF bandwidth is much smaller than the
be โ20 dB, i.e., ฯL2 = ฯF2 = โ20 dB. These are the baseline
carrier frequency. The uplink channel matrix G is assumed
simulation settings, while some of the parameter values are
to have i.i.d. CN (0, 1) elements. The BS serves K = 20
also varied in the evaluations.
single-antenna UEs simultaneously on the same time-frequency
resource through either ZF or MRT precoding. We assume
a scenario where each coherence interval contains T = 250 B. Numerical Results
OFDM symbols. The number of uplink pilots sent by each UE
1) Effect of Sparsity Distance Threshold D: Here, we
in each coherence interval is equal to the number of scheduled will study the effect of D on the normalized MSE and the
UEs, ฯu = K, and the uplink SNR in this phase is assumed to system spectral efficiency. In this respect, Fig. 5a illustrates
be ฯu = 0 dB. In the scenarios where UEs rely on downlink the normalized MSE of UE and BS NRC estimation under the
2
pilots for decoding purposes, i.e., direct-path based LS and baseline system settings, with the value of ฯM
being varied. It
generalized neighbor LS methods, the number of downlink can be seen that the choice of D = 0, i.e., estimating only the
pilots in each coherence interval is set to be ฯd = K [22], and diagonal elements of B, yields the lowest MSE for UE NRC
their SNR is equal to the downlink SNR in data transmission estimation. Note that, in the proposed NRC estimation method,
phase which is assumed to be ฯd = 20 dB. The SNR of the the choice of D influences the UE side estimation as well since
coupling channel between two neighboring antennas is set to A and B are estimated iteratively as described in Section III-B.
be 80 dB for the two mentioned NRC mitigation methods [11]. On the other hand, the highest BS NRC estimation accuracy is
2
The uplink and downlink SNRs for the pilot signaling in the achieved for D = 0 only when ฯM
โค โ21 dB, whereas higher
2
proposed NRC estimation framework are set to be ฯฬu = 0 estimation accuracy is obtained for D = 1 when ฯM
> โ21
dB and ฯฬd = 10 dB, respectively. In the proposed method, dB. Following that, the spectral efficiencies plotted in Fig. 5b
the estimated NRC matrices are averaged over 10 neighboring illustrate the combined effect of UE and BS NRC estimation.
100
Proposed method - D = 0
Proposed method - D = 1p
Proposed method - D = 2
10!1
BS
10!2
10!3
UE
!4
10
10
20
30
40
50
60
Number of UEs (K)
70
80
NRC Estimation Normalized MSE (/e2 )
IEEE TRANSACTIONS ON SIGNAL PROCESSING
NRC Estimation Normalized MSE (/e2 )
8
100
2
<F2 = <L2 = <M
= !15 dB
2
<F2 = <L2 = <M
= !20 dB
10!1
BS
10!2
UE
!3
10
0
1
2
3
4
5
Iteration Number
(a)
Fig. 7. NRC estimation normalized MSE vs. NRC estimation iteration number
for N = 100, K = 20, ฯu = K, ฯu = 0 dB, T = 250.
Spectral E/ciency (bits/s/Hz)
250
sufficient amount of iterations such that convergence is obtained.
This is commonly in the order of 4 iterations, as illustrated
more specifically next.
150
ZF
2) Effect of the Number of Iterations: Fig. 7 illustrates
100
the reduction in NRC estimation normalized MSE over NRC
p
estimation iteration steps. It is shown in Fig. 7 that, even with
Proposed method - D = 2
2
high NRC levels of ฯL2 = ฯF2 = ฯM
= โ15 dB, having 4
50
Proposed method - D = 1
Proposed method - D = 0
iteration
rounds
is
sufficiently
good
for
the proposed NRC
MRT
No NRC mitigation
estimator
to
converge.
Therefore,
in
the
continuation,
we set
0
10
20
30
40
50
60
70
80
the number of iteration rounds to 4.
Number of UEs (K)
3) Effect of Number of Scheduled Users K: In Fig. 8, the
(b)
NRC estimation normalized MSE and the system spectral
Fig. 6. (a) NRC estimation normalized MSE and (b) system spectral efficiency efficiency are plotted against the number of scheduled UEs K
vs. number of UEs (K) for N = 100, ฯu = K, ฯu = 0 dB, T = 250.
2
for ฯM
= โ20 dB. Fig. 8a shows that while direct-path based
LS has the worst performance, the proposed method is the
โฅ 20 with a high
As can be seen, the highest spectral efficiency is achieved for best option for estimating BS NRC for Kโ3
accuracy
where
MSE
is
in
the
order
of
10
. For direct-path
2
2
D = 0 when ฯM โค โ22 dB and for D = 1 when ฯM > โ22
based
LS
[2]
and
generalized
neighbor
LS
[11],
the normalized
dB.
MSE
for
UE
side
NRC
is
not
shown.
It
is
mentioned
in [2]
2
2
2
For fixed NRC characteristics of ฯL = ฯF = ฯM = โ20
and
[11]
that
additional
downlink
pilot
signaling
per
coherence
dB, Fig. 6 evaluates the normalized estimation MSE and the
system spectral efficiency for different values of D and against interval can be used together with UE side estimation for
the number of scheduled UEs K. Fig. 6a shows that higher UE side NRC acquisition. However, no detailed description
UE and BS NRC estimation accuracy is achieved for D = 0 is provided on the actual pilot signal structure or the actual
when K < 20, whereas when the number of scheduled users estimation method.
The corresponding system spectral efficiency performances
exceeds K โฅ 20 the choice of D = 1 yields the highest BS
are
evaluated and shown in Fig. 8b. The proposed NRC
NRC estimation accuracy. For K โฅ 20, UE NRC estimation
estimation
and mitigation scheme clearly outperforms the directperformances are largely similar for all three choices of D.
path
based
LS and generalized neighbor LS methods. The
Following these, Fig. 6b illustrates that from spectral efficiency
difference
between
the performance of the proposed method
perspective, the optimum sparsity distance threshold is D = 0
and
the
other
two
methods
increases as K grows. Remarkably,
for K < 20 and D = 1 for K โฅ 20. Thus, in the continuation
for
K
=
70,
the
difference
between the proposed method and
D = 0 and D = 1 will be used under the settings of K < 20
the
other
two
methods
is
already
in the order of 100 bits/s/Hz.
and K โฅ 20, respectively. As discussed in the previous section,
โ
T
Another
advantage
in
utilizing
the
proposed NRC estimation
when A โ IK , G AG which is used in the estimation
scheme
is
that
the
optimum
number
of UEs Kopt , which is
process is of rank K. Therefore, having higher number of
defined
as
the
number
of
scheduled
UEs
which maximizes the
K increases the accuracy of the BS NRC estimation in the
spectral
efficiency,
is
higher
compared
to
the other two NRC
proposed method which facilitates the estimation of more nonestimation
methods.
For
instance
under
ZF
precoding Kopt is
diagonal elements in B, i.e., higher values for D.
between
60
and
70
for
the
proposed
method
whereas for LS
It should be noted that for all the cases in Fig. 5 and
based
methods
K
is
only
around
50.
opt
Fig. 6, the proposed iterative NRC estimator is executed over a
200
9
10!1
120
Spectral E/ciency (bits/s/Hz)
NRC Estimation Normalized MSE (/e2 )
MITIGATION OF CHANNEL NON-RECIPROCITY IN MASSIVE MIMO SYSTEMS
10!2
10!3
10!4
10
Direct-path based LS [2] - BS
Generalized neighbor LS [11] - BS
Proposed method - BS
Proposed method - UE
20
30
40
50
60
70
100
ZF
80
Proposed method
Generalized neighbor LS [11]
Direct-path based LS [2]
60
40
-40
80
MRT
-35
-30
-25
-20
-15
2
<M
(dB)
Number of UEs (K)
(a)
2 ) for
Fig. 10. Spectral efficiency vs. input reflection coefficients variance (ฯM
N = 100, K = 20, ฯu = K, ฯu = 0 dB, T = 250.
Spectral E/ciency (bits/s/Hz)
250
Proposed method
Generalized neighbor LS [11]
Direct-path based LS [2]
200
ZF
150
100
50
MRT
0
10
20
30
40
50
60
70
80
Number of UEs (K)
(b)
Fig. 8. (a) NRC estimation normalized MSE and (b) system spectral efficiency
vs. number of UEs (K) for N = 100, ฯu = K, ฯu = 0 dB, T = 250.
Spectral E/ciency (bits/s/Hz)
120
100
MRT
60
40
20
โข
ZF
80
under ZF precoding.
5) Effect of Input Reflection Coefficient: Fig. 10 shows the
impact of the variance of the input reflection coefficients on
the achievable spectral efficiency. The proposed estimation and
mitigation method again outperforms the other two LS based
methods. The difference between the proposed method and the
2
other two methods increases as ฯM
grows, which is due to the
ability of the proposed method to estimate the non-diagonal
elements in BS NRC matrix. It should be noted that D = 1
is used for obtaining the results in Fig. 10, and there is still
room for improving the performance of the proposed method
by adaptively selecting the optimum D according to the level
2
of ฯM
as shown already in Fig. 5b.
6) Summary of the Obtained Results: Overall, as observed
through extensive numerical evaluations in various scenarios,
the proposed NRC estimation method outperforms the other
two state-of-the-art methods. Selected technical aspects can be
summarized as follows:
Proposed method
Generalized neighbor LS [11]
Direct-path based LS [2]
0
5
10
15
20
25
30
โข
SNR (dB)
Fig. 9. Spectral efficiency vs. downlink SNR (ฯd ) for N = 100, K = 20,
ฯu = K, ฯu = 0 dB, T = 250.
4) Effect of Downlink SNR: In Fig. 9, the system spectral
2
efficiency is plotted against the downlink SNR when ฯM
= โ20
dB. The results show clear advantage in employing the proposed
method in estimating NRC for all SNR values. The proposed
estimation and mitigation method outperforms the LS based
methods for both low and high SNR regions. Especially, the
performance difference is most visible for high SNR region
โข
Employing the proposed NRC estimation method eliminates the need to send downlink demodulation pilots since
the proposed OTA framework facilitates estimating both
the BS side and UE side NRC characteristics in the base
station. Therefore, more time-frequency resources can be
allocated in each coherence interval for actual downlink
data transmission purposes which improves the spectral
efficiency.
The proposed NRC estimation method is more and more
superior over the two reference methods when the number
of scheduled UEs K grows. The reason is that increasing
K is forcing the other two NRC estimation methods
to spend more time for downlink pilot transmission
in each coherence interval, while a larger number of
scheduled users improves the accuracy of the proposed
NRC estimation method.
Due to the ability to estimate also non-diagonal elements
of the BS NRC matrix, the difference between the
performance of the proposed NRC estimation method
and the other two methods increases as the power of BS
antenna mutual coupling mismatch grows.
10
IEEE TRANSACTIONS ON SIGNAL PROCESSING
V. C ONCLUSION
In this work, we proposed an efficient NRC estimation and
mitigation framework for multi-user massive MIMO TDD
networks to compensate the jointly coexisting BS and UE
side NRC. In general, even relatively modest NRC levels
can cause significant performance loss in the achievable
spectral efficiency when only standard NRC-blind MRT or ZF
downlink precoding is employed. A novel OTA-based approach
incorporating a dedicated round-trip pilot signaling with small
pilot overhead together with sparsity-aided efficient iterative
estimation techniques were proposed for the acquisition of NRC
matrices at BS. Unlike the existing state-of-the-art methods,
the proposed NRC estimation method acquires both the UE
transceiver NRC as well as the BS transceiver NRC, and
does not rely on downlink pilot transmission during the actual
data transmission phase to compensate the NRC in the UE
side. Therefore, it can be efficiently employed in massive
MIMO systems that rely only on the statistical knowledge
of the beamformed downlink channels at terminals for data
decoding with very low system pilot overhead. The extensive
computer simulations showed that for practical values of the
NRC levels, SNRs and the number of spatially multiplexed
users, the proposed estimation and mitigation method clearly
outperforms the existing state-of-the-art methods in terms of
the system spectral efficiency.
A PPENDIX
P ROOF FOR ESTIMATION OF A
Let
โ
L= Qโ
p p
ฯฬu ฯฬd Gฬโ AGฬT Bฬ(m)
2
.
(29)
F
Then,
L=
N
X
qj โ
p
ฯฬu
p
h
i
ฯฬd Gฬโ A GฬT Bฬ(m)
j=1
2
j
h
N
i
X
p p
T
โ
qj โ ฯฬu ฯฬd Gฬ diag Gฬ Bฬ(m)
=
ฮพ
2
,
j
j=1
(30)
โ
T
where ฮพ = [a1 , a2 , ยท ยท ยท , aK ] .
h
i
โ โ
โ
T
By using Wj = ฯฬu ฯฬd Gฬ diag Gฬ Bฬ(m)
, (30)
j
can be re-written as
L=
N
X
2
||qj โ Wj ฮพ||
j=1
=
N
X
(31)
qฬj โ Wฬj ฯ
2 โ
= Lฬ (ฯ) ,
j=1
T
โ
where ฯ = <{ฮพ T }, ={ฮพ T } . Therefore, the solution Aฬ(m)
can be obtained by
Aฬ(m) = diag [IK , iIK ] ฯฬ ,
(32)
where
ฯฬ = argmin Lฬ (ฯ) .
ฯโRK
(33)
Since Lฬ (ฯ) is convex, (33) can be solved from the partial
derivative equation โ Lฬ(ฯ)
โฯ = 0, which finally yields the solution
given by (24).
ACKNOWLEDGMENT
The estimation of A is building on the work presented in
[25]. The proof in Appendix A is a result of discussion with the
authors of [25], H. Q. Ngo and E. G. Larsson, whose technical
guidance is greatly acknowledged.
R EFERENCES
[1] F. Boccardi, R. W. Heath, A. Lozano, T. L. Marzetta, and P. Popovski,
โFive disruptive technology directions for 5G,โ IEEE Communications
Magazine, vol. 52, no. 2, pp. 74โ80, February 2014.
[2] C. Shepard, H. Yu, N. Anand, E. Li, T. Marzetta, R. Yang, and L. Zhong,
โArgos: Practical many-antenna base stations,โ in Proceedings of the 18th
Annual International Conference on Mobile Computing and Networking,
ser. Mobicom โ12. New York, NY, USA: ACM, 2012, pp. 53โ64.
[3] E. G. Larsson, O. Edfors, F. Tufvesson, and T. L. Marzetta, โMassive
MIMO for next generation wireless systems,โ IEEE Communications
Magazine, vol. 52, no. 2, pp. 186โ195, February 2014.
[4] A. Bourdoux, B. Come, and N. Khaled, โNon-reciprocal transceivers in
OFDM/SDMA systems: Impact and mitigation,โ in Radio and Wireless
Conference, 2003. RAWCON โ03. Proceedings, Aug 2003, pp. 183โ186.
[5] Y. Zou, O. Raeesi, R. Wichman, A. Tolli, and M. Valkama, โAnalysis
of channel non-reciprocity due to transceiver and antenna coupling
mismatches in TDD precoded multi-user MIMO-OFDM downlink,โ in
2014 IEEE 80th Vehicular Technology Conference (VTC2014-Fall), Sept
2014, pp. 1โ7.
[6] M. Petermann, M. Stefer, F. Ludwig, D. Wubben, M. Schneider, S. Paul,
and K. D. Kammeyer, โMulti-user pre-processing in multi-antenna OFDM
TDD systems with non-reciprocal transceivers,โ IEEE Transactions on
Communications, vol. 61, no. 9, pp. 3781โ3793, September 2013.
[7] H. Wei, D. Wang, and X. You, โReciprocity of mutual coupling for TDD
massive MIMO systems,โ in Wireless Communications Signal Processing
(WCSP), 2015 International Conference on, Oct 2015, pp. 1โ5.
[8] W. Zhang, H. Ren, C. Pan, M. Chen, R. C. de Lamare, B. Du, and
J. Dai, โLarge-scale antenna systems with UL/DL hardware mismatch:
Achievable rates analysis and calibration,โ IEEE Transactions on
Communications, vol. 63, no. 4, pp. 1216โ1229, April 2015.
[9] F. Athley, G. Durisi, and U. Gustavsson, โAnalysis of massive MIMO
with hardware impairments and different channel models,โ in 2015 9th
European Conference on Antennas and Propagation (EuCAP), May 2015,
pp. 1โ5.
[10] R. Rogalin, O. Y. Bursalioglu, H. Papadopoulos, G. Caire, A. F. Molisch,
A. Michaloliakos, V. Balan, and K. Psounis, โScalable synchronization
and reciprocity calibration for distributed multiuser MIMO,โ IEEE
Transactions on Wireless Communications, vol. 13, no. 4, pp. 1815โ
1831, April 2014.
[11] J. Vieira, F. Rusek, and F. Tufvesson, โReciprocity calibration methods
for massive MIMO based on antenna coupling,โ in 2014 IEEE Global
Communications Conference, Dec 2014, pp. 3708โ3712.
[12] H. Wei, D. Wang, H. Zhu, J. Wang, S. Sun, and X. You, โMutual coupling
calibration for multiuser massive MIMO systems,โ IEEE Transactions
on Wireless Communications, vol. 15, no. 1, pp. 606โ619, Jan 2016.
[13] H. Wei, D. Wang, J. Wang, and X. You, โTDD reciprocity calibration
for multi-user massive MIMO systems with iterative coordinate descent,โ
Science China Information Sciences, vol. 59, no. 10, p. 102306, 2015.
[14] M. Guillaud, D. T. M. Slock, and R. Knopp, โA practical method for
wireless channel reciprocity exploitation through relative calibration,โ in
Proceedings of the Eighth International Symposium on Signal Processing
and Its Applications, 2005., vol. 1, August 2005, pp. 403โ406.
[15] Y. Zou, O. Raeesi, and M. Valkama, โEfficient estimation and compensation of transceiver non-reciprocity in precoded TDD multi-user MIMOOFDM systems,โ in 2014 IEEE 80th Vehicular Technology Conference
(VTC2014-Fall), Sept 2014, pp. 1โ7.
[16] M. Guillaud and F. Kaltenberger, โTowards practical channel reciprocity
exploitation: Relative calibration in the presence of frequency offset,โ
in 2013 IEEE Wireless Communications and Networking Conference
(WCNC), April 2013, pp. 2525โ2530.
MITIGATION OF CHANNEL NON-RECIPROCITY IN MASSIVE MIMO SYSTEMS
[17] O. Raeesi, A. Gokceoglu, Y. Zou, and M. Valkama, โPerformance analysis
of multi-user massive MIMO downlink under channel non-reciprocity
and imperfect CSI,โ submitted to IEEE Transactions on Communications,
2016. [Online]. Available: http://arxiv.org/abs/1610.06769
[18] H. Yang and T. L. Marzetta, โPerformance of conjugate and zero-forcing
beamforming in large-scale antenna systems,โ IEEE Journal on Selected
Areas in Communications, vol. 31, no. 2, pp. 172โ179, February 2013.
[19] J. Jose, A. Ashikhmin, P. Whiting, and S. Vishwanath, โChannel
estimation and linear precoding in multiuser multiple-antenna TDD
systems,โ IEEE Transactions on Vehicular Technology, vol. 60, no. 5,
pp. 2102โ2116, Jun 2011.
[20] J. Jose, A. Ashikhmin, T. L. Marzetta, and S. Vishwanath, โPilot contamination and precoding in multi-cell TDD systems,โ IEEE Transactions on
Wireless Communications, vol. 10, no. 8, pp. 2640โ2651, August 2011.
[21] E. G. Larsson and H. V. Poor, โJoint beamforming and broadcasting
in massive MIMO,โ IEEE Transactions on Wireless Communications,
vol. 15, no. 4, pp. 3058โ3070, April 2016.
[22] H. Q. Ngo, E. G. Larsson, and T. L. Marzetta, โMassive MU-MIMO
downlink TDD systems with linear precoding and downlink pilots,โ in
Communication, Control, and Computing (Allerton), 2013 51st Annual
Allerton Conference on, Oct 2013, pp. 293โ298.
[23] B. M. Hochwald, T. L. Marzetta, and V. Tarokh, โMultiple-antenna
channel hardening and its implications for rate feedback and scheduling,โ
IEEE Transactions on Information Theory, vol. 50, no. 9, pp. 1893โ1909,
Sept 2004.
[24] S. A. Schelkunoff and H. T. Friis, Antennas Theory and Practice. New
York: John Wiley & Sons, 1952.
[25] H. Q. Ngo and E. G. Larsson, โEVD-based channel estimation in multicell
multiuser MIMO systems with very large antenna arrays,โ in 2012 IEEE
International Conference on Acoustics, Speech and Signal Processing
(ICASSP), March 2012, pp. 3249โ3252.
11
| 7cs.IT
|
Concept Formation and Dynamics of Repeated
Inference in Deep Generative Models
arXiv:1712.04195v1 [stat.ML] 12 Dec 2017
Yoshihiro Naganoa,d , Ryo Karakidab,d , Masato Okadaa,b,c,โ
a
Graduate School of Frontier Sciences, The University of Tokyo, 5-1-5 Kashiwanoha, Kashiwa,
Chiba 277-8561, Japan
b
Artificial Intelligence Research Center, National Institute of Advanced Industrial Science and
Technology, 2-3-26 Aomi, Koto-ku, Tokyo 135-0064, Japan
c
Brain Science Institute, RIKEN, 2-1 Hirosawa, Wako, Saitama 351-0198, Japan
d
Research Fellow of the Japan Society for the Promotion of Science, Chiyoda, Tokyo 102-0083,
Japan
Abstract
Deep generative models are reported to be useful in broad applications including image generation. Repeated inference between data space and latent space
in these models can denoise cluttered images and improve the quality of inferred
results. However, previous studies only qualitatively evaluated image outputs in
data space, and the mechanism behind the inference has not been investigated.
The purpose of the current study is to numerically analyze changes in activity patterns of neurons in the latent space of a deep generative model called a โvariational
auto-encoderโ (VAE). What kinds of inference dynamics the VAE demonstrates
when noise is added to the input data are identified. The VAE embeds a dataset
with clear cluster structures in the latent space and the center of each cluster of
multiple correlated data points (memories) is referred as the concept. Our study
demonstrated that transient dynamics of inference first approaches a concept, and
then moves close to a memory. Moreover, the VAE revealed that the inference
dynamics approaches a more abstract concept to the extent that the uncertainty
of input data increases due to noise. It was demonstrated that by increasing the
number of the latent variables, the trend of the inference dynamics to approach
a concept can be enhanced, and the generalization ability of the VAE can be improved.
โ
Corresponding author
Email addresses: [email protected] (Yoshihiro Nagano),
[email protected] (Ryo Karakida), [email protected] (Masato Okada)
Preprint submitted to Neural Networks
December 13, 2017
Keywords: Deep Generative Models, Variational Auto-Encoder, Inference,
Concept Formation
1. Introduction
Research on deep generative models, which extract essential features from an
unlabeled dataset, is currently an active area. Deep generative models have been
reported to be useful in a broad range of applications such as generating images
[13, 24, 7, 23], movies [32, 33, 26], and text [34, 16, 28]. In particular, the conventional bidirectional network structure for recognition and generation of images
has made it possible to eliminate noise from cluttered images and smoothly interpolate between different images. In detail, recognition is the process of mapping
from a data point to a latent variable, and generation is the inverse of that process.
Several studies have qualitatively highlighted the importance of repeated inferences between data space and latent space. In the present study, repeated inferences are defined as a process by which a deep generative model repeats the
recognition and generation of images. It was shown that using noise-containing
images as initial values, deep generative models can eliminate noise by repeating
recognition and generation several times [24]. Moreover, compared to generating
an output image from latent space to smoothly morph one image into another,
repeating inferences several times improves the quality of the output image [3].
However, most of these studies only qualitatively evaluate output data. To fill
that gap in the literature, we quantified the dynamics of repeated inferences in latent space to investigate why repeating inferences is effective for a wide range of
applications.
In this study, we focused on the dynamics of repeated inferences in a โvariational auto-encoderโ (VAE) [13, 24], which is a typical type of deep generative model. First, noise-containing images are presented as initial inputs to the
VAE, which denoises the images and generates clean outputs by using repeated
inferences. Various factors, such as noise in real environments, cause the data
to deviate from the original distribution. According to the manifold hypothesis,
most data (e.g., natural images) widely used in typical applications are โlikely
to concentrate in the vicinity of non-linear sub-manifolds of much lower dimensionalityโ rather than the high dimensional space the data actually presented [25].
Therefore, it is suggested that the inference begins outside the sub-manifolds of
the training data when noise was added to the initial inputs. However, little works
have paid attention to how the activity patterns of neurons are drawn into the original sub-manifolds from the initial point in latent space. To understand the patterns
2
of repeated inferences, we used a dataset with clear cluster structures which could
be intuitively grasped by our eyes (e.g., numeric characters).
To examine how a VAE expresses the cluster structures in latent space, we
utilized a mathematical notion known as the concept. First introduced in the study
of associative memory models [1], the concept was referred as the centroid of
multiple correlated data points (memories), and it was analytically demonstrated
to spontaneously evolve to an equilibrium state [1]. This phenomenon is called
concept formation. Furthermore, the dynamics of neural activity patterns has also
been studied in terms of the associative memory model with multiple correlated
memories [18]. It was revealed that the dynamics of neural activity patterns first
approach the concept and then move toward each memory pattern [18].
In summary, there are four major findings in our study. First, consistent with
these reports, we demonstrated that the dynamics of repeated inferences is drawn
to a unique memory via a corresponding concept, which is the center of each
cluster in the latent space. Second, by averaging all clusters in the latent space,
we defined the abstract concept; now by definition, memories, concepts, and the
abstract concept are hierarchically related in ascending order. We found that the
inference dynamics approaches the abstract concept, to the extent that the uncertainty of input data increases due to noise. The result suggested that the model
selects appropriate inference strategies in accordance with the fraction of the noise
added to the input data. Third, we identified the approximate necessary number
of latent variables to map all memories in the latent space. As the number of latent variable increases, the internal representations of the clusters tend to become
orthogonal and it makes the dynamics of repeated inferences approaches each corresponding concept. Finally, we checked the generalization error of the VAE. The
result demonstrated that the generalization performance of the model has been
improved, to the extent the concept is observed to attract the dynamics of repeated
inferences.
2. Method
A variational auto-encoder (VAE) is a generative model consisting of two neural networks, namely, an encoder and a decoder [13, 24]. An encoder sends a
mapping from data such as natural images to a latent variable space, and the decoder gives an inverse mapping. The objective function of the VAE is obtained by
P
finding the variational lower bound of log-likelihood i log p(x(i) ) for N training
n oN
data X = x(i) . In the following, parameter ฮธ that maximizes log-likelihood
i=1
3
log pฮธ (x(i) ) at each data point is considered. Using latent variable z and its conditional probability distribution qฯ (z | x(i) ) and taking the variational lower bound
of the log-likelihood gives the following objective function:
h
i
log pฮธ (x(i) ) โฅ โDKL qฯ (z | x(i) ) p(z) + Eqฯ (z|x) log pฮธ (x(i) | z)
= L(ฮธ, ฯ; x(i) ).
(1)
(2)
In the above equation, p(z) is the prior distribution of latent variable z, and DKL (qkp)
is the Kullback-Leibler divergence [14] of probability distributions q and p. The
first term of the objective function corresponds to the regularization, and the second term corresponds to the reconstruction error. The VAE models conditional
distributions pฮธ (x(i) | z) and qฯ (z | x(i) ) by using respective neural networks. To
optimize parameters ฮธ and ฯ by backpropagation, samples are generated by a
method called reparameterization trick with encoder qฯ (z | x(i) ). The latent variable is modeled as
z = gฯ (, x)
= ยต + ฯ ,
(3)
(4)
to decompose z into random variable and deterministic variables ยต and ฯ. Giving as a sample from the standard Gaussian distribution eliminates the need for a
complicated integral during training. If
are assumed, and the
h the above conditions
i
expected reconstruction error Eqฯ (z|x) log pฮธ (x(i) | z) is approximated by sample
average, eq. (2) can be rewritten as
J
L
1X
1 X
(i) 2
(i) 2
2
)
+
1 + log (ฯ(i)
)
โ
(ยต
)
โ
(ฯ
log pฮธ (x(i) | z(i,l) ).
L(ฮธ, ฯ; x ) '
j
j
j
2 j=1
L l=1
(5)
The outputs of the encoder are ยต and ฯ. Parameter ฯ for determining them and
parameter ฮธ of the decoder were trained by the gradient ascent method to maximize eq. (5). The output of the decoder was set as the probability of the Bernoulli
distribution, and the expectation of the conditional probability, namely, the second
term of the objective function, was approximated by average of L samples.
A separate three-layer fully-connected neural network was used for encoder
qฯ (z | x(i) ) and decoder pฮธ (x(i) | z) mentioned above. The number of units in the
(i)
4
middle layer was set to 1,024, the number of samples for calculating the reconstruction error was set to L = 2, and the activation function was set as tanh. Adam
[12] was used as a parameter optimization algorithm, and the learning rate was
reduced in descending order: 0.0005, 0.0001, and 0.00005. The number of units
of latent variable Nz was set to 100 unless otherwise noted. The Modified National Institute of Standards and Technology (MNIST) database (which consists
of 28 ร 28-pixels โ0โ-โ9โ handwritten images with 60,000 training data and 10,000
test data) was used as the dataset for training. These data are considered to have
cluster structures consisting of 10 types of labels, namely, โ0โ-โ9โ.
In this study, noisy MNIST data were inferred by using the trained network
according to the following procedure, and the time evolution of latent variable
z(t) was obtained. First, noise was added to an image of the training dataset.
Pixels with probability p were selected from 784 pixels, the image intensities of
the selected pixels were swapped, and that image was set as x0 . Next, the data
variable in step t = 0 was taken as x(0) = x0 . Finally, generation and recognition
were repeated T times according to the following two equations,
x(t + 1) = E pฮธ (x|z(t)) [x],
z(t) = Eqฯ (z|x(t)) [z],
(6)
(7)
to obtain the time evolution of data variable x(t) and latent variable z(t). The
dynamics of x(t) and z(t) were numerically analyzed as shown below.
The deep learning framework Keras [6] version 2.0.2 on Theano [30] backend
version 0.9.0, running on CUDA 8.0 with CuDNN v5.1 on NVIDIA Tesla K80,
was used for all numerical simulations.
3. Results
3.1. Dynamics of inference trajectory: approach to a concept
In our first analysis, we demonstrate that the transient dynamics of inference in
latent space of the VAE is first attracted to the concept, which is the center of the
memorized patterns, and then moves to each memory. The representation in the
latent space of the VAE captures the cluster structures hidden behind the MINIST
data, and the VAE displays corresponding clusters in its latent space (fig. A.1).
The details of the expression in the latent space of the VAE are given in Appendix
A. Since the cluster structure exists in the data and the latent variable of the VAE
5
reflects it, the time evolution of inference also seems to reflect the cluster structure.
The center of the cluster of each numerical label, namely,
ฮพฬnum =
1
N
num
X
Nnum
i
ฮพ(i)
num ,
(8)
was therefore defined as a concept, where ฮพ(i)
num means the activity pattern of the
latent variable for i-th training data having label num
ฮพ(i)
[z].
num = Eqฯ (z|x(i)
num )
(9)
The definition of the concept is based on two studies on an associative memory
model [1, 18]. The relationship between the time development of inference and
the concept of each label (โ0โ-โ9โ) represented in the MNIST data is numerically
analyzed in the following sections.
Figure 1: Consecutive samples in data space (from left to right, one row after the other). The
image of โ6โ with p = 0.2 noise applied was used as an initial value. The image generated by
concept E pฮธ (x|ฮพฬ6 ) [x] is shown on the right.
Here, it is numerically demonstrated that the transient dynamics of the activity
pattern are first attracted to the concept, which is the center of the memorized
patterns, and then moves to each memory. Figure 1 expresses the consecutive
samples in data space. The time development of the activity pattern in data space
x(t) is aligned from left to right, one row after the other. The upper left image
corresponds to the initial value, x0 . The image of โ6โ with p = 0.2 noise applied
was used as an initial value. The image generated by the concept, E pฮธ (x|ฮพฬ6 ) [x], is
shown on the right. From the figure, the VAE removes the noise contained in the
image in the first few steps, and then it gradually shifts to the specific image of โ6โ.
It is qualitatively suggested that the result of the VAE inference approaches the
concept of โ6โ once. The gradual changes of output images in the data space were
quantitatively evaluated in the latent space. The time evolution of the Euclidean
distance, namely,
6
15.1
18.6
16.1
1
15.8
2
17.5
3
4
Distance ||z(t)
num||2
0
6.7
0
17.5
8.2
80
0
16.7
5
0
5.4
80
7.1
80
0
80
17.1
6
0
10.2
80
6.9
0
15.7
7
0
7.2
80
7.4
80
0
16.6
8
0
8.4
80
6.3
80
9
0
80
Step
Figure 2: Time development of the distance from concepts ฮพฬnum for all labels of the MNIST data.
Shades represent ยฑ1 standard error of the mean (300 trials). All figures were generated with noise
fraction p = 0.2.
z(t) โ ฮพฬnum 2 ,
(10)
between neural activity patterns and concepts for every label of MNIST data
(fig. 2) in the latent space was evaluated. The distance between the concept and
300 different initial images was calculated. Each figure corresponds to each label,
which is used as the initial input for the VAE. The x-axis expresses the time step t
of repeated inference, and the y-axis expresses the Euclidean distance (eq. (10)).
It was clarified that the trajectory of the VAEโs inference first rapidly approaches
the concept, and then moves away from it. This result is qualitatively consistent
with all other labels of MINIST data.
The VAE makes the latent space in which the activity patterns are orthogonal in relation to another cluster and correlated with the same cluster in a lowdimensional space. The relationships between concepts of each label are shown
in fig. 3. The activity patterns in the latent variable space of each numerical concept are shown in fig. 3a. The heat map expresses the activity pattern of each
neuron, which corresponds to the latent variable, where the x-axis represents the
neuronโs index, and the y-axis represents the label. Only a few neurons out of 100
contribute to information representation, and many neurons are pruned and not
active. According to our observation, 14 out of 100 neurons were active. The dimensions of the latent space were examined by using the cumulative contribution
ratio determined by the principal component analysis. The cumulative contribution ratio of each principal component when the training images are given to the
VAE is shown in fig. 3b. The variance of the latent space was explained entirely
7
(c)
10
20
30
40
50
z index
60
70
80
0
0.8
0.8
2
0.4
0.6
4
0.0
0.4
6
Input label
0
1.0
0.2
90
0.4
8
9 8 7 6 5 4 3 2 1 0
1.0
0.5
0.0
0.5
1.0
Cumulative ratio
(b)
(a)
0
10
20
Components
30
0.8
0
2
4
6
8
Figure 3: (a) Activity pattern in the latent variable space of each concept. The x-axis represents
the neuron index of the latent variable, the y-axis represents the label, and the heat map shows
the activity pattern of each neuron. (b) Cumulative contribution ratio of principal components. (c)
Cosine similarity between activity patterns of each label.
by 14 dimensions, and 70% of that was explained by nine dimensions. To examine the relationships between concepts, the cosine similarity between the activity
patterns of each concept i and j (fig. 3c) was obtained as
Ci j =
ฮพฬi ยท ฮพฬ j
ฮพฬi
2
ฮพฬ j
.
(11)
2
By definition, the cosine similarity between concepts of the same label (shown in
diagonal terms in the figure) is 1. On the other hand, the cosine similarity between
concepts of different labels in non-diagonal terms is minimal, namely, near zero.
The figure shows that the concepts of each label are orthogonal in the latent space.
It is suggested that the activity patterns corresponding to different training data of
the same label are correlated and those of the different label are orthogonal to each
other in the latent space of the VAE.
3.2. Relationship between data hierarchy and inference
Previously, we arbitrarily determined the amount of noise added to the initial
input images. In our second analysis, to examine the effect of noise on the dynamics of repeated interferences, we modulated the amount of noise. Since noise in
input images causes the data to deviate from the original distribution, we created
another class, the abstract concept, which averaged all the labelsโ concepts, in
addition to concept and memory. By respectively measuring the distance between
the trajectory of each neural activity pattern and its corresponding classes in the
8
latent space, which one of these classes attracts respective neural activity patterns
the most is identified.
The abstract concept is defined as
ฮพฬall =
9
1 X
ฮพฬ .
10 num=0 num
(12)
The three classes (memories, concepts, and the abstract concept) are in a hierarchical relationship (from detailed to coarse information) in the order ฮพ(i)
num , ฮพฬ num ,
and ฮพฬall . We calculated the minimum distances between respective neural activity
patterns z(t) and corresponding classes,
min kz(t) โ ฮพk2 .
(13)
t
Figure 4 shows those minimum distances according to the noise fraction. In the
figure, the x-axis represents noise fraction p, which is the probability that the
image intensities of the pixels are swapped. For every noise fraction, the minimum
distances between firing pattern z(t) and hierarchical concepts were calculated by
changing the initial image 500 times. The dots in the figure express the mean of
the minimum distance, and the bars are ยฑ1 standard error of the mean (500 trials).
Parameter regions are divided into three stages, I, II, and III, which correspond to
the minimum distance between firing pattern z(t) and hierarchical concepts, ฮพ6(i) ,
II
III
mint z(t) โ ฮพ 2
I
ฮพฬall
ฮพฬ6
ฮพ6(i)
Noise fraction
p
Figure 4: Minimum distances from concepts according to noise fraction p.
9
ฮพฬ6 , and ฮพฬall , respectively. In stage I, the firing activity is closest to original pattern
ฮพ(i)
6 with a small amount of noise. Interestingly, the closest concept was ฮพฬ 6 with
moderate noise in stage II. And the activity came close to concept ฮพฬall in stage III.
In stages I and II, the memory was successfully retrieved because the inference
path is close to the cluster to which the input data belongs; however, in stage
III, the model could not determine the original cluster, so the recall failed. We
discovered that when a noisy environment makes recognizing objects difficult, the
neural activity pattern wanders around the center of all memories. Accordingly,
the model achieves the inference dynamics depending on the input uncertainty.
Non-numeric space
ฮพฬall
Num
eric
spa
Concept
ฮพฬ 6
ce
ฮพ6(i)
Figure 5: Schematic diagram of firing patterns in latent state space
As shown in section 3.1 and above, the VAE extracts the cluster structures inherent in MNIST data and infers images through the center of each cluster. The
dynamics of this inference is shown as a schematic diagram in fig. 5. It is considered that adding noise to an image corresponds to moving the initial value in
a direction orthogonal to the original data space. Results from our first analysis
suggest that when the inference starts from the position orthogonal to the space
expressing the MNIST data, the activity patterns first approach the corresponding
concepts at high speed and then transitions to the corresponding memories. Approaching a concept in repeated inferences indicates that the concept formation
10
occurs in the latent space of the VAE. In neuroscience, the activities in the visual
cortex of a macaque monkey [29, 5] and the human brain measured by MEG [17]
have been reported to process global information before detailed information. The
previous studies on associative memory models explain these behaviors by spontaneous stabilization of the concept and its effect on memory retrieval [1, 18].
The VAE also recalled the concept before each memory pattern in the inference
phase. Our results in the VAE are consistent with these findings in studies on the
associative memory models, and the cerebral cortex.
3.3. Effect of Model Architecture on Internal Representations
In our third analysis, the mechanism by which the trajectory of VAEโs inference approaches the concept is clarified as follows. First, the following question
must be answered: How does the tree-like memory structure mentioned above affect the time evolution of inference? In other words, how such a memory structure
is changed by controlling a hyperparameter of the VAE was verified, and the trajectory of inference in the five circumstances was examined respectively (fig. 6).
The time evolution of distance from the concept of โ6โ with different model hyperparameters are compared in figs. 6a to 6e. The number of neurons in latent
variable Nz was controlled in the order 2, 5, 10, 20, and 100. Under the condition
2
4
6
8
2
4
6
8
6 |2
6 |2
0.8
2
4
6
8
|z
80
0
0.8
0
0.8
0.4
2
0.4
0.0
4
(j)
0.0
0.4
6
0.4
Step
0
2
0.0
2.3
4
0
0.4
0
80
0.8
8
0.8
Step
0
6
0.4
0.8
2
4
0.0
1.9
(i)
4
0
2
0.4
0
80
6
0.8
0.8
6
0.4
Step
0
(h)
8
0
2
4
0.0
6
0.4
8
0.8
1.9
8
80
4.0
|z
6 |2
Step
0
(g)
(f)
0
1
Nz = 100
(e)
3.3
|z
6 |2
80
Nz = 20
(d)
3.3
|z
6 |2
Step
0
Nz = 10
(c)
3
|z
0
Nz = 5
(b)
1
8
Nz = 2
(a)
0
2
4
6
8
0.4
0.8
0
2
4
6
8
Figure 6: (a-e): Time development of distance with the concept of โ6โ. The number of elements
of the latent variable is written as Nz . (f-j): Cosine similarity between memory patterns of each
concept in the corresponding model of (a-e).
11
Nz = 10, 20, 100, the trajectory approached the concept of โ6โ once, whereas under condition of Nz = 2, 5, it did not approach the concept. Also, between Nz = 5
and Nz = 10, the trajectory gradually approached its corresponding concept from
Nz = 6 (the figure is omitted). The cosine similarity (eq. (11)) between the concepts of each label in the above parameters is shown in figs. 6f to 6j. For Nz = 100,
the similarity of the off-diagonal term is approximately zero. On the other hand,
as the number of the latent variables decreases, the orthogonality of each concept
decays.
These results in our third analysis suggest that orthogonality between concepts
is necessary for the trajectory of inference to be drawn into the concept. Since the
number of latent variables decreases, it is necessary to express data in fewer dimensions, and the orthogonality between concepts is lost. The reduction in the
number of latent variables is considered to cause instability of the memory patterns corresponding to each training data, and stabilize only the concepts. As a
result, the trajectory of inference goes straight to a stable point. We also numerically assessed whether other labels confused the repeated inferences in the VAE
(e.g., although an inference starts from the label โ1โ, it is incorrectly attracted to
the concept associated with the label โ7โ). The result of this assessment is shown
in Appendix B.
3.4. Engineering significance of concept in the latent representation
In our fourth analysis, the engineering significance of the attraction to the
concept is explained as follows. Figure 7 is the generalization performance of the
model according to Nz . The performance of the model was evaluated using the
variational lower bound (eq. (2)) of the log-likelihood for the test MNIST data.
In each Nz , parameters that minimize the generalization error at epoch 100 with
a total of nine conditions were selected from learning rates of 0.01, 0.001, and
0.0001 and mini-batch size of 50, 100, and 200. The generalization error was the
minimum value in the vicinity of Nz = 14, and it did not change significantly after
that. Fourteen of 100 latent variable neurons express training data under condition
Nz = 100 (fig. 3a), and the number of neurons that minimize the generalization
error was consistent with this result. These results suggest that about 14 latent
neurons are required to express MNIST data in the network structure used in this
study. Moreover, in the vicinity of Nz = 14, the cluster structure appears in the
representation of the latent variable space, and the trajectory of an inference is
drawn into the concept. These results suggest that it is possible to judge the generalization performance of the model without computing generalization error or
12
Validation loss
150
140
130
120
110
0
20
40
Nz
60
80
100
Figure 7: Generalization error for the number of elements of latent variables Nz . The y-axis
represents the variational lower bound of the log-likelihood for test data.
orthogonality of the internal representations by simply observing the dynamics of
repeated inference.
4. Conclusion & Future Work
It was found that a VAE extracts the cluster structures inherent in MNIST and
infers images via the center of each cluster. Our results in first analysis suggest
that when the inference starts from a point far away from the original data distribution, the repeated inferences first approach the concept at high speed and then
slowly move toward each memory pattern.
The learning and inference of multiple memory patterns has been widely studied by using associative memory models [9, 2, 22]. In an associative memory
model with embedded multiple correlated patterns, the centroid of those correlated patterns spontaneously evolves to a fixed point [1], and the time evolution
of activity patterns approaches the concept [18]. The results of our first and second analyses are qualitatively consistent with these findings, suggesting that the
mechanism underlying dynamics of repeated inferences in the VAE is related to
the traditional associative memory model.
Originally, Matsumoto et al. proposed a model to explain the dynamics of the
neural activities in macaque monkeyโs visual cortex studied by Sugase et al. [29].
Although the VAE investigated in this study, the model proposed by Matsumoto
et al., and the experiment conducted by Sugase et al. have different architectures by nature, our results infer that they share the universal working principle
13
at the abstract level. The behavior of the repeated inferences in the VAE was
qualitatively consistent with the time evolution of firing patterns observed in neuroscience literature [29, 17, 5]. In our current study, we used a VAE to study a
simple hierarchical deep generative model. Taking account that the VAE exhibits
patterns similar to biological activities, our future work will further examine the
dynamics of repeated inferences introducing biologically plausible mechanisms
such as short-term plasticity [11, 19], common noise [10], and spontaneous firing
based on log-normal weight [20]. This future investigation will be useful both for
neuroscience and engineering applications.
Previously, several studies demonstrated that repeated inferences successfully
denoise [24] and improve the quality of inferred images [3]. Our study suggests
that the dynamics of repeated inferences approaching the center of the cluster inherent in the data leads to denoising and improving the quality of output images,
which were quantitatively observed in data space. It is critical to take a sufficient
number of the latent variables to precisely represent the concept inherent in the
data; if the number of the latent variables is not sufficient, the cluster structures
will not be realized in the latent space, so the concept will be hardly identified.
Our results suggest that stage II in fig. 4 appears only when the number of latent variables is sufficiently large, and the number of latent variables qualitatively
changes the dynamics of repeated inferences.
In this study, we introduced hierarchical concepts ฮพ(i)
num , ฮพฬ num , and ฮพฬ all , which
reflect a hierarchical structure of the MNIST dataset. Previous works have discussed the relationship between the hierarchy of data and deep neural networks.
For example, deep neural networks are claimed to express abstract information in
deeper layers [15, 4]. In particular, Bengio et al. stated that deep layers speed up
the mixing of Markov chains by using their ability to manifest abstract information. On the other hand, Saxe et al. analytically showed that deep neural networks
learn the data in order from large to small modes, and the internal representations
branch accordingly [27]. These hypotheses and previous studies pointed out that
the representations and the learning dynamics of deep neural networks reflect the
dataโs hierarchy. Our study suggests that the inference process of the deep generative model is also related to the hierarchy of the data.
Recently, researchers are actively working on models that can capture features
inherent in data as forms of internal representations [8, 31, 21]. The VAE used in
this study embeds the data points in a simple isomorphic Gaussian distribution. As
a next step to expand on these works, using other deep generative models, we aim
to further investigate what factors influence the behavior of repeated inferences
approaching the concept. Likewise, we will analyze the dynamics of the repeated
14
inferences in another model, in which we used training datasets with more and
various hierarchies.
Acknowledgements
This work was supported by a Grant-in-Aid for JSPS Fellows (grant number: 17J08559) and a Grant-in-Aid for Research Activity Start-up (grant number:
17H07390) from the Japan Society for the Promotion of Science (JSPS).
Appendix A. PCA embedding of the latent representations
Here, we show that the VAE can extract the cluster structure hidden behind
data. Activity patterns of the latent variable using principal component analysis
(PCA) are shown in fig. A.1. The results of principal component analysis using
all of the data are shown in fig. A.1a, and the result of using only three labels
is shown in fig. A.1b. The color of each point represents the label of the data.
MNIST is considered to have a cluster structure consisting of 10 types of labels,
i.e., โ0โ-โ9โ. The figures show that latent variables of VAE can extract this cluster
structure.
(a)
(b)
Figure A.1: (a) Two-dimensional PCA embedding of the representations in the latent variable
space. The color of each point represents the label of the data. (b) PCA embedding with only data
corresponding to three labels.
15
Appendix B. Verifying the effect of moving to other numbers
The possibility that other labels confused the repeated inferences in the VAE
was numerically tested. It was showed that the trajectory of inference approaches
the concept by the orthogonality of the representation in the latent space. On the
other hand, it is also conceivable that the escape from the concept is caused by the
attraction of another cluster. To eliminate this possibility, a discriminative neural
network was constructed separately from the VAE, and the final state of inference
of the VAE was classified.
In the following analysis, a model having a structure of Input-ConvolutionConvolution-Pooling-Dropout1-FullyConnected-Dropout2-SoftMax was constructed
as the discriminative neural network. Kernel size of the convolution was set to
three, the size of the pooling was to two, and the probability of dropout was set to
0.25, 0.5 in order from the input side. ReLU was used as the activation function.
This model recorded a discrimination ability of 99.25% against test data included
in the MNIST dataset.
The result of classifying the final state of inference using the above-mentioned
discriminative neural network is shown in fig. B.2a. The x-axis represents a trial
of each inference with various initial images, and the y-axis represents the number
label. The heat map indicates the classification probability for each number label.
(b)
1.0
9
8
7
6
5
4
3
2
1
0
0
100
Trials
200
300
Only 6
All
3.5
0.6
6 |2
0.4
|z
0.8
0.2
2.0
Prob.
Number
(a)
0.0
0
Step
80
Figure B.2: (a) The result of classification of the final state T = 80 of the inference for the image of
โ6โ. (b) The time evolution of the distance from the concept of โ6โ. The condition excluding trials
that the activity pattern switched to different numbers is expressed in red, and condition containing
all trials is expressed in gray.
16
An image of โ6โ was used as the initial value of the inference. The discriminator
classified the final state of 193 trials out of 300 trials as โ6โ.
We consider the effect of other labels as the cause of the neural activity patterns
approaching mismatched concepts. Taking an example of the label โ6โ, we first
measured the distances between each neural activity pattern and the concept of โ6โ
in two conditions. We included only neural activity patterns reminded inside the
cluster of โ6โ in one condition, and all neural activity patterns in the latent space
in the other. Then, we averaged these distances in each condition and compared
their means. The average trajectories are compared in fig. B.2b. Red shows the
average of only the trial with the final state identified as โ6โ, and gray shows the
average of all trials.
As shown in the figure above, the neural activity patterns in both conditions
approached to the concept before moving to the corresponding memories. This
result suggests that the presence of other labels doesnโt cause the neural activity
patterns to move away from the concept.
References
[1] Amari, S. (1977). Neural theory of association and concept-formation. Biological Cybernetics, 26, 175โ185.
[2] Amit, D. J., Gutfreund, H., & Sompolinsky, H. (1985). Spin-glass models of
neural networks. Physical Review A, 32, 1007.
[3] Arulkumaran, K., Creswell, A., & Bharath, A. A. (2016). Improving sampling from generative autoencoders with markov chains. arXiv preprint
arXiv:1610.09296, .
[4] Bengio, Y., Mesnil, G., Dauphin, Y., & Rifai, S. (2013). Better mixing via
deep representations. In Proceedings of the 30th International Conference
on Machine Learning (pp. 552โ560).
[5] Brincat, S. L., & Connor, C. E. (2006). Dynamic shape synthesis in posterior
inferotemporal cortex. Neuron, 49, 17โ24.
[6] Chollet, F. et al. (2015). Keras. https://github.com/fchollet/keras.
[7] Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D.,
Ozair, S., Courville, A., & Bengio, Y. (2014). Generative adversarial nets.
In Advances in Neural Information Processing Systems 27 (pp. 2672โ2680).
17
[8] Higgins, I., Matthey, L., Pal, A., Burgess, C., Glorot, X., Botvinick, M.,
Mohamed, S., & Lerchner, A. (2017). ฮฒ-vae: Learning basic visual concepts with a constrained variational framework. In Proceedings of the 6th
International Conference on Learning Representations.
[9] Hopfield, J. J. (1982). Neural networks and physical systems with emergent
collective computational abilities. Proceedings of the National Academy of
Sciences, 79, 2554โ2558.
[10] Karakida, R., Igarashi, Y., Nagata, K., & Okada, M. (2013). Inter-layer correlation in a feed-forward network with intra-layer common noise. Journal
of the Physical Society of Japan, 82, 064007.
[11] Katori, Y., Otsubo, Y., Okada, M., & Aihara, K. (2013). Stability analysis of
associative memory network composed of stochastic neurons and dynamic
synapses. Frontiers in Computational Neuroscience, 7.
[12] Kingma, D., & Ba, J. (2014). Adam: A method for stochastic optimization.
In Proceedings of the 3rd International Conference on Learning Representations.
[13] Kingma, D. P., & Welling, M. (2013). Auto-encoding variational bayes. In
Proceedings of the 2nd International Conference on Learning Representations.
[14] Kullback, S., & Leibler, R. A. (1951). On information and sufficiency. The
Annals of Mathematical Statistics, 22, 79โ86.
[15] Lee, H., Grosse, R., Ranganath, R., & Ng, A. Y. (2009). Convolutional
deep belief networks for scalable unsupervised learning of hierarchical representations. In Proceedings of the 26th Annual International Conference on
Machine Learning (pp. 609โ616).
[16] Li, J., Monroe, W., Shi, T., Ritter, A., & Jurafsky, D. (2017). Adversarial
learning for neural dialogue generation. In The 2017 Conference on Empirical Methods on Natural Language Processing..
[17] Liu, J., Harris, A., & Kanwisher, N. (2002). Stages of processing in face
perception: an meg study. Nature Neuroscience, 5, 910โ916.
18
[18] Matsumoto, N., Okada, M., Sugase-Miyamoto, Y., & Yamane, S. (2005).
Neuronal mechanisms encoding global-to-fine information in inferiortemporal cortex. Journal of Computational Neuroscience, 18, 85โ103.
[19] Murata, S., Otsubo, Y., Nagata, K., & Okada, M. (2014). Oscillations in
spurious states of the associative memory model with synaptic depression.
Journal of the Physical Society of Japan, 83, 124004.
[20] Nagano, Y., Karakida, R., Watanabe, N., Aoyama, A., & Okada, M. (2016).
Input response of neural network model with lognormally distributed synaptic weights. Journal of the Physical Society of Japan, 85, 074001.
[21] Nickel, M., & Kiela, D. (2017). Poincareฬ embeddings for learning hierarchical representations. In Advances in Neural Information Processing Systems
30.
[22] Okada, M. (1996). Notions of associative memory and sparse coding. Neural
Networks, 9, 1429โ1458.
[23] Radford, A., Metz, L., & Chintala, S. (2015). Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv
preprint arXiv:1511.06434, .
[24] Rezende, D. J., Mohamed, S., & Wierstra, D. (2014). Stochastic backpropagation and approximate inference in deep generative models. arXiv preprint
arXiv:1401.4082, .
[25] Rifai, S., Dauphin, Y. N., Vincent, P., Bengio, Y., & Muller, X. (2011). The
manifold tangent classifier. In Advances in Neural Information Processing
Systems 24 (pp. 2294โ2302).
[26] Saito, M., Matsumoto, E., & Saito, S. (2017). Temporal generative adversarial nets with singular value clipping. In 2017 IEEE International Conference
on Computer Vision.
[27] Saxe, A. M., McClelland, J. L., & Ganguli, S. (2014). Exact solutions to the
nonlinear dynamics of learning in deep linear neural networks. In Proceedings of the 3nd International Conference on Learning Representations.
[28] Serban, I. V., Sordoni, A., Lowe, R., Charlin, L., Pineau, J., Courville, A. C.,
& Bengio, Y. (2017). A hierarchical latent variable encoder-decoder model
for generating dialogues. In AAAI (pp. 3295โ3301).
19
[29] Sugase, Y., Yamane, S., Ueno, S., & Kawano, K. (1999). Global and fine
information coded by single neurons in the temporal visual cortex. Nature,
400, 869.
[30] Theano Development Team (2016). Theano: A Python framework for fast
computation of mathematical expressions. arXiv e-prints, abs/1605.02688.
URL: http://arxiv.org/abs/1605.02688.
[31] Tomczak, J. M., & Welling, M. (2017). VAE with a VampPrior. arXiv
preprint arXiv:1705.07120, .
[32] Vondrick, C., Pirsiavash, H., & Torralba, A. (2016). Generating videos with
scene dynamics. In Advances In Neural Information Processing Systems 29
(pp. 613โ621).
[33] Walker, J., Doersch, C., Gupta, A., & Hebert, M. (2016). An uncertain
future: Forecasting from static images using variational autoencoders. In
The 14th European Conference on Computer Vision (pp. 835โ851).
[34] Yu, L., Zhang, W., Wang, J., & Yu, Y. (2017). Seqgan: Sequence generative
adversarial nets with policy gradient. In AAAI (pp. 2852โ2858).
20
| 9cs.NE
|
Optimal choice among a class of nonparametric estimators of the
jump rate for piecewise-deterministic Markov processes
arXiv:1506.07722v2 [math.ST] 23 May 2016
Romain Azaฤฑฬsโ and Aureฬlie Muller-Gueudinโ
Inria Nancy-Grand Est, Team BIGS, Institut Eฬlie Cartan de Lorraine, Vandoeuvre-leฬs-Nancy, France
Abstract
A piecewise-deterministic Markov process is a stochastic process whose behavior is governed by an
ordinary differential equation punctuated by random jumps occurring at random times. We focus on
the nonparametric estimation problem of the jump rate for such a stochastic model observed within a
long time interval under an ergodicity condition. We introduce an uncountable class (indexed by the
deterministic flow) of recursive kernel estimates of the jump rate and we establish their strong pointwise
consistency as well as their asymptotic normality. We propose to choose among this class the estimator
with the minimal variance, which is unfortunately unknown and thus remains to be estimated. We also
discuss the choice of the bandwidth parameters by cross-validation methods.
Keywords: Cross-validation ยท Jump rate ยท Kernel method ยท Nonparametric estimation ยท Piecewisedeterministic Markov process
Mathematics Subject Classification (2010): 62M05 ยท 62G20 ยท 60J25
Contents
1 Introduction
2
2 Problem formulation
2.1 Definition and notation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.2 Assumptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
4
4
6
3 Estimation procedure
3.1 Inference for the inter-jumping times . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3.2 Optimal estimation of the jump rate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3.3 How to choose bandwidth parameters ฮฑ and ฮฒ? . . . . . . . . . . . . . . . . . . . . . . . .
7
7
9
11
4 Simulation study
4.1 Estimation algorithm . . .
4.2 TCP-like process . . . . .
4.3 Bacterial motility . . . . .
4.4 Fatigue crack propagation
13
13
14
15
17
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
A Ergodicity and invariant measures
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
18
B Proof of Theorem 3.3
19
B.1 Sketch of the proof . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
B.2 Remainder term . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
B.3 Martingale term . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
C Proof of Proposition 3.14
โ Electronic
โ Electronic
26
address: [email protected]; Corresponding author
address: [email protected]
1
1
Introduction
Piecewise-deterministic Markov processes (PDMPโs in abbreviated form) have been introduced in the
literature by Davis in [17] as a general class of continuous-time non-diffusion stochastic models, suitable
for modeling deterministic phenomena in which the randomness appears as point events. The motion of
a PDMP may be defined from three local characteristics: the flow ฮฆ(x, t), the jump rate ฮป(x) and the
transition measure Q(x, dy). Starting from some initial value X0 , the process evolves in a deterministic way following ฮฆ(X0 , t) until the first jump time T1 which occurs either when the flow reaches the
boundary of the state space or before, in a Poisson-like fashion with non homogenous rate ฮป(ฮฆ(X0 , t)).
In both cases, the post-jump location of the process at time T1 is governed by the transition distribution
Q(ฮฆ(X0 , T1 ), dy) and the motion restarts from this new point as before. This family of stochastic models
is well-adapted for tackling various problems arising for example in biology [9, 16, 30, 31, 32, 33, 34],
in neuroscience [22] or in reliability [7, 14, 13, 18]. Indeed, most of applications involving both deterministic motion and punctual random events may be modeled by a PDMP. Typical examples are
growth-fragmentation models composed of deterministic growths followed by random losses. For example [33], the size of a cell grows exponentially in time, next the cell divides into two offsprings whose size
is about half size of the parent cell, and so on.
Proposing efficient statistical methods for this class of stochastic models is therefore of a great interest.
Nevertheless, the very particular framework involving both deterministic motion and punctual random
jumps imposes to consider specific methods. For instance, the authors of [5] have shown that the wellknown multiplicative intensity model developed by Aalen [1] for estimating the jump rate function does
not directly apply to PDMPโs. Alternative approaches should be thus proposed. In the present paper,
we focus on the recursive nonparametric estimation of the jump rate of a PDMP from the observation of
only one trajectory within a long time interval. More precisely, the purpose of this work is to show how
one may obtain by kernel methods a class of consistent estimators for the jump rate, and how one may
choose among this class in an optimal way. To the best of our knowledge, the nonparametric estimation
of the jump rate in a general framework has never been investigated.
As PDMPโs may model a large variety of problems, some methods have been developed by many
authors for their statistical inference. As presented before, the randomness of a PDMP is governed by
two characteristics: the transition kernel Q(x, dy) and the jump rate ฮป(x). As a consequence, two main
questions arise in the estimation problem for such a process, namely the statistical inference for both
these features. On the one hand, a few papers investigate some nonparametric methods for estimating
the transition function of a PDMP either for a specific model [13] or in a more general setting for a
d-dimensional process [3]. On the other hand the estimation of the jump rate ฮป(x) or of the associated
density function has been more extensively studied by several authors. Without attempting to give an
exhaustive survey of the literature on this topic, one may refer the reader to [5, 19, 20, 25, 28] and the
references therein. In the book [25], the author studies likelihood processes for observation of PDMPโs
which could lead to inference methods in a parametric or semi-parametric setting. The papers [19, 20] deal
with the nonparametric estimation for some PDMPโs used in the modeling of a size-structured population
observed along a lineage tree. In both these articles, the authors rely on the specific form of the features
of the process of interest in order to derive the asymptotic behavior of their estimation procedure. These
techniques have been generalized in [28] to introduce a nonparametric method for estimating the jump
rate in a specific class of one-dimensional PDMPโs with monotonic motion and deterministic breaks,
that is to say when the transition measure Q(x, dy) is a Dirac mass at some location depending on x.
The procedures developed in these papers [19, 20, 28] are obviously of a great interest but strongly use
the particular framework involved in the investigated models and are thus not well adapted in a more
general setting. In [5], the authors show that the famous multiplicative intensity model only applies
for estimating the jump rate of a modified version of the underlying PDMP. This leads to a statistical
method for approximating the conditional density associated with the jump rate for a process defined on
a bounded metric state space.
A main difficulty throughout the present paper and the articles [3, 5] is related to the presence of
deterministic jumps when the path reaches the boundary of the state space. This feature is often used for
modeling a deterministic switching when the quantitative variable rises over a certain threshold [2, 24].
In a statistical point of view, the interarrival times are therefore right-censored by a deterministic clock
depending on the state space, which leads to some technical difficulties. We would like to emphasize that
the techniques developed in the references [19, 20, 25, 28] do not take into account the likely presence of
2
forced jumps in the dynamic.
One may also find in the literature a few papers [6, 8, 10, 11] which focus on the estimation of various
functionals for this family of stochastic models. More precisely, the authors of [10, 11] provide numerical
methods for the expectations and for the exit times of PDMPโs. In addition, the article [8] deals with a
PDMP introduced for modeling the temporal evolution of exposure to a food contaminant and consider
a simulation-based statistical inference procedure for estimating some functionals such as first passage
times. Plug-in methods have been studied in [6] for a non-ergodic growth-fragmentation model which is
absorbed under a certain threshold. In many aspects our approach and these papers are different and
complementary. Indeed they are devoted to the estimation of some functionals of PDMPโs while we focus
on the direct estimation of the primitive data of such a process.
In this article, we introduce a three-dimensional kernel estimator computed from the observation
of the embedded Markov chain of a PDMP composed of the post-jump locations Zn and the travel
times Sn+1 along the path ฮฆ(Zn , t). We establish its pointwise consistency as well as its asymptotic
normality in Theorem 3.3. The estimate that we consider is recursive: it may be computed in real-time
from sequential data, which may be relevant in many applications. We deduce from this result two
first corollaries about the nonparametric estimation of the conditional density f (x, t) of the interarrival
time Sn+1 at time t conditionally on the event {Zn = x} (see Corollary 3.8) and its survival function
G(x, t) = P(Sn+1 > t | Zn = x) (see Corollary 3.9). We also investigate in Corollary 3.10 the asymptotic
behavior of an estimator for the composed function ฮป โฆ ฮฆ(x, t) obtained as the ratio f (x, t)/G(x, t). We
derive in (18) an uncountable class (indexed by the states ฮพ hitted by the reverse flow ฮฆ(x, โt) for some
time t) of consistent estimates of the jump rate ฮป(x). In other words, for each ฮพ = ฮฆ(x, โt), we get
a good estimate of ฮป(x). We show how one may choose among this class of estimators by minimizing
their asymptotic variance. We state in (19) that this procedure is equivalent to maximize the criterion
ฮฝโ (ฮพ)G(ฮพ, ฯx (ฮพ)) along the curve ฮฆ(x, โt), i.e. ฮพ = ฮฆ(x, โฯx (ฮพ)), where ฮฝโ (ฮพ) denotes the invariant
measure of the post-jump locations Zn and ฯx (ฮพ) is the only deterministic time to reach x following
ฮฆ(ฮพ, t). The choice of this criterion is far to be obvious without precisely computing the limit variance
in the central limit theorem presented in Corollary 3.10. Indeed, a naive criterion to maximize is the
invariant distribution ฮฝโ (ฮพ) along ฮฆ(x, โt): the larger ฮฝโ (ฮพ) is, the larger the number of data around
ฮพ is and the higher the quality of the estimation should be. Nonetheless, this simple criterion does not
take into account that the estimate also depends on the time of interest ฯx (ฮพ) (see Remark 3.11). This
question is also investigated from a numerical point of view in Subsection 4.2 where we show on synthetic
data that the choice of the criterion ฮฝโ (ฮพ)G(ฮพ, ฯx (ฮพ)) is better than the naive one ฮฝโ (ฮพ). The bandwidths
in kernel methods are free parameters that exhibit a strong influence on the quality of the estimation.
We discuss the choice of the bandwidth parameters by a classic procedure that consists in minimizing the
Integrated Square Error, computed here along the reverse flow ฮฆ(x, โt): we introduce a cross-validation
procedure in this Markov setting and we prove its convergence in Propositions 3.14 and 3.15. Finally, we
would like to highlight that the regularity conditions that we impose are non restrictive. In particular,
neither the deterministic exit time from the state space is assumed to be a bounded function, nor the
transition kernel is supposed to be lower-bounded, as is the case in [5] (see eq. (2) and Assumptions 2.4).
In addition, the forms of the transition measure and of the deterministic flow are not specified.
The sequel of the paper is organized as follows. We begin in Section 2 with the precise formulation of
our framework (see Subsection 2.1) and the main assumptions that we need in this article (see Subsection
2.2). Section 3 is devoted to the presentation of the statistical procedure and the related results of convergence. More precisely, a three-dimensional kernel estimator for the inter-jumping times is introduced
and investigated in Subsection 3.1. We derive a class of estimators of the jump rate and propose how
to choose among it in Subsection 3.2. The crucial choice of the bandwidth parameters is studied in
Subsection 3.3. Finally, a self-contained presentation of the whole estimation procedure is provided in
Subsection 4.1, then illustrated in the sequel of Section 4 on three different application scenarios, with
various sample sizes and state space dimensions, involving both simulated and real datasets. More precisely, we focus on the TCP window size process used for modeling data transmission over the Internet in
Subsection 4.2. Estimation of bacterial motility is tackled in Subsection 4.3, while acceleration of fatigue
crack propagation is considered in Subsection 4.4. The proofs and the technicalities are postponed in
Appendix A, B and C at the end of the paper.
3
2
Problem formulation
This section is devoted to the definition of the PDMPโs and to the presentation of the main assumptions
that we impose in the paper.
List of notations: In this paper B(Rd ) denotes the Borel algebra of Rd endowed with the Euclidean
norm | ยท |. In addition, the Lebesgue measure on B(Rd ) is denoted by ฮปd (dx), with the particular notation
in the one-dimensional case ฮป1 (dx) = dx. The ball of Rd with radius r and center x is denoted by
Bd (x, r). The closure of a set E is denoted by E while โE stands for its boundary.
2.1
Definition and notation
The motion of a PDMP may be described as the solution of an ordinary differential equation ฮฆ punctuated
at random times by random jumps governed by a transition kernel Q (see Figure 1). The random jumps
occur either when the deterministic motion hits the boundary of its state space, or before, with non
homogeneous rate ฮป taken along the curve defined by the differential equation ฮฆ.
Figure 1: Schematic path of a PDMP. This paper is devoted to the nonparametric estimation of the statedependent rate ฮป, that governs the spontaneous generation of jumps, from a long-time trajectory.
More precisely, a PDMP (Xt )tโฅ0 on (Rd , B(Rd )) is defined from its three local characteristics (ฮป, Q, ฮฆ):
โข ฮฆ : Rd ร R โ Rd is the deterministic flow. It satisfies the semigroup property,
โ x โ Rd , โ t, s โ R, ฮฆ(x, t + s) = ฮฆ(ฮฆ(x, t), s).
โข ฮป : Rd โ R+ is the jump rate.
โข Q : (Rd , B(Rd )) โ [0, 1] is the transition kernel.
We define the deterministic exit times of E for the flow and for the reverse flow as, for any x โ E,
t+ (x) = inf {t > 0 : ฮฆ(x, t) โ โE}
and
tโ (x) = inf {t > 0 : ฮฆ(x, โt) โ โE} .
(1)
In all the sequel, we consider a PDMP (Xt )tโฅ0 evolving on an open subset E of Rd . In this context,
we impose as usual [17, (24.8) Standard conditions] that,
Z ฮต
โ x โ E, โ ฮต > 0,
ฮป(ฮฆ(x, t)) dt < +โ,
0
and
โ x โ E, Q(x, E \ {x}) = 1.
(2)
In addition, we restrict ourselves to the case where the transition kernel Q admits a density with respect
to the Lebesgue measure,
Z
โ x โ Rd , โ A โ B(Rd ), Q(x, A) =
Q(x, y) ฮปd (dy).
(3)
A
This assumption is natural when one considers multivariate real-valued PDMPโs, and is satisfied in
various problems arising in biology [9], population dynamics [6] or in insurance [17, (21.11) An insurance
model].
4
Starting from any initial condition X0 = x, the motion of (Xt )tโฅ0 may be described as follows. The
distribution of the first jump time T1 is given by,
R
(
t
exp โ 0 ฮป(ฮฆ(x, s)) ds
if t < t+ (x),
โ t โฅ 0, P(T1 > t | X0 = x) =
(4)
0
else.
In other words, the process jumps either when the flow hits the boundary of the state space at time t+ (x)
or in a Poisson-like fashion with rate ฮป โฆ ฮฆ before. Next the post-jump location Z1 at time T1 is defined
through the transition kernel Q: for any test function ฯ, we have
Z
E ฯ(Z1 ) T1 , X0 = x = ฯ(u) Q(ฮฆ(x, T1 ), du).
The path between 0 and the first jump time T1 is given by,
ฮฆ(x, t)
โ 0 โค t โค T1 , Xt =
Z1
if t < T1 ,
else.
Now starting from the post-jump location XT1 , one chooses the next inter-jumping time S2 = T2 โ T1
and the future post-jump location Z2 in a similar way as before, and so on. One obtains a strong Markov
process with (Tn )nโฅ0 as the sequence of the jump times (where T0 = 0 by convention). The inter-jumping
times are defined by S0 = 0 and, for any integer n โฅ 1, Sn = Tn โ Tnโ1 . Finally (Zn )nโฅ0 denotes the
stochastic sequence of the post-jump locations of (Xt )tโฅ0 , with for any n, Zn = XTn .
All the randomness of the PDMP (Xt )tโฅ0 is contained in the stochastic sequence (Zn , Sn+1 )nโฅ0
which is a Markov chain. In addition, the post-jump locations (Zn )nโฅ0 also form a discrete-time Markov
process on the state space E because of the condition (2). In this paper, ฮฝn denotes the distribution of
the nth post-jump location Zn for any integer n โฅ 0, while P denotes its Markov kernel,
โ x โ E, โ A โ B(Rd ), P(x, A)
=
=
P(Zn+1 โ A | Zn = x)
Z
S(x, dt) Q(ฮฆ(x, t), A),
R+
(5)
where S stands for the conditional distribution of Sn+1 given Zn for any n,
โ x โ E, โ t โฅ 0, S(x, (t, +โ))
=
=
P(Sn+1 > t | Zn = x)
R
(
t
exp โ 0 ฮป(ฮฆ(x, s))ds
0
if t < t+ (x),
(6)
else,
in light of (4). We would like to highlight that the conditional distribution S(x, ยท) is absolutely continuous
with respect to the unidimensional Lebesgue measure on (0, t+ (x)) with sometimes a singular component
at t+ (x),
Z
f (x, t) dt + S(x, A โฉ {t+ (x)}),
โ A โ B(R+ ), S(x, A) =
(7)
Aโฉ(0,t+ (x))
where the conditional density f may be obtained by deriving (6),
Z
โ x โ E, โ 0 < t < t (x), f (x, t) = ฮป(ฮฆ(x, t)) exp โ
+
t
ฮป(ฮฆ(x, s))ds .
(8)
0
In all the sequel G stands for the conditional survival function associated with f , that is,
โ x โ E, โ 0 < t < t+ (x), G(x, t) = S(x, (t, +โ)),
(9)
where S is defined in (6). As highlighted before, the process (Zn , Sn+1 )nโฅ0 forms a Markov chain on the
set F defined by
[
F =
{x} ร [0, t+ (x)].
(10)
xโE
R denotes the transition kernel of this process,
โ (x, t) โ F, โ A ร B โ B(Rd ร R+ ), R((x, t), A ร B)
=
=
P(Zn+1 โ A, Sn+2 โ B | Zn = x, Sn+1 = t)
Z
Q(ฮฆ(x, t), dฮพ) S(ฮพ, B),
(11)
A
and, for any n, ยตn denotes the distribution of the couple (Zn , Sn+1 ).
5
2.2
Assumptions
The main assumption that we impose in the present paper is a condition of ergodicity on the Markov
chain (Zn )nโฅ0 . This property is often a keystone in statistical inference for Markov processes and may
be directly imposed [3, 5] or established [28] from the primitive features of the data.
Assumption 2.1 There exists a distribution ฮฝโ on E such that, for any initial distribution ฮฝ0 = ฮด{x} ,
x โ E,
lim kฮฝn โ ฮฝโ kT V = 0,
nโ+โ
where k ยท kT V stands for the total variation norm.
This assumption may be checked directly on the Markov kernel P of (Zn )nโฅ0 from the existence of a
Foster-Lyapunovโs function or Doeblinโs condition for instance [29, Theorem 16.0.2]. In the following
remark we establish a first property of the sequence (ฮฝn )nโฅ0 and of its limit ฮฝโ .
Remark 2.2 Since the transition kernel Q is assumed to be absolutely continuous with respect to the
Lebesgue measure (3), the kernel P given by (5) of the post-jump locations (Zn )nโฅ0 also admits a density.
As a consequence, for any integer n, the distribution ฮฝn of Zn and thus the invariant measure ฮฝโ
introduced in Assumption 2.1 admit a density on the state space E. For the sake of clarity, we write
ฮฝโ (dx) = ฮฝโ (x)ฮปd (dx) with a slight abuse of notation.
We add some regularity conditions on the main features of the process to show the convergence of the
estimates in Theorem 3.3.
Assumptions 2.3
โข The sup-norms kQkโ and kf kโ are finite. These conditions are used in the proof of Theorem 3.3
to find an upper bound of the non diagonal terms of some square variation process of interest.
โข The functions Q and f are Lipschitz,
โ x, y โ E, โ 0 < s < t < t+ (x) โง t+ (y), |f (x, t) โ f (y, s)| โค [f ]Lip (|t โ s| + |y โ x|),
โ x โ E, โ y, z โ E, |Q(x, y) โ Q(x, z)| โค [Q]Lip |y โ z|.
These conditions are used in the proof of Theorem 3.3 to control the diagonal terms of the same
variation process and to study the convergence of some remainder terms.
โข The survival function G is Lipschitz,
โ x, y โ E, โ 0 < t < t+ (x) โง t+ (y), |G(x, t) โ G(y, t)| โค [G]Lip |x โ y|.
This condition is used in the proof of Theorem 3.3 to investigate the convergence of the remainder
terms.
โข The deterministic exit time t+ is continuous. This condition is used to find some admissible initial
bandwidths v0 and w0 .
Finally, we consider an additional condition on both the transition kernels P and Q and the flow ฮฆ in
order to ensure the Lipschitz mixing property of the Markov chain (Zn )nโฅ0 . This will be sufficient to
establish the almost sure convergence to 0 of the remainder term with the adequate rate in the proof of
Theorem 3.3.
Assumptions 2.4 The transition kernel P of the Markov chain (Zn )nโฅ0 satisfies, for some a1 โฅ 1 and
a2 < 1,
Z
2
โ (x, y) โ E ,
|u โ v|a1 P(x, du)P(y, dv) โค a2 |x โ y|a1 .
Rd รRd
In addition, the composed function Q(ฮฆ(ยท, ยท), ยท) belongs to the regularity class Li(r1 , r2 ) defined by
|Q(ฮฆ(x1 , t1 ), y1 )โQ(ฮฆ(x2 , t2 ), y2 )| = O (|(x1 , t1 , y1 ) โ (x2 , t2 , y2 )|r2 (|(x1 , t1 , y1 )|r1 + |(x2 , t2 , y2 )|r1 + 1)) ,
for some positive numbers r1 and r2 satisfying 2(r1 + r2 ) โค a1 .
6
3
Estimation procedure
3.1
Inference for the inter-jumping times
n
For any integer n, we introduce the ฯ(Z0 , S1 , . . . , Znโ1 , Sn )-measurable functions ฮฝbโ
defined on E, and
n
n
b
b
F and G defined on the interior Fฬ (let us recall that the set F is given in (10)), by,
โ (x, t) โ Fฬ , Fbn (x, t)
=
โ (x, t) โ Fฬ , Gbn (x, t)
=
n
โ x โ E, ฮฝbโ
(x)
=
nโ1
Si+1 โ t
1X 1
Zi โ x
K
,
K
1
d
n i=0 vid wi
vi
wi
nโ1
1X 1
Zi โ x
1{Si+1 >t} ,
K
d
n i=0 vid
vi
nโ1
1X 1
Zi โ x
,
Kd
n i=0 vid
vi
(12)
(13)
where Kp denotes a kernel function on Rp , p โ {1, d}, and the bandwidths are defined for any integer k
by vk = v0 (k + 1)โฮฑ and wk = w0 (k + 1)โฮฒ for some ฮฑ, ฮฒ > 0 and initial positive values v0 and w0 .
It should be already noted that these quantities are of a great interest in the statistical study of the
inter-jumping times of the PDMP (Xt )tโฅ0 . Indeed, we will see that:
โข The ratio
b n (x,t)
F
n (x)
ฮฝ
bโ
estimates the conditional density f (x, t) defined in (8).
โข The ratio
bn (x,t)
G
n (x)
ฮฝ
bโ
estimates the conditional survival function G(x, t) defined in (9).
โข The ratio
b n (x,t)
F
bn (x,t)
G
estimates the composed function ฮป(ฮฆ(x, t)).
n
In addition, as the name suggests, we will state that ฮฝbโ
(x) is a good estimate of the density ฮฝโ (x) of
the unique invariant distribution of the post-jump locations, which is relevant in the estimation problem
for PDMPโs but has already been investigated in [3, Proposition A.11].
In all the sequel, we impose a few assumptions on both the kernel functions K1 and Kd .
Assumptions 3.1 For any p โ {1, d}, the kernel function Kp is assumed to be a nonnegative smooth
function satisfying the following conditions:
โข The sup-norm kKp kโ is finite.
R
โข Rp Kp dฮปp = 1.
โข supp Kp โ Bp (0p , ฮด). Together with well-chosen initial bandwidths, this condition avoids to compute
the kernel estimator from data located at the boundary of the state space F (see also Remark 3.4).
โข Only for p = d. The function Kd is Lipschitz,
โ x, y โ Rd , |Kd (x) โ Kd (y)| โค [K]Lip |x โ y|.
This condition is used to show eq. (57) in the proof of Proposition 3.14.
R
Remark 3.2 In particular, Assumptions 3.1 ensure that, for any p โ {1, d}, ฯp2 = Rp K2p dฮปp is finite.
This is used to find an upper bound ofRthe non diagonal terms of the variation process in the proof of
Theorem 3.3. In addition, the integral Rp |u|Kp (u)dฮปp (u) is also finite, which is needed to establish the
almost sure convergence of the remainder terms in the proof of the same result.
In the sequel the admissible set for the bandwidth parameters ฮฑ and ฮฒ is given by
A = (ฮฑ, ฮฒ) โ R2 : ฮฑ > 0, ฮฒ > 0, ฮฑd + ฮฒ < 1, ฮฑd + ฮฒ + 2 min(ฮฑ, ฮฒ) > 1 .
In this part, our main result is obtained from the use of vector martingales and is stated in the following
theorem.
7
Theorem 3.3 For any couple (x, t) โ Fฬ such that ฮฝโ (x)f (x, t) > 0, for any (ฮฑ, ฮฒ) โ A and (v0 , w0 )
such that
t+ (ฮพ),
(14)
t + w0 ฮด <
inf
ฮพโBd (x,v0 ฮด)
where ฮด appears in the third item of Assumptions 3.1, we have the almost sure convergence,
๏ฃน
๏ฃฎ n
๏ฃฎ
๏ฃน
Fb (x, t)
ฮฝโ (x)f (x, t)
a.s
n
๏ฃฐ Gb (x, t) ๏ฃป โโ ๏ฃฐ ฮฝโ (x)G(x, t) ๏ฃป
n
ฮฝโ (x)
ฮฝbโ
(x)
and the asymptotic normality,
๏ฃซ๏ฃฎ n
๏ฃน ๏ฃฎ
๏ฃน๏ฃถ
Fb (x, t)
ฮฝโ (x)f (x, t)
1โฮฑdโฮฒ
d
๏ฃญ๏ฃฐ Gbn (x, t) ๏ฃป โ ๏ฃฐ ฮฝโ (x)G(x, t) ๏ฃป๏ฃธ โโ
n 2
N (03 , ฮฃ(x, t, ฮฑ, ฮฒ)),
n
ฮฝโ (x)
ฮฝbโ
(x)
where the variance-covariance matrix ฮฃ(x, t, ฮฑ, ฮฒ) is degenerate with only one positive term at position
(1, 1). ฮฃ(x, t, ฮฑ, ฮฒ) is defined in (52).
2
Proof. The proof is stated in Appendix B.
Remark 3.4 The existence of a couple (v0 , w0 ) satisfying (14) is obvious whenever the exit time t+ is
continuous (see Assumptions 2.3). This condition ensures that all the inter-jumping times used in the
calculus of Fbn and Gbn are not obtained from forced jumps when the process reaches the boundary of the
state space. In the case where t+ (x) = โ, it is obvious that no interarrival times are right-censored. The
consistency and the asymptotic normality are therefore still accurate without any condition on (v0 , w0 ).
Remark 3.5 In Theorem 3.3, the choice (14) of the initial bandwidths v0 and w0 is locally dependent
on the point of interest. This may appear restrictive but may be avoided by considering the elements of
n
o
C = C ร [0, T ] : C is a compact subset of E and T < inf t+ (x) .
(15)
xโC
Indeed, for any C ร [0, T ] โ C, there always exists a couple (v0 , w0 ) such that
T + w0 ฮด < inf
inf
xโC ฮพโBd (x,v0 ฮด)
t+ (ฮพ).
Thus, (v0 , w0 ) satisfies (14) for any point (x, t) โ C ร [0, T ].
Remark 3.6 The variance-covariance matrix appearing in the asymptotic normality presented in Theorem 3.3 is degenerate with only the component (1, 1) positive. It means that the rate of the estimators
n
ฮฝbโ
and Gbn is faster than the one of Fbn . This is straightforward because Fbn is obtained by smoothing
n
the empirical distribution of the data both in the spatial and temporal directions contrary to ฮฝbโ
and Gbn .
The proof of the previous result may be adapted to show the two-dimensional central limit theorem, with
ฮฑ such that ฮฑd < 1 and ฮฑ(d + 2) > 1:
n
1โฮฑd
ฮฝโ (x)G(x, t)
d
Gb (x, t)
โ
โโ N (02 , ฮฃ0 (x, t, ฮฑ)),
n 2
n
ฮฝโ (x)
ฮฝbโ
(x)
where ฮฃ0 (x, t, ฮฑ) is a diagonal 2 ร 2-matrix. The keystone to state this convergence is the behavior given
in (50) of the hook of a vector martingale.
If we assume the geometric ergodicity of the Markov chain (Zn )nโฅ0 , one may also obtain the rate of
n
convergence of the variances of the estimates Fbn , Gbn and ฮฝbโ
uniformly on any compact subset of Fฬ such
that the parameters v0 and w0 may be uniformly chosen (see Remark 3.5).
8
Proposition 3.7 Let us assume that there exists b > 1 such that kฮฝn โฮฝโ kT V = O(bโn ). The geometric
ergodicity is in particular ensured by Doeblinโs condition (see [29, Theorem 16.0.2]). Then, for any set
C ร [0, T ] โ C and for any couple (ฮฑ, ฮฒ) such that 2(ฮฑd + ฮฒ) < 1, we have
sup Var(Fbn (x, t))
=
O(n2(ฮฑd+ฮฒ)โ1 ),
=
O(n2ฮฑdโ1 ).
(x,t)โC
sup
n
Var(Gbn (x, t)) + Var(b
ฮฝโ
(x))
(x,t)โC
Let us recall that C has been defined in (15). The rate of convergence for Fbn is faster than the one given
in Theorem 3.3 whenever 3(ฮฑd + ฮฒ) < 1.
Proof. The proof is similar to the demonstrations of Proposition B.5 and Corollary B.6 of [3] and relies
on the control of the covariance process of functionals of a geometrically ergodic Markov chain (see [29,
Theorem 16.1.5]).
2
We present in the sequel some corollaries of Theorem 3.3 that are of interest in the estimation problem
for the inter-jumping times. First, we define the estimator fbn (x, t) of f (x, t) by,
Fbn (x, t)
โ (x, t) โ Fฬ , fbn (x, t) = n
,
ฮฝbโ (x)
with the usual convention 0/0 = 0. We have the following result of convergence.
Corollary 3.8 For any couple (x, t) โ Fฬ such that ฮฝโ (x)f (x, t) > 0, for any (ฮฑ, ฮฒ) โ A and (v0 , w0 )
satisfying (14), we have
1โฮฑdโฮฒ
ฯ12 ฯd2 f (x, t)
a.s.
d
and
n 2
fbn (x, t) โโ f (x, t)
fbn (x, t) โ f (x, t) โโ N 0,
.
(1 + ฮฑd + ฮฒ)ฮฝโ (x)
Proof. This result is a direct application of Theorem 3.3 and Slutskyโs lemma.
2
Another feature of interest for the inter-jumping times is the survival function G. One may estimate this
quantity by,
bn
b n (x, t) = G (x, t) ,
โ (x, t) โ Fฬ , G
n (x)
ฮฝbโ
with the convention 0/0 = 0. Some properties of convergence are stated in the following corollary.
Corollary 3.9 For any couple (x, t) โ Fฬ such that ฮฝโ (x)f (x, t) > 0, for any ฮฑ such that ฮฑd < 1 and
ฮฑ(d + 2) > 1, and any v0 , we have
1โฮฑd
ฯd2 G(x, t)
a.s.
d
n
n
b
b
2
and
n
G (x, t) โโ G(x, t)
.
G (x, t) โ G(x, t) โโ N 0,
(1 + ฮฑd)ฮฝโ (x)
Proof. The almost sure convergence is a direct application of Theorem 3.3. The central limit theorem
is a consequence of the asymptotic normality established in Remark 3.6 and Slutskyโs lemma.
2
3.2
Optimal estimation of the jump rate
n
We propose to estimate the composed function ฮป โฆ ฮฆ by the ratio ฮป[
โฆ ฮฆ defined by,
n
Fbn (x, t)
โ (x, t) โ Fฬ , ฮป[
โฆ ฮฆ (x, t) =
,
Gbn (x, t)
(16)
again with the convention 0/0 = 0. Pointwise convergence and asymptotic normality are again a consequence of Theorem 3.3.
9
Corollary 3.10 For any couple (x, t) โ Fฬ such that ฮฝโ (x)f (x, t) > 0, for any (ฮฑ, ฮฒ) โ A and (v0 , w0 )
satisfying (14), we have
n
a.s.
ฮป[
โฆ ฮฆ (x, t) โโ ฮป โฆ ฮฆ(x, t),
and
n
1โฮฑdโฮฒ
2
n
d
ฮป[
โฆ ฮฆ (x, t) โ ฮป โฆ ฮฆ(x, t) โโ N 0,
ฯ12 ฯd2 ฮป โฆ ฮฆ(x, t)
(1 + ฮฑd + ฮฒ)ฮฝโ (x)G(x, t)
.
Proof. This result is a direct application of Theorem 3.3 and Slutskyโs lemma together with (6), (8)
and (9).
2
In all the sequel, we focus on the estimation of the rate ฮป (and not on the composed function ฮป โฆ ฮฆ)
n
from the estimate ฮป[
โฆ ฮฆ defined in (16). In particular, for some fixed value x โ E, we introduce a
n
bฮพ (x) of ฮป(x) indexed by the elements ฮพ of the curve Cx described by the reverse
class of estimators ฮป
flow ฮฆ(x, โt), t โฅ 0, and we propose to choose an estimate from this class in an optimal way. Before
proceeding further we define the notation Cx as
Cx = {ฮฆ(x, โt) : 0 โค t < tโ (x)}.
By definition (1) of tโ (x) we have Cx โ E. In addition, for any ฮพ โ Cx , we define ฯx (ฮพ) as the unique
time satisfying
ฮฆ(ฮพ, ฯx (ฮพ)) = x, ฮพ โ Cx .
Thus we have the following trivial result,
โ ฮพ โ Cx , ฮป โฆ ฮฆ(ฮพ, ฯx (ฮพ)) = ฮป(x).
As a consequence, we propose to define a class of estimators of ฮป(x) by
n
o
n
bn
[
ฮn (x) = ฮป
ฮพ (x) = ฮป โฆ ฮฆ (ฮพ, ฯx (ฮพ)) : ฮพ โ Cx ,
(17)
(18)
n
where ฮป[
โฆ ฮฆ estimates ฮป โฆ ฮฆ (see Corollary 3.10) and has already been defined in (16). By virtue of
Corollary 3.10 and only using (17), one has, as n goes to infinity,
1โฮฑdโฮฒ
a.s.
d
2
bn
bn
and n 2
โ ฮพ โ Cx , ฮป
ฮป
ฮพ (x) โโ ฮป(x)
ฮพ (x) โ ฮป(x) โโ N 0, ฯฮพ,ฮฑ,ฮฒ (x) ,
where the asymptotic variance is given by
2
ฯฮพ,ฮฑ,ฮฒ
(x) =
ฯ12 ฯd2 ฮป(x)
,
(1 + ฮฑd + ฮฒ)ฮบx (ฮพ)
with
ฮบx (ฮพ) = ฮฝโ (ฮพ)G(ฮพ, ฯx (ฮพ)).
(19)
n
bn
In this paper, we choose to approximate ฮป(x) by the element ฮป
ฮพ (x) โ ฮ (x) minimizing the asymptotic
2
variance ฯฮพ,ฮฑ,ฮฒ
(x). In other words, our optimal estimator of the jump rate ฮป(x) is obtained as
bn
bn
ฮป
โ (x) = ฮปฮพโ (x),
where
ฮพโ = arg max ฮบx (ฮพ).
ฮพโCx
Remark 3.11 A good criterion should be to maximize the invariant measure ฮฝโ (ฮพ), ฮพ โ Cx . Indeed,
if ฮฝโ (ฮพ) is large, a large frequency of post-jump locations around ฮพ may be available in the dataset.
Nevertheless, roughly speaking, the quantities of interest f (ฮพ, ฯx (ฮพ)) and G(ฮพ, ฯx (ฮพ)) are well estimated if
a large number of post-jump locations are around ฮพ together with inter-jumping times around ฯx (ฮพ). This
naive criterion may be corrected by including the quality of the estimation at time ฯx (ฮพ), that is to say,
by maximizing the product ฮฝโ (ฮพ)G(ฮพ, ฯx (ฮพ)). We also refer the reader to the simulation study presented
in Section 4 and more precisely to Figure 8.
The criterion ฮบx (ฮพ), ฮพ โ Cx , is generally uncomputable from the known features of the PDMP and
thus remains to be estimated. In light of Theorem 3.3 and by definition (19) of ฮบx (ฮพ), we naturally
propose to approximate this quantity by,
bn
โ ฮพ โ Cx , ฮบ
bn
x (ฮพ) = G (ฮพ, ฯx (ฮพ)).
10
(20)
As a consequence, we propose to estimate the jump rate ฮป(x) by its statistical approximation in ฮn (x)
maximizing the estimated criterion ฮบ
bx (ฮพ). More precisely,
n
b
bโ (x) = ฮป
bnbn (x),
ฮป
ฮพ
โ
where
ฮพbโn = arg max ฮบ
bn
x (ฮพ).
(21)
ฮพโCx
The high oscillations or alternatively the high smoothness of a kernel estimator with a ill-chosen bandwidth suggest that the choice of the parameter ฮฑ appearing in ฮบ
bn
x (see eq. (12) and (20)) is crucial at
this maximization step.
3.3
How to choose bandwidth parameters ฮฑ and ฮฒ?
This part is devoted to the choice of the bandwidth parameters ฮฑ and ฮฒ. The criteria that we introduce
in this part to choose these features are defined as line integrals along the curve Cx . As a consequence,
we need to ensure that this kind of quantity is well defined in our setting.
Assumption 3.12 For any starting condition ฮพ โ E, the reverse flow t 7โ ฮฆ(ฮพ, โt) defines a change of
variable, that is to say, is a diffeomorphic mapping.
It is common in the literature to minimize the Integrated Square Error (ISE) to choose the optimal
bandwidths of a kernel estimator, in particular from dependent data: one may refer the reader to
[23, 26, 27]. Another classical solution is to investigate the behavior of the Mean Integrated Square Error
(MISE). In the framework of Gaussian dependent data, the authors of [15] have shown that the optimal
bandwidths obtained by minimizing the ISE and the MISE are very close if the dependence is of short
range, that is to say, if the covariance function is integrable (see [15, Theorem 2.2]). It should be noted
that a geometric ergodic Markov chain satisfies this kind of condition (see [29, Theorem 16.1.5]).
Let us recall that ฮฑ appears at first in the computation of the estimated criterion ฮบ
bn
x which we need
n
n
b
to maximize along the curve Cx . Indeed ฮบ
bx is computed (20) from the estimate G which implicitly
depends on ฮฑ. We propose to choose the bandwidth parameter ฮฑ by minimizing the ISE associated with
ฮบ
bx and defined by
Z
2
ISEn
=
(b
ฮบn
ฮบ (ฮฑ)
x (ฮพ) โ ฮบx (ฮพ)) dฮพ
Cx
Z
=
ฮบx (ฮพ)2 dฮพ + ฮตn
(22)
ฮบ (ฮฑ),
Cx
where the function
ฮตn
ฮบ
is given by
Z
ฮตn
(ฮฑ)
=
ฮบ
Gbn (ฮพ, ฯx (ฮพ))2 dฮพ โ 2
Z
Gbn (ฮพ, ฯx (ฮพ)) ฮบx (ฮพ)dฮพ.
(23)
Cx
Cx
One may remark that here the ISE is unusually computed along a curve of interest. In (22) the dependency
on ฮฑ only holds through the function ฮตn
ฮบ . As a consequence the optimal parameter ฮฑ minimizing this
stochastic function (23) also minimizes the ISE.
The function ฮตn
ฮบ is generally not computable since the unknown quantity ฮบx appears in its definition.
As a consequence, we propose to estimate ฮตn
ฮบ by cross-validation which is a popular technique for selecting the bandwidth that minimizes the ISE. The authors would like to highlight that cross-validation
involves here two main difficulties. First the estimators are computed from dependent data which are not
identically distributed. In addition, there is almost surely no data on the set of integration Cx whenever
the dimension d is larger than 2. That is why we propose a specific procedure adapted to this framework.
Before defining our cross-validation estimate of ฮตn
ฮบ , we need to introduce the quantities Tx,ฯ and ฮธx .
First Hx denotes the hyperplane orthogonal to Cx at x, that is,
n
o
Hx = y โ Rd : y โ x โฅ โt ฮฆ(x, 0) .
In addition, for any ฯ > 0, we introduce the notation Dx,ฯ for
Dx,ฯ = Bd (x, ฯ) โฉ Hx .
11
Furthermore Tx,ฯ denotes the tube around Cx with radius ฯ,
[
Tx,ฯ =
Cy .
(24)
D
yโ x,ฯ
Finally, for any ฮพ โ Tx,ฯ , ฮธx (ฮพ) denotes the unique time such that ฮฆ(ฮพ, ฮธx (ฮพ)) โ Dx,ฯ . In particular,
โ ฮพ โ Cx , ฮธx (ฮพ) = ฯx (ฮพ).
(25)
It should be noted that, for ฯ small enough, Tx,ฯ โ E.
We focus now on a cross-validation method for estimating the quantity ฮตn
bฮบn,en,ฯ of ฮตฮบn
ฮบ . The estimate ฮต
e
e
et )tโฅ0
is defined from the observation of the embedded Markov chain (Zk , Sk+1 )kโฅ0 of another PDMP (X
(independent on the first one (Xt )tโฅ0 and distributed according to the same parameters), by
ฮตbฮบn,en,ฯ (ฮฑ) =
Z
Cx
2
ฮบ
bn
x (ฮพ) dฮพ โ
ne โ1
+ 1 X bn e
ek ) 1Tx,ฯ (Z
ek ) 1
e
G Z k , ฮธ x (Z
ek ),+โ) (Sk+1 ),
dโ1
(ฮธx (Z
n
e ฯ 2 ฯdโ1 k=0
2ฮ
dโ1
2
(26)
where ฮ denotes as usually the Euler function. Some regularity conditions are necessary to investigate
the asymptotic behavior of the cross-validation estimate ฮตbฮบn,en,ฯ in Proposition 3.14.
Assumptions 3.13
โข The sup-norm kฮฝโ kโ is finite and ฮฝโ is Lipschitz,
โ x, y โ E, |ฮฝโ (x) โ ฮฝโ (y)| โค [ฮฝโ ]Lip |x โ y|.
โข The deterministic exit time for the reverse flow tโ is Lipschitz,
โ x, y โ E, |tโ (x) โ tโ (y)| โค [tโ ]Lip |x โ y|.
โข The flow ฮฆ is Lipschitz,
โ x, y โ E, โ t โ R, |ฮฆ(x, t) โ ฮฆ(y, t)| โค [ฮฆ]Lip |x โ y|.
โข The sup-norm kโt ฮฆkโ is finite and โt ฮฆ is Lipschitz,
โ x, y โ E, โ t โ R, |โt ฮฆ(x, t) โ โt ฮฆ(y, t)| โค [โt ฮฆ]Lip |x โ y|.
Proposition 3.14 Conditionally to ฯ(Z0 , S1 , . . . , Znโ1 , Sn ), we have
lim ฮตbฮบn,en,ฯ (ฮฑ) = ฮตn
ฮบ (ฮฑ)
n
e โโ
ฯโ0
a.s.
2
Proof. The proof is stated in Appendix C.
By virtue of Proposition 3.14, one may obtain an estimate of the optimal bandwidth parameter ฮฑ
arising in ฮบ
bn
bฮบn,en,ฯ for some small enough ฯ and large enough n
e. In addition,
x by minimizing the quantity ฮต
n
bn
by (16), (18) and (20), the quantity ฮบ
bx also appears in the calculus of the estimator ฮป
ฮพ (x). In particular,
bn
the same choice of ฮฑ may be done for computing the denominator ฮบ
bn
x (ฮพ) of ฮปฮพ (x). As a consequence it
remains to choose in an optimal way the bandwidth parameters ฮฑ and ฮฒ arising in the formula (16) of
bn
the numerator Fbn (ฮพ, ฯx (ฮพ)) of ฮป
ฮพ (x) (18).
In a similar way as before, we propose to choose ฮฑ and ฮฒ by minimizing the ISE associated with
Fbn (ยท, ฯx (ยท)) and computed along the curve Cx ,
Z
2
ISEn
=
Fbn (ฮพ, ฯx (ฮพ)) โ F (ฮพ, ฯx (ฮพ)) dฮพ
F (ฮฑ, ฮฒ)
Cx
Z
F(ฮพ, ฯx (ฮพ))2 dฮพ + ฮตn
F (ฮฑ, ฮฒ),
=
Cx
12
(27)
where Fbn implicitly depends on ฮฑ and ฮฒ, F(ฮพ, ฯx (ฮพ)) stands for ฮฝโ (ฮพ)f (ฮพ, ฯx (ฮพ)) and ฮตn
F is given by
Z
Z
ฮตn
Fbn (ฮพ, ฯx (ฮพ))2 dฮพ โ 2
Fbn (ฮพ, ฯx (ฮพ))F(ฮพ, ฯx (ฮพ))dฮพ.
F (ฮฑ, ฮฒ) =
Cx
Cx
As in the previous part we propose to estimate ฮตn
F by cross-validation from the observation of the
ek , Sek+1 )kโฅ0 of another PDMP (X
et )tโฅ0 . We define our estimate ฮตbn,en,ฯ1 ,ฯ2 of ฮตn
embedded chain (Z
F by
F
Z
ฮตbFn,en,ฯ1 ,ฯ2 (ฮฑ, ฮฒ) =
Fbn (ฮพ, ฯx (ฮพ))2 dฮพ
Cx
โ
2ฮ
dโ1
2
n
e ฯ2 ฯ
dโ1
2
n
e โ1
X
ฯdโ1
1
k=0
+1
e
ek , ฮธx (Z
ek ) 1Tx,ฯ (Z
ek ) 1
Fbn Z
1
(ฮธx (Zek )โ ฯ2 ,ฮธx (Zek )+ ฯ2 ) (Sk+1 ). (28)
2
2
The convergence of ฮตbFn,en,ฯ,ฮด is investigated in Proposition 3.15.
Proposition 3.15 Conditionally to ฯ(Z0 , S1 , . . . , Znโ1 , Sn ), we have
lim ฮตbFn,en,ฯ1 ,ฯ2 (ฮฑ, ฮฒ) = ฮตn
F (ฮฑ, ฮฒ)
n
e โโ
ฯ1,2 โ0
a.s.
Proof. The proof is similar to the demonstration of Proposition 3.14 stated in Appendix C.
4
2
Simulation study
In this section, we provide a self-contained presentation of the estimation procedure, as well as three
application scenarios on both simulated and real datasets.
4.1
Estimation algorithm
The sequel is devoted to the self-contained presentation of the estimation procedure provided in this
paper. Precisely, we are interested in the estimation of ฮป(x) for some x โ E โ Rd .
4.1.1
Preliminary computations
These preliminary computations only require to manipulate the flow ฮฆ and the state space E.
โข Compute the curve Cx = {ฮฆ(x, โt) : t โฅ 0} โฉ E.
โข Choose ฯ > 0 and compute
Dx,ฯ
=
Tx,ฯ
=
Bd (x, ฯ) โฉ {y โ Rd : y โ x โฅ โt ฮฆ(x, 0)},
[
Cy .
D
yโ x,ฯ
โข For any ฮพ โ Tx,ฯ compute ฮธx (ฮพ) as the unique solution of
ฮฆ(ฮพ, ฮธx (ฮพ)) โ Dx,ฯ .
The mapping ฯx is only defined on Cx โ Tx,ฯ by ฯx (ฮพ) = ฮธx (ฮพ).
4.1.2
Preliminary estimates
These preliminary computations require to choose kernel functions K1 and Kd on R and Rd , as well as
two positive values v0 and w0 .
โข For any couple (ฮฑ, ฮฒ), compute
n
Fbฮฑ,ฮฒ
(ฮพ, t) =
nโ1
X
Zi โ ฮพ
1
Si+1 โ t
ฮฑd+ฮฒ
(i
+
1)
K
K
.
1
d
vi
wi
nv0d w0 i=0
โข Compute
nโ1
1 X
Zi โ ฮพ
ฮฑd
Gbฮฑn (ฮพ, t) =
(i
+
1)
K
1{Si+1 >t} .
d
vi
nv0d i=0
13
4.1.3
Choice of bandwidth parameters by cross-validation
ei , Sei+1 )0โคiโคenโ1 ,
From the observation of two independent embedded chains (Zi , Si+1 )0โคiโคnโ1 and (Z
with n
e n, one determines the optimal bandwidth parameters appearing in the preceding estimates. In
practice, from only one trajectory of the underlying PDMP, one may divide the data into two categories:
the largest one is used for the estimation, while the cross-validation step relies on the other one.
โข Compute
ฮฑG = arg max
ฮฑ>0
Z
ne โ1
2 ฮ dโ1
+ 1 X bn e
2
ek ) 1Tx,ฯ (Z
ek ) 1
e
Gbฮฑn (ฮพ, ฯx (ฮพ))2 dฮพโ
Gฮฑ Zk , ฮธx (Z
ek ),+โ) (Sk+1 ).
dโ1
(ฮธx (Z
Cx
n
eฯ 2 ฯdโ1 k=0
โข Choose ฯ2 > 0 and compute
Z
n
(ฮฑF , ฮฒ F ) = arg max
Fbฮฑ,ฮฒ
(ฮพ, ฯx (ฮพ))2 dฮพ
ฮฑ,ฮฒ>0
โ
Cx
2ฮ
dโ1
2
n
e ฯ2 ฯ
4.1.4
dโ1
2
n
e โ1
X
ฯdโ1
k=0
+1
n
ek )1
ek , ฮธx (Z
ek ) 1Tx,ฯ (Z
e
Fbฮฑ,ฮฒ
Z
(ฮธx (Zek )โ ฯ2 ,ฮธx (Zek )+ ฯ2 ) (Sk+1 ).
2
2
Estimation of ฮป(x)
Finally, we compute the best estimate of ฮป(x) from all the preceding computations.
โข Compute
ฮพbโn = arg max GbฮฑnG (ฮพ, ฯx (ฮพ)).
ฮพโCx
F
F
G
โข From (ฮฑ , ฮฒ ), ฮฑ and ฮพbโn , compute
bnF F ฮพbโn , ฯx (ฮพbโn )
F
ฮฑ
,ฮฒ
b
bโ (x) =
.
ฮป
GbnG ฮพbโn , ฯx (ฮพbโn )
n
ฮฑ
Remark 4.1 The time complexity of this algorithm depends on several parameters, namely the number
n of observed jumps, the number n
e of observed data for the cross-validation steps, and also the numbers
Nฮพ , Nฮฑ and Nฮฒ for discretizing the state spaces of ฮพ, ฮฑ and ฮฒ at each maximization procedure. It
is easy to see that the cross-validation step is the most complex but remains polynomial, precisely in
O(nNฮฑ Nฮฒ (Nฮพ + n
e)).
4.2
TCP-like process
The application on which we focus in this part is a variant of the famous TCP window size process
appearing in the modeling of the Transmission Control Protocol used for data transmission over the
Internet and presented in [12]. This protocol has been designed to adapt to the traffic conditions of the
network: for a connection, the maximum number of packets that can be sent is given by a random variable
called the congestion window size. At each time step, if all the packets are successfully transmitted, then
one tries to transmit one more packet until a congestion appears.
The model presented in this part is two dimensional. For the sake of clarity, we will use the following
notation: for any x โ R2 , x1 and x2 denote the components of x. We consider a PDMP (Xt )tโฅ0 evolving
on the state space E = (0, 1)2 . The deterministic part of the model is defined from the flow ฮฆ given by,
โ x โ R2 , โ t โ R, ฮฆ(x, t) = (x1 + t, x2 ).
The jump rate ฮป is defined by,
โ x โ R2 , ฮป(x) = x1 + x2 .
The transition kernel Q is defined by,
Z
โ x โ E, โ A โ B(E), Q(x, A) โ
A
14
u(1 โ u)2/x1 โ1 v(1 โ v) du dv.
Starting from (x1 , x2 ), the process evolves in the unit square, always to the right, until a jump appears
either when the motion hits the boundary {(ฮพ1 , ฮพ2 ) : ฮพ1 = 1} or with the non homogeneous rate x1 +x2 +t
before, that is according to a Weibull distribution. The two components of the post-jump location are
independent and both governed by a Beta-distribution, in such a way that the process tends with a high
probability to jump to the left of the location just before the jump. One obtains a TCP-like process (see
Figure 2) for which the second dimension models the quality of the network (upper the second component
is, higher the probability of a congestion is).
[ Figure 2 approximately here ]
The asymptotic behavior of the process may be represented by the invariant distribution ฮฝโ of the
n
post-jump locations. Since this quantity is unknown, we propose to show in Figure 3 its estimate ฮฝbโ
defined by (13) and computed from n = 20 000 observed jumps.
[ Figure 3 approximately here ]
We present here all the procedure for estimating the jump rate ฮป at the location x = (0.75, 0.5) for
which the quality of the network is average. In this context, the class of estimators of ฮป(x) is indexed by
the elements ฮพ โ Cx = (0, 0.75] ร {0.5}. It should be noted that the invariant distribution at x is quite
low (see Figure 3). Nevertheless our method is expected to work pretty well even in this unfavorable
framework.
In this simulation study, we assume that we observe the embedded Markov chain (Zn , Sn+1 )nโฅ0 until
the 10 000th jump. The cross-validation procedure is computed from an additional chain, independent
on the first one, and observed until the 1 000th jump. When boxplots are presented, they have been
computed over 100 replicates.
bn
We begin with the choice of the bandwidth parameter ฮฑ appearing in ฮบ
bn
x (ฮพ) = G (ฮพ, ฯx (ฮพ)). The
cross-validation procedure relies on the minimization of the estimate ฮตbฮบn,en,ฯ (ฮฑ) which depends on the
positive parameter ฯ. We present in Figure 4 this quantity as a function of ฮฑ and from different values
of ฯ. Fortunately, this new parameter seems to have little influence over the behavior of the estimation
of the ISE along Cx .
[ Figure 4 approximately here ]
Now, from this ฮฑ (denoted in the sequel ฮฑG ), we maximize the estimated criterion ฮบ
bn
x (ฮพ) along the
n
b
curve Cx (see Figure 5): we obtain the optimal point ฮพโ at which we will compute our estimator of ฮป(x).
The crucial role of ฮฑ at this maximization step is illustrated in Figure 6.
[ Figure 6 approximately here ]
We continue with the choice of the couple (ฮฑ, ฮฒ) implicitly appearing in the estimator Fbn (ฮพ, ฯx (ฮพ)).
The optimal parameters (denoted in the sequel (ฮฑF , ฮฒ F )) are obtained by minimizing the estimate
ฮตbFn,en,ฯ1 ,ฯ2 (ฮฑ, ฮฒ) of the related ISE (see Figure 7).
[ Figure 7 approximately here ]
We compute the estimators
for different values of ฮพ โ Cx and with the optimal bandwidths ฮฑG
F
F
and (ฮฑ , ฮฒ ). The related boxplots are presented in Figure 8. The procedure makes us able to choose
the best index ฮพbโn which most of the time corresponds with the estimate with least bias and variance.
This proves the strong interest of the estimation algorithm developed in this paper.
bn
ฮป
ฮพ (x)
[ Figure 8 approximately here ]
4.3
Bacterial motility
We present here a model of bacterial motility. Most motile bacteria move by the use of a flagellum or
several flagella. The bacteria moves in the direction of the flagellum. A flagellum behaves like a rotary
motor. Periodically, the flagellum changes its direction and results in reorientation of the bacteria. This
allows bacteria to change direction. Bacteria can sense nutrients and move towards them. Additionally,
they can move in response to temperature, light, etc. If the bacteria is in a favorable environment,
the frequency of changes in direction is low. This intelligent behavior is allowed by the fact that the
jump rate of the direction depends on the environment. For example, [30, 31, 34] propose models for
15
the trajectory of the bacteria E. Coli. In particular, the author of [30] uses PDMPโs to describe the
movement of bacteria under the influence of an external attractive chemical signal.
We present here a variant of the model presented in [30]. The path of the bacteria is described by
a PDMP (Xt )tโฅ0 evolving in the three-dimensional space state E = D ร [0, 2ฯ) with D the unit disk
of R2 . For the sake of clarity, we will use the following notation: for any x โ R3 , x1 , x2 and x3 denote
the components of x. In our case, (x1 , x2 ) is the position of the bacteria in the unit disk, and x3 is the
direction of its flagellum.
The bacteria moves in the direction of its flagellum. In other words, the flow is given by,
โ x โ R3 , โ t โ R, ฮฆ(x, t) = (x1 + t cos x3 , x2 + t sin x3 , x3 ).
The bacteria changes its direction according to a jump rate function ฮป(x) = ฮป(x1 , x2 ) which depends
on the environment only through the position (x1 , x2 ) and not on the current angle. The jump rate
describes the interaction between the bacteria and its environment.
When the bacteria changes its direction, the new direction is chosen preferentially in the direction
of a more favorable environment. The transition kernel Q(x, ยท) models this change of direction. In our
case, we suppose the bacteria has no information a priori on the quality of the environment around itself.
Thus, Q can be defined by,
Z
1
โ x โ E, โA โ B([0, 2ฯ[), Q(x, (x1 , x2 ) ร A) =
du.
2ฯ A
Starting from the position (x1 , x2 ) in D, the bacteria evolves in the direction x3 โ [0, 2ฯ), until a jump
appears either when the bacteria hits the boundary โD of its environment or with the rate ฮป (ฮฆ(x, t)) =
ฮป(x1 + t cos x3 , x2 + t sin x3 ) before. The post-jump direction is next randomly chosen in [0, 2ฯ), and the
bacteria continues its path in this new direction, and so on. A possible path of this model is presented
in Figure 9.
[ Figure 9 approximately here ]
In this simulation study, the jump rate is taken constant equal to ฮป = 1. In other words, there is
no interaction between the bacteria and its environment. Of course, this assumption is not taken into
account in the estimation. Our goal is to estimate the jump rate ฮป in different points of E in order to
check if it depends on the position. Actually, this provides an estimate of the influence of a likely external
attractive signal on the bacteria.
The estimation algorithm presented in this paper yields an estimate of the jump rate at the threedimensional state (x1 , x2 , ฮธ). Nevertheless, one should take into account that the jump rate do not
depend on the angle ฮธ. We explain here the procedure to reduce the dimension and estimate the jump
rate at the location (x1 , x2 ) โ D.
bnbn (xฮธ ) at the
โข Let ฮธ โ [0, 2ฯ) be a fixed angle. Estimate the best index ฮพbโn (ฮธ) and the jump rate ฮป
ฮพโ (ฮธ)
location xฮธ = (x1 , x2 , ฮธ).
bnbn (xฮธ ) estimates ฮป(x1 , x2 ). We reproduce the preceding step for any ฮธ โ [0, 2ฯ). We
โข For any ฮธ, ฮป
ฮพโ (ฮธ)
obtain both a connected trajectory around (x1 , x2 )
Cx1 ,x2 = ฮพbโn (ฮธ) : ฮธ โ [0, 2ฯ) ,
(29)
and a class of optimal estimators
n
b bn
Lx ,x = ฮป
1
2
ฮพโ (ฮธ)
n
bฮพ : ฮพ โ Cx ,x
(xฮธ ) : ฮธ โ [0, 2ฯ) = ฮป
1 2
indexed by elements of Cx1 ,x2 .
โข As the jump rate does not depend on the direction ฮธ, we aggregate the estimators in Lx1 ,x2 to
obtain the following jump rate estimate
Z 2ฯ
bnbn (xฮธ ) dฮธ.
b 1 , x2 ) = 1
ฮป
(30)
ฮป(x
ฮพโ (ฮธ)
2ฯ 0
16
We investigate the estimation of the jump rate at the following 9 target points,
(x1 , x2 ) โ {(0, 0), (โ0.5, 0), (โ0.5, 0.5), (โ0.5, โ0.5), (0, 0.5), (0, โ0.5), (0.5, 0), (0.5, 0.5), (0.5, โ0.5)},
from a trajectory of n = 100 000 changes of direction. In the sequel, the aggregated estimator (30) is
approximated from a discretization of the interval [0, 2ฯ) with step ฯ/8. For each of the 9 target points,
bnbn (xฮธ ) for ฮธ in the discretization grid.
we present in Figure 10 the boxplot of the estimates ฮป
ฮพ (ฮธ)
โ
[ Figure 10 approximately here ]
As shown in Figure 11, the trajectories Cx1 ,x2 defined in (29) are very similar and close to the
boundary โD. We explain this fact as follows. For each target state x = (x1 , x2 , ฮธ), the optimal point
bn
ฮพbโn (ฮธ) maximizes ฮบ
bn
x (ฮพ) = G (ฮพ, ฯx (ฮพ)) along
Cx = {(x1 โ t cos ฮธ, x2 โ t sin ฮธ, ฮธ) : t โฅ 0} โฉ D,
where ฯx (ฮพ) satisfies x1 โฯx (ฮพ) cos ฮธ = ฮพ1 and x2 โฯx (ฮพ) sin ฮธ = ฮพ2 . Recall that Gbn (ฮพ, ฯx (ฮพ)) is an estimator
of ฮบx (ฮพ) = ฮฝโ (ฮพ)G(ฮพ, ฯx (ฮพ)). On the first hand, G(ฮพ, t) = exp(โt) for t small enough, then the only point
that maximizes G(ฮพ, ฯx (ฮพ)) is ฮพ = x itself. On the other hand, there is an important number of data that
are very close to the boundary โD (due to the fact that the bacteria jumps when it hits the boundary
โD). Then the maximization of Gbn (ฮพ, ฯx (ฮพ)) is a compromise between ฮพ = x and ฮพ near the boundary.
b 1 , x2 ) at the 9 target points are close together, and close to the true value
Finally, the estimates ฮป(x
ฮป = 1 with a small variance, which is a good indicator of a constant jump rate (see Figure 11).
[ Figure 11 approximately here ]
Now, we investigate the effect of the size n of the dataset on the quality of the estimation. We
compare results of simulations from n = 100 000, n = 50 000 and n = 20 000 observed data. When
n = 20 000, the trajectories Cx1 ,x2 are not all the time close to the boundary. It is due to the fact that, in
this case, some areas of the state space are not well-covered by the observed post-jump locations. Then,
if the target point is x = (x1 , x2 , ฮธ), the optimal point ฮพbโn (ฮธ) โ Cx is obtained at the location x itself (see
Figure 12). In addition, the estimated curves Cx1 ,x2 obtained from n = 50 000 data are very close to the
ones computed from n = 100 000 observed jumps.
[ Figure 12 approximately here ]
Of course, the larger the number of data n is, the better the estimations (see Figures 13 and 14). In
particular, it is difficult to conclude that the jump rate is constant from only n = 20 000 observed jumps
because the variance of the estimates is too large. Nevertheless, a dataset of size 50 000 may be sufficient
to conclude that the jump rate does not depend on the location.
[ Figures 13 and 14 approximately here ]
4.4
Fatigue crack propagation
Fatigue crack propagation is a stochastic phenomenon due to the inherent uncertainties originating
from material properties and cyclic mechanical loads. As a consequence, stochastic processes offer an
appropriate framework for modeling crack propagation. Fatigue life may be divided into crack initiation
and two crack growth periods, namely the linear or stable regime described by Parisโ equation
da
= C (โK(a))m ,
dN
and the acceleration or unstable regime modeled by Formanโs equation
C (โK(a))m
da
=
,
dN
(1 โ R)Kc โ โK(a)
where a is the crack length, N is the time measured in number of loading cycles, R is the stress ratio,
Kc represents the maximal value of the stress intensify factor required to induce failure and โK(a) is
the range of the stress intensity factor given by
ฯa โ1/2 โ
โK(a) = โฯ cos
ฯa,
ฯ
17
where ฯ is the size of the test specimen and โฯ is the stress range. In addition, m and C are two
unknown material parameters. In this context, regime-switching models have been proposed to analyze
fatigue crack growth data [7, 14]. The authors of [7] propose to estimate the transition time between
Parisโ and Formanโs regimes assuming that the crack propagation follows the trajectory of some piecewisedeterministic Markov process. The estimation procedure is performed on Virklerโs dataset [35] in which 62
identical centre-cracked aluminium alloy specimens (ฯ = 152 mm) were tested under constant amplitude
loading โฯ = 48.28 MPa at a stress ratio R = 0.2. The number of loading cycles for the crack tip to
advance a predetermined increment โa was recorded from an initial crack length of a0 = 9 mm to a final
length of 49.8 mm. 68 crack growth histories were obtained from these tests (see Figure 15).
[ Figure 15 approximately here ]
In this paper, we assume that the crack growth propagation follows Parisโ equation with random
parameters m and C before switching to Formanโs equation with another set of parameters m and C
distributed according to some transition measure. The transition occurs at a random time T1 given by
its survival function
Z t
ฮป ฮฆP
P(T1 > t | a0 = 9 mm, m, C) = exp โ
m,C (a0 , s) ds ,
0
ฮฆP
m,C
where
is the deterministic flow of Parisโ equation with parameters m and C. In the sequel, ฮฆP
m,C
will be computed from the Runge-Kutta method because there is no explicit solution to this differential
equation. We propose to estimate the jump rate of this stochastic model from real crack growth data.
It should be noted that the jump times are not directly observed in Virklerโs dataset but have been
estimated in [7]. The jump rate is of significant importance in understanding the transition between the
stable and unstable regimes of crack propagation, and has never been estimated in the framework of
PDMPโs. We emphasize that Virklerโs dataset is composed of 68 independent experiments and thus does
not directly follow the theoretical framework developed in this manuscript. Nevertheless, our estimation
procedure is expected to perform pretty well in this more favorable context (independent curves instead
of only one Markov path).
Material parameters m and C are unobserved but have also been estimated from Virklerโs experiments
in [7]. It is well-known in the literature that there is a strong linear relationship between these features.
This characteristic has again been highlighted in [7] and is shown in Figure 16. In order to reduce
the dimension and thus simplify the model, we propose to parametrize Parisโ equation with only one
parameter, say m, while log(C) is obtained from this linear relationship.
[ Figure 16 approximately here ]
We focus on the estimation of ฮป(a) for some crack length a. For each parameter m of Parisโ equation
there exists a unique deterministic time ฯm (a) such that Parisโ flow reaches a at time ฯm (a) starting
from a0 = 9 mm. Criterion ฮบa (m) and its maximum have been estimated for different values of a (see
Figure 17). In particular, one may observe that the larger the target length a is, the larger the optimal
parameter m.
[ Figure 17 approximately here ]
For each crack length a, we estimate the jump rate ฮป(a) from the parameter m maximizing the
estimated criterion ฮบa (m). We obtain the estimated function displayed in Figure 18. This curve is
increasing as expected and describes the transition rate from the stable region of propagation towards
the acceleration regime that leads to fracture. This makes us able to detect conditions of crack growth
instability and could be used to predict the critical length in fatigue crack propagation with a given level
of confidence.
[ Figure 18 approximately here ]
A
Ergodicity and invariant measures
In this section we present some preliminary and technical results about the invariant distributions of the
underlying Markov chains. We begin with some properties of the Markov chain (Zn )nโฅ0 of the post-jump
locations of the PDMP of interest. In particular, under Assumption 2.1, one may state the following
result.
18
Proposition A.1 We have the following statements:
โข (Zn )nโฅ0 is ฮฝโ -irreducible, positive Harris-recurrent and aperiodic.
โข ฮฝโ is the unique invariant distribution of (Zn )nโฅ0 .
Proof. The proof is similar to the demonstration of Proposition 4.2 of [4].
2
These properties make us able to apply the law of large numbers to the Markov chain (Zn )nโฅ0 (see [29,
Theorem 17.1.7]). Now we propose to focus on the sequence (Zn , Sn+1 )nโฅ0 which also forms a Markov
process whose transition kernel is given by R in (11). Let us recall that ยตn denotes the distribution on
the state space F defined by (10) of the couple (Zn , Sn+1 ), n โฅ 0. We define the measure ยตโ by,
Z
โ A โ B(Rd ), โ t โฅ 0, ยตโ (A ร (t, +โ)) =
ฮฝโ (dx) S(x, (t, +โ)),
(31)
A
where the conditional distribution S is given by (6). In particular, ยตโ is the unique invariant distribution
of (Zn , Sn+1 )nโฅ0 .
Proposition A.2 We have the following statements:
โข For any initial distribution ยต0 = ฮด{x,t} , (x, t) โ F , we have
lim kยตn โ ยตโ kT V = 0.
nโโ
โข (Zn , Sn+1 )nโฅ0 is ยตโ -irreducible, positive Harris-recurrent and aperiodic.
โข ยตโ is the unique invariant distribution of (Zn , Sn+1 )nโฅ0 .
Proof. The proof is similar to the demonstrations of Lemma 4.4 and Proposition 4.5 of [4].
2
We are able again to apply the law of large numbers to the Markov chain (Zn , Sn+1 )nโฅ0 by virtue of this
result. It should be noted that the measures ยตn , n โฅ 0, and ยตโ do not share with ฮฝn , n โฅ 0, and ฮฝโ
the property of absolute continuity with respect to the Lebesgue measure presented in Remark 2.2.
Remark A.3 For any n, ยตn and thus the limit ยตโ admit a density only on the interior Fฬ of the state
space F because of the expression (7) of S and thanks to Remark 2.2.
Finally, we would like to highlight that the link between the measures ฮฝโ and ยตโ may be expressed in
another way than (31). Indeed, for any x โ E, we have
Z
Q(ฮฆ(y, s), x)ยตโ (dy ร ds) = ฮฝโ (x),
(32)
F
by the expression (5) of the transition kernel P of (Zn )nโฅ0 and because ฮฝโ P = ฮฝโ by virtue of Proposition A.1. The formula (32) of ฮฝโ will be useful in our investigations.
B
Proof of Theorem 3.3
In all this section we use the notation Fn for the ฯ-algebra ฯ(Z0 , S1 , . . . , Zn , Sn+1 ), n โฅ 0. In addition,
the classical symbols โผ, o and O must be understood to hold here in the almost sure sense.
B.1
Sketch of the proof
The proof of Theorem 3.3 relies on the following decomposition. For any integer n โฅ 1, we have
๏ฃฎ n
๏ฃน
๏ฃฎ
๏ฃน
Fb (x, t)
ฮฝโ (x)f (x, t)
n
๏ฃฐ Gb (x, t) ๏ฃป โ ๏ฃฐ ฮฝโ (x)G(x, t) ๏ฃป = Mnโ1 + Rn ,
n
n
ฮฝโ (x)
ฮฝbโ
(x)
(33)
where the sequence (Mn )nโฅ0 is a (Fn )nโฅ0 -vector martingale defined by (37) and studied in Appendix
B.3, and Rn is a remainder term defined by (34) and studied in Appendix B.2.
19
In Appendix B.2, we establish that the remainder term almost surely goes to 0 when n tends to
infinity. This is a first step to show the almost sure convergence presented in Theorem 3.3. In addition
we investigate the rate of convergence of the remainder term in Appendix B.2 under an additional
Lipschitz mixing condition stated in Assumption 2.4. This is enough to prove the asymptotic normality
given in Theorem 3.3.
The rest of the proof deals with the study of the martingale term. We prove in Appendix B.3 that the
process (Mn )nโฅ0 is a vector martingale. We investigate its asymptotic behavior by studying its square
variation process (hMin )nโฅ0 in Appendix B.3. Thanks to these results we state the law of large numbers
and the central limit theorem for (Mn )nโฅ0 in Appendix B.3.
Finally the almost sure convergence presented in Theorem 3.3 is a direct application of (33) and (35)
together with (51), while the asymptotic normality is obtained from (33), (36) and (54).
B.2
Remainder term
This part of the paper is devoted to the asymptotic study of the remainder term sequence (Rn )nโฅ1
appearing in (33).
B.2.1
Definition of the remainder term
i
h
(k)
For any n, one may write Rn = Rn
, where each of the components is defined by
1โคkโค3
(1)
Rn
=
4
X
(1,j)
Rn
,
j=0
(2)
Rn
=
3
X
(2,j)
Rn
j=0
and
(3)
Rn
=
2
X
(3,j)
Rn
.
(34)
j=0
(1)
The five terms that define Rn are given by
1
Z0 โ x
S1 โ t
(1,0)
Rn
=
K
K
,
1
d
v0
w0
nv0d w0
nโ1 Z
1X
(1,1)
Rn
=
f (x + uvj , t + vwj )Kd (u)K1 (v) (Q (ฮฆ (Zjโ1 , Sj ) , x + uvj )โQ (ฮฆ (Zjโ1 , Sj ) , x)) du dv,
n j=1 Rd รR
(1,2)
Rn
=
(1,3)
Rn
=
(1,4)
Rn
=
Z
nโ1
1X
Q (ฮฆ (Zjโ1 , Sj ) , x)
[f (x + uvj , t + vwj ) โ f (x, t + vwj )] Kd (u)K1 (v) du dv,
n j=1
Rd รR
Z
nโ1
1X
Q (ฮฆ (Zjโ1 , Sj ) , x)
[f (x, t + vwj ) โ f (x, t)] Kd (u)K1 (v) du dv,
n j=1
Rd รR
" nโ1
#
1X
Q (ฮฆ (Zjโ1 , Sj ) , x) โ ฮฝโ (x) f (x, t).
n j=1
(2)
The four terms that define Rn are given by
1 1
Z0 โ x
(2,0)
Rn
=
K
1{S1 >t} ,
d
n v0d
v0
nโ1 Z
1X
(2,1)
Rn
=
[Q (ฮฆ (Zjโ1 , Sj ) , x + uvj ) โ Q (ฮฆ (Zjโ1 , Sj ) , x)] G(x + uvj , t)Kd (u) du,
n j=1 Rd
(2,2)
Rn
=
(2,3)
Rn
=
Z
nโ1
1X
Q (ฮฆ (Zjโ1 , Sj ) , x)
[G(x + uvj , t) โ G(x, t)] Kd (u) du,
n j=1
Rd
" nโ1
#
1X
Q (ฮฆ (Zjโ1 , Sj ) , x) โ ฮฝโ (x) G(x, t).
n j=1
20
(3)
Finally, the three terms that define Rn are given by
Z0 โ x
1 1
(3,0)
K
,
Rn
=
d
n v0d
v0
nโ1 Z
1X
(3,1)
Rn
=
[Q (ฮฆ (Zjโ1 , Sj ) , x + uvj ) โ Q (ฮฆ (Zjโ1 , Sj ) , x)] Kd (u) du,
n j=1 Rd
(3,2)
Rn
B.2.2
=
nโ1
1X
Q (ฮฆ (Zjโ1 , Sj ) , x) โ ฮฝโ (x).
n j=1
Almost sure convergence
(1)
We only investigate the first component (Rn )nโฅ1 since the other terms may be treated with similar
(1,0)
arguments. First, it is obvious that the sequence (Rn )nโฅ1 almost surely tends to 0. In addition,
(1,4)
the term (Rn )nโฅ1 converges to 0 by virtue of the ergodic theorem applied to the Markov chain
(Zn , Sn+1 )nโฅ0 (thanks to Proposition A.2) together with (32). Because both the functions Q and f are
Lipschitz and bounded (see Assumptions 2.3), we have
Z
nโ1
[Q]Lip kf kโ X
(1,1)
Rn
โค
vj
|u|Kd (u)du,
n
Rd
j=1
(1,2)
Rn
โค
Z
nโ1
kQkโ [f ]Lip X
|u|Kd (u)du,
vj
n
Rd
j=1
(1,3)
Rn
โค
Z
nโ1
kQkโ [f ]Lip X
wj
|v|K1 (v)dv,
n
R
j=1
which are some Cesaฬro means because both the sequences (vn )nโฅ0 and (wn )nโฅ0 tend to 0. Thus,
a.s.
Rn โโ 03 .
B.2.3
(35)
Rate of convergence
Under the first item of Assumptions 2.4, the Markov chain (Zn )nโฅ0 and thus the two-dimensional process
(Zn , Sn+1 )nโฅ0 satisfy the contraction assumption given in Theorem 6.3.17 of [21]. By applying this
theorem to the function ฯ = Q(ฮฆ(ยท, ยท), ยท) โ Li(r1 , r2 ) (see second item of Assumptions 2.4), we obtain
that, for any ฮณ โ (0, 1) and x โ E,
nโ
1+ฮณ
2
nโ1
X
a.s
[Q (ฮฆ (Zjโ1 , Sj ) , x) โ ฮฝโ (x)] โโ 0,
j=1
because 2(r1 + r2 ) โค a1 . Therefore, we have for any couple (k, j) in the set {(1, 4), (2, 3), (3, 2)},
n
1โฮฑdโฮฒ
2
a.s.
(k,j)
Rn
โโ 0.
The same result is obvious for the other couples (k, j) with the condition ฮฑd + ฮฒ + 2 min(ฮฑ, ฮฒ) > 1.
Finally we obtain, when n goes to infinity,
n
B.3
B.3.1
1โฮฑdโฮฒ
2
a.s.
Rn โโ 03 .
(36)
Martingale term
(Mn )nโฅ0 is a vector martingale
h
i
(k)
Let (Mn )nโฅ0 be the three-dimensional process defined for any n by Mn = Mn
, where each
1โคkโค3
component is defined as
Mn(k) =
n
X
(k)
Aj
(k)
โ Bj , k โ {1, 2, 3},
j=1
21
(37)
(k)
and the terms Aj
(1)
=
(1)
=
Aj
Bj
(2)
=
(2)
=
(3)
=
(3)
=
Aj
Bj
Aj
Bj
(k)
and Bj
1
Kd
vjd
Z
are given by
1
Sj+1 โ t
Zj โ x
,
K1
vj
wj
wj
Q(ฮฆ(Zjโ1 , Sj ), x + uvj )f (x + uvj , t + vwj ) Kd (u)K1 (v) ฮปd (du) dv,
Zj โ x
1
1{Sj+1 >t} ,
K
d
vj
vjd
Z
Q(ฮฆ(Zjโ1 , Sj ), x + uvj )G(x + uvj , t) Kd (u) ฮปd (du),
Rd
Zj โ x
1
,
K
d
vj
vjd
Z
Q(ฮฆ(Zjโ1 , Sj ), x + uvj ) Kd (u) ฮปd (du).
Rd รR
Rd
We claim that the process (Mn )nโฅ0 is a (Fn )nโฅ0 -martingale. The keystone is to show that, for any n
and k, we have
h
i
(k)
Fnโ1 = Bnโ1 .
E A(k)
n
The proof presents no particular difficulty except for the first component k = 1 for which we provide
some details. Let us recall that R denotes the transition kernel of the Markov chain (Zn , Sn+1 )nโฅ0 (see
Subsection 2.1). We have
Z
i
h
1
sโt
ฮพโx
F
=
E A(1)
K
R ((Znโ1 , Sn ), dฮพ ร ds)
K
1
nโ1
d
n
vnd wn Rd รR+
vn
wn
Z
sโt
1
ฮพโx
=
K
Q (ฮฆ(Znโ1 , Sn ), dฮพ) S(ฮพ, ds), (38)
K
1
d
vnd wn Rd รR+
vn
wn
with (11). Let us recall that the bandwidth sequence (vn )nโฅ0 is decreasing. Together with the third
item of Assumptions 3.1, we obtain
ยทโx
ยทโx
โ supp Kd
โ Bd (x, v0 ฮด).
supp Kd
vn
v0
With similar arguments, we obtain
ยทโt
ยทโt
supp K1
โ supp K1
โ B1 (t, w0 ฮด) โ โโ,
inf
t+ (ฮพ) ,
ฮพโBd (x,v0 ฮด)
wn
w0
(39)
with the condition (14) on the couple (v0 , w0 ). By (38), (39) together with the expression (7) of S we
obtain
Z
h
i
1
ฮพโx
sโt
E A(1)
Fnโ1 = d
Kd
K1
Q (ฮฆ(Znโ1 , Sn ), dฮพ) f (ฮพ, s) ds.
n
vn wn Rd รR+
vn
wn
One may conclude by a change of variable and (3).
B.3.2
Predictable square variation process
The asymptotic behavior of the martingale (Mn )nโฅ0 may be investigated by studying its predictable
square variation process that we denote as usual (hMin )nโฅ0 . At any time n, hMin is the 3ร3 symmetric
matrix defined by
n h h
i
i
X
(i)
(j)
(i)
(j)
hMin =
E Mk Mk Fkโ1 โ Mkโ1 Mkโ1
.
1โคi,jโค3
k=1
Now, we calculate each coefficient of this matrix by beginning with the diagonal terms and the first of
(1,1)
these hMin . One has
hMi(1,1)
= n Tn(1) โ Tn(2) ,
n
22
(1)
(2)
where the terms Tn
and Tn
are defined by
n
1X 1
Q(ฮฆ(Zjโ1 , Sj ), x + uvj )f (x + uvj , t + vwj )K2d (u)K21 (v)du dv,
n j=1 vjd wj Rd รR
2
n Z
X
Q(ฮฆ(Zjโ1 , Sj ), x + uvj )f (x + uvj , t + vwj )Kd (u)K1 (v)du dv .
Z
Tn(1)
=
Tn(2)
=
j=1
Rd รR
Since the functions Q and f are bounded (see Assumptions 2.3), we easily obtain that
Tn(2) = O(n).
(40)
Let us introduce the additional notation,
Ten(1)
=
Tฬn(1)
=
=
n Z
1X
Q(ฮฆ(Zjโ1 , Sj ), x + uvj )f (x + uvj , t + vwj )K2d (u)K21 (v)du dv,
n j=1 Rd รR
Z
n
1X
Q(ฮฆ(Zjโ1 , Sj ), x)f (x, t)
K2d (u)K21 (v)du dv
n j=1
Rd รR
n
ฯd2 ฯ12 X
Q(ฮฆ(Zjโ1 , Sj ), x)f (x, t),
n j=1
by Remark 3.2 on the kernel functions K1 and Kd . Since both Q and f are Lipschitz and bounded (see
Assumptions 2.3), together with supp Kp โ Bp (0p , ฮด) (see Assumptions 3.1), the stochastic sequences
(1)
(1)
(Ten )nโฅ0 and (Tฬn )nโฅ0 have the same limit thanks to
n
(kQkโ [f ]Lip + [Q]Lip kf kโ ) ฮดฯd2 ฯ12 X
Ten(1) โ Tฬn(1) โค
(vj + wj ),
n
j=1
(41)
which is a Cesaฬro mean. In addition, by the almost sure ergodic theorem (see Proposition A.2) together
with (32), we obtain
a.s.
Tฬn(1) โโ ฯd2 ฯ12 ฮฝโ (x)f (x, t).
(42)
By (41) and (42) and by virtue of Lemma 7.1.5 of [21], we obtain
(1)
2 2
Tn
a.s. ฯ ฯ ฮฝโ (x)f (x, t)
โโ d 1
.
ฮฑd+ฮฒ
n
1 + ฮฑd + ฮฒ
Together with (40), as n goes to infinity,
(1,1)
2 2
hMin
a.s. ฯ ฯ ฮฝโ (x)f (x, t)
โโ d 1
= 41 .
1+ฮฑd+ฮฒ
n
1 + ฮฑd + ฮฒ
(43)
The second diagonal term of the predictable variation process may be studied in a similar way as before.
We obtain
" Z
n
X
1
(2,2)
hMin
=
Q(ฮฆ(Zjโ1 , Sj ), x + uvj )G(x + uvj , t)K2d (u)du
d
v
d
R
j
j=1
Z
2 #
โ
Q(ฮฆ(Zjโ1 , Sj ), x + uvj )G(x + uvj , t)Kd (u)du
,
Rd
and, as n goes to infinity,
(2,2)
hMin
n1+ฮฑd
a.s.
โโ
ฯd2 ฮฝโ (x)G(x, t)
= 42 .
1 + ฮฑd
23
(44)
The third and last diagonal term may also be investigated in the same way. We have
" Z
n
X
1
(3,3)
Q(ฮฆ(Zjโ1 , Sj ), x + uvj )K2d (u)du
hMin
=
d
v
Rd
j
j=1
2 #
Z
Q(ฮฆ(Zjโ1 , Sj ), x + uvj )Kd (u)du
,
โ
Rd
and, when n goes to infinity,
(3,3)
2
hMin
a.s. ฯd ฮฝโ (x)
โโ
= 43 .
(45)
n1+ฮฑd
1 + ฮฑd
Now we focus on the non diagonal terms. For any integer n, we have
"Z
n
X
(1,2)
hMin
=
Q(ฮฆ(Zjโ1 , Sj ), x + uvj )2 f (x + uvj , t + vwj )G(x + uvj , t)K2d (u)K1 (v)du dv
Rd รR
j=1
Z
ร
hMi(1,3)
n
=
n
X
Q(ฮฆ(Zjโ1 , Sj ), x + uvj )f (x + uvj , t + vwj )Kd (u)K1 (v)du dv
Rd รR
Z
#
โ
Rd
"Z
Rd รR
j=1
Q(ฮฆ(Zjโ1 , Sj ), x + uvj )G(x + uvj , t)Kd (u)du
,
Q(ฮฆ(Zjโ1 , Sj ), x + uvj )2 f (x + uvj , t + vwj )K2d (u)K1 (v)du dv
Z
โ
=
Rd
"Z
n
X
R
j=1
Q(ฮฆ(Zjโ1 , Sj ), x + uvj )f (x + uvj , t + vwj )Kd (u)K1 (v)du dv
Rd รR
Z
#
ร
hMi(2,3)
n
Q(ฮฆ(Zjโ1 , Sj ), x + uvj )Kd (u)du
,
ร
(47)
Q(ฮฆ(Zjโ1 , Sj ), x + uvj )2 G(x + uvj , t)K2d (u)du
d
Z
โ
(46)
Q(ฮฆ(Zjโ1 , Sj ), x + uvj )G(x + uvj , t)Kd (u)du
Rd
Z
#
Rd
Q(ฮฆ(Zjโ1 , Sj ), x + uvj )Kd (u)du
.
(48)
From (46), (47) and (48),
and because Q and f are bounded (see Assumptions 2.3) together with the
R
fact that the integral K2p dฮปp is finite (see Remark 3.2), we easily obtain that, for any i 6= j,
hMi(i,j)
= O(n).
n
(49)
As a conclusion, by (43), (44), (45) and (49), one may sum up the asymptotic behavior of the predictable
variation process (hMin )nโฅ0 by the following formula,
๏ฃฎ ฮฒ
๏ฃน
n 41
0
0
hMin
โผ๏ฃฐ
(50)
0
42
0 ๏ฃป.
n1+ฮฑd
0
0
43
It should be noted that the coefficients 4i , 1 โค i โค 3, are positive because we assume that ฮฝโ (x) > 0
and f (x, t) > 0 in the statement of Theorem 3.3.
B.3.3
Limit theorems for the vector martingale
Law of large numbers. We propose to apply the law of large numbers for vector martingales (see
[21, Theorem 4.3.15]) to the process of interest (Mn )nโฅ0 . In the sequel, for any n, Tn denotes the trace
of the matrix hMin , while En stands for its minimum eigenvalue. First, in light of (50), the trace (Tn )nโฅ0
24
almost surely tends to infinity. Thus we are able to apply the third item of Theorem 4.3.15 of [21] with
any function a(t) = t1+ฮท , ฮท > 0, and we obtain,
2
log(Tn )1+ฮท
hMiโ1/2
Mn = o
.
n
En
By (50) again, we have, when n goes to infinity,
Tn = O n1+ฮฑd+ฮฒ
and
En โผ min(42 , 43 ) n1+ฮฑd .
As a consequence, using that n1+ฮฑd+ฮฒ = o(n2 ) whenever ฮฑd + ฮฒ < 1 together with (50), we have the law
of large numbers, as n tends to infinity,
kMn k a.s.
โโ 0.
(51)
n
Central limit theorem. We now investigate the asymptotic normality of the vector martingale
(Mn )nโฅ0 . We apply Corollary 2.1.10 of [21] with the sequence (an )nโฅ0 defined by an = n1+ฮฑd+ฮฒ . The
first assumption of this result is obviously satisfied: the sequence (aโ1
n hMin )nโฅ0 almost surely converges
to some positive semi-definite matrix. Indeed, by (50),
๏ฃฎ 2 2
๏ฃน
ฯd ฯ1 ฮฝโ (x)f (x,t)
0
0
1+ฮฑd+ฮฒ
a.s. ๏ฃฏ
๏ฃบ
nโ1โฮฑdโฮฒ hMin โโ ๏ฃฐ
(52)
0
0 0 ๏ฃป = ฮฃ(x, t, ฮฑ, ฮฒ),
0
0 0
where ฮฃ(x, t, ฮฑ, ฮฒ) is a degenerate variance-covariance matrix. As a consequence, we only have to check
Lindebergโs condition in order to establish the central limit theorem for (Mn )nโฅ0 . In other words, we
have to prove that, for any > 0,
#
"
n
X
1
P
2
(53)
E |Mj โ Mjโ1 | 1
Fjโ1 โโ 0.
1+ฮฑd+ฮฒ
2
n1+ฮฑd+ฮฒ j=1
|Mj โMjโ1 |โฅn
(k)
(k)
For any 1 โค j โค n and 1 โค k โค 3, we study the three components Mj โ Mjโ1 . We have
(j + 1)ฮฑd+ฮฒ
Zj โ x
Sj+1 โ t
(1)
(1)
Mj โ Mjโ1 =
K
K
1
d
vj
wj
v d w0
Z 0
โ
Q(ฮฆ(Zjโ1 , Sj ), x + uvj )f (x + uvj , t + vwj ) Kd (u)K1 (v) ฮปd (du) dv,
Rd รR
(2)
=
(3)
=
(2)
โ Mjโ1
(3)
โ Mjโ1
Mj
Mj
(j + 1)ฮฑd
Zj โ x
K
1{Sj+1 >t}
d
vj
v0d
Z
โ
Q(ฮฆ(Zjโ1 , Sj ), x + uvj )G(x + uvj , t) Kd (u) ฮปd (du),
Rd
Z
(j + 1)ฮฑd
Zj โ x
โ
Q(ฮฆ(Zjโ1 , Sj ), x + uvj ) Kd (u) ฮปd (du).
K
d
vj
v0d
Rd
Thus, we obtain
(1)
โค
(n + 1)ฮฑd+ฮฒ
kKd kโ kK1 kโ + kQkโ kf kโ ,
v0d w0
(2)
โค
(n + 1)ฮฑd
kKd kโ + kQkโ ,
v0d
(1)
โ Mjโ1 |
(2)
โ Mjโ1 |
|Mj
|Mj
(n + 1)ฮฑd
kKd kโ + kQkโ .
v0d
1+ฮฑd+ฮฒ
Together with the condition ฮฑd + ฮฒ < 1, |Mj โ Mjโ1 | = o n 2
. As a consequence, there exists
n
o
1+ฮฑd+ฮฒ
an integer N such that for any n โฅ N , the event |Mj โ Mjโ1 | โฅ n 2
is almost surely empty.
(3)
|Mj
(3)
โ Mjโ1 |
โค
This shows Lindebergโs condition (53). Finally, by (52) and (53), we obtain, as n tends to infinity,
nโ
1+ฮฑd+ฮฒ
2
d
Mn โโ N (03 , ฮฃ(x, t, ฮฑ, ฮฒ)) .
25
(54)
C
Proof of Proposition 3.14
en , Sen+1 )nโฅ0 , we
By virtue of the ergodic theorem (see Proposition A.2) applied to the Markov chain (Z
have, as nฬ tends to infinity,
Z
Z
2 ฮ dโ1
+1
a.s.
n,e
n,ฯ
n
2
2
Gbn (ฮพ, ฮธx (ฮพ)) 1(ฮธx (ฮพ),+โ) (t)ยตโ (dฮพ ร dt),
ฮตbฮบ
(ฮฑ) โโ
ฮบ
bx (ฮพ) dฮพ โ
dโ1
dโ1
2
Cx
Tx,ฯ รR+
ฯ
ฯ
conditionally to ฯ(Z0 , S1 , . . . , Znโ1 , Sn ). Together with the definition of ยตโ (31), the expression (9) of
S(x, ยท) and Remark 2.2, we obtain
Z
Z
2 ฮ dโ1
+1
a.s.
n,e
n,ฯ
n
2
2
ฮตbฮบ
(ฮฑ) โโ
ฮบ
bx (ฮพ) dฮพ โ
Gbn (ฮพ, ฮธx (ฮพ)) G(ฮพ, ฮธx (ฮพ))ฮฝโ (ฮพ)ฮปd (dฮพ),
(55)
dโ1
dโ1
2
Cx
Tx,ฯ
ฯ
ฯ
conditionally to ฯ(Z0 , S1 , . . . , Znโ1 , Sn ). By definition (24) of Tx,ฯ we have
Z
Tx,ฯ
Gbn (ฮพ, ฮธx (ฮพ)) G(ฮพ, ฮธx (ฮพ))ฮฝโ (ฮพ)ฮปd (dฮพ) =
!
Z
Z
Dx,ฯ
Gbn (ฮพ, ฮธy (ฮพ)) G(ฮพ, ฮธy (ฮพ))ฮฝโ (ฮพ)dฮพ
ฮปdโ1 (dy). (56)
Cy
In addition, one has
Z
Gbn (ฮพ, ฮธy (ฮพ)) G(ฮพ, ฮธy (ฮพ))ฮฝโ (ฮพ)dฮพ =
Cy
tโ (y)
Z
Gbn (ฮฆ(y, โt), t)G(ฮฆ(y, โt), t)ฮฝโ (ฮฆ(y, โt)) |โt ฮฆ(y, โt)| dt.
0
As a consequence, under Assumptions 3.13, a conscientious calculus together with eq. (25) shows that
Z
Gbn (ฮพ, ฮธy (ฮพ)) G(ฮพ, ฮธy (ฮพ))ฮฝโ (ฮพ)dฮพ โ
Cy
Z
Gbn (ฮพ, ฯx (ฮพ)) G(ฮพ, ฯx (ฮพ))ฮฝโ (ฮพ)dฮพ = O(|x โ y|).
(57)
Cx
We obtain the expected result from (55), (56) and (57) and by remarking that the normalizing constant
is ฮปdโ1 (Dx,ฯ ).
Remark C.1 In order to prove (57), one may split the integral of interest into two terms: an integral
between 0 and tโ (x)โงtโ (y) and a remainder term integrated between tโ (x)โงtโ (y) and tโ (x)โจtโ (y). The
first one is clearly upper bounded by the integral of a Lipschitz function between 0 and tโ (x)+|xโy|[tโ ]Lip ,
thus bounded by an integral between 0 and tโ (x) + ฯ[tโ ]Lip . The second integral is obviously bounded by
kGbn kโ kฮฝโ kโ kโt ฮฆkโ [tโ ]Lip |x โ y|.
References
[1] Odd Olai Aalen. Statistical inference for a family of counting processes. ProQuest LLC, Ann Arbor,
MI, 1975. Thesis (Ph.D.)โUniversity of California, Berkeley.
[2] Terje Aven and Uwe Jensen. Stochastic models in reliability, volume 41 of Applications of Mathematics (New York). Springer-Verlag, New York, 1999.
[3] Romain Azaฤฑฬs. A recursive nonparametric estimator for the transition kernel of a piecewisedeterministic Markov process. ESAIM: Probability and Statistics, 18:726โ749, January 2014.
[4] Romain Azaฤฑฬs, Francฬงois Dufour, and Anne Geฬgout-Petit. Nonparametric estimation of the jump rate
for non-homogeneous marked renewal processes. Ann. Inst. H. Poincareฬ Probab. Statist., 49(4):1204โ
1231, 11 2013.
[5] Romain Azaฤฑฬs, Francฬงois Dufour, and Anne Geฬgout-Petit. Non-parametric estimation of the conditional distribution of the interjumping times for piecewise-deterministic markov processes. Scandinavian Journal of Statistics, 41(4):950โ969, 2014.
[6] Romain Azaฤฑฬs and Alexandre Genadot. Semi-parametric inference for the absorption features of a
growth-fragmentation model. TEST, 24(2):341โ360, 2015.
26
[7] Anis Ben Abdessalem, Romain Azaฤฑฬs, Marie Touzet-Cortina, Anne Geฬgout-Petit, and Monique Puiggali. Stochastic modelling and prediction of fatigue crack propagation using piecewise-deterministic
markov processes. Accepted for publication in Journal of Risk and Reliability, 2016.
[8] Patrice Bertail, Stephan Clemencฬงon, and Jessica Tressou. A storage model with random release rate
for modelling exposure to food contaminants. Mathematical Bioscience and Engineering, 5(1):35โ60,
2008.
[9] Patrice Bertail, Stephan Clemencฬงon, and Jessica Tressou. Statistical analysis of a dynamic model
for dietary contaminant exposure. Journal of Biological Dynamics, 4(2):212โ234, 2010.
[10] Adrien Brandejsky, Benoฤฑฬte de Saporta, and Francฬงois Dufour. Numerical method for expectations
of piecewise-determistic markov processes. CAMCoS, 7(1):63โ104, 2012.
[11] Adrien Brandejsky, Benoฤฑฬte De Saporta, and Francฬงois Dufour. Numerical methods for the exit time
of a piecewise-deterministic markov process. Adv. in Appl. Probab., 44(1):196โ225, 03 2012.
[12] Djalil Chafai, Florent Malrieu, and Katy Paroux. On the long time behavior of the TCP window
size process. Stochastic Processes and their Applications, 120(8):1518โ1534, April 2010.
[13] Julien Chiquet and Nikolaos Limnios. A method to compute the transition function of a piecewise
deterministic Markov process with application to reliability. Statist. Probab. Lett., 78(12):1397โ1403,
2008.
[14] Julien Chiquet, Nikolaos Limnios, and Mohamed Eid. Piecewise deterministic markov processes
applied to fatigue crack growth modelling. Journal of Statistical Planning and Inference, 139(5):1657
โ 1667, 2009.
[15] Gerda Claeskens and Peter Hall. Effect of dependence on stochastic measures of accuracy of density
estimations. The Annals of Statistics, 30(2):431โ454, 2002.
[16] Alina Crudu, Arnaud Debussche, Aureฬlie Muller, Ovidiu Radulescu, et al. Convergence of stochastic gene networks to hybrid piecewise deterministic processes. The Annals of Applied Probability,
22(5):1822โ1859, 2012.
[17] Mark H. A. Davis. Markov models and optimization, volume 49 of Monographs on Statistics and
Applied Probability. Chapman & Hall, London, 1993.
[18] Benoฤฑฬte de Saporta, Francฬงois Dufour, Huilong Zhang, and Charles Elegbede. Optimal stopping for
the predictive maintenance of a structure subject to corrosion. Journal of Risk and Reliability, 226
(2):169โ181, 2012.
[19] Marie Doumic, Marc Hoffmann, Nathalie Krell, and Lydia Robert. Statistical estimation of a
growth-fragmentation model observed on a genealogical tree. Bernoulli (to appear), 2015.
[20] Marie Doumic, Marc Hoffmann, Patricia Reynaud-Bouret, and Vincent Rivoirard. Nonparametric
estimation of the division rate of a size-structured population. SIAM Journal on Numerical Analysis,
50(2):925โ950, 2012.
[21] Marie Duflo. Random iterative models. Applications of Mathematics. Springer-Verlag, Berlin, 1997.
[22] Alexandre Genadot and Micheฬle Thieullen. Averaging for a fully coupled piecewise-deterministic
markov process in infinite dimensions. Adv. in Appl. Probab., 44(3):749โ773, 09 2012.
[23] Jeffrey D. Hart and Philippe Vieu. Data-driven bandwidth choice for density estimation based on
dependent data. The Annals of Statistics, pages 873โ890, 1990.
[24] Jianghai Hu, Wei-Chung Wu, and Shankar Sastry. Modeling subtilin production in bacillus subtilis
using stochastic hybrid systems. In R. Alur and G.J. Pappas, editors, Hybrid Systems: Computation
and Control , number 2993 in LNCS, Springer-Verlag, Berlin, 2004.
[25] Martin Jacobsen. Point Process Theory and Applications: Marked Point and Piecewise Deterministic
Processes. Probability and its Applications. Birkhaฬuser, Boston-Basel-Berlin, 2006.
[26] Tae Yoon Kim. Asymptotically optimal bandwidth selection rules for the kernel density estimator
with dependent observations. Journal of statistical planning and inference, 59(2):321โ336, 1997.
[27] Tae Yoon Kim and Dennis D. Cox. Bandwidth selection in kernel smoothing of time series. Journal
of Time Series Analysis, 17(1):49โ63, 1996.
27
[28] Nathalie Krell. Statistical estimation of jump rates for a specific class of piecewise deterministic
markov processes. arXiv:1406.2845, March 2015.
[29] Sean Meyn and Richard L. Tweedie. Markov chains and stochastic stability. Cambridge University
Press, Cambridge, second edition, 2009.
[30] N.R. Norris. Exploring the optimality of various bacterial motility strategies: a stochastic hybrid
systems approach. PhD thesis, Massachusetts Institute of Technology, 2013.
[31] H. G. Othmer, X. Xin, and C. Xue. Excitation and adaptation in bacteria. a model signal transduction system that controls taxis and spatial pattern formation. International journal of molecular
sciences, 14(5):9205โ9248, 2013.
[32] Ovidiu Radulescu, Aureฬlie Muller, and Alina Crudu. Theฬoreฬmes limites pour les processus de markov
aฬ sauts. Technique et Science Informatiques, 26(3-4):443โ469, 2007.
[33] Lydia Robert, Marc Hoffmann, Nathalie Krell, Stephane Aymerich, Jerome Robert, and Marie
Doumic. Division in escherichia coli is triggered by a size-sensing rather than a timing mechanism.
BMC Biology, 12(1):17, 2014.
[34] M. J. Tindall, P. K. Maini, S. L. Porter, and J. P. Armitage. Overview of mathematical approaches
used to model bacterial chemotaxis ii: bacterial populations. Bulletin of mathematical biology,
70(6):1570โ1607, 2008.
[35] D. Virkler, B. Hillberry, and P. Goel. The statistical nature of fatigue crack propagation. J Engng
Mater Technol, 101(2):148 โ 153, 1979.
28
1.0
0.6
0.0
0.2
0.4
First dimension
0.8
1.0
0.8
0.6
0.4
Second dimension
0.2
0.0
0.0
0.2
0.4
0.6
0.8
1.0
0
1
2
First dimension
3
4
5
6
Time
on
0.6
1.0
0.5
0.2
Secon
asure
d dime
nsion
e
iant m
t dim
ensi
1.5
0.2
Invar
Firs
Second dimension
Figure 2: Two representations of the same simulated path of the TCP-like model of interest until the 10th
jump. A vector field graph is given on the left, while we observe the trajectory of the first component versus
time on the right.
0.4
0.6
0.8
First dimension
Figure 3: Estimation of the invariant distribution of the post-jump locations computed from the 20 000 first
jumps of the TCP-like model.
29
0.1
0.2
0.3
0.4
0.5
โ0.2
โ0.3
โ0.4
โ0.5
โ0.7
โ0.6
Estimated ISE (up to an additive constant)
โ0.6
โ0.7
โ0.9
โ0.8
Estimated ISE (up to an additive constant)
โ0.5
โ0.6
โ0.7
โ0.8
โ0.9
โ1.0
Estimated ISE (up to an additive constant)
โ1.1
0.0
0.0
Parameter ฮฑ
0.1
0.2
0.3
0.4
0.5
0.0
0.1
Parameter ฮฑ
0.2
0.3
0.4
0.5
Parameter ฮฑ
1.5
0.5
1.0
Estimated ฮบ criterion
1.2
1.0
0.8
0.6
0.4
Estimated ฮบ criterion
1.4
2.0
Figure 4: The choice of the bandwidth parameter ฮฑ appearing in the criterion ฮบ
bnx is obtained by minimizing
the cross-validation estimate ฮตbฮบn,en,ฯ (ฮฑ) of the related ISE. The parameter ฯ seems to have only a small
influence over the minimization: the estimated error is computed from ฯ = 0.005, ฯ = 0.01 and ฯ = 0.02
from left to right.
0.1
0.2
0.3
0.4
0.5
0.6
0.05
0.7
0.15
0.25
0.35
0.45
0.55
0.65
0.75
Deterministic path
Deterministic path
Figure 5: The optimal index ฮพbโn is calculated by maximizing the criterion ฮบ
bnx (ฮพ), ฮพ โ Cx , computed with
the optimal parameter ฮฑ. On the left side of the figure, we compare the estimate ฮบ
bnx (ฮพ) (full line) with
n
ฮฝbโ (ฮพ)G(ฮพ, ฯx (ฮพ)) (dashed line) both computed from ฮฑ = 0.1, which confirms that the estimation performs
pretty well. This quantity seems to admit one and only one absolute maximum.
30
6
5
4
3
2
Estimated ฮบ criterion
1
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
Deterministic path
ha
alp
0.25
โ3.20
โ3.25
โ3.30
โ3.35
โ3.40
โ3.45
โ3.50
0.15
Parameter ฮฒ
ISE
ta
be
0.35
Figure 6: The parameter ฮฑ plays a crucial role in the estimation of ฮบ
bnx . We compare here the curves
computed from ฮฑ = 0.1 and already presented in Figure 5 (full and dashed lines) with the too oscillating
estimate obtained from ฮฑ = 0.4 (dotted line).
0.10
0.12
0.14
0.16
0.18
0.20
Parameter ฮฑ
Figure 7: The optimal bandwidth parameters ฮฑ and ฮฒ implicitly appearing in Fbn (ฮพ, ฯx (ฮพ)), ฮพ โ Cx , are
obtained by minimizing the cross-validation estimate ฮตbFn,en,ฯ1 ,ฯ2 (ฮฑ, ฮฒ), computed from ฯ1 = ฯ2 = 0.1 here, of
the related ISE. The parameter ฮฒ seems to have only little influence over the estimation error in comparison
to ฮฑ.
31
3.0
2.5
2.0
1.5
1.0
Estimation of ฮป(0.75,0.5)
0.5
0.0
0.05
0.15
0.25
0.35
0.45
0.55
0.65
0.75
Deterministic path
0.0
โ1.0
x2
1.0
bn (x) is computed from different values of the index ฮพ โ Cx , and from the optimal
Figure 8: The estimator ฮป
ฮพ
bandwidth parameters ฮฑG and (ฮฑF , ฮฒ F ). Over the 100 replicates, the optimal points ฮพbโn are most of the
time located at 0.55 and more than 90 times between 0.5 and 0.6 (enhanced by gray colors), which seems to
correspond with the estimators with least bias and variance. In particular, we obtain a better result than
n
(index around 0.35), see Remark 3.11.
by maximizing the estimated invariant measure ฮฝbโ
โ1.0
โ0.5
0.0
0.5
1.0
x1
Figure 9: Simulated trajectory of the bacteria in the unit disk until the 100th jump.
32
1.5
0.5
Estimated jump rate
1
2
3
4
5
6
7
8
9
bn (xฮธ ) for ฮธ
Figure 10: For each of the 9 target points (x1 , x2 ), the boxplot of the optimal estimators ฮป
ฮพbn (ฮธ)
โ
1.05
0.95
1.02
0.95
1.07
0.96
1.06
โ1.0
โ0.5
0.0
0.5
1.4
1.0
1.03
0.6
0.0
1.06
โ1.0
x2
1.0
Estimated jump rate
taken in a uniform discretized grid of [0, 2ฯ] with step ฯ/8 is presented. The black thick lines in the boxplots
b 1 , x2 ) defined in (30), while the dashed line represents the true
correspond to the aggregated estimate ฮป(x
jump rate.
1.0
x1
b 1 , x2 ) have been
Figure 11: For each of the 9 target points, the curve Cx1 ,x2 as well as the estimate ฮป(x
computed from n = 100 000 observed data and are provided (left). The boxplot of these 9 estimates is also
given (right) and presents no bias and a small dispersion.
33
0.98
0.96
1.2
1.1
1.43
โ1.0
โ0.5
0.0
0.5
1.4
1.24
1.0
1.4
0.6
Estimated jump rate
1.0
0.0
0.98
โ1.0
x2
1.37
1.0
1.24
0.98
0.96
1.2
1.1
1.43
โ1.0
โ0.5
0.0
0.5
1.4
1.4
1.0
0.98
0.6
0.0
1.37
โ1.0
x2
1.0
Estimated jump rate
x1
1.0
x1
1.4
1.0
0.6
Estimated jump rate
b 1 , x2 ) have been
Figure 12: For each of the 9 target points, the curve Cx1 ,x2 as well as the estimate ฮป(x
computed from n = 20 000 (top) and n = 50 000 (bottom) observed data and are provided (left). The
boxplots of these 9 estimates are also given in both cases (right).
n=100 000
n=50 000
n=20 000
2
4
6
8
b 1 , x2 )
Figure 13: For each of the 9 target point (x1 , x2 ) indexed from 1 to 9, estimated jump rates ฮป(x
computed from different datasets.
34
1.4
1.0
0.6
Estimated jump rate
n=20000
n=50000
n=100000
30
20
0
10
Crack length (mm)
40
50
b 1 , x2 ) computed from datasets of different sizes.
Figure 14: Boxplots of the 9 estimated jump rates ฮป(x
0
50000 100000
200000
300000
Time (number of cycles)
โ25
โ26
โ27
โ28
Parameter log(C)
โ24
โ23
Figure 15: Virklerโs dataset contains 68 independent crack growth histories starting from a0 = 9 mm.
2.4
2.6
2.8
3.0
3.2
Parameter m
Figure 16: Material parameters m and log(C) are strongly linked by a linear relationship used to reduce the
dimension of the underlying model: log(C) = โ9.25 โ 5.89 ร m + ฮต.
35
0.8
0.7
0.6
0.5
0.3
0.4
Estimated criterion at 35mm
0.9
1.0
1.4
1.2
1.0
0.8
Estimated criterion at 25mm
0.6
2.4
2.6
2.8
3.0
3.2
2.4
2.6
2.8
3.0
3.2
40
45
2.95
2.90
2.80
2.85
0.15
0.20
0.25
Best parameter m in the estimation
0.30
Parameter m
0.10
Estimated criterion at 45mm
Parameter m
2.4
2.6
2.8
3.0
3.2
25
30
Parameter m
35
Crack length
8eโ05
6eโ05
4eโ05
2eโ05
0e+00
Jump rate to unstable region
Figure 17: Estimation of the criterion ฮบa (m) for different values of the target length a: a = 25 mm (top,
left), a = 35 mm (top, right) and a = 45 mm (bottom, left). The relationship between the optimal parameter
m maximizing ฮบa (m) and the target crack length a is also presented (bottom, right).
25
30
35
40
45
Crack length (mm)
Figure 18: Estimation of the jump rate ฮป(a) for different crack lengths a between 25 mm and 45 mm in the
stochastic model of fatigue crack propagation from Virklerโs dataset.
36
| 10math.ST
|
Classification of Major Depressive Disorder
via Multi-Site Weighted LASSO Model
Dajiang Zhu1, Brandalyn C. Riedel1, Neda Jahanshad1, Nynke A. Groenewold2,3,
Dan J. Stein3, Ian H. Gotlib4, Matthew D. Sacchet5, Danai Dima6,7, James H. Cole8,
Cynthia H.Y. Fu9, Henrik Walter10, Ilya M. Veer11, Thomas Frodl11,12,
Lianne Schmaal13.14,15, Dick J. Veltman15, Paul M. Thompson1
1
Imaging Genetics Center, USC Stevens Neuroimaging and Informatics Institute, Keck School
of Medicine of the University of Southern California, CA, USA;
2
BCN NeuroImaging Center and Department of Neuroscience of the University of Groningen,
University Medical Center Groningen, The Netherlands;
3
Dept of Psychiatry and Mental Health, University of Cape Town, South Africa;
4
Neurosciences Program and Department of Psychology, Stanford University, CA, USA;
5
Department of Psychiatry and Behavioral Sciences, Stanford University, CA, USA;
6
Dept of Neuroimaging, Institute of Psychiatry, Psychology and Neuroscience, Kingโs College
London, UK;
7
Dept of Psychology, School of Arts and Social Science, City, University of London, UK;
8
Department of Medicine, Imperial College London, UK;
9
Department of Psychological Medicine, Kingโs College London, UK;
10
Dept of Psychiatry and Psychotherapy, Charitรฉ Universitรคtsmedizin Berlin, Germany;
11
Department of Psychiatry, Trinity College Dublin, Ireland;
12
Dept of Psychiatry and Psychotherapy, Otto von Guericke University Magdeburg, Germany;
13
Dept of Psychiatry and Neuroscience Campus Amsterdam, VU University Medical Center,
The Netherlands;
14
Orygen, The National Centre of Excellence in Youth Mental Health, Australia;
15
Center for Youth Mental Health, The University of Melbourne, Australia
Abstract. Large-scale collaborative analysis of brain imaging data, in psychiatry and neurology, offers a new source of statistical power to discover features
that boost accuracy in disease classification, differential diagnosis, and outcome
prediction. However, due to data privacy regulations or limited accessibility to
large datasets across the world, it is challenging to efficiently integrate distributed information. Here we propose a novel classification framework through
multi-site weighted LASSO: each site performs an iterative weighted LASSO
for feature selection separately. Within each iteration, the classification result
and the selected features are collected to update the weighting parameters for
each feature. This new weight is used to guide the LASSO process at the next
iteration. Only the features that help to improve the classification accuracy are
preserved. In tests on data from five sites (299 patients with major depressive
disorder (MDD) and 258 normal controls), our method boosted classification
accuracy for MDD by 4.9% on average. This result shows the potential of the
proposed new strategy as an effective and practical collaborative platform for
machine learning on large scale distributed imaging and biobank data.
Keywords: MDD, weighted LASSO
1
Introduction
Major depressive disorder (MDD) affects over 350 million people worldwide [1] and
takes an immense personal toll on patients and their families, placing a vast economic
burden on society. MDD involves a wide spectrum of symptoms, varying risk factors,
and varying response to treatment [2]. Unfortunately, early diagnosis of MDD is challenging and is based on behavioral criteria; consistent structural and functional brain
abnormalities in MDD are just beginning to be understood. Neuroimaging of large
cohorts can identify characteristic correlates of depression, and may also help to detect modulatory effects of interventions, and environmental and genetic risk factors.
Recent advances in brain imaging, such as magnetic resonance imaging (MRI) and its
variants, allow researchers to investigate brain abnormalities and identify statistical
factors that influence them, and how they relate to diagnosis and outcomes [12]. Researchers have reported brain structural and functional alterations in MDD using different modalities of MRI. Recently, the ENIGMA-MDD Working Group found that
adults with MDD have thinner cortical gray matter in the orbitofrontal cortices, insula, anterior/posterior cingulate and temporal lobes compared to healthy adults without
a diagnosis of MDD [3]. A subcortical study โ the largest to date โ showed that MDD
patients tend to have smaller hippocampal volumes than controls [4]. Diffusion tensor
imaging (DTI) [5] reveals, on average, lower fractional anisotropy in the frontal lobe
and right occipital lobe of MDD patients. MDD patients may also show aberrant functional connectivity in the default mode network (DMN) and other task-related functional brain networks [6].
Fig. 1. Overview of our proposed framework.
Even so, classification of MDD is still challenging. There are three major barriers:
first, though significant differences have been found, these previously identified brain
regions or brain measures are not always consistent markers for MDD classification
[7]; second, besides T1 imaging, other modalities including DTI and functional magnetic resonance imaging (fMRI) are not commonly acquired in a clinical setting; last,
it is not always easy for collaborating medical centers to perform an integrated data
analysis due to data privacy regulations that limit the exchange of individual raw data
and due to large transfer times and storage requirements for thousands of images. As
biobanks grow, we need an efficient platform to integrate predictive information from
multiple centers; as the available datasets increase, this effort should increase the
statistical power to identify predictors of disease diagnosis and future outcomes, beyond what each site could identify on its own.
In this study, we introduce a multi-site weighted LASSO (MSW-LASSO) model
to boost classification performance for each individual participating site, by integrating their knowledge for feature selection and results from classification. As shown in
Fig. 1, our proposed framework features the following characteristics: (1) each site
retains their own data and performs weighted LASSO regression, for feature selection, locally; (2) only the selected brain measures and the classification results are
shared to other sites; (3) information on the selected brain measures and the corresponding classification results are integrated to generate a unified weight vector
across features; this is then sent to each site. This weight vector will be applied to the
weighted LASSO in the next iteration; (4) if the new weight vector leads to a new set
of brain measures and better classification performance, the new set of brain measures
will be sent to other sites. Otherwise, it is discarded and the old one is recovered.
2
Methods
2.1
Data and demographics
For this study, we used data from five sites across the world. The total number of
participants is 557; all of them were older than 21 years old. Demographic information for each siteโs participants is summarized in Table 1.
Sites
1
2
3
4
5
Total Total N of Total N of Age of Controls
N
MDD
Controls (%) (Mean ยฑ SD; y)
patients (%)
Groningen 45 22 (48.89%) 23 (51.11%) 42.78 ยฑ 14.36
38.17 ยฑ 9.97
Stanford 110 54 (49.09%) 56 (50.91)
51.72 ยฑ 7.94
BRCDECC 130 69 (53.08%) 61 (46.92%)
172 101 (58.72%) 71 (41.28%) 41.09 ยฑ 12.85
Berlin
100
53 (53%)
47 (47%)
38.49 ยฑ 12.37
Dublin
Combined 557 299 (53.68%) 258 (46.32$)
Age of MDD
(Mean ยฑ SD;
y)
43.14 ยฑ 13.8
37.75 ยฑ 9.78
47.85 ยฑ 8.91
41.21 ยฑ 11.82
41.81 ยฑ 10.76
%
Female
MDD
72.73
57.41
68.12
64.36
62.26
%
Female
Total
73.33
60.00
60.77
60.47
57.00
Table 1. Demographics for the five sites participating in the current study.
2.2
Data preprocessing
As in most common clinical settings, only T1-weighted MRI brain scans were acquired at each site; quality control and analyses were performed locally. Sixty-eight
(34 left/34 right) cortical gray matter regions, 7 subcortical gray matter regions and
the lateral ventricles were segmented with FreeSurfer [8]. Detailed image acquisition,
pre-processing, brain segmentation and quality control methods may be found in [3,
9]. Brain measures include cortical thickness and surface area for cortical regions and
volume for subcortical regions and lateral ventricles. In total, 152 brain measures
were considered in this study.
2.3
Algorithm overview
To better illustrate the algorithms, we define the following notations:
1. ๐น๐ : The selected brain measures (features) of Site-i;
2. ๐ด๐ : The classification performance of Site-i;
3. W: The weight vector;
4. w-LASSO (W, ๐ท๐ ): Performing weighted LASSO on ๐ท๐ with weight vector โ W;
5. SVM (๐น๐ , ๐ท๐ ): Performing SVM classifier on ๐ท๐ using the feature set - ๐น๐ ;
The algorithms have two parts that are run at each site, and an integration server. At
first, the integration server initializes a weight vector with all ones and sends it to all
sites. Each site use this weight vector to conduct weighted LASSO (Section 2.6) with
their own data locally. If the selected features have better classification performance,
it will send the new features and the corresponding classification result to the integration server. If there is no improvement in classification accuracy, it will send the old
ones. After the integration server receives the updates from all sites, it generates a
new weight vector (Section 2.5) according to different feature sets and their classification performance. The detailed strategy is discussed in Section 2.5.
Algorithm 1 (Integration Server)
Initialize W (with all features weighted as one)
Send W to all sites
while at least one site has improvement on A
update W (Section 2.5)
Send W to all sites
end while
Send W with null to all sites
1.
2.
3.
4.
5.
6.
7.
Table 2. Main steps of Algorithm 1.
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
Algorithm 2 (Site-i)
๐น๐ โ โ
, ๐ด๐ โ 0
while received W is not null
๐น๐โฒ โ w-LASSO (W, ๐ท๐ ) (Section 2.6)
if ๐น๐โฒ โ ๐น๐
๐ดโฒ๐ โ SVM (๐น๐โฒ, ๐ท๐ )
if ๐ดโฒ๐ > ๐ด๐
send ๐น๐โฒ and ๐ดโฒ๐ to Integration Server
๐น๐ โ ๐น๐โฒ, ๐ด๐ โ ๐ดโฒ๐
else send ๐น๐ and ๐ด๐ to Integration Server
end if
end if
end while
Table 3. Main steps of Algorithm 2.
2.4
Ordinary LASSO and weighted LASSO
LASSO [11] is a shrinkage method for linear regression. The ordinary LASSO is
defined as:
ฮฒฬ(LASSO) = arg min โy โ โni=1 xi ฮฒi โ2 + ฮปโni=1|ฮฒi |
(1)
Y and x are the observations and predictors. ฮป is known as the sparsity parameter. It
minimizes the sum of squared errors while penalizing the sum of the absolute values
of the coefficients - ฮฒ. As LASSO regression will force many coefficients to be zero,
it is widely used for variable selection [11].
However, the classical LASSO shrinkage procedure might be biased when estimating large coefficients [12]. To alleviate this risk, adaptive LASSO [12] was developed and it tends to assign each predictor with different penalty parameters. Thus it
can avoid having larger coefficients penalized more heavily than small coefficients.
Similarly, the motivation of multi-site weighted LASSO (MSW-LASSO) is to penalize different predictors (brain measures), by assigning different weights, according to
its classification performance across all sites. Generating the weights for each brain
measure (feature) and the MSW-LASSO model are discussed in Section 2.5 and 2.6.
2.5
Generation of a Multi-Site Weight
In Algorithm 1, after the integration server receives the information on selected features (brain measures) and the corresponding classification performance of each site,
it generates a new weight for each feature. The new weight for the ๐ ๐กโ feature is:
๐๐ = โ๐
๐ =1 ๐น๐ ,๐ ๐ด๐ ๐๐ โ๐
(2)
1, ๐๐ the ๐ ๐กโ feature was selected in site โ s
๐น๐ ,๐ = {
0, ๐๐กโ๐๐๐ค๐๐ ๐
(3)
Here m is the number of sites. ๐ด๐ is the classification accuracy of site-s. ๐๐ is the proportion of participants in site-s relative to the total number of participants at all sites.
Eq. (3) penalizes the features that only โsurvivedโ in a small number of sites. On the
contrary, if a specific feature was selected by all sites, meaning all sites agree that this
feature is important, it tends to have a larger weight. In Eq. (2) we consider both the
classification performance and the proportion of samples. If a site has achieved very
high classification accuracy and it has a relatively small sample size compared to
other sites, the features selected will be conservatively โrecommendedโ to other sites.
In general, if the feature was selected by more sites and resulted in higher classification accuracy, it has larger weights.
2.6
Multi-Site weight LASSO
In this section, we define the multi-site weighted LASSO (MSW-LASSO) model:
ฮฒฬMSWโLasso = arg min โy โ โni=1 xi ฮฒi โ2 + ฮปโni=1(1 โ โ๐
๐ =1 ๐น๐ ,๐ ๐ด๐ ๐๐ โ๐ )|ฮฒi |
(4)
Here xi represents the MRI measures after controlling the effects of age, sex and intracranial volume (ICV), which are managed within different sites. y is the label indicating MDD patient or control. n is the 152 brain measures (features) in this study. In
our MSW-LASSO model, a feature with larger weights implies higher classification
performance and/or recognition by multiple sites. Hence it will be penalized less and
has a greater chance of being selected by the sites that did not consider this feature in
the previous iteration.
3
Results
3.1
Classification improvements through the MSW-LASSO model
In this study, we applied Algorithm 1 and Algorithm 2 on data from five sites across
the world. In the first iteration, the integration server initialized a weight vector with
all ones and sent it to all sites. Therefore, these five sites conducted regular LASSO
regression in the first round. After a small set of features was selected using similar
strategy in [9] within each site, they performed classification locally using a support
vector machine (SVM) and shared the best classification accuracy to the integration
server, as well as the set of selected features. Then the integration server generated the
new weight according to Eq. (2) and sent it back to all sites. From the second iteration, each site performed MSW-LASSO until none of them has improvement on the
classification result. In total, these five sites ran MSW-LASSO for six iterations; the
classification performance for each round is summarized in Fig. 2 (a-e).
Fig. 2. Applying MSW-LASSO to the data coming from five sites (a-e). Each subfigure shows
the classification accuracy (ACC), specificity (SPE) and sensitivity (SEN) at each iteration. (f)
shows the improvement in classification accuracy at each site after performing MSW-LASSO.
Though the Stanford and Berlin sites did not show any improvements after the second
iteration, the classification performance at the BRCDECC site and Dublin continued
improving until the sixth iteration. Hence our MSW-LASSO terminated at the sixth
round. Fig. 2f shows the improvements of classification accuracy for all five sites the average improvement is 4.9%. The sparsity level of the LASSO is set as 16% which means that 16% of 152 features tend to be selected in the LASSO process.
Section 3.3 shows the reproducibility of results with different sparsity levels. When
conducing SVM classification, the same kernel (RBF) was used, and we performed a
grid search for possible parameters. Only the best classification results are adopted.
3.2
Analysis of MSW-LASSO features
In the process of MSW-LASSO, only the new set of features resulting in improvements in classification are accepted. Otherwise, the prior set of features is preserved.
The new features are also โrecommendedโ to other sites by increasing the correspond-
ing weights of the new features. Fig. 3 displays the changes of the involved features
through six iterations and the top 5 features selected by the majority of sites.
Fig. 3. (a) Number of involved features through six iterations. (b-f) The top five consistently
selected features across sites. Within each subfigure, the top showed the locations of the corresponding features and the bottom indicated how many sites selected this feature through the
MSW-LASSO process. (b-c) are cortical thickness and (d-f) are surface area measures.
At the first iteration, there are 88 features selected by five sites. This number decreases over MSW-LASSO iterations. Only 73 features are preserved after six iterations
but the average classification accuracy increased by 4.9%. Moreover, if a feature is
originally selected by the majority of sites, it tends to be continually selected after
multiple iterations (Fig. 3d-e). For those โpromisingโ features that are accepted by
fewer sites at first, they might be incorporated by more sites as the iteration increased
(Fig. 2b-c, f).
3.3
Reproducibility of the MSW-LASSO
Selected Improvement, in % Selected
Improvement, in %
Features ACC SPE SEN
features ACC SPE
SEN
3.1
1.8
4.4
2.6
3.1
2.5
13%
33%
3.9
1.4
6.0
1.7
2.1
1.5
20%
36%
3.8
2.9
4.4
2.5
4.1
1.4
23%
40%
4.3
3.4
5.2
3.1
1.1
5.0
26%
43%
2.9
3.0
2.9
2.8
3.9
1.9
30%
46%
Table 4. Reproducibility results with different sparsity levels. The column of selected
features represents the percentage of features preserved during the LASSO procedure,
and the average improvement in accuracy, sensitivity, and specificity by sparsity.
For LASSO-related problems, there is no closed-form solution for the selection of
sparsity level; this is highly data dependent. To validate our MSW-LASSO model, we
repeated Algorithm 1 and Algorithm 2 at different sparsity levels, which leads to
preservation of different proportions of the features. The reproducibility performance
of our proposed MSW-LASSO is summarized in Table 4.
4
Conclusion and Discussion
Here we proposed a novel multi-site weighted LASSO model to heuristically improve
classification performance for multiple sites. By sharing the knowledge of features
that might help to improve classification accuracy with other sites, each site has multiple opportunities to reconsider its own set of selected features and strive to increase
the accuracy at each iteration. In this study, the average improvement in classification
accuracy is 4.9% for five sites. We offer a proof of concept for distributed machine
learning that may be scaled up to other disorders, modalities, and feature sets.
5
References
1. World Health Organization. World Health Organization Depression Fact sheet, No. 369.
(2012). Available from: http://www.who.int/mediacentre/factsheets/fs369/en/.
2. Fried, E.I., et al. "Depression is more than the sum score of its parts: individual DSM
symptoms have different risk factors." Psych Med. 2067-2076 (2014).
3. Schmaal, L., et al. "Cortical abnormalities in adults and adolescents with major depression
based on brain scans from 20 cohorts worldwide in the ENIGMA Major Depressive Disorder Working Group." Mol Psych. doi: 10.1038/mp.2016.60 (2016).
4. Schmaal, L., et al. "Subcortical brain alterations in major depressive disorder: findings
from the ENIGMA Major Depressive Disorder working group." Mol Psych 806-812
(2016).
5. Liao, Y., et al. "Is depression a disconnection syndrome? Meta-analysis of diffusion tensor
imaging studies in patients with MDD." J Psych & Neurosci. 49 (2013).
6. Sambataro, F., et al. "Revisiting default mode network function in major depression: evidence for disrupted subsystem connectivity." Psychl Med. 2041-2051 (2014).
7. Lo, A., et al. "Why significant variables arenโt automatically good predictors." PNAS.
13892-13897 (2015).
8. https://surfer.nmr.mgh.harvard.edu/
9. Zhu, D., et al. Large-scale classification of major depressive disorder via distributed Lasso.
Proc. of SPIE, 10160 (2017).
10. Tibshirani, R., โRegression shrinkage and selection via the LASSO.โ Journal of the Royal
Statistical Society. 58: 267โ288 (1996).
11. Li, Qingyang, et al., "Large-Scale Collaborative Imaging Genetics Studies of Risk Genetic
Factors for Alzheimerโs Disease Across Multiple Institutions." MICCAI. 335-343 (2016).
12. Zou, H., โThe adaptive LASSO and its oracle properties.โ J. Amer. Statist. Assoc
101(476):1418-1429 (2006).
13. Koutsouleris, N., et al. Individualized differential diagnosis of schizophrenia and mood
disorders using neuroanatomical biomarkers. Brain, 138(7), 2059-2073 (2015).
*
*
Supported in part by NIH grant U54 EB020403; see ref. 3 for additional support to coauthors for cohort recruitment.
| 5cs.CE
|
A CRITERION FOR I-ADIC COMPLETENESS
arXiv:1312.3908v1 [math.AC] 13 Dec 2013
PETER SCHENZEL
A BSTRACT. Let I denote an ideal in a commutative Noetherian ring R. Let M be an R-module.
The I-adic completion is defined by Mฬ I = lim ฮฑ M/I ฮฑ M. Then M is called I-adic complete
โโ
whenever the natural homomorphism M โ Mฬ I is an isomorphism. Let M be I-separated, i.e.
โฉฮฑ I ฮฑ M = 0. In the main result of the paper it is shown that M is I-adic complete if and only if
Ext1R ( F, M ) = 0 for the flat test module F = โri=1 R xi where { x1 , . . . , xr } is a system of elements
such that Rad I = Rad xR. This result extends several known statements starting with C. U.
Jensenโs result (see [9, Proposition 3]) that a finitely generated R-module M over a local ring R is
complete if and only if Ext1R ( F, M ) = 0 for any flat R-module F.
1. I NTRODUCTION
Let R denote a commutative Noetherian ring. For an ideal I โ R we consider the I-adic
completion. For an R-module M it is defined by lim ฮฑ M/I ฮฑ M = Mฬ I . In the case of ( R, m)
โโ
a local ring and a finitely generated R-module M it was shown (see [13]) that the following
conditions are equivalent:
(i) M is m-adic complete.
(ii) Ext1R ( F, M ) = 0 for any flat R-module F.
(iii) Ext1R ( F, M ) = 0 for F = โri=1 R xi , where x1 , . . . , xr โ m are elements that generate an
m-primary ideal.
Here R x denotes the localization of R with respect to { xฮฑ |ฮฑ โ N โฅ0 }. This is an extension (in the
local case) of a result of C. U. Jensen (see [9, Proposition 3]) who proved the equivalence of the
first two conditions. The main result of the present paper is an extension to the case of I-adic
completion. More precisely we prove the following result:
Theorem 1.1. Let I be an ideal of a commutative Noetherian ring R. Let M denote an arbitrary Rmodule that is I-separated, i.e. โฉฮฑ I ฮฑ M = 0. Then the following conditions are equivalent:
(i)
(ii)
(iii)
(iv)
M is I-adic complete.
ExtiR ( F, M ) = 0 for all i โฅ 0 and any flat R-module F with F โ R R/I = 0.
Ext1R ( R x , M ) = 0 for all elements x โ I.
Ext1R (โri=0 R xi , M ) = 0 for a system of elements x = { x1 , . . . , xr } such that Rad xR = Rad I.
Note that in his paper (see [9, Proposition 3]) C. U. Jensen proved the following: Let R
denote a semi local ring and M a finitely generated R-module. Then M is complete if and only
if Ext1R ( F, M ) = 0 for all flat (resp. countably generated flat) R-modules F. A different proof
for the vanishing of ExtiR ( F, M ) for all i โฅ 1, all flat R-modules and M a complete R-module
follows by results of R.-O. Buchweitz and H. Flenner (see [5, Theorem 2]).
2010 Mathematics Subject Classification. Primary: 13J10 ; Secondary: 13C11, 13D07.
Key words and phrases. adic completion, flat module, Ext.
1
2
PETER SCHENZEL
Moreover another criterion for I-adic completeness was shown by A. Frankild and S. SatherWagstaff. Let I โ R an ideal contained in the Jacobson radical of R. Let M be a finitely generated R-module. In their paper (see [7]) they proved that M is I-adically complete if and only if
ExtiR ( Rฬ I , M ) = 0 for all 1 โค i โค dimR M, where Rฬ I denotes the I-adic completion of R.
Whence, the main result of the present paper is the construction of a simple flat test module
F for the completeness of M in the I-adic topology in terms of the vanishing of Ext1R ( F, M ).
This generalizes the case of the maximal ideal proved in [13]. Instead of Matlis Duality used in
[13] (not available in the case of I-adic topology) here we use some homological techniques.
2. P RELIMINARY R ESULTS
In the following R denotes a commutative Noetherian ring. For an ideal I โ R we consider
the I-adic completion. For an R-module M it is defined by lim ฮฑ M/I ฮฑ M = Mฬ I . We say that M
โโ
I : M โ Mฬ I (induced by
is I-adically complete whenever the natural homomorphism ฯ = ฯM
ฮฑ
the natural surjections M โ M/I M) is an isomorphism. It implies that M is I-separated, i.e.
โฉฮฑ I ฮฑ M = 0. We begin with a few preparatory results needed later on.
Proposition 2.1. Let I โ R denote an ideal. Let M denote an R-module such that M โ R R/I = 0.
Then M โ R X = 0 for any R-module X with SuppR X โ V ( I ).
Proof. The assumption M โ R R/I = 0 implies that M = I ฮฑ M for all ฮฑ โฅ 1, or in other words
M โ R R/I ฮฑ = 0. First of all let X be a finitely generated R-module. Then I ฮฑ X = 0 for a certain
ฮฑ โ N. Therefore
M โ R X = M โ R X/I ฮฑ X = ( M โ R R/I ฮฑ ) โ R X = 0.
If X is not necessarily a finitely generated R-module, then X โ lim Xฮฑ for a direct system of
โโ
finitely generated submodules Xฮฑ โ X ordered by inclusions. Whence SuppR Xฮฑ โ V ( I ) and
M โ R X = lim( M โ R Xฮฑ ) = 0,
โโ
as required.
Let I โ R denote an ideal. For an R-module X the left derived functors ฮiI ( X ), i โ Z,
are defined by Hi (lim ฮฑ ( R/I ฮฑ โ R Fยท )), where Fยท denotes a flat resolution of X. The functors
โโ
ฮiI (ยท) were first systematically studied by Greenlees and May (see [8]) and by A.-M. Simon (see
[14]) and more recently in [1] and [11]. Note that there is a natural surjective homomorphism
ฮ0I ( X ) โ Xฬ I . Since R is Noetherian it follows that M/I ฮฑ M โ Mฬ I /I ฮฑ Mฬ I for all ฮฑ โฅ 1 for any
R-module M (see [16, Section 2.2]). Whence the completion Mฬ I is I-adically complete.
In the following we will discuss the assumption on the R-module M in Proposition 2.1. It
provides a certain kind of a Nakayama Lemma. Its proof is known (see [14, 5.1] and also [15,
1.3, Lemma (ii)]). Here we add these arguments.
Proposition 2.2. Let I denote an ideal in a commutative Noetherian ring R. Let M denote an arbitrary
R-module. Then M โ R R/I = 0 if and only if Mฬ I = 0 and if and only if ฮ0I ( M ) = 0.
Proof. If M โ R R/I = 0, then M/I ฮฑ M = 0 for all ฮฑ โฅ 1 and Mฬ I = lim ฮฑ M/I ฮฑ M = 0. Conโโ
versely, suppose that Mฬ I = 0. Then 0 = Mฬ I /I Mฬ I โ M/I M, as required. If ฮ0I ( M ) = 0, then
clearly Mฬ I = 0. Let F1 โ F0 โ M โ 0 denote a free presentation of M. If ฮ0I ( M ) = 0, then
Fฬ1I โ Fฬ0I is onto. Therefore F1 /IF1 โ F0 /IF0 is onto too, i.e. M/I M = 0 as required.
A CRITERION FOR I-ADIC COMPLETENESS
3
In the following let x = { x1 , . . . , xr } denote a system of elements of R such that Rad xR =
Rad I. Then we consider the Cฬech complex Cฬx of the system x (see e.g. [11, Section 3]). Note
that this is the same as the complex Kโ ( x) introduced in [1] as the direct limit of the Koszul
complexes Kยท ( xn ). There is a natural morphism Cฬx โ R.
In our context the importance of the Cฬech complex is the following result. It allows the
expression of the right derived functors ฮiI (ยท) in different terms.
Theorem 2.3. Let I โ R denote an ideal of a commutative Noetherian ring R. Let M denote an
R-module. Then there are natural isomorphisms
ฮiI ( M ) โ Hi (HomR (Cฬx , ER ( M )ยท ))
for all i โ Z, where ER ( M )ยท denotes an injective resolution of M.
Proof. This statement is one of the main results of [11, Section 4]. In the formulation here we
do not use the technique of derived functors and derived categories. (For a more advanced
exposition based on derived categories and derived functors the interested reader might also
consult [1].)
Let us summarize a few basic results on completions used in the sequel. The following
results are well-known.
Proposition 2.4. Let J โ I denote ideals of a commutative Noetherian ring. Let x = { x1 , . . . , xr }
denote a system of elements of R. Let M denote an R-module.
(a) Suppose that M is I-adic complete. Then it is also J-adic complete.
(b) Suppose that Rad I = Rad xR. Assume that M is complete in the xi R-adic topology for i =
1, . . . , r and M is I-separated. Then M is I-adic complete.
Proof. For the proof of (a) see [16, 2.2.6]. Let Mฬ I denote the I-adic completion of M. Because
the I-adic topology and the topology defined by {( x1ฮฑ , . . . , xrฮฑ ) R}ฮฑโฅ0 are equivalent it follows
Mฬ I โ lim ฮฑ M/( x1ฮฑ , . . . , xrฮฑ ) M. Therefore an element m โ Mฬ I has the form m = โฮฑโฅ0 โri=1 xiฮฑ mฮฑ,i
โโ
with mฮฑ,i โ M. Since M is xi R-adically complete M โ lim ฮฑ M/xiฮฑ M and mi = โฮฑ xiฮฑ mฮฑ,i for
โโ
some mi โ M. Then mโฒ = โri=1 mi โ M maps to m under ฯ : M โ Mฬ I . Because M is I-separated
it is I-adically complete. This proves (b).
The following result is helpful in order to compute projective limits of Ext-modules. Here
lim 1 denotes the first right derived functor of the projective limit (see [17]).
โโ
Let M denote an R-module and x โ R. We consider the following projective system { M, x},
x
where Mฮฑ = M for all ฮฑ โ N and the transition map Mฮฑ+1 โ Mฮฑ is the multiplication by x.
Lemma 2.5. With the previous notation it follows that
lim i { M, x} โ ExtiR ( R x , M ) for i = 0, 1 and ExtiR ( R x , M ) = 0 for all i โฅ 2.
โโ
If M is xR-separated, then lim { M, x} = HomR ( R x , M ) = 0.
โโ
Proof. Let { R, x} denote the direct system with Rฮฑ = R for all ฮฑ โ N and the transition map
x
Rฮฑ โ Rฮฑ+1 is the multiplication by x. Then R x โ lim ฮฑ { R, x} as it is well known. Therefore,
โโ
HomR ({ R, x}, M ) โ { M, x}. Now, by [12, Lemma 2.6] (see also Lemma 4.1) there are short
exact sequences
0 โ lim 1 {ExtiRโ1 ( R, M ), x} โ ExtiR ( R x , M ) โ lim{ExtiR ( R, M ), x} โ 0
โโ
โโ
for all i โ Z. Whence the results of the first part follow. If M is xR-separated, the vanishing of
HomR ( R x , M ) is easy to see.
4
PETER SCHENZEL
The previous result is a slight modification of Lemma [13, Lemma 2.7].
Remark 2.6. A morphism of two complexes X ยท โ Y ยท of R-modules is called a quasi-isomorphism (or homology isomorphism) whenever the induced homomorphisms on the cohomology modules H i ( X ยท ) โ H i (Y ยท ) are isomorphisms for all i โ Z. For the definitions of
HomR ( X ยท , Y ยท ) and X ยท โ R Y ยท we refer to [17] and [2]. For the details on homological algebra of
complexes of modules we refer to [2].
3. O N I- ADIC C OMPLETIONS
Let I โ R denote an ideal of a commutative Noetherian ring R. In the first main result we
shall prove a vanishing result for a certain Ext-module for an I-adic complete R-module.
Theorem 3.1. Let M denote an arbitrary R-module. Let F denote a flat R-module satisfying F โ R
R/I = 0. Then ExtiR ( F, Mฬ I ) = 0 for all i โ Z.
Proof. For the proof we use the techniques summarized in Theorem 2.3. To this end we fix a
few notation. Let x = { x1 , . . . , xr } denote a system of elements of R such that Rad xR = Rad I.
Let Cฬx denote the Cฬech complex with respect to x as defined in [11, Section 3]. It is a bounded
complex of flat R-modules with a natural morphism Cฬx โ R of complexes. Let Eยท denote an
injective resolution of Mฬ I as an R-module. By applying HomR (ยท, Eยท ) it induces a morphism of
complexes Eยท โ HomR (Cฬx , Eยท ).
Next we investigate the complex HomR (Cฬx , Eยท ). It is a left bounded complex of injective Rmodules. Moreover, by virtue of Theorem 2.3 it follows that ฮiI ( Mฬ I ) โ Hi (HomR (Cฬx , Eยท )) for
all i โ Z. Therefore Hi (HomR (Cฬx , Eยท )) = 0 for all i 6= 0 and H0 (HomR (Cฬx , Eยท )) โ Mฬ I since
Mฬ I is I-adic complete and ฮiI ( Mฬ I ) = 0 for all i > 0 (see [14, 5.2]). Therefore, the morphism
Eยท โ HomR (Cฬx , Eยท ) is a quasi-isomorphism.
Now we consider the complexes
HomR ( F, HomR (Cฬx , Eยท )) โ HomR ( F โ R Cฬx , Eยท ).
We claim that they are homologically trivial complexes. For that reason it will be enough to
show that F โ R Cฬx is homologically trivial since Eยท is a bounded below complex of injective
R-modules. Since F is a flat R-module it yields that H i ( F โ R Cฬx ) โ F โ R H i (Cฬx ) = 0 for
all i โ Z. For the vanishing apply Proposition 2.1 with H i (Cฬx ) โ H Ii ( R) for all i โ Z and
SuppR H Ii ( R) โ V ( I ).
As shown above Eยท โ HomR (Cฬx , Eยท ) is a quasi-isomorphism of left bounded complexes of
injective R-modules. Applying the functor HomR ( F, ยท) induces a quasi-isomorphism
HomR ( F, Eยท ) โ HomR ( F, HomR (Cฬx , Eยท )).
The complex at the right is cohomologically trivial, while the cohomology of the complex at
the left is ExtiR ( F, Mฬ I ). Therefore, the Ext-modules vanish, as required.
In the following result we prove another behaviour of certain Ext-modules in respect to the
I-adic completion.
Theorem 3.2. Let I โ R denote an ideal. Let M, X be arbitrary R-modules with ฯ : M โ Mฬ I the
natural map. Suppose that SuppR X โ V ( I ). Then
(a) ExtiR ( X, Mฬ I /ฯ ( M )) = 0 and
(b) the natural homomorphism ExtiR ( X, M ) โ ExtiR ( X, Mฬ I ) is an isomorphism
for all i โ N .
A CRITERION FOR I-ADIC COMPLETENESS
5
Proof. Let x = { x1 , . . . , xr } denote elements of R such that Rad xR = Rad I. Let Cฬx denote the
Cฬech complex with respect to x. Then there is a short exact sequence of complexes
0 โ Dx [โ1] โ Cฬx โ R โ 0,
where Dx is the global Cฬech complex. That is Dxi = Cฬxi+1 for i โฅ 0 and Dxi = 0 for i < 0. Now let
Eยท denote an injective resolution of M. By applying the functor HomR (ยท, Eยท ) to the short exact
sequence of complexes it provides a short exact sequence
0 โ Eยท โ HomR (Cฬx , Eยท ) โ HomR ( Dx [โ1], Eยท ) โ 0
of left bounded complexes of injective R-modules. The complex in the middle is an injective resolution of Mฬ I as follows by 2.3 and the fact that Mฬ I is I-adic complete (see [14, 5.2]).
Therefore the complex at the right is quasi-isomorphic to Mฬ I /ฯ ( M ) considered as a complex
concentrated in homological degree zero. In order to prove the statement in (a) let Lยท denote a
projective resolution of X. Then ExtiR ( X, Mฬ I /ฯ ( M )) โ H i (HomR ( Lยท , HomR ( Dx [โ1], Eยท ))) (see
[2]) and it will be enough to show that the last modules vanish for all i โ Z.
To this end consider the isomorphism of complexes
HomR ( Lยท , HomR ( Dx [โ1], Eยท )) โ HomR ( Lยท โ R Dx , Eยท )[1].
Now Dx is a bounded complex of flat R-modules. Therefore there is the quasi-isomorphism
Lยท โ R Dx โ X โ R Dx . It will be enough to show that the complex X โ R Dx is homologically
trivial. But this is true since X โ R Dxi = 0 for all i โ Z because of SuppR X โ V ( I ). This proves
the statement in (a).
By view of the above investigations there is a quasi-isomorphism Eยท โ HomR (Cฬx , Eยท ) where
the second complex is an injective resolution of Mฬ I . This proves the statement in (b).
We will continue with a result on the vanishing of certain Ext-modules. As a step towards to
our main result we shall prove a partial result in order to characterize the completion.
Theorem 3.3. Let R denote a commutative Noetherian ring. Let M denote an arbitrary R-module. Let
x โ R be an element such that 0 : M xฮฑ = 0 : M x ฮฒ for all ฮฑ โฅ ฮฒ. Then the following conditions are
equivalent:
(i) M is xR-adic complete.
(ii) ExtiR ( R x , M ) = 0 for i = 0, 1.
Proof. Let N = โชฮฑโฅ1 0 : M xฮฑ . Then N = 0 : M x ฮฒ as follows by the definition of ฮฒ. That is, in both
of the statements we may replace x by x ฮฒ without loss of generality. That is, we may assume
that xN = 0. Then there is a commutative diagram with exact rows:
x ฮฑ +1
0 โ M/N โโ M โ M/xฮฑ+1 M โ 0
โx
k
โ
xฮฑ
0 โ M/N โโ M โ
M/xฮฑ M
โ 0.
By passing to the inverse limit it provides an exact sequence
0 โ lim { M/N, x} โ M โ Mฬ x โ lim 1 { M/N, x} โ 0.
โโ
โโ
By view of Lemma 2.4 it yields that lim i { M/N, x} โ ExtiR ( R x , M/N ) for i = 0, 1. Furthermore,
โโ
the short exact sequence 0 โ N โ M โ M/N โ 0 induces an isomorphism ExtiR ( R x , M ) โ
ExtiR ( R x , M/N ). This follows by the long exact cohomology sequence and ExtiR ( R x , N ) = 0 for
6
PETER SCHENZEL
all i โ Z. For this vanishing note that the multiplication by x acts on R x as an isomorphism
and on N as the zero map.
That is, the homomorphism M โ Mฬ x is an isomorphism, if and only if ExtiR ( R x , M ) = 0 for
i = 0, 1 which proves (i) โโ (ii).
Proof of Theorem 1.1. The implication (i) =โ (ii) is a consequence of Theorem 3.1. Moreover, the
implications (ii) =โ (iii) is trivial and (iii) =โ (iv) is easy to see. In order to prove (iv) =โ (i)
we first note that Ext1R ( R xi , R) = 0 for all i = 1, . . . , r. By Theorem 3.3 this implies that M is xi Radically complete for i = 1, . . . , r. Since x = { x1 , . . . , xr } generates I up to the radical it follows
that M is I-adic complete by Proposition 2.4 since M is I-adic separated. This completes the
proof.
4. A N
ALTERNATIVE PROOF OF
T HEOREM 3.1
In this section there is an alternative proof of Theorem 3.1 based on some results on inverse
limits. The results of the following two lemmas might be also of some independent interest.
These statements are particular cases of certain spectral sequences on inverse limits (see [10]).
Here we give an elementary proof based on the description of lim 1 as discussed in [17].
โโ
Lemma 4.1. Let R denote a commutative ring. Let { Mฮฑ }ฮฑโN be a direct system of R-modules. Let N
denote an arbitrary R-module. Then there is a short exact sequence
0 โ lim 1 ExtiRโ1 ( Mฮฑ , N ) โ ExtiR (lim Mฮฑ , N ) โ lim ExtiR ( Mฮฑ , N ) โ 0
โโ
โโ
โโ
for all i โ Z.
Proof. This result was proved in ([12, Lemma 2.6]) for a Noetherian ring. The same arguments
work in the general case.
In the following we need a certain dual statement of Lemma 4.1. In a certain sense it will be
the key argument for the second proof of Theorem 3.1.
Lemma 4.2. Let R denote a commutative ring. Let M denote an arbitrary R-module. Let { Nฮฑ }ฮฑโN be
an inverse system of R-modules with lim 1 Nฮฑ = 0. Then there is a short exact sequence
โโ
1
iโ1
0 โ lim ExtR ( M, Nฮฑ ) โ ExtiR ( M, lim Nฮฑ ) โ lim ExtiR ( M, Nฮฑ ) โ 0
โโ
โโ
โโ
for all i โ Z.
Proof. Because of lim 1 Nฮฑ = 0 there is a short exact sequence
โโ
0 โ lim Nฮฑ โ โ Nฮฑ โ โ Nฮฑ โ 0,
โโ
where the third homomorphism is the transition map (see [17]). It induces a long exact cohomology sequence
f
ยท ยท ยท โ โ ExtiRโ1 ( M, Nฮฑ ) โ โ ExtiRโ1 ( M, Nฮฑ ) โ ExtiR ( M, lim Nฮฑ )
โโ
g
i
i
โ โ ExtR ( M, Nฮฑ ) โ โ ExtR ( M, Nฮฑ ) โ ยท ยท ยท .
To this end recall that Ext transforms direct products into direct products in the second variable
and cohomology commutes with direct products (see e. g. [6]). Now it is known (see e.g. [17])
that
Coker f โ lim 1 ExtiRโ1 ( M, Nฮฑ ) and Ker g = lim ExtiR ( N, Nฮฑ ).
โโ
โโ
This completes the proof.
A CRITERION FOR I-ADIC COMPLETENESS
7
Remark 4.3. The assumption that lim 1 Nฮฑ = 0 is fulfilled whenever the projective system { Nฮฑ }
โโ
satisfies the Mittag-Leffler condition. That is, for instance when the transition map Nฮฑ+1 โ Nฮฑ
is surjective for all ฮฑ โฅ 1.
Note that the proof of the following Theorem is motivated by some arguments done by
Buchweitz and Flenner (see [5]).
Theorem 4.4. Let R denote a commutative ring. Let M denote an R-module. Let F denote a flat
R-module satisfying F โ R R/I = 0. Then ExtiR ( F, Mฬ I ) = 0 for all i โ Z.
Proof. By definition we have Mฬ I = lim ฮฑ M/I ฮฑ M. By Lemma 4.2 there is a short exact sequence
โโ
0 โ lim 1 ExtiRโ1 ( F, M/I ฮฑ M ) โ ExtiR ( F, Mฬ I ) โ lim ExtiR ( F, M/I ฮฑ M ) โ 0.
โโ
โโ
i
I
In order to show the vanishing of ExtR ( F, Mฬ ) for all i โ Z it will be enough to show the
vanishing of Exti ( F, M/I ฮฑ M ) for all i โ Z and all ฮฑ โฅ 1. We claim that
ExtiR ( F, M/I ฮฑ M ) โ ExtiR/I ฮฑ ( F/I ฮฑ F, M/I ฮฑ M )
for all i โ Z and all ฮฑ โฅ 1. In order to show these isomorphisms let Lยท be a projective resolution
of F as an R-module. As F is flat as an R-module ToriR ( F, R/I ฮฑ ) = 0 for all i > 0 and Lยท โ R R/I ฮฑ
is a projective resolution of F/I ฮฑ F as an R/I ฮฑ -module. By adjunction there are isomorphisms
of complexes
HomR/I ฮฑ ( Lยท โ R R/I ฮฑ , M/I ฮฑ M ) โ HomR ( Lยท , M/I ฮฑ M ).
By taking cohomology it proves the above claim. The vanishing follows now because of
F/I ฮฑ F = 0 as a consequence of the assumption F โ R R/I = 0.
Remark 4.5. In fact Theorem 4.4 is a slight sharpening of Theorem 3.1. To this end recall that for
an R-module M and an ideal I โ R the I-adic completion Mฬ I is not necessarily I-adic complete
(as used in the proof of Theorem 3.1). For an explicit example see J. Bartijnโs Thesis [3, I, ยง3,
page 19]. Note that in this example the ring is not Noetherian. It grows out of [4, III, ยง2, Exerc.
12]. See also A. Yekutieli (see [18, Example 1.8]).
A CKNOWLEDGEMENTS
The author thanks Anne-Marie Simon and the reviewer for a careful reading of the manuscript and suggesting some comments.
R EFERENCES
[1] L. A LONSO TARR IฬO , A. J EREMIAS L OฬPEZ , J. L IPMAN : โLocal homology and cohomology of schemesโ, Ann.
scient. Eฬc. Norm. Sup., 4e seฬr. 30 (1997), 1-39. 2, 3
[2] L. L. AVRAMOV, H.-B. F OXBY: โHomological dimensions of unbounded complexesโ, J. Pure Appl. Algebra
71 (1991), 129-155. 4, 5
[3] J. B ARTIJN : โFlatness, completions, regular sequences, un meฬnage aฬ trois, Thesis, Utrecht, 1985. 7
[4] N. B OURBAKI : โAlgebreฬ commutativeโ, Hermann, Paris, 1961. 7
[5] R.-O. B UCHWEITZ , H. F LENNER : โPower series rings and projectivityโ, Manuscripta math. 119 (2006), 107114. 1, 7
[6] E. E. E NOCHS , O. J ENDA : โRelative Homological Algebraโ, 2nd revised ed., Walter de Gruyter, Berlin, 2011.
6
[7] A. F RANKILD , S. S ATHER -WAGSTAFF : โDetecting completeness from Ext-Vanishingโ, Proc. Amer. Math. Soc.
136 (2008), 2303-2312. 2
[8] J. P. C. G REENLEES , J. P. M AY: โDerived functors of the I-adic completion and local homologyโ, J. Algebra
149 (1992), 438-453. 2
[9] C. U. J ENSEN : โOn the vanishing of lim ( i) โ, J. Algebra 15 (1970), 151-166. 1
โโ
8
PETER SCHENZEL
[10] C. U. J ENSEN : โLes foncteurs deฬriveฬs de lim et leurs applications en theฬorie des modulesโ, Lecture Notes in
โโ
Math. 254, Springer, 1972. 6
[11] P. S CHENZEL : โProregular sequences, local cohomology, and completionโ, Math. Scand. 92 (2003), 181-180. 2,
3, 4
[12] P. S CHENZEL : โOn the structure of the endomorphism ring of a certain local cohomology moduleโ, J. Algebra
344 (2011), 229-245. 3, 6
[13] P. S CHENZEL : โA criterion for completenessโ, to appear. 1, 2, 4
[14] A.-M. S IMON : โSome homological properties of complete modulesโ, Math. Proc. Cambr. Phil. Soc. 108 1990,
231-246. 2, 4, 5
[15] A.-M. S IMON : โAdic - completion and some dual homological resultsโ, Publ. Matematiques Univ. Autonoma
de Barcelona 36, No. 2, 1992, 965-979. 2
[16] J. S TROOKER : โHomological questions in local algebraโ, London Math. Lect. Note Ser. 145, Cambridge Univ.
Press, 1990. 2, 3
[17] C. W EIBEL : โAn introduction to homological algebraโ, Cambridge Univ. Press, 1994. 3, 4, 6
[18] A. Y EKUTIELI : โOn flatness and completion for infinitely generated modules over noetherian ringsโ, Comm.
Algebra 39, No. 11, 2011, 4221-4245. 7
M ARTIN -L UTHER -U NIVERSIT AฬT H ALLE -W ITTENBERG , I NSTITUT
(S AALE ), G ERMANY
E-mail address: [email protected]
F UฬR
I NFORMATIK , D โ 06 099 H ALLE
| 0math.AC
|
Real-Time Localization and Tracking of Multiple
Radio-Tagged Animals with an Autonomous UAV
arXiv:1712.01491v4 [cs.SY] 14 Feb 2018
Hoa Van Nguyen, Michael Chesser, Fei Chen, S. Hamid Rezatofighi and Damith C. Ranasinghe
School of Computer Science
The University of Adelaide, SA 5005, Australia
Email:{hoavan.nguyen,michael.chesser,fei.chen,hamid.rezatofighi,damith.ranasinghe}@adelaide.edu.au
AbstractโAutonomous aerial robots provide new possibilities
to study the habitats and behaviors of endangered species through
the efficient gathering of location information at temporal and
spatial granularities not possible with traditional manual survey
methods. We present a novel autonomous aerial vehicle system to
track and localize multiple radio-tagged animals. The simplicity
of measuring the received signal strength indicator (RSSI) values
of very high frequency (VHF) radio-collars commonly used
in the field is exploited to realize a low cost and lightweight
tracking platform suitable for integration with unmanned aerial
vehicles (UAVs). Due to uncertainty and the nonlinearity of the
system based on RSSI measurements, our tracking and planning
approaches integrate a particle filter for tracking and localizing;
a partially observable Markov decision process (POMDP) for
dynamic path planning. This approach allows autonomous navigation of a UAV in a direction of maximum information gain
to locate multiple mobile animals and reduce exploration time;
and, consequently, conserve on-board battery power. We also
employ the concept of a search termination criteria to maximize
the number of located animals within power constraints of the
aerial system. We validated our real-time and online approach
through both extensive simulations and field experiments with
two mobile VHF radio-tags.
I. I NTRODUCTION
Understanding basic questions of ecology such as how
animals use their habitat, their movements and activities are
necessary for addressing numerous environmental challenges
ranging from invasive species to diseases spread by animals
and saving endangered species from extinction. Conservation
biologists, ecologists as well as natural resource management
agencies around the world rely on numerous methods to
monitor animals.
The most predominant, cost-effective tool suitable for a
wide range of animal sizes is very high frequency (VHF) radio
collar tagging and subsequent radio telemetry measurements
to locate spatiotemporal information of concerned species
[10, 20]. However, the traditional method of radio tracking
typically requires researchers to trek long distances in the
field, armed with cumbersome VHF radio receivers with handheld antennas and battery packs to manually home in on
radio signals emitted from radio-tagged or collared animals.
Consequently, the precious spatial data acquired through radio
tracking comes at a significant cost to researchers in terms
of manpower, time and funding. The problem is often compounded by other challenges, such as low animal recapture
rates, equipment failures, and the inability to track animals
that move into inaccessible terrain. Furthermore, many of our
Fig. 1.
An overview of the UAV tracking platform with its sensor system.
most endangered species also happen to be the most difficult to
track due to their small size, inconspicuousness, and location
in remote habitats.
Automated tracking and location of wildlife with autonomous unmanned aerial vehicles (UAVs) can provide new
possibilities to better understand ecology and our native
wildlife to safeguard biodiversity and manage our natural
resources cost-effectively. We present a low-cost approach capable of realization in a lightweight payload for transforming
existing commodity drone platforms into autonomous aerial
vehicle systems as shown in Fig. 1 to empower conservation
biologists to track and localize multiple radio-tagged animals.
The main contribution of our work is a new autonomous
aerial vehicle system for simultaneously tracking and localizing multiple mobile radio-tagged animals using VHF radiocollars, commonly used in the field. In particular: i) our
system is realized in a 260 g payload suitable for a multitude of
low-cost, versatile, easy to operate multi-rotor UAVs without
a remote pilot license. Our lightweight realizationโof less
than 2 kg system massโis achieved through a new sensor
design that exploits the simplicity of a software defined radio
architecture for capturing received signal strength indicator
(RSSI) value from multiple VHF radio tags and a compact,
lightweight VHF antenna geometry; ii) due to the noisy,
complex and nonlinear characteristics of RSSI data we integrate a sequential Monte Carlo implementation of a Bayesian
filter, also known as particle filter (PF), for real-time tracking
and localization jointly with a partially observable Markov
decision process (POMDP) with Rรฉyni divergence between
prior and posterior estimates of animal locations for autonomy
and dynamic online path planning to minimize flight time
while maximizing number of located animals. Further, our
formulation considers the trade-off between location accuracy
and resource constraints of the UAV, its maneuverability, and
power constraints to develop a practical solution; and iii) we
validate our method through extensive simulations and field
experiments with mobile VHF radio-tags.
II. R ELATED W ORK
Since this application is related to locating animals, we will
focus on progress made towards the autonomous localization
and tracking of multiple radio-tagged animals here.
Off-line estimations of a radio beacon from data logged
from a UAV have been demonstrated in [8, 23]. Pioneering
achievements in autonomous wildlife tracking have been made
through simulation studies [14] and experimentally demonstrated systems [4, 11, 21, 22] in recent years. In particular,
the first demonstration of a UAV for proved in [4].
The recent approaches [4, 22] for real-time localization of a
static target (assuming stationary wildlife) used wireless signal
characteristics captured by a receiver to estimate location; in
particular, the angle-of-arrival (AoA) of a radio beacon was
determined using an array of antennas with the information
related to a ground-based receiver for location estimations.
Although the approach can conveniently manage topological
variations in terrain, AoA systems require a large bulky
receiver system and multiple antenna elements as well as long
observation times; 45 seconds per observation as reported in
[4]. Moreover, the antenna systems being mounted on top of
the UAV [4] is likely to lead to difficulty in tracking terrestrial
animals although being suitable for locating avian species
dwelling in trees.
We can see that there are few investigations that have
studied the problem of locating radio-collared animals using
autonomous robots. Although a system based on angle-ofarrival was recently evaluated to locate a stationary animal, the
development of a low-cost and lightweight autonomous system
capable of long-range flights and localization of multiple
mobile radio-collared animals still remains. This is especially
significant in the realization of a system that is widely accessible to conservation biologists in the field where a very small
UAVโof less than 2 kgโcan be flown without a formal pilot
license and with fewer restrictions given the exclusion of this
category of UAVs from regulatory regimes [3, p.18].
We present an alternative approach exploiting RSSI based
range only measurements because of the ability to use a
simpler sensing system on board commodity UAVs to realize
lower cost and longer flight range UAVs for tracking and
localizing multiple animals. Together with a strongly principled approach for joint tracking and planning, our lightweight
autonomous aerial robot platform provides a cost-effective
method for wildlife conservation and management.
III. T RACKING AND P LANNING P ROBLEM F ORMULATION
Real-time tracking requires an online estimator and a dynamic planning method. This section presents our tracking
and localizing formulation under a principled framework of a
Bayesian filter for tracking and POMDP for planning strategy.
A. Tracking and localizing
For tracking, we use a Bayesian filter. It is an online
estimation technique which deals with the problem of inferring
knowledge about the unobserved state of a dynamic systemโ
in our problem, wildlifeโwhich changes over time, from
a sequence of noisy measurements. Suppose x โ X and
z โ Z are respectively the system (kinematic) state vector in
the state space X and the measurement (observation) vector
in the observation space Z. The problem is estimating the
state x โ X from the measurement z โ Z or calculating
the marginal posterior distribution p(xk |z1 :k ) sequentially
through prediction Z(1) and update (2) steps.
p(xk |z1 :k โ1 ) =
p(xk |xk โ1 )p(xk โ1 |z1 :k โ1 )d xk โ1 (1)
p(xk |z1 :k ) = R
p(zk |xk )p(xk |z1 :k โ1 )
p(zk |xk )p(xk |z1 :k โ1 )d xk
(2)
In the case of a nonlinear system or non-Gaussian noise,
there is no general closed-form solution for the Bayesian
recursion and p(xk |z1 :k ) generally has a non-parametric form.
Therefore, in our problem, we use a particle filter implementation as an approximate solution for the Bayesian filtering
problem due to our highly nonlinear measurement model.
Particle Filter (PF): A particle filter uses a sampling
approach to represent the non-parametric form of the posterior
density p(xk |z1 :k ). The samples from the distribution are
represented by a set of particles; each particle has a weight
assigned to represent the probability of that particle being
sampled from the probability density function. Then, these
particles representing the nonparametric form of p(xk |z1 :k )
are propagated over time. In the simplest version of the particle
filter, known as the bootstrap filter first introduced by Gordon
in [5], the samples are directly generated from the transitional
dynamic model. Then, to reduce the particle degeneracy, resampling and injection techniques are implemented; a detailed
algorithm can be found in [17].
Measurement model: The update process of a PF requires
the derivation of a likelihood of measurements. In our problem,
based on estimating a targetโsโVHF radio tagโsโrange from
the receiver, we require a realistic signal propagation model
to obtain the likelihood of receiving a given measurement.
We employ two VHF signal propagation models suitable for
describing RSSI measurements in non-urban outdoor environments. Denoting h(x, u) as the RSSI measurement function
between target x and observer (UAV) state u, we have:
i) Log Distance Path Loss Model (LogPath): The received
power is the only line of sight power component transmitted
from a transmitter subjected to signal attenuation such as
through absorption and propagation loss:
h(x, u) = Prd0 โ 10n log10 (d(x, up )/d0 ) + Gr (x, u)
(3)
where
t
t
t T
is the targetโs position; up =
โข x = [px , py , pz ]
u u u T
[px , py , pz ] is the observerโs (UAV) position in Cartesian
coordinates; u = [up ; ฮธu ] is the UAVโs state which
includes its heading angle ฮธu .
โข
โข
โข
โข
d(x, up ) is the euclidean distance between the targetโs
position and UAVโs position.
Gr (x, u) is the UAV receiver antenna gain which depends
on its heading, its position, and targetโs position.
Prd0 is received power at distance d0 .
n is the path-loss exponent that characterizes the signal
losses such as absorption and propagation losses and this
parameter depends on the environment with typical values
range from 2 to 4.
ii) Log Distance Path Loss Model with Multi-Path Fading
(MultiPath): The received power is composed of both line of
sight power component transmitted from a transmitter and the
multi-path power component reflected from the ground plane
subjected to signal attenuation such as through absorption and
propagation loss: [24, p. 81]:
h(x, u) = Prd0 โ 10n log10 (d(x, up )/d0 )
+ Gr (x, u) + 10n log10 (|1 + ฮ(ฯ)eโj4ฯ |)
(4)
where, in addition to terms in 3
โข ฯ is the contact angle of the reflected path and ground.
p
ฮตg โ cos2 (ฯ)]/[sin(ฯ) +
โข ฮ(ฯ)
=
[sin(ฯ)
โ
p
2
ฮตg โ cos (ฯ)] is the ground reflection coefficient
with ฮตg is the relative permittivity of the ground.
โข 4ฯ = 2ฯ4d/ฮป is the phase difference between two
waves where ฮป is the wave length and 4d = ((ptx โ
pux )2 + (pty โ puy )2 + (ptz + puz )2 )1/2 โ d(x, u).
In non-urban environments, received power is usually corrupted by environmental noise, with the assumption that the
noise is white, the total received power z = Pr (x, u) [dB] is:
z = h(x, u) + ฮทP
(5)
N (0, ฯP2 )
where ฮทP โผ
is Gaussian white noise with
covariance ฯP2 . Notably, even if RSSI noise is not completely
characterized by a white noise model, we can still model it as
Gaussian noise by using a higher covariance ฯP2 to account
for the unknown uncertainty.
We use data captured in experiments using our sensor
system to validate the physical sensor characteristics Gr (x, u)
(see Sec. IV) and n defined by environmental characteristics,
as well as estimate the propagation model reference power
parameter Prd0 and noise ฯP (see Sec. VI-B).
Measurement likelihood: Based on (5) with Gaussian noise
ฮทP , the likelihood of measurement zk , given target and
sensor position are xk and uk , respectively, at time k is
p(zk |xk , uk ) โผ N (zk ; h(xk , uk ), ฯP2 ) where N (z; ยต, ฮฃ) is a
normal distribution with mean ยต and covariance ฮฃ.
B. Path Planning
The UAV planning problem is similar to the problem of an
agent computing optimal actions under partially observable
Markov decision process (POMDP) to maximize its reward.
Kaelbling et al. [9] have shown that a POMDP framework
implements an efficient and optimal approach based on previous actions and observations to determine the true world
states. POMDP in conjunction with a particle filter provides a
principled approach for evaluating planning decision to realize
an autonomous system for tracking.
In general, a POMDP is described by the 6-tuple
(S, A, T , R, O, Z) where S is set of both UAV and target
states (s = {x, u} โ S), A is set UAV of actions, T is
state-transition function T (s, a, s0 ) = p(s0 |s, a), R(s, a) is
reward function, O is set of observations and Z is observation
function Z(s, a, o) = p(o|s, a) with s, s0 โ S is current
state and next state respectively, a โ A is taken action and
o โ O is the observationโi.e measurement. The goal of a
POMDP is to find P
an optimal policy to maximize the total
k+H
expected reward E[ t=k ฮณ kโt R(st , at )] where H is lookahead horizon steps, ฮณ โ (0, 1) is the discount factor which
serves as the value difference between the current reward
versus the future reward; st , at is state and action at time step
t and E[ยท] is the expectation operator [7].
The reward function can be calculated using different
methods such as task-driven or information-driven strategies.
When uncertainty is high, the information gain approach
is preferable to reduce a targetโs location uncertainty [2];
hence, we used this method to calculate our reward function.
There are several approaches to evaluate information gain in
robotic path planning such as Shannon entropy [4], KullbackLeibler (KL) divergence or Rรฉnyi divergence [6]. We adapted
the approach in [15, 16] to implement Rรฉnyi divergence as
our reward function since it fits naturally with our MonteCarlo sampling method. Here, Rรฉnyi divergence calculates the
distance between prior and posterior densities [2, 16]:
Z
ฮฑ
1
(i)
log
Rk+H (a) =
p(xk+H |z1:k )
ฮฑโ1
(6)
h
i1โฮฑ
(i)
ร p(xk+H |z1:k , zk+1:k+H (a))
dx
where the prior density p(xk+H |z1:k ) is calculated by propagating current posterior particles sampled from p(xk |z1:k ) to
time k +H using the prediction step (1). The posterior density
(m)
(m)
p(xk+H |z1:k , zk+1:k+H (a)) where zk+1:k+H (a) is the future
measurement set that will be observed if action a โ Ak is
taken; this is calculated by applying both prediction (1) and
update steps (2) up to time k + H. However, using Bayes
update procedure is computationally expensive and prohibitive
in a real-time setting. Instead, we implement a computationally
efficient approach using a black box simulator proposed in [19]
along with the Monte Carlo sampling approach. Hence, the
problem transforms to find an optimal action a โ Ak to
maximize total expected reward:
k+H Ms
1 X X
(m)
ฮณ kโt Rt (a)
(7)
ak โ arg max
aโAk Ms
m=1
t=k
where Ms is the number of future measurements.
C. Multi-targets Tracking
The particle filter proposed in Sec. III-A can be extended
to multi-target tracking (MTT). However, MTT normally deals
with the complex data association problem where it is difficult
to determine which measurement belongs to which target.
In contrast, for our system, each target can be estimated
from the measurement based on the signal frequency and
tracked independently. Thus, we do not need to solve the data
association problem. Notably, not all of the targets are detected
due to, for example, the UAV movements, the measurement
range limits imposed by propagations losses and receiver
sensitivity. Therefore, if the target is not detected, the solver
does not update its estimated position.
Besides maximizing the number of targets localized and
tracked, we formulated a termination condition for each target
to conserve UAV battery power; a target is considered localized if its location uncertaintyโas determined by its particle
covarianceโis sufficiently small (<NT h ). Then, those found
targets are forgotten to aid the solver prioritize its computing
resources on those targets with high uncertainty.
IV. S YSTEM I MPLEMENTATION
We implemented an experimental aerial robot system based
on our tracking and planning formulation. An overview of the
complete system is described in Fig. 2a. Our experimental
system used a 3DR IRIS+ UAV platform and a new sensor
system built with: i) a compact directional VHF antenna
design; and ii) a software defined signal processing module
capable of simultaneously processing signals from multiple
targets and remotely communication with a ground control
system for tracking and planning.
In our system, the ArduPilotMega (APM) on the IRIS+
UAV transmits back its global positioning system (GPS)
location to the Telemetry Host tool developed by our group to
communicate with the APM module using MAVLink protocol
over a 915 MHz full duplex radio channel. The sensor system
together with the Antenna, SDR receiver and the embedded
compute delivers targetsโ RSSI data through a 2.40 GHz radio
channel to the ground control system.
GPS and targetsโ RSSI data are delivered to our tracking
and planning algorithmโsolverโthrough the Telemetry Host
using a RESTful web service. The solver estimates target
locations and calculates new control actions per each POMDP
cycle to command the UAV through MAVLink to fly to a
new location. In order to ensure safety and meet University
regulatory requirements we also employ QGroundControlโ
a popular cross-platform flight control and mission planning
softwareโto monitor and abort autonomous navigation. We
detail our Sensor System below.
Signal Processing Module: In contrast to previous
work [4], we propose using a software defined radio (SDR)
receiver to implement the signal processing components. The
key advantages of our choice are the ability to: i) reduce the
weight of the receiver; ii) rapidly scan a large frequency spectrum to track multiple animals beaconing on different VHF
frequency channels; and iii) because the signal processing
chain is defined in software, we have the ability to reconfigure
the system on the fly.
In this work, we use the HackRF One SDRโan open source
platform developed by Ossmann [13] capable of directly
converting radio frequency (RF) signals to digital signals
using an analog-to-digital converter (ADC)โtogether with an
Intel Edison board as our embedded compute module. We
implemented a Discrete Fourier Transform (DFT) filter to
isolate, from multiple signals, each unique VHF frequency
channel associated with an animal radio collar and measure
the signal strength of the received signal.
Antenna: A lightweight folded 2-element Yagi antenna was
specially designed for our sensor system. Our design achieves
a low profile antenna capable of being within the form factor
of low-cost commodity UAVs suitable for easy operation in the
field. Similar to a standard 2-element Yagi antenna, the folded
design has one reflector and one driven element as shown in
Fig. 2b.
The antenna operates in the frequency range from 145 to
155 MHz (a typical range for wildlife radio tags), and a center
frequency of f = 150 MHz. The length of driven and reflector
elements are Dd = 0.3975ฮป and Dr = 0.402ฮป, respectively,
while d1 = 0.1ฮป, d2 = 0.03ฮป and the inductive loading ring
diameter is d3 = 0.015ฮป. Here, the wavelength ฮป = c/f =
2 (m) with c = 3ยท108 (m/s). The antenna gain model calculated
for the the design is shown in Fig. 5b.
A. Planning implementation for a real-time system
Implementing planning algorithms on any real-time systems
is always challenging because of its high computational demand. Thus, in this section, we present a few approaches to
minimize the planning computational time while not scarifying
the overall localization performance.
i) Notably, for RSSI data, the uncertainty in the estimation
of a targetโs location is reduced when the maximum gain of
the directional antenna mounted on the UAV points toward the
target position. Hence, to increase the localization accuracy,
the UAV heading angle ฮธku must be controlled during the
path planning process, although the multi-rotor UAV can be
maneuvered without changing its heading. We adopted a set
of discrete UAV rotation angles for the control actions Ak in
[16] as this helps reduce the computational complexity of the
POMDP planning process by limiting the number of possible
actions to evaluate.
ii) The solver performs planning in every Np observation
cycles with Np > 1 instead of every observation. This
approach helps to ensure that the solver prioritizes its limited
computational resource on tracking targets instead of only
performing planning steps.
iii) A coarse planning interval tp in the planning procedure is implemented to minimize the computational time by
reducing number of look-ahead steps while still having the
same look-ahead horizon. For example, we want to estimate
the targetโs state in a 10 second horizon, we can use the normal
interval tp = 1(s) and estimate the targetโs state 10 times or
use the coarser interval tp = 5(s) and perform the estimation
twice; the latter approach is computationally less expensive.
iv) Instead of selecting the best action from the possible
action space Ak , the domain knowledge of the receiver antenna gain is used to select a subset of actions that gives the
highest received gain using Alg. 1.
Fig. 2. a) The full communication channels between UAV and the ground control system with its main softwares and protocols. b) Folded 2-element Yagi
antenna used in our sensor system for observations
Algorithm 1 Calculate the control action subset
Input: Number of preferred actions NA,s , Ak , the antenna
gain Gr , the targetโs position xk+H
Output: Ask
1: for l = 1 : NA,k do
2:
Get ulk+H โ Ak (l)
3:
Calculate Glr = Gr (xk+H , ulk+H )
4: end for
5: Ask = Ak (Glr โฅ Top NA,s of Gr )
Following the above implementation approach, UAV motion
includes two modes: i) changing its heading angle while
hovering; and ii) moving forward to its direct location. In
one planning procedure with Np cycles, the UAV needs
b|4ฮธ|/ฮธmax c cycles to rotate, and spends the remaining cycles
Np โ b|4ฮธ|/ฮธmax c to move forward without changing its
heading. Here bยทc and | ยท | are the floor and absolute operator
respectively, and ฮธmax is the UAV maximum rotation angle in
one cycle . The sign of 4ฮธ decides the rotation direction (+
for the clockwise, and โ for the counter-clockwise).
V. S IMULATION E XPERIMENTS
Implementing on a real system is time-consuming and difficult. Hence, we want to validate our systems firstly through
several simulation experiments to: i) verify our tracking and
planning algorithms; ii) investigate how our planning parameters such as different ฮฑ values of the Rรฉnyi divergence or
number of discrete actions NA,s = |Ask | created in Alg. 1 contribute to the overall algorithm performance; and iii) compare
our proposed Rรฉnyi divergence based planning technique with
other well-known methods, and the impact of the look-ahead
horizon parameters on computational time and localization
accuracy. All of the simulation experiments were processed on
a PC with an Intel(R) Core(TM) i7-6700 CPU @ 3.40GHz,
32GB RAM and MATLAB-2016b.
A. Tracking and Planning Simulation
This simulation was implemented to validate our approach.
In this experiment, the UAV attempted to search and localize 10 moving targets randomly located in an area of
500 m ร 500 m. The following are list of parameters used in
this simulation: the sampling time step is 1 second since the
tag emits pulse signals every 1 second. The solver performed
a planning procedure every Np = 5 s, and the look-ahead
horizon parameters: H = NH tp = 5 s with number of horizon
NH = 1 and the planning interval tp = 5 s. The UAV started
from its home location at u1 = [0, 0, 20, 0]T , moved under
the constant velocity vu = 5 m/s with its maximum heading
rotation angle ฮธmax = ฯ/6 rad/s. Number of particles for
each target were capped at Ns = 10, 000, with the future
sample measurement Ms = 50, Rรฉnyi divergence parameter
ฮฑ = 0.5, number of actions NA,s = 5. In addition, a target is
considered localized if its location uncertainty determined by
its particles covariance is small enoughโNT h = 10, 000 was
chosen as the limit. The LogPath measurement model with
Prd0 = โ22.3 dB, n = 3.1, ฯP = 4.22 was used to verify
our proposed algorithm. To demonstrate that our algorithm
was able to localize mobile targets, a wombatโan animal
that usually wanders around its area was considered. Hence, a
random walk model was used to to describe its behavior with
a single targetโs transitional density:
p(xk |xkโ1 ) = N (xk ; Fxkโ1 , Q)
(8)
where F = I3 with In is n ร n identity matrix , Q =
2
ฯQ
diag([1, 1, 0]T ), ฯQ = 2 m/s.
Fig. 3 shows localization results for 10 mobile targets where
the estimation details are annotated next to the targetโs position
with two indicators: RMS and flight timeโsee Sec. V-B for
definitions. In summary, for this scenario, it took the UAV 587
seconds to localize all ten moving targets with the maximum
error distance less than 15 m, except for the outlier, target #2
(RMS = 26.3 m). At flight time 587 s, after finishing localizing
the last target (target #7), the UAV was sent a command to
fly back to its original station. In this case, the total UAV
travel distance was 1.93 km. The results demonstrate that our
algorithm can search and accurately localize multiple numbers
of targets in real time (about 10 minutes) at the travel distance
1.93 km that most commercial off the shelf drones can do.
B. Monte Carlo simulations
For this experiment, all of Monte Carlo setup parameters
were kept the same as in Sec. V-A, except for the investigated
ones. In addition, to ensure the results were not random, all
of the conducted experiments were performed over 100 Monte
Carlo runs. The tracking algorithm was evaluated based on the
following criterion:
โข Estimation Error is the absolute distance between
ground truth and estimated target location Drms =
P
Ntg j
j
j
j
2
j=1 drms /Ntg with drms = [(xtruth โ xest ) +
j
j
(ytruth โ yest )2 ]1/2 .
โข Flight time (s) for UAV to localize all of the targets
which includes hovering time when the UAV waits for
commands from the solver to take an action.
โข UAV travel distance distance to find all of target positions
y (m)
400
5
RMS: 8.1
Flight time: 244
300
RMS: 11.2
10 Flight time: 101
RMS: 4.8
1
200
Flight time: 88
6
2
RMS: 26.3
RMS: 7.3
Flight time: 155
Flight time: 129
100
RMS: 10.8
Flight time: 419
RMS: 13.6
Flight time: 517
3
7
RMS: 14.2
Flight time: 587
0
0
100
200
300
400
500
x (m)
Fig. 3. Simulation results with 10 moving targets localized using a single
UAV by Particle Filter and POMDP.
TABLE I
L OCALIZATION PERFORMANCE FOR DIFFERENT ALPHA VALUES
RMS (m)
Flight time (s)
UAV travel distance (km)
ฮฑ = 0.1
12.35
724
2.38
ฮฑ = 0.5
12.77
741
2.41
ฮฑ = 0.9999
12.96
727
2.34
Computational cost: calculated for 2 scenarios: i) execution time for the solver to perform the tracking algorithm
only (called non-planning time), and ii) the execution
time for the solver to select the best action (planning
step) as well as conduct tracking (called planning time).
Firstly, our search and localization algorithms were evaluated using different ฮฑ values for Rรฉyni reward function
in (6). Table I presents the Monte Carlo results for ฮฑ =
{0.1, 0.5, 0.9999}. In general, the ฮฑ values do not significant
impact the overall performance. However, applying ฮฑ = 0.1
provides the best localization results in terms of estimation
error and search duration. Applying ฮฑ = 0.5 proposed in
[16, 18] results in the worst performance, it increases flight
time and travel distance necessary to complete the localization
task. Using ฮฑ = 0.9999 (considered as using KL divergence)
which is popular in information gain helps to save UAV travel
distance while sacrificing location accuracy. One explanation
for this scenario is that our noisy measurement causes the
(m)
predicted posterior p(xk+H |z1:k , zk+1:k+H (a)) in (6) to be
less informative due to high uncertainty. Therefore, the reward
function should pace more emphasis more on the current
posterior instead by using a small ฮฑ value or setting ฮฑ โ 1
to completely ignore the future posterior. It also explains why
selecting ฮฑ = 0.5 (equally weighting the current and the future
posterior) result in the worst localization performance.
Equally important, we conducted experiments to understand
how the action space set NA,s created by Alg. 1 affects
to our tracking performance in term of planning time and
localization error. Table II shows Monte Carlo results for
NA,s = {2, 3, 4, 5, 6, 7}. It presents an interesting result that
applying NA,s = 4 provides the best localization performance
โข
Number of
actions NA,s
RMS (m)
Flight time (s)
UAV travel
distance (km)
Planning time (s)
15
14
13
12
11
10
9
8
7
6
5
1
2
3
4
5
6
7
14.18
840
12.64
781
12.17
693
12.27
723
12.83
756
12.63
799
2.62
2.53
2.39
2.50
2.52
2.70
1.16
1.19
1.23
1.27
1.36
1.47
RMS (m)
Flight time (s)
Travel Distance (km)
2
3
4 5 6 7 8
Number of Targets
9
944
844
744
644
544
444
344
244
144
10
2.5
2
1.5
1
Travel Distance (km)
4
RMS: 9.5
Flight time: 393
Flight time (s)
8
9
RMS (m)
500
TABLE II
L OCALIZATION PERFORMANCE FOR DIFFERENT NUMBER OF ACTIONS
Real position of Target
Estimated position of Target
UAV Trajectory
RMS: 9.5
Flight time: 288
0.5
Fig. 4. Localization performance for different number of targets Ntg increase
from 1 to 10.
in terms of estimation error, flight duration and travel distance;
a desirable result for realizing real time planning with limited
computational resources.
Another aspect that we want to examine is how our proposed
algorithm performs when a maximum number of targets Ntg
change from 1 to 10. As depicted in the Fig. 4, our algorithmโs
estimation error was stable and invariant to the number of
targets. Moreover, it is reasonable that the flight time and the
travel distance increased linearly with target numbers because
it took more time and power to track more targets.
Lastly, we examined how Rรฉnyi divergence performs in
different look-ahead horizons H = NH tp compared to: i) the
Shannon entropy [4]; ii) a naive approach that moves UAV
to the closest estimated target location; and iii) a uniform
search with predefined path used in [18]. Table III shows
the Monte Carlo comparison results among various planning
algorithms. All of parameters were reused from the Sec. V-A,
except for ฮฑ = 0.1 and NA,s = 4 were updated based on
the previous experimental results. The result has demonstrated
that Rรฉnyi divergence reward function is superior to other
planning strategies in term of localization accuracy, including
the Shannon entropy with the same horizon settings. For Rรฉnyi
reward function itself, the large look ahead horizon number
NH > 1 helps to improve the localization accuracy; however,
it requires higher computational power (planning) and causes
the UAV to travel further. Using NH = 1; tp = 5 provides the
best trade-off between computational time and accuracy.
Summary: According to the above simulation results, we
select ฮฑ = 0.1, NA,s = 4, and NH = 1, tp = 5 s as the planning parameters for the field experiment since these parameters
provides the lowest computational cost, best performance in
term of location estimation error, travel distance and flight
time.
Fig. 5. a) Waterfall plot for rotor noise experiment when four motors at full rotation speed; b) Normalized antenna gain in E-plane G(ฯ). The red line is
gain modeled pattern and black line is the normalized measured gain pattern from 30 measurements collected by rotating the UAV heading at 15โฆ intervals;
c) Plot of measured RSSI data points and its estimated models over a distance from 10 m to 320 m at 10 m intervals.
TABLE III
L OCALIZATION PERFORMANCE FOR DIFFERENT PLANNING ALGORITHM
NH
tp (s)
RMS (m)
Flight time (s)
UAV travel
distance (km)
Plan Time (s)
Non Plan
Time (s)
Uniform
N/A
N/A
18.8
921
Closest
Target
N/A
N/A
13.4
799
Shannon
[4]
1
5
12.6
774
1
5
12.5
699
Rรฉnyi
3
1
12.4
889
5
1
12.0
811
10
1
11.6
822
3.72
2.29
2.54
2.27
2.99
2.82
2.42
1.58
1.11
1.38
1.28
1.53
1.65
2.71
1.58
1.03
0.99
0.97
0.96
0.97
0.96
VI. F IELD E XPERIMENTS
We describe here our extensive experiments regime to
validate our approach and evaluate the performance of our
aerial robot system in the field. Our aim is to: i) investigate
the possibility for signal interference from spinning motors
of a UAV on RSSI measurements; ii) estimate the model
parameters in the sensor model and validate the proposed
model; and iii) conduct field trials to demonstrate and evaluate
our system capabilities.
A. Rotors noise
We investigated the rotor noise to confirm that our system
is not affected by the electromagnetic interference from the
UAVโs motors. It also helps to clear the concern raised in [4]
that the rotor noise may affect the RSSI measurements. Four
motors of the 3DR IRIS+ quad-copter shown in Fig.1 were
used in this experiment. The RSSI data of a radio collar were
measured across 149 MHz to 151 MHz frequency spectrum
when four motors were operating at 20%,50%,100% of its
maximum speed of 10, 212 rounds per minute. Fig 5a shows
the frequency spectrum of the received signal. We can see that
there was no difference in the frequency characteristics when
the rotors were in ON and OFF states. This result confirms that
the rotors do not spin fast enough to generate high-frequency
interference to impact to our RSSI measurements.
B. Sensor model validation and parameter estimation
Antenna Gain: The antenna gain pattern was measured
to verify its directivity compared to the antenna gain model
Gr (x, u) = Gr (ฯ) calculatedโfollowing [12, p.1252]โbased
on the physical design as discussed in Sec. IV. Fig. 5b shows
the measured and modeled radiation patterns Gr (ฯ) , here ฯ
is the angle between the UAV heading and the direction from
its position to targetโs position on 0xy plane. The result shows
that the front-to-back ratio is smaller (2 dB) than expected and
this is an artifact of folding the reflector on our design.
Signal propagation model parameter validation: We
collected RSSI data points over a range from 10 m to 320 m
between the UAV and a VHF radio tag. The tag and UAV
were kept at a height of 5 m above ground during this
experiment. The tag was stationary at all times, while the
UAV was directed to move away in a straight line from the
tag at 10 m intervals whilst hovering at each location to allow
the collection of approximately 30 measurements. The UAV
heading was maintained to ensure consistent antenna gain
during the experiment. Since we operated in an open terrain
over a grassland, we selected the path loss exponent n = 2
suitable for modeling free space path loss. Fig. 5c shows the
measured RSSI and the propagation models obtained using a
nonlinear regression algorithm to estimate model parameters;
we have the following results for reference power Prd0 in (3),
(4) at the reference distance d0 = 1 m, and measurement noise
variance ฯP in (5):
d0
โข LogPath model : Pr = โ45.69 ; ฯP = 4.21 (dB).
d0
โข MultiPath model : Pr = โ45.28 ; ฯP = 2.31 (dB).
The results show that both models, as expected, derived a
similar reference power Prd0 whilst providing a reasonable
fit to measurement data and this affirms the validity of our
propagation model. Although LogPath model is reasonable,
MultiPath model is more accurate and yields a smaller measurement noise variance. The results confirms the impact of
ground reflections, especially close to the signal source.
C. Field Trials
We present two sets of field experiments to validate the two
measurement models and conducted a total of 16 autonomous
flights to demonstrate our system capabilities. Our experiments
were designed around Anonymous University regulations governing the conduct of experimental UAV research. Given the
need to operate in autonomous mode, our flight zone as well
as the scope of the experiment was restricted to University
owned property designated for UAV flight tests. Therefore: i)
the UAV task was set to search and localize two mobile targets
in a search area 75 m ร 300 m; and ii) instead of wildlife,
we relied on two people, each wearing a VHF radio tag on
their forearm, and a mobile phone based GPS data logger on
TABLE IV
C OMPARISON OF L OCALIZATION PERFORMANCE
Model
LogPath
MultiPath
Cliff [4]
Target
Type
Mobile
Mobile
Stationary
Trials
RMS (m)
8
8
6
30.1 ยฑ 12.8
22.7 ยฑ 13.9
23.8 ยฑ 14.0
Total Flight
Time (s)
255 ยฑ 104
138 ยฑ 53
8381
Travel
Distance (m)
549 ยฑ 167
286 ยฑ 121
N/A
their hands to obtain ground truth; with two extra personnel
stationed to maintain constant sight of the UAV and people in
the field and abort the autonomous mode to transfer control
to manual operations by a pilot. The volunteers with the radio
tags were asked to walk randomly and no other instructions
were given.
Fig. 6 shows the tracking and localization results along
with UAV trajectories based on the two different measurement
models. Table IV presents the summary comparison results
of location estimates between the two measurement models.
Smaller RMS (root mean square) estimation error values
suggest a higher accuracy, while shorter flight times and
travel distance to localize all targets are highly desirable for
a practicable system given the power constrained nature of
commodity UAVs. The result confirm that the MultiPath model
is superior to the standard LogPath model since it has been
able to account for ground reflections and the UAV is not
required to approach the target as closely when using the
LogPath model to reduce its measurement uncertainty.
D. Discussion
We also summarise results from Cliff et al. [4] for comparison in Table IV while Table V presents a complete comparison
between our proposed system and Cliff et al. [4] system.
Notably, our search area is smaller compared to Cliff et al.
[4] (75 m ร 300 m v.s 1000 m ร 1000 m) due to our test
flight zone restrictions, however, we have set up our initial
distance from the UAV home position to its farthest targetโs
position (target #2 in this case) to be equivalent to the distance
of the stationary target in [4]; approximately 300 m.
The results in Table IV demonstrate that our proposed
method can localize two mobile targets in a shorter flight time
(the flight time of MultiPath model is one-sixth of that in Cliff
et al. [4]) with better accuracy. Moreover, we search and locate
two mobile targets; in contrast, Cliff et al. [4] method was
implemented to locate a single and stationary target.
In general, as shown in Table V, our system is more
compact, lighter, and has a payload that is one-third of that
in [4] and consequently capable of longer flight times on any
given UAV. Although, our reliance on an SDR without a preamplifier has resulted in a shorter detection range, our total
system mass being under 2 kg is significant since it enables
ecologists to operate our system without a remote pilot licenses
(RePL). Moreover, the ability to instantly collect range-only
measurements also helps reduce flight time significantly compared to the bearing-only method, requiring full rotations of
1 Information regarding the total flight is not reported in Cliff et al. [4],
however, as shown in Fig. 9 in Cliff et al. [4], one observation took 76.21s
and one trial needed 11 observations, hence total flight time is 11 ร 76.21 =
838.31s
Fig. 6. Field experiment results to search, track and localize two mobile
tags for the two different measurement models. a) Standard LogPath. b)
MultiPath.
TABLE V
C OMPARISON BETWEEN OUR SYSTEM AND C LIFF ET AL . [4] SYSTEM .
Ours
260
1,280
Quadcopters (smaller
drone)
Software defined radio
(digital-based,rapidly
scan multiple
frequencies to support
multiple frequencies)
Cliff et al. [4]
750
2,200
Octocopters (relatively
larger drone)
Detection range
(m)
320
500
Measurement
model
Range-only (exploiting
the simplicity of a
range-only
measurement system)
Payload (g)
Total mass (g)
Drone type
Receiver
Architecture
Filtering method
Planning
Nature of targets
Particle filter (O(N )
operations per iteration)
Rรฉnyi divergence
multiple mobile target
tracking
Analog filtering circuit
(analog-based, difficult to
re-configure for a new
frequency)
Bearing-only (antenna
array, and UAV rotation
at grid points with a
phase difference
measurement system)
Grid-based filter (O(N 2 )
operations per iteration)
Shannon entropy
A single stationary target
localization
a UAV at each observation point, as shown in the Table IV.
Furthermore, as discussed in [1], the computational cost for
grid-based methods used in [4] increases dramatically, with
the number of cells whilst the grid must be dense enough
to achieve accurate estimations; e.g. , a grid-based filter with
N cells conducts O(N 2 ) operations per iteration, while a
similar particle filter with N particles only requires O(N )
operations. Hence, the grid-based filter method only works in
case of stationary targets as in [4] where the most expensive
computational step, the prediction step, is skipped. Moreover,
as shown in Table. III, our planning algorithm based on Rรฉnyi
divergence is superior to the Shannon entropy approach in [4]
in both important metrics: accuracy and flight time.
VII. C ONCLUSION
We have developed and demonstrated an autonomous aerial
vehicle system for range only tracking and localization of
VHF radio-tagged animals under RSSI based measurement
uncertainty and mobility of targets during their discovery in
the field. The joint particle filter and POMDP with Rรฉnyi
divergence based reward function provided an accurate method
to explore, track and locate multiple animals while considering
the resource constraints of the underlying UAV platform. In
addition, we have realized a UAV system under 2 kg to ensure
both the practicability and the accessibility of the technology
to conservation biologists.
While we have demonstrated a successful system, we have
only formulated our approach as a two-dimensional tracking
problem that is ideally suitable for tracking endangered species
in largely flat terrains and grasslands. Consequently, the current approach is not suitable for tackle tracking wildlife in hills
or mountainous areas and it would require: i) a UAV capability
to maintain a fixed relative altitude above the ground; or ii)
formulating a 3D tracking problem to extend our method to all
topographical conditions. We leave the latter for future work.
VIII. ACKNOWLEDGMENTS
This work was jointly supported by the Western Australia Parks and Wildlife, the Australian Research Council
(LP160101177), the Defense Science and Technology Group,
and the University of Adelaideโs Unmanned Research Aircraft
Facility.
R EFERENCES
[1] M Sanjeev Arulampalam, Simon Maskell, Neil Gordon,
and Tim Clapp. A tutorial on particle filters for online
nonlinear/non-Gaussian Bayesian tracking. IEEE Transactions on signal processing, 50(2):174โ188, 2002.
[2] Michael Anthony Beard, Ba-Tuong Vo, Ba Ngu Vo,
and Sanjeev Arulampalam.
Void probabilities and
cauchy-schwarz divergence for generalized labeled multibernoulli models. IEEE Transactions on Signal Processing, 65, 2017.
[3] CASA. AC 101-01 v2.0 - Remotely piloted aircraft
systems, 2018. [Online; accessed 14-February-2018].
[4] Oliver M Cliff, Robert Fitch, Salah Sukkarieh, Debbie
Saunders, and Robert Heinsohn. Online Localization
of Radio-Tagged Wildlife with an Autonomous Aerial
Robot System. In Robotics: Science and Systems, 2015.
[5] Neil J Gordon, David J Salmond, and Adrian FM Smith.
Novel approach to nonlinear/non-Gaussian Bayesian
state estimation. IEE Proceedings F - Radar and Signal
Processing, 140(2):107โ113, 1993.
[6] Alfred O Hero, Christopher M Kreucher, and Doron
Blatt. Information theoretic approaches to sensor management. Springer US, 2008.
[7] David Hsu, Wee Sun Lee, and Nan Rong. A point-based
POMDP planner for target tracking. In Proc. of IEEE
ICRA, pages 2644โ2650, 2008.
[8] Austin M Jensen, David K Geller, and YangQuan Chen.
Monte Carlo simulation analysis of tagged fish radio
tracking performance by swarming unmanned aerial vehicles in fractional order potential fields. Journal of
Intelligent & Robotic Systems, 74(1-2):287โ307, 2014.
[9] Leslie Pack Kaelbling, Michael L. Littman, and Anthony R. Cassandra. Planning and acting in partially
observable stochastic domains. Artificial Intelligence,
101(1):99 โ134, 1998.
[10] Roland Kays, Sameer Tilak, Margaret Crofoot, Tony
Fountain, Daniel Obando, Alejandro Ortega, Franz
Kuemmeth, Jamie Mandel, George Swenson, Thomas
Lambert, et al. Tracking animal location and activity
with an automated radio telemetry system in a tropical
rainforest. The Computer Journal, pages 1931โ1948,
2011.
[11] Fabian Kรถrner, Raphael Speck, Ali Haydar Gรถktogan,
and Salah Sukkarieh. Autonomous airborne wildlife
tracking using radio signal strength. In Proc. of IEEE/RSJ
IROS, pages 107โ112, 2010.
[12] Sophocles J Orfanidis. Electromagnetic waves and antennas. Rutgers University New Brunswick, NJ, 2002.
[13] Michael Ossmann.
Software Defined Radio with
HackRF, 2015.
[14] Andrรฉ Posch and Salah Sukkarieh. UAV based search
for a radio tagged animal using particle filters. In
Australasian Conference on Robotics and Automation
(ACRA), Sydney, Australia, Dec, pages 2โ4, 2009.
[15] Branko Ristic. Particle Filters for Random Set Models.
Springer-Verlag New York, 2013.
[16] Branko Ristic and Ba-Ngu Vo. Sensor control for multiobject state-space estimation using random finite sets .
Automatica, 46(11):1812 โ 1818, 2010.
[17] Branko
Ristic,
Sanjeev
Arulampalam,
and
Neil (chercheur) Gordon. Beyond the Kalman filter :
particle filters for tracking applications. Artech House,
2004.
[18] Branko Ristic, Mark Morelande, and Ajith Gunatilaka.
Information driven search for point sources of gamma
radiation. Signal Processing, 90(4):1225โ1239, 2010.
[19] David Silver and Joel Veness. Monte-Carlo planning
in large POMDPs. In Advances in neural information
processing systems, pages 2164โ2172, 2010.
[20] Bindi Thomas, John D Holland, and Edward O Minot.
Wildlife tracking technology options and cost considerations. Wildlife Research, 38(8):653โ663, 2012.
[21] Pratap Tokekar, Deepak Bhadauria, Andrew Studenski,
and Volkan Isler. A robotic system for monitoring carp
in Minnesota lakes. Journal of Field Robotics, 27(6):
779โ789, 2010.
[22] Joshua Vander Hook, Pratap Tokekar, and Volkan Isler.
Cautious Greedy Strategy for Bearing-only Active Localization: Analysis and Field Experiments. Journal of
Field Robotics, 31(2):296โ318, 2014.
[23] Neeti Wagle and Eric Frew. Spatio-temporal characterization of airborne radio frequency environments. In IEEE
GLOBECOM Workshops, pages 1269โ1273, 2011.
[24] Jakes WC Jr. Microwave mobile communications. Wiley,
New York, 1974.
| 3cs.SY
|
Moonshine: Distilling with Cheap Convolutions
arXiv:1711.02613v1 [stat.ML] 7 Nov 2017
Elliot J. Crowley, Gavin Gray, Amos Storkey
School of Informatics
The University of Edinburgh
Abstract
Model distillation compresses a trained machine learning model, such as
a neural network, into a smaller alternative such that it could be easily
deployed in a resource limited setting. Unfortunately, this requires engineering two architectures: a student architecture smaller than the first
teacher architecture but trained to emulate it. In this paper, we present a
distillation strategy that produces a student architecture that is a simple
transformation of the teacher architecture. Recent model distillation methods allow us to preserve most of the performance of the trained model
after replacing convolutional blocks with a cheap alternative. In addition,
distillation by attention transfer provides student network performance
that is better than training that student architecture directly on data.
1
Introduction
Despite advances in deep learning for a variety of tasks [LeCun et al., 2015], deployment of
deep learning into embedded devices e.g. mobile phones, digital cameras, vehicle navigation
systems, has been relatively slow due to resource constraints under which these devices
operate. Big, memory-intensive neural networks donโt fit on these devices, but do these
networks have to be big and expensive? The dominant run-time memory cost of neural
networks is the number of parameters that need to be stored. Can we have networks with
substantially fewer parameters, without the commensurate loss of performance?
It is possible to take a large pre-trained teacher network, and use its outputs to aid in the
training of a smaller student network [Ba and Caruana, 2014] through some distillation
process. By doing this the student network is more powerful than if it was trained solely on
the training data, and is closer in performance to the larger teacher. The lower-parameter
student network typically has an architecture that is more shallow, or thinner โ by which we
mean its filters have less channels [Romero et al., 2014] โ than the teacher. While it is not
possible to arbitrarily approximate any network with another [Urban et al., 2017], the limit
in neural network performance is at least in part due to the training algorithm, rather that its
representational power.
In this paper, we take an alternative approach in designing our student networks. Instead
of making networks thinner, or more shallow, we take the standard convolutional block
such networks possess and replace it with a cheaper convolution block, keeping the original
architecture. For example, in a ResNet [He et al., 2016a] this standard block is a pair of
sequential 3ร3 convolutions. We show that for a comparable number of parameters, student
networks that retain the architecture of their teacher but with cheaper convolutional blocks
outperform student networks with the original blocks and smaller architectures.
As a model compression strategy, this is very effective. At the same time this transformation
is easy to implement in any deep learning framework; replacing convolutional blocks is a
simple substitution into any existing architecture. Furthermore, the optimisation scheme
used on the teacher network can be repeated on the student, making another round of
hyperparameter optimisation unnecessary.
The cheap convolutional blocks we suggest are described in Section 3 as well as an overview
of the methods we employ for distillation. In Section 4 we train a number of student
networks for the task of image classification on the CIFAR-10 and CIFAR-100 [Krizhevsky,
2009] datasets and demonstrate that those with cheap convolutions perform better than
traditional student networks for a given parameter cost. This level of parameter reduction is
competitive with much more complicated methods in the literature [Howard et al., 2017];
and some of these methods may be complementary [Han et al., 2015]. Though it is possible
to train the resulting architectures directly, this is demonstrably less effective than distilling
them from the larger teacher model.
2
Related Work
The parameters in deep networks have a great deal of redundancy; it has been shown that
many of them can be predicted from a subset of parameters [Denil et al., 2013]. However
the challenge remains to find good ways to exploit this redundancy without losing model
accuracy.
This observation, along with a desire for efficiency improvements has driven the development
of smaller, and less computationally-intensive convolutions. One of the most prominent
examples is the depthwise separable convolution [Sifre, 2014] which applies a separate
convolutional kernel to each channel, followed by a pointwise convolution [Lin et al., 2014]
over all channels; depthwise separable convolutions have been used in several architectures [Ioffe and Szegedy, 2015, Chollet, 2016, Xie et al., 2017], and were explicitly adapted
to mobile devices in Howard et al. [2017].
However, separating the spatial and channel-wise elements is not the only way to simplify a
convolution. In Jin et al. [2015] the authors propose breaking up the general 3D convolution
into a set of 3 pointwise convolutions along different axes. The authors of Wang et al. [2016]
start with separable convolutions and add topological subdivisioning, a way to treat sections
of tensors separately, and a bottleneck of the spatial dimensions. Both of these methods
demonstrate models that are several times smaller than the original model while maintaining
accuracy.
In a separable convolution, the most expensive part is the pointwise convolution, so it has
been proposed that this operation could also be grouped over sets of channels. However, to
maintain some connections between channels, it is helpful to add an operation mixing the
channels together [Zhang et al., 2017]. More simply, a squared reduction can be achieved by
applying a bottleneck on the channels before the spatial convolution [Xie et al., 2017, Iandola
et al., 2016]. In this paper we examine the potency of a separable bottleneck structure.
The work discussed thus far in this section involves learning a compressed network from
scratch. There are clear alternatives to this such as retraining after reducing the number
of parameters [Han et al., 2015, Li et al., 2017]. We are interested in learning our smaller
network as a student through distillation [Ba and Caruana, 2014, Buciluaฬ et al., 2006] in
conjunction with a large pre-trained teacher network.
How small can our student be? The complex function of a large, deep teacher network
can, theoretically, be approximated by a network with a single hidden layer with enough
units [Cybenko, 1989]. The difficulty in practice is learning that function. Knowledge
distillation [Ba and Caruana, 2014, Hinton et al., 2016] proposes to use the information in
the logits of a learnt network to train the smaller student network. In early experiments, this
2
was shown to be effective; networks much smaller than the original could be trained with
small increases in error.
However, modern deep architectures prove harder to compress. For example, a deep
convolutional network cannot be trivially replaced by a feedforward architecture [Urban
et al., 2017]. Two methods have been proposed to deal with this. First, in Romero et al.
[2014] the authors use a linear map between activations at intermediate points to produce an
extra loss function. Second, in attention transfer [Zagoruyko and Komodakis, 2017], the
authors choose instead to match the activations after taking the mean over the channels. In
the context of this paper, we found attention transfer to be effective in our experiments, as
described in Section 4.
3
Model Compression with Cheap Convolutions
Given a large, deep network that performs well on a given task, we are interested in
compressing that network so that it uses fewer parameters. A flexible and widely applicable
way to reduce the number of parameters in a model is to replace all its convolutional layers
with a cheaper alternative. Doing this replacement invariably impairs performance when
this reduced network is trained directly on the data. Fortunately, we are able to demonstrate
that modern distillation methods enable the cheaper model to have performance closer to
the original large fully-convolutional network.
3.1
Distillation
For this paper, we utilise and compare two different distillation methods for learning a smaller
student network from a large, pre-trained teacher network: knowledge distillation [Hinton
et al., 2016, Ba and Caruana, 2014] and attention transfer [Zagoruyko and Komodakis,
2017].
We briefly explain these methods below:
Knowledge Distillation
P Let us denote the cross entropy of two probability vectors p and
q as LCE (p, q) = โ k pk log qk . Assume we have a dataset of elements, with one such
element denoted x, where each element has a corresponding one-hot class label: denote
the one-hot vector corresponding to x by y. Given x, we have a trained teacher network
t = teacher(x) that outputs the corresponding logits, denoted by t; likewise we have a
student network that outputs logits s = student(x). To perform knowledge distillation we
train the student network to minimise the following loss function (averaged across all data
items):
t
s
2
LKD = (1 โ ฮฑ)LCE (y, ฯ(s)) + 2T ฮฑLCE ฯ
,ฯ
,
(1)
T
T
where ฯ(.) is the softmax function, T is a temperature parameter and ฮฑ is a parameter
controlling the ratio of the two terms. The first term is a standard cross entropy loss
penalising the student network for incorrect classifications. The second term is minimised if
the student network produces outputs similar to that of the teacher network. The idea being
that the outputs of the teacher network contain additional, beneficial information beyond
just a class prediction.
Attention Transfer Consider some choice of layers i = 1, 2, ..., NL in a teacher network,
and the corresponding layers in the student network. At each chosen layer i of the teacher
network, collect the spatial map of the activations for channel j into the vector atij . Let Ati
collect atij for all j. Likewise for the student network we correspondingly collect into asij
and Asi .
3
Now given some choice of mapping f (Ai ) that maps each collection of the form Ai into a
vector, attention transfer involves learning the student network by minimising:
LAT = LCE (y, ฯ(s)) + ฮฒ
NL
X
i=1
f (Ati )
f (Asi )
โ
t
||f (Ai )||2
||f (Asi )||2
,
(2)
2
where ฮฒ is a hyperparameter. Zagoruyko and Komodakis [2017] recommended using
PNA
f (Ai ) = (1/NAi ) j=1i a2ij , where NAi is the number of channels at layer i. In other
words, the loss targeted the difference in the spatial map of average squared activations,
where each spatial map is normalised by the overall activation norm.
Let us examine the loss (2) further. The first term is again a standard cross entropy loss. The
second term, however, ensures the spatial distribution of the student and teacher activations
are similar at selected layers in the network, the explanation being that both networks are
then paying attention to the same things at those layers.
3.2
Cheap Convolutions
As large fully-connected layers are no longer commonplace, convolutions make up almost
all of the parameters in modern networks.1 It is therefore desirable to make them smaller.
Here, we present several convolutional blocks that may be introduced in place of a standard
block in a network to substantially reduce its parameter cost.
First, let us consider a standard two dimensional convolutional layer that contains Nout
filters, each of size Nin ร k ร k (assuming square convolutions). Nout is the number of
channels of the layer output, Nin is the number of channels of the input, and k ร k is the
kernel size of each convolution. In modern neural networks it is almost always the case
that Nin 6 Nout . Let N = max(Nin , Nout ). Then the parameter cost of this layer is
Nin Nout k 2 , and is bounded by N 2 k 2 . In a typical residual network, a block contains two
such convolutions. We will refer to this as a Standard block S, and it is outlined in Table 1.
One alternative to full convolutions, with parameters that scale approximately as N 2 ,
is to break each convolution into g groups, as shown in Figure 1. By restricting the
convolutions to only mix channels within each group and not between groups, we obtain a
substantial reduction in the number of parameters for a grouped computation: for example,
for Nin = Nout = N the cost changes from N 2 k 2 for a standard layer to g groups of
(N/g)2 k 2 parameter convolutions, hence reducing the parameter cost by a factor of g. We
can then provide some cross-group mixing by following each grouped convolution with a
pointwise convolution, with a N 2 parameter cost (when Nin 6= Nout the change in channel
size occurs across this pointwise convolution). We refer to this substitution operator as G(g)
(grouped convolution with g groups), and illustrate it in Figure 2.
In the original ResNet paper [He et al., 2016a] the authors introduce a bottleneck block
which we have parameterised, and denoted as B(b) in Table 1: the input first has its channels
decreased by a factor of b via a pointwise convolution, before a full convolution is carried
out. Finally, another pointwise convolution brings the representation back up to the desired
Nout . We can reduce the parameter cost of this block even further by replacing the full
convolution with a grouped one; the Bottleneck Grouped + Pointwise block is referred to as
BG(b, g) and is illustrated in Figure 2.
These substitute blocks are compared in Table 1 and their computational costs (for simplicity
we take the case where Nin = Nout = N ) are given. In practice, by varying the bottleneck
size and the number of groups, network parameter numbers may vary over two orders of
magnitude; enumerated examples are given in Tables 3 and 4.
1
The parameters introduced by batch normalisation are negligible compared to those in the
convolutions. However, they are included for completeness in Table 1.
4
N/g
Figure 1: Grouped convolutions operate by passing independent filters over the tensor after
it is separated into g groups over the channel dimension. Consider a grouped convolution
where the input and and output both have N channels: each of the g filters only needs to
operate over N/g channels. This reduces the parameter cost of the convolution by a factor
of g.
Standard
G(g)
BG(b,g)
Figure 2: The Grouped + Pointwise (G(g)) block substitutes all full k ร k convolutions in
the Standard block with a grouped convolution followed by a pointwise (1 ร 1) convolution.
To reduce parameters further, a pointwise Bottleneck can be used before the Grouped +
Pointwise convolution (BG(b, g)).
5
Using grouped convolutions and bottlenecks are common methods for parameter reduction
when designing a network architecture. Both are easy to implement in any deep learning
framework. Sparsity inducing methods [Han et al., 2015], or approximate layers [Yang
et al., 2015], may also provide advantages, but these are complementary to the approaches
here. More structured reductions such as grouped convolutions and bottlenecks can be
advantageous over sparsity methods in that the sparsity structure does not need to be stored.
The claim of this paper is that structured parameter reductions are sufficient to achieve model
compression results in line with state of the art when using effective model distillation.
Block
S
G(g)
B(b)
BG(b, g)
Structure
BN+ReLU
Conv
BN+ReLU
Conv
BN+ReLU
GConv (g)
BN+ReLU
Conv1x1
BN+ReLU
GConv (g)
BN+ReLU
Conv1x1
BN+ReLU
Conv1x1(N โ Nb )
BN+ReLU
Conv
BN+ReLU
Conv1x1( Nb โ N )
BN+ReLU
Conv1x1(N โ Nb )
BN+ReLU
GConv(g)
BN+ReLU
Conv1x1( Nb โ N )
2N 2 k2
2N 2 ( kg + 1)
N 2 ( kb2 + 2b )
k
2
N 2 ( gb
2 + b)
8N
16N
N (4 + 8b )
N (4 + 8b )
Conv
Params
BN
Params
2
2
2
Table 1: Convolutional Blocks used in this paper: a standard block S, a grouped + pointwise
block G, a bottleneck block B, and a bottleneck grouped + pointwise block BG. All blocks
use pre-activations [He et al., 2016b]. Conv refers to a kรk convolution. GConv is a grouped
k ร k convolution and Conv1x1 is a pointwise convolution. BN+ReLU refers to a batchnorm layer followed by a ReLU activation. We assume that the input and output to each
block has N channels and that channel size does not change over a particular convolution
unless written out explicitly as (x โ y). Where applicable, g is the number of groups in a
grouped convolution and b is the bottleneck contraction. We give the parameter cost of the
convolutions in each block in terms of these parameters. The batch-norm parameter cost
(assuming running mean/variance are kept for normalisation) is also given, but is markedly
smaller.
4
Experiments
In this section we train and evaluate a number of student networks, each distilled from
the same large teacher network. We distil with (i) knowledge distillation and (ii) attention
transfer. We also train the networks without any form of distillation to observe whether the
the distillation process is necessary to obtain good performance. In this way we demonstrate
that the high performance comes from the distillation, and cannot be achieved by directly
training the student networks using the data.
For comparison we also study student networks with smaller architectures (i.e. fewer
layers/filters) than the teacher. This enables us to test if the block transformations we
propose are key, or it is simply a matter of distilling networks with smaller numbers
of parameters. We compare the smaller student architectures with student architectures
implementing cheap, substitute convolutional blocks (but with the same architecture as the
teacher). The different convolutional blocks are summarised in Table 1 and the student
networks are described in detail in Section 4.1.
Experiments are conducted for both the CIFAR-10 and CIFAR-100 datasets. Results for
6
group
output size
structure
conv1
conv2
conv3
conv4
pool
fc
16 ร 32 ร 32
16k ร 32 ร 32
32k ร 16 ร 16
64k ร 8 ร 8
64k ร 1 ร 1
classes
1ร Conv3x3(N = 16)
nร Block(N = 16k)
nร Block(N = 32k)
nร Block(N = 64k)
8 ร 8 avg-pool
64k ร classes fully connected
Table 2: Summary of the Wide ResNet structures used in experiments; matching those
in Zagoruyko and Komodakis [2017]. The bulk of the parameters are in {conv2, conv3,
conv4} which each consist of n blocks with channel width N controlled by k. We explore
the effect of substituting these blocks with cheaper alternatives. classes refers to the number
of object classes which is, perhaps unsurprisingly, 10 for CIFAR-10 and 100 for CIFAR-100.
CIFAR-10 are given in Table 3 and Figure 3. Results for CIFAR-100 can be found in Table 4
and Figure 4. These results are discussed in detail in Section 4.2.
4.1
Network Descriptions
For our experiments we utilise the competitive Wide Residual Network (WRN) architecture [Zagoruyko and Komodakis, 2016], which is briefly summarised in Table 2. The bulk of
the network lies in the {conv2, conv3, conv4} groups and the network depth d determines
the number of convolutional blocks n in these groups as n = (d โ 4)/6. The network width,
denoted by k, affects the channel size of the filters in these blocks. Note that when we
employ attention transfer the student and teacher outputs of groups {conv2, conv3, conv4}
are used as {A1 , A2 , A3 } in the second term of Equation (2) with NL = 3.
For our teacher network we use WRN-40-2 (a WRN with depth 40 and width 2) with
standard (S) blocks. 3 ร 3 kernels are used for all non-pointwise convolutions in our student
and teacher networks unless stated otherwise. For our student networks we use:
โข WRN-40-1, 16-2, and 16-1 with S blocks. These are student networks that are
thinner and/or more shallow than the teacher and represent typical student networks
most works employ.
โข WRN-40-2 with S blocks where the 3 ร 3 kernels have been replaced with 2 ร 2
dilated kernels (as described in [Yu and Koltun, 2016]). This allows us to see if it
possible to naively reduce parameters by effectively zeroing out elements of each
kernel.
โข WRN-40-2 using a bottleneck block B with 2ร and 4ร channel contraction (b).
โข WRN-40-2 using a grouped + pointwise block G for group sizes (g) {2, 4, 8, 16,
N/16, N/8, N/4, N/2, N} where N is the number of channels in that block. This
allows us to explore the spectrum between full convolutions (g = 1) and fully
separable convolutions (g = N ).
โข WRN-40-2 with a bottlenecked grouped + pointwise block BG. We use b = 2
with groups sizes of {2, 4, 8, 16, M/16, M/8, M/4, M/2, M} where M = N/b is the
number of channels after the bottleneck. We use this notation so that (g = M )
represents fully separable convolutions and we can easily denote divisions thereof.
BG(4, M ) is also used to observe the effect of extreme compression.
Implementation Details Experiments were conducted in PyTorch [Paszke et al.]. For
training we used minibatches of size 128. Before each minibatch, the images were padded
7
by 4 ร 4 zeros, and then a random 32 ร 32 crop was taken. Each image was left-right
flipped with a probability of a half. Training was conducted for 200 epochs using SGD with
standard momentum fixed at 0.9 with an initial learning rate of 0.1. The learning rate was
reduced by a factor of 0.2 at the start of epochs 60, 120, and 160. For knowledge distillation
we set ฮฑ to 0.9 and used a temperature of 4. For attention transfer ฮฒ was set to 1000.
4.2
Analysis and Observations
Figure 3 compares the parameter cost of each student network (on a log scale) against the
test error on CIFAR-10 obtained with attention transfer. On this plot, the ideal network
would lie in the bottom-left corner (few parameters, low error). What is fascinating is that
almost every network with the same architecture as the teacher, but with cheap convolutional
blocks (those on the blue, green, and cyan lines) performs better for a given parameter
budget than the reduced architecture networks with standard blocks (the red line). BG(2, 2)
outperforms 16 โ 2 (5.57% vs. 5.66%) despite having considerably fewer parameters (292K
vs. 693K). Several of the networks with BG blocks both significantly outperform 16 โ 1
and use less parameters.
Figure 3: Test Error vs. No. parameters for student networks learnt with attention transfer on
CIFAR-10. Note that the x-axis is logarithmically scaled. Points on the red curve correspond
to networks with S convolutional blocks and reduced architectures. All other networks have
the same WRN-40-2 architecture as the teacher but with cheap convolutional blocks: G
(green), B (blue), and BG (cyan). The blocks are described in detail in Table 1. Notice that
the student networks with cheap blocks outperform those with smaller architectures and
standard convolutions for a given parameter budget.
8
It is encouraging that significant compression is possible with only small losses; several
networks perform almost as well as the teacher with considerably less parameters โ G(N/8)
(blue) has an error of 5.06%, close to that of the teacher, but has just over a fifth of the
parameters. BG(2, M/8) has less than a tenth of the parameters of the teacher, for a cost of
1.15% increase in error. With a similar change in error, these compression rates exceed those
found in contemporary papers, such as Cohen and Welling [2016]. Even simply switching
all convolutions with smaller, dilated equivalents S โ 2 ร 2 allows one to use half the
parameters for a similar performance.
An important lesson can be learnt regarding grouped + pointwise convolutions. They are
often used in their depthwise-separable [Chollet, 2016] form (when the number of groups is
equal to N , the total number of channels in the convolution). However, the networks with
half, or quarter that number of groups perform substantially better for a modest increase in
parameters. G(N/4) has 374K parameters compared to the 304K of G(N ) but has an error
that is 1.26% lower. As we make the number of groups smaller the performance gets close
to that of the teacher as the network structure is getting closer and closer to the original
convolutions in the teacher (neglecting the pointwise component). The number of groups
is an easy parameter to tune to trade some performance for a smaller network. Grouped +
pointwise convolutions also work well in conjunction with a bottleneck of size 2, although
for large bottlenecks the error increases rather significantly โ as can be seen for BG(4, M ).
Despite this, it is still of comparable performance to 16 โ 1 with half the parameters. We
observe similar trends for CIFAR-100 in Figure 4.
Figure 4: Test Error vs. No. parameters for student networks learnt with attention transfer
on CIFAR-100. Points on the red curve correspond to networks with S convolutional blocks
and reduced architectures. All other networks have the same WRN-40-2 architecture as the
teacher but with cheap convolutional blocks: G (green), B (blue), and BG (cyan).
9
We also observe that attention transfer from the teacher network is substantially better than
knowledge distillation or than training a network structure directly on the data. Consider
Table 3, which shows the attention transfer errors of Figure 3 (the AT Error column) alongside
those of networks trained with knowledge distillation (KD Error), and no distillation (Error)
for CIFAR-10. In all cases, the student network trained with attention transfer is better
than the student network trained by itself โ a distillation process appears to be necessary.
Some performances are particularly impressive โ for G(2) blocks the error is only 0.08%
higher than the teacher despite the network having under half as many parameters. It is
also noticeable that knowledge distillation gives similar, or even worse performance than if
the student network was trained by itself. These conclusion are mirrored for CIFAR-100
training (Table 4).
Romero et al. [2014] note that the performance issues with knowledge distillation occur in
networks with a depth of more than 7 layers. Zagoruyko and Komodakis [2017] also observe
that experiments training a CNN on Imagenet would not converge when using knowledge
distillation.
5
Conclusion
After training a large, deep model it may be prohibitively time consuming to design a model
compression strategy in order to deploy it. On many problems, it may also be more difficult
to achieve the desired performance with a smaller model. We have demonstrated a model
compression strategy that is fast to apply, and doesnโt require any additional engineering.
Furthermore, the optimisation algorithm of the larger model is sufficient to train the cheaper
student model.
The cheap convolutions used in this paper were chosen for their ease of implementation.
Future work could investigate more complicated approximate operations, such as those
described in Moczulski et al. [2015]; which could make a difference for the 1ร1 convolutions
in the final layers of a network. One could also make use of custom blocks generated
through a large scale black box optimisation as in [Zoph et al., 2017]. Equally, there are
many methods for low rank approximations that could be applicable [Jaderberg et al., 2014,
Garipov et al., 2016, Sainath et al., 2013]. We hope that this work encourages others to
consider cheapening their convolutions as a compression strategy.
Acknowledgements. This project has received funding from the European Unionโs Horizon 2020 research and innovation programme under grant agreement No. 732204 (Bonseyes).
This work is supported by the Swiss State Secretariat for Educationโ Research and Innovation (SERI) under contract number 16.0159. The opinions expressed and arguments
employed herein do not necessarily reflect the official views of these funding bodies.
10
Depth-Width
Block
Teacher 40-2
16-2
40-1
16-1
40-2
40-2
40-2
40-2
40-2
40-2
40-2
40-2
40-2
40-2
40-2
40-2
40-2
40-2
40-2
40-2
40-2
40-2
40-2
40-2
40-2
40-2
S
S
S
S
S-2x2
G(2)
G(4)
G(8)
G(16)
G(N/16)
G(N/8)
G(N/4)
G(N/2)
G(N)
B(2)
B(4)
BG(2,2)
BG(2,4)
BG(2,8)
BG(2,16)
BG(2,M/16)
BG(2,M/8)
BG(2,M/4)
BG(2,M/2)
BG(2,M)
BG(4,M)
No. Params
Error
KD Error
AT Error
2248954
693498
566650
175994
1012474
1369530
825210
553050
416970
651834
466362
373626
327258
304074
437242
155002
292090
219514
183226
165082
234704
195322
171130
159034
152986
85450
4.79
6.53
6.48
8.81
5.89
5.30
5.50
5.92
6.65
5.72
6.07
6.93
7.12
8.51
6.36
7.94
6.12
6.75
6.94
6.77
6.26
6.75
7.06
7.45
7.95
9.04
โ
6.03
6.39
8.75
6.03
5.37
5.81
5.72
6.38
5.72
5.61
6.45
6.83
8.01
6.28
7.83
6.25
6.75
6.98
6.97
6.50
6.49
7.15
7.47
7.99
8.61
โ
5.66
5.50
7.72
5.09
4.87
5.00
5.05
5.13
5.12
5.06
5.31
5.98
6.57
5.37
6.93
5.57
6.05
6.09
6.19
6.02
5.94
6.03
6.17
6.67
7.87
Table 3: Student Network test error on CIFAR-10. Each network is a Wide ResNet with
its depth-width given in the first column, and with its block type in the second. S is a
standard convolutional block. S โ 2 ร 2 is a standard block with dilated 2x2 kernels. G(g)
is a grouped + pointwise block with g groups. B(b) is a bottleneck block with contraction
b. BG(b, g) is a bottleneck block with contraction b and a grouped convolution with g
groups. N refers to the channel width of each block, and M refers to the channel width
after the bottleneck where applicable. The total parameter cost of the network is given
in the third column. Errors are reported for (i) learning with no distillation (Error), (ii)
knowledge distillation with a teacher (KD Error), and attention transfer with a teacher (AT
Error). The same teacher is used for training, and is given in the first row. This table
shows that (i) through attention transfer it is possible to cut the number of parameters of a
network, but retain high performance and (ii) for a similar number of parameters, students
with cheap convolutional blocks, outperform those with expensive convolutions and smaller
architectures.
11
Depth-Width
Block
Teacher 40-2
16-2
40-1
16-1
40-2
40-2
40-2
40-2
40-2
40-2
40-2
40-2
40-2
40-2
40-2
40-2
40-2
40-2
40-2
40-2
40-2
40-2
40-2
40-2
40-2
40-2
S
S
S
S
S-2x2
G(2)
G(4)
G(8)
G(16)
G(N/16)
G(N/8)
G(N/4)
G(N/2)
G(N)
B(2)
B(4)
BG(2,2)
BG(2,4)
BG(2,8)
BG(2,16)
BG(2,M/16)
BG(2,M/8)
BG(2,M/4)
BG(2,M/2)
BG(2,M)
BG(4,M)
No. Params
Error
KD Error
AT Error
2260564
705108
572500
181844
1024084
1381140
836820
564660
428580
663444
477972
385236
338868
315684
448852
166612
303700
231124
194836
176692
255316
206932
182740
170644
164596
97060
23.85
27.63
29.64
34
27.2
25.94
26.20
26.49
28.85
27.08
27.85
28.91
30.24
31.84
28.27
31.63
28.51
29.39
30.21
30.57
29.69
29.09
30.42
30.44
30.90
33.64
โ
27.97
30.21
37.28
26.98
24.92
25.48
26.64
27.10
26.11
27.05
27.93
28.89
29.99
28.08
33.63
28.82
29.25
29.34
30.54
28.69
29.13
30.28
30.66
31.18
37.34
โ
27.24
28.24
33.74
26.09
24.45
25.30
25.71
26.34
25.78
26.15
26.85
28.54
30.06
26.68
30.56
28.28
28.54
28.89
29.46
29.05
28.16
28.60
29.51
30.03
32.89
Table 4: Student Network test error on CIFAR-100. Each network is a Wide ResNet with its
depth-width given in the first column, and with its block type in the second. These blocks
are described in detail in Section 3.2. The total parameter cost of the network is given in the
third column. Errors are reported for (i) learning with no distillation (Error), (ii) knowledge
distillation with a teacher (KD Error), and attention transfer with a teacher (AT Error). The
same teacher is used for training, and is given in the first row.
12
References
Lei Jimmy Ba and Rich Caruana. Do deep nets really need to be deep? In Advances in
Neural Information Processing Systems, 2014.
Cristian Buciluaฬ, Rich Caruana, and Alexandru Niculescu-Mizil. Model compression. In
ACM SIGKDD International Conference on Knowledge Discovery and Data Mining,
2006.
Franรงois Chollet. Xception: Deep learning with depthwise separable convolutions. CoRR,
abs/1610.02357, 2016. URL http://arxiv.org/abs/1610.02357.
Taco Cohen and Max Welling. Group equivariant convolutional networks. In Maria Florina Balcan and Kilian Q. Weinberger, editors, Proceedings of The 33rd International
Conference on Machine Learning, volume 48 of Proceedings of Machine Learning Research, pages 2990โ2999, New York, New York, USA, 20โ22 Jun 2016. PMLR. URL
http://proceedings.mlr.press/v48/cohenc16.html.
George Cybenko. Approximation by superpositions of a sigmoidal function. Mathematics
of Control, Signals, and Systems (MCSS), 2(4):303โ314, 1989.
Misha Denil, Babak Shakibi, Laurent Dinh, MarcโAurelio Ranzato, and Nando de Freitas.
Predicting parameters in deep learning. In Advances in Neural Information Processing
Systems, 2013.
Timur Garipov, Dmitry Podoprikhin, Alexander Novikov, and Dmitry P. Vetrov. Ultimate
tensorization: compressing convolutional and FC layers alike. CoRR, abs/1611.03214,
2016. URL http://arxiv.org/abs/1611.03214.
Song Han, Huizi Mao, and William J. Dally. Deep compression: Compressing deep neural
networks with pruning, trained quantization and Huffman coding. CoRR, abs/1510.00149,
2015. URL http://arxiv.org/abs/1510.00149.
Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Deep residual learning for image
recognition. In Proceedings of the IEEE Conference on Computer Vision and Pattern
Recognition, 2016a.
Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Identity mappings in deep
residual networks. In European Conference on Computer Vision, 2016b.
Geoffrey Hinton, Oriol Vinyals, and Jeff Dean. Distilling the knowledge in a neural network.
CoRR, abs/1503.02531, 2016. URL http://arxiv.org/abs/1503.02531.
Andrew G. Howard, Menglong Zhu, Bo Chen, Dmitry Kalenichenko, Weijun Wang, Tobias
Weyand, Marco Andreetto, and Hartwig Adam. MobileNets: Efficient convolutional
neural networks for mobile vision applications. CoRR, abs/1704.04861, 2017. URL
http://arxiv.org/abs/1704.04861.
Forrest N. Iandola, Matthew W. Moskewicz, Khalid Ashraf, Song Han, William J. Dally,
and Kurt Keutzer. SqueezeNet: AlexNet-level accuracy with 50ร fewer parameters and
< 1MB model size. CoRR, abs/1602.07360, 2016. URL http://arxiv.org/abs/
1602.07360.
Sergey Ioffe and Christian Szegedy. Batch normalization: Accelerating deep network
training by reducing internal covariate shift. In International Conference on Machine
Learning, pages 448โ456, 2015.
Max Jaderberg, Andrea Vedaldi, and Andrew Zisserman. Speeding up convolutional neural
networks with low rank expansions. In British Machine Vision Conference, 2014.
Jonghoon Jin, Aysegul Dundar, and Eugenio Culurciello. Flattened convolutional neural networks for feedforward acceleration. In International Conference on Learning
Representations, 2015.
13
Alex Krizhevsky. Learning multiple layers of features from tiny images. Masterโs thesis,
University of Toronto, 2009.
Yann LeCun, Yoshua Bengio, and Geoffrey Hinton. Deep learning. Nature, 521(7553):
436โ444, 2015.
Zhe Li, Xiaoyu Wang, Xutao Lv, and Tianbao Yang. SEP-Nets: Small and effective pattern
networks. CoRR, abs/1706.03912, 2017. URL http://arxiv.org/abs/1706.
03912.
Min Lin, Qiang Chen, and Shuicheng Yan. Network in network. In International Conference
on Learning Representations, 2014.
Marcin Moczulski, Misha Denil, Jeremy Appleyard, and Nando de Freitas. ACDC: a
structured efficient linear layer. CoRR, abs/1511.05946, 2015. URL http://arxiv.
org/abs/1511.05946.
Adam Paszke, Sam Gross, Soumith Chintala, and Gregory Chanan. PyTorch: Tensors and
dynamic neural networks in Python with strong GPU acceleration. https://github.
com/pytorch/pytorch. Accessed: 31st October 2017.
Adriana Romero, Nicolas Ballas, Samira Ebrahimi Kahou, Antoine Chassang, Carlo Gatta,
and Yoshua Bengio. FitNets: Hints for thin deep nets. CoRR, abs/1412.6550, 2014. URL
http://arxiv.org/abs/1412.6550.
Tara N. Sainath, Brian Kingsbury, Vikas Sindhwani, Ebru Arisoy, and Bhuvana Ramabhadran. Low-rank matrix factorization for deep neural network training with high-dimensional
output targets. In IEEE International Conference on Acoustics, Speech and Signal Processing, 2013.
Laurent Sifre. Rigid-Motion Scattering for Image Classification. PhD thesis, รcole Polytechnique, 2014.
Gregor Urban, Krzysztof J. Geras, Samira Ebrahimi Kahou, Ozlem Aslan, Shengjie Wang,
Rich Caruana, Abdelrahman Mohamed, Matthai Philipose, and Matt Richardson. Do deep
convolutional nets really need to be deep and convolutional? In International Conference
on Learning Representations, 2017.
Min Wang, Baoyuan Liu, and Hassan Foroosh. Factorized convolutional neural networks.
CoRR, abs/1608.04337, 2016. URL http://arxiv.org/abs/1608.04337.
Saining Xie, Ross Girshick, Piotr Dollรกr, Zhuowen Tu, and Kaiming He. Aggregated residual
transformations for deep neural networks. In Proceedings of the IEEE Conference on
Computer Vision and Pattern Recognition, 2017.
Zichao Yang, Marcin Moczulski, Misha Denil, Nando de Freitas, Alex Smola, Le Song, and
Ziyu Wang. Deep fried convnets. In Proceedings of the IEEE International Conference
on Computer Vision, 2015.
Fisher Yu and Vladlen Koltun. Multi-scale context aggregation by dilated convolutions. In
International Conference on Learning Representations, 2016.
Sergey Zagoruyko and Nikos Komodakis. Wide residual networks. In British Machine
Vision Conference, 2016.
Sergey Zagoruyko and Nikos Komodakis. Paying more attention to attention: Improving
the performance of convolutional neural networks via attention transfer. In International
Conference on Learning Representations, 2017.
X. Zhang, X. Zhou, M. Lin, and J. Sun. ShuffleNet: An extremely efficient convolutional
neural network for mobile devices. CoRR, abs/1707.01083, 2017. URL http://
arxiv.org/abs/1707.01083.
Barret Zoph, Vijay Vasudevan, Jonathon Shlens, and Quoc V. Le. Learning transferable
architectures for scalable image recognition. CoRR, abs/1707.07012, 2017. URL http:
//arxiv.org/abs/1707.07012.
14
| 1cs.CV
|
1
R. Serra et al.
arXiv:1407.8508v1 [q-bio.MN] 30 Jul 2014
A stochastic model of catalytic reaction
networks in protocells
Roberto Serra1,2 , Alessandro Filisetti2 , Marco Villani1,2 , Alex
Graudenzi3 , Chiara Damiani3,4 , and Tommaso Panini5
1
Dept. of Physics, Informatics and Mathematics, Modena and
Reggio Emilia University
2
European Centre for Living Technology, ECLT, University Caโ
Foscari of Venice, Italy
3
Dept. of Informatics, Systems and Communication, University of
Milan Bicocca, Italy
4
SYSBIO - Centre for Systems Biology, Piazza della Scienza 2,
20126 Milano, Italy
5
University of Turin, Department of Economics and Statistics
"Cognetti de Martiis", Torino
February 27, 2018
Abstract
Protocells are supposed to have played a key role in the self-organizing
processes leading to the emergence of life. Existing models either (i) describe protocell architecture and dynamics, given the existence of sets of
collectively self-replicating molecules for granted, or (ii) describe the emergence of the aforementioned sets from an ensemble of random molecules
in a simple experimental setting (e.g. a closed system or a steady-state
flow reactor) that does not properly describe a protocell. In this paper we
present a model that goes beyond these limitations by describing the dynamics of sets of replicating molecules within a lipid vesicle. We adopt the
simplest possible protocell architecture, by considering a semi-permeable
membrane that selects the molecular types that are allowed to enter or
exit the protocell and by assuming that the reactions take place in the
aqueous phase in the internal compartment. As a first approximation,
we ignore the protocell growth and division dynamics. The behavior of
catalytic reaction networks is then simulated by means of a stochastic
model that accounts for the creation and the extinction of species and
reactions. While this is not yet an exhaustive protocell model, it already
provides clues regarding some processes that are relevant for understanding the conditions that can enable a population of protocells to undergo
evolution and selection.
1
2
R. Serra et al.
Keywords: Autocatalytic Sets of Molecules, Catalytic Reaction Sets, Origin of Life, Stochastic Simulations, Protocell
1
Introduction
It is widely believed that the origin of life required the formation of sets of
molecules able to collectively self-replicate, as well as of compartments able to
undergo fission and proliferate, i.e.protocells [36, 37, 49]. In particular, in order
to observe a lifelike behavior it was necessary that some of the chemical reactions
were coupled to the rate of proliferation of the compartments.
Several protocell architectures have been proposed [3, 12, 15, 27, 29, 30, 34,
37, 38, 39, 41, 44, 48, 49], most of them identifying the compartment with a
lipid vesicle that may spontaneously fission under suitable circumstances.
On the other hand, many distinct models were proposed to describe sets
of reactions involving randomly generated molecules [1, 10, 20, 26]. In many
cases, although this is not in principle required, it is assumed that only catalyzed
reactions take place at a significant rate, therefore these sets are also termed
catalytic reaction sets (briefly, CRSs). It is worth noting that the appearance
of new molecules implies the appearance of new reactions involving those new
molecules, so that both the set of molecular types and the set of reactions change
in time. Hence, it is possible that at a certain time a set of molecules able to
catalyze each otherโs formation emerges [10, 20, 26], and we will refer to it as an
autocatalytic set (ACS). It can be noticed that a CRS can contain one or more
ACSs, or none.
Even though some models of protocell actually describe the coupling between
reaction networks and the dynamics of a lipid container, they consider only a
fixed set of molecular species and reactions [3, 28, 40, 52], hence providing an
incomplete representation of this complex interplay. Conversely, while there are
several studies on collectively self replicating sets of molecules in a continuously
stirred open-flow tank reactor, CSTR [1, 19, 23, 45, 46, 47] including our own [11,
13, 42], they provide only limited information about the behavior of a protocell.
Therefore, in order to develop a framework that may unify the CRSs and
the protocell modeling approaches, it is necessary i) to analyze the behavior of
CRSs in a vesicle, and ii) to investigate the coupling of the evolving chemical
population with the growth of the lipid container and its fission. In this paper
we propose a step towards the first goal, while deferring the second one to a
further work. In particular, we here analyze the behavior of a dynamical model
of CRSs in a simplified model of a non-growing vesicle. To the best of our
knowledge this is a novel approach.
A few important remarks. Let us first observe that the CSTR is not an
a-priori good model of a protocell for at least two reasons: i) in general, in protocells there is no constant inflow and ii) protocells have semipermeable membranes, which allow the inflow/outflow of some, but not all, molecular types.
2
3
R. Serra et al.
On the contrary, in open flow reactors all that is contained in the inflow enters
the reactor and all that is dissolved in the reactor can be washed out in the
outflow.1 Another important limit of the CSTR concerns its evolvability. It has
been argued [31, 51] that the presence of different asymptotic dynamical states
and the ability to shift between them may be essential to achieve the viable
evolution of the first forms of life. Recent works [50] have found that, in models
of catalytic reaction networks in CSTRs, generally only one of these states is
found, apart from fluctuations [5].
Furthermore, in order to accomplish the goal of this work, we need to better
specify both the model of catalytic reactions sets and that of the protocell. As
far as the former is concerned, we have studied the dynamics of random sets of
molecules by revisiting a model by Kauffman, who proposed an interesting way
to build new molecular species from the existing ones (see section 2 for a description). The original version of the model relied on purely graph-theoretical
arguments [26], which are important, but fail to appreciate the effects of the dynamics, including noise, fluctuations and small-number effects. The dynamics
has been later introduced by Farmer et al. [1, 10], who described the kinetics by
using ordinary differential equations. However, this formalism does not account
for the chance of a species to become extinct in a finite amount of time, as it
may instead well happen (so the reaction graph may grow but never shrinks).
In order to overcome these limitations, Bagley proposed an empirical correction
by setting to zero the concentration values that happen to fall below a certain
threshold [1]. In our works we rather use from the very beginning a stochastic
approach to analyze the dynamics, the well-known Gillespie algorithm [16, 17],
in order to deal in a rigorous way with low concentrations and with their fluctuations.
Note that the Kauffman model largely relies upon randomness. In particular, every polymer in the system has a fixed probability (that may vanish)
to catalyze any possible reaction. Therefore, in different simulations the same
species can catalyze different reactions leading to the formation of different
โchemistriesโ. Thus, this is exactly the language we choose: a set of tuples
{species, catalysis, reaction}, where the species catalyzes the reaction, will be
called โchemistryโ, because it describes a possible artificial world.2 We can
then simulate different chemistries and look for generic properties of the set
of chemistries; but in a different series of experiments we can also keep the
chemistry fixed, and simulate various time histories. In principle, these may
differ, since the discovery of a given catalyst at an early phase in a finite system
might channel the following evolution in a way or another. Since the number
of molecules of some species may be very small, it is not in principle legitimate
1 Limitations on the outflow can be modeled in a chemostat e.g. by supposing that all the
molecules that are larger than a certain size precipitate and cannot be washed away.
2 It is worthwhile to notice that the presence of the โcatalysisโ within the tuple allows the
possibility for a species to catalyze more than one reaction and for a reaction to be catalyzed
by more than one species.
3
4
R. Serra et al.
to ignore this aspect, and our stochastic model is particularly well suited to
analyze it, as it will be shown in Section 2. Of course, there can be conditions
where all the simulations of a given chemistry converge asymptotically to the
same chemical mixture.
Moving now to the protocell model, note that they are usually based on lipid
vesicles, i.e. approximately spherical structures with an aqueous interior and a
membrane composed by a lipid bilayer, which spontaneously form when lipids
are mixed with water under certain conditions [2, 7, 18, 27, 32, 34, 35]. Even
though different protocell architectures have been proposed, we will here consider the simplest model, namely that in which all the key reactions take place
in the aqueous phase inside the protocell. It would be indeed straightforward
to model the coupling between some of these molecules and the growth of the
protocell following an approach similar to that of our previous studies [3, 12, 40].
Yet, the main objective of the present work is that of studying the dynamics of
CRSs embedded in a vesicle, so we will simplify our treatment by ignoring the
growth dynamics of the protocell, and keeping its volume fixed. This implies
that our study will be limited to time intervals that are short with respect to
those describing the growth of the whole protocell.
The selective character of membranes is a key ingredient of our model: we
will suppose for simplicity that all (and only) the molecules that are shorter
than a certain length can cross the membrane. The transmembrane motion of
the permeable species is here supposed to be driven by the difference of their
concentrations in the internal aqueous volume of the protocell and in the external aqueous environment. We will assume that transmembrane diffusion is
extremely fast, so that there is always equilibrium between the concentrations
of the species that can cross the membrane; this adiabatic hypothesis could
be easily relaxed in the future. Furthermore, we assume that protocells are
turgid, so that the constant-volume approximation implies that we will also neglect issues related to osmotic pressure. Another related aspect of the model is
that, since it is assumed that the permeable species are at equilibrium, while
the non-permeable ones never cross the barriers, infinite concentration growth
is possible; this is obviously a nonphysical behavior, so the model validity is
limited in time. All these simplifications, which will be removed in subsequent
studies, are also justified by the fact that our main goal is that of studying how
the dynamics of CRSs are affected by being embedded in a vesicle.
This model can be used in order to investigate the behavior of the system in
different conditions and to address some important questions. The first and perhaps most important one is the reason why compartments seem to be necessary
for life. Indeed, the very first studies on self-replicating molecules [8, 9, 24, 26]
were not interested in this aspect, so the CRSs were supposed to exist, e.g., in
a pond or in a beaker. Yet life seems to require compartments, that are ubiquitous. It is then important to understand whether there are major differences
between what may happen in a protocell and what happens in the bulk phase.
4
5
R. Serra et al.
It would be unconvincing to postulate a priori that the internal and external
environments are different. It is indeed more likely to assume that the vesicles
form in a pre-existing aqueous environment, so the average internal milieu is
essentially the same as the external one.3 Then, if a membrane surrounds a
portion of the fluid, what can happen that makes a difference?
Let us first observe that protocells are small (their typical linear dimensions
ranging from 0.1 to 10ยตm). If we imagine that a population of protocells exists,
and they are not โovercrowedโ, their total internal volume will typically be much
smaller than the total external volume (this is a fortiori true for an isolated one).
Moreover, every point in the interior of a protocell is not allowed to be far away
from the surface of the protocell that contains it. These observations imply
that the effect of surfaces will be much larger within protocells then outside
them. Suppose for example that the membrane hosts some catalytic activities,
so that important molecules are synthesized close to its boundaries, both inside and outside, and diffuse freely. If the membrane width is much smaller
than the protocell radius, then the internal and external surface areas are very
close to each other, but the external volume is much larger than the external
one: therefore the internal concentrations will be much higher than those in
the external environment. In this case, the system behavior in the interior can
be significantly different from the external one [43]. Note also that this effect
may be different for different molecules: the formation of some of them might
be catalyzed by the membrane, while others might be unaffected: so even the
relative concentrations of different chemicals may differ in the two cases.
Indeed, there are important protocell models that are based on such an active
catalytic role of the membrane [37]. In these cases it is easy to understand what
the role of the protocell is, since it provides essential catalysts and a way to keep
their products closer. But protocells might be able to give rise to an internal
environment different from the bulk even if the catalytic activity is absent. The
reason for this seemingly counterintuitive behavior is, once again, the smallness
of the protocells. Note that we are considering a case where new molecules are
formed (from those that are already in the interior of the protocell plus those
that can cross the semipermeable membrane). If the concentrations are not too
high, it is likely that the total numbers of newly formed molecules are quite
low, so that different protocells might host different groups of molecules. It
might even happen that a molecular type is present in some protocells and not
in others.
In order to get a feeling for this possibility, let us provide some realistic
estimates of the number of molecules of different types that can be present in
a protocell. Let us consider typical vesicles (linear dimension about 1ยตm) and
small ones (0.1ยตm). Typical concentrations of macromolecules may be in the
3 It has been observed that some superconcentration phenomena can take place under
particular circumstances [6, 43] but we will neglect them here.
5
6
R. Serra et al.
Typical (1ยต3 )
Small (10โ3 ยต3 )
1M
108
105
1mM
105
102
0.1mM
104
10
1ยตM
102
0.1
1nM
0.1
10โ4
Table 1: excepted number of molecules of a given species in a given protocell;
rows refer to protocell volumes, columns to concentrations.
millimolar to nanomolar range; the excepted numbers of molecules in a single
protocell are therefore given in table 1.
Let us recall that these numbers refer to the excepted values, but there are
fluctuations that may be relevant when small numbers are involved. For example, in the case of a 1ยตM concentration in small vesicles, there will be on
average 1 molecule every 10 cells: it is apparent that different protocells will
have widely different initial compositions. We therefore come to the conclusion
that the creation of small compartments can allow the formation of a population of different individuals out of the fluctuations of an environment that
looks macroscopically homogeneous. While not yet sufficient, this is definitely a
necessary condition for darwinian evolution to take place (obviously supposing
that the compartments can divide and that their division rate depends upon
composition). Moreover, in small stochastic systems it may also happen that
there are different trajectories stemming from the same initial conditions, due
to the order in which new molecules are synthesized.
These aspects of protocell dynamics are very important and our model, in
spite of its current limitations, is well suited to explore the related phenomena.
It is indeed possible to analyze the different possible stochastic effects, that
include:
(i) the path dependency induced by the random order in which new molecules
are generated, with particular regard to the low concentration effects: if
a catalyst is discovered in advance with respect to another, the system
evolution may be different; this can be studied by comparing different
simulations referring to the same chemistry, starting from the same initial
conditions;
(ii) the differences induced by different initial conditions, randomly generated
from the same distribution;
(iii) the different behaviors of distinct chemistries: in the real world the rules
of the chemistry are given, but in the kind of analysis performed here it
is also interesting to understand how different chemistries may affect the
behavior of the system and the diversity of a population of protocells. As,
for example, the role of RAF sets [20, 21, 22] in the overall dynamics.
In Section 3 we present the results of the simulations on the model. In the
concluding Section 4 we will discuss the main findings of this paper, and we will
propose further analysis and refinement of the models.
6
7
2
R. Serra et al.
Main features of the model
Entities and interactions. The model describes an open system in which
simple molecules interact with each other through elementary catalyzed reactions. The basic entities of the system are monomers and polymers, identified
by ordered strings of letters oriented from left to right taken from a finite alphabet (e.g. A, B, C, . . .). We will refer to the โlettersโ also as bricks, while the
term monomer will be reserved to those molecular types that are composed of
a single brick.
Every species xi , i = 1, 2, . . . , N composing the entire set of species X =
[x1 , x2 , . . . , xN ] is characterized by its specific amount (either quantity or concentration), denoted by xฬi . The number of copies of a specific species defines
its number of molecules.
The two basic reactions are: i) cleavage, i.e. the cutting of a species composed of more than one brick into two shorter species (e.g. ABBA โ A+BBA)
and ii) condensation, i.e. the concatenation of two species in a longer one (e.g.
BBA + AAB โ BBAAAB).
A key assumption of the model is that any reaction occurs only if catalyzed
by one of its specific catalysts; hence we exclude the presence of spontaneous
reactions by assuming sufficiently high activation energy for each reaction. In
particular, condensation requires an intermediate reaction in which a temporary
complex between the catalyst and the substrate is formed.
A further restriction regarding catalysis imposes that only species that are
composed of at least a minimum number of bricks can be catalysts. Additionally,
we neglect the presence of backward reactions (exception made for the dissociation reaction of intermediate complexes) by hypothesizing that the Gibbs
energy โG for any reaction is sufficiently large. A schematic representation of
the various reaction types is given in Fig. 1.
The reaction network. Provided that a catalyst for the reaction exists, each
species in the system could condensate with any other species in the system,
or be split at any cutting point into smaller species. The cardinality of the set
R of all the conceivable reactions for the system, at a given time, is therefore
given by:
N
X
Rฬ =
(L(xi ) โ 1) + N 2
(1)
i=1
where N is the cardinality of X and L(xi ) is the length of xi (i.e. the
number of bricks of that specific species). The first term of Eq. 1 refers to
the conceivable cleavages and the second one to the conceivable condensations.
Hence, the set of reactions that are actually allowed, i.e. the โchemistryโ of
the system, is determined by the catalysts involved in the various reactions.
Following Kauffman, we define the chemistry of the system at random. In this
regard, any species xi has a finite fixed probability pi of being chosen as catalyst
7
8
R. Serra et al.
CONDENSATION
K comp
S1 + C โ S1C
A
K decomp
K cond
S1C โ S1 + C
S1C + S2 โ P + C
A
B B A
A A B
B
B
B
A
B
B A A A
B
B
A B B A
B B A
B
B
B
A
A B B
A
A
B
A
A A B
B
B
A
B
CLEAVAGE
K cleav
S + C โ P1 + P2 + C
A
A
B B A
B B
B B
A A
A
B
B B A
B
B
B A A
B
A
B
Figure 1: Schematic representation of the two possible reaction types, namely
condensations and cleavages. S, S1 and S2 represent the substrates of a reaction,
C is a species with catalytic function, S1 C is the transient complex that is
formed in the first step of the condensation and P, P1 and P2 stand for the
products of a reaction. Kcleav , Kcomp , Kdiss and Kcond respectively stand for
the kinetic rates of cleavage, complex formation, complex dissociation and final
condensation.
of a randomly chosen reaction among those belonging to Rฬ. It is worth stressing
that, although the reaction network is built probabilistically, it remains invariant
in time; in other words, once a species is chosen to be the catalyst of a given
reaction, that species will always be catalyst for that reaction. Further details
concerning the structures of the model can be found in [11, 14].
The dynamics. The systemโs dynamics is simulated by means of an extension
of the well-known Gillespie algorithm [16, 17] for the stochastic simulation of
chemical reaction systems, in which we allow the appearance of novel species
and reactions that are not present in the system in the initial conditions. In
fact, cleavage and condensation of elements either present within the protocell
or entering it from the external environment can generate new species, which,
in turn, can be involved in new reactions, both as catalysts and substrates.
The container: the introduction of the protocell. In its classical formulation [1], the catalytic reaction network is modeled within a continuous
stirred-tank reactor (CSTR), in which the ingoing and outgoing fluxes could
be adjusted according to the experimental needs. In this work, we introduce
a major modification of the model by introducing a semi-permeable membrane
that separates the catalytic reaction network from the external environment (see
Fig. 2).
The semi-permeable membrane is here modeled by allowing only some species
to enter and leave the protocell, namely those that are shorter than an arbi-
8
9
R. Serra et al.
Figure 2: Schematic representation of the semi-permeable membrane as conceived in our model of protocell. The membrane is here represented as a lipid
bilayer that shapes a spherical vesicle. In this example, only the species shorter
than 3 letters can cross the membrane, entering or leaving the internal compartment, the dynamics of which is actually simulated in our model of catalytic
reaction networks. On the opposite, longer species are confined either inside or
outside the vesicle.
trary length Lperm . All the species that are longer than Lperm either remain
entrapped within the protocell or never enter it from the outside. Another
important assumption is that the concentration of the permeable molecules is
homogeneous both inside and outside the protocell, and that they take the same
value. That is, we assume infinitely fast diffusion both in the bulk phases and
across the membrane, so that the chemical potentials of the permeable species
are the same. The species that can cross the membrane will be also defined,
from now on, as the buffered species.
In this work, we consider the volume of the protocell to be constant, while
it is planned to introduce protocell size and duplication dynamics in further
developments of the model.
We also remark that in this model the transport processes in a vesicle are
treated in a way that, albeit simplified, parallels their actual dynamics. While
small flow reactors have also been proposed as protocell models [22, 50], they are
indeed not well suited, since they require a constant inflow that has no physical
analogue in a vesicle, and usually also allow the outflow of all the solutes.
9
10
R. Serra et al.
Algorithm 1 Formal definition of the model as multiset-rewriting system.
1: let ฮจ be the alphabet of symbols denoting monomers, A, B, C...;
2: the ฮโ and ฮโ be the (infinite) set of all finite-length non-empty polymers
and substrate-catalyst complexes over ฮจ, and let us denote by P ยท Q (resp.
P _Q, substrate-catalyst) the polymer (resp. complex) obtained by concatenating polymers P and Q;
3: let the state of the system be multiset ฮฆ โก P1 | P2 | ... | Pn counting the
occurrences of each polymer/complex Pi โ {ฮโ โช ฮโ };
4: consider the following reaction schema with variables X, Y and Z, in a
multiset-rewriting notation:
โข [A: Cleavage]
Rcl : X ยท Y | Z 7โ X | Y | Z
{Z is the catalyst, X ยท Y is the polymer breaking to X and Y }
โข [B1: Complex formation]
Rcf : X|Y 7โ X_Y
โข [B2: Complex dissociation]
Rcd : X_Y 7โ X | Y
โข [B3: Final condensation]
Rf c : X_Y | Z 7โ X ยท Z | Y
{X and Z are substrates, Y is the catalyst, X_Y is the substratecatalyst complex, X ยท Z the polymer composed by X and Z}
Variable polymers (X ยท Y ) take values in ฮโ , whereas complexes (X_Y ) in
ฮโ .
5: (Reactions generation) an instantiation map ฯ is evaluated via standard
pattern matching to transform the above schema in all the possible rewriting
rules
ฮฆ
ฮฆ
ฮฆ
Rฯ = Rcl
โช Rcf
โช Rcd
โช Rfฮฆc
for multiset ฮฆ. The map ฯ, which assigns values to X, Y and Z, is required
to be maximal and univocal, i.e. it must yield all the possible rewriting rules
applicable in ฮฆ and instantiated consistently (via deterministic association)
for any of its evaluation.
6: ฮฆ and Rฯ yield a Continuous-time Markov Chain. By firing a reaction
in Rฯ via the classical Gillespie algorithm a new state of the system is
generated. In this particular implementation of the model, polymers shorter
than 3 are fed and cannot be instantiated as catalysts (see Appendix A).
The simulation proceeds with the new state from previous step.
3
Results of the simulations
The preliminary experiments on the protocell model were performed by keeping
fixed some key structural parameters (see the Appendix for the details) and
10
11
R. Serra et al.
creating different random chemistries. In particular, we here present the details
of two specific chemistries, which were specifically selected among many (on a
total of 10 simulated chemistries) because they exhibit very specific dynamical
properties. In this regard, it is first important to introduce the concept of RAF
set, which be fundamental in the description of these systems.
Following Hordijk et al. [20, 21, 22], given the entire chemistry, a subset
of reactions R is: (i) Reflexively autocatalytic (RA) if every reaction in R is
catalyzed by at least one other reaction belonging to R, (ii) Food-generated (F)
if every substrate in R can be produced from the food set F by means of the
reactions belonging to R, (iii) Reflexively autocatalytic and F-generated (RAF)
if both the previous conditions are satisfied.
The chemistries of the two presented protocells differ for the presence/absence
of a RAF set (RAF in short from now on): in particular, in the first protocell
(CH1) no RAFs are present, whereas in the second protocell (CH2) a RAF
formed by an autocatalysis consuming molecules from the food set is present.
In order to assess the behavior of the system, a method to measure the similarity between two different states of the system is that proposed by Kaneko [25]
and is based on the comparison of the vectors that describe their chemical compositions. Let us define the k-dimensional vectors Cj (t) = [cj,1 (t), cj,2 (t), ..., cj,N (t)]
and Ck = [ck,1 (t), ck,2 (t), ..., ck,N (t)] whose components are the concentrations
of the species present at time t in systems j and k respectively. Same positions
in vectors refer to same species, hence species present in system j that are not
present in k have concentration equal to 0 and viceversa. The similarity between
the two systems is then computed by means of the normalized inner product:
!
C~j (t) ยท C~k (t)
โ1
(2)
ฮt = cos
||Cj (t)|| ยท ||Ck (t)||
where ฮt is the angle between the two vectors measured at the time t.
Throughout this paper, angles will be measured in degrees.
3.1
Low concentration effects
In this section we investigate the low concentration effects in protocells. To this
end, the selected chemistries are tested with respect to 4 different initial uniform
concentrations of the chemical species present inside the vesicle: in detail, the
initial concentration of all the non-buffered species is equal to: 1mM , 0.1mM ,
0.01mM and 1ยตM . Conversely, the amount of each buffered species is always
fixed to 1mM .
Notice that, in general, the protocell model presented here does not lead to
stationary chemical distributions. Indeed, situations are possible where some
particular species indefinitely increases its concentration: an example is the RAF
set in CH2, where a particular species catalyses its own formation using two
buffered species as substrates: in this case an exponential growth is achieved.
Another simple case could be the linear growth of a species produced directly
from the buffered species by means of a catalyst not involved in other reactions,
11
12
R. Serra et al.
Conc
Molarity
(Cond.1) 1mM
(Cond.2) 0.1mM
(Cond.3) 0.01mM
(Cond.4) 1ยตM
Molecules
per
species
Average
600
60
6
1
CH1
ฮ3000
(mean)
0.41
2.34
7.71
11.15
CH2
ฮ3000
(max.)
0.68
5.86
15.28
19.35
ฮ3000
(mean)
0.06
0.18
9.69
3.67
CH2
(no
RAF)
ฮ3000
(max.)
0.19
0.52
21.86
11.91
ฮ3000
(mean)
0.57
1.69
6.48
9.44
ฮ3000
(max.)
0.96
2.78
11.21
15.35
Table 2: In the table the average and the maximum values of ฮ3000 relative to
10 distinct simulations of each of the 4 different initial conditions (rows in the
table) are shown. The measures are reported for the 2 different chemistries: the
one without RAFs and the one with RAFs, for which they are also computed
without taking into account the species belonging to the RAF, column โCH2
(no RAFs)โ. The 4 conditions differ in the average magnitude of the initial
concentrations of the initial set of molecular species not belonging to the buffered
flux (the food set). A realization of each of the 4 initial concentration is drawn
at random from a Poisson distribution, according to the given parameters, and
is maintained invariant across the 10 different runs.
i.e. present in constant concentration. Of course, more complex situations are
possible, even not directly originating from the food set. Yet, many simulations
show a transient in which the chemicals distribution rapidly change followed by
a long quasi-equilibrium, where changes are limited to small adjustments. By
applying the parameters adopted in the present work, such a state is already
achieved in 2500 seconds, except for the case of very low concentrations (1ยตM ).
Diversity. In table 2 some statistics on how ฮ varies according to the different
cases are shown and, in particular, it is possible to appreciate an increase of the
dissimilarity among protocells in correspondence with a decrease on the initial
concentration, as indicated by the average and the maximum value of ฮ between
all the runs of each specific chemistry and specific initial condition, computed
at time t = 3000.4 Since these runs are characterized by identical chemistries
and identical initial conditions, the angle reported here is indeed the result of
dynamical evolutions that differ only for the simulation random seed. It is
worth remarking that the lower is the concentration profile, the higher is the
distance among the final distributions,5 i.e. the angle ฮ reaches its maximum
4 Exceptionally for the case 1ยตM , ฮ is not computed after 3000 second but when at least
5000 reactions have occurred within the simulation. The reason for this is that the low
concentrations involve a so slow dynamics that 3000 seconds are not enough in order to
observe significant chemical changes.
5 In regard to CH2 we are here considering the value of ฮ excluding the species belonging
to the RAF set (last columns of the table). Since the molecules belonging to the RAF set
reach a concentration much greater with respect to the other molecules, considering them in
the angle computation would misrepresent the distance among the simulations.
12
13
R. Serra et al.
value with regard to very low initial concentrations (e.g. 1 molecule per species
on average).
It is interesting to notice that the displayed low concentration effects with
respect to the overall similarity of the system are found in both chemistries,
hinting at a generic property of such systems, independently of the possible
presence of RAF sets.
The influence on RAF set dynamics. The asynchronous framework implies that only one reaction occurs at the time. Given that RAFs in general
involve more than one reaction, in order to detect their presence we analyze
the system in a time interval (i) sufficiently large to let a significant number
of reactions to occur, yet (ii) not embracing the whole simulation (in order to
avoid the presence of too rare reactions); It is worth stressing that since the
analysis are made ex post with respect to the simulation of the system, they do
not affect the simulated dynamics, but just the way of representing it. In fig. 3,
we show the presence (or the absence) of the RAF of CH2 every 10 seconds,
by using a time window of 5 seconds,6 with respect to the 4 aforementioned
different average concentrations.
Note that in all the initial conditions the autocatalytic species has a concentration higher than zero, thus the corresponding RAF is always able to achieve its
own growth viability. From Fig. 3 it is possible to observe the strong correlation
between the average concentration of the species within the protocell and the
presence of RAFs. As long as the concentration decreases, so does the probability of detecting a RAF, yet in the long run in most of the simulations RAFs
eventually emerge.
3.2
Sensitivity to initial conditions
We here analyze the effects of variations in the initial concentrations of the
single species present within the protocells, while maintaining their average
concentration fixed. We simulate 10 different variations of the single species
concentrations for both the case of average concentration equal to 0.01mM
(condition 3) and average concentration 1ยตM (condition 4).
In Fig. 4 we display the variation of the similarity in time for each couple
of simulations, with respect to both conditions, in order to provide a picture of
the sensitivity of the overall diversity to the initial conditions.
Note that the very low concentrations of condition 4 (in average, only one
molecule for each species) imply that in certain protocell realizations some
species are missing: in particular, each simulation starts from a different set
of species composed of, on average, 40 species, on the possible 62. This may
explain the very high values of ฮ0 with respect to condition 4 (Fig. 4).
Besides, one can see that condition 4 shows an evident bifurcation (Fig. 4b).
Given that in some simulations, because of the low concentration effects, the
6 We set the sampling frequency and the time threshold of the windows by taking advantage
from several initial model threads, not essential to the comprehension of this article.
13
14
R. Serra et al.
Figure 3: From the top to the bottom the four traces, accounting for conditions
1, 2, 3 and 4 of the chemistry 2, i.e. the one containing the RAF set, depicting
the presence of the RAF during the simulation (time flows from left to right, each
row represents a different run of the same condition). The black zones stands
for the absence of the RAF set, while gray zones denote the presence of the
RAF. It is important to remark that RAFs are searched in a dynamic network
created with the reactions occurred in a mobile time window of 5 seconds.
autocatalytic species (and so the RAF) can be present or absent in the initial condition, the system can indeed reach different regions of the state space,
leading to deeply different histories. On the opposite, condition 3 shows the
aforementioned regulatory activity of the always active RAF.
(a)
(b)
Figure 4: The angles between each couple of different simulations in time, for
condition 3 (0.01mM - left panel) and condition 4 (1ยตM - right panel).
Finally, it is important to remark that during each simulation many species
disappear and many other appear, so a compact way to follow the process is
that of monitoring, during each run, the variation of the angle ฮT 0 โT t between
the initial and the current chemical setting (Fig. 5a). The graph indicates
that ฮ0โ3000 approaches a value close to 80 degrees, which means a quasiorthogonality of the system with respect to the initial condition.
14
15
R. Serra et al.
The dynamics of the system, in term of molecular concentrations, leading to
such a divergence from the beginning is shown in Fig. 5b. It is reasonable to
hypothesize that the clear inversions in the trajectories of the concentrations of
certain species may be responsible for this phenomenon.
(a)
(b)
Figure 5: On the left panel the average angle (and the standard deviation)
ฮT0 โTt measured from T0 to Tt for each chemical distribution, within each
single run of conditions 1 (average molarity 1mM ) and 2 (average molarity
0.1mM ), is shown. It is worthwhile to remark that ฮ = 90 stands for a complete
orthogonality between the chemical distributions. In order to appreciate the
convergence towards a quasi-orthogonality, on the right panel the concentration
of the species in time of a particular simulation are shown (Simulation: CH2,
condition 1, run 1). The exponential growth concentration of the autocatalytic
species is shown with a limit of 3mM .
4
Conclusion and further developments
In this paper we introduced a simplified model of a non-growing protocell and
we investigated the behavior of a stochastic model of catalytic reaction networks
in such an environment. To the best of our knowledge this is a novel approach.
The crucial importance of the small size of the protocell has been stressed,
and the effects of the fact that some chemicals can be present in low numbers
have been investigated. While a broader analysis is ongoing, we have here shown
that it is possible to reach different compositions of the chemical species, in the
particular case in which some species are present in the bulk at low concentrations. We have also shown that there are two different, possibly overlapping
reasons for this diversity: (i) the random sequence of molecular events involving those species and (ii) the random differences in their initial concentrations.
We have also stressed the importance of RAF sets in influencing the overall
dynamics.
There are several ways in which this work might seed further research. The
most obvious is that of relaxing the physical limitations that have been considered, e.g. infinitely fast diffusion, yet we do not except that this may change
the major conclusions summarized above.
15
16
R. Serra et al.
Obviously, a very interesting direction is that of considering a protocell that
is able to grow and divide. The processes involved in protocell growth and
replication are indeed complex and, in particular, a necessary condition for its
existence and replication is the coupling between the rates of molecules replication and cell growth. We have shown elsewhere [3, 12, 40] that the very existence
of this coupling suffices to guarantee (under very general conditions) that, in
the long run, the rate of cell division and that of duplication of the replicating
molecules converge to the same value, thereby allowing sustainable growth of a
population of protocells.7 However, those results were achieved by supposing a
fixed set of genetic memory molecules, with some possible extinction. It could
be sound to extend this approach to the case where there are evolving chemical
reaction sets and to verify whether synchronization occurs. An important aspect
to be addressed in the case of growing vesicles is also the effect of volume growth
on the concentrations of the various chemicals: a preliminary investigation can
be found in [4].
Besides, we have not here explicitly considered the possibly catalytic role of
membranes that, as it has been discussed in section 1, might be a major cause
of the difference between the intracellular environment(s) and the bulk. In a
fixed volume model this effect can be lumped in the effective reaction rates, but
if we consider a growing protocell we have to take into account the differences
between surfaces and volumes. This might also lead to interesting phenomena
that will be analyzed in future developments.
To conclude, different protocells may host different mixtures of molecular
species, even if they share the same chemistry (i.e., they โinhabit the same
worldโ). It might be extremely interesting to model the behavior of populations
of different protocells of this kind, which may show different growth rates, but
may also undergo phenomena like coalescence, exchange of material, etc. Thus,
further investigations will be indeed necessary to assess different generations of
protocell populations and their possible evolution pathways.
Last but not least, it will be interesting to extend these studies to other protocell
architectures like e.g. the Los Alamos bug, Gard models, and others.
5
Acknowledgements
Stuart Kauffman, Norman Packard and Wim Hordijk kindly shared with us their
deep understanding of autocatalytic sets in several useful discussions. Useful
discussions with Ruedi Fรผchslin, Davide De Lucrezia, Timoteo Carletti, Andrea Roli and Giulio Caravagna are also gratefully acknowledged. The authors
are also grateful to Giulia Begal for kindly drawing the image of Fig. 2. C.D.
wishes to acknowledge the project SysBionet (12-4-5148000-15; Imp. 611/12;
CUP: H41J12000060001; U.A. 53) for the financial support of the work.
The final publication is available at Springer via http://dx.doi.org/10.1007/s11047014-9445-6
7 This
property was proved earlier by Munteanu et al. for the Los Alamos bug mode [33].
16
17
R. Serra et al.
A
Appendix 1 - Simulation environment and parameter settings
Simulations were performed with the CaRNeSS simulator8 developed by the
research group.
In the following, the baseline setting of the system used in the simulations is
reported (for the parameters that were variated in the different experiments
please refer to the text): (โข) Alphabet: A, B, (โข) Volume = = 1e โ 18dm3 =
1ยต3 , (โข) Average catalysis probability = 1 catalyzed reaction for species, (โข)
Maximum length of the species, Lmax = 6, (โข) Lperm = 2, (โข) Monomers and
dimers do NOT catalyze, (โข) Kcleav = 25M โ1 secโ1 , (โข) Kcomp = 50M โ1 secโ1 ,
(โข) Kdiss = 1M โ1 secโ1 , (โข) Kcond = 50M โ1 secโ1 .
References
[1] R.J. Bagley and J D Farmer. Spontaneous emergence of a metabolism. Artificial Life II.
Santa Fe Institute Studies in the Sciences of Complexity, X:93โ141, 1992.
[2] Ann-Sofie Cans, Meghan Andes-Koback, and Christine D Keating. Positioning lipid
membrane domains in giant vesicles by micro-organization of aqueous cytoplasm mimic.
J Am Chem Soc, 130(23):7400โ7406, 2008.
[3] T Carletti, R Serra, M Villani, I Poli, and A Filisetti. Sufficient conditions for emergent
synchronization in protocell models. J Theor Biol, 254(4):741โ751, 2008.
[4] Timoteo Carletti and Alessandro Filisetti. The Stochastic Evolution of a Protocell: The
Gillespie Algorithm in a Dynamically Varying Volume. Computational and Mathematical
Methods in Medicine, 2012(Article ID 423627):1โ13, 2012.
[5] Xiaofeng Dai, Olli Yli-Harja, and Andre S Ribeiro. Determining noisy attractors of
delayed stochastic gene regulatory networks from multiple data sources. Bioinformatics
(Oxford, England), 25(18):2362โ8, September 2009.
[6] Tereza Pereira de Souza, Pasquale Stano, Frank Steiniger, Erica DโAguanno, Emiliano
Altamura, Alfred Fahr, and Pier Luigi Luisi. Encapsulation of Ferritin, Ribosomes,
and Ribo-Peptidic Complexes Inside Liposomes: Insights Into the Origin of Metabolism.
Origins of life and evolution of the biosphere : the journal of the International Society
for the Study of the Origin of Life, October 2012.
[7] Lisa M Dominak and Christine D Keating. Polymer encapsulation within giant lipid
vesicles. Langmuir, 23(13):7148โ7154, 2007.
[8] Freeman J Dyson. Origins of life. Cambridge: Cambridge University Press, 1985.
[9] M Eigen and P Schuster. The hypercycle. A principle of natural self-organization. Part A:
Emergence of the hypercycle. Die Naturwissenschaften, 64(11):541โ65, November 1977.
[10] JD Farmer and SA Kauffman. Autocatalytic replication of polymers. Physica D: Nonlinear Phenomena, 220:50โ67, 1986.
8 https://github.com/paxelito/carness
17
18
R. Serra et al.
[11] A Filisetti, A Graudenzi, R Serra, M Villani, D De Lucrezia, and I Poli. The role of energy
in a stochastic model of the emergence of autocatalytic sets. In Lenaerts T, Giacobini
M, H Bersini, P Bourgine, M Dorigo, and R Doursat, editors, Advances in Artificial
Life, ECAL 2011 Proceedings of the Eleventh European Conference on the Synthesis
and Simulation of Living Systems, pages 227โ234. MIT Press, Cambridge, MA, 2011.
[12] A. Filisetti, R. Serra, T. Carletti, M. Villani, and I. Poli. Non-linear protocell models:
synchronization and chaos. The European Physical Journal B, 77(2):249โ256, June 2010.
[13] Alessandro Filisetti, Alex Graudenzi, Roberto Serra, Marco Villani, Davide De Lucrezia,
Rudolf M Fuchslin, Stuart A Kauffman, Norman Packard, and Irene Poli. A stochastic
model of the emergence of autocatalytic cycles. Journal of Systems Chemistry, 2(1):2,
2011.
[14] Alessandro Filisetti, Alex Graudenzi, Roberto Serra, Marco Villani, Rudolf M Fรผchslin,
Norman Packard, Stuart a Kauffman, and Irene Poli. A stochastic model of autocatalytic
reaction networks. Theory in biosciences = Theorie in den Biowissenschaften, pages 1โ9,
October 2011.
[15] T Ganti. Chemoton Theory, Vol. I: Theory of fluyd machineries: Vol. II: Theory of livin
system. New York: Kluwer Academic/Plenum, 2003.
[16] Daniel T Gillespie. Exact Stochastic Simulation of Coupled Chemical Reactions. The
Journal of Physical Chemistry, 81(25):2340โ2361, 1977.
[17] Daniel T Gillespie. Stochastic Simulation of Chemical Kinetics. Annual Review of Physical Chemistry, 58(1):35โ55, 2007.
[18] Martin M Hanczyc, Shelly M Fujikawa, and Jack W Szostak. Experimental models of
primitive cellular compartments: encapsulation, growth, and division. Science (New
York, N.Y.), 302(5645):618โ622, October 2003.
[19] Wim Hordijk and Jose F Fontanari. Catalytic Reaction Sets, Decay, and the Preservation
of Information, 2002.
[20] Wim Hordijk, Jotun Hein, and Mike Steel. Autocatalytic Sets and the Origin of Life.
Entropy, 12(7):1733โ1742, June 2010.
[21] Wim Hordijk and Mike Steel. Detecting autocatalytic, self-sustaining sets in chemical
reaction systems. Journal of theoretical biology, 227(4):451โ461, April 2004.
[22] Wim Hordijk, Mike Steel, and Stuart Kauffman. The Structure of Autocatalytic Sets:
Evolvability, Enablement, and Emergence. page 12, May 2012.
[23] S Jain and S Krishna. A model for the emergence of cooperation, interdependence, and
structure in evolving networks. Proc Natl Acad Sci U S A, 98(2):543โ547, 2001.
[24] Sanjai Jain and Sandeep Krishna. Autocatalytic set and the growth of complexity in an
evolutionary model. Phys Rev Lett, 81:5684โ5687, 1998.
[25] Kunihiko Kaneko. Life: An Introduction to Complex Systems Biology (Understanding
Complex Systems). Springer-Verlag New York, Inc., Secaucus, NJ, USA, 2006.
[26] S A Kauffman. Autocatalytic sets of proteins. J Theor Biol, 119(1):1โ24, 1986.
[27] P.L. Luisi, F. Ferri, and P. Stano. Approaches to semi-synthetic minimal cells: a review.
Naturwissenschaften, 93(1):1โ13, 2006.
[28] Sheref S Mansy. Model Protocells from Single-Chain Lipids. International Journal of
Molecular Sciences, 10(3):835โ843, 2009.
18
19
R. Serra et al.
[29] Sheref S Mansy, Jason P Schrum, Mathangi Krishnamurthy, Sylvia Tobรฉ, Douglas A
Treco, and Jack W Szostak. Template-directed synthesis of a genetic polymer in a model
protocell. Nature, 454(7200):122โ125, 2008.
[30] Harold J. Morowitz, Bettina Heinz, and David W. Deamer. The chemical logic of a
minimum protocell. Origins of Life and Evolution of the Biosphere, 18(3):281โ287,
September 1988.
[31] Simon Conway Morris. Lifeโs Solution, Inevitable Humans in a Lonely Universe. University of Cambridge, 2003.
[32] O G Mouritsen. Life - As a Matter of Fat. The Emerging Science of Lipidomics. Springer,
Berlin, first edition, 2005.
[33] A Munteanu, C S Attolini, Steen Rasmussen, H Ziock, and R V Solรฉ. Generic Darwinian
selection in protocell assemblies. DOI: SFI-WP 06-09-032, SFI Working Papers, Santa
Fe Institute, 2006.
[34] Andreea Munteanu and Ricard V Solรฉ. Phenotypic diversity and chaos in a minimal cell
model. J Theor Biol, 240(3):434โ442, 2006.
[35] Alla Polozova, Xingong Li, Tong Shangguan, Paul Meers, Daniel R Schuette, Nozomi
Ando, Sol M Gruner, and Walter R Perkins. Formation of homogeneous unilamellar liposomes from an interdigitated matrix. Biochimica et Biophysica Acta (BBA) Biomembranes, 1668(1):117โ125, 2005.
[36] Steen Rasmussen, Liaohai Chen, David Deamer, David C.Krakauer, Norman H Packard,
Peter F Stadler, and Mark A Bedau. Transitions from Nonliving to Living Matter.
Science, 303, 963-965, 2004.
[37] Steen Rasmussen, Liaohai Chen, Martin Nilsson, and Shigeaki Abe. Bridging nonliving
and living matter. Artificial life, 9(3):269โ316, January 2003.
[38] Tristan Rocheleau, Steen Rasmussen, Peter E Nielsen, Martin N Jacobi, and Hans
Ziock. Emergence of protocellular growth laws. Philos Trans R Soc Lond B Biol Sci,
362(1486):1841โ1845, 2007.
[39] D Segrรฉ and D Lancet. Composing life. EMBO reports, 1(3):217โ22, September 2000.
[40] Roberto Serra, Timoteo Carletti, and Irene Poli. Syncronization phenomena in surfacereaction models of protocells. Artificial life, 123(2):123โ38, 2007.
[41] Roberto Serra, Timoteo Carletti, Irene Poli, Marco Villani, and Alessandro Filisetti.
Conditions for emergent synchronization in protocell. In In J. Jost and D. Helbing
(eds): Proceedings of ECCS07: European Conference on Complex Systems. CD-Rom,
paper n.68, 2007.
[42] Roberto Serra, Alessandro Filisetti, Marco Villani, Chiara Damiani, Alex Graudenzi,
and Tommaso Panini. A stochastic model of catalytic reaction networks in protocells.
Submitted to Artificial Life, 2013.
[43] Roberto Serra and Marco Villani. Mechanism for the formation of density gradients
through semipermeable membranes. Physical Review E, 87(6):062814, June 2013.
[44] R.V. Ricard V Solรฉ, Andreea Munteanu, Carlos Rodriguez-Caso, Javier Macรญa, and
J. Mac\โ\ia. Synthetic protocell biology: from reproduction to computation. Philos
Trans R Soc Lond B Biol Sci, 362(1486):1727โ1739, 2007.
[45] P F Stadler. Dynamics of autocatalytic reaction networks. IV: Inhomogeneous replicator
networks. Bio Systems, 26(1):1โ19, January 1991.
19
20
R. Serra et al.
[46] P F Stadler and P Schuster. Dynamics of small autocatalytic reaction networksโI. Bifurcations, permanence and exclusion. Bulletin of mathematical biology, 52(4):485โ508,
January 1990.
[47] Peter F. Stadler, Wolfgang Schnabl, Christian Forst, and Peter Schuster. Dynamics of
Small Autocatalytic Reaction Networks II : Replication, Mutation and Catalysis, 1995.
[48] Pasquale Stano and Pier Luigi Luisi. Achievements and open questions in the selfreproduction of vesicles and synthetic minimal cells. Chemical communications (Cambridge, England), 46(21):3639โ53, June 2010.
[49] J W Szostak, D P Bartel, and P L Luisi. Synthesizing life. Nature, 409(6818):387โ390,
2001.
[50] Vera Vasas, Chrisantha Fernando, Mauro Santos, Stuart Kauffman, and Eors Szathmary.
Evolution before genes. Biology Direct, 7(1):1, January 2012.
[51] R. Wesson. Beyond Natural Selection. MIT Press, Cambridge, MA, 1991.
[52] Ting F Zhu and Jack W Szostak. Coupled Growth and Division of Model Protocell
Membranes. Journal of the American Chemical Society, 131(15):5705โ5713, 2009.
20
| 5cs.CE
|
1
Adaptive Delivery in Caching Networks
Seyed Ali Saberali, Hamidreza Ebrahimzadeh Saffar, Lutz Lampe, and Ian Blake
arXiv:1707.09662v1 [cs.IT] 30 Jul 2017
Abstract
The problem of content delivery in caching networks is investigated for scenarios where multiple
users request identical files. Redundant user demands are likely when the file popularity distribution
is highly non-uniform or the user demands are positively correlated. An adaptive method is proposed
for the delivery of redundant demands in caching networks. Based on the redundancy pattern in the
current demand vector, the proposed method decides between the transmission of uncoded messages
or the coded messages of [1] for delivery. Moreover, a lower bound on the delivery rate of redundant
requests is derived based on a cutset bound argument. The performance of the adaptive method is
investigated through numerical examples of the delivery rate of several specific demand vectors as well
as the average delivery rate of a caching network with correlated requests. The adaptive method is
shown to considerably reduce the gap between the non-adaptive delivery rate and the lower bound. In
some specific cases, using the adaptive method, this gap shrinks by almost 50% for the average rate.
Index Terms
Adaptive delivery algorithm, average delivery rate, coded caching, correlated requests, placement
optimization, redundant demands.
I. I NTRODUCTION
Local content caching is a promising technique to meet the unprecedented traffic demands in
the next generation communication networks [1]โ[6]. Caching networks take advantage of the
usersโ contextual information to predict the future user demands. This enables the network to
store the popular content at storage nodes, also known as caches, close to the end users and
satisfy the user requests locally [3].
2
Caching networks operate in two phases, which are commonly referred to as placement and
delivery phases. In the placement phase, the caches fill their memories with parts of the popular
files up to their storage capacity. This phase takes place when the network traffic is low. In
contrast, the delivery phase is performed when the network is congested. In this phase, upon the
usersโ requests, each cache provides its users with the parts of the files that it has available. The
remaining parts of the files are conventionally delivered to the users through separate unicast
transmissions performed by a central server on a channel that is shared by the users. In a more
recent caching approach [2], known as coded caching, the central server uses simultaneous
coded-multicasting to deliver the requested content to the users to further reduce the network
congestion.
An information-theoretic formulation of coded caching was developed in [2]. The authors
defined the delivery rate as the total traffic on the shared communication link due to the serverโs
messages, such that the usersโ requests are satisfied. Moreover, they proposed a centralized
coded-caching scheme to reduce the delivery rate. In a later work [1], a decentralized caching
scheme was proposed that did not require any coordination between the caches to operate. The
decentralized nature of this method made it the building block of several caching schemes that
were designed later for more complicated scenarios [6]โ[11].
Both [1], [2] used the peak delivery rate as the figure of merit of the caching network. The
peak rate results from the worst-case demand vector, where all the users request distinct files.
However, the average delivery rate is also a significant performance metric of a caching network.
Average delivery rate depends on the statistics of the user requests. Thus, the statistical patterns
in the user demands can significantly affect the design of the caching scheme.
One statistical property of user demands is the popularity distribution of the files. The caching
schemes of [1], [2] can be used if the popularity distribution is uniform. On the other hand, [5]โ[8]
have proposed different caching schemes to account for non-uniform popularities. In particular,
the caching schemes of [6], [7] are designed based on grouping of the files into several popularity
3
groups, with the files in each group having relatively close popularity levels. They provide more
storage resources to the files in the more popular groups. Then, they use the decentralized caching
scheme of [1] within each group separately. Also, [8] groups the library of files into two groups
of popular and unpopular files. The requests for popular files are delivered through the delivery
algorithm of [1], while the requests of unpopular files are delivered through uncoded messages.
The same problem is investigated in [5], assuming a Zipf popularity distribution and independent
and identically distributed user requests. The placement of [5] is based on the partitioning of each
file into equal length packets and randomly distributing the packets (not bits) over the caches.
Unlike the other schemes, the delivery of [5] is not based on the delivery algorithm of [1], but on
chromatic number index coding. In contrast to [6]โ[8], this scheme does not restrict the coding
opportunities to the requests within each popularity group. However, its implementation is more
complicated as it requires vertex coloring of a conflict graph.
The statistics of the usersโ requests can further affect the design of caching networks through
increasing the chance of multiple identical requests. In such a scenario, one might be able to
modify the delivery algorithm to benefit from the redundancies in the user demands, to further
reduce the average delivery rate. Redundant demands are likely to be made when the files have
significantly different popularity levels or when there are positive correlations among the requests
of different users. For the case of non-uniform file popularities, the schemes in [6]โ[8] do not take
the effect of identical requests into account during the delivery phase. This is because the delivery
in all these schemes is based on the delivery of [1], which is designed for the demand vectors
with distinct requests. In addition to non-uniform popularity levels, correlated user requests are
likely in many practical scenarios. A considerable amount of multimedia requests are made
through the social networks like Facebook, Twitter and Instagram and movie providing websites
like Netflix. In such scenarios, the users with overlapping circles of friends, the ones who follow
the same people or pages, and those who live in the same geographical area or have common
personal, social and professional interests are likely to get suggestions for the same content in
4
their media feeds, and therefore, request the same files.
In this paper, we investigate the delivery of redundant demands in caching networks. We study
a model where placement is fixed, yet the requests are changing by the time and the delivery
adapts to the requests. We propose an adaptive delivery scheme based on message selection to
minimize the delivery traffic. Specifically, upon receiving a demand vector from the users, the
server exploits the redundancy pattern in the user demands to decide whether to use uncoded
messages or the coded messages of [1] to deliver each part of the files requested.
We assume that the placement phase is accomplished through the placement schemes of [1],
[2]. This ensures that the peak delivery rate does not exceed the delivery rates of [1], [2], so the
link capacity constraints are satisfied. Further, if the file popularities are relatively uniform or
little prior knowledge about the popularity distribution is available during the placement time, it
is natural to accomplish the placement as in [1], [2]. In the delivery phase, however, the users
reveal their demands to the server. The server can use this knowledge as a side information
and adapt its choice of coded and uncoded messages accordingly to benefit from the possible
redundancies in the requests. To the best of the authorsโ knowledge, this paper is the first work
in the literature to consider this scenario and to specifically design a scheme for the delivery of
redundant requests.
Although we use the placement schemes in [1], [2], our proposed delivery method is based
on an optimization formulation of the content placement problem. Namely, we use a modified
version of this problem to optimize the choice of coded and uncoded messages in our proposed
delivery scheme. A side result of the placement optimization problem is the generalization of
the centralized placement of [2] to arbitrary cache sizes. In particular, we derive the parameters
of the centralized caching analytically for cases where the total cache capacity is not an integer
multiple of the total size of the files in the library.
We show the superiority of our adaptive method through numerical examples for several
specific demand vectors. We derive a lower bound on the delivery rate of the redundant requests
5
based on a cutset bound argument, and compare the rate of the proposed delivery method with
the lower bound. Moreover, we study the dynamics of a caching system with correlated user
demands. We apply Gibbs sampling [12], [13], to generate sample demand vectors based on a
stochastic modeling of the dependencies among the user requests. It is shown that the proposed
method is superior to the conventional non-adaptive method in terms of the average delivery
rate. In some specific cases, the adaptive method decreases the gap between the average rate of
the non-adaptive scheme and the lower bound by almost 50%.
The remainder of this paper is organized as follows. In Sec. II, we present the network model
and review the caching schemes of [1], [2]. We formulate the rate minimization problem in
Sec. III. In Sec. IV, we propose the adaptive delivery scheme and derive a lower bound on the
delivery rate. Sec. V presents numerical examples and simulation results. Finally, we conclude
the paper in Sec. VI.
II. P ROBLEM M ODEL AND R EVIEW
In this section, we explain the problem model and briefly review the caching schemes of [1],
[2].
Assume a network with a central server and K caches, where the server is able to communicate
with the caches through a broadcast link (see Fig. 1). We denote the set of all caches in the
network by K. A library of N โฅ K popular files is given, where each file is F bits long. We
assume that all files are available at the central server and that each cache has a memory capacity
of M ร F bits. q , M/N represents the ratio of the cache size to the library size.
Placement Phase: In the placement phase, the caches fill their memories with parts of the
popular files based on a placement algorithm. We assume that placement takes place only once
and remains unchanged during the delivery phase.
The resulting distribution of bits in the caches can be described as follows. For a given file n
and a given subset of caches S โ K, denote by VSn the subset of bits of file n that are exclusively
6
Server
Cache 1
Cache 2
Cache K โ1
Cache K
ยทยทยท
Fig. 1. A network with K caches and a central server.
stored at the caches in S. Note that the resulting subsets of bits partition the set of all the bits
of every file into 2K partitions. Define s , |S| and
xs , |VSn |/F
(1)
as the portion of the bits of file n that are exclusively stored at each subset S of caches with
cardinality s. Here, we have assumed that |VSn | only depends on s. In particular, it neither depends
on n nor on the particular choice of caches in S as long as the cardinality of S is s. This holds
because of symmetry, as we assume a uniform distribution over file popularities.
The placement phase can be performed through either the centralized scheme of [2] or the
decentralized scheme of [1]. The centralized caching scheme of [2] can be used only when
t , KM
is an integer. For the centralized placement, split each file into Kt non-overlapping
N
subfiles of the same length F/ Kt . Assign each one of these subfiles to a subset of caches
S : s = t, in a one-to-one manner. Store the bits belonging to each subfile in all the caches in
7
the corresponding S. This results in
xcen
s =
๏ฃฑ
๏ฃด
๏ฃด
๏ฃฒ1/
K
s
๏ฃด
๏ฃด
๏ฃณ0
For the decentralized placement, each cache stores
s=t
.
(2)
s 6= t
M
F
N
bits of each file uniformly at random.
It can be shown that for large F [1]
xdecen
โ q sโ1 (1 โ q)Kโs+1 ,
s
s = 0, ..., K
(3)
with high probability.
Delivery Phase: In the delivery phase, the network serves one user of every cache at a
time. Denote the requests of the users of caches 1, ..., K with d1 , ..., dK , respectively. We refer
to the vector [d1 , ..., dK ] as the demand vector. Note that the demand vector evolves with time
during the delivery phase. We represent the number of distinct files in the demand vector by
L, where 1 โค L โค K. We call the demand vector redundant if L < K. In addition, denote
by ki , the number of requests for the i-th most requested file in the current demand vector.
Thus ki โฅ kj for i > j and i, j โ {1, ..., L}. We call (k1 , ..., kL ) the redundancy pattern of the
demand vector. For a demand vector [d1 , ..., dK ], we define the delivery rate R(M, [d1 , ..., dK ])
as the traffic on the shared broadcast link due to the serverโs messages, such that all the caches
successfully recover the files they requested. We express the rate in terms of the equivalent total
number of files that must be transferred on the shared link. So, a rate of R files is equivalent to
R ร F bits.
To construct file dk , cache k needs to receive VSdk for all S โ K\{k}. The server, delivers
these bits to the caches through the coded delivery messages given by Algorithm 1 proposed
in [1]. Notice that the delivery method for the centralized caching in [2] is a special case of
Algorithm 1.
n
Note that if file n is requested by multiple users, including user k, Algorithm 1 embeds VS\{k}
into several messages. If s > 1, user k has the side information to decode only one of those
messages. As a result, the server needs to send all the messages with s > 1, even though the
8
Algorithm 1 Delivery algorithm of [1]
Require: {VSn }n=1,...,N, SโK
# From the placement phase
Procedure Delivery(d1 , ..., dK )
for s = K, K โ 1, ..., 1 do
for S โ K : |S| = s do
dk
server sends โkโS VS\{k}
end for
end for
demand vector is redundant. This is not the case for the messages with s = 1, i.e., S = {k}. In
dk
these cases, โkโS VS\{k}
= Vโ
dk . Such uncoded messages deliver the bits that are not stored at
any cache in the system. All the users that request file n can decode Vโ
n , so it needs to be sent
only once. As a result, the traffic due to the uncoded messages is Lx0 instead of Kx0 . Thus,
the total delivery rate will be
Lx0 +
Kโ1
X
s=1
K
xs .
s+1
Note that when L = K, substitution of (2) and (3) in (4) gives
M
1
K 1โ
N 1+KM
N
as the peak rate of the centralized caching scheme [2], and
M (1 โ (1 โ M/N ))K
K 1โ
N
KM/N
(4)
(5)
(6)
as the peak rate of the decentralized caching scheme [1]. From (4), one notes that for the
redundant demand vectors, the actual rate of Algorithm 1 is smaller than (5) and (6) for the
centralized and decentralized caching schemes, respectively. This observation is the basis of our
analysis in Sec. IV.
9
III. O PTIMALITY OF THE C ENTRALIZED P LACEMENT WITH DELIVERY BASED ON
A LGORITHM 1
As was formerly discussed, we use either of the methods in [1] or [2] for the placement phase
of our caching scheme. In this section, we show that the centralized placement scheme of [2]
is the optimal placement to minimize the peak rate of delivery Algorithm 1. We also generalize
the application of the centralized placement to the cases that t = KM/N is not an integer.
The optimal placement is characterized by the optimal parameters xs that lead to the smallest
peak delivery rate of Algorithm 1. Based on (4), the peak rate minimization problem can be
formulated as
Kโ1
X
K
minimize
xs
xs
s+1
s=0
K
X
K
subject to
xs = 1
s
s=0
K
X
K โ1
M
xs โค
sโ1
N
s=1
(7)
xs โฅ 0, s = 0, 1, ..., K.
The first constraint in (7) ensures that the resulting subsets partition the bits of each file. It also
guarantees that xs โค 1. The second constraint represents the storage capacity constraint. The
objective function of (7) is the the worst-case delivery rate of Algorithm 1. We now present the
analytical solution of (7) in Proposition 1.
Proposition 1 (Optimal Placement for the Worst-Case Demand): Let t = K M
. The solution
N
of (7) is
xโs =
๏ฃฑ
๏ฃด
๏ฃด
๏ฃฒ1/
๏ฃด
๏ฃด
๏ฃณ0,
K
t
,
s=t
(8a)
otherwise
10
M/N
xโ0
xโ1
xโ2
xโ3
xโ4
xโ5
t = KM/N
0.1
0.5
0.1
0
0
0
0
0.5
0.2
0
0.2
0
0
0
0
1
0.3
0
0.1
0.05
0
0
0
1.5
0.5
0
0
0.05
0.05
0
0
2.5
0.8
0
0
0
0
0.2
0
4
0.9
0
0
0
0
0.1
0.5
4.5
TABLE I. Optimal file placement parameters for K = 5.
if t is an integer, and is
xโs =
๏ฃฑ
๏ฃด
๏ฃด
๏ฃด(dte โ t)/
๏ฃด
๏ฃด
๏ฃด
๏ฃฒ
(t โ btc)/
๏ฃด
๏ฃด
๏ฃด
๏ฃด
๏ฃด
๏ฃด
๏ฃณ0,
K
btc
,
s = btc
K
dte
,
s = dte
(8b)
otherwise
if t is not an integer. btc and dte denote the largest integer smaller than t and the smallest integer
larger than t, respectively.
Proof. See Appendix A.
Proposition 1 shows that the centralized placement of [2] is optimal for Algorithm 1 when t is
an integer. Further, it generalizes the centralized placement scheme to the caching systems with
non-integer t. Table I shows the optimal placement parameters for a system of K = 5 caches and
a library of N = 1000 files for various storage capacities. Note that two xโs values are non-zero
when t is non-integer.
IV. A DAPTIVE C ACHING S CHEME
We now design an adaptive delivery method that benefits from the redundancies in the user
requests without changing the cache content. Further, we derive a lower bound on the delivery
rate of the redundant demand vectors.
11
A. Adaptive Delivery Method
For the adaptive method, we introduce an extra step to the delivery phase, which takes place
after receiving each request vector and before the transmission of the server messages to the
users. In this step, the server decides whether to send each part of the requested files through
the corresponding coded message in Algorithm 1 or through an uncoded message. The use of
uncoded messages instead of coded messages to deliver file n is equivalent to transferring bits
from VSn : s > 0 to Vโ
n . Notice that by such a transfer, the cache only ignores parts of its content
and it does not change the actual placement of files.
Let VฬSn represent the subset of the bits of file n exclusively cached at S after the transfer is
done, and
ySn , |VฬSn |/F.
(9)
In our delivery method, the server first optimizes ySn . Then, it arbitrarily picks ySn F bits of VSn
to form VฬSn , and adds the rest of the bits to Vฬโ
n . Finally, it uses Algorithm 1 for delivery based
on the resulting subsets VฬSn instead of VSn .
We now find the optimal lengths of the updated partition sets VฬSn to minimize the sum of
dk
the lengths of messages โkโS VฬS\{k}
over all the subsets S โ K. Assume that the caches have
requested L โค K distinct files in the current demand vector. Denote by D, the set of the distinct
files requested in the current demand vector. Note that |D| = L, and both D and L evolve with
time. For a fixed demand vector (the current demand vector), the rate minimization problem is
given by
minimize
d
ySk
subject to
X
S:SโK
X
dk
max yS\{k}
kโS
ySdk = 1,
โ dk โ D
(10)
S:SโK
0 โค ySdk โค x|S| ,
โ dk โ D, โS โ K : |S| > 0
0 โค yโ
dk โค 1,
โ dk โ D.
12
In (10), x|S| = |VSn | are known from the placement phase, and are given by (3) and (8) for
dk
is the length of the
the decentralized and centralized placements, respectively. maxkโS yS\{k}
dk
. Thus, the objective function is the rate of Algorithm 1 operating based on
message โkโS VฬS\{k}
the adjusted subsets VฬSn . Similar to (7), the equality constraint of (10) is the partition constraint.
Also, the constraints on the ranges of the parameters let the server to use uncoded messages
instead of coded messages, but not vice versa.
Problem (10) can be posed as a linear programming problem by the standard technique of
defining ancillary variables
dk
zS = max yS\{k}
(11)
kโS
and adding the extra constraints
dk
dk
,
, zS โค โyS\{k}
zS โฅ yS\{k}
kโS
(12)
for all S โ K : |S| > 0 [14, Sec. 4.3]. The resulting linear programming problem can be solved
numerically for ySโdk . Algorithm 2 shows the adaptive delivery scheme.
B. Simplified Adaptive Delivery
A simplified version of the message selection step can be formulated by only taking the
number of distinct requests L into account, and ignoring the redundancy pattern of the demand
vector. Then, because of the symmetry, we set ySn = ys for all n and all S : |S| = s. This leads
to
minimize
ys
Ly0 +
Kโ1
X
s=1
K
ys
s+1
K
X
K
subject to
ys = 1
s
s=0
0 โค ys โค xs , s = 1, ..., K
0 โค y0 โค 1
as the simplified message selection problem.
(13)
13
Algorithm 2 Original Adaptive Delivery Algorithm
Require: {VSn }n=1,...,N, ,SโK
1:
# From the placement phase
Procedure AdaptiveDelivery(d1 , ..., dK )
# Message Selection Step
2:
D โ unique(d1 , ..., dK ) # set of distinct files requested
3:
{ySโ dk }dk โD,SโK โ Solution of Problem (10)
4:
for dk โ D do
5:
Vฬโ
dk โ โ
6:
for S โ K do
# initialization of Vฬโ
dk
7:
VฬSdk โ {first ySโ dk F bits of VSdk }
8:
Vฬโ
dk โ Vฬโ
dk โช { last (1 โ ySโ dk )F bits of VSdk }
9:
10:
end for
end for
# Message Construction Step
11:
12:
13:
14:
15:
for s = K, K โ 1, ..., 1 do
for S โ K : |S| = s do
dk
server sends โkโS VฬS\{k}
end for
end for
c. Optimal parameters for the simplified message selection
Proposition 2: Let sฬ = b KโL
L+1
problem of (13) are given by
ysโ =
๏ฃฑ
P
๏ฃด
๏ฃด
๏ฃด
๏ฃด
i=1,...,sฬ
๏ฃด
๏ฃด
๏ฃฒ
0,
๏ฃด
๏ฃด
๏ฃด
๏ฃด
๏ฃด
๏ฃด
๏ฃณx s ,
K
i
xi ,
s=0
s = 1, ..., sฬ
.
(14)
s = sฬ + 1, ..., K
Proof: If we transfer bits from the subsets VSn : |S| = s to Vโ
n , the resulting change in the rate
14
will be L
K
s
xs โ
K
s+1
xs . We transfer the bits only if this difference is negative. This is the
case when s โค sฬ. This results to the parameters of (14).
Algorithm 3 shows the simplified adaptive delivery scheme.
Algorithm 3 Simplified Adaptive Delivery Algorithm
Require: {VSn }n=1,...,N, SโK
1:
# From the placement phase
Procedure SimplifiedAdaptiveDelivery(d1 , ..., dK )
# Message Selection Step
2:
L = size(unique(d1 , ..., dK )) # number of distinct requests
3:
c
sฬ โ b KโL
L+1
4:
for dk โ D do
5:
Vฬโ
dk โ โชS:sโคsฬ VSdk # corresponds to the first rule of (14)
6:
for S โ K : |S| > 0 do
7:
8:
9:
10:
11:
12:
13:
if |S| โค sฬ then
Vฬโ
dk โ โ
# corresponds to the second rule of (14)
else
VฬSdk โ VSdk # corresponds to the third rule of (14)
end if
end for
end for
# Message Construction Step
14:
15:
16:
17:
18:
for s = K, K โ 1, ..., 1 do
for S โ K : |S| = s do
dk
server sends โkโS VฬS\{k}
end for
end for
15
C. Lower Bound
Let RLโ (M ) denote the smallest rate that is achievable for every possible demand vector with
L distinct requests. Proposition 3 gives a lower bound on RLโ (M ) based on a cutset bound
argument.
Proposition 3 (Cutset Bound): Assume that K caches request L โค K distinct files. Then,
RLโ (M ) must satisfy
RLโ (M )
โฅ
max
sโ{1,...,L}
s
sโ
M
bN/sc
.
(15)
Proof. See Appendix B.
V. N UMERICAL E XAMPLES AND S IMULATION R ESULTS
In this section, we investigate the performance of the proposed adaptive delivery method
through numerical examples and computer simulations.
A. Numerical Examples for Specific Demand Vectors
We first consider the performance of the adaptive methods for specific instances of the demand
vector. Fig. 2 shows the delivery rates of the non-adaptive delivery scheme of Algorithm 1,
the simplified and the original adaptive schemes, and the lower bound in Proposition 3, for a
network of K = 9 caches. The placement in all cases is identical and is accomplished through
the centralized scheme with the parameters in (8). Also, we calculate the rate of the non-adaptive
scheme by (4). In this example, we have considered four redundancy patterns for the demand
vector, all with L = 3 distinct file requests. As shown in Fig. 2, the rate of the non-adaptive
scheme, the simplified adaptive scheme and the lower bound only depend on L and not the
specific redundancy pattern. In contrast, the rate of the original adaptive method depends on the
redundancy pattern which has led to different rates for the different patterns.
In Fig. 2, we observe a considerable improvement in the delivery rate for
M
N
โค 0.25 when
the adaptive methods are used. Table II shows the reduction in the gap between the nonadaptive delivery rate and the lower bound when the adaptive schemes are used. At some storage
16
4
Non-Adaptive
Simplified Adaptive
Adaptive: (3,3,3)
Adaptive: (5,2,2)
Adaptive: (4,4,1)
Adaptive: (7,1,1)
Lower Bound
*
โฒ
3.5
โ
โ
* *โฒโโ
Rate (files)
โ
3โฒ
โ
โ
โ
*โฒ
โ
โฒ
โ
โ
*
โ
โ
โ
2.5
*โฒ
โ
โ
โ
*โฒโ
โ
โ
2
*โฒโ
โ
โ
โ
*โฒโโ
โ
1.5
1
0.5
0
0.05
0.1
0.15
0.2
0.25
0.3
0.35
q=M/N
Fig. 2. Comparison of the rate of different delivery schemes for a system with K = 9 caches. In all cases,
centralized placement is used and the users only request L = 3 distinct files. (k1 , k2 , k3 ) shows the number of users
requesting each file.
M/N
Delivery
Redundancy
Method
Pattern
0.025
0.1
0.15
0.2
Simplified Adaptive
All
49%
52%
37%
13%
Adaptive
(3, 3, 3)
49%
52%
37%
13%
Adaptive
(5, 2, 2)
61%
61%
45%
17%
Adaptive
(4, 4, 1)
66%
66%
51%
25%
Adaptive
(7, 1, 1)
78%
76%
64%
43%
TABLE II. Improvement of the performance gap to the lower bound in Fig. 2.
capacities, we observe 50% and 75% reduction in the gap for redundancy patterns (3, 3, 3) and
(7, 1, 1), respectively. Also, we notice that for the symmetric redundancy pattern (3, 3, 3), both
adaptive methods led to the same delivery rate. As the redundancy pattern gets more asymmetric,
the gap between the rate of the original and the simplified adaptive methods increases. Further, we
observe that unlike the adaptive schemes, the delivery rate of the non-adaptive method increases
17
4.5
โ
4โ
โฒ
โ
*
*
Rate (files)
3โ
โฒ
*
โฒ
โฒ
โ
3.5
*
โ
*
โ
โฒ
*โฒ
Non-Adaptive
Simplified Adaptive
Adaptive
Lower Bound
โ
*
โ
โ
โฒ
*โฒ
*โฒ
L = 4: (3, 2, 2, 2)
L = 3: (4, 3, 2)
โ
*
โฒ
2.5
*โฒ
โ
*โฒ
2
โ
*โฒ
1.5
1
0.5
0
0.05
0.1
0.15
0.2
0.25
0.3
q = M/N
(a) Centralized Placement
4โ
โฒโ
โฒ
**
โ
*
โ
โฒ
3.5
โ
3โ
โฒโฒ
Rate (files)
**
โ
*โฒ
โฒ
โฒ
โ
*โฒ
โ
*โฒ
โ
*
โฒ
2.5
Non-Adaptive
Simplified Adaptive
Adaptive
Lower Bound
*
โ
*
โ
โ
โ
*โฒ
โ
*โฒ
โ
*โฒ
โ
*โฒ
2
L = 4: (3, 2, 2, 2)
L = 3: (4, 3, 2)
โ
โ
*โฒ
*โฒ
โ
*โฒ
*โฒ
1.5
โฒ
โ
*โฒ
*
1
0.5
0
0.05
0.1
0.15
0.2
0.25
0.3
0.35
0.4
โฒ
โ
*โฒ
0.45
0.5
q=M/N
(b) Decentralized Placement
Fig. 3. Comparison of the rate of different delivery schemes for a system with K = 9 caches.
18
4.5
โฒ
โ
*
4
Rate (files)
3.5
3โ
โ
โ
โ
*
โฒ
โ
*
โฒ
โ
*
โฒ
โ
*
โฒ
*
โฒ
โ
2.5
โ
*
โฒ
2
โฒ
*
โฒ
1.5
ยฐ
1โฒ
*
ยฐยฐ
0.5
โ
1
ยฐ
โ
*
โฒ
โ
โฒ
*
โฒ
โ
*
ยฐ
ยฐ
ยฐ
โฒ
โ
*
ยฐ
โฒ
โ
*
ยฐ
M/N = 0.1
M/N = 0.2
ยฐ
ยฐ
ยฐ
2
3
4
โ
*
โฒ
ยฐ
Non-adaptive
Simplified Adaptive
Adaptive (Average)
Lower Bound
5
6
7
ยฐ
8
L
(a) Centralized Placement
5.5
โฒ
โ
*
5
โฒ
โ
*
4.5
โฒ
โ
*
Rate (files)
4
โฒ
โ
*
3.5
โ
*
โฒ
โ
3
2.5
โ
2
โ
โ
*
โฒ
โ
*
โฒ
โ
โ
โฒ
*
*
โฒ
โ
1.5
*
1โฒ
*
0.5
โฒ
โ
*
โฒ
โ
*
โ
*
โฒ
1
โฒ
2
3
4
5
โฒ
โ
*
โฒ
โ
*
M/N = 0.1
M/N = 0.2
Non-adaptive
Simplified Adaptive
Adaptive (Average)
Lower Bound
6
7
8
L
(b) Decentralized Placement
Fig. 4. The effect of the number of distinct files requested on the delivery rate. Here K = 8 and N = 103 .
with the storage capacity for small M/N . This shows the inefficiency of Algorithm 1 to deliver
the redundant requests.
Fig. 3 compares the performance of the delivery methods for two different redundancy levels
19
L = 3 and L = 4. The results are shown in Figs. 3a and 3b for the cases where the centralized
and decentralized placement schemes are used, respectively. For L = 4, the rate is improved only
by the original adaptive method. In general, the simplified method requires higher redundancy
levels (smaller L) compared to the original adaptive method, to be able to improve the rate.
This fact is shown in Fig. 4, where the delivery rates are plotted versus L. For the original
adaptive method, the delivery rate is averaged over all the redundancy patterns with L distinct
requests. One notices that the reduction in the delivery rate of the non-adaptive method is more
considerable for smaller M/N . This is because when M/N is small, a large number of bits are
in Vโ
n subsets and need to be delivered through uncoded messages. Based on Algorithm 1, the
number of uncoded messages decreases by decreasing L. So, the reduction in the rate is larger
when M/N is small.
B. Simulation of the Network Dynamics
We now investigate the average rates of the different delivery methods through a stochastic
modeling of the dynamics of a caching network. Consider a graph representation of the network
where vertices represent the caches. An (undirected) edge between two vertices shows that the
requests of the corresponding caches are correlated.
To model the correlation between the requests, we assume that each cache k requests a
file, either based on its neighbours previous requests with probability r or independently with
probability 1 โ r. In the former case, k chooses a file from the set of the last files requested
by its neighbours uniformly at random. However, when choosing independently, cache k picks
a file n from the library of N files based on the popularity distribution of the files pn . In our
simulations, we mainly use uniform popularity distribution, as it is the focus of this paper.
We also consider a scenario where the file popularities are assumed to be uniform during the
placement phase, but the actual demands in the delivery phase follow a non-uniform distribution.
We use Zipf distribution with parameter ฮธ to model the non-uniform file popularities. This gives
20
r = 0.7
r = 0.9
r = 0.9
ฮธ=0
ฮธ=0
ฮธ = 0.75
Maximum ฯij
0.19
0.34
0.34
Average ฯij
0.16
0.32
0.31
Average L
4.80
3.41
3.18
TABLE III. Empirical correlation coefficients and the resulting number of distinct files per demand vector for
the simulations in Fig. 5. ฯij is the correlation coefficient between the requests of caches i and j, i 6= j.
pn =
(1/n)ฮธ
PN
ฮธ
m=1 (1/m)
[15]. The larger ฮธ is, the more non-uniform is the popularity distribution.
Typical values of ฮธ are between 0.5 and 2 [7]. ฮธ = 0 corresponds to uniform distribution.
The model described above completely determines the conditional probabilities of the usersโ
requests. The chance of requesting file n by cache k can be written as
๏ฃฑ
๏ฃด
๏ฃด
๏ฃฒ |N 1(k)| r + pn (1 โ r), n โ N (k)
pฬn,k =
๏ฃด
๏ฃด
๏ฃณpn (1 โ r),
otherwise
(16)
where N (k) is the set of the last files requested by the neighbour caches. We use Gibbs sampling
[12, Sec. 24.2], [13, Sec. 3] to generate sample vectors from the joint distribution of the user
demands based on the network graph and (16). In our simulations, we set K = 8 and N = 103 .
We assume a complete graph for the network, i.e., each vertex is of degree K โ 1. We use r to
control the dependency level of the usersโ requests. We also control the popularity distribution
by ฮธ. To use Gibbs sampling, we need to give the underlying Markov chain enough burn-in
time to reach its stationary distribution. We use the estimated potential scale reduction (ESPR)
convergence criterion in [12, Sec. 24.4.3.1] with 5 chains, to determine the burn-in time required.
Ignoring the first 150 sample vectors, i.e., 8 ร 150 samples, suffices to get |ESPR โ 1| โค 0.01,
which shows that the stationary distribution is reached. We use 103 sample vectors after the
burn-in time to evaluate the average rate of the different delivery schemes. Table III presents
more details about the correlation coefficients and the redundancy levels obtained empirically
for each simulation.
21
5
โฒ
โ
*
4.5
ยฐ
Average Rate (files)
3
*
โฒ
ยฐ
4
3.5
โ
โ
โฒ
*
โฒ
โ
*ยฐ
โฒ
โ
*
ยฐ
ยฐ
โ
*
โฒ
*
โฒ
*
ยฐ
ยฐ
โฒ
*
r = 0.7, ฮธ = 0
r = 0.9, ฮธ = 0
r = 0.9, ฮธ = 0.75
โ
โ
โ
โ
โฒ
*
โ
โฒ
*
โฒ
*
ยฐ
โ
*
*
โฒ
โฒ
โฒ
*
ยฐยฐ
2.5
Non-Adaptive
Simplified Adaptive
Adaptive
Lower Bound
*
โฒ
โฒ
โ
โฒ
*
โฒ
*
โฒ
ยฐยฐ
2
โฒ
โ
โฒ
*
1.5
ยฐ
ยฐ
1
0.5
0
0.05
0.1
0.15
0.2
ยฐ
0.25
โฒ
โ
โฒ
*
ยฐ
0.3
M/N
Fig. 5. Performance of the different delivery schemes in terms of their avergae delivery rates. Here, K = 8,
N = 1000 and the central placement is used.
Fig. 5 shows the resulting average delivery rates. It also shows a lower bound on the average rate
that is calculated by taking the average of the lower bounds of (15) for the sample demand vectors
used. We observe that as requests become more correlated (larger r) and the file popularities get
more non-uniform (larger ฮธ), the adaptive method makes larger improvements in the rate. Also,
the adaptive schemes are effective in decreasing the average delivery rate for M/N < 0.25. The
improvement in the performance gap to the lower bound is shown in Table IV.
VI. C ONCLUSION
We proposed a new delivery scheme for caching networks that exploits the redundancies in
the usersโ demand vector to reduce the delivery traffic. The proposed scheme allows the server
to decide between the use of coded messages of [1] or uncoded messages for the delivery of
each part of the files requested. This choice is made based on the redundancy pattern of the
requests in the current demand vector. The serverโs decision making process is formulated as
a linear programming problem which must be solved numerically. To facilitate the decision
22
a) M/N = 0.075
r = 0.7
r = 0.9
r = 0.9
Delivery Method
ฮธ=0
ฮธ=0
ฮธ = 0.75
Adaptive
14%
41%
47%
Simplified Adaptive
5%
28%
36%
b) M/N = 0.125
r = 0.7
r = 0.9
r = 0.9
Delivery Method
ฮธ=0
ฮธ=0
ฮธ = 0.75
Adaptive
16%
41%
48%
Simplified Adaptive
5%
28%
36%
TABLE IV. Improvement in the performance gap to the lower bound in Fig. 5.
making process, a simplified decision rule is also derived analytically. Further, we derived a
lower bound on the delivery rate of redundant demands based on a cutset bound argument.
The proposed adaptive schemes are shown to significantly improve the delivery rate through
several numerical examples. They decreased the performance gap of the non-adaptive method to
the lower bound by up to 80% for highly redundant demand vectors. We also investigated the
dynamics of a caching network through Markov chain Monte-Carlo simulations and reported the
average delivery rate of the adaptive schemes. The adaptive methods considerably outperform
the non-adaptive methods in terms of the resulting average delivery rates when M/N < 0.25. We
also generalized the application of the centralized placement scheme of [2] to caching networks
with non-integer KM/N .
A PPENDIX A
P ROOF OF P ROPOSITION 1
Proof: By the Karush-Kuhn-Tucker (KKT) conditions [14, Sec. 5.5.3] for optimization problem
(7), we get
K
K โ1 0
K
โ ฮปs +
ฮป +ฮฝ
= 0, s = 0, ..., K
s+1
sโ1
s
(17)
23
where ฮปs โฅ 0 is the Lagrange multiplier for the inequality constraint xs โฅ 0, and ฮป0 โฅ 0 and
ฮฝ are the Lagrange multipliers for the capacity inequality constraint and the partition equality
constraint, respectively.
KKT conditions require ฮปs xโs = 0. As a result, xโs > 0 requires ฮปs = 0. From (17), we can
have ฮปs = 0 for at most two s indices. This is because ฮป0 and ฮฝ provide only two degrees of
0
K
K
freedom to set s+1
+ Kโ1
ฮป
+
ฮฝ
= 0 and the coefficient matrix given by these linear
sโ1
s
equations is rank 2. As a result, we have either one or two xโs values greater than zero. We
consider each case separately.
First, assume that only xโs0 is non-zero. Then, the equality constraint and the capacity constraint
require xโs0 = 1/ sK0 and s0 = K M
, respectively. If t = K M
is an integer, the optimal solution
N
N
is achieved, as is given by (8a). Otherwise, not all the storage capacity is used and the solution
is not optimal, i.e., the optimal solution has more than one non-zero xโs . So, as the second case,
let xโs > 0 for exactly two values of s, namely s1 and s2 > s1 . From the storage and partition
constraints we get
Kโ1
K
โ s2
M/N
s2 โ1
Kโ1
K Kโ1
K
โ s1
s2 s1 โ1
s2โ1
Kโ1
K
โ
M/N
s1 โ1 s1 K Kโ1 .
K Kโ1
โ s1 s2โ1
s2 s1 โ1
xโs1 =
xโs2 =
(18a)
(18b)
Since xโs1 , xโs2 > 0, (18) requires
s1 โค K
Given (18), the objective function
K
s1 +1
M
,
N
xโs1 +
K โ (K + 1)
s2 โฅ K
K
s2 +1
M
.
N
(19)
xโs2 simplifies to
KM/N + s1 s2
.
(s1 + 1)(s2 + 1)
(20)
The function in (20) is decreasing in s1 and increasing in s2 in the region specified by (19).
Therefore, to minimize the objective function, s1 must take its largest value bK M
c, and s2 must
N
take its smallest value dK M
e. Substitution of these values in (18) gives the optimal parameters
N
in (8b). This completes the proof of Proposition 1.
24
A PPENDIX B
P ROOF OF P ROPOSITION 3
Proof: We modify the cutset bound argument of [2, Sec. VI] to bound the minimum delivery
rate of the demand vectors with L โค K distinct requests.
Let S be a subset of caches with |S| = s, such that there are no two caches in S with identical
user requests. Assume that these caches have requested files 1, ... , s from the library of N files.
Let X1 denote the serverโs input to the shared link which determines files 1, .., s. Similarly,
assume that the same users request files (i โ 1)s + 1, ..., is and the server input Xi determines
the files requested. Let i = 1, ..., bN/sc.
Consider the cut separating X1 , ..., XbN/sc and the caches in S from the corresponding users
(see Fig. 6). Since we assume that the coded caching scheme works and all files are perfectly
decoded, the total information available to the users in the cut should be more than or equal to
the total information requested by them. In other words,
bN/scRLโ (M ) + sM โฅ sbN/sc.
Since s can accept any value between 1 and L, (15) results.
R EFERENCES
[1] M. A. Maddah-Ali and U. Niesen, โDecentralized coded caching attains order-optimal memory-rate tradeoff,โ IEEE/ACM
Trans. Networking, vol. 23, pp. 1029โ1040, Aug. 2015.
[2] M. A. Maddah-Ali and U. Niesen, โFundamental limits of caching,โ IEEE Trans. Inf. Theory, vol. 60, pp. 2856โ2867,
May 2014.
[3] E. Bastug, M. Bennis, and M. Debbah, โLiving on the edge: The role of proactive caching in 5G wireless networks,โ IEEE
Commun. Mag., vol. 52, pp. 82โ89, Aug. 2014.
[4] K. Shanmugam, N. Golrezaei, A. G. Dimakis, A. F. Molisch, and G. Caire, โFemtocaching: Wireless content delivery
through distributed caching helpers,โ IEEE Trans. Inf. Theory, vol. 59, pp. 8402โ8413, Dec. 2013.
[5] M. Ji, A. M. Tulino, J. Llorca, and G. Caire, โOn the average performance of caching and coded multicasting with random
demands,โ in Proc. 11th International Symposium on Wireless Communications Systems (ISWCS), pp. 922โ926, Aug. 2014.
[6] J. Hachem, N. Karamchandani, and S. Diggavi, โContent caching and delivery over heterogeneous wireless networks,โ in
IEEE Conference on Computer Communications (INFOCOM), pp. 756โ764, Apr. 2015.
25
Server
X1
X2
ยทยทยท
XbN/sc
cache
cache
cache
cache
cache
1
2
3
4
5
Fig. 6. An example of a cutset separating the caches and the server from the users of the caches in S = {1, 2, 4}.
Solid (dashed) lines represent the information flow to the users selected (not selected) in the cutset. Here s = 3
and there are b Ns c server messages. Users with the same color have identical requests. Notice that no two users
with the same request are picked in S. Here K = 5.
[7] U. Niesen and M. A. Maddah-Ali, โCoded caching with nonuniform demands,โ in IEEE Conference on Computer
Communications Workshops (INFOCOM WKSHPS), pp. 221โ226, Apr. 2014.
[8] J. Zhang, X. Lin, and X. Wang, โCoded caching under arbitrary popularity distributions,โ in Proc. Information Theory and
Applications Workshop (ITA), Feb. 2015.
[9] R. Pedarsani, M. A. Maddah-Ali, and U. Niesen, โOnline coded caching,โ in Proc. IEEE Int. Conf. Communications,
pp. 1878โ1883, June 2014.
[10] J. Hachem, N. Karamchandani, and S. N. Diggavi, โEffect of number of users in multi-level coded caching,โ in Proc.
IEEE Int. Symp. Information Theory, pp. 1701โ1705, June 2015.
[11] N. Karamchandani, U. Niesen, M. A. Maddah-Ali, and S. Diggavi, โHierarchical coded caching,โ in Proc. IEEE Int. Symp.
Information Theory, pp. 2142โ2146, June 2014.
[12] K. P. Murphy, Machine Learning: A Probabilistic Perspective. The MIT Press, 2012.
[13] A. Fischer and C. Igel, โAn introduction to restricted Boltzmann machines,โ in Progress in Pattern Recognition, Image
Analysis, Computer Vision, and Applications, pp. 14โ36, Springer, 2012.
[14] S. Boyd and L. Vandenberghe, Convex Optimization. New York, NY, USA: Cambridge University Press, 2004.
[15] L. Breslau, P. Cao, L. Fan, G. Phillips, and S. Shenker, โWeb caching and Zipf-like distributions: evidence and implications,โ
in IEEE Conference on Computer Communications (INFOCOM), pp. 126โ134, Mar. 1999.
| 7cs.IT
|
1
A High-Gain Nonlinear Observer
with Limited Gain Power
arXiv:1501.04330v3 [cs.SY] 7 Oct 2016
Daniele Astolfi and Lorenzo Marconi
AbstractโIn this note we deal with a new observer for
nonlinear systems of dimension n in canonical observability form.
We follow the standard high-gain paradigm, but instead of having
an observer of dimension n with a gain that grows up to power
n, we design an observer of dimension 2n โ 2 with a gain that
grows up only to power 2.
ฮฝ(t) โก 0, estimating the state x can be addressed by means
of a high-gain nonlinear observer of the form
Index TermsโObservability, nonlinear observers, high-gain
observers.
Dn (โ) = diag โ , . . . , โn ,
I. I NTRODUCTION
In this note we consider the problem of state observation
for nonlinear systems of the form
ยฏ ,
zฬ = f (z) + d(t)
y = h(z) + ฮฝ(t)
(1)
where z โ Z โ Rn is the state, y โ R is the measured output,
ยฏ โ Rn is
f (ยท) and h(ยท) are sufficiently smooth functions, d(t)
a bounded disturbance and ฮฝ โ R is the measurement noise.
Among the different techniques for observer design available
in literature (see [12], [6]) we are particularly interested to the
so-called high-gain methods that have been shown to be effective in many control scenarios. In this respect we assume that
the pair (f (ยท), h(ยท)) fulfils an uniform observability assumption
(see Definition 1.2 in [12]), which implies the existence of a
diffeomorphism ฯ : Z โ Rn such that the dynamic of the
new state variable x = ฯ(z) is described by the canonical
observability form (see Theorem 4.1 in [12])
xฬ = An x + Bn ฯ(x) + d(x, t) ,
y = Cn x + ฮฝ(t) ,
(2)
where ฯ(ยท) is a locally Lipschitz function,
d(x, t) :=
dฯ(z)
dz
ยฏ ,
d(t)
z=ฯinv (x)
with ฯinv (ยท) the inverse of ฯ(ยท) (namely ฯinv โฆ ฯ(z) = z for
all z โ Z), and (An , Bn , Cn ) is a triplet in โprime formโ of
dimension n, that is
0(nโ1)ร1
0(nโ1)ร1
Inโ1
, Bn =
An =
,
0
01ร(nโ1)
1
1 01ร(nโ1) .
Cn =
(3)
System (2) is defined on a set X := ฯ(Z) โ Rn .
For the class of systems (2), it is a well-known fact ([7])
that the problem of asymptotically, in case d(x, t) โก 0 and
D. Astolfi is with CASY-DEI, University of Bologna, Italy and
with MINES ParisTech, PSL Research University, CAS, Paris, France,
([email protected]).
L. Marconi is with the CASY-DEI, University of Bologna, Italy,
([email protected]).
Work supported by the European project SHERPA (ICT 600958).
xฬห = An xฬ + Bn ฯs (xฬ) + Dn (โ) Kn (Cn xฬ โ y)
(4)
with
Kn =
c1 ยท ยท ยท cn
โค
,
where โ is a high-gain design parameter taken sufficiently large
(i.e. โ โฅ โโ with โโ โฅ 1), the ci โs are chosen so that the matrix
(A + KC) is Hurwitz (i.e. all its eigenvalues are on the lefthalf complex plane), and ฯs (ยท) : Rn โ R is an appropriate
โsaturatedโ version of ฯ(ยท). As a matter of fact, it can be
proved that if d(x, t) โก 0 and ฮฝ(t) โก 0, if ฯ(ยท) is uniformly
Lipschitz in X , namely there exists a ฯฬ > 0 such that
kฯ(xโฒ ) โ ฯ(xโฒโฒ )k โค ฯฬkxโฒ โ xโฒโฒ k โ xโฒ , xโฒโฒ โ X ,
(5)
and ฯs (ยท) is chosen bounded and to agree with ฯ(ยท) on X , the
observation error e(t) = x(t) โ xฬ(t) originating from (2) and
(4) exponentially converges to the origin with an exponential
decay rate of the form
kx(t) โ xฬ(t)k โค ฮฑ โnโ1 exp(โฮฒโt)kx(0) โ xฬ(0)k ,
where ฮฑ and ฮฒ are positive constants, for all possible initial
condition xฬ(0) โ Rn as long as x(t) โ X . In particular, note
that the exponential decay rate may be arbitrarily assigned by
the value of โ with a polynomial โpeakingโ in โ of order nโ1.
It is worth noting that the uniform Lipschitz condition (5) is
automatically fulfilled if X is a compact set. In case d(x, t)
or ฮฝ(t) are not identically zero, as long as they are bounded
for all t โฅ 0 and for all1 x โ X , the observer (4) guarantees
a bound on the estimation error that depends on the bound of
d(ยท, ยท), of ฮฝ(ยท) and on the value of โ. In particular, the following
asymptotic bounds can be proved
lim sup kx(t) โ xฬ(t)k โค
1
ฮณ max lim sup k ฮ(โ) d(x(t), t)k , lim sup kโnโ1 ฮฝ(t)k
tโโ
tโโ
โ
tโโ
where ฮณ is a positive constant and
ฮ(โ) = diag(โnโ1 , . . . , โ, 1) .
(6)
As above the previous asymptotic bound holds for all possible
xฬ(0) โ Rn as long as x(t) โ X . Note that a high value of
โ leads to an arbitrarily small asymptotic gain on the n-th
component of the disturbance d(ยท, ยท). On the other hand, a
1 boundedness of d(x, t) is automatically guaranteed if X is compact. This,
in turn, is the typical case when such observers are used in semiglobal output
feedback stabilisation problems, [17].
2
large value of โ is, in general, detrimental for the sensitivity
of the asymptotic estimate to the sensor noise and to the first
n โ 2 disturbance components.
Observers of the form (4) are routinely used in many
observation and control problems. For instance, the feature
of having an exponential decay rate and an asymptotic bound
on the last component of d that can be arbitrarily imposed
by the value of โ is the main reason why the above observer
plays a fundamental role in output feedback stabilisation and
in setting up semiglobal nonlinear separation principles ([17],
[4]). In that case the set X is an arbitrarily large compact set
which is made invariant by the design of the state feedback
stabilisation law and of the high-gain observer. We observe
that, although the asymptotic gain with respect to ฮฝ increase
with โnโ1 , the observer is anyway able to guarantee ISS with
respect to the sensor noise ([14]).
The main drawback of observers of the form (4), though,
is related to the increasing power (up to the order n) of the
high-gain parameter โ, which makes the practical numerical
implementation an hard task when n or โ are very large.
Motivated by these considerations, in this note we propose
a new observer for the class of systems (2) that preserves
the same high-gain features of (4) but which substantially
overtakes the implementation problems due to the high-gain
powered up to the order n. Specifically, we present a highgain observer structure with a gain which grows only up to
power 2 (instead of n), at the price of having the observer
state dimension 2n โ 2 instead of n.
II. M AIN R ESULT
We start by presenting a technical lemma instrumental to
the proof of the main result presented in Proposition 1. Let
Ei โ R2ร2 , Qi โ R2ร2 , i = 1, . . . , n โ 1, and N โ R2ร2 be
matrices defined as
โki1 1
0 0
0 ki1
Ei =
, N=
, Qi =
โki2 0
0 ki2
0 1
where (ki1 , ki2 ) are positive coefficients, and let M โ
R(2nโ2)ร(2nโ2) be the block-tridiagonal matrix defined as
๏ฃซ
๏ฃถ
E1 N
0
...
...
0
..
๏ฃฌ
๏ฃท
..
๏ฃฌ Q2 E2 N
๏ฃท
.
.
๏ฃฌ
๏ฃท
๏ฃฌ
๏ฃท
.
.
.
.
.
..
..
..
..
..
๏ฃฌ 0
๏ฃท
๏ฃฌ
๏ฃท
๏ฃฌ ..
๏ฃท
..
..
..
M = ๏ฃฌ .
๏ฃท .
.
.
Q
E
N
.
i
i
๏ฃฌ
๏ฃท
๏ฃฌ .
๏ฃท
.
.
.
.
..
..
..
..
๏ฃฌ ..
0 ๏ฃท
๏ฃฌ
๏ฃท
๏ฃฌ .
๏ฃท
..
๏ฃญ ..
. Qnโ2 Enโ2
N ๏ฃธ
0 ... ... ...
0
Qnโ1 Enโ1
(7)
It turns out that the eigenvalues of M can be arbitrarily
assigned by appropriately choosing the coefficients (ki1 , ki2 ),
i = 1, . . . , n โ 1, as claimed in the next lemma.
Lemma 1 Let P(ฮป) = ฮป2nโ2 + m1 ฮป2nโ3 + ... + m2nโ3 ฮป +
m2nโ2 be an arbitrary Hurwitz polynomial. There exists a
choice of (ki1 , ki2 ), i = 1, . . . , n โ 1, such that the characteristic polynomial of M coincides with P(ฮป).
The proof of this Lemma is deferred to the appendix where a
constructive procedure for designing (ki1 , ki2 ) given P(ฮป) is
presented.
The structure of the proposed observer has the following form
ฮพหi = A ฮพi + N ฮพi+1 + D2 (โ) Ki ei
i = 1, . . . , nโ2
..
.
ฮพหnโ1 = A ฮพnโ1 + B ฯs (xฬโฒ ) + D2 (โ) K(nโ1) enโ1
(8)
where (A, B, C) is a triplet in prime form of dimension 2,
T
ฮพi โ R2 , Ki = (ki1 ki2 ) , D2 (โ) = diag(โ, โ2 ),
xฬโฒ = L1 ฮพ
L1 = blkdiag ( C, . . . , C , I2 )
| {z }
(nโ2) times
ฮพ = col(ฮพ1 , . . . , ฮพnโ1 ) โ R2nโ2 ,
e1 = y โ Cฮพ1 ,
ei = B T ฮพiโ1 โ Cฮพi
i = 2, . . . , n โ 1 ,
and ฯs (ยท) is an appropriate saturated version of ฯ(ยท).
The variable xฬโฒ represents an asymptotic estimate of the
state x of (2). It is obtained by โextractingโ n components
from the state ฮพ according to the matrix L1 defined above. As
clarified next, the redundancy of the observer can be used to
extract from ฮพ an extra state estimation that is
xฬโฒโฒ = L2 ฮพ
L2 = blkdiag (I2 , B T , . . . , B T ) .
|
{z
}
(nโ2) times
The following proposition shows that the observer (8) recovers
the same asymptotic properties for the two estimates xฬโฒ and
xฬโฒโฒ of the โstandardโ high-gain observer (4). In the statement
of the proposition we let
xฬ = col(xฬโฒ , xฬโฒโฒ ) ,
x = col(x, x) .
Proposition 1 Consider system (2) and the observer (8) with
the coefficients (ki1 ki2 ) fixed so that the matrix M defined
in (7) is Hurwitz (see Lemma 1). Let ฯs (ยท) be any bounded
function that agrees with ฯ(ยท) on X , and assume that d(x, t)
is bounded for all x โ X and for all t โฅ 0. Then there exist
ci > 0, i = 1, . . . , 4, and โโ โฅ 1 such that for any โ โฅ โโ and
for any ฮพ(0) โ R2nโ2 , the following bound holds
kxฬ(t) โ x(t)k โค max{c1 โnโ1 exp(โc2 โ t) kxฬ(0) โ x(0)k ,
1
c3 k ฮ(โ) d(ยท)kโ , c4 โnโ1 k ฮฝ(ยท)kโ } (9)
โ
where ฮ(โ) is as in (6), for all t โฅ 0 such that x(t) โ X .
Proof:
Consider the change of variables
ฮพi 7โ ฮพฬi := ฮพi โ col (xi , xi+1 )
i = 1, . . . , n โ 1 ,
by which system (8) transforms as
ฮพหห1 = H1 ฮพห1 + N ฮพห2 โ dยฏ1 (t) + D2 (โ)K1 ฮฝ(t)
ฮพฬหi
ฮพหหnโ1
= Hi ฮพฬi + N ฮพหi+1 + D2 (โ) Ki B T ฮพฬiโ1 โ dยฏi (t)
i = 2, . . . , n โ 2
= Hnโ1 ฮพหnโ1 + D2 (โ) Knโ1 B T ฮพหnโ2 +
ห x) โ dยฏnโ1 (t)
B โฯ(ฮพ,
3
where
dยฏi (t) = (di (x(t), t), di+1 (x(t), t))T ,
Hi = AโD2 (โ) Ki C ,
for i = 1, . . . , n โ 1, with di (t) the i-th element of the vector
d(t), ฮพฬ = col(ฮพห1 , . . . , ฮพหnโ1 ), and
ห x) = ฯs (L1 ฮพห + x) โ ฯ(x) .
โฯ(ฮพ,
Rescale now the variables ฮพหi as follows
ฮพหi 7โ ฮตi := โ2โi D2 (โ)โ1 ฮพฬi
i = 1, . . . , n โ 1 .
By letting ฮต = col(ฮต1 . . . ฮตnโ1 ), an easy calculation shows
that
ฮตฬ = โM ฮต + โโ(nโ1) (B2nโ2 โฯโ (ฮต, x) + ฯ
โ (t) + nโ (t)) ,
(10)
where B2nโ2 is the zero column vector of dimension 2n โ 2
with a 1 in the last position, and
ฯ
โ (t) = โcol โn D2 (โ)โ1 dยฏ1 , . . . , โnโi+1 D2 (โ)โ1 dยฏi , . . . ,
โ2 D2 (โ)โ1 dยฏnโ1 ,
nโ (t) = โn Kฬ1 ฮฝ(t) ,
Kฬ1 = col(K1 , 0, . . . , 0) ,
and
โฯโ (ฮต, x) = ฯs (L1 S(โ)ฮต + x) โ ฯ(x) ,
where S(โ) = diag( 1โ , 1 , โ , . . . , โnโ3 ) โ D2 (โ). Being ฯ(ยท)
uniformly Lipschitz in X and ฯs (ยท) bounded, there exists a
ฮด1 > 0, ฮด2 > 0 and ฮด3 > 0 such that
kโโ(nโ1) โฯโ (ฮต, x)k
โค ฮด1 kฮตk ,
kโโ(nโ1) ฯ
โ (t)k
โค ฮด2 kโ Dn (โ)โ1 d(x(t), t)k ,
kโโ(nโ1) nโ (t)k
โค ฮด3 kโ ฮฝ(t)k ,
for all ฮต โ R2nโ2 , x โ X and โ โฅ 1. The rest of the
proof follows standard Lyapunov arguments that, for sake of
completeness, are briefly recalled. Let P = P T be such that
P M + M T P = โI and consider the Lyapunov function
V = ฮตT P ฮต. Taking derivative of V along the solutions of
(10), using the previous bounds and letting โโ = 4 ฮด1 kP k, one
obtains that there exist positive constants a1 , a2 , a3 such that
for any โ โฅ โโ
kฮตk โฅ max a1 kDn (โ)โ1 d(x(t), t)k, a2 kฮฝ(t)k
โ
Vฬ โค โa3 โ kฮตk2 .
As P is symmetric and definite positive, it turns out that
ฮปkฮตk2 โค V (ฮต) โค ฮปฬkฮตk2 where ฮป and ฮปฬ are respectively
the smallest and the highest eigenvalue of P . By using these
bounds, the previous implication leads to conclude that, as
long as
V โฅ ฮปฬ max a21 kDn (โ)โ1 d(x(t), t)k2 , a22 kฮฝ(t)k
exp(โ aฮปฬ3 โ t)V
(0). By using again the bound on
then V (t) โค
V in terms of ฮป and ฮปฬ, the following estimate on ฮต(t) can be
easily obtained
kฮต(t)k โค max{ a4 exp(โa5 โ t) kฮต(0)k ,
a6 kDn (โ)โ1 d(x(t), t)k , a7 kฮฝ(t)k}
p
p
where p
a4 =
ฮปฬ/ฮป, a5 = a3 /2ฮปฬ, a6 =
ฮปฬ/ฮป a1 ,
ฮปฬ/ฮป a2 . Now, using the fact that, for all โ > 1,
a7 =
ห โค kฮตk โค kฮพk,
ห the previous bound leads to the
โโ(nโ1) kฮพk
ห
following estimate on ฮพ(t)
ห
ห
kฮพ(t)k
โค max{ a4 โnโ1 exp(โa5 โ t) kฮพ(0)k
,
a6 โnโ1 kDn (โ)โ1 d(x(t), t)k , a7 โnโ1 kฮฝ(t)k}
by which the claim of the proposition immediately follows by
bearing in mind the definition of ฮ(โ), xฬ, x, and by noting
ห โค kxฬ โ xk โค 2kฮพk.
ห
that kฮพk
III. A BOUT
THE SENSITIVITY OF THE OBSERVER TO HIGH
FREQUENCY NOISE IN THE LINEAR CASE
The trade-off between the speed of the state estimation and
the sensitivity to measurement noise is a well-known fact in the
observer theory. In this respect, high-gain observers tuned to
obtain fast estimation dynamics are necessarily very sensitive
to high-frequency noise. Bounds on the estimation error in
presence of measurement noise for the standard high-gain
observers have been studied, for instance, in [18] and [5], and
different techniques have been developed in order to improve
rejection, mainly based on gain adaptation (see, among others,
[1], [16]).
In this section we compare the properties of the standard
high-gain observer (4) and the proposed observer (8) with
respect to high-frequency measurement noise by specialising
the analysis to linear systems.
In particular we consider systems of the form (2) with ฯ(ยท)
a linear function of the form ฯ(x) = ฮฆ x where ฮฆ is a row
vector of dimension n. Moreover, in this contest, we consider
d(t) โก 0 and
ฮฝ(t) = aN sin(ฯN t + fN )
(11)
where aN > 0, ฯN > 0, and fN are constants. It is shown
that the ratio between the asymptotic estimation error on
the i-th state variable provided by the new observer (8) and
the one provided by the standard observer (4) is a strictly
decreasing polynomial function of the noise frequency for
i = 2, . . . , n. In this regard the new observer has better
asymptotic properties with respect to high-frequency noise as
far as the state estimation variables are concerned (except for
the first one). This is formalised in the next proposition.
Proposition 2 Let n โฅ 1. Let Kn โ Rn , Ki โ R2 , i =
1, . . . , n โ 1 and โ โ R be fixed so that the error dynamics
of the observers (4) and (8) are Hurwitz. Moreover, with ฯ โ
{1, 2, . . . , n} denoting the position index of the first non zero
coefficient of the vector ฮฆ (and ฯ = n if ฮฆ is the zero vector),
let riโฒ โฅ 1 be the constants defined as
riโฒ = min { i , (n โ 1) , (ฯ + n โ i + 1)}
i = 1, . . . , n .
โ
โ
There exist ฯN
> 0 and cฬi > 0 such that for all ฯN > ฯN
,
aN > 0 and fN we have
lim sup |xฬโฒi (t) โ xi (t)|
tโ+โ
lim sup |xฬi (t) โ xi (t)|
tโ+โ
โ(riโฒ โ1)
โค cฬi ฯN
โ i = 1, . . . , n.
4
Proof: Consider system (2) and the standard high-gain
observer (4). By letting e = โ Dn (โ)โ1 (xฬโx), the e-dynamics
read as
(12)
eฬ = โ An + Kn Cn e + Bn ฮฆ ฮn (โ) e + โKn ฮฝ(t)
1
where ฮn (โ) = n Dn (โ) with Dn (โ) defined in (4). It is a
โ
linear system that is Hurwitz by the choices of Kn and โ.
Similarly, consider system (2) and the new observer (8). With
ฮต defined as in the proof of Proposition 1 we obtain system
(10) compactly rewritten as
ฮตฬ = โM ฮต + B2nโ2 ฮฆ ฮn (โ)L1 ฮต + โKฬ1 ฮฝ(t) .
(13)
It is an Hurwitz system by the choices of Ki , i = 1, . . . , nโ
1, and โ. We consider now the n systems given by the
dynamics (12) with input ฮฝ and with outputs
xฬi โ xi = โiโ1 ei ,
and we denote by Fiโฒ : R โ C, i = 1, . . . , n, the harmonic
transfer functions of these systems. Simple computations show
that these systems have relative degree riโฒ , for all i = 1, . . . , n,
with riโฒ defined in the statement of the proposition. By definition of harmonic transfer function and by the fact that systems
(12) and (13) are Hurwitz, it turns out that
=
|Fi (ฯN )| aN
๏ฃซ
โz
ฮฅ(z[0,3] ) = ๏ฃญโzฬ
โzฬ
tโ+โ
=
|Fiโฒ (ฯN )| aN
for any ฯN โฅ 0 and โ i = 1, . . . , n. Furthermore, by the
fact that Fi (ฯ) and Fiโฒ (ฯ) have, respectively, relative degrees
ri = 1 and riโฒ , i = . . . , n, it turns out that there exist positive
โ
> 0 such that
ci , cโฒi and ฯN
|Fi (ฯ)|
|Fiโฒ (ฯ)|
โฅ ci ฯ โ1
โฒ
โค cโฒi ฯ โri
โ
โ ฯ โฅ ฯN
,
by which the result immediately follows.
IV. E XAMPLE : O BSERVER FOR THE UNCERTAIN VAN D ER
P OL O SCILLATOR
Let consider the uncertain Van der Pol oscillator
zฬ = โฮฑ2 z + ฮฒ(1 โ z 2 )zฬ ,
y = z + ฮฝ(t) ,
๏ฃถ
(1 โ z 2 )zฬ
๏ฃธ
zฬ โ 2y zฬ 2 โ z 2 zฬ
(3)
z โ 2zฬ 3 โ 6z zฬzฬ โ z 2 z (3)
and
ฯ(z[0,4] ) = z (3) , z (4) (1 โ z 2 ) โ 12zฬ 2 zฬ โ 6z zฬ 2 โ 8z zฬz (3)
with (see [9])
(14)
where y โ R is the measured output and ฮฑ, ฮฒ are uncertain
constant parameters. We let ยต = (ฮฑ2 , ฮฒ)โค and we assume that
ยต โ U, with U a compact set of R2 not containing the origin.
The state (z, zฬ) belongs to a compact invariant set W โ R2 ,
which is the limit cycle of the Van Der Pol oscillator. We
observe that W depends on ยต. Following [3], system (14)
extended with ยตฬ = 0 can be immersed into a system in the
canonical observability form (2) with n = 5. As a matter of
for all z[0,4] โ X .
Hence, by letting
ฯ(z[0,4] ) = ฯ(z[0,4] ) ยตฬ(z[0,3] )
with
ยตฬ(z[0,4] ) = ฮฅโ (z[0,4] ) z[2,4] ,
where ฮฅโ (ยท) is the left-inverse of ฮฅ(ยท), and letting x = z[0,4] ,
it is immediately seen that system (14) and ยตฬ = 0 restricted
to W ร U is immersed into the system
xฬ = A5 x + B5 ฯ(x) ,
y = C5 x + ฮฝ(t) ,
(15)
where A5 , B5 , C5 is a triplet in prime form of dimension 5.
By following the prescriptions of Section II, we implemented the proposed observer (8) as
ฮพฬ1
=
..
.
A ฮพ1 + N ฮพ2 + D2 (โ1 )K1 (y โ Cฮพ1 )
ฮพฬ4
=
A ฮพ4 + B ฯs (xฬโฒ ) + D2 (โ1 )K4 (B โค ฮพ3 โ Cฮพ4 )
tโ+โ
lim sup |xฬโฒi (t) โ xi (t)|
z (5) = ฯ(z[0,4] ) ยต
where
rankฮฅ(z[0,3] ) = 2
= โiโ1 ฮตi,1
i = 1, . . . n โ 1,
= โnโ1 ฮตnโ1,2 ,
lim sup |xฬi (t) โ xi (t)|
z[2,4] = ฮฅ(z[0,3] ) ยต ,
i = 1, . . . n ,
and we denote by Fi : R โ C, i = 1, . . . , n, the harmonic
transfer functions of these systems. A simple computation
shows that these systems have relative degree ri = 1, for all
i = 1, . . . , n. Similarly, we consider the n systems given by
the dynamics (13) with input ฮฝ and outputs
xฬโฒi โ xi
xฬโฒn โ xn
fact, let z[i,j] := col (z (i) , . . . , z (j) ) be the vector of time
derivatives of z, with 0 โค i < j, and let X be the compact set
of R5 such that z[0,1] โ W โ z[0,4] โ X . Simple computations
show that
(16)
where ฯs (ยท) is any locally Lipschitz bounded function that
agrees with ฯ(ยท) on X , ฮพi = (ฮพi1 , ฮพi2 ) and the coefficients
of Ki are k11 = 0.6, k12 = 0.3, k21 = 0.6, k22 = 0.111,
k31 = 0.6, k32 = 0.0485, k41 = 0.6, k42 = 0.0178, such
that the roots of P(ฮป) are โ0.1, โ0.2, โ0.2, โ0.3, โ0.3,
โ0.4, โ0.4, โ0.5. With the same notation of (8) we have
ฮพ = (ฮพ1 , ฮพ2 , ฮพ3 , ฮพ4 ), xฬโฒ = L1 ฮพ and xฬโฒโฒ = L2 ฮพ.
In the simulations we fixed ฮฑ = 1, ฮฒ = 0.5, gain โ1 = 100
and initial conditions (z, zฬ) = (1, 0) for (14) and ฮพ = 0 for
(16). Figures 1 and 2 show the error state estimate |xฬโฒ โ x|
and |xฬโฒโฒ โ x| of the proposed observer (16) for the first two
components (namely the estimation of the state of (14)) when
there is not sensor noise.
By following Section III we compared the observer
(16) with a standard high-gain observer in presence of
high-frequency sensor noise, numerically taken as ฮฝ(t) =
10โ2 sin(103 t). The high-gain observer has been implemented
as
xฬห = A5 xฬ + B5 ฯs (xฬ) + D(โ2 )K5 (y โ C5 xฬ)
(17)
where K5 = (1.5, 0.85, 0.225, 0.0274, 0.0012)T so that
the eigenvalues of (A5 + K5 C5 ) are โ0.1, โ0.2, โ0.3,
5
โ0.4, โ0.5, and โ2 = 100. Table 1 shows the normalized
asymptotic error magnitudes of the proposed observer
(16) and the standard high-gain observer (17), where the
normalized asymptotic error for the i-th estimate is defined as
kxฬi โxi ka = lim sup kxฬi (t)โxi (t)k/aN . Although the result
tโโ
in Section III is given just for linear systems, the numerical
results shown in the table show a remarkable improvement
of the sensitivity to high-frequency measurement noise of the
new observer with respect to the standard high-gain observer.
Standard High Gain
Observer xฬ
kxฬ1 โ x1 ka
kxฬ2 โ x2 ka
kxฬ3 โ x3 ka
kxฬ4 โ x4 ka
kxฬ5 โ x5 ka
= 0.15
=8
= 2 ยท 102
= 2.5 ยท 103
= 104
Modified
Observer xฬโฒ = L1 ฮพ
Modified
Observer xฬโฒโฒ = L2 ฮพ
kxฬโฒ1
kxฬโฒ2
kxฬโฒ3
kxฬโฒ4
kxฬโฒ5
kxฬโฒโฒ
1 โ x1 ka
kxฬโฒโฒ
2 โ x1 ka
โฒโฒ
kxฬ3 โ x3 ka
kxฬโฒโฒ
4 โ x4 ka
kxฬโฒโฒ
5 โ x5 ka
โ x1 ka
โ x2 ka
โ x3 ka
โ x4 ka
โ x5 ka
=
=
=
=
=
0.06
0.2
0.2
0.1
0.3
=
=
=
=
=
0.06
3
3
2
0.3
Table 1: Normalized asymptotic errors in presence of noise.
numerically simulated in the previous section. A complete
characterisation of the sensitivity to sensor noise of the new
observer is an interesting research topic are that is now under
investigation.
The peaking phenomenon due to wrong initial conditions
and fast convergence that is typical of high-gain observers
is not prevented by our proposed structure. However, other
techniques to deal with peaking (such as saturations, timevarying gains [16], gradients techniques [2], and others)
are available and can be adopted to improve the proposed
observer structure. In this work we didnโt consider the multioutput case. For the specific class of multi-output systems
which are diffeomorphic to a block triangular form in which
each block is associated to each output and it has a triangular
dependence on the states of that subsystem (see [4]), the
proposed structure can be simply applied block-wise to obtain
a high-gain observer. Apart this case, a complete extension to
the multi-output case is not immediate and under investigation.
Acknowledgment. We wish to thank Laurent Praly for
suggesting the design procedure presented in Appendix A.
0.5
0
A PPENDIX
A. Procedure to assign the eigenvalues of M
โ0.5
โ1
0
0.2
0.4
0.6
0.8
Consider the matrices Mi โ R2iโ2 ร R2iโ2 recursively
defined as
Miโ1 Nฬi
,
i = 2, . . . , nโ1
M1 = E1 ,
Mi =
Qฬi
Ei
1
t (s)
Fig. 1: Error state estimate |xฬโฒโฒ1 โ x1 |, |xฬโฒ1 โ x1 |.
where Nฬi = col(02(iโ2)ร2 , N ), Qฬi = (02(iโ2)ร2 , Qi ) and Ei ,
i = 1, . . . , n โ 1, Qi , i = 2, . . . , n โ 1, and N are defined as
in the definition of M . Note that M = Mnโ1 and, by letting
Ki = (ki1 ki2 )T , note that Qi and Ei depend on Ki , while Mi
depends on K1 , . . . , Ki . We let PMi (ฮป) = ฮป2i + mi1 ฮป2iโ1 +
2iโ3
+
. . . + mi2iโ1 ฮป + mi2i and PMiโ1 (ฮป) = ฮป2iโ2 + miโ1
1 ฮป
iโ1
iโ1
. . .+m2iโ3 ฮป+m2iโ2 the characteristic polynomials of Mi and
Miโ1 , and we use the notation mi[1,j] = col(mi1 , . . . , mij ) โ
iโ1
iโ1
k
Rj , miโ1
[1,k] = col(m1 , . . . , mk ) โ R for some j โค 2i and
k โค 2i โ 2.
The characteristic polynomial of PMi (ฮป) is computed as
30
20
10
0
โ10
0
0.2
0.4
0.6
0.8
1
PMi (ฮป)
t(s)
Fig. 2: Error state estimate
(red line).
|xฬโฒโฒ2
โ x2 | (blue line) and
|xฬโฒ2
โ x2 |
V. C ONCLUSIONS
We presented a new observer design based on high-gain
techniques with a tunable state-estimate convergence speed.
With respect to standard high-gain observers the state dimension is larger (2n โ 2 instead of n) with a clear benefit in
the observer implementation due to the power of the highgain which is only 2 and not n. Moreover, when specialised
to linear systems, we showed the benefit of the proposed
observer with respect to the standard high-gain observer in
terms of high-frequency noise rejection. Benefits that are
clearly confirmed also for the nonlinear Van-der Pol example
= ฮป(ฮป + ki1 )PMiโ1 (ฮป)
+ki2 PMiโ1 (ฮป) โ ฮป(ฮป + k(iโ1)1 )PMiโ2 (ฮป) .
Hence, simple, although lengthy, computations show that
the coefficients mi[1,2i] of PMi (ฮป) and miโ1
[1,2iโ2] of PMiโ1 (ฮป)
are related as follow
mi[1,2iโ2]
= (I2iโ2 + ki1 F )miโ1
[1,2iโ2] + ki1 v1
mi2iโ1
= ki1 miโ1
2iโ2
mi2i
ki2 miโ1
2iโ2
=
2iโ2
(18)
where v1 โ R
is the zero vector with a 1 in the first
position, and F โ R(2iโ2)ร(2iโ2) is the zero matrix with the
identity matrix I2iโ3 in the lower left block. Note that (I2iโ2 +
ki1 F ) is invertible for all ki1 . Hence, from the first of (18),
one obtains
i
miโ1
[1,2iโ2] = ฮ(m[1,2iโ2] , ki1 )
6
where
ฮ(mi[1,2iโ2] ,
โ1
ki1 ) = (I2iโ2 + ki1 F )
(mi[1,2iโ2]
โ ki1 v1 ) ,
which, embedded in the second and in the third of (18), yield
the relations
ฯ1 (mi[1,2iโ1] , ki1 ) = 0 ,
ki2 = ฯ2 (mi[1,2i] , ki1 )
where
ฯ1 (mi[1,2iโ1] , ki1 ) = ki1 v2T ฮ(mi[1,2iโ2] , ki1 ) โ mi2iโ1
ฯ2 (mi[1,2i] , ki1 ) =
v2T
mi2i
i
ฮ(m[1,2iโ2] ,
ki1 )
in which v2 โ R2iโ2 is the zero vector with a 1 in the last
position. We observe that ฯ1 (ยท, ยท) is a polynomial in ki1 of odd
order 2i โ 1. As a consequence, for any mi[1,2iโ1] there always
exists at least one real ki1 fulfilling ฯ1 (mi[1,2iโ1] , ki1 ) = 0.
The previous results can be used to set up a โbasic assignment algorithmโ that is then used iteratively to solve the
eigenvalues assignment of the matrix M .
Basic assignment algorithm. Let Pฬi (ฮป) = ฮป2i + mฬi1 ฮป2iโ1 +
. . . + mฬi2i be an arbitrary polynomial. Then, there exist a
real Kฬi = (kฬi1 , kฬi2 )T and a polynomial Pฬiโ1 (ฮป) = ฮป2iโ1 +
2iโ2
mฬiโ1
+ . . . + mฬiโ1
1 ฮป
2iโ2 such that
Ki
PMiโ1
= Kฬi
= Pฬiโ1 (ฮป)
โ
PMi (ฮป) = Pฬi (ฮป) .
As a matter of fact, by letting mฬi[1,2iโ1] the coefficients
of Pฬi (ฮป), it is possible to take kฬi1 as a real solution of
ฯ1 (mฬi[1,2iโ1] , ki1 ) = 0, kฬi2 = ฯ2 (mฬi[1,2i] , kฬi1 ), and to
take the coefficients mฬiโ1
[1,2iโ2] of the polynomial Pฬiโ1 (ฮป) as
i
mฬiโ1
=
ฮ(
mฬ
[1,2iโ2] , kฬi1 ) . โณ
[1,2iโ2]
With the previous algorithm in hand, the design of
K1 , . . . , Knโ1 to assign an arbitrary characteristic polynomial
to M , can be then immediately done by the following steps:
1) With Pฬnโ1 (ฮป) the desired characteristic polynomial of
M , compute (Kฬnโ1 , Pฬnโ2 (ฮป)) by running the basic
assignment algorithm with i = n โ 1.
2) Compute iteratively (Kฬi , Pฬiโ1 (ฮป)) by running the basic
assignment algorithm for i = n โ 2, . . . , 2.
3) Compute Kฬ1 = (kฬi1 , kฬi2 )T so that ฮป2 + ki1 ฮป + ki2 =
Pฬ1 (ฮป).
R EFERENCES
[1] J. H. Ahrens and H. K. Khalil, โHigh-gain observer in the presence of
measurement noise: a switched-gain approachโ, Automatica vol. 45, pp
936-943, 2009.
[2] D. Astolfi and L. Praly, โOutput feedback stabilization for SISO nonlinear systems with an observer in the original coordinatesโ, IEEE 52nd
Conference on Decision and Control, pp. 5927-5932, December 2013.
[3] D. Astolfi, L. Praly and L. Marconi, โA note on observability canonical
forms for nonlinear Systemsโ, IFAC, 9th Symposium on Nonlinear Control
Systems, pp 436-438, September 2013.
[4] A. N. Atassi and H. K. Khalil, โA separation principle for the stabilization
of a class of nonlinear systemsโ, IEEE Transactions on Automatic Control,
44, pp 1672-1687, 1999.
[5] A. A. Ball and H. K. Khalil, โHigh-gain observer tracking performance
in the presence of measurement noiseโ, American Control Conference, pp
4626-4627, 2009.
[6] G. Besancฬงon, Nonlinear observers and applications, Springer, 2007.
[7] G. Bornard and H. Hammouri, โA high gain observer for a class of
uniformly observable systemsโ, IEEE, 30th Conference on Decision and
Control, December 1991.
[8] F. Deza, E. Busvelle, J.P. Gauthier, D. Rakotopara, โHigh gain estimation
for nonlinear systemsโ, Systems & Control Letters vol. 18, pp 295-299,
April 1992.
[9] F. Forte, A. Isidori, L. Marconi, โRobust design of internal models
by nonlinear regressionโ, IFAC, 9th Symposium on Nonlinear Control
Systems, pp 283-288, September 2013.
[10] M. T. J. Gajicฬ, The Lyapunov matrix equation in system stability and
control, Academic Press, 1995.
[11] J. P. Gauthier, G. Bornard, โObservability for any u(t) of a class of
nonlinear systemsโ, IEEE Transactions on Automatic Control, Vol. AC26, No. 4, August 1981.
[12] J.P. Gauthier and I. Kupka, โDeterministic observation theory and
applicationsโ, Cambridge University Press, 2004.
[13] H Hammouri, G. Bornard and K. Busawon, โHigh gain observer for
structured multi-input multi-output nonlinear systemsโ, IEEE Transaction
on Automatic Control vol. 55, no. 4, pp 987-992, April 2010.
[14] H. K. Khalil and L. Praly, โHigh-gain observers in nonlinear feedback
controlโ, Robust and Nonlinear Control, 24, pp 993-1015, 2014.
[15] M. Maggiore, K.M. Passino, โA separation principle for a class of
non uniformly completely observable systemsโ, IEEE Transactions on
Automatic Control, vol. 48, no. 7, pp 1122-1133, July 2003.
[16] R. G. Sanfelice and L. Praly, โOn the performance of high-gain
observers with gain adaptation under measurement noiseโ, Automatica
Vol. 47, pp 2165-2176, 2011.
[17] A. Teel and L. Praly, โGlobal stabilizability and observability imply
semi-global stabilizability by output feedbackโ, Systems and Control
Letters, 22, pp 313-325, 1994.
[18] L. K. Vasiljevic and H. K. Khalil, โDifferentiation with high-gain
observers the presence of measurement noiseโ, IEEE 45th Conference on
Decision and Control, pp 4717-4722, December 2006.
| 3cs.SY
|
arXiv:1711.06855v1 [cs.SY] 18 Nov 2017
A PROBABILISTIC CHARACTERIZATION OF RANDOM AND
MALICIOUS COMMUNICATION FAILURES IN MULTI-HOP
NETWORKED CONTROL
A. CETINKAYA, H. ISHII, AND T. HAYAKAWA
Abstract. The control problem of a linear discrete-time dynamical system
over a multi-hop network is explored. The network is assumed to be subject to
packet drops by malicious and nonmalicious nodes as well as random and malicious data corruption issues. We utilize asymptotic tail-probability bounds of
transmission failure ratios to characterize the links and paths of a network as
well as the network itself. This probabilistic characterization allows us to take
into account multiple failures that depend on each other, and coordinated malicious attacks on the network. We obtain a sufficient condition for the stability
of the networked control system by utilizing our probabilistic approach. We
then demonstrate the efficacy of our results in different scenarios concerning
transmission failures on a multi-hop network.
1. Introduction
Network control systems incorporate communication networks to facilitate the
exchange of measurement and control data between the plant and the controller
[1]. Recently, multi-hop networks have been utilized in networked control operations [2, 3, 4, 5, 6, 7]. A multi-hop network such as a wireless ad hoc network
consists of a number of nodes that are connected with a number of communication
links. Ensuring orderly operation of a multi-hop networked control system can be
challenging, as packets may sometimes fail to be transmitted at different parts of
the network due to various reasons.
One of the reasons for transmission failures in a multi-hop network is channel
noise in the communication links, which may corrupt the contents of state and
control input data packets. The occurrence of data corruption in a communication
network may be modeled using random processes [8]. In addition to channel noise,
network congestion may also cause packet transmission failures. Routers may drop
some packets to mitigate congestion [9].
Furthermore, it has become apparent that malicious attacks may also hamper
transmissions in a networked control system. For instance, jamming attacks by
(A. Cetinkaya, H. Ishii) Department of Computer Science, Tokyo Institute of Technology, Yokohama, 226-8502, Japan.
(T. Hayakawa) Department of Systems and Control Engineering, Tokyo Institute
of Technology, Tokyo 152-8552, Japan.
E-mail addresses: [email protected], [email protected],
[email protected] .
Key words and phrases. Networked Control, Multi-hop Networks, Malicious Attacks, Random
Failures.
This work was supported in part by the JST CREST Grant No. JPMJCR15K3 and by JSPS
under Grant-in-Aid for Scientific Research Grant No. 15H04020.
1
2
CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL
an adversary may interfere with the communication on links and effectively prevent transmission of packets. This issue was investigated in several works from the
viewpoints of wireless communications [10, 11], as well as control and game theory
[12, 13, 14, 15, 16]. Transmissions of state and control input information between
the plant and the controller may also fail due to malicious activities of routers.
Malicious routers may intentionally drop some of the packets coming from and/or
headed to certain nodes of the network [6, 17, 18]. The detection of such routing attacks can be challenging especially when the malicious nodes act normal for
certain periods of time (see grayhole attacks in [19]). Furthermore, networks may
face both malicious routing and random packet losses due to link errors [20, 21].
Understanding the effects of malicious attacks on networks is important from the
viewpoint of cyber security of networked control systems [22, 23].
Our goal in this paper is to explore the effects of random and malicious transmission failures in a general multi-hop communication network and develop a network
characterization to be used in the analysis of networked control systems. The key
problem here is to characterize the failures for the overall multi-hop network in
a nonconservative way while still taking into account mutually-dependent packet
failures and coordinated malicious attacks on the network.
In the literature, researchers have proposed different characterizations of packet
failures in a networked control system. Specifically, [2] explored control over a network with multiple links that introduce random packet drops. The results obtained
in [2] utilize packet drop probabilities on the edges that constitute cut-sets of the
network graph. This approach is also utilized in network characterization by [24].
Furthermore, [3] discussed almost sure networked control system stability, and [25]
studied networked state estimation problem. Recently, [7] investigated mean square
stability and robustness under delays and packet losses through a Markov jump linear system framework. In these studies, Markov processes with certain transition
probabilities are used for modeling packet losses on a network.
In this paper, we consider a network with not only random failures but also
malicious activities on nodes or links. As a result, failures may not always be
modeled by Markov processes and packet losses may not always have well-defined
probabilities. In [6], researchers explored a multi-hop network model with malicious
nodes. There, the fault detection and isolation problem is explored for the case
where the nodes induce delay in transmissions. Here, we consider a different setup
and a different modeling approach. In particular, we do not investigate a detection
problem, and we do not model the effect of delays. In this paper, we would like to
characterize the overall packet exchange failures on a network between the plant
and the controller by using the properties of the paths of the network and the
communication links on those paths. We also note that our network characterization
provides a high level model and it is tailored to be utilized for stability analysis
in networked control as in [2]. Instead of specifying underlying physical channel
models and routing protocols, we take a probabilistic approach to characterize
transmission failure ratios on the links, paths of a network, as well as the network
itself.
Our approach for modeling the overall packet failures in a network is built upon
tail-probability bounds for the binary-valued processes that describe the occurrences of failures on the network. Specifically, each link on a multi-hop network is
described through an asymptotic tail-probability bound of the transmission failure
CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL
3
ratio of that link. This tail-probability-based approach is different from the typical
random packet loss modeling approach of assigning probabilities to failures. Our
approach can capture failures that occur due to both malicious and nonmalicious
reasons. In fact, we utilized the tail-probability-based approach in [26] to study
the combined effects of malicious-attacks following the discrete-time version of the
attack model in [13, 16] and random packet losses modeled as Markov chains. Differently from [26], we show in this paper that when tail-probability bounds for the
links are available, then we can obtain tail-probability bounds describing the overall
failures on individual paths of a network. Then those bounds are used for deriving
tail-probability bounds describing the overall failures on the network itself. Using
our proposed characterizations, we obtain a probabilistic upper-bound for the average number of packet exchange failures between the plant and the controller, which
we use in almost sure stability analysis of a discrete-time linear networked control
system.
In the multi-hop setting, the location of failures and whether multiple failures
depend on each other or not critically affect the quality of communication and
hence the stabilization performance of the controller. Especially, the situation becomes more serious when the network is targeted by a number of adversaries that
launch coordinated attacks on different locations in the communication network.
Our tail-probability bound approach can handle such worst-case situations in a unified manner. In addition to our investigation on those situations, we also explore
the case where one or more paths/links are known to be associated with random
failures and the corresponding indicator processes are mutually independent. For
such cases, we show that tighter results can be obtained. This is done by exploiting certain properties of the hidden Markov models that characterize the random
failures.
The organization of the rest of the paper is as follows. In Section 2, we explain the
networked control problem over a multi-hop network. We then present our multihop network characterization in Sections 3 and 4. Specifically, in Section 3, we give
a characterization of the overall transmission failures in a multi-hop network based
on the failures on individual paths of that network. Furthermore, in Section 4,
we investigate failures on the paths that occur due to data-corruption and packetdropping issues at nodes and communication links. We demonstrate the utility of
our results in Section 5, and conclude the paper in Section 6.
We note that the conference version of this paper appeared in [27]. In this
paper, we provide more detailed discussions throughout the paper. Furthermore,
we present new results in Sections 3, 4 and new examples in Section 5.
In this paper, we use N0 and N to denote nonnegative and positive integers, respectively. The notation P[ยท] denotes the probability on a probability space (โฆ, F , P)
with filtration {Ft }tโN0 . For binary numbers, the notation โจ represents the oroperation; moreover, โง represents the and-operation.
2. Control over Multi-hop Networks
In this section, we investigate the control of a linear plant over a multi-hop
network. On this network, the plant and the controller exchange state measurement
and control input packets. The transmissions in the network are not subject to
delay; however, there may be failures in packet exchange attempts between the
plant and the controller.
4
CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL
We describe the linear dynamics of the plant by
(1)
x(t + 1) = Ax(t) + Bu(t),
x(0) = x0 ,
t โ N0 ,
where A โ Rnรn and B nรm respectively denote the state and input matrices;
furthermore, x(t) โ Rn and u(t) โ Rm are the state and the control input vectors,
respectively.
The plant and the controller attempt to exchange state measurement and control input packets at each time instant t. We denote success or failure states of
packet exchange attempts by using the binary-valued process {l(t) โ {0, 1}}tโN0 .
In the case of a successful packet exchange (l(t) = 0), the plant transmits the state
measurement to the controller; the controller uses the received state information
together with a linear static feedback control law to compute the control input,
which is then sent back to the plant. The transmitted control input is applied at
the plant side. At certain time instants, either the state packet or the control input
packet cannot be delivered due to network issues such as packet drops, jamming
attacks, and other communication errors. In such cases packet exchange attempts
fail (l(t) = 1), and the control input at the plant side is set to 0, which is one of
the common approaches in the literature (see [1] and the references therein).
Under this characterization, the control input u(t) applied at the plant side is
given by
u(t) , (1 โ l(t)) Kx(t),
(2)
t โ N0 ,
mรn
where K โ R
represents the feedback gain.
Although we consider a static state-feedback control setup here, the techniques
that we develop in this paper can also be used in conjunction with other control approaches. In particular, the predictive control approach of [28] and the
event-triggered output-feedback control approach from our earlier work [29] can be
studied within the context of multi-hop networked control by using the network
characterizations that we develop here.
We now introduce a class of processes that is useful in describing packet failure
indicators in the paper.
Definition 2.1 (ฮฯ ). Given a scalar ฯ โ [0, 1] we define the class of binary-valued
processes ฮฯ by
โ
kโ1
X
X
ฮฯ , l : l(t) โ {0, 1}, t โ N0 ;
P[
l(t) > ฯk] < โ .
k=1
t=0
By this definition, we have ฮฯ1 โ ฮฯ2 for ฯ1 โค ฯ2 . Furthermore, any binaryvalued process l satisfies l โ ฮ1 .
In [26], we explored a problem similar to the one that we discuss in this paper.
There, we considered a single direct communication channel between the plant
and the controller. To describe the packet losses on this channel, we proposed a
probabilistic characterization that is based on the following assumption.
Assumption 2.2. For the packet exchange failure indicator l(ยท), we have l โ ฮฯ
with ฯ โ [0, 1].
This assumption allows us to characterize a range of scenarios in a unified manner
through the scalar ฯ โ [0, 1]. For instance, the case where all packet exchange
attempts fail (l(t) = 1, t โ N0 ) can be described by setting ฯ = 1. Moreover, in
CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL
5
the case where all packet exchange attempts are successful (l(t) = 0, t โ N0 ), then
l โ ฮ0 . In addition to these two extreme cases, as we illustrate throughout the
paper, Assumption 2.2 can also be used to describe random failures and malicious
attacks.
When the packet exchange failures in a networked control system satisfy Assumption 2.2, then the scalar ฯ โ [0, 1] also represents a bound on the asymptotic
packet exchange failure ratio. Specifically, it follows from Borel-Cantelli Lemma
Pkโ1
l(t) โค ฯ, almost surely. When this inequality holds with
that lim supkโโ k1 t=0
a small ฯ, it means that the packet exchanges fail statistically rarely. We showed
in [26] that the plant (1) can be stabilized over a network, if ฯ is sufficiently small.
The stability analysis method developed in [26] allows us to obtain the following
result, which presents sufficient stability conditions for the closed-loop networked
control system (1), (2).
Theorem 2.3. Consider the dynamical system (1), (2). Suppose Assumption 2.2
holds with scalar ฯ โ [0, 1]. If there exist a positive-definite matrix P โ Rnรn and
scalars ฮฒ โ (0, 1), ฯ โ [1, โ) such that
T
(3)
(A + BK) P (A + BK) โ ฮฒP โค 0,
(4)
AT P A โ ฯP โค 0,
(5)
(1 โ ฯ) ln ฮฒ + ฯ ln ฯ < 0,
then the zero solution x(t) โก 0 of the closed-loop system (1), (2) is asymptotically
stable almost surely.
In Theorem 2.3, the conditions (3) and (4) characterize stability and instability of
the closed-loop and the open-loop dynamics through scalars ฮฒ and ฯ. These scalars
also appear in condition (5). When ฯ (and hence the packet exchange failure ratio)
is sufficiently small so that (5) is satisfied, then we have almost sure asymptotic
stability, which implies P[limtโโ kx(t)k = 0] = 1.
In Sections 3 and 4 below, we will present some key methods for obtaining ฯ of
a multi-hop networked control system (1), (2) to facilitate its stability analysis with
Theorem 2.3. Specifically, we will consider the setting where the state measurement
and control input packets are attempted to be transmitted over multi-hop networks
instead of a single direct channel, which was considered in [26]. We will use assumptions similar to Assumption 2.2 to characterize packet transmission failures
on the paths between the plant and the controller as well as the individual links on
those paths. We will then show that the packet exchange failures (represented by
l(ยท)) in the overall networked control system satisfy Assumption 2.2 with a scalar
ฯ โ [0, 1] that depends on the network structure as well as failure models of links.
To facilitate the analysis in the following sections, we now define two more classes
of binary-valued processes that are distinct from ฮฯ . Our goal is to characterize
more specific models for random and malicious failures.
In our earlier work [26], we utilized time-inhomogeneous Markov chains for characterizing random failures in a single communication channel. When we consider
a multi-hop network composed of a number of channels that face random transmission failures, we are required to introduce a different characterization. This is
because the overall failures in the network depends on the failures on each individual channel. Hence, the overall failures cannot always be described as a Markov
6
CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL
chain. In order to describe random failures in multi-hop networks, we utilize timeinhomogeneous hidden Markov models (see [30, 31, 32]). The binary-valued process
{l(t) โ {0, 1}}tโN0 has a time-inhomogeneous hidden Markov model if
l(t) = hl (ฮธl (t)),
(6)
l
t โ N0 ,
l
where h : ฮ โ {0, 1} is a binary valued function on a set ฮl of finite number of
elements, and moreover, {ฮธl (t) โ ฮl }tโN0 is an Ft -adapted, finite-state, and timeinhomogeneous Markov chain with initial distributions ฯlq โ [0, 1], q โ ฮl , and
time-varying transition probability functions plq,r : N0 โ [0, 1], q, r โ ฮl , satisfying
P[ฮธl (0) = q] = ฯlq ,
P[ฮธ (t + 1) = r|ฮธl (t) = q] = plq,r (t),
l
t โ N0 .
The process {l(t) โ {0, 1}}tโN0 is also called the output process of a hidden
Markov model. Notice that {l(t) โ {0, 1}}tโN0 depends on the Markov chain
{ฮธl (t) โ ฮl }tโN0 through function hl , but it is not necessarily a Markov chain itself.
Specifically, in certain cases, we may have P[l(t + 1) = 1|Ft ] 6= P[l(t + 1) = 1|l(t)],
which shows that Markov property (see [33]) does not hold. This is for example the
case where l(ยท) represents the failures on a Gilbert-Elliott channel (see [34, 35]). We
also note that hidden Markov models naturally arise in the description of multi-hop
networks. For instance, l(ยท) may be the failure indicator of a path with multiple
links. Even if the failures on individual links may satisfy the Markov property,
the overall failure indicator l(ยท) does not satisfy it due to dependence on the failure/success states of all individual links. In such cases, l(ยท) follows a hidden Markov
model, where the Markov chain {ฮธl (t) โ ฮl }tโN0 represents the combined states of
all individual links.
For a given binary-valued output process {l(t) โ {0, 1}}tโN0 associated with a
time-inhomogeneous hidden Markov model, let ฮl0 , ฮl1 โ ฮl be given by
ฮl0 , {r โ ฮl : hl (r) = 0},
ฮl1 , {r โ ฮl : hl (r) = 1}.
In the next definition we introduce a class of binary-valued output processes associated with time-inhomogeneous hidden Markov models.
Definition 2.4 (ฮp0 ,p1 ). Given scalars p0 , p1 โ [0, 1] we define the class ฮp0 ,p1 of
binary-valued output processes of time-inhomogeneous hidden Markov models by
X
X l
plq,r (t) โค p1 , q โ ฮl , t โ N0 .
pq,r (t) โค p0 , q โ ฮl , t โ N0 ;
ฮp0 ,p1 , l :
rโฮl0
rโฮl1
The following result establishes the relation between the classes ฮp0 ,p1 and ฮฯ .
Proposition 2.5. Consider the binary-valued output process {l(t) โ {0, 1}}tโN0 of
a time-inhomogeneous hidden Markov model. If l โ ฮp0 ,p1 with p1 โ (0, 1), then we
have l โ ฮฯ for any ฯ โ (p1 , 1].
Before, we give the proof of Proposition 2.5, we first present a technical result
that provides upper bounds on the tail probabilities of sums involving a binaryvalued output process associated with a time-inhomogeneous hidden Markov model.
Lemma 2.6. Let {ฮพ(t) โ ฮ}tโN0 be a finite-state time-inhomogeneous Markov
chain with transition probabilities pq,r : N0 โ [0, 1], q, r โ ฮ, and let ฮ1 โ ฮ be
given by ฮ1 , {r โ ฮ : h(r) = 1}, where h : ฮ โ {0, 1} is a binary-valued function.
CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL
7
Furthermore, let {ฯ(t) โ {0, 1}}tโN0 be a binary-valued process that is independent
of {ฮพ(t) โ ฮ}tโN0 . Assume
X
(7)
pq,r (t) โค pฬ, q โ ฮ, t โ N0 ,
rโฮ1
โ
X
(8)
P[
kโ1
X
ฯ(t) > wฬk] < โ,
t=0
k=1
where pฬ โ (0, 1), wฬ โ (0, 1]. We then have for ฯ โ (pฬwฬ, wฬ),
(9)
P[
kโ1
X
h(ฮพ(t))ฯ(t) > ฯk] โค ฯk ,
k โ N,
t=0
wฬk
pฬ+1)
where ฯk , ฯฬk + ฯโฯk+1 ((ฯโ1)
(ฯโ1)pฬ
Pโ
N. Moreover, k=1 ฯk < โ.
โ1
,ฯ,
ฯ
wฬ (1โpฬ)
ฯ ,
pฬ(1โ wฬ
)
ฯฬk , P[
Pkโ1
t=0
ฯ(t) > wฬk], k โ
Lemma 2.6 is an essential tool for dealing with different failure scenarios specific
to multi-hop networks, and it generalizes Lemma A.1 of our previous work [26]. In
particular, in the case where ฮ = {0, 1} and h(r) = r, r โ ฮ, Lemma 2.6 recovers
Lemma A.1 of [26]. The proof Lemma 2.6 is given in the Appendix.
We are now ready to prove Proposition 2.5.
Proof of Proposition 2.5. Notice that l โ ฮฯ for ฯ = 1, since l(ยท) is binary-valued.
For the case ฯ โ (p1 , 1), we show l โ ฮฯ by employing Lemma 2.6. Specifically, let
pฬ = p1 , wฬ = 1, and define the processes {ฮพ(t) โ {0, 1}}tโN0 and {ฯ(t) โ {0, 1}}tโN0
with ฮพ(t) = ฮธ1l (t) and ฯ(t) = 1, t โ N0 . Since the conditions in (7) and (8) are
satisfied with pฬ = p1 , h = hl , ฮ = ฮl , and ฮ1 = ฮl1 , it follows from Lemma 2.6 that
โ
X
k=1
P[
kโ1
X
t=0
l(t) > ฯk] =
โ
X
P[
k=1
which completes the proof.
kโ1
X
hl (ฮธ1l (t)) > ฯk] =
t=0
โ
X
k=1
P[
kโ1
X
h(ฮพ(t))ฯ(t) > ฯk] < โ,
t=0
Next, we introduce a class for binary-valued processes that we employ in characterizing the timing of malicious attacks.
Definition 2.7 (ฮ ฮบ,w ). Given scalars ฮบ โฅ 0, w โ [0, 1] we define the class of
binary-valued processes ฮ ฮบ,w by
X
kโ1
ฮ ฮบ,w , l : l(t) โ {0, 1}, t โ N0 ; P
l(t) โค ฮบ + wk = 1, k โ N .
t=0
The characterization for the class ฮ ฮบ,w is based on a discrete-time version of the
malicious attack model used by [13, 16]. In this model, occurrences of malicious
Pkโ1
attacks is described by a process l(ยท) such that P
t=0 l(t) โค ฮบ + wk = 1, k โ N,
where ฮบ โฅ 0 represents an upper-bound for a number of initial attacks, and w โ
(0, 1) represents a bound on the average attack rate. Lemma 2.3 in [26] shows that
if l โ ฮ ฮบ,w with w โ (0, 1), then l โ ฮฯ for any ฯ โ (w, 1].
Note that the malicious attack characterization through the class ฮ ฮบ,w , does not
require the process l โ ฮ ฮบ,w to follow a particular distribution at each time. This
is the key difference of the class ฮ ฮบ,w from the class ฮp0 ,p1 that represents random
failures.
8
CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL
There are several ways an attacker can strategize when to cause transmission
failures. For instance, game-theoretic [14, 15] and optimization-based methods can
be used by the attacker to decide the timing of attacks. An important property
of the class ฮ ฮบ,w is that it characterizes attacks by their maximum average attack
rate but not by the specific timing strategy they follow. Thus by using ฮ ฮบ,w ,
we can capture the uncertainty in the generation of attacks, which may follow a
deterministic strategy, or may involve randomness. Interestingly, an attacker can
also make use of system dynamics as well as past/present state information to
decide the timing of attacks to cause more damage to the system. Such attacks
are further illustrated in Section 5.3 and explored through the characterization of
ฮ ฮบ,w .
As we discussed above, a process l that belongs to either of the classes ฮ ฮบ,w
and ฮp0 ,p1 also belongs to the class ฮฯ for a suitable value of ฯ. This observation
suggests us that both random failures and malicious attacks can be characterized
by utilizing the class ฮฯ . As we make it clear in the following sections, the class ฮฯ
has useful properties. For instance, if two processes l1 and l2 belong to classes ฮฯ1
and ฮฯ2 , then the processes lโง and lโจ defined by setting lโง (t) = l1 (t) โง l2 (t) and
lโจ = l1 (t) โจ l2 (t) belong to classes ฮฯโง and ฮฯโจ where ฯโง and ฯโจ depend on ฯ1 and
ฯ2 . Such properties enable us to model the failures on both the links and the paths
of a network by using processes that belong to the class ฮฯ for certain values of ฯ.
3. Random and Malicious Packet Failures in Multi-Hop Networks
In this section, we present a framework for modeling random and malicious
packet transmission failures in the multi-hop networks that are used for exchanging
state and control input packets between the plant and the controller.
3.1. Multi-Hop Network Model. We follow the approach of [24] and represent
the networks between the plant and the controller by using directed acyclic graphs.
To model the network, over which the state packets are transmitted from the plant
to the controller, we consider the directed acyclic graph G , (V, E), where V
denotes the set of nodes, and E โ {(v1 , v2 ) : v1 , v2 โ V } denotes the set of edges.
Here the nodes and the edges correspond respectively to communication devices and
links. We represent the nodes at the plant and the controller with vP โ V and vC โ
V , respectively. A path P from a node v1 โ V to another node vh โ V is identified
as a sequence of nonrepeating edges P = (v1 , v2 ), (v2 , v3 ), . . . , (vhโ1 , vh ) . We
write |P| to denote the number of edges on the path P.
Similarly, the network used for transmission of the control input packets from the
controller to the plant is represented by graph Gฬ , (Vฬ , Eฬ) with plant and controller
nodes vฬP โ Vฬ and vฬC โ Vฬ . In practice, the same physical network may be used for
transmission of both the state and the control input packets. For those cases, the
nodes in V and Vฬ would correspond to the same physical devices.
We assume that there exists at least one directed path from node vP to node vC
in G, and at least one directed path from node vฬC to node vฬP in Gฬ.
Example 3.1. We show an example of G and Gฬ in Fig. 1, where the nodes corresponding to the plant and the controller are not directly connected, but state and
control input packets can still be transmitted with the help of the intermediate nodes
v1 , . . . , v4 in G, and vฬ1 , . . . , vฬ5 in Gฬ.
CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL
9
Figure 1. Multi-hop networked control system
Intermediate nodes in networks forward data packets that they receive from
their incoming edges to their outgoing edges. Depending on the communication
protocol, the forwarding method may differ. For instance, in the broadcast method,
intermediate nodes forward all data packets that they receive from their incoming
edges to all the nodes that they are connected with their outgoing edges. On the
other hand, it may also be the case that intermediate nodes follow a specific routing
scheme, where a packet coming from a certain incoming edge is forwarded through
a certain outgoing edge [36].
We assume that the information packets propagate with no delay in both networks represented with G and Gฬ, although there may be transmission failures due
to:
1) packet drops by malicious nodes to prevent communication and/or by nonmalicious nodes to avoid congestion;
2) data corruption on links because of random channel errors and/or malicious
jamming attacks.
Hence, a packet exchange between the plant and the controller may fail if the
state or the control input packets are dropped or get corrupted. Here note that
corrupted data packets are allowed to be transmitted over intermediate nodes, but
they are detected and discarded at the plant/controller nodes. Error-detecting
codes can be used for this purpose. Note also that if the controller only receives
corrupted versions of a state packet, the control input is not computed.
In the following sections, we present some key results for the analysis of packet
failures on network G, which are directly applicable for analyzing Gฬ. In particular,
we characterize failures on G in terms of the failures on different paths between the
plant and the controller. Then we present a set of results that relate data corruption
and packet dropping issues of nodes and links to the failures on each individual
path of G. These results enable us to obtain ฯ โ [0, 1] in Assumption 2.2, which is
essential for analyzing the system in Fig. 1 with Theorem 2.3. We emphasize that
the central problem here is to find ฯ for the overall multi-hop network in Fig. 1 in
a nonconservative way while still taking into account mutually-dependent packet
failures and coordinated attacks on the network.
3.2. Packet Transmission Failures on Networks. We use the binary-valued
process {lG (t) โ {0, 1}}tโN0 to indicate transmission failures on G. Specifically,
lG (t) = 0 means that the state packet x(t) sent from the plant node vP is successfully
10
CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL
received at the controller node vC . On the other hand, lG (t) = 1 indicates a failure,
that is, the controller does not receive the state x(t).
Let c โ N denote the number of paths on graph G from the node vP to the node
vC , and let Pi , i โ {1, . . . , c}, denote these paths. In the example network G in
Fig. 1, there are c = 3 paths
P1 = (vP , v1 ), (v1 , vC ) , P2 = (vP , v2 ), (v2 , v4 ), (v4 , vC ) ,
(10)
P3 = (vP , v3 ), (v3 , v4 ), (v4 , vC ) .
Note that different paths may include the same link. Hence, when packet transmission is attempted on multiple paths, a link that is shared on those paths may be
used multiple times. For instance, (v4 , vC ) is on both P2 and P3 . Hence, (v4 , vC )
may be utilized twice to forward the packets coming from v2 and v3 . On the other
hand, the framework that we describe below also allows modeling the case where
one of the packets is dropped at node v4 and not transmitted further. Furthermore,
the packet drop can be random or malicious.
We use {lPi (t) โ {0, 1}}tโN0 to indicate whether the state packet x(t) is successfully transmitted to the controller through path Pi or not. Specifically, lPi (t) = 0
represents a successful transmission. On the other hand lPi (t) = 1 may indicate
that the path is not utilized for transmission due to the particular routing scheme,
or it may indicate a failure. Failures occur if packets get dropped on the path or if
they get corrupted.
Thus, in network G, the transmission of the state packet x(t) from node vP to
node vC results in failure if lPi (t) = 1 for all paths Pi , i โ {1, . . . , c}. Therefore,
lG (ยท) is given by
lG (t) = lP1 (t) โง lP2 (t) โง ยท ยท ยท โง lPc (t).
(11)
The following result presents a probabilistic and asymptotic bound for the packet
transmission failure ratio of G as a function of the bounds for the individual paths
Pi .
Proposition 3.2. Assume for each path Pi that we have lPi โ ฮฯPi , where ฯPi โ
[0, 1]. Then lG โ ฮฯG with ฯG , miniโ{1,...,c} ฯPi .
Proof. First let iโ , arg miniโ{1,...,c} ฯPi . It follows that ฯG = miniโ{1,...,c} ฯPi =
ฯPiโ . Now, by (11),
kโ1
X
lG (t) โค
t=0
and hence
Pkโ1
t=0 lG (t)
P[
โค
kโ1
X
kโ1
X
lPi (t),
i โ {1, . . . , c},
t=0
Pkโ1
t=0 lPiโ (t).
Therefore,
lG (t) > ฯG k] โค P[
t=0
The result then follows, since lPiโ โ ฮฯPiโ .
kโ1
X
lPiโ (t) > ฯPiโ k].
t=0
The scalars ฯPi , i โ {1, . . . , c}, in Proposition 3.2 represent bounds for asymptotic packet failure ratios on different paths of network G. Proposition 3.2 indicates
that the minimum of these scalars is also a bound for the packet failure ratio of the
whole network. Observe that if ฯPi = 0 for some path Pi , then we have ฯG = 0,
CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL
11
which means that the state can be securely and reliably transmitted to the controller at all time instants. This is because the transmission on path Pi never fails.
If, on the other hand, ฯPi = 1 for all paths Pi , then ฯG = 1, indicating all packet
transmission attempts fail, almost surely.
Note that in Proposition 3.2, we do not assume that {lPi (t) โ {0, 1}}tโN0 are
mutually-independent processes. This allows us to deal with the scenarios where
transmission failures on different paths may depend on each other. In particular,
we can consider coordinated packet dropout attacks of several malicious routers
on different paths. For instance, two malicious routers v2 and v3 in Fig. 1 may
skip forwarding packets at the same time. Then transmissions on paths P2 and P3
given in (10) would both fail. Similarly, Proposition 3.2 is also useful when links on
different paths are attacked at the same time by coordinated jamming attackers.
Another scenario that can be explored through Proposition 3.2 is related to
packet drops by nonmalicious routers to prevent congestion [9]. For example, a
nonmalicious router v4 in Fig. 1 may choose to forward only one of the packets
coming from v2 and v3 . Then, lP2 (ยท) and lP3 (ยท) would be dependent processes.
In particular, if there are no other failures in the network, then we have lP2 (t) =
1 โ lP3 (t).
We remark that by utilizing additional properties of the indicator processes lPi (ยท)
for paths, we can obtain a better asymptotic failure bound ฯG than the one provided
in Proposition 3.2. In particular, if one or more paths are known to be associated
with random failures and the corresponding indicator processes are mutually independent, we can obtain tighter results than Proposition 3.2. To this end, we first
present the following result on the properties of a process that is obtained by using
โง operation on the output processes of two mutually-independent hidden Markov
models.
Theorem 3.3. Consider the binary-valued output processes {l(1) โ {0, 1}}tโN0
and {l(2) โ {0, 1}}tโN0 of hidden Markov models such that l(1) โ ฮp(1) ,p(1) , l(2) โ
(1)
(1)
(2)
0
(2)
1
(1)
ฮp(2) ,p(2) with p0 , p1 , p0 , p1 โ [0, 1]. Suppose that the Markov chains {ฮธl (t) โ
0
(1)
1
(2)
(2)
ฮl }tโN0 and {ฮธl (t) โ ฮl }tโN0 associated with the processes l(1) and l(2) are
(1)
(1) (2) (2)
(2) (1)
mutually independent. Let pฬ0 , min{p0 + p1 p0 , p0 + p1 p0 , 1} and pฬ1 ,
(1) (2)
p1 p1 . Then the process {lฬ(t) โ {0, 1}}tโN0 defined by
ห
l(t) = l(1) (t) โง l(2) (t),
(12)
t โ N0 ,
is the output process of a time-inhomogeneous hidden Markov model, and moreover,
lฬ โ ฮpฬ0 ,pฬ1 .
(1)
(2)
Proof. Let ฮlฬ , {(q (1) , q (2) ) : q (1) โ ฮl , q (2) โ ฮl } and define the bivariate
process {ฮธlฬ (t) โ ฮlฬ }tโN0 by
(1)
(2)
ฮธlฬ (t) = (ฮธl (t), ฮธl (t)),
t โ N0 .
It follows that {ฮธlฬ (t) โ ฮlฬ }tโN0 is a time-inhomogeneous Markov chain with ini(1)
(2)
(2)
(1)
tial distribution ฯlฬ(q(1) ,q(2) ) = ฯlq(1) ฯlq(2) , q (1) โ ฮl , q (2) โ ฮl , and time-varying
(1)
(2)
transition probabilities plฬ(q(1) ,q(2) ),(r(1) ,r(2) ) (t) = plq(1) ,r(1) (t)plq(2) ,r(2) (t), t โ N0 . Here,
for j โ {1, 2}, ฯl
(j)
(j)
and pl (ยท) respectively denote the initial distribution and the
12
CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL
(j)
(j)
transition probability function for the Markov chain {ฮธl (t) โ ฮl }tโN0 associated with the output process {l(j) โ {0, 1}}tโN0 . Furthermore, it follows from (12)
that
(1)
(1)
(2)
(2)
ห
l(t) = l(1) (t) โง l(2) (t) = l(1) (t)l(2) (t) = hl (ฮธl (t))hl (ฮธl (t)),
t โ N0 .
Now let hlฬ : ฮlฬ โ {0, 1} be given by
(1)
(2)
hlฬ ((q, r)) = hl (q)hl (r),
(q, r) โ ฮlฬ .
It follows that (6) holds with l replaced with lฬ. Thus, {lฬ(t) โ {0, 1}}tโN0 is the
output process of a time-inhomogeneous hidden Markov model.
Our next goal is to prove lฬ โ ฮpฬ0 ,pฬ1 by showing
X
(13)
plฬ(q(1) ,q(2) ),(r(1) ,r(2) ) (t) โค pฬ0 ,
(r (1) ,r (2) )โฮlฬ0
X
(14)
plฬ(q(1) ,q(2) ),(r(1) ,r(2) ) (t) โค pฬ1 ,
t โ N0 .
(r (1) ,r (2) )โฮlฬ1
First, we show (13). Observe that
ฮlฬ0 = {(r(1) , r(2) ) โ ฮlฬ : hlฬ ((r(1) , r(2) )) = 0}
(1)
(2)
= {(r(1) , r(2) ) โ ฮlฬ : hl (r(1) )hl (r(2) ) = 0}.
(15)
Now let j1 , j2 โ {1, 2} be such that j1 6= j2 . It follows from (15) that
ฮlฬ0 = {(r(1) , r(2) ) โ ฮlฬ : hl
(j1 )
โช {(r(1) , r(2) ) โ ฮlฬ : hl
(16)
Hence, by (16), we obtain
X
(r(j1 ) ) = 1, hl
(j1 )
(j2 )
(r(j2 ) ) = 0}
(r(j1 ) ) = 0}.
plฬ(q(1) ,q(2) ),(r(1) ,r(2) ) (t)
(r (1) ,r (2) )โฮlฬ0
=
X
plฬ(q(1) ,q(2) ),(r(1) ,r(2) ) (t)
(j )
(j )
r (j1 ) โฮ0l 1 ,r (j2 ) โฮl 2
+
X
(j1 )
r (j1 ) โฮ1l
X
=
(j1 )
r (j1 ) โฮ0l
+
X
X
r (j2 ) โฮl
(17)
+
(j2 )
,r (j2 ) โฮ0l
X
r (j2 ) โฮl
(j1 )
r (j1 ) โฮ1l
=
plฬ(q(1) ,q(2) ),(r(1) ,r(2) ) (t)
(j1 )
(j2 )
X
(j1 )
(j2 )
r (j2 ) โฮ0l
(j2 )
(j2 )
(j1 )
(j1 )
X
(j1 )
plq(j1 ) ,r(j1 ) (t)
(j1 )
r (j1 ) โฮ0l
plq(j1 ) ,r(j1 ) (t)
r (j1 ) โฮ1l
(j2 )
plq(j1 ) ,r(j1 ) (t)plq(j2 ) ,r(j2 ) (t)
plq(j2 ) ,r(j2 ) (t)
X
(j2 )
plq(j1 ) ,r(j1 ) (t)plq(j2 ) ,r(j2 ) (t)
X
(j2 )
pql (j2 ) ,r(j2 ) (t).
(j2 )
r (j2 ) โฮ0l
CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL
13
P
(j1 )
Now, since l(1) โ ฮp(1) ,p(1) , l(2) โ ฮp(2) ,p(2) , we have r(j1 ) โฮl(j1 ) plq(j1 ) ,r(j1 ) (t) โค
0
1
0
1
0
P
(j1 )
(j2 )
(j ) P
(j )
(j )
p0 1 , r(j1 ) โฮl(j1 ) plq(j1 ) ,r(j1 ) (t) โค p1 1 , and r(j2 ) โฮl(j2 ) plq(j2 ) ,r(j2 ) (t) โค p0 2 , t โ
1
0
P
(j2 )
N0 . Furthermore, we have r(j2 ) โฮl(j2 ) plq(j2 ) ,r(j2 ) (t) = 1, since the summation is
(j2 )
over all possible states r(j2 ) โ ฮl . Using these inequalities in (17), we obtain
X
(j )
(j ) (j )
(18)
plฬ(q(1) ,q(2) ),(r(1) ,r(2) ) (t) โค p0 1 + p1 1 p0 2 ,
(r (1) ,r (2) )โฮlฬ0
for t โ N0 . Since (18) holds for all j1 , j2 โ {1, 2} such that j1 6= j2 , we have
(19)
X
(1)
(1) (2)
(2)
(2) (1)
plฬ(q(1) ,q(2) ),(r(1) ,r(2) ) (t) โค min{p0 + p1 p0 , p0 + p1 p0 },
t โ N0 .
(r (1) ,r (2) )โฮlฬ0
P
Furthermore, noting that ฮlฬ0 โ ฮlฬ , we obtain (r(1) ,r(2) )โฮlฬ plฬ(q(1) ,q(2) ),(r(1) ,r(2) ) (t) โค
0
P
lฬ
p
(t)
=
1,
t
โ
N
.
By
using
this
inequality, it follows
lฬ
(1)
(2)
0
(1)
(2)
(1)
(2)
(r ,r )โฮ (q ,q ),(r ,r )
from (19) that (13) holds.
Next, we show (14). Notice that
ฮlฬ1 = {(r(1) , r(2) ) โ ฮlฬ : hlฬ ((r(1) , r(2) )) = 1}
(1)
(2)
= {(r(1) , r(2) ) โ ฮlฬ : hl (r(1) )hl (r(2) ) = 1}
(1)
(2)
= {(r(1) , r(2) ) โ ฮlฬ : hl (r(1) ) = 1, hl (r(2) ) = 1}.
(20)
Noting that l(1) โ ฮp(1) ,p(1) , l(2) โ ฮp(2) ,p(2) , we use (20) to obtain for t โ N0 ,
1
0
1
0
X
X
lฬ
plฬ(q(1) ,q(2) ),(r(1) ,r(2) ) (t)
p(q(1) ,q(2) ),(r(1) ,r(2) ) (t) =
(1)
(r (1) ,r (2) )โฮlฬ1
=
X
(1)
r (1) โฮl1
=
X
X
r (1) โฮl1
plq(1) ,r(1) (t)plq(2) ,r(2) (t)
(2)
r (2) โฮl1
X
(1)
plq(1) ,r(1) (t)
(1)
r (1) โฮl1
(2)
,r (2) โฮl1
(2)
(1)
(2)
(1) (2)
plq(2) ,r(2) (t) โค p1 p1 ,
(2)
r (2) โฮl1
which implies (14). Now since (13) and (14) hold, we have lฬ โ ฮpฬ0 ,pฬ1 .
(1)
(2)
Theorem 3.3 shows that when two hidden Markov output processes l and l
are combined with โง operation, the resulting process lฬ is also a hidden Markov
output process. Furthermore, Theorem 3.3 provides the values of pฬ0 , pฬ1 for which
lฬ โ ฮpฬ0 ,pฬ1 .
This result can be applied to obtain ฯG . For instance, consider the case c = 2,
where lP1 (ยท) and lP2 (ยท) are the output processes of hidden Markov models such
that lP1 โ ฮp(1) ,p(1) , lP2 โ ฮp(2) ,p(2) . It follows from Theorem 3.3 with l(1) = lP1 ,
0
1
0
1
(1) (2)
l(2) = lP2 , and lฬ = lG that lG โ ฮpฬ0 ,pฬ1 with pฬ1 , p1 p1 . Now, suppose that
(1) (2)
p1 p1 < 1. Notice that since lP1 โ ฮp(1) ,p(1) and lP2 โ ฮp(2) ,p(2) , we have lP1 โ
(1)
0
1
(2)
0
1
ฮฯP1 and lP2 โ ฮฯP2 with ฯP1 โ (p1 , 1) and ฯP2 โ (p1 , 1). The direct application
of Proposition 3.2 gives lG โ ฮฯG with ฯG = min{ฯP1 , ฯP2 }. However, by applying
Proposition 2.5, we can obtain a smaller value for ฯG . In fact by Proposition 2.5,
14
CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL
(1) (2)
we obtain lG โ ฮฯG for any ฯG โ (p1 p1 , 1). Notice that in the case where c > 2,
Theorem 3.3 can be applied repeatedly. For instance, when c = 3, we can use
Theorem 3.3 first for lP2 (t) โง lP3 (t) and then for lG (t) = lP1 (t) โง (lP2 (t) โง lP3 (t)).
Now consider the case where the graph G possesses some paths with indicator
processes that are mutually independent but not all of them are associated with
random failures. Even for this case, we can obtain results that are tighter than
Proposition 3.2. To this end, we first provide the following result where we derive
properties of a process that is obtained by using โง operation on a hidden Markov
output process l(1) โ ฮp(1) p(1) and a binary valued process l(2) โ ฮฯ(2) .
0
1
Theorem 3.4. Consider the binary-valued processes {l(1) โ {0, 1}}tโN0 and {l(2) โ
(1)
{0, 1}}tโN0 that satisfy l(1) โ ฮp(1) ,p(1) and l(2) โ ฮฯ(2) with p1 ฯ(2) < 1. Then the
0
1
process {lฬ(t) โ {0, 1}}tโN0 defined by
ห = l(1) (t) โง l(2) (t),
(21)
l(t)
t โ N0 ,
(1)
satisfies ห
l โ ฮฯฬ for all ฯฬ โ (p1 ฯ(2) , 1].
(1)
(1)
Proof. We will first show that lฬ โ ฮฯฬ for ฯฬ โ (p1 ฯ(2) , min{p1 , ฯ(2) }). Let วซ ,
(1)
ฯฬ โ p1 ฯ(2) . Note that ฯ(2) + วซ(1) < 1. It follows that {ฯ(t) , {0, 1}}tโN0 defined
2p1
by ฯ(t) = l
(2)
(2)
(t), t โ N0 , satisfies (8) with wฬ = p1 +
(1)
วซ
(1) .
2p1
Furthermore, {ฮพ(t) ,
(1)
(1)
{0, 1}}tโN0 defined by ฮพ(t) = ฮธl (t), t โ N0 , satisfies (7) with pฬ = p1 , h = hl ,
(1)
(1)
ฮ = ฮl , and ฮ1 = ฮl1 . It then follows from Lemma 2.6 that for all ฯ โ (pฬwฬ, wฬ),
we have
X
X kโ1
X kโ1
X
P[
h(ฮพ(t))ฯ(t) > ฯk] =
P[
l(1) (t) โง l(2) (t) > ฯk] < โ.
kโN
t=0
kโN
(1)
p1 ฯ(2)
t=0
(1)
< p1 ฯ(2) and wฬ = ฯ(2) + วซ
(1)
(1)
ฯฬ โ (p1 ฯ(2) , min{p1 , ฯ(2) }).
(1)
> min{p1 , ฯ(2) }, it
+
Now since pฬwฬ =
follows that ห
l โ ฮฯฬ holds for
This implies หl โ ฮฯฬ ,
(1) (2)
ฯฬ โ [min{p1 , ฯ }, 1], since ฮฯ1 โ ฮฯ2 for any ฯ1 , ฯ2 โ [0, 1] such that ฯ1 โค ฯ2 .
(1)
(1)
(1)
Consequently, we have ห
l โ ฮฯฬ for ฯฬ โ (p1 ฯ(2) , 1] = (p1 ฯ(2) , min{p1 , ฯ(2) }) โช
(1) (2)
[min{p1 , ฯ }, 1].
วซ
2
Theorem 3.4 is concerned with โง operation applied to a process l(1) (ยท) from the
hidden Markov model class ฮp(1) ,p(1) and another process l(2) (ยท) from the class ฮฯ(2) .
(1)
0
1
It is shown that if p1 ฯ(2) < 1, then this operation results in a process lฬ that satisfies
(1)
lฬ โ ฮฯฬ for all ฯฬ โ (p1 ฯ(2) , 1]. We note that the application of Proposition 3.2 to
(1)
this situation would allow us to show หl โ ฮฯฬ for all ฯฬ โ (min{p1 , ฯ(2) }, 1]. Notice
(1)
(1)
that Proposition 3.2 in this case is conservative since min{p1 , ฯ(2) } > p1 ฯ(2) . On
the other hand, we note that Proposition 3.2 allows us to deal with processes that
are not mutually independent.
4. Packet Transmission Failures on Paths of a Network
So far, in the previous section, we have looked at how packet failures on the
paths of a network affect the overall packet transmission rate. In this section, our
goal is to explore the effect of the failures at individual nodes and links of a path.
CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL
15
To this end, we first consider the scenario where packet transmission failures occur
due to only data corruption. We then explore the case where data corruption and
packet drops may occur on the same path.
4.1. Characterization for Data Corrupting Paths. Let Pi,j denote the jth
P
edge on path Pi . We use the binary-valued process {lPii,j (t) โ {0, 1}}tโN0 to denote
the data corruption indicator for this link. For example, in Fig. 1, consider the
(v ,v )
second edge P1,2 = (v1 , vC ) of path P1 in (10). The state lP11 C (t) = 1 indicates
that at time t, the packet flowing on path P1 faces data corruption on the link
(v1 , vC ). This may be due to a jamming attack on this link, or due to channel
noise, and moreover, it may also be the case that the node v1 maliciously corrupts
the packet.
The notation for the data corruption indicator allows us to distinguish data
corruption issues when we consider the same communication link on different paths.
For instance, communication link (v4 , vC ) is on both P2 and P3 . It may be the case
that node v4 corrupts all packets transmitted along P2 , but none of the packets
(v ,v )
transmitted along P3 . This situation can be described by setting lP24 C (t) = 1,
(v ,v )
t โ N0 , and lP34 C (t) = 0, t โ N0 .
State packet transmitted through path Pi is subject to data corruption if there
is data corruption on one (or more) of the edges in this path. Hence, for each
i โ {1, . . . , c},
P
Pi,|Pi |
P
lPi (t) = lPii,1 (t) โจ lPii,2 (t) โจ ยท ยท ยท โจ lPi
(22)
(t).
The next result shows that an upper-bound for the asymptotic transmission
failure rate of a path can be given as the sum of the failure rate bounds of the links
on the path.
P
Proposition 4.1. Consider {lPi (t) โ {0, 1}}tโN0 given by (22). Assume lPii,j โ
P|Pi | Pi,j
P
ฮฯPi,j , j โ {1, . . . , |Pi |}, where ฯPi,j
โ [0, 1], j โ {1, . . . , |Pi |}, satisfy j=1
ฯPi โค
i
Pi
P|Pi | Pi,j
1. Then lPi โ ฮฯPi with ฯPi , j=1 ฯPi .
P|Pi | Pkโ1 Pi,j
Pkโ1
Proof. By (22), t=0 lPi (t) โค j=1
t=0 lPi (t). Hence,
(23)
P[
kโ1
X
lPi (t) > ฯPi k] โค P[
t=0
|Pi | kโ1
X
X
P
lPii,j (t) > ฯPi k] โค
j=1 t=0
|Pi |
X
j=1
for k โ N, where to obtain the last inequality, we used
P[
|Pi |
X
j=1
|P |
i
{ฮณj > 0}] โค
ฮณj > 0] โค P[โชj=1
|Pi |
X
P[
kโ1
X
P
P
lPii,j (t) > ฯPi,j
k],
i
t=0
P[ฮณj > 0]
j=1
Pkโ1 P
P
P
k. The result then follows from (23) since lPii,j โ
with ฮณj , t=0 lPii,j (t) โ ฯPi,j
i
ฮ Pi,j , j โ {1, . . . , |Pi |}.
ฯP
i
Proposition 4.1 can be used to characterize overall failures on a path. Note
that in Proposition 4.1, the indicators for the links are not necessarily mutuallyindependent processes. This allows us to model failures on different links that
16
CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL
depend on each other. In particular, we can explore the effect of interference between links as well as coordinated jamming attacks targeting several links at the
same time.
Note that in certain cases the result provided in Proposition 4.1 can be improved
in terms of conservativeness. In particular, if one or more links in a path are known
to be associated with random failures and the corresponding indicator processes
are mutually independent, we can obtain less conservative results in comparison
to Proposition 4.1. The following result is the counterpart of Theorem 3.3 for โจ
operation and it is concerned with output processes of two mutually-independent
hidden Markov models.
Theorem 4.2. Consider the binary-valued output processes {l(1) โ {0, 1}}tโN0
and {l(2) โ {0, 1}}tโN0 of hidden Markov models such that l(1) โ ฮp(1) ,p(1) , l(2) โ
(1)
(1)
(2)
0
(2)
1
(1)
ฮp(2) ,p(2) with p0 , p1 , p0 , p1 โ [0, 1]. Suppose that the Markov chains {ฮธl (t) โ
0
(1)
1
(2)
(2)
ฮl }tโN0 and {ฮธl (t) โ ฮl }tโN0 associated with the processes l(1) and l(2)
(1) (2)
(1)
(1) (2) (2)
are mutually independent. Let pฬ0 , p0 p0 and pฬ1 , min{p1 + p0 p1 , p1 +
(2) (1)
p0 p1 , 1}. Then the process {lฬ(t) โ {0, 1}}tโN0 defined by
ห
l(t) = l(1) (t) โจ l(2) (t),
(24)
t โ N0 ,
is the output process of a time-inhomogeneous hidden Markov model, and moreover,
lฬ โ ฮpฬ0 ,pฬ1 .
(1)
(2)
Proof. Let ฮlฬ , {(q (1) , q (2) ) : q (1) โ ฮl , q (2) โ ฮl } and define the bivariate
process {ฮธlฬ (t) โ ฮlฬ }tโN0 by
(1)
(2)
ฮธlฬ (t) = (ฮธl (t), ฮธl (t)),
t โ N0 .
It follows that {ฮธlฬ (t) โ ฮlฬ }tโN0 is a time-inhomogeneous Markov chain with ini(1)
(2)
(2)
(1)
tial distribution ฯlฬ(q(1) ,q(2) ) = ฯlq(1) ฯlq(2) , q (1) โ ฮl , q (2) โ ฮl , and time-varying
(2)
(1)
transition probabilities plฬ(q(1) ,q(2) ),(r(1) ,r(2) ) (t) = plq(1) ,r(1) (t)plq(2) ,r(2) (t), t โ N0 . Here,
(j)
(j)
for j โ {1, 2}, ฯl and pl (ยท) respectively denote the initial distribution and the
(j)
(j)
transition probability function for the Markov chain {ฮธl (t) โ ฮl }tโN0 associated with the output process {l(j) โ {0, 1}}tโN0 . Furthermore, it follows from (12)
that
ห
l(t) = l(1) (t) โจ l(2) (t) = l(1) (t) + (1 โ l(1) (t))l(2) (t)
(1)
(1)
(1)
(1)
(2)
(2)
= hl (ฮธl (t)) + (1 โ hl (ฮธl (t)))hl (ฮธl (t)),
for t โ N0 . Now let hlฬ : ฮlฬ โ {0, 1} be given by
(1)
(1)
(2)
hlฬ ((q, r)) = hl (q) + (1 โ hl (q))hl (r),
(q, r) โ ฮlฬ .
It follows that (6) holds with l replaced with lฬ. Thus, {lฬ(t) โ {0, 1}}tโN0 is the
output process of a time-inhomogeneous hidden Markov model.
To show ห
l โ ฮpฬ0 ,pฬ1 , we can apply Theorem 3.3. To this end, we first note that
for an output process l โ ฮp0 ,p1 , the complementing process {lc (t) โ {0, 1}}tโN0
given by lc (t) = 1 โ l(t), t โ N0 , is the output process of a time-inhomogeneous
hidden Markov model, for which ฮlc = ฮl , ฮธlc (t) = ฮธl (t), t โ N0 . Furthermore, we
have ฮl0c = ฮl1 and ฮl1c = ฮl0 , since hlc ((q, r)) = 1 โ hl ((q, r)), (q, r) โ ฮlc = ฮl .
CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL
17
As a consequence, we have l โ ฮp0 ,p1 if and only if lc โ ฮp1 ,p0 . In the following,
we show lฬ โ ฮpฬ0 ,pฬ1 by proving that {lฬc (t) โ {0, 1}}tโN0 given by หlc (t) = 1 โ หl(t),
t โ N0 , satisfies lฬc โ ฮpฬ1 ,pฬ0 .
lc (t) = 1โหl(t) = 1โl(1) (t)โจl(2) (t) = (1โl(1) (t))โง(1โl(2) (t)) =
First, observe that ห
(1)
(2)
(i)
lc (t) โง lc (t), where lc (t) = 1 โ l(i) (t), i โ {1, 2}. Since l(1) โ ฮp(1) ,p(1) , l(2) โ
(1)
ฮp(2) ,p(2) , we have lc
0
1
(2)
โ ฮp(1) ,p(1) , lc
1
0
0
1
โ ฮp(2) ,p(2) . Finally, noting that lฬc (ยท) is
1
(1)
0
(2)
obtained by using โง operation on processes lc (ยท), lc (ยท), we can use Theorem 3.3,
to obtain ห
lc โ ฮpฬ1 ,pฬ0 , which implies หl โ ฮpฬ0 ,pฬ1 .
Theorem 4.2 shows that when two hidden Markov output processes l(1) and l(2)
are combined with โจ operation, the resulting process lฬ is also a hidden Markov
output process. Furthermore, it provides the values of pฬ0 , pฬ1 for which lฬ โ ฮpฬ0 ,pฬ1 .
Theorem 4.2 can be applied in obtaining ฯPi for a given path Pi . Consider
for example a path Pi with |Pi | = 2 links. Assume that the failure indicator
P
P
processes lPii,1 (ยท), lPii,2 (ยท) associated with the links are mutually independent and
P
P
P
lPii,1 โ ฮp(1) ,p(1) , lPii,2 โ ฮp(2) ,p(2) . It follows from Theorem 4.2 with l(1) (t) = lPii,1 (t)
0
1
0
P
1
(1) (2)
and l(2) (t) = lPii,2 (t) that lPi โ ฮpฬ0 ,pฬ1 with pฬ0 = p0 p0
(1) (2)
(2)
(2) (1)
(1)
(1)
and pฬ1 = min{p1 +
(1) (2)
(2)
(2) (1)
p0 p1 , p1 + p0 p1 , 1}. Furthermore, if min{p1 + p0 p1 , p1 + p0 p1 } < 1,
(1)
(1) (2) (2)
then by Proposition 2.5, we have lPi โ ฮฯPi with ฯPi โ (min{p1 + p0 p1 , p1 +
(2) (1)
p0 p1 }, 1]. On the other hand, the direct application of Proposition 4.1 provides
P
a conservative result. To apply Proposition 4.1, notice first that lPii,1 โ ฮฯPi,1 ,
P
(2)
(1)
lPii,2 โ ฮฯPi,2 with ฯPi,1 โ (p1 , 1] and ฯPi,2 โ (p1 , 1]. Hence, by Proposition 4.1,
we obtain the value ฯPi = ฯPi,1 + ฯPi,2 , which implies that lPi โ ฮฯPi with ฯPi โ
(1)
(2)
(1)
(1) (2)
(2)
(2) (1)
(1)
(2)
(p1 + p1 , 1]. The inequality min{p1 + p0 p1 , p1 + p0 p1 } โค p1 + p1 allows
us to conclude that Theorem 4.2 provides a less conservative range for ฯPi compared
to Proposition 4.1.
In certain scenarios a path Pi may be composed of communication links with
mutually-independent indicator processes some of which are not associated with
random failures. In such scenarios, it is again possible to obtain results that are
less conservative than those in Proposition 4.1. Specifically, in the following result
we obtain properties of a process that is obtained by using โจ operation on a hidden
Markov output process l(1) โ ฮp(1) p(1) and a binary valued process l(2) โ ฮฯ(2) .
0
1
Theorem 4.3. Consider the binary-valued processes {l(1) โ {0, 1}}tโN0 and {l(2) โ
(1)
(1)
{0, 1}}tโN0 that satisfy l(1) โ ฮp(1) ,p(1) and l(2) โ ฮฯ(2) with p1 +p0 ฯ(2) < 1. Then
0
1
the process {lฬ(t) โ {0, 1}}tโN0 defined by
(25)
ห
l(t) = l(1) (t) โจ l(2) (t),
t โ N0 ,
(1)
(1)
satisfies ห
l โ ฮฯฬ for all ฯฬ โ (p1 + p0 ฯ(2) , 1].
Proof. Notice that since ห
l(ยท) is a binary-valued process, we have ฮฯฬ for ฯฬ = 1. Next,
(1)
(1)
ห
we show l โ ฮฯฬ for ฯฬ โ (p1 + p0 ฯ(2) , 1). First, (25) implies
(26)
lฬ(t) = l(1) (t) + (1 โ l(1) (t))l(2) (t),
t โ N0 .
18
CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL
Pkโ1 ห
t=0 l(t). It follows from (26) that
Let Lฬ(k) ,
(27)
Lฬ(k) =
kโ1
X
l(1) (t) +
t=0
(1)
kโ1
X
(1 โ l(1) (t))l(2) (t),
k โ N.
t=0
(1) (2)
ฯ(2) โp
(1)
ฯ
0
}, วซ1 , วซ โ วซ2 , and define
Now, let วซ , ฯฬ โ p1 โ p0 ฯ(2) , วซ2 , min{ 2วซ ,
2
Pkโ1 (1)
(1)
(1) (2)
(t) and
ฯฬ1 , p1 + วซ1 , ฯฬ2 , p0 ฯ + วซ2 . Furthermore, let Lฬ1 (k) ,
t=0 l
Pkโ1
(1)
(2)
Lฬ2 (k) , t=0 (1 โ l (t))l (t). We then have
P[Lฬ(k) > ฯฬk] = P[Lฬ1 (k) + Lฬ2 (k) > ฯฬ1 k + ฯฬ2 k]
oi
o n
hn
โค P Lฬ1 (k) > ฯฬ1 k โช Lฬ2 (k) > ฯฬ2 k
โค P[Lฬ1 (k) > ฯฬ1 k] + P[Lฬ2 (k) > ฯฬ2 k].
Pโ
P
In the following we show k=1 P[Lฬ1 (k) > ฯฬ1 k] < โ and โ
k=1 P[Lฬ2 (k) > ฯฬ2 k] < โ.
First, note that
(28)
(1)
วซ (1)
ฯ(2) โ p0 ฯ(2)
(1)
(1)
ฯฬ1 = p1 + วซ โ วซ2 = max{p1 + , p1 + วซ โ
}
2
2
(1)
(1)
(1)
ฯ(2) โ p0 ฯ(2)
p + ฯฬ โ p0 ฯ(2)
(1)
, ฯฬ โ p0 ฯ(2) โ
}
= max{ 1
2
2
(1)
(1)
p + ฯฬ โ p0 ฯ(2) 2ฯฬ โ ฯ(2) (1 + p0 )
,
}.
= max{ 1
2
2
(29)
(1)
p
(1) (2)
+ฯฬโp
(2)
ฯ
(1)
0
As 1
< 1 and 2ฯฬโฯ 2(1+p0 ) < 1, it holds from (29) that ฯฬ1 โ (p1 , 1).
2
(1)
Since l
โ ฮp(1) ,p(1) , we can use Proposition 2.5 with ฯ replaced with ฯฬ and l
0
1
Pโ
replaced with l(1) to obtain k=1 P[Lฬ1 (k) > ฯ1 k] < โ.
P
Next, we use Lemma 2.6 to show that โ
k=1 P[Lฬ2 (k) > ฯฬ2 k] < โ. To obtain
(1) (2)
this result, we first observe that ฯฬ2 > p0 ฯ , since วซ2 > 0. Moreover,
(1)
(1)
วซ ฯ(2) โ p0 ฯ(2)
ฯ(2) โ p0 ฯ(2)
(1)
(1)
ฯ2 = p0 ฯ(2) + min{ ,
} โค p0 ฯ(2) +
2
2
2
(1) (2)
(1) (2)
(2)
(2)
< p0 ฯ + ฯ โ p0 ฯ = ฯ ,
(1)
(1)
and hence, we have ฯ2 โ (p0 ฯ(2) , ฯ(2) ). Let {lc (t) โ {0, 1}}tโN0 be defined by
(1)
(1)
lc (t) = 1 โ l(1) (t), i โ {1, 2}. Since l(1) โ ฮp(1) ,p(1) , we have lc โ ฮp(1) ,p(1) .
0
1
1
0
Furthermore, since l(2) โ ฮฯ(2) , conditions (7), (8) in the Lemma 2.6 hold with
(1)
pฬ = p0 and wฬ = ฯ(2) , together with processes {ฮพ(t) โ {0, 1}}tโN0 and {ฯ(t) โ
{0, 1}}tโN0 defined by setting ฮพ(t) = ฮธlc (t), ฯ(t) = lM (t), t โ N0 . Now, we have
Pโ
Pkโ1
Lฬ2 (k) = t=0 ฮพ(t)ฯ(t) and hence, Lemma 2.6 implies k=1 P[Lฬ2 (k) > ฯฬ2 k] < โ.
Finally, by (28), we arrive at
โ
X
k=1
P[Lฬ(k) > ฯฬk] โค
โ
X
P[Lฬ1 (k) > ฯฬ1 k] +
k=1
โ
X
P[Lฬ2 (k) > ฯฬ2 k] < โ,
k=1
(1)
(1)
which shows that ห
l โ ฮฯฬ for all ฯฬ โ (p1 + p0 ฯ(2) , 1].
(1)
Theorem 4.3 is concerned with โจ operation applied to a process l (ยท) from the
hidden Markov model class ฮp(1) ,p(1) and another process l(2) (ยท) from the class ฮฯ(2) .
0
1
CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL
19
It is shown that the โจ operation results in a process lฬ that satisfies lฬ โ ฮฯฬ for all
(1)
(1)
ฯฬ โ (p1 +p0 ฯ(2) , 1]. Notice that the application of Proposition 3.2 to this situation
(1)
would allow us to show lฬ โ ฮฯฬ for all ฯฬ โ (p1 + ฯ(2) , 1]. Proposition 4.1 in this case
(1)
(1)
(1)
(1)
(1)
(1)
is conservative since p1 + ฯ(2) โฅ p1 + p0 ฯ(2) (and p1 + ฯ(2) > p1 + p0 ฯ(2) if
(1)
p0 < 1). We remark that the advantage of Proposition 4.1 may be that it allows
us to deal with processes that are not mutually independent.
4.2. A General Characterization of Paths with Data Corruption and
Packet Drops. In the previous section, we provided a characterization for paths
with data-corrupting links. In what follows we extend this characterization to consider effects of both data corruption and packet dropouts. Without loss of generality, we assume that links on a path are either data-corrupting or packet-dropping,
but not both. Note that if in the original network, a link (v, w) is subject to both
of the issues, we can artificially add a node v โฒ and edges (v, v โฒ ), (v โฒ , w) to the graph,
and consider (v, v โฒ ) as a packet-dropping link and (v โฒ , w) as a data-corrupting link.
For a data-corrupting link (v, w), packets available at v are always transmitted
to w, but their content may be externally manipulated or damaged during the
transmission over this link. On the other hand, if (v, w) is a packet-dropping link,
packets available at v may or may not be transmitted to w, but never get corrupted
on link (v, w). A packet dropout may occur if v is a malicious router that intentionally skips forwarding packets (see blackhole and grayhole attacks in [19]). A
nonmalicious router may also drop packets to avoid congestion. In addition to these
two issues, a packet may also be dropped if the header part of the packet, which
includes information on the destination of the packet, is corrupted. Furthermore, in
scenarios where error-detection is implemented at intermediate nodes, corruption
on the data part of a packet can be detected. As a result, a corrupted packet need
not be further transmitted. Such a scenario can also be studied within the packet
drop framework.
Consider a link Pi,j = (v, w) on path Pi . Let t = 0, 1, . . ., denote the indices
of packets that node v possesses (or receives from previous nodes on path Pi ).
Observe that if there are links before Pi,j that are packet-dropping, then the first
packet (with index t = 0) that v receives may be different from x(0), and it may
be the state at a later time. This is because x(0) may have been dropped before
reaching node v. We use lPi,j (t) โ {0, 1} to indicate the status of transmission of
the (t + 1)th packet (with index t) that node v possesses to node w.
Our goal here is to obtain a relation between the asymptotic packet failure ratio
of path Pi and the failure ratios of the links on that path. To this end, we will
use a recursive characterization for describing packet failures on paths. Specifically,
consider a path
(30)
P , (v1 , v2 ), (v2 , v3 ), . . . , (vh , vh+1 )
of h โฅ 1 links, and consider the associated process {lP (t) โ {0, 1}}tโN0 . The state
lP (t) = 0 indicates that the (t + 1)th packet that the first node v1 possesses can
be successfully transmitted to the last node vh+1 , whereas lP (t) = 1 indicates a
failure.
(v ,v )
If h = 1 in (30), then we have lP (t) = lP 1 2 (t), t โ N0 . Now consider the
case h โฅ 2, and let f (P) and R(P) respectively denote the first link on P, and the
20
CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL
subpath composed of the rest of the links, that is,
(31)
(32)
f (P) = (v1 , v2 ),
R(P) = (v2 , v3 ), . . . , (vh , vh+1 ) .
We illustrate f (P) and R(P) on the left side of Fig. 2.
Next, we show that transmission failures on a path P can be characterized
f (P)
through transmission failures on the link f (P) and the subpath R(P). Let {lP (t) โ
R(P)
{0, 1}}tโN0 and {lP (t) โ {0, 1}}tโN0 denote indicators of transmission failures
on the link f (P) and the subpath R(P). If the link f (P) = (v1 , v2 ) is a dataf (P)
R(P)
corrupting link, then we would have lP (t) = lP (t) โจ lP (t). But this relation
f (P)
does not hold if f (P) is a packet-dropping link, because the index t for lP (t) and
R(P)
lP (t) represent different packets.
R(P)
Now, we will introduce a new process {b
lP (t) โ {0, 1}}tโN0 for which
(33)
f (P)
lP (t) = lP
R(P)
(t) โจ b
lP (t),
t โ N0 .
R(P)
R(P)
If f (P) is a data-corrupting link, then we define b
lP (ยท) by setting b
lP (t) =
R(P)
lP (t), t โ N0 . On the other hand, if f (P) is a packet-dropping link, then for
t โ N0 ,
(
f (P)
0,
if lP (t) = 1,
R(P)
b
lP (t) , R(P)
(34)
f (P)
lP
kฬ(t + 1) โ 1 , if lP (t) = 0,
Ptโ1
f (P)
where kฬ(t) , i=0 (1 โ lP (i)), t โ N. In this definition, kฬ(t + 1) denotes the
number of packets that are successfully transmitted from node v1 to node v2 among
the first t+1 packets that node v1 possesses. Hence, the scalar kฬ(t+1)โ1 represents
R(P)
the index of the kฬ(t + 1)th packet received by v2 . Moreover, lP
kฬ(t + 1) โ 1
indicates whether this packet is successfully transmitted from v2 over R(P) to vh+1 .
R(P)
Observe that by (34), b
lP (t) is set to 0, if v1 drops the (t + 1)th packet that it
R(P)
possesses. On the other hand, if v1 transmits this packet to v2 , the state b
lP (t) =
1 indicates that further transmission of this packet on subpath R(P) has failed,
R(P)
f (P)
whereas b
lP (t) = 0 indicates success. As a result, we have lP (t) = lP (t) + (1 โ
R(P)
f (P)
lP (t), and hence, (33) holds.
lP (t))b
The characterization above is recursive in the sense that it is recursively applied
to describe failures on R(P) by means of failures on the first link f (R(P)) and the
subpath R(R(P)).
Example 4.4. In Fig. 2, we see a path P, its packet-dropping first link f (P) =
R(P)
f (P)
lP (ยท),
(v1 , v2 ), and its subpath R(P), together with sample trajectories of lP (ยท), b
R(P)
lP (ยท) and lP (ยท). Note that the link f (P) = (v1 , v2 ) drops the first two packets, that
R(P)
R(P)
f (P)
lP (1) = 0, and as
lP (0) = b
is, lP (t) = 1 for t โ {0, 1}. By (34), we have b
a consequence of (33), lP (0) = lP (1) = 1. Furthermore, the link f (P) successfully
f (P)
R(P)
transmits the 3rd packet, i.e, lP (2) = 0. The value of b
lP (2) represents whether
this packet is successfully transmitted over the subpath R(P) or not. Since this
packet is the first packet that v2 receives, its transmission state is represented by
R(P)
R(P)
R(P)
R(P)
lR(P) (0), and as a result, b
lP (2) = lP (0). We have b
lP (2) = lP (0) = 0,
CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL
21
Figure 2. [Left] Paths P, R(P), and packet-dropping link f (P).
f (P)
[Right] Trajectories of lP
R(P)
R(P)
(ยท), b
lP (ยท), lP (ยท) and lP (ยท).
indicating successful transmission over R(P). Now, by (33), lP (2) = 0, which
indicates that the 3rd packet possessed by the first node v1 is successfully transmitted
to the last node vh+1 .
The following result is essential for characterizing the failures on path P through
those on the first link f (P) and the subpath R(P). We obtain the result by first
Pkโ1 R(P)
Pkโ1 R(P)
establishing the key inequality t=0 b
lP (t) โค t=0 lP (t), and then applying
some of the arguments that we employed for proving Proposition 4.1.
f (P)
Lemma 4.5. Consider path P given in (30) for h โฅ 1. Assume lP
f (P) R(P)
โ [0, 1],
โ ฮฯR(P) with scalars ฯP , ฯP
P
f (P)
R(P)
follows that lP โ ฮฯP with ฯP = ฯP + ฯP .
R(P)
lP
such that
f (P)
ฯP
+
โฮ
f (P)
ฯP
R(P)
โค
ฯP
and
1. It
R(P)
Proof. We will first show that b
lP
โ ฮฯR(P) . If f (P) is a data-corrupting link,
P
R(P)
R(P)
R(P)
โ ฮฯR(P) . Now consider
lP
we have b
lP (t) = lP (t), t โ N0 , and therefore b
P
the situation where f (P) is a packet-dropping link. For this case,
kโ1
X
t=0
R(P)
b
lP (t) =
(
0,
Pkฬ(k)โ1
t=0
kฬ(k) = 0,
R(P)
lP (t),
kฬ(k) 6= 0,
k โ N.
Pkฬ(k)โ1 R(P)
Pkโ1 R(P)
Since kฬ(k) โค k and lR(P) (t) โฅ 0, we have t=0
lP (t) โค t=0
lP (t), and
Pkโ1 R(P)
Pkโ1 bR(P)
hence, t=0 lP (t) โค t=0 lP (t). It follows that
P[
kโ1
X
t=0
R(P)
Now, as lP
R(P)
R(P)
b
lP (t) > ฯP k] โค P[
R(P)
โ ฮฯR(P) , we also have b
lP
P
kโ1
X
R(P)
lP
t=0
โ ฮฯR(P) .
P
R(P)
(t) > ฯP
k].
22
CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL
f (P)
Finally, since (33) holds, we have lP (t) โค lP
P[
kโ1
X
lP (t) > ฯP k] โค P[
t=0
= P[
โค P[
f (P)
lP
(t) +
f (P)
lP
(t) +
kโ1
X
kโ1
X
t=0
f (P)
lP (t)
>
kโ1
X
t=0
t=0
kโ1
X
t=0
(35)
kโ1
X
R(P)
(t) + b
lP (t), t โ N0 . Hence,
R(P)
b
lP (t) > ฯP k]
R(P)
f (P)
R(P)
b
lP (t) > (ฯP + ฯP )k]
f (P)
ฯP k]
+ P[
kโ1
X
t=0
t=0
Pโ
R(P)
R(P)
b
lP (t) > ฯP k].
Pkโ1 f (P)
f (P)
It then follows from (35) together with k=1 P[ t=0 lP (t) > ฯP k] < โ and
Pโ
Pkโ1
Pโ
Pkโ1 bR(P)
R(P)
(t) > ฯP k] < โ that
k=1 P[ t=0 lP (t) > ฯP k] < โ,
k=1 P[ t=0 lP
which completes the proof.
Now, for a given path Pi , repeated application of Lemma 4.5 to Pi , R(Pi ),
R(R(Pi )), . . ., allows us to obtain the following result.
P
P
โ [0, 1], j โ {1, . . . , |Pi |}, that
Theorem 4.6. Assume lPii,j โ ฮฯPi,j with ฯPi,j
i
Pi
P|Pi | Pi,j
P|Pi | Pi,j
ฯPi .
satisfy j=1 ฯPi โค 1. Then lPi โ ฮฯPi with ฯPi , j=1
Note that Theorem 4.6 allows us to consider both data-corruption and packetdropouts on links, and hence it generalizes Proposition 4.1.
Remark 4.7. By utilizing Theorem 4.6 together with Proposition 3.2, we can obtain ฯG , ฯGฬ โ [0, 1] as upper-bounds for the average number of packet exchange
failures on networks G and Gฬ such that lG โ ฮฯG and lGฬ โ ฮฯGฬ . Note that when
lG (t) = 1, then the controller either does not receive the state packet or receives
corrupted versions, which are discarded. Hence, when lG (t) = 1, no control input
packet is attempted to be transmitted on Gฬ. This setting is similar to the situation
that we discussed above for packet dropping links. Here we can consider the whole
networked system as a path P from the node vP to node vฬP , where lG (ยท) corresponds
to the indicator for the first packet dropping link (f (P)) and lGฬ (ยท) corresponds to
packet transmission failure indicator for the rest of the path (R(P)). Hence, using arguments similar to the ones used above, we can show that if ฯG + ฯGฬ โค 1,
then l โ ฮฯ with ฯ = ฯG + ฯGฬ . This ฯ value is utilized for stability analysis with
Theorem 2.3.
5. Illustrative Numerical Examples
In this section, we present illustrative examples to demonstrate the utility of our
results in the characterization of communication failures on multi-hop networks. We
also investigate the effect of those failures on the stability of a multi-hop networked
control system.
Consider the networked control system (1), (2) with
1
0.1
0.1
A=
, B=
(36)
, K = โ2.9012 โ0.9411
โ0.5 1.1
1.2
together with the networks G and Gฬ in Fig. 1. This system was explored previously
in [26] with a single channel network model. Here, differently from [26], we consider
CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL
23
networks G and Gฬ that incorporate multiple paths and multiple links for packet
transmissions.
In what follows, we investigate various scenarios where we demonstrate the utility
of our results in Sections 3 and 4 for characterizing overall network failures. For
each different scenario, our goal is to find out the level of transmission failures that
can be tolerated on the communication links so that the stability of the system (1),
(2) is guaranteed.
5.1. Data corruption/packet dropout issues on both networks G and Gฬ.
Consider the scenario where all links on both networks G and Gฬ are subject to
malicious/nonmalicious data corruption or packet dropout issues. We explore the
general situation where the failures may depend on each other. For this general
setup, we can use Proposition 3.2 and Theorem 4.6 for the characterization of the
overall transmission failures between the plant and the controller. As explained in
Remark 4.7, the overall packet exchange failure process l(ยท) satisfies Assumption 2.2
with ฯ = ฯG + ฯGฬ . Here, ฯG and ฯGฬ are asymptotic failure ratios for the networks
G and Gฬ, that is, lG โ ฮฯG , lGฬ โ ฮฯGฬ .
To find the values of ฯG and ฯGฬ , we can use Proposition 3.2 and Theorem 4.6. In
particular, by Proposition 3.2 and Theorem 4.6, we obtain ฯG = miniโ{1,...,c=3} ฯPi
P|Pi | Pi,j
where ฯPi =
j=1 ฯPi . Similarly, we have ฯGฬ = miniโ{1,...,cฬ} ฯPฬi and ฯPฬi =
P|Pฬi | Pฬi,j
j=1 ฯPฬ , where cฬ = 4 is the number of paths (denoted by Pฬi ) from the controller
i
node vฬC to the plant node vฬP on the network Gฬ. Consequently, Assumption 2.2
holds with
ฯ=
min
iโ{1,...,c}
|Pi |
X
P
+
ฯPi,j
i
j=1
|Pฬi |
X
min
iโ{1,...,cฬ}
Pฬ
ฯPฬi,j .
i
j=1
P
Pฬ
The effect of the asymptotic packet failure ratios ฯPi,j
, ฯPฬi,j on the stability of
i
i
the networked system can be analyzed by using Theorem 2.3. First, we identify
the values of asymptotic packet exchange failure ratio ฯ in Assumption 2.2, for
which the stability conditions (3)โ(5) hold. For this numerical example, there
exist a positive-definite matrix P and scalars ฮฒ โ (0, 1), ฯ โ [1, โ) that satisfy
(3)โ(5), when ฯ is less than 0.411. Hence, Theorem 2.3 guarantees that the zero
solution of the closed-loop system (1), (2) is asymptotically stable almost surely if
the asymptotic packet transmission failure ratios satisfy
(37)
min
iโ{1,...,c}
|Pi |
X
j=1
P
ฯPi,j
+
i
min
iโ{1,...,cฬ}
|Pฬi |
X
Pฬ
ฯPฬi,j โค 0.411.
i
j=1
The system operator can guarantee (37) by ensuring that at least one path in
each network is sufficiently secure and reliable. In particular, if there exist a
P|Piโ | Piโ ,j
path Piโ in network G and a path Pฬiโ in network Gฬ such that
j=1 ฯPiโ +
P|Pฬiโ | Pฬiโ ,j
j=1 ฯPฬiโ โค 0.411, then (37) holds and the stability is guaranteed regardless of
the security/reliability of all other paths. Another approach to guarantee (37) is
to ensure a certain level of security/reliability for all links. For this example, if
P
Pฬ
, ฯPฬi,j โค ฯ , 0.411
all links are sufficiently secure and reliable so that ฯPi,j
6 , then
i
i
(37) holds and the stability is guaranteed. To see this, first note that the network
24
CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL
Figure 3. Paths from the plant node vP to the controller node vC in
network G
Figure 4. Paths from the controller node vฬC to the plant node vฬP in
network Gฬ
G contains 3 paths, and the number of links on these paths are given by 2, 3, 3.
Furthermore, the network Gฬ contains 4 paths, each of which contains 4 links. It
follows that
min
iโ{1,...,c}
|Pi |
X
j=1
P
+
ฯPi,j
i
min
iโ{1,...,cฬ}
|Pฬi |
X
j=1
Pฬ
ฯPฬi,j โค
i
min
iโ{1,...,c}
|Pi |
X
ฯ+
j=1
= min{2ฯ, 3ฯ, 3ฯ} + min{4ฯ, 4ฯ, 4ฯ, 4ฯ} = 6ฯ โค 0.411,
min
iโ{1,...,cฬ}
|Pฬi |
X
ฯ
j=1
which implies that (37) holds, and hence stability is guaranteed.
Notice that in this example, we have not made any particular assumption on
the independence or randomness of the failures on the links. In fact, all links may
be subject to failures caused by actions of coordinated adversaries. In such a case,
the occurrence of the failures may be nonrandom, and moreover, the binary-valued
processes that characterize failures on different links would depend on each other.
For example, in the case of data-corruption attacks, the worst-case scenario would
be that the failures on the paths are synchronized so that packet transmissions
necessarily fail in all parallel paths (such as paths P1 , P2 , and P3 of the graph
P
Pฬ
, ฯPฬi,j โค ฯ guarantees that
G) at the same time. Notice that the condition ฯPi,j
i
i
such failures happen sufficiently rarely in average in the long run. Thus, networked
stabilization can be achieved through the successful exchanges of measurement and
control data.
In the following examples, we will illustrate how our results in Sections 3 and 4
can be used for scenarios where some information on the properties of the communication links are available.
CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL
25
5.2. Jamming Attacks and Random Transmission Failures on Multiple
Links. Consider the network G and its paths shown in Fig. 3. We assume that
the paths P1 and P3 are subject to malicious attacks. In particular, the node v3
on P3 is assumed to be controlled by a malicious agent and all packets arriving
P
at node v3 are dropped. Hence, we have lP33,2 (t) = 1, t โ N0 , which implies that
lP3 (t) = 1, t โ N0 . Moreover, the first and the second links on path P1 are assumed
to be subject to jamming attacks that cause data corruption. Here the worst-case
scenario happens when the attackers coordinate and jam only one of the links at
once. This would maximize the number of packet losses within the total energy
constraint of the attackers. Our results take this worst-case into account.
P
In particular, suppose that the attacked links P1,1 and P1,2 satisfy lP11,1 โ ฮ ฮบ,w ,
P
lP11,2 โ ฮ ฮบ,w with ฮบ โฅ 0 and w โ (0, 1). Here, w provides a bound on average
failures on each link and it is related to the energy available to each attacker. The
P
P
P
P
fact that lP11,1 โ ฮ ฮบ,w , lP11,2 โ ฮ ฮบ,w implies lP11,1 โ ฮฯP1,1 , lP11,2 โ ฮฯP1,2 for all
P
P1
P
P1
P
P
ฯP11,1 , ฯP11,1 โ (w, 1]. It then follows from Proposition 4.1 that ฯP1 = ฯP11,1 + ฯP11,1 ,
and hence lP1 โ ฮฯP1 for ฯP1 โ (2w, 1]. Notice that lP1 โ ฮฯP1 holds even in the
worst-case scenario mentioned above. Here ฯP1 โ (2w, 1] provides an upper-bound
on the average number of overall failures on path P1 in the worst-case scenario.
We further assume that the link (v4 , vC ) on path P2 is subject to random data
P
corruption and the associated failure indicator process {lP22,3 (t) โ {0, 1}}tโN0 satP
isfies lP22,3 โ ฮp0 ,p1 with p0 , p1 โ (0, 1). We consider ideal communication on the
other links on path P2 . Thus, by using (22), we obtain
P
P
P
P
P
lP2 (t) = lP22,1 (t) โจ lP22,2 (t) โจ lP22,3 (t) = 0 โจ 0 โจ lP22,3 (t) = lP22,3 (t),
t โ N0 ,
and hence we also have lP2 โ ฮp0 ,p1 .
To characterize overall failures on network G, we use (11) and obtain
lG (t) = lP1 (t) โง lP2 (t) โง lP3 (t) = lP1 (t) โง lP2 (t) โง 1 = lP1 (t) โง lP2 (t),
t โ N0 .
Now, assuming that the failures on paths P1 and P2 are mutually-independent, it
(1)
(1)
follows from Theorem 3.4 with l(1) (t) = lP2 (t), l(2) (t) = lP1 (t), p0 = p0 , p1 = p1 ,
and ฯ(2) = ฯP1 that if p1 ฯP1 < 1, then lG โ ฮฯG with ฯG โ (p1 ฯP1 , 1]. Noting that
ฯP1 โ (2w, 1], we see that if 2p1 w < 1, then lG โ ฮฯG for all ฯG โ (2p1 w, 1].
Next, consider the network Gฬ. Suppose that Gฬ is secure against attacks, but
it is unreliable and subject to random transmission failures. To characterize the
overall transmission failures on the network Gฬ, we utilize Theorems 3.3 and 4.2.
Before we apply these results, we first describe the routing scheme on this network.
Specifically, in this network vฬ3 is assumed to be a router that forwards all incoming
packets from node vฬ1 only to node vฬ5 , and all incoming packets from node vฬ2 only
to node vฬ4 . Among the paths shown in Fig. 4, packets may be transmitted on Pฬ1
and Pฬ2 , but are never transmitted on Pฬ3 and Pฬ4 due to the routing scheme. Hence
lPฬ3 (t) = 1, lPฬ4 (t) = 1, t โ N0 .
We assume that the links (vฬ1 , vฬ3 ) and (vฬ3 , vฬ5 ) on path Pฬ1 and the links (vฬ2 , vฬ3 )
and (vฬ3 , vฬ4 ) on Pฬ2 face random data corruption issues. Furthermore, the failure
(vฬ ,vฬ )
(vฬ ,vฬ )
(vฬ ,vฬ )
indicator processes {lPฬ 1 3 (t) โ {0, 1}}tโN0 , {lPฬ 3 5 (t) โ {0, 1}}tโN0 , {lPฬ 2 3 (t) โ
(vฬ ,vฬ )
1
1
2
{0, 1}}tโN0 , {lPฬ 3 4 (t) โ {0, 1}}tโN0 are assumed to be mutually independent pro2
cesses that belong to the hidden Markov model class ฮp0 ,p1 with p0 , p1 โ (0, 1) (see
26
CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL
Definition 2.4). The links that are connected directly to the plant and the controller
nodes (vฬP and vฬC ) are considered to be ideal communication links. In other words,
Pฬ
Pฬ
lPฬi,1 (t) = 0, lPฬi,4 (t) = 0, t โ N0 , i โ {1, 2}.
i
i
Now, observe that the failure indicators for paths Pฬ1 and Pฬ2 satisfy
Pฬ
Pฬ
Pฬ
Pฬ
Pฬ
Pฬ
lPฬi (t) = lPฬi,1 (t) โจ lPฬi,2 (t) โจ lPฬi,3 (t) โจ lPฬi,4 (t) = 0 โจ lPฬi,2 (t) โจ lPฬi,3 (t) โจ 0
i
=
i
Pฬ
lPฬi,2 (t)
i
โจ
i
Pฬ
lPฬi,3 (t),
i
i
i
i
t โ N0 , i โ {1, 2}.
Pฬ
Pฬ
(1)
(2)
By applying Theorem 4.2 with l(1) (t) = lPฬi,2 (t), l(2) (t) = lPฬi,3 (t), p0 = p0 = p0 ,
(1)
i
(2)
i
and p1 = p1 = p1 , we obtain lPฬi โ ฮpฬ0 ,pฬ1 , i โ {1, 2}, where pฬ0 = p20 and
pฬ1 = min{p1 + p0 p1 , p1 + p0 p1 , 1} = min{p1 + p0 p1 , 1}.
Next, since lPฬ3 (t) = 1, lPฬ4 (t) = 1, t โ N0 , we have
lGฬ (t) = lPฬ1 (t) โง lPฬ2 (t) โง lPฬ3 (t) โง lPฬ4 (t) = lPฬ1 (t) โง lPฬ2 (t) โง 1 โง 1 = lPฬ1 (t) โง lPฬ2 (t),
for t โ N0 . It then follows from Theorem 3.3 with l(1) (t) = lPฬ1 (t), l(2) (t) = lPฬ2 (t),
(1)
(2)
p0 = p0
with
(1)
= p20 , and p1
(1)
(2)
= p1
(1) (2)
(2)
= min{p1 + p0 p1 , 1}, that we have lGฬ โ ฮpGฬ ,pGฬ
0
(2) (1)
(1)
1
(1) (2)
pGฬ
0 = min{p0 + p1 p0 , p0 + p1 p0 , 1} = min{p0 + p1 p0 , 1}
= min{p20 + min{p1 + p0 p1 , 1}p20 , 1} = min{p20 + min{p20 p1 + p30 p1 , p20 }, 1}
= min{min{p20 + p20 p1 + p30 p1 , 2p20 }, 1} = min{p20 + p20 p1 + p30 p1 , 2p20 , 1}
(1) (2)
2
2
and pGฬ
1 = p1 p1 = (min{p1 +p0 p1 , 1}) = min{(p1 +p0 p1 ) , 1}. Finally, in the case
2
where (p1 + p0 p1 ) < 1, as a consequence of Proposition 2.5, we obtain lGฬ โ ฮฯฬG
2
for ฯGฬ โ (pGฬ
1 , 1] = ((p1 + p0 p1 ) , 1].
Now, we note once again that the overall packet exchange failure indicator {l(t) โ
{0, 1}}tโN0 satisfies l โ ฮฯ with ฯ = ฯG + ฯGฬ . Since ฯG โ (2p1 w, 1] and ฯGฬ โ
((p1 + p0 p1 )2 , 1], it follows that if 2p1 w + (p1 + p0 p1 )2 < 1, then l โ ฮฯ with
ฯ โ (2p1 w+(p1 +p0 p1 )2 , 1]. As we discussed in Section 5.1, stability of the networked
control system can be ensured when ฯ โค 0.411. It follows that if
(38)
2p1 w + (p1 + p0 p1 )2 < 0.411,
then l โ ฮฯ holds with ฯ = 0.411, implying almost sure asymptotic stability of the
networked control system. Observe that by utilizing the results in Sections 3 and
4, we are able to derive the sufficient stability condition (38) in terms of the attack
rate w โ (0, 1) associated with the links on path P1 that are attacked by jamming
attackers as well as random failure parameters p0 , p1 โ (0, 1).
5.3. State-dependent Attacks by a Malicious Node. In the scenarios discussed in Sections 5.1 and 5.2, the strategies of the attackers are not specified.
However, in certain cases an attacker may have access to the state or control input
information and be able to directly cause transmission failures between the plant
and the controller. In such scenarios, the goal of the attacker might be to increase
state norm with small amount of attacks. In this section, our goal is to illustrate
such an attack strategy. In particular, we consider the case where the plant node
vP is compromised by an attacker. The attacker is assumed to have access to the
state information.
CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL
27
We consider an attack strategy that is based on an optimization problem. In
particular, the attacker at node vP decides whether to transmit the state information on links P1,1 = (vP , v1 ), P2,1 = (vP , v2 ), and P3,1 = (vP , v3 ) after solving an
optimization problem for maximizing the norm of the state at a future time. We
represent the attackers actions with a binary-valued process {lA (t) โ {0, 1}}tโN0 ,
where lA (t) = 0 indicates the attacker transmits the state packet on P1,1 = (vP , v1 ),
P2,1 = (vP , v2 ), and P3,1 = (vP , v3 ) and lA (t) = 1 indicates no transmission. The
attacker decides the values of the binary-valued process lA (t) according to
lA (t) = aโt ,
(39)
where (aโt , aโt+1 , ยท ยท ยท , aโt+N โ1 ) โ {0, 1}N is a solution to the optimization problem
PN
2
maximize
i=1 kxฬ(t + i)k
(a
,ยทยทยท
,a
)
t
t+N
โ1
(40)
Pt+N โ1
Ptโ1
ai โค ฮบ + w(t + N ),
subject to
i=t
i=0 lA (t) +
where xฬ(t+i) = A+(1โat+iโ1 )BK A+(1โat+iโ2 )BK ยท ยท ยท A+(1โat )BK x(t).
In this strategy, the attacker decides to attack (lA (t) = 1) or not (lA (t) = 0) at
time t based on the optimization problem where the goal is to maximize the sum
of squared state norms over the interval [t + 1, t + N ], while keeping the attack rate
below a certain value w โ (0, 1). Here N โ N is the horizon in the optimization
problem, and it can be large if the attacker has sufficient computational resources.
Notice that under this attack strategy, we have lA โ ฮ ฮบ,w , and hence, lA โ ฮฯ for
any ฯ โ (w, 1].
Observe that in this scenario, we have
P
P
P
lP11,1 (t) =lP22,1 (t) = lP11,1 (t) = lA (t),
t โ N0 .
P
Since lA โ ฮ ฮบ,w , we have lA โ ฮฯA with ฯA โ (w, 1]. As a consequence, lPii,1 โ
ฮ
P
ฯPi,1
P
with ฯPii,1 โ (wA , 1] for all i โ {1, 2, 3}. Notice that lA (t) = 1 implies l(t) = 1,
i
since the attacker can completely prevent the packet exchange between the plant
and the controller. Observe also that if there are other sources of transmission
failures on the network, then there may be times when l(t) = 1 even if lA (t) = 0.
As a result, if lA (t) = 0 then the attacker may not be able to correctly predict the
state x(t + 1) at time t, as there may or may not be a failure in the network that
prevents control input to reach the plant. However, as the optimization problem in
(40) is solved at each time step, the updated state information is used for decision.
Notice that in the case where all links other than P1,1 = (vP , v1 ), P2,1 = (vP , v2 ),
and P3,1 = (vP , v3 ) are secure and reliable, we have lG (t) = lA (t), since
P
P
P
lG (t) = lP1 (t) โง lP2 (t) โง lP3 (t) = lP11,1 (t) โง lP22,1 (t) โง lP33,1 (t)
= lA (t) โง lA (t) โง lA (t) = lA (t),
t โ N0 .
Hence, lG โ ฮฯG with ฯG โ (w, 1].
Now suppose that the network Gฬ also faces failures. In particular, consider the
2
setup in Section 5.2, where lGฬ โ ฮฯฬG for ฯGฬ โ (pGฬ
1 , 1] = ((p1 + p0 p1 ) , 1]. Since
2
l โ ฮฯ with ฯ = ฯG +ฯGฬ , we have l โ ฮฯ for all ฯ โ (w+(p1 +p0 p1 ) , 1]. Noting that
the stability of the networked control system can be ensured when ฯ โค 0.411, we
can impose a sufficient condition on the attack rate w. Specifically, for the scenario
PSfrag replacements
28
CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL
kx(t)k
ร101
w = 0.25, ฮบ = 1, N = 2
0.5
0.0
0
kx(t)k
ร10
5
10
15
20
1
25
w = 0.25, ฮบ = 1, N = 10
1
0
0
5
10
15
20
25
Time [t]
Figure 5. Comparison of state trajectories for different values of N
in (40)
of this section, if
w + (p1 + p0 p1 )2 < 0.411,
(41)
then l โ ฮฯ holds with ฯ = 0.411, and thus the networked control system is almost
surely asymptotically stable.
To illustrate the effect of different parameters in the attack strategy (40), we
conduct simulations. First, we generate 50 sample trajectories of the process lGฬ by
Pฬ
Pฬ
setting the failure processes lPฬi,2 , lPฬi,3 , i โ {1, 2}, as outputs of time-inhomogeneous
i
i
hidden Markov models such that
(42)
Pฬ
lPฬi,j (t) = ฮธi,j (t),
i
t โ N0 ,
i โ {1, 2},
j โ {2, 3},
where {ฮธi,j (t) โ ฮl = {0, 1}}tโN0 is an Ft -adapted finite-state time-inhomogeneous
Markov chain with initial distributions and time-varying transition probability functions satisfying P[ฮธi,j (0) = 0] = 0.6 and
P[ฮธi,j (t + 1) = 1|ฮธi,j (t) = 0] = 0.2 + 0.02 cos2 (0.1t),
P[ฮธi,j (t + 1) = 1|ฮธi,j (t) = 1] = 0.2 + 0.02 sin2 (0.2t),
Pฬ
Pฬ
for t โ N0 , i โ {1, 2}, j โ {2, 3}. Notice that lPฬi,2 , lPฬi,3 โ ฮp0 ,p1 , i โ {1, 2}, with
i
i
p0 = 0.8, p1 = 0.22. Next, for each sample trajectory of lGฬ , we simulate the
networked control system (1), (2) under the attack strategy (40). In Fig. 5, we
show state trajectories when attack parameters are selected as w = 0.25 and ฮบ = 1.
In top part of Fig. 5, the horizon parameter N = 2, and in the bottom part N = 10.
Observe that with larger horizon variable, the attacker following the strategy (40)
can utilize the resources more efficiently so that the state norm is set to larger
values for longer durations even though in both cases N = 2 and N = 10, the
attack belongs to the same class ฮ ฮบ,w . Notice that with p0 = 0.8, p1 = 0.22, and
w = 0.25, the inequality (41) holds. Therefore, the zero solution of the closed-loop
system is almost surely asymptotically stable by Theorem 2.3.
PSfrag replacements
t=0 lGฬ (t)
0.0
Pkโ1
0.5
1
k
CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL
1.0
(p1 + p0 p1 )2 = 0.156816
1
k
Pkโ1
t=0 lG (t)
0
l(t)
100
200
300
400
500
600
700
1.0
w = 0.25
0.5
0.0
0
100
200
300
t=0
1.0
0.5
1
k
Pkโ1
29
0.0
400
500
600
700
w + (p1 + p0 p1 )2 = 0.406816
0
100
200
300
400
500
600
700
Number of packet transmission attempts [k]
Figure 6. Average number of failures on networks Gฬ and G together
with average number of overall packet exchange failures
For w = 0.25, ฮบ = 1, and N = 2, we show in Fig. 6 the average number of failures
on the networks Gฬ and G as well as the average number of total packet exchange
failures between the plant and the controller. These averages are upper bounded in
the long run by certain scalars. In particular, for a process l that satisfies l โ ฮฯ with
Pkโ1
ฯ โ (ฯ, 1], we have lim supkโโ k1 t=0 l(t) โค ฯ (see Lemma 3.3 in [26]). As a result,
Pkโ1
Pkโ1
we have lim supkโโ k1 t=0 lGฬ (t) โค (p1 + p0 p1 )2 , lim supkโโ k1 t=0 lG (t) โค w,
P
kโ1
and lim supkโโ k1 t=0
l(t) โค w + (p1 + p0 p1 )2 .
Next, we consider the case where ฮบ = 10, which corresponds to the case where
the attacker has more initial resources. In this case, we consider two scenarios
w = 0.25 and w = 0.75, for which we obtain the sample state trajectories shown
in Fig. 7. First, notice that in the case with ฮบ = 10, w = 0.25 (top plot in Fig. 7),
the state grows to larger values for longer durations in comparison to the case with
ฮบ = 1, w = 0.25 (top plot in Fig. 5). In both cases, the stability conditions hold
with w = 0.25, and therefore the state eventually converges to zero as guaranteed
by Theorem 2.3. Note that, when w is set to larger values, the attacker can attack
at a higher rate. For this example, we set w = 0.75 and observe that for such a
high attack rate all sample state trajectories diverge (see bottom plot in Fig. 7).
6. Conclusion
In this paper, we explored state feedback control of a linear plant over an unreliable network that may also face malicious attacks. We developed a probabilistic
PSfrag replacements
30
CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL
kx(t)k
ร102
w = 0.25, ฮบ = 10, N = 2
0.5
0.0
0
kx(t)k
ร10
10
20
30
40
50
4
60
70
w = 0.75, ฮบ = 10, N = 2
2.5
0.0
0
10
20
30
40
50
60
70
Time [t]
Figure 7. Comparison of state trajectories for different values of w in (39)
approach to characterize the failures on the network in terms of the failures on different paths between the plant and the controller. We showed that the failures on
each path can be described as a combination of data-corruption and packet-dropout
failures on the communication links of that particular path. We obtained sufficient
conditions for almost sure stability of the overall networked control system, which
allow us to check stability by using a probabilistic upper-bound obtained for the
average number of packet exchange failures between the plant and the controller.
Appendix A. Proof of Lemma 2.6
In this section, we prove Lemma 2.6. As in the proof of Lemma A.1 of [26], for
proving Lemma 2.6, we use Markovโs inequality and follow the approaches used for
obtaining Chernoff-type tail distribution inequalities for sums of random variables
(see Appendix B of [37] and Section 1.9 of [33]). In the proof Lemma 2.6, the
following result also plays a key role.
Lemma A.1. Let {ฮพ(t) โ ฮ}tโN0 be a finite-state time-inhomogeneous Markov
chain with transition probabilities pq,r : N0 โ [0, 1], q, r โ ฮ. Furthermore, let
ฮ1 โ ฮ be given by ฮ1 , {r โ ฮ : h(r) = 1}, where h : ฮ โ {0, 1} is a binary-valued
function. Then for all ฯ > 1, s โ N, and pฬ โ [0, 1] such that
X
(43)
pq,r (t) โค pฬ, q โ ฮ, t โ N0 ,
rโฮ1
we have
(44)
Ps
E[ฯ
j=1
h(ฮพ(tj ))
] โค ฯ ((ฯ โ 1)pฬ + 1)sโ1 ,
where t1 , t2 , . . . , ts โ N0 denote indices such that 0 โค t1 < t2 < . . . < ts .
Proof. We use induction to show (44). First, we consider the case where s = 1. In
this case, we have
(45)
Ps
E[ฯ
j=1
h(ฮพ(tj ))
] = E[ฯh(ฮพ(t1 )) ] โค ฯ.
CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL
31
Next, consider the case where s = 2. Observe that t1 โค t2 โ 1, thus the random
variable ฮพ(t1 ) is Ft2 โ1 -measurable. Consequently,
Ps
E[ฯ
j=1
h(ฮพ(tj ))
] = E[ฯh(ฮพ(t1 )) ฯh(ฮพ(t2 )) ] = E[E[ฯh(ฮพ(t1 )) ฯh(ฮพ(t2 )) | Ft2 โ1 ]]
= E[ฯh(ฮพ(t1 )) E[ฯh(ฮพ(t2 )) | Ft2 โ1 ]],
(46)
where the last equality follows from the fact that ฯh(ฮพ(t1 )) is a measurable function
of ฮพ(t1 ), and hence, it is Ft2 โ1 -measurable. Now, since {ฮพ(t) โ ฮ}tโN0 is a Markov
chain, we have E[ฯh(ฮพ(t2 )) | Ft2 โ1 ] = E[ฯh(ฮพ(t2 )) | ฮพ(t2 โ 1)]. Therefore,
Ps
j=1 h(ฮพ(tj )) ] = E[ฯh(ฮพ(t1 )) E[ฯh(ฮพ(t2 )) | ฮพ(t โ 1)]]
2
i
h
= E ฯh(ฮพ(t1 )) ฯP[h(ฮพ(t2 )) = 1 | ฮพ(t2 โ 1)] + P[h(ฮพ(t2 )) = 0 | ฮพ(t2 โ 1)]
i
h
= E ฯh(ฮพ(t1 )) ฯP[h(ฮพ(t2 )) = 1 | ฮพ(t2 โ 1)] + 1 โ P[h(ฮพ(t2 )) = 1 | ฮพ(t2 โ 1)]
E[ฯ
(47)
i
h
= E ฯh(ฮพ(t1 )) (ฯ โ 1)P[h(ฮพ(t2 )) = 1 | ฮพ(t2 โ 1)] + 1 .
P
Here we obtain P[h(ฮพ(t2 )) = 1 | ฮพ(t2 โ1)] = P[ฮพ(t2 ) โ ฮ1 |ฮพ(t2 โ1)] = rโฮ1 P[ฮพ(t2 ) =
r|ฮพ(t2 โ 1)]. Thus, by using (43) and (45), we arrive at
i
h
i
Ps
E[ฯ j=1 h(ฮพ(tj )) ] โค E ฯh(ฮพ(t1 )) (ฯ โ 1)pฬ + 1 = E[ฯh(ฮพ(t1 )) ]((ฯ โ 1)pฬ + 1)
โค ฯ((ฯ โ 1)pฬ + 1).
(48)
Hence, we have that (44) is satisfied for s โ {1, 2}.
Now, assume that (44) holds for s = sฬ > 2, i.e.,
Psฬ
(49)
E[ฯ
j=1
h(ฮพ(tj ))
sฬโ1
] โค ฯ ((ฯ โ 1)pฬ + 1)
.
We will to prove that (44) holds for s = sฬ + 1. By employing arguments similar to
those used for obtaining (46)โ(48), we get
Psฬ+1
E[ฯ
j=1
h(ฮพ(tj ))
Psฬ
= E[E[ฯ
j=1
Psฬ
] = E[ฯ
(50)
ฯ
j=1 h(ฮพ(tj ))
Psฬ
= E[ฯ
j=1
h(ฮพ(tj )) h(ฮพ(tsฬ+1 ))
h(ฮพ(tj )) h(ฮพ(tsฬ+1 ))
Psฬ
= E[ฯ
j=1
h(ฮพ(tj ))
h(ฮพ(tsฬ+1 ))
E[ฯ
ฯ
]
| Ftsฬ+1 โ1 ]]
| Ftsฬ+1 โ1 ]]
Psฬ
E[ฯh(ฮพ(tsฬ+1 )) | ฮพ(tsฬ+1 โ 1)]] โค E[ฯ
j=1
h(ฮพ(tj ))
Finally, by (49) and (50), we obtain (44) with s = sฬ + 1.
]((ฯ โ 1)pฬ + 1).
Next, by utilizing Lemma A.1, we prove Lemma 2.6.
Proof of Lemma 2.6. First, we define
h(k) , [h(ฮพ(0)), h(ฮพ(1)), . . . , h(ฮพ(k โ 1))]T ,
ฯ(k) , [ฯ(0), ฯ(1), . . . , ฯ(k โ 1)]T ,
k โ N.
Next, let Fs,k , {ฯ โ {0, 1}k : ฯT ฯ = s}, s โ {0, 1, . . . , k}, k โ N. Here, we have
Fs1 ,k โฉ Fs2 ,k = โ
, s1 6= s2 , and moreover, P[ฯ(k) โ โชks=0 Fs,k ] = 1, k โ N. By
32
CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL
utilizing these definitions we obtain for all ฯ โ (pฬwฬ, 1) and k โ N,
P[
kโ1
X
T
h(ฮพ(t))ฯ(t) > ฯk] = P[h (k)ฯ(k) > ฯk]
t=0
(51)
=
k
X
X
T
P[h (k)ฯ(k) > ฯk | ฯ(k) = ฯ]P[ฯ(k) = ฯ].
s=0 ฯโFs,k
Since ฮพ(ยท) and ฯ(ยท) are mutually-independent,
T
T
P[h (k)ฯ(k) > ฯk | ฯ(k) = ฯ] = P[h (k)ฯ > ฯk].
(52)
Therefore, it follows from (51) and (52) that for k โ N,
P[
kโ1
X
h(ฮพ(t))ฯ(t) > ฯk] =
t=0
k
X
X
T
P[h (k)ฯ > ฯk]P[ฯ(k) = ฯ]
s=0 ฯโFs,k
โwฬkโ
=
X X
T
P[h (k)ฯ > ฯk]P[ฯ(k) = ฯ]
s=0 ฯโFs,k
(53)
k
X
+
X
T
P[h (k)ฯ > ฯk]P[ฯ(k) = ฯ].
s=โwฬkโ+1 ฯโFs,k
In what follows, our goal is to find upper bounds for the two summation terms
T
in (53). We start with the second term. Since P[h (k)ฯ > ฯk] โค 1, k โ N, we
obtain
k
X
X
T
P[h (k)ฯ > ฯk]P[ฯ(k) = ฯ]
s=โwฬkโ+1 ฯโFs,k
(54)
โค
k
X
X
P[ฯ(k) = ฯ] = P[
kโ1
X
ฯ(t) > wฬk] = ฯฬk ,
t=0
s=โwฬkโ+1 ฯโFs,k
for k โ N. Next, we obtain an upper bound for the first term in (53). Observe
T
that P[h (k)ฯ > ฯk] = 0 for ฯ โ F0,k . It then follows that, for all k โ N such that
โwฬkโ = 0, we have
โwฬkโ
X X
(55)
T
P[h (k)ฯ > ฯk]P[ฯ(k) = ฯ] = 0.
s=0 ฯโFs,k
Moreover, for all k โ N such that โwฬkโ โฅ 1, we obtain
(56)
โwฬkโ
X X
s=0 ฯโFs,k
T
P[h (k)ฯ > ฯk]P[ฯ(k) = ฯ] =
โwฬkโ
X X
T
P[h (k)ฯ > ฯk]P[ฯ(k) = ฯ].
s=1 ฯโFs,k
T
To obtain an upper bound for the term P[h (k)ฯ > ฯk], we will utilize Markovโs
inequality and Lemma A.1. First, for s โ {1, 2, . . . , โwฬkโ}, let t1 (ฯ), t2 (ฯ), . . . , ts (ฯ)
CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL
33
denote the indices of the nonzero entries of ฯ โ Fs,k such that t1 (ฯ) < t2 (ฯ) < ยท ยท ยท <
ts (ฯ). Consequently,
T
(57)
P[h (k)ฯ > ฯk] = P[
s
X
htj (ฯฬ) (k) > ฯk] = P[
j=1
s
X
h(ฮพ(tj (ฯ) โ 1)) > ฯk],
j=1
for ฯ โ Fs,k , s โ {1, 2, . . . , โwฬkโ}, and k โ N such that โwฬkโ โฅ 1.
Now observe that ฯ > 1, since ฯ โ (pฬwฬ, wฬ). By using Markovโs inequality, we
obtain
T
P[h (k)ฯ > ฯk] โค P[
s
X
Ps
h(ฮพ(tj (ฯ) โ 1)) โฅ ฯk] = P[ฯ
j=1
โฯk
โคฯ
(58)
Ps
E[ฯ
j=1
h(ฮพ(tj (ฯ)โ1))
j=1
h(ฮพ(tj (ฯ)โ1))
โฅ ฯฯk ]
].
Ps
sโ1
It follows from Lemma A.1 that E[ฯ j=1 h(ฮพ(tj (ฯ)โ1)) ] โค ฯ ((ฯ โ 1)pฬ + 1) . This
inequality together with (56) and (58) imply that for all k โ N such that โwฬkโ โฅ 1,
โwฬkโ
X X
T
P[h (k)ฯ > ฯk]P[ฯ(k) = ฯ]
s=0 ฯโFs,k
โwฬkโ
โค
X X
sโ1
ฯโฯk ฯ ((ฯ โ 1)pฬ + 1)
P[ฯk = ฯ]
s=1 ฯโFs,k
โwฬkโ
= ฯโฯk+1
X
((ฯ โ 1)pฬ + 1)
X
((ฯ โ 1)pฬ + 1)
X
sโ1
s=1
โwฬkโ
โฯk+1
=ฯ
P[ฯk = ฯ]
ฯโFs,k
sโ1
P[ฯk โ Fs,k ]
sโ1
.
s=1
โwฬkโ
โฯk+1
โคฯ
(59)
X
((ฯ โ 1)pฬ + 1)
s=1
Notice that to obtain the last inequality in (59), we employed the fact that P[ฯk โ
Fs,k ] โค 1. The summation term on the far right-hand side of (59) satisfies
โwฬkโ
(60)
X
โwฬkโ
sโ1
((ฯ โ 1)pฬ + 1)
s=1
=
wฬk
((ฯ โ 1)pฬ + 1)
((ฯ โ 1)pฬ + 1)
โ1
โค
((ฯ โ 1)pฬ + 1) โ 1
(ฯ โ 1)pฬ
โ1
.
Therefore, from (59) and (60), we obtain
โwฬkโ
(61)
X X
s=0 ฯโFs,k
T
P[h (k)ฯ > ฯk]P[ฯ(k) = ฯ] โค ฯโฯk+1
((ฯ โ 1)pฬ + 1)wฬk โ 1
,
(ฯ โ 1)pฬ
for all k โ N such that โwฬkโ โฅ 1. The right-hand side of this inequality is zero if
โwฬkโ = 0. Therefore, (61) holds also for all k โ N. By using this fact together with
(53), (54), we arrive at (9).
34
CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL
Next, we show
โ
X
Pโ
k=1
ฯโฯk+1
k=1
(62)
=
ฯk < โ. First of all, we have
wฬk
((ฯ โ 1)pฬ + 1)
(ฯ โ 1)pฬ
โ1
โ
โ
k=1
k=1
X
X
ฯ
ฯ
ฯโฯk ((ฯ โ 1)pฬ + 1)wฬk โ
ฯโฯk .
(ฯ โ 1)pฬ
(ฯ โ 1)pฬ
We will prove that the summation terms on the right-hand side of (62) are both
convergent. First, we have ฯโฯ < 1, because ฯ > 1. Therefore, the geometric series
Pโ โฯk
P
โฯk
converges, that is, โ
< โ. Next, we show ฯโฯ ((ฯ โ 1)pฬ + 1)wฬ <
k=1 ฯ
k=1 ฯ
1. Observe that
wฬ
ฯ
wฬ
(63)
ฯโฯ ((ฯ โ 1)pฬ + 1) = ฯโ wฬ ((ฯ โ 1)pฬ + 1) .
Moreover,
ฯ
โ wฬ
ฯ
โ wฬฯ ฯ
โ pฬ)
wฬ (1 โ pฬ)
((ฯ โ 1)pฬ + 1) =
โ
1
pฬ
+
1
pฬ(1 โ wฬฯ )
pฬ(1 โ wฬฯ )
ฯ
wฬ
1โ wฬฯ
pฬwฬ
1 โ pฬ
=
.
ฯ
1 โ wฬฯ
ฯ
wฬ (1
1โpฬ
Here, we have pฬฯwฬ , 1โ
ฯ โ (0, 1) โช (1, โ). As a result, since ln v < v โ 1 for any
wฬ
v โ (0, 1) โช (1, โ), we obtain
ฯ
ฯ
pฬwฬ
1 โ pฬ
ฯ
โ wฬ
((ฯ โ 1)pฬ + 1) = ln
ln ฯ
+ (1 โ ) ln
wฬ
ฯ
wฬ
1 โ wฬฯ
ฯ pฬwฬ
ฯ
ฯ
p
1 โ pฬ
<
โ 1 + (1 โ )
+ โ pฬ = 0,
ฯ โ 1 = pฬ โ
wฬ
ฯ
wฬ
1 โ wฬ
wฬ wฬ
ฯ
wฬ
which implies ฯโ wฬ ((ฯ โ 1)pฬ + 1) < 1. Thus, by (63), ฯโฯ ((ฯ โ 1)pฬ + 1) < 1. It
then follows that
โ
X
wฬk
(64)
ฯโฯk ((ฯ โ 1)pฬ + 1) < โ.
Finally, since
Pโ
k=1
k=1
โฯk
ฯ
< โ, we obtain
Pโ
k=1
ฯk < โ from (62) and (64).
References
[1] J. P. Hespanha, P. Naghshtabrizi, and Y. Xu, โA survey of recent results in networked control
systems,โ Proc. IEEE, vol. 95, no. 1, pp. 138โ172, 2007.
[2] V. Gupta, A. F. Dana, J. P. Hespanha, R. M. Murray, and B. Hassibi, โData transmission
over networks for estimation and control,โ IEEE Trans. Autom. Control, vol. 54, no. 8,
pp. 1807โ1819, 2009.
[3] R. Alur, A. DโInnocenzo, K. H. Johansson, G. J. Pappas, and G. Weiss, โCompositional
modeling and analysis of multi-hop control networks,โ IEEE Trans. Autom. Control, vol. 56,
no. 10, pp. 2345โ2357, 2011.
[4] F. Smarra, A. DโInnocenzo, and M. D. Di Benedetto, โOptimal co-design of control, scheduling
and routing in multi-hop control networks,โ in Proc. IEEE Conf. Dec. Contr., pp. 1960โ1965,
2012.
[5] A. DโInnocenzo, M. D. Di Benedetto, and E. Serra, โFault tolerant control of multi-hop
control networks,โ IEEE Trans. Autom. Control, vol. 58, no. 6, pp. 1377โ1389, 2013.
[6] A. DโInnocenzo, F. Smarra, and M. D. Di Benedetto, โResilient stabilization of multi-hop
control networks subject to malicious attacks,โ Automatica, vol. 71, pp. 1โ9, 2016.
CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL
35
[7] F. Smarra, M. D. D. Benedetto, and A. DโInnocenzo, โA sub-optimal method for routing
redundancy design over lossy networks,โ in Proc. 20th IFAC W. Congress, pp. 2604โ2609,
2017.
[8] S. A. Khayam and H. Radha, โMarkov-based modeling of wireless local area networks,โ in
Proc. ACM MSWiM, pp. 100โ107, 2003.
[9] S. Floyd and V. Jacobson, โRandom early detection gateways for congestion avoidance,โ
IEEE/ACM Trans. Networking, vol. 1, no. 4, pp. 397โ413, 1993.
[10] W. Xu, W. Trappe, Y. Zhang, and T. Wood, โThe feasibility of launching and detecting
jamming attacks in wireless networks,โ in Proc. 6th ACM Int. Symp. Mobile Ad Hoc Network.
Comput., pp. 46โ57, 2005.
[11] K. Pelechrinis, M. Iliofotou, and S. V. Krishnamurty, โDenial of service attacks in wireless
networks: The case of jammers,โ IEEE Commun. Surveys Tuts., vol. 13, no. 2, pp. 245โ257,
2011.
[12] S. Amin, A. A. Cรกrdenas, and S. S. Sastry, โSafe and secure networked control systems under
Denial-of-Service attacks,โ in Proc. 12th HSCC, pp. 31โ45, 2009.
[13] C. De Persis and P. Tesi, โInput-to-state stabilizing control under denial-of-service,โ IEEE
Trans. Autom. Control, vol. 60, no. 11, pp. 2930โ2944, 2015.
[14] S. Liu, P. X. Liu, and A. El Saddik, โA stochastic game approach to the security issue
of networked control systems under jamming attacks,โ J. Franklin Inst., vol. 351, no. 9,
pp. 4570โ4583, 2014.
[15] Y. Li, L. Shi, P. Cheng, J. Chen, and D. E. Quevedo, โJamming attacks on remote state
estimation in cyber-physical systems: A game-theoretic approach,โ IEEE. Trans. Autom.
Control, vol. 60, no. 10, pp. 2831โ2836, 2015.
[16] C. De Persis and P. Tesi, โNetworked control of nonlinear systems under Denial-of-Service,โ
Syst. Control Lett., vol. 96, pp. 124โ131, 2016.
[17] B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotaru, and H. Rubens, โODSBR: An ondemand secure Byzantine resilient routing protocol for wireless ad hoc networks,โ ACM Trans.
Inf. and System Security, vol. 10, no. 4, p. 6, 2008.
[18] M. M. E. A. Mahmoud and X. S. Shen, Security for Multi-hop Wireless Networks. Springer,
2014.
[19] R. H. Jhaveri, S. J. Patel, and D. C. Jinwala, โDoS attacks in mobile ad hoc networks: A
survey,โ in Proc. ACTT, pp. 535โ541, 2012.
[20] A. T. Mizrak, S. Savage, and K. Marzullo, โDetecting malicious packet losses,โ IEEE Trans.
Parallel Distrib. Syst., vol. 20, no. 2, pp. 191โ206, 2009.
[21] T. Shu and M. Krunz, โPrivacy-preserving and truthful detection of packet dropping attacks
in wireless ad hoc networks,โ IEEE Trans. Mobile Computing, vol. 14, no. 4, pp. 813โ828,
2015.
[22] A. A. Cรกrdenas, S. Amin, and S. Sastry, โResearch challenges for the security of control
systems,โ in Proc. Conf. Hot Topics in Security, 2008.
[23] H. Sandberg, S. Amin, and K. H. Johansson, โSpecial issue on cyberphysical security in
networked control systems,โ IEEE Control Syst. Mag., vol. 35, no. 1, 2015.
[24] A. F. Dana, R. Gowaikar, R. Palanki, B. Hassibi, and M. Effros, โCapacity of wireless erasure
networks,โ IEEE Trans. Inf. Theory, vol. 52, no. 3, pp. 789โ804, 2006.
[25] D. E. Quevedo, A. Ahlรฉn, and K. H. Johansson, โState estimation over sensor networks with
correlated wireless fading channels,โ IEEE Trans. Autom. Control, vol. 58, no. 3, pp. 581โ593,
2013.
[26] A. Cetinkaya, H. Ishii, and T. Hayakawa, โNetworked control under random and malicious
packet losses,โ IEEE Trans. Autom. Control, vol. 62, no. 5, pp. 2434โ2449, 2017.
[27] A. Cetinkaya, H. Ishii, and T. Hayakawa, โRandom and malicious packet transmission failures
on multi-hop channels in networked control systems,โ in Proc. IFAC NecSys, pp. 49โ54, 2016.
[28] D. E. Quevedo and D. Nesic, โInput-to-state stability of packetized predictive control over
unreliable networks affected by packet-dropouts,โ IEEE Trans. Autom. Control, vol. 56, no. 2,
pp. 370โ375, 2011.
[29] A. Cetinkaya, H. Ishii, and T. Hayakawa, โEvent-triggered output feedback control resilient
against jamming attacks and random packet losses,โ in Proc. IFAC NecSys, pp. 270โ275,
2015.
[30] B. D. O. Anderson, โFrom Wiener to hidden Markov models,โ IEEE Control Syst. Mag.,
vol. 19, no. 3, pp. 41โ51, 1999.
36
CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL
[31] O. Cappรฉ, E. Moulines, and T. Rydรฉn, Inference in Hidden Markov Models. Springer, 2009.
[32] M. Vidyasagar, Hidden Markov Processes: Theory and Applications to Biology. Princeton
University Press, 2014.
[33] P. Billingsley, Probability and Measure. Wiley, 2012.
[34] P. Sadeghi, R. A. Kennedy, P. B. Rapajic, and R. Shams, โFinite-state Markov modeling of
fading channels,โ IEEE Signal Process. Mag., vol. 25, no. 5, pp. 57โ80, 2008.
[35] M. Ellis, D. P. Pezaros, T. Kypraios, and C. Perkins, โA two-level Markov model for packet loss
in UDP/IP-based real-time video applications targeting residential users,โ Comput. Netw.,
vol. 70, no. 9, pp. 384โ399, 2014.
[36] D. Medhi and K. Ramasamy, Network Routing: Algorithms, Protocols, and Architectures.
Morgan Kaufmann, 2007.
[37] U. Madhow, Fundamentals of Digital Communication. Cambridge University Press, 2008.
| 3cs.SY
|
Two provably consistent divide and conquer clustering
algorithms for large networks
arXiv:1708.05573v1 [stat.ML] 18 Aug 2017
Soumendu Sundar Mukherjee1 , Purnamrita Sarkar2 , and Peter J. Bickel1
1
2
Department of Statistics, University of California, Berkeley
Department of Statistics and Data Sciences, University of Texas, Austin
August 21, 2017
Abstract
In this article, we advance divide-and-conquer strategies for solving the community detection problem in networks. We propose two algorithms which perform clustering on a number of small subgraphs
and finally patches the results into a single clustering. The main advantage of these algorithms is that
they bring down significantly the computational cost of traditional algorithms, including spectral clustering, semi-definite programs, modularity based methods, likelihood based methods etc., without losing
on accuracy and even improving accuracy at times. These algorithms are also, by nature, parallelizable.
Thus, exploiting the facts that most traditional algorithms are accurate and the corresponding optimization problems are much simpler in small problems, our divide-and-conquer methods provide an omnibus
recipe for scaling traditional algorithms up to large networks. We prove consistency of these algorithms
under various subgraph selection procedures and perform extensive simulations and real-data analysis to
understand the advantages of the divide-and-conquer approach in various settings.
Contents
0 Glossary of notation
2
1 Introduction
3
2 Two divide and conquer algorithms
2.1 PACE: an averaging algorithm . . .
2.2 GALE: a sequential algorithm . . .
2.3 Remarks on sampling schemes . . .
2.4 Beyond community detection . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
5
6
8
10
10
3 Main results
11
3.1 Results on PACE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
3.2 Results on GALE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
4 Simulations and real-data analysis
17
4.1 Simulations: comparison against traditional algorithms . . . . . . . . . . . . . . . . . . . . . . 17
4.2 Real data analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
1
5 Discussion
20
6 Proofs
21
6.1 Results on PACE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
6.2 Results on GALE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
7 Acknowledgments
30
A Details of DGCluster
33
B Some auxiliary results
B.1 Analysis of PACE under stochastic block model . . .
B.1.1 Community sizes in random m-subgraphs . .
B.1.2 Community sizes in 1-hop ego neighborhoods
B.1.3 Analysis of adjacency spectral clustering . . .
B.1.4 Analysis of SDP . . . . . . . . . . . . . . . .
B.2 Proofs of some results for GALE . . . . . . . . . . . .
0
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
34
35
36
36
37
39
39
Glossary of notation
For the convenience of the reader, we collect here some of the more frequently used notations used in the
paper, and provide a summarizing phrase for each, as well as the page number at which the notation first
appears.
T
S, Sl
wl,i,j
Nij
ฯ
Cฬ
Cฬproj
M
Zฬ`
Zฬ (`)
nk
ฯk
ฯmin
ฮดc (ฯ, ฯ 0 )
ฮด(Z, Z 0 )
ฮดฬ(C, C 0 )
M(Z 0 , Z)
(`)
yi
ฯ
(S)
nk
Yab
number of subgraphs used
a randomly chosen subgraph
weights used in w-PACE
the number of times i and j appear in all subgraphs S1 , . . . , ST
threshold for Nij , a tuning parameter in PACE
estimated clustering matrix returned by PACE
randomly projected version of Cฬ, to be used for recovering an estimate of Z
confusion matrix between two clusterings, used by Match
cluster membership matrix of subgraph S` before alignment
cluster membership matrix of subgraph S` after alignment
number of nodes from cluster k
nk /n, i.e. proportion of nodes from cluster k
mink ฯk , similarly ฯmax
normalized mismatch between two clusterings ฯ, ฯ 0 (ฯ, ฯ 0 : {1, . . . , n} โ {1, . . . , K})
normalized mismatch between two clusterings Z, Z 0 (Z, Z 0 โ {0, 1}nรK )
normalized between two clustering matrices C, C 0
nฮด(Z, Z 0 )
1 if i โ S` and 0 otherwise
the vector (ฯ1 , . . . , ฯK )
number of nodes from cluster k in a subgraph S
|Sa โฉ Sb |
2
6
6
6
6
6
6
7
8
9
9
9
9
9
11
11
11
14
14
16
26
28
1
Introduction
Community detection, also known as community extraction or network clustering, is a central problem in
network inference. A wide variety of real world problems, ranging from finding protein protein complexes
in gene networks (Guruharsha et al., 2011) to studying the consequence of social cliques on adolescent
behavioral patterns (Hollingshead, 1949) depend on detecting and analyzing communities in networks. In
most of these problems, one observes co-occurrences or interactions between pairs of entities, i.e. pairwise
edges and possibly additional node attributes. The goal is to infer the hidden community memberships.
Many of these real world networks are massive, and hence it is crucial to develop and analyze scalable
algorithms for community detection. We will first talk about methodology that uses only the network
connections for inference. These can be divided into roughly two types. The first type consists of methods
which are derived independently of any model assumption. These typically involve the formulation of global
optimization problem; examples include normalized cuts (Shi and Malik, 2000), Spectral Clustering (Ng
et al., 2002), etc.
On the other end, Statisticians often devise techniques under model assumptions. The simplest statistical
model for networks with communities is the Stochastic Blockmodel (SBM) (Holland et al., 1983). The key
idea in a SBM is to enforce stochastic equivalence, i.e. two nodes in the same latent community have
identical probabilities of connection to all nodes in the network. There are many extensions of SBM. The
Degree Corrected Stochastic Blockmodel (Karrer and Newman, 2011) allow one to model varied degrees in
the same community, whereas a standard SBM does not. Mixed membership blockmodels (Airoldi et al.,
2009) allow a node to belong to multiple communities, whereas in a SBM, a node can belong to exactly one
cluster.
For an SBM generating a network with n nodes and K communities, one has a hidden community/cluster
membership matrix Z โ {0, 1}nรK , where Zik = 1 if node i is in community k โ [K]. Given these
memberships, the link formation probabilities are given as
P(Aij = 1 | Zik = 1, Zjk0 = 1) = Bkk0 ,
where B is a K ร K symmetric parameter matrix of probabilities. The elements of B may decay to zero as
n grows to infinity, to model sparse networks.
Typically the goal is to estimate the latent memberships consistently. A method outputting an estimate
Zฬ is called strongly consistent if P(Zฬ = Zฮ ) โ 1 for some K ร K permutation matrix ฮ , as n โ โ. A
weaker notion of consistency is when the fraction of misclustered nodes goes to zero as n goes to infinity.
Typically most of the consistency results are derived where average degree of the network grows faster than
the logarithm of n. This is is often called the semi-dense regime. When average degree is bounded, we are
in the sparse regime.
There are a plethora of algorithms for community detection. These include likelihood-based methods (Amini et al., 2013), modularity based methods (Snijders and Nowicki, 1997; Newman and Girvan,
2004; Bickel and Chen, 2009), spectral methods (Rohe et al., 2011), semi-definite programming (SDP)
based approaches (Cai et al., 2015) etc. Among these, spectral methods are scalable since the main bottleneck is computing top K eigenvectors of a large and often sparse matrix. While the theoretical guarantees
of Spectral Clustering are typically proven in the semi-dense regime (McSherry, 2001; Rohe et al., 2011; Lei
and Rinaldo, 2015), a regularized version of it has been shown to perform better than a random predictor
for sparse networks (Le et al., 2015). Profile likelihood methods (Bickel and Chen, 2009) involve greedy
search over all possible membership matrices, which makes them computationally expensive. Semidefinite
programs are robust to outliers (Cai et al., 2015) and are shown to be strongly consistent in the dense
regime (Amini and Levina, 2014) and yield a small but non-vanishing error in the sparse regime (Gueฬdon
3
and Vershynin, 2015). However, semi definite programs are slow and typically only scale to thousands of
nodes, not millions of nodes.
Methods like spectral clustering on geodesic distances (Bhattacharyya and Bickel, 2014) are provably
consistent in the semi-dense case, and can give a small error in sparse cases. However, it requires computing
all pairs of shortest paths between all nodes, which can pose serious problems for both computation and
storage for very large graphs.
Monte Carlo methods (Snijders and Nowicki, 1997; Nowicki and Snijders, 2001), which are popular
tools in Bayesian frameworks, are typically not scalable. More scalable alternatives such as variational
methods (Gopalan and Blei, 2013) do not have provable guarantees for consistency, and often suffer from
bad local minima.
So far we have discussed community detection methods which only look at the network connections, and
not node attributes, which are often also available and may possess useful information on the community
structure (see, e.g., Newman and Clauset (2015)). There are extensions of the methods mentioned earlier
which accommodate node attributes, e.g., modularity based (Zhang et al., 2015), spectral (Binkiewicz et al.,
2014), SDP based (Yan and Sarkar, 2016), etc. These methods come with theoretical guarantees and have
good performance in moderately sized networks. While existing Bayesian methods (McAuley and Leskovec,
2012; Newman and Clauset, 2015; Xu et al., 2012) are more amenable to incorporating covariates in the
inference procedure, they often are computationally expensive and lack rigorous theoretical guarantees.
While the above mentioned array of algorithms are diverse and each has unique aspects, in order to scale
them to very large datasets, one has to apply different computational tools tailored to different algorithmic
settings. While stochastic variational updates may be suitable to scale Bayesian methods, pseudo likelihood
methods are better optimized using row sums of edges inside different node blocks.
In this article, we propose a divide and conquer approach to community detection. The idea is to apply a
community detection method on small subgraphs of a large graph, and somehow stitch the results together.
If we could achieve this, we would be able to scale up any community detection method (which may involve
covariates as well as the network structure) that is computationally feasible on small graphs, but is difficult
to execute on very large networks. This would be especially useful for computationally expensive community
detection methods (such as SDPs, modularity based methods, Bayesian methods etc.). Another possible
advantage concerns variational likelihood methods (such as mean-field) with a large number (depending
on n) of local parameters, which typically have an optimization landscape riddled with local minima. For
smaller graphs there are less parameters to fit, and the optimization problem often becomes easier.
Clearly, the principal difficulty in doing this, is matching the possibly conflicting label assignments from
different subgraphs (see Figure 1(a) for an example). This immediately rules out a simple-minded averaging
of estimates ZฬS of cluster membership matrices ZS , for various subgraphs S, as a viable stitching method.
In this regard, we propose two different stitching algorithms. The first is called Piecewise Averaged
Community Estimation (PACE); in which we focus on estimating the clustering matrix C = ZZ > , which
is labeling invariant, since the (i, j)-th element of this matrix being one simply means that nodes i and j
belong to the same cluster, whereas the value zero means i and j belongs to two different clusters. Thus
we first compute estimates of ZS ZS> for various subgraphs S and then average over these matrices to obtain
an estimate Cฬ of C. Finally we apply some computationally cheap clustering algorithm like approximate
K-means, DGClusterโ , spectral clustering etc. on Cฬ to recover an estimate of Z.
We also propose another algorithm called Global Alignment of Local Estimates (GALE), where we first
take a sequence of subgraphs, such that any two consecutive subgraphs on this sequence have a large
intersection, and then traverse through this sequence, aligning the clustering based on a subgraph with an
โ
This is a greedy algorithm we propose in this article, see Appendix A.
4
(a)
(b)
Figure 1: (a) Conflicting label assignments on two subgraphs, on one labels are denoted by 0/1, on the other
by +/โ, (b) onion neighborhood: the yellow vertices and the solid edges between them constitute the ego
network of the root vertex colored red. The green and yellow vertices together with the solid edges between
them constitute the 2-hop onion neighborhood of the root
averaged clustering of the union of all its predecessor subgraphs in the sequence, which have already been
aligned. The alignment is done via an algorithm called Match which identifies the right permutation to align
two clusterings on two subgraphs by computing the confusion matrix of these two clusterings restricted
to the intersection of the two subgraphs. Whereas a naive approach would entail searching through all K
permutations, Match finds the right permutation in K log K time. Once this alignment step is complete,
we get an averaged clustering of the union of all subgraphs (which covers all the vertices). By design GALE
works with estimates of cluster membership matrices ZS directly to output an estimate of Z, and thus,
unlike PACE, avoids the extra overhead of recovering such an estimate from Cฬ.
The rest of the paper is organized as follows. In Section 2 we describe our algorithms. In Section 3 we
state our main results and some applications. Section 4 contains simulations and real data experiments.
In Section 6 we provide proofs of our main results, while relegating some of the details to the Appendix,
Section B. Finally, in Section 5 we conclude with some discussions and directions for future work.
2
Two divide and conquer algorithms
As we discussed in the introduction, the main issue with divide and conquer algorithms for clustering is
that one has to somehow match up various potentially conflicting label assignments. In this vein we propose
two algorithms to accomplish this task. Both algorithms first compute the clustering on small patches of
a network; these patches can be induced subgraph of a random subsample of nodes, or neighborhoods.
However, the stitching procedures are different.
5
2.1
PACE: an averaging algorithm
Suppose A is the adjacency matrix of a network with true cluster membership of its nodes being given by
the n ร K matrix Z where there are K clusters. Set C = ZZ > to be the clustering matrix whose (i, j)-th
entry is the indicator of whether nodes i, j belong to the same cluster. Given A we will perform a local
clustering algorithm to obtain an estimate of C, from which an estimate Zฬ of the cluster memberships may
be reconstructed.
Algorithm 1 PACE: Piecewise Averaged Community Estimation
1: Subgraph selection: Fix a positive integer threshold m? for minimum required subgraph size. Fix
another positive integer T , that will be the number of subgraphs we will sample. Given A, choose
T subsets S1 , . . . , ST of the nodes with |S` | โฅ m? by some procedure, e.g., select m โฅ m? nodes at
random, or pick h-hop neighborhoods of vertices in G, or ego-neighborhood of vertices. By AS` denote
the adjacency matrix of the network induced by S` .
2:
Clustering on subgraphs: Perform any of the standard clustering algorithms like Profile Likelihood
(PL), Mean Field Likelihood (MFL), Spectral Clustering (SC), Semi-Definite Programming (SDP) etc.
on each of these T subgraphs which have size at least m? to obtain estimated clustering matrices
Cฬ (S` ) = Cฬ (`) . For the rest of the subgraphs set Cฬ (`) โก 0. Extend Cฬ (`) to an n ร n matrix by setting
(`)
Cฬij = 0 if at least one of i, j was not selected in S` . Letโs denote the resulting matrix again by Cฬ (`) .
3:
Patching up: Let yij denote the indicator of the event that both i, j were selected in S` . Set Nij =
PT
(`)
`=1 yij . Define the combined estimator Cฬ = Cฬฯ by
(`)
Cฬij = Cฬฯ,ij =
1{Nij โฅฯ }
(`) (`)
`=1 yij Cฬij
PT
Nij
=
1{Nij โฅฯ }
(`)
`=1 Cฬij
PT
Nij
.
(1)
Here 1 โค ฯ โค T is an integer tuning parameter. We will call Cฬฯ as Piecewise Averaged Community
Estimator (also abbreviated as PACE).
The ฯ parameter in PACE seems to reduce variance in estimation quality as it discards information from
less credible sources โ if a pair of nodes has appeared in only a few subgraphs, we do not trust what the
patching has to say about them. Setting ฯ = ฮธE(Nij ) seems to work well in practice (this choice is also
justified by our theory).
A slight variant of Algorithm 1 is where we allow subgraph and/or node-pair specific weights w`,i,j in
the computation of the final estimate, i.e.
P
P
(`) (`)
(`)
1{Nij โฅฯ } T`=1 w`,i,j yij Cฬij
1{Nij โฅฯ } T`=1 w`,i,j Cฬij
Cฬij = Cฬฯ,ij =
=
,
(2)
Nij
Nij
P
(`)
where Nij now equals T`=1 w`,i,j yij . We may call this estimator w-PACE standing for weighted-PACE. If the
weights are all equal, w-PACE becomes equivalent to ordinary PACE. There are natural nontrivial choices,
including
(i) w`,i,j = |S` |, which will place more weight to estimates based on large subgraphs,
(ii) w`,i,j = degS` (i) + degS` (j), where degS (u) denotes the degree of node u in subgraph S (this will put
more weight on pairs which have high degree in S` ).
6
The first prescription above is intimately related to the following sampling scheme for ordinary PACE: pick
subgraphs with probability proportional to their sizes. For instance, in Section 4.2 we analyze the political
blog data of Adamic and Glance (2005) where neighborhood subgraphs are chosen by selecting their roots
with probability proportional to degree.
In real world applications, it might make more sense to choose these weights based on domain knowledge
(for instance, it may be that certain subnetworks are known to be important). Another (minor) advantage
of having weights is that when T = 1 and |S1 | = n, we have Nij = w1,i,j and so if w1,i,j โฅ ฯ , then
(1)
Cฬij = Cฬij ,
i.e. w-PACE becomes the estimator based on the full graph. This is for example true with w`,i,j = |S` |,
because ฯ is typically much smaller than n. However, ordinary PACE lacks this property unless ฯ = 1, in
fact, with ฯ > 1, the estimate returned by PACE is identically 0. Anyway, in what follows, we will stick with
ordinary PACE because of its simplicity.
Before we discuss how to reconstruct an estimate Zฬ of Z from Cฬ, let us note that we may obtain a binary
matrix Cฬฮท by thresholding Cฬ at some level ฮท (for example, ฮท = 1/2):
Cฬฮท := [Cฬ > ฮท].
This thresholding does not change consistency properties (see Lemma B.1). Looking at a plot of this matrix
gives a good visual representation of the community structure. In what follows, we work with unthresholded
Cฬ.
Reconstruction of Zฬ: How do we actually reconstruct Zฬ from Cฬ? The key is to note that members of the
same community have identical rows in C and that, thanks to PACE, we have gotten hold of a consistent
estimate of C. Thus we may use any clustering algorithm on the rows of Cฬ to recover the community
memberships. Another option would be to run spectral clustering on the matrix Cฬ itself. However, as the
rows of Cฬ are n-vectors, most clustering algorithms will typically have a running time of O(n3 )โ at best.
Indeed, the main computational bottleneck of any distance based clustering algorithm in a high dimensional
situation like the present one, is computing dij = kCฬi? โCฬj? k which takes O(n) bit operations. However, since
we have gotten a good estimate of C, we can project the rows of Cฬ onto lower dimensions, without distorting
the distances too much. The famous Johnson-Lindenstrauss Lemma for random projections says that by
projecting onto โฆ(log n/2 ) dimensions, one can keep, with probability at least 1 โ O(1/n), the distances
between projected vectors within a factor of (1 ยฑ ) of the true distances. Choosing as inverse polylog(n)
we need to project onto polylog(n) dimensions and this would then readily bring the computational cost of
any distance based algorithm down from O(n3 ) to O(n2 polylog(n)).
Following the discussion of the above paragraph, we first do a random projection of the rows of Cฬ onto
s (= polylog(n)) dimensions and then apply a (distance-based) clustering algorithm.
Algorithm 2 Recovering Zฬ from Cฬ: random projection followed by distance based clustering
1: Select a dimension s for random projection. Let Cluster(ยท, K) be a clustering algorithm that operates on
the rows of its first argument and outputs K clusters.
โ
2: Cฬproj โ CฬR/ s, where R is a standard Gaussian matrix of dimensions n ร s.
3:
Zฬ โ Cluster(Cฬproj , K).
โ
A word on asymptotic notation: in addition to the standard โOโ, โโฆโ, โฮโ, โoโ notations, and their probabilistic counterparts,
we will use the following less standard alternatives to clean up the presentation at places: (i) A B to mean A = ฮ(B), and
(ii) A B to mean B = o(A). We will also sometimes use a โtildeโ over the standard notations to hide polylogarithmic factors.
7
As for Cluster(ยท, K), we may use approximate K-means or any other distance based clustering algorithm,
e.g., DGCluster(Cฬ, Cฬproj , K), a greedy algorithm presented in Appendix A as Algorithm 5.
2.2
GALE: a sequential algorithm
First we introduce a simple algorithm for computing the best permutation to align labels of one clustering
(Z1 ) to another (Z2 ) of the same set of nodes (with fixed ordering) in a set S. The idea is to first compute
the confusion matrix between two clusterings. Note that if the two labelings each have low error with
respect to some unknown true labeling, then the confusion matrix will be close to a diagonal matrix up to
permutations. The following algorithm below essentially finds a best permutation to align one clustering to
another.
Algorithm 3 Match: An algorithm for aligning two clusterings of the same set S of nodes. Input Z1 , Z2 โ
{0, 1}|S|รK .
Compute K ร K confusion matrix M = Z1> Z2 . Set ฮ โ 0KรK .
2: while there are no rows/columns left do
1:
(a) Find i, j, such that Mij = kM kโ (a tie can be broken arbitrarily).
(b) Set ฮ ij = 1.
(c) Replace the i-th row and j-th columns in M with โ1.
3:
Return the permutation matrix ฮ .
Remark 2.1. One can also compute the optimal permutation by searching through all K! permutations of the
labels and picking the one which gives smallest mismatch between the two; but Match brings the dependence
on K down from exponential to quadratic. Note that if one of the clusterings are poor, then Match may not
retrieve the optimal permutation. However, our goal is to cluster many subgraphs using an algorithm which
has good accuracy with high probability (but may be computationally intensive, e.g., Profile Likelihood or
Semidefinite Programming) and then use the intersections between the subgraphs to align one to another. As
we shall show later, as long as there are enough members from each community in S, the simple algorithm
sketched above suffices to find an optimal permutation.
Now we present our sequential algorithm which aligns labelings across different subgraphs. The idea is
to first fix the indexing of the nodes; cluster the subgraphs (possibly with a parallel implementation) using
some algorithm, and then align the clusterings along a sequence of subgraphs. To make things precise, we
make the following definition.
Definition 2.1. Let Sm,T = (V, E) (vertex set V and edge set E) denote a โsuper-graph of subgraphsโ
where each subgraph is a node, and two nodes are connectedlif the
m corresponding subgraphs have a substantial
m2
overlap. For random m-subgraphs, this threshold is m1 := 2n .
Define a traversal through a spanning tree T of Sm,T as a sequence x1 , . . . , xJ , xj โ [T ], T โค J โค 2T ,
covering all the vertices, such that along the sequence xi and xi+1 are adjacent, for 1 โค i โค J โ 1 (i.e. a
traversal is just a walk on T of length at most 2T โ 1 passing through each vertex at least once).
After we construct a traversal, we travel through this traversal such that at any step, we align the
current subgraphโs labels using the Match algorithm (Algorithm 3) on its intersection with the union of the
previously aligned subgraphs. At the end, all subgraph labellings are aligned to the labeling of the starting
subgraph. Now we can simply take an average or a majority vote between these.
8
Algorithm 4 GALE: Global Alignment of Local Estimates. Input adjacency matrix A, parameters
m, T, ฯi , i โ [T ], a base algorithm A (e.g., PL, MFL, SC, SDP etc. )
1: Subgraph selection: Given A, choose T subsets S1 , . . . , ST of the nodes by some procedure, e.g., select
them at random, or select T random nodes and then pick their h-hop neighborhoods. By AS` denote
the adjacency matrix of the network induced by S` .
2:
Clustering on subgraphs: Perform algorithm A on each of these T subgraphs to obtain estimated
cluster membership matrices Zฬ` = ZฬS` . Extend Zฬ` to a n ร K matrix by setting (Zฬ` )jk = 0 for all
k โ [K] if j โ
/ S` .
Traversal of subgraphs: Construct a traversal Sx1 , . . . , SxJ through the T subgraphs.
Initial estimate of Z: Zฬ โ Zฬx1 . Also set Zฬ (x1 ) := Zฬx1 .
5: Sequential label aligning: For subgraph Sxi on the traversal (i = 1, . . . , J), if xi has not been visited
yet,
3:
4:
(a) Compute the overlap between the current subgraph with all subgraphs previously visited, i.e. let
S = Sxi โฉ โชiโ1
`=1 Sx` .
(b) Compute the best permutation to match the clustering Zฬxi , Zฬ on this set S, i.e. compute ฮ ฬi =
Match(Zฬxi S , Zฬ S ).
(c) Permute the labels of the nodes of Sxi to get an aligned cluster membership matrix Zฬ (xi ) โ Zฬxi ฮ ฬ.
P
(d) Update Zฬjk โ
(x )
`โ{x1 ,...,xi }
P
Zฬjk ` 1{jโSx
`โ{x1 ,...,xi }
1{jโSx
`
}
`
}
1{P`โ{x
1 ,...,xi }
1{jโSx
`
} >ฯi }
, for some threshold ฯi .
(e) Mark Sxi as visited.
Implementation details: Constructing a traversal of the subgraphs can be done using a depth first search
of the super-graph Sm,T of subgraphs. For our implementation, we start with a large enough subgraph
(the parent), pick another subgraph that has a large overlap with it (the child), align it and note that this
subgraph has been visited. Now recursively find another unvisited child of the current subgraph, and so on.
It is possible that a particular path did not cover all vertices, and hence it is ideal to estimate clusterings
with multiple traversals with different starting subgraphs and then align all these clusterings, and take an
average. This is what we do for real networks. We also note that at any step, if we find a poorly clustered
subgraph, then this can give a bad permutation which may deteriorate the quality of aligning the subsequent
subgraphs on the path. In order to avoid this we use a self validation routine. Let S be intersection of current
subgraph with union of the previously visited subgraphs. After aligning the current subgraphโs clustering,
we compute the classification accuracy of the current labeling of S with the previous labeling of S. If this
accuracy is large enough, we use this subgraph, and if not we move to the next subgraph on the path. For
implementation, we use a threshold of 0.55.
Computational time and storage: The main computational bottleneck in GALE is in building a traversal
through the random subgraphs. Let ฮทm,T be the time for computing the clusterings for T subgraphs
in parallel. A naive implementation would require computing intersections between all T2 pairs of mp
subsets. As we will show in our theoretical analysis, we take m = ฯ( n/ฯmin ), where ฯmin := mink ฯk (here
ฯk := nk /n, where nk is the size of the k-th cluster) and T = โฆฬ(n/m). Taking ฯmin = ฮ(1), the computation
of intersections takes O(T 2 m) = Oฬ(n3/2 ) time. Further, a naive comparison for computing subsets similar
or close to a given one would require T log T time for each subset leading to T 2 log T = Oฬ(n) computation.
However, for building a traversal one only needs access to subsets with large overlap with a given subset,
9
which is a classic example of nearest neighbor search in Computer Science.
One such method is the widely used and theoretically analyzed technique of Locality Sensitive Hashing
(LSH). A hash function maps any data object of an arbitrary size to another object of a fixed size. In our case,
we map the characteristic vector of a subset to a number. The idea of LSH is to compute hash functions for
two subsets A and B such that the two functions are the same with high probability if A and B are โcloseโ.
In fact, the amount of overlap normalized by m is simply the cosine similarity between the characteristic
vectors ฯ(A) and ฯ(B) of the two subsets, for which efficient hashing schemes h : {0, 1}n โ {0, 1} using
random projections exist Charikar (2002), with
P(h(A) = h(B)) = 1 โ arccos(ฯ(A)T ฯ(B)/m)/ฯ.
For LSH schemes, one needs to build L := T ฯ hash tables, for some ฯ < 1, that governs the approximation
quality. In each hash table, a โbucketโ corresponding to an index stores all subsets which have been hashed
to this index. For any query point, one evaluates O(L) hash functions and examines O(L) subsets hashed
to those buckets in the respective hash tables. Now for these subsets, the distance is computed exactly. The
1+ฯ
preprocessing time is O(T 1+ฯ ) = Oฬ(n 2 ), with storage being O(T 1+ฯ + T m) = Oฬ(n), and total query time
being O(T 1+ฯ m) = Oฬ(n1+ฯ/2 ). This brings down the running time added to the algorithm specific ฮทm,T
from sub-quadratic time Oฬ(n3/2 ) to nearly linear time, i.e. Oฬ(n1+ฯ/2 ).
Thus, for other nearly linear time clustering algorithms GALE may not lead to computational savings.
However, for algorithms like Profile Likelihood or SDP which are well known to be computationally intensive,
GALE can lead to a significant computational saving without requiring a lot of storage.
2.3
Remarks on sampling schemes
With PACE we have mainly used random m-subgraphs, h-hop neighborhoods, and onion neighborhoods,
but many other subgraph sampling schemes are possible. For instance, choosing roots of hop neighborhoods
with probability proportional to degree, or sampling roots from high degree nodes (we have done this in
our analysis of the political blog data, in Section 4.2). As discussed earlier, this weighted sampling scheme
is related to w-PACE. A natural question regarding h-hop neighborhoods is how many hops to use. While
we do not have a theory for this yet, because of โsmall world phenomenonโ we expect not to need many
hops; typically in moderately sparse networks, 2-3 hops should be enough. Although, an adaptive procedure
(e.g., cross-validation type) for choosing h would be welcome. Also, since neighborhood size increases
exponentially with hop size, an alternative to choosing full hop-neighborhoods is to choose a smaller hopneighborhood and then add some (but not all) randomly chosen neighbors of the already chosen vertices.
Other possibilities include sampling a certain proportion of edges at random, and the consider the subgraph
induced by the participating nodes. We leave all these possibilities for future work.
We have analyzed GALE under the random sampling scheme. For any other scheme, one will have to
understand the behavior of the intersection of two samples or neighborhoods. For example, if one takes hhop neighborhoods, for sparse graphs, each neighborhood predominantly has nodes from mainly one cluster.
Hence GALE often suffers with this scheme. We show this empirically in Section 4, where GALEโs accuracy
is much improved under a random m-subgraph sampling scheme.
2.4
Beyond community detection
The ideas behind PACE and GALE are not restricted to community detection and can be modified for
application in other interesting problems, including general clustering problems, co-clustering problems
(Rohe et al. (2016)), mixed membership models, among others (these will be discussed in an upcoming
article). In fact, Mackey et al. (2015) took a similar divide and conquer approach for matrix completion.
10
3
Main results
In this section we will state and discuss our main results on PACE and GALE, along with a few applications.
3.1
Results on PACE
Let ฯ and ฯ 0 be two clusterings (of n objects into K clusters), usually their discrepancy is measured by
n
ฮดc (ฯ, ฯ 0 ) = inf
ฮพโSK
1
1X
1{ฯ(i)6=ฮพ(ฯ0 (i))} =
inf kฮพ(ฯ) โ ฯ 0 k0 ,
n
n ฮพโSK
i=1
where SK is the permutation group on [K]. If Z, Z 0 are the corresponding n ร K binary matrices, then
a related measure of discrepancy between the two clusterings is ฮด(Z, Z 0 ) = inf Q perm. n1 kZQ โ Z 0 k0 . It is
easy to see that ฮด(Z, Z 0 ) = 2ฮดc (ฯ, ฯ 0 ). (To elaborate, let Qฮพ be the permutation matrix corresponding to the
0 , i.e. k(ZQ ) โZ 0 k =
permutation ฮพ, i.e. Qij = 1{ฮพ(i)=j)} . Then ฮพ(ฯ(i) 6= ฯ 0 (i), if and only if (ZQฮพ )i? 6= Zi?
ฮพ i?
i? 0
2.) For our purposes, however, a more useful measure of discrepancy would be the normalized Frobenius
squared distance between the corresponding clustering matrices C = ZZ > and C 0 = Z 0 Z 0> , i.e.
ฮดฬ(C, C 0 ) =
1
kC โ C 0 k2F .
n2
Now we compare these two notions of discrepancies.
Proposition 3.1. We have ฮดฬ(C, C 0 ) โค 4ฮด(Z, Z 0 ) = 8ฮดc (ฯ, ฯ 0 )
Incidentally, if the cluster sizes are equal, i.e. n/K, then one can show that
ฮดฬ(C, C 0 ) โค
4
8
ฮด(Z, Z 0 ) = ฮดc (ฯ, ฯ 0 ).
K
K
Although we do not have a lower bound on ฮดฬ(C, C 0 ) in terms of ฮด(Z, Z 0 ), Lemma A.1 of Tang et al. (2013)
gives us (with X = Z, Y = Z 0 ) that there exists an orthogonal matrix O such that
p
p
โ
kC โ C 0 k( KkCk + KkC 0 k)
2 KnkC โ C 0 k
0
kZO โ Z kF โค
โค
,
ฮปmin (C)
nmin (Z)
where we used the fact that kCk = ฮปmax (C) = nmax (Z) โค n. The caveat here is that the matrix O need not
be a permutation matrix.
To prove consistency of PACE we have to assume that the clustering algorithm A we use has some
consistency properties. For example, it will suffice to assume that for a randomly chosen subgraph S (under
our subgraph selection procedure), Eฮด(ZฬS , ZS )โ is small. The following is our main result on the expected
misclustering rate of PACE.
Theorem 3.1 (Expected misclustering rate of PACE). Let S be a randomly chosen subgraph according to
our sampling scheme. Let ฯmax = maxk ฯk . We have
Eฮดฬ(Cฬ, C) โค
T
ร EkCฬ (S) โ C (S) k2F + ฯmax ร max P(Nij < ฯ ),
i,j
ฯ n2
where
EkCฬ (S) โ C (S) k2F โค n2 P(|S| < m? ) + 4E|S|2 ฮด(ZฬS , ZS )1(|S|โฅm? ) .
โ
The expectation is taken over both the randomness in the graph and the randomness of the sampling mechanism.
11
(3)
The first term in (3) essentially measures the performance of the clustering algorithm we use on a
randomly chosen subgraph. The second term measures how well we have covered the full graph by the
chosen subgraphs, and only depend on the subgraph selection procedure. The effect of the algorithm we use
is felt through the first term only.
We can now specialize Theorem 3.1 to various subgraph selection schemes. First, we consider randomly
chosen m-subgraphs, which is an easy corollary.
Corollary 3.1 (Subgraphs are induced by m โฅ m? randomly chosen nodes). Let p =
and ฯ = ฮธT p. We have
m
2
Eฮดฬ(Cฬ, C) โค
ร Eฮดฬ(Cฬ (S) , C (S) ) + ฯmax ร eโ(1โฮธ) T p/2 .
ฮธ(m โ 1)
m(mโ1)
n(nโ1) ,
0<ฮธ<1
(4)
m
Notice that the constant ฮธ(mโ1)
in (4) can be made as close to 1 as one desires, which means that the
above bound is essentially optimal.
Full h-hop neighborhood subgraphs are much harder to analyze and will not be pursued here. However,
ego networks, which are 1-hop neighborhoods minus the root node (see Figure 1(b)), are easy to deal with.
One can also extend our analysis to h-hop onion neighborhoods which are recursively defined as follows:
O1 (v) = S1 (v) is just the ego network of vertex v; in general, the h-th shell Sh (v) := ]uโShโ1 (v) [O1 (u) \
Ohโ1 (v) โช {v}], and Oh (v) = Ohโ1 (v) ] Sh (v), where the operation ] denotes superposition of networks.
Here, for ease of exposition, we choose to work with ego networks (1-hop onion neighborhoods).
Corollary 3.2 (Ego neighborhoods under a stochastic block model). Let B# = max Bab , B? = min Bab and
2
โ
?
ฯ = TB
4 and m? โค (n โ 1)B? /2. Let ฮธ > 1. Then
Eฮดฬ(Cฬ, C) โค
2
16(1 + ฮธ)2 B#
B?2
ร Eฮด(ZฬS , ZS )1(|S|โฅm? ) + โ,
(5)
where
"
!
2
#
ฮธ nB#
4
nB?2
4
nB?4
T B?2
โ โค 2 ร exp โ
+ 2 2 ร exp โ
+ ฯmax ร 2 exp โ
+ exp โ
.
2
B?
16B#
n B?
6
16
16B#
We will now use existing consistency results on several clustering algorithms A, in conjunction with the
above bounds to see what conditions (i.e. conditions on the model parameters, and m, T etc.) are required
for PACE to be consistent. We first consider (1 + )-approximate adjacency spectral clustering (ASP) of Lei
and Rinaldo (2015) as A. We will use stochastic block model as the generative model and for simplicity will
assume that the link probability matrix has the following simple form
B = ฮฑn [ฮปI + (1 โ ฮป)11> ] with 0 < ฮป < 1.
(6)
We now quote a slightly modified version of Corollary 3.2 of Lei and Rinaldo (2015) for this model.
Lemma 3.1 (Lei and Rinaldo (2015)). Let c0 , , r > 0. Consider an adjacency matrix A generated from
the simple block model (6) where ฮฑn โฅ c0 log n/n. If Zฬ is the output of the (1 + )-approximate adjacency
spectral clustering algorithm applied to A, then there exists an absolute constant c = c(c0 , r) such that with
probability at least 1 โ nโr ,
1
K ฯmax
โ1
ฮด(Zฬ, Z) โค min c (2 + ) 2
(7)
2 n, 1 .
2
ฮป ฮฑn ฯmin
โ
Actually we can allow ฯ = ฮธ0 T B?2 , for any 0 < ฮธ0 < 1. As the resulting bound involves complicated constants depending
on ฮธ and does not add anything extra as to the nature of the bounds, we have chosen to work with a particular ฮธ0 (= 1/4) to
2
ease our exposition. With a general ฮธ0 , the constant multiplier in the first term in (5) will be 4 (1+ฮธ)
, instead of 16(1 + ฮธ)2 .
ฮธ0
0
12
Corollary 3.3 ((1 + )-approximate adjacency spectral clustering with random m-subgraphs). Assume the
setting of Lemma 3.1. Let r, r0 > 0. We have
2K
8m
K ฯmax
1
2
โ1
Cn,m,r0 , 1 + r0 + r + ฯmax ร eโ(1โฮธ) T p/2 . (8)
Eฮดฬ(Cฬ, C) โค
ร min c (2 + ) 2
2
ฮธ(m โ 1)
ฮป ฮฑn ฯmin m
m
n
Here the quantity Cn,m,r0 โ 1, if
2 m
ฯmin
ฯmax log n
โ โ.
The proof of Corollary 3.3 follows from Corollary 3.1 and an estimate for Eฮด(ZฬS , ZS ) given in (33), which
max
= o(1),
is obtained using Lemma 3.1. In order for the first term of (8) to go to zero we need ฮป2 Kฯ
mฮฑ ฯ 2
n min
Kฯmax
.
2
ฮป2 ฮฑn ฯmin
1
K)
2
i.e. m
Thus for balanced block sizes (i.e. ฯmax , ฯmin
we need to have m ฮปK
2 ฮฑ . So,
n
qualitatively, for large K or small ฮฑn or a small separation between the blocks, m has to be large, which is
natural to expect. In particular, for fixed K and ฮป, this shows that we need subgraphs of size m ndโ1
n ,
n2
n2
and T m2 many of them to achieve consistency (here the average degree dn nฮฑn ). Let T = m2 rn
and m = dnn sn , where both rn , sn โ โ. Let us see what computational gain we get from this. Spectral
clustering on the full graph has complexity O(n3 ), while the complexity of PACE with spectral clustering is
2
3
n
n
3
3
2
O(T m ) = O
rn m = O n mrn = O
rn sn .
m2
dn
So if dn = ฮ(nฮฑ ), then the complexity would be O(n3โฮฑ rn sn ), which is essentially O(n3โฮฑ ). When dn =
ฮ(log n) the gain is small.
Note however that for a parallel implementation, with each source processing M out of the T subgraphs,
wemay get a significant boost in running time, at least in terms of constants; the running time would be
3
O Mndn rn sn .
Corollary 3.4 ((1 + )-approximate adjacency spectral clustering with ego subgraphs). Assume the setting
of Lemma 3.1. Let r, r0 > 0. We have
r
32(1 + ฮธ)2
K ฯmax
16
2K
4
โ1
Eฮดฬ(Cฬ, C) โค
ร min c (2 + ) 4 2 2
Dn,B,r0 , 1 + r0 +
+
+ โ, (9)
ฮป2
ฮป ฮฑn ฯmin n
nฮป2 ฮฑn
nฮปฮฑn
n
where
2
4
nฮป2 ฮฑn
4
ฮธ nฮฑn
nฮป4 ฮฑn2
T ฮป2 ฮฑn2
+ 2 2 2 ร exp โ
+ ฯmax ร 2 exp โ
+ exp โ
.
โ โค 2 2 ร exp โ
ฮป ฮฑn
16
n ฮป ฮฑn
6
16
16
Here the quantity Dn,B,r0 โ 1, if
2 ฮป2 nฮฑ
ฯmin
n
ฯmax log n
โ โ.
The proof of Corollary 3.4 follows from Corollary 3.2 and an estimate for Eฮด(ZฬS , ZS )1(|S|โฅm? ) given in
(34), which is obtained using Lemma 3.1. For the right hand side in (9) to go to zero (assuming K fixed,
balanced block sizes), we need min{nฮฑn2 , T ฮฑn2 } โ โ. In terms of average degree this means that we need
โ
2
dn n, and T dn2 . That with ego neighborhoods we can not go down to dn = ฮ(log n) is not surprising,
n
since these ego networks are rather sparse in this case. One needs to use larger neighborhoods. Anyway,
โ
2
writing dn = nrn , T = dn2 sn , where both rn , sn โ โ, the complexity of adjacency spectral clustering, in
n
2
this case becomes O(T d3n ) = O(n2 dn rn sn ) and with M processing units gets further down to O( nMdn rn sn ).
13
Although from our analysis, it is not clear why PACE with spectral clustering should work well for sparse
settings, in numerical simulations, we have found that in various regimes PACE with (regularized) spectral
clustering vastly outperforms ordinary (regularized) spectral clustering (see Table 4).
It seems that the reason why PACE works well in sparse settings lies in the weights Nij . With h-hop
neighborhoods as the chosen subgraphs, if Puv = 1{ฯg (u,v)โคh} , where ฯg is the geodesic distance on G, then
Nij = (P 2 )ij . It is known that spectral clustering on the matrix of geodesic distances works well in sparse
settings (Bhattacharyya and Bickel (2014)). PACE seems to inherit that property through N , although we
do not presently have a rigorous proof of this.
We conclude this section with an illustration of PACE with random m-subgraphs using SDP as the
algorithm A. We shall use the setting of Theorem 1.3 of Gueฬdon and Vershynin (2015) for the illustration,
stated here with slightly different notation. Let SDP-GV denote the following SDP (Gueฬdon and Vershynin,
2015, SDP (1.10))
maximize hA, Xi
subject to X 0, X โฅ 0, diag(X) = In , 1> X1 = 1> C1.
Lemma 3.2 (Gueฬdon and Vershynin (2015), Theorem 1.3). Consider an SBM with
P mink Bkk โฅ a/n,
2
maxk6=k0 Bkk0 โค b/n, where a > b. Also let the expected variance of all edges n(nโ1) 1โคkโคk0 โคK Bkk0 (1 โ
Bkk0 )nkk0 = ng , where nkk0 denotes the number of pairs of vertices, one from community k, the other from
community k 0 . Fix an accuracy > 0. If g โฅ 9 and (a โ b)2 โฅ 484โ2 g, then any solution Xฬ of SDP-GV
satisfies
1
kXฬ โ Ck2F โค .
n2
0
Corollary 3.5 (SDP with random m-subgraphs). Consider
the setting
0.
of Lemma 3.2. Let c > 1 >0 c >
c1 (nโ1)g
c2 mg
nโcm
nโc m
2
0
2
and set gฬ1 = mโ1 and gฬ2 = n , where c1 = c 1 โ cm(nฯmin โ1) and c2 = (c ) 1 โ c0 m(nฯmax โ1) .
Fix an accuracy > 0. Assume that (a โ b)2 โฅ 484โ2 gฬ1 , and that gฬ2 โฅ 9. Then we have
Eฮดฬ(Cฬ, C) โค
4m
1
0 2
2
2
ร ( + e3 5โm + Keโ(1โc ) mฯmin /4 + Keโ(cโ1) mฯmin /4 ) + ร eโ(1โฮธ) T p/2 .
ฮธ(m โ 1)
2
For the simple two parameter blockmodel B = n1 ((a โ b)I + b11> ) with equal community sizes, we have
g a+(Kโ1)b
dn , the average degree of the nodes (note that dn = a+(Kโ1)b
โ na ). The assumptions of
K
K
Corollary 3.5 are satisfied when
n
ndn
m = โฆ max
,
.
dn 2 (a โ b)2
This is exactly similar to what we saw for spectral clustering (take a = nฮฑn , and b = nฮฑn (1 โ ฮป)). In
particular, when the average degree dn = ฮ(nฮฑ ), and a โ b = ฮ(nฮฑ ), we need m = โฆ(n1โฮฑ /2 ) and
T n2ฮฑ /4 for PACE to succeed. However, in the bounded degree regime, the advantage is negligible, only
from a potentially smaller constant, because we need m = โฆ(n). Again, from our numerical results, we
expect that with h-hop subgraphs, PACE will perform much better.
3.2
Results on GALE
We denote the unnormalized miscustering error between estimated labels Zฬ and the true labels Z, (Zฬ, Z โ
{0, 1}nรK ) of the same set of nodes as M(Z, Zฬ) := nฮด(Z, Z 0 ) = minQ perm. kZฬ โ ZQk0 . Note that since Zฬ, Z
14
are binary, the kZฬ โ ZQk0 = kZฬ โ ZQk1 = kZฬ โ ZQk2F . As discussed earlier, the number of misclustered
nodes will be half of this number.
The main idea of our algorithm is simple. Every approximately accurate clustering of a set of nodes is
only accurate up to a permutation, which can never be recovered without the true labels. However we can
align a labeling to a permuted version of the truth, where the permutation is estimated from another labeling
of the same set of vertices. This is done by calculating the confusion matrix between two clusterings. We
call two clusterings aligned if cluster i from one clustering has a large overlap with cluster i from the other
clustering. If the labels are โalignedโ and the clusterings agree, this confusion matrix will be a matrix with
large diagonal entries. This idea is used in the Match algorithm, where we estimate the permutation matrix
to align one clustering to another.
Now we present our main result. We prove consistency of a slightly modified and weaker version of
Algorithm 4. In Algorithm 4, at every step of a traversal, we apply the Match algorithm on the intersection
of the current subgraph and the union of all subgraphs previously aligned to estimate the permutation of the
yet unaligned current subgraph. However, in the theorem presented below we use the intersection between
the unaligned current subgraph with the last aligned subgraph. Empirically it is better to use the scheme
presented in Algorithm 4 since it increases the size of the intersection which requires weaker conditions on
the clustering accuracy of any individual subgraph. We leave this for future work.
(`)
We now formally define our estimator Zฬ GALE . Let yi = 1{iโS` } . Let Zฬ (`) denote the aligned clustering
PT
(`)
of subgraph S` and let Ni = `=1 yi . Define
GALE
Zฬik
(`) (`)
`=1 yi Zฬik
PT
:=
Ni
1{Ni โฅฯ } .
(10)
The entries of Zฬ GALE will be fractions, but as we show in Lemma B.2, rounding it to a binary matrix will
not change consistency properties.
Note that GALE depends on the spanning tree we use and particular the traversal of that spanning tree.
Let SpanningTreesG be the set of all spanning trees of a graph G. For T โ SpanningTreesG , let TraversalsT
be the set of all traversals of T . Let ZฬTGALE
,(x1 ,...,xJ ) be the outcome of GALE on the traversal (x1 , . . . , xJ ) of
T โ SpanningTreesSm,T .
Theorem 3.2 (Misclustering rate of GALE). Let 0 < ฮธ < 1 and r, r0 > 0. Let m = โฆr,r0 ,ฮธ
q
n log n
ฯmin
,
ฮธT m
n .
T = โฆr,r0 ,ฮธ (n log n/m), and ฯ =
Consider an algorithm A which labels any random m-subgraph with
0
error โค m1 ฯmin /12 with probability at least 1 โ ฮด. Then we have, with probability at least 1 โ T ฮด โ O(1/nr ),
that
T
1 X
1
GALE
max
max
ฮด(ZฬT ,(x1 ,...,xJ ) , Z) โค
ฮด(Zฬ` , Z) + O
.
(11)
T โSpanningTreesS
ฮธT
nr
(x1 ,...,xJ )โTraversalsT
m,T
`=1
Again, the constant ฮธ can be taken as close to 1 as one desires. Thus the above bound is also essentially
optimal.
We will now illustrate Theorem 3.2 with several algorithms A. We begin with a result on (1 + )approximate adjacency spectral clustering.
Corollary 3.6 ((1 + )-approximate adjacency spectral clustering with
q GALE).
Assume the setting of
n log n
0
00
000
0
Lemma 3.1. Let 0 < ฮธ < 1. Let r, r , r , r > 0. Let m = โฆr,r0 ,ฮธ
ฯmin , T = โฆr,r ,ฮธ (n log n/m),
15
and ฯ =
ฮธT m
n .
Then we have, with probability at least 1 โ
T
mr00
โ
2T K
nr000
โO
1
nr 0
, that
K ฯmax
2
1
000
min cโ1 (2 + ) 2
,
C
,
1
+O
2 m n,m,r
r
T โSpanningTreesS
ฮธ
ฮป
ฮฑ
n
ฯ
(x
,...,x
)โTraversals
1
n min
J
T
m,T
(12)
000
where the constant Cn,m,r is the same as in Corollary 3.1
max
max
ฮด(ZฬTGALE
,(x1 ,...,xJ ) , Z) โค
We see that the first term is exactly same as the first term in Corollary 3.1. This, for balanced graphs,
2
again imposes the condition m ฮปK
2 ฮฑ . In particular, if K = ฮ(1) and we are in a dense well separated
โ
โn
regime, with ฮป = ฮ(1), ฮฑn = โฆ(1/ n), then we need m = โฆ( n log n). If K = ฮ(1), ฮป = ฮ(1) and
ฮฑn = ฮ(log n/n), then we need m n/ log n. In both cases, we need T = โฆ(n log n/m). Thus in the
regime where average degree is like log n there is still some computational advantage for very large networks
(also factoring in parallelizability); however, for moderately sized networks, GALE may not lead to much
computational advantage.
Now we present an exact recovery result with SDP as the base algorithm A. We shall use a resultโ
from Yan et al. (2017) on an SDP which they call SDP-ฮป. Let ฮบ := ฯmax /ฯmin . Also let ฯ denote the vector
of the cluster proportions (ฯ1 , . . . , ฯK ).
Lemma 3.3 (Theorem 2 of Yan et al. (2017)). Let r > 0. Then Z diag(nฯ)โ1 Z > is the optimal solution of
the SDP-ฮป, with probability at least 1 โ O((nฯmin )โr ), if
๏ฃซ
๏ฃถ
s
max(B
,
K
max
B
)
kk
`6=k k` ๏ฃธ
min(Bkk โ max Bk` ) = โฆฬr ๏ฃญฮบ max
.
(13)
k
`6=k
k
nฯk
Assuming that any subsequent clustering of the exactly recovered scaled clustering matrix Z diag(nฯ)โ1 Z >
gives the exact clustering Z back (for example, our distance based naive algorithm NaiveClusterโก will do this),
we have the following corollary.
Corollary 3.7 (SDP with GALE, exact recovery).
Assume the setting of Lemma 3.3. Let 0 < ฮธ <
q
n
log
n
ฮธT m
0
1. Let r, r0 , r00 , r000 > 0. Let m = โฆr,r0 ,ฮธ
ฯmin , T = โฆr,r ,ฮธ (n log n/m), and ฯ =
n . Then,
as long
in (13) holds with m replacing n, we have, with probability at least
as the separation condition
T
TK
1
1 โ O (mฯ )r00 + nr000 + nr0 , that
min
max
T โSpanningTreesS
max
m,T
(x1 ,...,xJ )โTraversalsT
ฮด(ZฬTGALE
,(x1 ,...,xJ ) , Z) = O
1
nr
,
(14)
Note that, in the above bound r can taken to be greater than 1. This means that, with high probability,
the proportion of misclustered nodes is less than 1/n and hence zero, leading to exact recovery. As for
computational complexity, note that the separation condition (13), with n replaced by m, restricts how
small m can be. Consider the simple SBM (6) with balanced block sizes for concreteness. In this case, the
2
separation condition essentially dictates, as in the case of spectral clustering, that m ฮปK
2 ฮฑ . Thus the
n
remarks made earlier on how large m or T should be chosen apply here as well.
โ
We are not using Lemma 3.2 as it only shows that the solution of SDP-GV has small norm difference from the ideal
clustering matrix, but does not relate this directly to misclustering error.
โก
detailed in Appendix A
16
As discussed earlier in Section 2, even a naive implementation of GALE will only result in an O(n3/2 )
running time in addition to the time (ฮทm,T ) required to cluster the T random m-subgraphs, whereas a more
careful implementation will only add a time to ฮทm,T that is nearly linear in T . Since SDPs are notoriously
time intensive to solve, this gives us a big saving.
4
Simulations and real-data analysis
In Table 1 we present a qualitative comparison of PACE and GALE with four representative global community
detection methods Profile Likelihood (PL), Mean Field Likelihood (MFL), Spectral Clustering (SC) and Semi
Definite Programming (SDP).
Computationally easy
Theoretical complexity
Real-world scalability (n)
Parallelizability
PL
7
NP hard
102 โ 103
7
MFL
7
O(nฮธ1 )โ
102 โ 103
7
SC
3
O(n3 )
106
7
SDP
7
O(nฮธ2 )โ
102 โ 103
7
PACE
3
O(n2+ )โก
106
3
GALE
3
O(n2+ )โก
106
3
Table 1: Qualitative comparison of various methods.
4.1
Simulations: comparison against traditional algorithms
For simulations we will use of the following simple block model:
B = (p โ q)I + qJ = ฯn a((1 โ r)I + rJ),
where I is the K dimensional identity matrix and J is the K ร K matrix of all ones. Here ฯn will be
the degree density, and r will measure the relative separation between the within block and between block
connection probabilities, i.e. p and q. If the blocks have prior probabilities ฯi , i = 1, . . . , K, then the average
degree d, under this model is given by
X
dn = (n โ 1)ฯn a((1 โ r)
ฯi2 + r).
i
In particular, if the model is balanced, i.e. ฯi = 1/K for all i, then
dn =
(n โ 1)ฯn a(1 + (K โ 1)r)
.
K
In order to understand and emphasize the role of PACE and GALE in reducing computational time
while maintaining good clustering accuracy, we use different settings of sparsity for different methods. For
recovering Zฬ from Cฬ in PACE, we have used random projection plus K-means (abbreviated as RPKmeans
below), and spectral clustering (SC). We also want to point out that, for sparse unbalanced networks GALE
may return more than K clusters, typically when a very small fraction of nodes has not been visited.
However, it is possible that the unvisited nodes have important information about the network structure.
For example, all subgraphs may be chosen from the larger clusters, thereby leaving the smallest cluster
โ
โก
ฮธj โs (โฅ 3) depend on details of implementation and numerical accuracy sought.
with O(n3 ) algorithms
17
unvisited. We take care of this by computing the smallest error between the (K + 1)! permutations of
GALEโs clustering to the ground truth. This essentially treats the smallest cluster returned by GALE as
misclustered. In real and simulated networks we have almost never seen GALE return a large number of
unvisited nodes.
SDP with ADMM: Interior point methods for SDPs are not very fast in practice. We have solved SDPs
using an ADMM based implementation of Yan and Sarkar (2016). From Table 2 we see that PACE and
GALE significantly reduces the running time of SDP without losing accuracy too much. In fact, if we use
spectral clustering to estimate Zฬ from Cฬ in the last step of PACE, we get zero misclustering error (ME).
Mean Field Likelihood: From Table 3 we see that our implementation of mean field on the full graph
did not converge to an acceptable solution even after five and half hours, while both PACE and GALE return
much better solutions in about two minutes. In fact, with spectral clustering in the last step of PACE, the
misclustering error is only 0.14, which is quite good. This begs the question if this improvement is due
to spectral clustering only. We show in the next simulation that in certain settings, even when spectral
clustering is used as the base algorithm, PACE and GALE lead to significant improvements in terms of
accuracy and running time.
Algorithm
SDP
SDP + PACE + SC
SDP + PACE + RPKmeans
SDP + GALE
ME(%)
0
0
9.1
1.2
Algorithm
MFL
MFL + PACE + SC
MFL + PACE + RPKmeans
MFL + GALE
Time taken
1588s
288s
281s
281s
ME(%)
50
1.4
36.5
19.2
Time taken
20439s
131s
125s
126s
Table 3: PACE and GALE with Mean Field Likelihood (MFL) as the base method. Simulation settings:
n = 5000, average degree = 13, 2-hop neighborhood, 2
equal sized clusters, T = 100, parallel implementation
in Matlab with 20 workers.
Table 2: PACE and GALE with SDP as the base
method. Simulation settings: n = 5000, average degree = 128, m = 500, 4 equal sized clusters, T = 100,
parallel implementation in Matlab with 20 workers.
Regularized Spectral Clustering: In sparse unbalanced settings, regularized spectral clustering with
PACE and GALE performs significantly better than regularized spectral clustering on full graph. In fact,
with spectral clustering used in the last step of PACE, we can hit about 5% error or below, which is quite
remarkable. See Table 4. In Section 4.2 we will see that PACE and GALE also add stability to spectral
clustering (in terms of clustering degree 1 vertices).
Profile Likelihood with tabu search: Optimizing profile likelihood (PL) or likelihood modularity (Bickel
and Chen (2009)) for community detection is a combinatorial problem, and as such hard to scale, even if
we ignore the problem of local minima. In Table 5 we compare running time of profile likelihood (optimized
using tabu search) and its divide and conquer versions. We see that the local methods significantly cut
down the running time of PL without losing accuracy too much.
We also applied profile likelihood on 5000 node graphs with 20 workers. Although PACE and GALE
finished in about 22 minutes, the global method did not finish in 3 days. So, here we present results on 1000
node networks instead.
Remark 4.1. We have seen from the results presented in this section that, for recovering Zฬ from Cฬ in
PACE, spectral clustering outperforms the random projection based algorithms (e.g., RPKmeans). For smaller
18
Random 1500-subgraph
3-hop neighborhood
5-hop onion
Algorithm
ME(%)
Time taken
ME(%)
Time taken
ME(%)
Time taken
RSC
39.6
87s
RSC + PACE + SC
11.1
26s
3.4
21s
5.1
59s
RSC + PACE + RPKmeans
34.7
20s
34.2
14s
18
53s
RSC + GALE
17.9
23s
33.6
13s
29.7
52s
Table 4: PACE and GALE with Regularized Spectral Clustering (RSC) as the base method. Simulation
settings: n = 5000, average degree = 7, 2 unequal sized clusters with relative sizes ฯ = (0.2, 0.8), T = 100,
parallel implementation in Matlab with 20 workers.
Random 310-subgraph
Algorithm
ME(%)
Time taken
PL
0
70m
PL + PACE + RPKmeans
3.9
PL + GALE
1.2
2-hop neighborhood
ME(%)
Time taken
30m
3.5
38m
30m
29.5
38m
Table 5: PACE and GALE with Profile Likelihood (PL) as the base method. Simulation settings: n =
1000, average degree = 18.47, 2 unequal sized clusters with relative sizes ฯ = (0.4, 0.6), T = 50, parallel
implementation in Matlab with 12 workers. We sampled 2-hop neighborhoods by selecting their roots
uniformly at random from nodes having degree greater than the 0.1th lower quantile (= 12) of the degree
distribution (average neighborhood size was 310). Ordinary PACE with such a scheme may be thought of
as w-PACE, as discussed in Section 2.
networks, this is not an issue (e.g., spectral clustering on the dense 5000 ร 5000 matrix Cฬ in the context of
Table 3 took only about 7-8 seconds). However, for networks of much larger scale (say, with several million
nodes), that last step would be costly if spectral clustering is used. Designing better algorithms for recovering
Zฬ from Cฬ is something we are working on currently.
4.2
Real data analysis
Political blog data: This is a directed network (see Figure 2) of hyperlinks between 1490 blogs (2004)
that are either liberal or conservative (Adamic and Glance (2005)); we have ground truth labels available
for comparison, 758 are liberal, 732 are conservative. We convert it into an undirected network by putting
an edge between blogs i and j if there is at least one directed edge between them.
The resulting network has lots of isolated nodes and isolated edges. The degree distribution is also quite
heterogeneous (so a degree-corrected model would be more appropriate). We focus on the largest connected
component. We use Laplacian spectral clustering (row normalized, to correct for degree heterogeneity), with
PACE. Tables 6-7 show that PACE and GALE add stability (possibly in eigenvector computation) to spectral
clustering. Indeed, with PACE and GALE we are able to cluster โleafโ vertices (i.e. vertices of degree 1),
with significantly more accuracy.
19
Figure 2: Network of political blogs, reds are conservative, blues are liberal; picture courtesy: Adamic and
Glance (2005).
Largest Conn. Comp.
With leaves (1222 nodes)
Without leaves (1087 nodes)
RSC
18.74%
11.87%
RSC + PACE
6.79%
4.23%
SC
48.12%
3.13%
SC + PACE
6.55%
3.86%
Table 6: Misclustering rate in the political blog data. PACE was used with T = 10, and h-hop neighborhoods
with h = 2, with roots chosen at random from high degree nodes.
Largest Conn. Comp.
With leaves (1222 nodes)
Without leaves (1087 nodes)
RSC
18.74%
11.87%
RSC + PACE
13.34%
12.8%
RSC + GALE
11.62%
10.0%
SC
48.12%
4.23%
SC + PACE
7.86 %
7.28%
SC + GALE
5.81%
6.7%
Table 7: Misclustering rate in the political blog data. GALE and PACE were used with T = 50, and m = 300
random subgraphs.
5
Discussion
To summarize, we have proposed two divide-and-conquer type algorithms for community detection, PACE
and GALE, which can lead to significant computational advantages without sacrificing accuracy. The main
idea behind these methods is to compute the clustering for each individual subgraph and then โstitchโ
them together to produce a global clustering of the entire network. The main challenge of such a stitching
procedure comes from the fundamental problem of unidentifiability of label assignments. That is, if two
subgraphs overlap, the clustering assignment of a pair of nodes in the overlap may be inconsistent between
the two subgraphs.
PACE addresses this problem by estimating the clustering matrix for each subgraph and then estimating
the global clustering matrix by averaging over the subgraphs. GALE takes a different approach by using
overlaps between two subgraphs to calculate the best alignment between the cluster memberships of nodes in
20
the subgraphs. We prove that, in addition to being computationally much more efficient than base methods
which typcally run in โฆ(n2 ) time, these methods have accuracy at least as good as the base algorithmโs
typical accuracy on the type of subgraphs used, with high probability. Experimentally, we show something
more interesting โ we identify parameter regimes where a local implementation of a base algorithm based
on PACE or GALE in fact outperforms the corresponding global algorithm. One example of this is the
Meanfield algorithm, which typically suffers from bad local optima for large networks. Empirically, we
have seen that on a smaller subgraph, with a reasonable number of restarts, it finds a local optima that
is often highly correlated with the ground truth. PACE and GALE take advantage of this phenomenon to
improve on accuracy/running time significantly. Another example is Regularized Spectral Clustering on
sparse unbalanced networks. We intend to theoretically investigate this further in future work.
Finally, working with many subgraphs naturally leads to the question of self consistency of the underlying algorithm. This is often crucial in real world clustering problems with no available ground truth labels.
We intend to explore this direction further for estimating model parameters like the number of clusters,
algorithmic parameters like the size and number of subgraphs, number of hops to be used for the neighborhood subgraphs, etc. Currently, these are all picked a priori based on the degree considerations. It may also
be possible to choose between different models (e.g., standard blockmodels, degree corrected models, dot
product models etc.) by examining which model leads to the most self consistent results. We leave this for
future work.
In conclusion, not only are our algorithms, to the best of our knowledge, the first ever divide-and-conquer
type algorithms used for community detection, we believe that the basic principles of our methods will have
a broad impact on a range of clustering and estimation algorithms that are computationally intensive.
6
6.1
Proofs
Results on PACE
Proof of Proposition 3.1. Since both Z, Z 0 are 0, 1-valued, we can safely replace the count by Frobenius
norm squared, i.e.
1
ฮด(Z, Z 0 ) = inf
kZQ โ Z 0 k2F .
Q perm. n
Now, note that (ZQ)(ZQ)> = ZZ > for all permutation matrices Q. Thus
kC โ C 0 kF = k(ZQ)(ZQ)> โ Z 0 Z 0> kF
= k(ZQ โ Z 0 )(ZQ)> + Z 0 ((ZQ)> โ Z 0> kF
โค k(ZQ โ Z 0 )(ZQ)> kF + kZ 0 ((ZQ)> โ Z 0> kF
โค kZQ โ Z 0 kF kZQ> k2 + kZ 0 k2 k(ZQ)> โ Z 0> kF .
But kZ 0 k22 is the maximum eigenvalue of Z 0> Z 0 which is diagonal with its maximum diagonal entry being
the size of the largest cluster under Z 0 . Thus kZ 0 k22 equals the size of the largest cluster under Z 0 and so is
trivially upper bounded by n. Same goes for kZQ> k22 . Therefore we get
โ
kC โ C 0 kF โค 2 nkZQ โ Z 0 kF .
Squaring this, and taking infimum over all permutation matrices Q in the right hand side, we obtain the
claimed inequality.
21
Now we will prove Theorem 3.1. The proof will be broken down into two propositions. First we
decompose
Cฬij โ Cij = Cฬij โ Cij 1{Nij โฅฯ } + Cij 1{Nij โฅฯ } โ Cij
(15)
{z
} |
{z
}
|
=:(E1 )ij
Note that (E1 )ij = 1{Nij โฅฯ }
Therefore
=:(E2 )ij
(`)
(`)
`=1 yij (Cฬij โ Cij )/Nij ,
PT
and (E2 )ij = โ1{Nij <ฯ } Cij , so that (E1 )ij (E2 )ij = 0.
1
1
kCฬ โ Ck2F = 2 (kE1 k2F + kE2 k2F ).
2
n
n
We will estimate kE1 kF and kE2 kF separately.
(16)
Proposition 6.1. We have
T
EkCฬ (S) โ C (S) k2F .
(17)
ฯ
P
(`)
(`)
= Wij T`=1 yij (Cฬij โ Cij ). So, by an application of Cauchy-
EkE1 k2F โค
Proof. Let Wij :=
Schwartz, we have
kE1 k2F
=
1{Nij โฅฯ }
.
Nij
X
Wij2
i,j
Then (E1 )ij
T
X
!2
(`)
(`)
yij (Cฬij
โ Cij )
(C-S)
โค
X
T
X
Wij2
i,j
`=1
`=1
|
=
T X
X
!
(`)
yij
T
X
!
(`)
(`)
yij (Cฬij
โ Cij )
2
`=1
{z
=Nij
(`)
}
(`)
Wij yij (Cฬij โ Cij )2
`=1 i,j
โค max Wij
ij
Note that Wij =
1{Nij โฅฯ }
Nij
(`)
(`)
yij (Cฬij โ Cij )2
`=1 i,j
= max Wij
ij
T X
X
T
X
kCฬ (`) โ C (`) k2F .
`=1
โค ฯ1 . On the other hand, since the subgraphs were chosen independently using the
same sampling scheme, the kCฬ (`) โ C (`) kF are identically distributed. Therefore, taking expectations we get
T
EkE1 k2F
1 X
T
โค ร
EkCฬ (`) โ C (`) k2F = EkCฬ (S) โ C (S) k2F ,
ฯ
ฯ
`=1
where S is a randomly chosen subgraph under our subgraph selection scheme.
Proposition 6.2. Let nmax be the size of the largest block. Then we have
EkE2 k2 โค nmax n max P(Nij < ฯ ).
(18)
i,j
P
21
Proof. Since โ(E2 )ij = Cij 1{Nij <ฯ } , we have kE2 k2F = i,j Cij
{Nij <ฯ } , and by taking expectations we get
X
X
2
2
EkE2 k2F =
Ci,j
P(Nij < ฯ ) โค max P(Nij < ฯ )
Ci,j
i,j
i,j
i,j
= max P(Nij < ฯ )
i,j
K
X
a=1
22
n2a โค nmax n ร max P(Nij < ฯ ).
i,j
Proof of Theorem 3.1. Combining Propositions 6.1 and 6.2, we get (3). Finally, note that
EkCฬ (S) โ C (S) k2F = EkCฬ (S) โ C (S) k2F 1(|S|<m? ) + EkCฬ (S) โ C (S) k2F 1(|S|โฅm? )
โค n2 P(|S| < m? ) + 4E|S|2 ฮด(ZฬS , ZS )1(|S|โฅm? ) .
Proof of Corollary 3.1. For this sampling scheme |S| = m โฅ m? and with p =
so that we have, using the Chernoff boundโ for binomial lower tail, that
2 T p/2
P (Nij < ฮธT p) โค eโ(1โฮธ)
m(mโ1)
n(nโ1) ,
Nij โผ Binomial(T, p)
.
Finally, we get (4) by plugging in these parameter values and estimates in (3).
Proof of Corollary 3.2. The most crucial thing to observe here is that if one removes the root node and
its adjacent edges from a 1-hop neighborhood, then the remaining โego networkโ has again a blockmodel
structure. Indeed, let S be a random ego neighborhood of size โฅ s with root R, i.e. V (S) = {j : ARj = 1}.
Then conditional on V (S) being Rโs neighbors, and the latent cluster memberships, edges in E(S) are
independently generated, i.e. for j, k, `, m โ V (S), and s, t โ {0, 1}, we have
P(Ajk = s, A`m = t|S, Z) = P(Ajk = s|Z)P(A`m = t|Z).
This is because the โspokeโ edges ARj are independent of Aj,k , j, k โ V (S). Therefore, conditional on
S, this ego-subgraph is one instantiation of a block model with the same parameters on |S| vertices.
(`)
Now for ego networks, yij โผ Bernoulli(nij /n), where nij is the total number of ego-subgraphs containing
both i and j. Notice that
X
nij =
1{Ai` =1,Aj` =1} ,
`6=i,j
that is, nij is the sum of (n โ 2) independent Bernoulli random variables
1{Ai` =1,Aj` =1} โผ Bernoulli(Bฯ(i)ฯ(`) Bฯ(j)ฯ(`) ).
So
2
(n โ 2)B#
โฅ Enij =
X
Bฯ(i)ฯ(`) Bฯ(j)ฯ(`) โฅ (n โ 2)B?2 ,
`6=i,j
and we have, by the Chernoff bound, that
P(nij โค (n โ
2)B?2
(Enij โ (n โ 2)B?2 + โ)2
โ โ) โค exp โ
2Enij
!
โ2
โค exp โ
.
2
2(n โ 2)B#
(19)
In order to apply Theorem 3.1 we need the following two ingredients, which we will now work out.
โ
We use a slightly loose but convenient form of the Chernoff bounds: (i) P(X โค (1 โ ฮด)ยต) โค exp(โฮด 2 ยต/2), and (ii)
P(X โฅ (1 + ฮด)ยต) โค exp(โฮด 2 ยต/3), where X = X1 + ยท ยท ยท + Xn and Xi โs are independent binary random variables, with EX = ยต,
and 0 < ฮด < 1.
23
(i) estimate of |S|, and
(ii) estimate of P(Nij < ฯ ).
(i) Estimate of |S|. Note that |S| =
P
k
AkR . So
P(|S| < m? ) = ER P(|S| < m? | R).
P
Since (n โ 1)B? โค E(|S| | R) = j6=R Bฯ(k)ฯ(R) โค (n โ 1)B# , and AkR , 1 โค k โค n are independent, we
have, by Chernoffโs inequality, that
(E(|S| | R) โ m? )2
P(|S| < m? | R) โค exp โ
2E(|S| | R)
((n โ 1)B? โ m? )2
โค exp โ
,
2(n โ 1)B#
where m? โค (n โ 1)B? . Therefore, the same upper bound holds for P(|S| < m? ). In particular, for m? โค
(n โ 1)B? /2 we have
(n โ 1)B?2
nB?2
P(|S| < m? ) โค exp โ
โค exp โ
.
(20)
8B#
16B#
Similarly, using Chernoffโs inequality for Binomial upper tail, we can show that, for ฮธ > 0,
2
ฮธ nB#
P(|S| > (1 + ฮธ)nB# ) โค exp โ
.
6
(ii) Estimate of P(Nij < ฯ ). Recall that Nij | nij โผ Binomial(T, nij /n). Then
2nฯ
2nฯ
P(Nij < ฯ ) = P Nij < ฯ, nij <
+ P Nij < ฯ, nij โฅ
.
T
T
|
{z
} |
{z
}
=:P1
=:P2
Clearly
2nฯ
nB?2
P1 โค P nij <
โค P nij <
.
T
2
Now, given nij such that nij โฅ
2nฯ
T ,
we can invoke Chernoffโs inequality to get
(E(Nij | nij ) โ ฯ )2
T nij
P(Nij < ฯ | nij ) โค exp โ
โค exp โ
.
2E(Nij | nij )
8n
Therefore
T nij
P2 โค E exp โ
8n
1{nij โฅ 2nฯ }
T
T nij
โค E exp โ
8n
T nij
T nij
= E exp โ
1
โ
1
nB 2 + E exp
nB 2
{nij < 2 ? }
(nij โฅ 2 ? )
8n
8n
nB?2
T B?2
โค P nij <
+ exp โ
.
2
16
24
(21)
Thus
T B?2
nB?2
+ exp โ
.
P(Nij < ฯ ) โค 2P nij <
2
16
But by (19)
nB?2
P nij <
2
2
? 2
((n โ 2)B?2 โ nB
2 )
โค exp โ
2
2(n โ 2)B#
!
(n โ 2) B?4
โค exp โ
2
8
B#
Thus
nB?4
P(Nij < ฯ ) โค 2 exp โ
2
16B#
!
!
nB?4
โค exp โ
2
16B#
!
.
T B?2
+ exp โ
.
16
Now we are ready to use (3). Using our estimates on |S| we get that
2
2 2
E|S| ฮด(ZฬS , ZS )1(|S|โฅm? ) โค (1 + ฮธ) n
2
Eฮด(ZฬS , ZS )1(|S|โฅm? )
B#
ฮธ2 nB#
+ exp โ
6
.
Next we plug into (3) all the estimates we derived in this subsection to get the desired bound (5).
6.2
Results on GALE
For any clustering Zฬi on subgraph Si , let ฮ i โ arg minQ perm. kZฬi โ Zi Qk1 , where Zi is used a shorthand
for ZSi = Z S , the true cluster membership matrix for the members of Si . Define the matrix Fi by the
i
requirement
Zฬi = Zi ฮ i + Fi , Fi โ {0, ยฑ1}nรK .
(22)
In other words, kFi k1 = M(Zฬi , Zi ).
We first analyze Algorithm 3, i.e. Match. Recall that, if two clusterings on some set S agree, then the
confusion matrix will be a diagonal matrix up to permutations, with the entries in the diagonal corresponding
to the cluster sizes in either of the clusterings. In the following lemma, we consider a noisy version of this,
where the two clusterings are not in perfect agreement. This lemma essentially establishes that if supplied
with two clusterings whose confusion matrix is a diagonal matrix up to permutations plus noise, then Match
will recover the correct aligning permutation, if the noise is not too large.
>
KรK , kฮk
Lemma 6.1. Let d โ RK
โ โค mini di /3. Then
+ . Also let M = ฮ 2 diag(d)ฮ 1 + ฮ, where ฮ โ R
>
Match returns ฮ = ฮ 2 ฮ 1 , when applied on the confusion matrix M .
Proof of Lemma 6.1. Let D := diag(d). Let ฮพi be the permutation encoded in ฮ i , for i โ [2], i.e. (ฮ i )uv =
1{v=ฮพi (u)} . It is easy to see that Muv = Dฮพโ2 (u),ฮพโ1 (v) + ฮuv . We have for all u, v such that (ฮ >
2 ฮ 1 ))uv = 0,
1
2
Muv โค kฮkโ , whereas for all u, v such that (ฮ >
2 ฮ 1 )uv = 1, Muv โฅ mina Daa โ kฮkโ . Hence
min
u,v : (ฮ >
2 ฮ 1 )uv =1
Muv โฅ min Daa โ kฮkโ โฅ 2kฮkโ โฅ 2
a
max
u,v : (ฮ >
2 ฮ 1 )uv =0
Muv .
Hence the top K (recall that K is the number of rows in M ) elements are the diagonal elements in D.
Thus the elements of ฮ learned by the Match algorithm will be ฮ uv = 1{ฮพโ1 (u)=ฮพโ1 (v)} . This is equivalent
2
to ฮ = ฮ >
2 ฮ 1 .
25
1
Now we will establish that post-alignment misclustering errors on subgraphs equal the original misclustering errors. For this we first need a lemma on what happens when we align two subgraphs based on their
intersection.
Lemma 6.2. Consider two random m-subgraphs S1 and S2 . Suppose our
clustering algorithm A outputs
l 2m
m
clusterings Zฬi , i = 1, 2. Let S = S1 โฉ S2 be of size at least m1 = 2n . Assume that M(Zฬi , Zi ) โค
(S)
m1 ฯmin /12 and that minkโ[K] nk
Match(Zฬ2 S , Zฬ1 S ).
โฅ m1 ฯmin . Then kZฬ2 ฮ โ Zฮ 1 k = M(Zฬ2 , Z), where ฮ is the output of
Proof of Lemma 6.2. To ease notation, let us write Zฬi := Zฬi S , Fฬi := Fi S , i = 1, 2, and Zฬ := Z S . Then by
restricting (22) to S, we get
Zฬi = Zฬฮ i + Fฬi , Fฬi โ {0, ยฑ1}nรK .
Now
>
> >
>
>
Zฬ2> Zฬ1 = ฮ >
2 Zฬ Zฬฮ 1 + ฮ 2 Zฬ Fฬ1 + Fฬ2 Zฬฮ 1 + Fฬ2 Fฬ1 .
|
{z
}
=:ฮ
Note that (a) multiplication by a permutation matrix does not change the kยทk1 norm, and (b) for any matrix
A, we have kAk1 = kA> k1 . Therefore
>
kฮ >
2 Zฬ Fฬ1 k1
(by (a))
=
kZฬ > Fฬ1 k1 =
X X
XX
X
X
|
(Zฬ > )ai (Fฬ1 )ib | โค
Zฬia |(Fฬ1 )ib | =
|(Fฬ1 )ib | ร
Zฬia = kFฬ1 k1 .
i
a,b
a,b
i
i,b
| a {z }
=1
Similarly,
kFฬ2> Zฬฮ 1 k1
(by (b))
=
>
kฮ >
1 Zฬ Fฬ2 k1 โค kFฬ2 k1 .
Finally,
kFฬ2> Fฬ1 k1 โค
XX
a,b
|(Fฬ2 )ia (Fฬ1 )ib | =
i
X
|(Fฬ1 )ib | ร
X
|(Fฬ2 )ia )| = 2kFฬ1 k1 ,
a
i,b
|
{z
=2
}
where we have used the fact that each row of Fฬi has exactly one 1 and one โ1. By (b), kFฬ2> Fฬ1 k1 =
kFฬ1> Fฬ2 k1 โค 2kFฬ2 k1 , and therefore
kFฬ2> Fฬ1 k1 โค kFฬ1 k1 + kFฬ2 k1 .
Note that, by our assumptions on the individual misclustering errors,
kFฬi k1 โค kFi k1 = M(Zฬi , Zi ) โค m1 ฯmin /12.
Therefore
kฮk โค 2(kFฬ1 k1 + kFฬ2 k1 ) โค m1 ฯmin /3.
(S)
Since by our assumption, (Zฬ > Zฬ)kk = nk
Match(Zฬ2 , Zฬ1 ) is ฮ = ฮ >
2 ฮ 1 . Hence
โฅ m1 ฯmin , we can apply Lemma 6.1 to see that the output
>
kZฬ2 ฮ โ Zฮ 1 k1 = kZฬ2 ฮ >
2 ฮ 1 โ Zฮ 1 k1 = kZฬ2 ฮ 2 โ Zk1 = kZฬ2 โ Zฮ 2 k1 = kF2 k1 .
26
Proposition 6.3. Let the T subsets, (Si )Ti=1 be associated with estimated clusterings Zฬi with misclustering
error M(Zฬi , Zi ) โค m1 ฯmin /12. Consider a traversal x1 โผ x2 โผ ยท ยท ยท โผ xJ of some spanning tree T of Sm,T
as in Algorithm 4, satisfying
(Sxi โฉSxiโ1 )
min min nk
2โคjโคJ kโ[K]
โฅ m1 ฯmin ,
(S)
where nk is the number of nodes from cluster k in a subgraph S. Applying GALE on this walk: let Zฬ (x1 ) :=
Zฬx1 , ฮ ฬx1 = I and for 2 โค i โค J, define recursively
ฮ ฬxi
(
I
=
Match(Zฬxi
Sxi โฉSxiโ1
, Zฬ (xiโ1 )
Sxi โฉSxiโ1
)
if xi was visited before, i.e. xi = xj for some 1 โค j < i,
otherwise,
and set Zฬ (xi ) = Zฬxi ฮ ฬxi . Then, for any 1 โค i โค J, we have that
M(Zฬ (xi ) , Zxi ) = M(Zฬxi , Zxi ).
Proof. We claim that, for all 1 โค i โค J, we have
ฮ x1 โ arg min kZฬ (xi ) โ Zxi Qk, and M(Zฬ (xi ) , Zxi ) = M(Zฬxi , Zxi ).
Q
(23)
We use strong induction to prove this claim. (23) is true by definition, for i = 1. Now assume that it is
true for all i โค `. Then, for all i โค `, we have the representation Zฬ (xi ) = Zxi ฮ x1 + Fฬxi , for some matrix
Fฬxi โ {0, ยฑ1}mรK . If x`+1 has been visited before, i.e. x`+1 = xj for some j โค `, then (23) holds by our
induction hypothesis. Otherwise, we can apply Lemma 6.2 on the two clusterings Zฬ (x` ) on Sx` and Zฬx`+1 on
Sx`+1 , to conclude that
kZฬ (x`+1 ) โ Zx`+1 ฮ x1 k1 = kZฬx`+1 ฮ ฬx`+1 โ Zx`+1 ฮ x1 k1 = M(Zฬx`+1 , Zx`+1 ).
But Zฬ (x`+1 ) = Zฬx`+1 ฮ ฬx`+1 , and ฮ ฬx`+1 = ฮ >
x`+1 ฮ x1 . So, for any permutation matrix Q we have
kZฬ (x`+1 ) โ Zx`+1 Qk1 = kZฬx`+1 ฮ ฬx`+1 โ Zx`+1 Qk1
= kZฬx`+1 โ Zx`+1 Qฮ ฬ>
x`+1 k1
โฅ M(Zฬx`+1 , Zx`+1 ) = kZฬ (x`+1 ) โ Zx`+1 ฮ 1 k1 .
Thus, indeed ฮ x1 โ arg minQ kZฬ (x`+1 ) โ Zx` Qk and as a consequence M(Zฬ (x`+1 ) , Zx`+1 ) = M(Zฬx`+1 , Zx`+1 ).
The induction is now complete.
Now we establish an upper bound on the error of the estimator Zฬ GALE in terms of the errors of the
aligned clusterings Zฬ (`) .
Proposition 6.4. Let 0 < ฮธ < 1, and set ฯ =
ฮธT m
n .
Then, for any cluster membership matrix Zฬ โ {0, 1}nรK ,
T
kZฬ GALE โ Zฬk2F
1 X kZฬ (`) โ Zฬ` k2F X
โค
+
1{Ni <ฯ } .
n
ฮธT
m
i
`=1
27
(24)
Proof. The proof is very similar to the proof of Theorem 3.1. We decompose
Zฬik = Zฬik 1{Ni โฅฯ } + Zฬik 1{Ni <ฯ } .
Using this we have
GALE
Zฬik
(`)
(`)
`=1 yi (Zฬik
PT
โ Zฬik =
โ Zฬik )
Ni
1{Ni โฅฯ } โ Zฬik 1{Ni <ฯ } .
Therefore
kZฬ
GALE
2
โ Zฬk =
X
GALE
(Zฬik
2
โ Zฬik ) =
i,k
X
(`)
(`)
`=1 yi (Zฬik
PT
X
!2
1{Ni โฅฯ } +
Ni
i,k
โค
โ Zฬik )
(`)
(`)
`=1 yi (Zฬik
โ Zฬik )
!2
1{Ni โฅฯ } +
Ni
|
2
Zฬik
1{Ni <ฯ }
i,k
PT
i,k
X
X
1{Ni <ฯ } .
i
{z
}
=:E
PT
P
(`)
(`)
2
2
We now analyze E. Let Wi := 1(Ni โฅฯ ) /Ni . Noting that E =
i,k Wi ( `=1 yi (Zฬik โ Zฬik )) , an
application of Cauchy-Schwartz inequality gives
! T
T
T X
X
X
X (`) (`)
X
(`)
(`)
(`)
Eโค
Wi2
yi
yi (Zฬik โ Zฬik )2 =
Wi yi (Zฬik โ Zฬik )2
i,k
`=1
|
{z
=Ni
} `=1
`=1 i,k
โค max Wi
i
โค max Wi
i
Note that Wi =
1(Ni โฅฯ )
Ni
โค
1
ฯ
=
n
ฮธT m .
T X
X
(`)
(`)
yi (Zฬik โ Zฬik )2
`=1 i,k
T
X
kZฬ (`) โ Zฬ` k2F .
(25)
`=1
Therefore
Eโค
T
n X kZฬ (`) โ Zฬ` k2F
.
ฮธT
m
(26)
`=1
We now mention some auxiliary results, whose proofs are deferred to the Appendix. These will help us
control the probability of a โbadโ event, defined in the proof of Theorem 3.2.
Lemma 6.3. Let ฯ =
ฮธT m
n ,
where 0 < ฮธ < 1. Let r > 0. Then, with probability at least 1 โ
!
r
X
3r log n
โ(1โฮธ)2 T m/2n
1{Ni <ฯ } โค ne
1+
.
โ(1โฮธ)2 T m/2n
ne
i
1
nr ,
we have
Recall that we view the T random m-subsets of [n] as nodes of a super-graph Sm,T and put an edge
between nodes a(โก Sa ) and b(โกl Sb )m in Sm,T (we use the shorthand a โผ b to denote an edge between a and
b), if Yab := |Sa โฉ Sb | โฅ m1 =
graph.
m2
2n
. The next lemma shows that Sm,T is in fact an Erdoฬs-Reฬnyi random
28
Lemma 6.4. The super-graph Sm,T is an Erdoฬs-Reฬnyi random graph with
2
m2
m
โฅ 1 โ exp โ
.
P (a โผ b) = P Yab โฅ
2n
16n
(27)
Because of our assumptions on m, it follows that Sm,T is well above the connectivity threshold for
Erdoฬs-Reฬnyi random graphs.
Lemma 6.5. The super-graph Sm,T is connected with probability at least 1 โ exp(โO(n)).
The next lemma states that intersection of two random m-subgraphs contains enough representatives
from each cluster, with high probability.
Lemma 6.6. Consider two random m-subgraphs Sa and Sb . Let r > 0 and
P
(S โฉS )
nk a b
m2 ฯk
<
n
s
1โO
2rn log n
m2 ฯk
m 2 ฯk
n log n
!!!
โค
โฅ 20r. Then
2
.
nr
We are now ready to prove our main result on GALE.
Proof of Theorem 3.2. First we construct a good set in the sample space. Consider the following โbadโ
events
B1 := {(S1 , . . . , ST ) | Sm,T is connected},
(Si โฉSj )
B2 := (S1 , . . . , ST ) | min min nk
< m1 ฯmin ,
(i,j) k
(
r
X
โ(1โฮธ)2 T m/2n
B3 := (S1 , . . . , ST ) |
1+
1{Ni <ฯ } > e
i
!)
3r0 log n
,
neโ(1โฮธ)2 T m/2n
B4 := {(A, S1 , . . . , ST ) | max M(Zฬi , Zi ) > m1 ฯmin /12}.
1โคiโคT
Let B := โช4i=1 Bi . Let r00 > 0 By Lemma 6.5, we have P(B1 ) โค exp(โO(n)). Lemma 6.6, and a union
2
1
bound gives P(B2 ) โค T2 ร K ร n2r00 โค KT
00 . By Lemma 6.3, P(B3 ) โค
0 . Finally, by our hypothesis on
nr
nr
individual misclustering errors, we have, by a union bound, that P(B4 ) โค T ฮด. Therefore
P(B) โค
4
X
i=1
KT 2
1
P(Bi ) โค exp(โO(n)) + r00 + r0 + T ฮด โค T ฮด + O
n
n
1
nr 0
,
by choosing r00 suitably large.
Now on the good set B c , for any T โ SpanningTreesSm,T and for any (x1 , . . . , xJ ) โ TraversalsT , the
hypothesis of Propositions 6.3 and 6.4 are satisfied. Now note that
ฮด(ZฬTGALE
,(x1 ,...,xJ ) , Z)
โค
kZฬTGALE
,(x1 ,...,xJ ) โ Zฮ x1 k1
n
=
2
kZฬTGALE
,(x1 ,...,xJ ) โ Zฮ x1 kF
n
By Proposition 6.3, we also have, for any 1 โค ` โค T , that
kZฬ (`) โ Z` ฮ x1 k2F
kZฬ (`) โ Z` ฮ x1 k1
=
= ฮด(Zฬ (`) , Z) = ฮด(Zฬ` , Z).
m
m
29
.
Thus, by of Proposition 6.4, taking Zฬ = Zฮ x1 and noting then that Zฬ` = Z` ฮ x1 , we have
ฮด(ZฬTGALE
,(x1 ,...,xJ ) , Z) โค
T
X
1 X
ฮด(Zฬ` , Z) +
1{Ni <ฯ } .
ฮธT
i
`=1
Since the bound on the RHS does not depend on the particular spanning tree used, or a particular traversal
thereof, we conclude that, on the good event B c ,
max
max
T โSpanningTreesS
m,T
(x1 ,...,xJ )โTraversalsT
Now, for our choice of ฯ , and T โฅ
X
1{Ni <ฯ } โค e
2r000 n log n
(1โฮธ)2 m
โ(1โฮธ)2 T m/2n
ฮด(ZฬTGALE
,(x1 ,...,xJ ) , Z)
T
X
1 X
โค
ฮด(Zฬ` , Z) +
1{Ni <ฯ } .
ฮธT
i
`=1
, we have e
r
1+
i
โ(1โฮธ)2 T m/2n
3r0 log n
neโ(1โฮธ)2 T m/2n
โค
!
1
.
nr000
r
=O
Therefore, on the event B c
log n
n1+r000
!
=O
1
nr
,
by choosing r000 suitably large.
Thus we conclude that with probability at least 1 โ T ฮด โ O n1r0 , we have
max
T โSpanningTreesS
7
max
m,T
(x1 ,...,xJ )โTraversalsT
ฮด(ZฬTGALE
,(x1 ,...,xJ ) , Z) โค
T
1 X
1
ฮด(Zฬ` , Z) + O
.
ฮธT
nr
`=1
Acknowledgments
We thank Arash Amini, David Blei, David Choi for their valuable comments when versions of this work
were presented at conferences. SSM thanks Aditya Guntuboyina, Alan Hammond, Luca Trevisan and Bin
Yu for their valuable comments during his quals talk at Berkeley, which was based on this paper.
References
Adamic, L. A. and Glance, N. (2005). The political blogosphere and the 2004 us election: divided they blog.
In Proceedings of the 3rd international workshop on Link discovery, pages 36โ43. ACM.
Airoldi, E. M., Blei, D. M., Fienberg, S. E., and Xing, E. P. (2009). Mixed membership stochastic blockmodels. In Advances in Neural Information Processing Systems, pages 33โ40.
Amini, A. A., Chen, A., Bickel, P. J., Levina, E., et al. (2013). Pseudo-likelihood methods for community
detection in large sparse networks. The Annals of Statistics, 41(4):2097โ2122.
Amini, A. A. and Levina, E. (2014). On semidefinite relaxations for the block model. arXiv preprint
arXiv:1406.5647.
Bhattacharyya, S. and Bickel, P. J. (2014). Community detection in networks using graph distance. arXiv
preprint arXiv:1401.3915.
30
Bickel, P. J. and Chen, A. (2009). A nonparametric view of network models and newmanโgirvan and other
modularities. Proceedings of the National Academy of Sciences, 106(50):21068โ21073.
Binkiewicz, N., Vogelstein, J. T., and Rohe, K. (2014). Covariate assisted spectral clustering. arXiv preprint
arXiv:1411.2158.
Cai, T. T., Li, X., et al. (2015). Robust and computationally feasible community detection in the presence
of arbitrary outlier nodes. The Annals of Statistics, 43(3):1027โ1059.
Charikar, M. S. (2002). Similarity estimation techniques from rounding algorithms. In Proceedings of the
Thiry-fourth Annual ACM Symposium on Theory of Computing, STOC โ02, pages 380โ388, New York,
NY, USA. ACM.
Gopalan, P. K. and Blei, D. M. (2013). Efficient discovery of overlapping communities in massive networks.
Proceedings of the National Academy of Sciences, 110(36):14534โ14539.
Greene, E. and Wellner, J. A. (2017). Exponential bounds for the hypergeometric distribution. Bernoulli,
23(3):1911โ1950.
Gueฬdon, O. and Vershynin, R. (2015). Community detection in sparse networks via grothendieckโs inequality.
Probability Theory and Related Fields, pages 1โ25.
Guruharsha, K., Rual, J.-F., Zhai, B., Mintseris, J., Vaidya, P., Vaidya, N., Beekman, C., Wong, C., Rhee,
D. Y., Cenaj, O., et al. (2011). A protein complex network of drosophila melanogaster. Cell, 147(3):690โ
703.
Holland, P. W., Laskey, K. B., and Leinhardt, S. (1983). Stochastic blockmodels: First steps. Social
networks, 5(2):109โ137.
Hollingshead, A. B. (1949). Elmstownโs youth; the impact of social classes on adolescents.
Karrer, B. and Newman, M. E. (2011). Stochastic blockmodels and community structure in networks.
Physical Review E, 83(1):016107.
Le, C. M., Levina, E., and Vershynin, R. (2015). Sparse random graphs: regularization and concentration
of the laplacian. arXiv preprint arXiv:1502.03049.
Lei, J. and Rinaldo, A. (2015). Consistency of spectral clustering in stochastic block models. The Annals
of Statistics, 43(1):215โ237.
Mackey, L., Talwalkar, A., and Jordan, M. I. (2015). Distributed matrix completion and robust factorization.
Journal of Machine Learning Research, 16:913โ960.
McAuley, J. J. and Leskovec, J. (2012). Learning to discover social circles in ego networks. In NIPS, volume
2012, pages 548โ56.
McSherry, F. (2001). Spectral partitioning of random graphs. In Foundations of Computer Science, 2001.
Proceedings. 42nd IEEE Symposium on, pages 529โ537. IEEE.
Newman, M. and Clauset, A. (2015). Structure and inference in annotated networks. arXiv preprint
arXiv:1507.04001.
31
Newman, M. E. and Girvan, M. (2004). Finding and evaluating community structure in networks. Physical
review E, 69(2):026113.
Ng, A. Y., Jordan, M. I., Weiss, Y., et al. (2002). On spectral clustering: Analysis and an algorithm.
Advances in neural information processing systems, 2:849โ856.
Nowicki, K. and Snijders, T. A. B. (2001). Estimation and prediction for stochastic blockstructures. Journal
of the American Statistical Association, 96(455):1077โ1087.
Rohe, K., Chatterjee, S., and Yu, B. (2011). Spectral clustering and the high-dimensional stochastic blockmodel. Ann. Statist., 39(4):1878โ1915.
Rohe, K., Qin, T., and Yu, B. (2016). Co-clustering directed graphs to discover asymmetries and directional
communities. Proceedings of the National Academy of Sciences, 113(45):12679โ12684.
Shi, J. and Malik, J. (2000). Normalized cuts and image segmentation. Pattern Analysis and Machine
Intelligence, IEEE Transactions on, 22(8):888โ905.
Snijders, T. A. B. and Nowicki, K. (1997). Estimation and prediction for stochastic blockmodels for graphs
with latent block structure. Journal of Classification, 14(1):75โ100.
Tang, M., Sussman, D. L., Priebe, C. E., et al. (2013). Universally consistent vertex classification for latent
positions graphs. The Annals of Statistics, 41(3):1406โ1430.
Xu, Z., Ke, Y., Wang, Y., Cheng, H., and Cheng, J. (2012). A model-based approach to attributed graph
clustering. In Proceedings of the 2012 ACM SIGMOD international conference on management of data,
pages 505โ516. ACM.
Yan, B. and Sarkar, P. (2016). Convex relaxation for community detection with covariates. arXiv preprint
arXiv:1606.01869.
Yan, B., Sarkar, P., and Cheng, X. (2017). Exact recovery of number of blocks in blockmodels. arXiv
preprint arXiv:1705.08580.
Zhang, Y., Levina, E., and Zhu, J. (2015). Community detection in networks with node features. arXiv
preprint arXiv:1509.01173.
32
A
Details of DGCluster
Here we detail our distance based greedy algorithm DGCluster. The idea behind DGCluster
p is to note that,
if ip
and j are in the same community, then kCi? โ Cj? k = 0, and otherwise kCi? โ Cj? k = |ฯ(i)| + |ฯ(j)| =
ฮ( 2n/K) (when the communities are balanced). Thus, we expect to be able to cluster the vertices using
dij = kCฬproj,i? โ Cฬproj,j? k, namely by starting with a root vertex r1 and for some threshold ฮณ putting all
vertices j satisfying dr1 j โค ฮณ in the same cluster as r1 , and then picking another root vertex r2 from the
remaining set, and putting all vertices j in the remaining set that satisfy dr2 j โค ฮณ in the same cluster as
r2 , and so on. Here a root vertex ri may be chosen as one of the vertices with the highest degree in the
remaining set (or according to a degree-weighted random sampling scheme), to give importance to highly
connected vertices. We also note that depending on the threshold ฮณ the number of blocks we get can vary.
In practice, we will start with small ฮณ (yielding a large number of communities), and stop at the smallest
ฮณ that gives us โฅ K blocks. If we get more than K blocks, we merge, in succession, pairs of blocks having
the largest intersectionpin Cฬ (relative to their sizes) until we get exactly K blocks. A rule of thumb would
be to start with ฮณ = c 2n/K with c small and then gradually increase c.
Algorithm 5 A distance based greedy clustering algorithm: DGCluster
1: Input: C, C 0 , K. Output: ฯ = DGCluster(C, C 0 , K), a clustering based on distances between the rows
of C 0 , with
p merging guidance from C, if necessary.
2: Set ฮธ =
2n/K. c = cmin = 0, ฮด = 0.01.
3: Set Know = n;
4: while flag = TRUE do
5:
c โ c + ฮด.
6:
ฯtemp โ NaiveCluster(C 0 , cฮธ).
7:
Know = maxi ฯtemp (i).
8:
if Know โฅ K then
9:
flag โ TRUE.
10:
ฯ โ ฯtemp .
11:
else
12:
flag โ FALSE.
13: Know โ maxi ฯ(i).
14: while Know > K do
15:
Let ฮi = ฯ โ1 ({i}), i = 1, . . . , Know .
16:
Compute the (upper triangle of the) matrix R, where
P
kโฮi ,lโฮj Ckl
Rij โ
.
|ฮi ||ฮj |
17:
18:
Pick (i? , j? ) โ arg maxi,j Rij .
ฯ โ Merge(ฯ, i? , j? ).
Algorithm 5 in turn makes use of the following two algorithms.
33
Algorithm 6 A naive clustering algorithm: NaiveCluster
1: Input: C, ฮณ : a threshold. Output: ฯ = NaiveCluster(C, ฮณ), a clustering based on distances between the
rows of C.
2: Set Unassigned = {1, . . . , n}, b = 1, ฯ โก 0.
3:
4:
5:
6:
7:
8:
9:
10:
11:
12:
while Unassigned 6= โ
do
i โ a random (uniform or degree-weighted etc.) index in Unassigned.
ฯ(i) โ b.
Unassigned โ Unassigned \ {i}.
for j โ Unassigned do
Compute dij = kCฬi? โ Cฬj? k
if dij โค ฮณ then
ฯ(j) โ b
Unassigned โ Unassigned \ {j}.
b โ b + 1.
Algorithm 7 Merge
1: Input: ฯ, a, b. Output: ฯ = Merge(ฯ, a, b), a clustering with blocks a and b merged
2: u โ min{a, b}, v โ max{a, b}
3: for i = 1, . . . , n do
4:
if ฯ(i) = v then
5:
ฯ(i) โ u.
6:
else if ฯ(i) > v then
7:
ฯ(i) โ ฯ(i) โ 1.
B
Some auxiliary results
Lemma B.1 (Thresholding PACE). Let Cฬฮท := [Cฬ > ฮท]. We have
Eฮดฬ(Cฬฮท , C) โค
Eฮดฬ(Cฬฮท , C)
.
min{ฮท 2 , (1 โ ฮท)2 }
(28)
In particular, for ฮท = 1/2, we have
Eฮดฬ(Cฬ1/2 , C) โค 4Eฮดฬ(Cฬ, C).
Proof. Note that |(Cฬฮท )ij โ Cij | โผ Ber(qij ), where
qij = Cij P(Cฬij โค ฮท) + (1 โ Cij )P(Cฬij > ฮท).
Thus E((Cฬฮท )ij โ Cij )2 = qij . Now
E(Cฬij โ Cij )2 = E(Cฬij โ Cij )2 1{Cฬij โคฮท} + E(Cฬij โ Cij )2 1{Cฬij โคฮท} .
Therefore
(
(1 โ ฮท)2 P(Cฬij โค ฮท) = (1 โ ฮท)2 qij ,
E(Cฬij โ Cij ) โฅ
ฮท 2 P(Cฬij > ฮท) = ฮท 2 qij ,
2
34
if Cij = 1
if Cij = 0.
This means
E((Cฬฮท )ij โ Cij )2 โค
E(Cฬij โ Cij )2
,
min{ฮท 2 , (1 โ ฮท)2 }
which, on summing over i, j, gives us the desired bound.
Lemma B.2 (Rounding GALE). Consider an estimated cluster membership matrix Zฬ โ [0, 1]nรK and the
true cluster membership matrix Z โ {0, 1}nรK . Then kround(Zฬ) โ Zk1 โค 2kZฬ โ Zk1 .
Proof. Let S := {(i, k) โ [n]ร[K] : |Zฬik โZik | โฅ 1/2}. Then by Markovโs inequality, we have |S| โค 2kZฬโZk1 .
Note that for (i, k) โ [n] ร [K] \ S, round(Zฬik ) = Zik . Thus,
X
|round(Zฬik ) โ Zik | โค |S| โค 2kZฬ โ Zk1
kround(Zฬ) โ Zk1 =
(i,k)โS
We shall need the following Bernstein-type concentration result for hypergeometric random variables.
Lemma B.3 (Corollary 1 of Greene and Wellner (2017) (restated here using slightly different notation)).
Consider a random variable H โผ Hypergeometric(k, `, L). Let ยต = `/L, ฯ 2 = ยต(1 โ ยต), f = (k โ 1)/(L โ 1).
Then for ฮป > 0,
!
โ
H
ฮป2 /2
P
k
โ ยต > ฮป โค exp โ
.
ฮป
k
ฯ 2 (1 โ f ) + 3โ
k
Let us deduce from this two convenient Chernoff type bounds on the upper and lower tail of a hypergeometric variable.
Lemma B.4. Consider a random variable H โผ Hypergeometric(k, `, L). Then for 0 < < 1, we have
2
2 EH
EH
max{P (H < (1 โ )EH) , P (H > (1 + )EH)} โค exp โ
โค exp โ
.
2(1 + /3)
4
Proof. Note that k โ H โผ Hypergeometric(k, L โ `, L). Using Lemma B.3 we get
P
Taking
โฮป
k
=
`
L ,
H
`
ฮป
โ < โโ
k
L
k
!
โ
kโH
Lโ`
ฮป2 /2
k
โ
> ฮป โค exp โ `
=P
.
ฮป
โ
k
L
L +
3 k
we get
k`
P H < (1 โ )
L
`3 k2 /(2L2 )
2 k`
โค exp โ
= exp โ
.
(1 + /3)`/(L)
2(1 + /3)L
This gives us the desired bound for the lower tail, the upper tail can be handled similarly.
B.1
Analysis of PACE under stochastic block model
Recall that we need to know how an algorithm performs on a randomly selected subgraph under our subgraph selection procedure. Here we will discuss how one can obtain such guarantees under the stochastic
blockmodel. This will require us to understand the behavior of sizes of different communities in a (randomly)
chosen subgraph.
35
B.1.1
Community sizes in random m-subgraphs
(The results of this subsection do not depend on any modeling assumption.) Let S be a random m(S)
(S)
(S)
subgraph, and set m/n = q. Then if (n1 , . . . , nK ) is the cluster size vector for ZS , then clearly nk โผ
Hypergeometric(m, nk , n) and therefore, by Lemma B.4,
((nk โ nmin )q + โ)2
(S)
P(nk โค nmin q โ โ) โค exp โ
4nk q
2
โ
.
โค exp โ
4nmax q
Therefore, by union bound,
(S)
P(nmin โค nmin q โ โ) โค
X
(S)
P(nk
โค nmin q โ โ)
k
โ2
โค K exp โ
4nmax q
Choosing โ =
โ
.
4r0 nmax q log n, where r0 > 0, we see that with probability at least 1 โ
(S)
nmin โฅ nmin q โ
p
4r0 nmax q log n
K
nr 0
we have
(29)
Similarly, we can show that
P(n(S)
max
and then, taking โ =
โฅ nmax q + โ) โค K exp โ
,
โ 0
4r nmax q log n, conclude that with probability at least 1 โ
n(S)
max โค nmax q +
B.1.2
โ2
4nmax q
K
nr0
p
4r0 nmax q log n.
(30)
Community sizes in 1-hop ego neighborhoods
Let now S be a randomly chosen 1-hop ego neighborhood. Note that the size of the k-th block in this
neighborhood satisfies
X
(S)
nk =
Xj ,
j : ฯ(j)=k
where Xj = 1{jโS} .
Now it is not hard to see that the Xj โs are independent conditional R, the root of S. We also have that
E(Xj | R) = Bฯ(j)ฯ(R) 1(j 6= R). It follows that
(S)
E(nk | R) =
X
X
E(Xj | R) =
j : ฯ(j)=k
Bฯ(j)ฯ(R) 1{j6=R} ,
j : ฯ(j)=k
which means that
(S)
(nmin โ 1)Bโ โค (nk โ 1)B? โค E(nk | R) โค nk B# โค nmax B# .
36
Therefore, by Chernoffโs inequality,
(S)
(S)
P(nk
โค (nmin โ 1)B? โ โ | R) โค exp โ
โค exp โ
(E(nk | R) โ nmin B? + โ)2
!
(S)
2E(nk | S)
.
โ2
2nmax B#
Since the right hand side does not depend on R, we can take expectations of both sides with respect to R
to get
โ2
(S)
P(nk โค (nmin โ 1)B? โ โ) โค exp โ
.
2nmax B#
This implies, by an application of the union bound, that
(S)
P(nmin
Choosing, โ =
โ2
โค (nmin โ 1)B? โ โ) โค K exp โ
2nmax B#
p
2r0 nmax B# log n we conclude, with probability at least 1 โ
(S)
nmin โฅ (nmin โ 1)B? โ
p
.
K
,
nr0
that
2r0 nmax B# log n.
(31)
One can prove similarly that
P(n(S)
max
and then, taking โ =
โฅ nmax B# + โ) โค K exp โ
,
p
3r0 nmax B# log n, conclude, with probability at least 1 โ
n(S)
max โค nmax B# +
B.1.3
โ2
3nmax B#
K
,
nr0
that
p
3r0 nmax B# log n.
(32)
Analysis of adjacency spectral clustering
We shall use the community size estimates from the previous subsection along with Lemma 3.1.
Random m-subgraphs: From (29) and (30) we have, with probability at least 1 โ n2K
r 0 , that
โ
nmax q + 4r0 nmax q log n
nmax
โ 0
โค
โค 2
Cn,m,r0 ,
2
(S) 2
nmin q
(nmin q โ 4r nmax q log n)
(nmin )
(S)
nmax
where
s
Cn,m,r0 =
1+
4r0 log n
nmax q
n2
s
!
1โ
q
4r0 nmax log n
n2min q
!โ2
.
n2
q
Note that Cn,m,r0 stays bounded, e.g., by 6, if nmaxminlog n โฅ 16r0 . In fact, it approaches 1 as nmaxminlog n โ โ.
1
Thus, from (7), with probability at least 1 โ n2K
r 0 over randomness in S and with probability at least 1 โ mr
over randomness in AS , we have
1
K nmax
โ1
ฮด(ZฬS , ZS ) โค min c (2 + ) 2
Cn,m,r0 , 1 .
2
ฮป ฮฑn n2min q
37
We conclude that
2K
1
K nmax
1
โ1
Cn,m,r0 , 1 + r0 + r .
Eฮด(ZฬS , ZS ) โค min c (2 + ) 2
2
2
ฮป ฮฑn nmin q
m
n
1-hop ego neighborhoods: By (7), given S (non-empty), with probability at least 1 โ
randomness in AS , we have
(
)
(S)
1
n
K
max
ฮด(ZฬS , ZS ) โค min cโ1 (2 + ) 2
, 1 =: JS .
2
ฮป ฮฑn (n(S) )2
(33)
1
|S|r
over the
min
So
1
1
E[ฮด(ZฬS , ZS ) | S] โค JS +
.
2
|S|r
Therefore
1
Eฮด(ZฬS , ZS )1(|S|โฅm? ) โค EJS 1(|S|โฅm? ) + E
2
1(|S|โฅm? )
|S|r
.
From (31) and (32) we have, with probability at least 1 โ n2K
r 0 , that
p
(S)
nmax B# + 3r0 nmax B# log n
nmax B#
nmax
nmax
p
โค
Dn,B,r0 = 2
Dn,B,r0 ,
โค 2
2
(S) 2
0
2
nmin B?
nmin ฮป2 ฮฑn
((nmin โ 1)B? โ 2r nmax B# log n)
(nmin )
where
!โ2
2r0 nmax B# log n
Dn,B,r0 = 1 +
1โ
โ
nmin
n2min B?2
s
!
!โ2
r
3r0 log n
2r0 nmax log n
1
= 1+
.
1โ
โ
nmax ฮฑn
nmin
n2min ฮป2 ฮฑn
q
n2min ฮป2 ฮฑn
0
stays bounded, e.g., by 16(1 + 38 ), if nmax
log n โฅ 8r . In fact, it approaches 1 as
s
Note that Dn,B,r0
n2min ฮป2 ฮฑn
nmax log n
3r0 log n
nmax B#
!
1
s
โ โ. Thus
โ1
EJS 1(|S|โฅm? ) โค min c
K nmax
2K
(2 + ) 4 2 2 Dn,B,r0 , 1 + r0 .
ฮป ฮฑn nmin
n
On the other hand,
E
1(|S|โฅm? )
|S|r
โคE
=E
1(|S|โฅ1)
|S|r
!
1( (nโ1)B? >|S|โฅ1)
2
|S|r
+E
1(|S|โฅ (nโ1)B? )
!
2
|S|r
r
(n โ 1)B?
2
โค P |S| <
+
2
(n โ 1)B?
r
nB?2
2
โค exp โ
+
(by (20))
16B#
(n โ 1)B?
r
16B#
4 r
16
4
โค
+
=
+
.
nB?2
nB?
nฮป2 ฮฑn
nฮปฮฑn
38
So, finally, we have
r
4
16
2K
1
โ1 K nmax
+
Eฮด(ZฬS , ZS )1(|S|โฅm? ) โค min c
.
Dn,B,r0 , 1 + r0 +
2
ฮป4 ฮฑn2 n2min
nฮป2 ฮฑn
nฮปฮฑn
n
B.1.4
Analysis of SDP
a
n
In the setting of Corollary 3.5, for a random m-subgraph S we have mink Bkk โฅ
b
n
(34)
bฬ
m
am
n ,
(S)
nkk0
bm
n .
=
aฬ
0
m , maxk6=k
Bkk0 โค
=
where aฬ =
bฬ =
Let
denote the number of pairs of vertices in the subgraph S such that
one of them is from community k and the other is from community k 0 . Now by Lemma B.4
(S)
P(nk
2 mฯ
โฅ cnk m/n) โค eโ(cโ1)
min /4
.
2
So with probability at least 1 โ Keโ(cโ1) mฯmin /4 we have, for all 1 โค k โค k 0 โค K, that
( (S) (S)
for k < k 0 ,
n n 0 โค c2 nk n0k m2 /n2 โค c1 nkk0 m2 /n2 ,
(S)
nkk0 = 1 k (S) k (S)
1
2
2
for k = k 0 ,
2 nk (nk โ 1) โค 2 cnk m/n(cnk m/n โ 1) โค c1 nkk m /n ,
where c1 = c2 1 +
cm
โ1
n
cm
(nฯ
min โ1)
n
0 2 mฯ
. Similarly, we can show that, with probability at least 1โKeโ(1โc )
(S)
nkk0
(
c2 nkk0 m2 /n2 ,
โฅ
c2 nkk m2 /n2 ,
min /4
for k < k 0 ,
for k = k 0 ,
c0 m
โ1
n
(S)
where c2 =
1 + c0 m
. Let G = {S | c2 nkk0 m2 /n2 โค nkk0 โค c1 nkk0 m2 /n2 , for all 1 โค k โค
(nฯmax โ1)
n
P
(S)
gฬ
2
k 0 โค K}. Given S, the expected variance of edges in S is m(mโ1)
1โคkโคk0 โคK Bkk0 (1 โ Bkk0 )nkk0 =: m , say.
Then, if S โ G, we have
(c0 )2
c2 g
c2 m(n โ 1) g
gฬ
c1 m(n โ 1) g
m
โค
ร โค
โค
ร = 2 ร gฬ.
n
(m โ 1)n
n
m
(m โ 1)n
n
n
2
and so, using our assumptions on a, b, g, we get that gฬ โฅ 9 and aฬ, bฬ satisfy (aฬ โ bฬ)2 โฅ 484โ2 m
gฬ โฅ 484โ2 gฬ.
n2
Therefore, using Lemma 3.2 on the subgraph S, we conclude that, given S โ G, we have
1
kCฬ (S) โ Cฬ (S) k2F โค ,
m2
with probability at least 1 โ e3 5โm , where Cฬ (S) is a solution of SDP-GV on the subgraph S. As P(S โ
/ G) โค
2
0 2
Keโ(cโ1) mฯmin /4 + Keโ(1โc ) mฯmin /4 , we conclude that
Eฮดฬ(Cฬ (S) , C (S) ) โค + e3 5โm + Keโ(cโ1)
B.2
2 mฯ
min /4
0 2 mฯ
+ Keโ(1โc )
min /4
.
Proofs of some results for GALE
In this section we collect the proofs of the auxiliary results we presented in Section 6.2.
39
Proof of Lemma 6.3. Note that the Ni โs are i.i.d. Binomial(T ; m/n) random variables and hence by Chernoffโs inequality we have,
2
P(Ni < ฯ ) โค eโ(1โฮธ) T m/2n .
(35)
Another use of Chernoff gives, for ฮด > 0,
!
P
X
1{Ni <ฯ } > nP(N1 < ฯ )(1 + ฮด)
โค exp(โฮด 2 nP(N1 < ฯ )/3).
i
Setting ฮด =
q
3r log n
nP(N1 <ฯ ) ,
we conclude that with probability at least 1 โ
X
1{Ni <ฯ } โค nP(N1 < ฯ ) +
1
nr ,
p
3rnP(N1 < ฯ ) log n
i
โค ne
โ(1โฮธ)2 T m/2n
r
1+
3r log n
neโ(1โฮธ)2 T m/2n
!
.
Proof of Lemma 6.4. We will first show that for three different nodes a, b, c in Sm,T the overlap variables
Yab and Yac are independent. This is an immediate consequence of the following two facts:
(i) Yab and y (a) are independent which follows from the observation that for any m-subset S of [n],
Yab | y (a) = 1S โผ Hypergeometric(m, m, n).
(ii) Given y (a) , the overlaps Yab and Yac are independent, which follows from the fact that y (b) and y (c)
are independent.
From the discussion above, Yab โผ Hypergeometric(m, m, n). Using Lemma B.4 we get, with = 1/2, we
get that
2
m
m2
P(a โผ b) = P Yab โฅ
โฅ 1 โ exp โ
.
2n
16n
(S)
Proof of Lemma 6.6. Notice that nk | Yab โผ Hypergeometric(Yab , nฯk , n), which follows from the fact that
given Yab , Sa โฉ Sb is distributed as a uniform Yab -subset of [n]โ . So, Lemma B.4 gives us
s
!
!
4r log n
1
(S)
P nk < Yab ฯk 1 โ
Yab โค r .
Yab ฯk
n
Therefore the same bound holds for the unconditional probability. Another application of Lemma B.4 for
Yab โผ Hypergeometric(m, m, n) gives us
!!
r
m2
4rn log n
1
P Yab <
1โ
โค r.
n
m2
n
โ
Thanks to Satyaki Mukherjee for making this observation, which makes the proof considerably shorter than our original
approach based on concentration inequalities for sums of dependent Bernoulli random variables.
40
Using these two bounds, we conclude that with probability at least 1 โ
(S)
nk
as long as
m2 ฯk
n log n
โฅ
m2 ฯ
n
s
k
1โO
2
n log n
m2 ฯk
2
nr ,
we have that
!!
,
is large enough ( nmlogฯkn โฅ 20r suffices to make the RHS above โฅ 0).
41
| 10math.ST
|
arXiv:1704.07811v1 [math.GR] 25 Apr 2017
R-triviality of some exceptional groups
Maneesh Thakur
Indian Statistical Institute, 7-S.J.S. Sansanwal Marg
New Delhi 110016, India
e-mail: maneesh.thakur@ gmail.com
Abstract
The main aim of this paper is to prove R-triviality for simple, simply connected
78 or E 78 , defined over a field k of arbitrary
algebraic groups with Tits index E8,2
7,1
characteristic. Let G be such a group. We prove that there exists a quadratic
extension K of k such that G is R-trivial over K, i.e., for any extension F of
K, G(F )/R = {1}, where G(F )/R denotes the group of R-equivalence classes in
G(F ), in the sense of Manin (see [23]). As a consequence, it follows that the
variety G is retract K-rational and that the Kneser-Tits conjecture holds for these
groups over K. Moreover, G(L) is projectively simple as an abstract group for
any field extension L of K. In their monograph ([51]) J. Tits and Richard Weiss
conjectured that for an Albert division algebra A over a field k, its structure group
Str(A) is generated by scalar homotheties and its U -operators. This is known to
78 . We
be equivalent to the Kneser-Tits conjecture for groups with Tits index E8,2
settle this conjucture for Albert division algebras which are first constructions, in
affirmative. These results are obtained as corollaries to the main result, which
shows that if A is an Albert division algebra which is a first construction and ฮ
its structure group, i.e., the algebraic group of the norm similarities of A, then
ฮ(F )/R = {1} for any field extension F of k, i.e., ฮ is R-trivial.
Keywords: Exceptional groups, Algeraic groups, Albert algebras, Structure group, Kneser-Tits
conjecture
1
Introduction
The main aim of this paper is to prove R-triviality of certain exceptional algebraic groups.
More precisely, let G be a simple, simply connected algebraic group defined over a field k of
78 or E 78 (see [48] for the index notation). Groups
arbitrary characteristic, with Tits index E8,2
7,1
with these indices exist over a field k if k admits a central division algebra of degree 3 with
non-surjective reduced norm, or if k admits degree 3 central division algebras with unitary
involutions over a quadratic extension of k, with non-surjective reduced norm map (see [46],
78 , E 78 do not exist over finite
3.2, 3.3.1). Note also that the groups with Tits indices E8,2
7,1
fields, number fields, algebraically closed fields, local fields, field of reals. However, these
exist, for example, over Q(t), the function field over Q in one variable.
1
2
Maneesh Thakur
78 are classified by isotopy classes of Albert division algebras over k
Groups with index E8,2
and their associated buildings are Moufang hexagons defined by a hexagonal system of type
27/K where K is either a quadratic extension of k or K = k (see [51], [42]). Groups with
78 are classified by isotopy classes of Albert division algebras and they are associated
index E7,1
to Moufang sets M(A), for A an Albert division algebra (e.g. see [43] or [2]).
Let G be an algebraic group over k, with Tits index as one of the above mentioned indices.
We prove that there exists a quadratic field extension K of k such that G is R-trivial over K,
i.e., for any field extension L of K, G(L)/R = {1} in the sense of Manin ([23]). Since E8 has
78 , there is a quadratic extension K of k
trivial center, it follows that when G has index E8,2
such that G(L) is a simple (abstract) group for any field extension L of K. It is well known
(see [46]) that the anisotropic kernels of these groups correspond (upto a central torus) to
the structure groups of Albert division algebras over k.
Albert division algebras over a field k are obtainable from two (rational) constructions due
to Tits, called the first construction and the second construction. We prove that if
the anisotropic kernel of G (for G as above) comes from a first construction Albert division
algebra, then G is R-trivial over k. In this situation G splits over a cubic extension of k.
The Kneser-Tits conjecture predicts that if G is a connected, simple, simply connected
algebraic group, defined and isotropic over a field k, then G(k)/G(k)โ = {1}, where G(k)โ
is the subgroup of G(k) generated by the k-rational points of the unipotent radicals of kparabolics of G (see [33], ยง7.2, [13]). By a theorem of Gille, this is equivalent to proving
G(k)/R = {1} ([13], Thm. 7.2).
A conjecture of J. Tits and Richard M. Weiss asserts that if A is an Albert division
algebra over a field k, then its structure group Str(A) is generated by scalar homotheties
and U -operators (defined in ยง2) of A (see [51], 37.41, 37.42 and page 418). This conjecture
78 (see [51]).
is equivalent to the Kneser-Tits conjecture for groups with Tits index E8,2
Our results prove the Tits-Weiss conjecture when A is a first Tits construction. For an
extensive survey and new results on the Kneser-Tits problem, we refer the reader to ([13])
along with the classics ([45], [47]) and ([33]) and the paper ([38]) for reduction to the relative
rank one case. We mention some recent results: The case of simply connected group with
29 was settled in ([12]), where a modern version (in terms of W -triviality) of F. D.
index 2 E6,1
Veldkampโs proof ([49], [50]) is presented. The case of the trialitarian forms of D4 over global
fields was settled in ([37]). The paper [37]) also presents a description of the Whitehead
group (over an infinite field k) of an absolutely simple, simply connected algebraic group of
type 3,6 D4 of k-rank 1. The result for such groups over a general field is covered in ([13],
66 over an arbitrary field was
ยง6.1). The Kneser-Tits conjecture for groups with Tits index E8,2
settled in ([36]).
This paper is the second in a series of papers dedicated to this problem. In the first paper
([44]) we proved, among other results, that the conjecture is true for pure first constructions. We had also proved that for such an Albert division algebra A over k, the group
Aut(A) is R-trivial.
The problem of R-equivalence for semisimple algebraic groups has been studied by several
mathematicians, see for example ([4], [5], [7], [8], [3]) and the references therein. This connects
with some algebro-geometric properties of algebraic groups; e.g. if G is a simple, simply
connected algebraic group, isotropic and defined over a field k, then G is R-trivial if and only
if the variety of G is retract k-rational (see [13], Thm. 5.9).
78 or E 78 , the
Remark : For a simple, simply connected algebraic group G with Tits index E8,2
7,1
(semisimple) anisotropic kernel H of G is isomorphic to Isom(A), the full group of isometries
of the norm form of an Albert division algebra A over k. The anisotropic kernel H of G is
R-triviality
3
split by a cubic extension of k if and only if A is a first Tits construction (see Proposition
2.2 and Corollary 2.1).
Retract rationality : By ([13]), our results also prove that if G is a simple, simply connected
78 or E 78 , then there exists a quadratic
algebraic group defined over k with Tits index E8,2
7,1
extension K of k such that the underlying variety of G is retract K-rational. If the anisotropic
kernel of G is split over a cubic extension of k, then G is retract k-rational.
Plan of the paper : In this paper, k will always denote a base field, infinite of arbitrary
characteristic.
In ยง2, we give a quick introduction to Albert algebras, Tits processes and the structure
group of an Albert algebra. A description of strongly inner groups of type E6 and those
78 and E 78 is given in detail. This is followed by a brief introduction to
with Tits index E8,2
7,1
R-equivalence on algebraic groups. At the end of ยง2, we state our main results and some of
their consequences.
ยง3 and ยง4 contain some of the key results of the paper. ยง3 is mainly concerned with
extension of automorphisms of a 9-dimensional subalgebra of an Albert algebra A to an
automorphism of A and also discusses R-triviality of some subgroups of Aut(A). ยง4 contains
results on extending norm similarities of 9-dimensional subalgebras to those of the Albert
algebra (see Theorem 4.5). Some of the most important results on R-triviality are proved
ยง5. Here we develop the R-triviality results on various subgroups of Aut(A) and Str(A) for
Albert algebras in general as well as for the special case of first constructions. These results
culminate in the main theorem (Theorem 5.4) , where we prove Str(A) is R-trivial for first
Tits construction Albert algebras. ยง6 discusses a proof of the R-triviality of groups of type
78 , with anisotropic kernel split over a cubic extension. A proof of the Tits-Weiss conjecture
E8,2
for Albert division algebras, arising from first Tits construction is presented (Corollary 6.1).
78 , having anisotropic kernel split over a cubic
In ยง7, we discuss groups with Tits index E7,1
extension. We prove that such groups are R-trivial. We end ยงwith some R-triviality results
for reduced Albert algebras.
In ยง8 some retract rationality results are derived. We prove, as a consequence of our results
78 or E 78 and the anisotropic kernel is
in ยง6 and ยง7, that any group G whose Tits index is E7,1
8,2
split over a cubic extension of k, is retract k-rational.
2
Preliminaries and results
For much of the preliminary material on Albert algebras, we refer the reader to ([27]), ([39])
and ([21]). We recall below, very briefly, some notions we will need. All base fields considered
in this paper will be assumed to be infinite and of arbitrary characteristic. To define the notion
of an Albert algebra over a field of arbitrary characteristics, we take the approach via cubic
norm structure, as defined in ([32] or [30]) .
Cubic norm structures : Let J be a finite dimensional vector space over a field k. A cubic
norm structure on J consists of a tuple (N, #, c), where c โ J is a base point, called the
identity element of the norm structure and
1. N : J โ k is a cubic form on J,
2. N (c) = 1,
3. the trace form T : J ร J โ k, defined by T (x, y) := โโxc โy logN , is nondegenerate,
4
Maneesh Thakur
4. the adjoint map # : J โ J defined by T (x# , y) = โyx N , is a quadratic map such
that
5. x## = N (x)x,
6. c# = c,
7. cรx = T (x)cโx, where T (x) := T (x, c) is the trace of x and xรy := (x+y)# โx# โy # ,
and these hold in all scalar extensions of J. In the above, โyx f denotes the directional
derivative of a polynomial function f on J, in the direction y, evaluated at x. For differential
calculus of rational maps and related notation, we refer to ([16], Chap. VI, Sect. 2). Let, for
x โ J,
Ux (y) := T (x, y)x โ x# ร y, y โ J.
Then with 1J := c and Ux as above, one gets a unital quadratic Jordan algebra structure
on J (see [24]), sometimes denoted by J(N, c). The linear operators Ux as defined above,
are called the U -operators of the Jordan algebra J. An element x โ J is invertible if and
only if N (x) 6= 0 and in that case one has xโ1 = N (x)โ1 x# . Recall that J(N, c) is called
a division algebra if Ux is surjective for all x 6= 0, which is equivalent to N (x) 6= 0 for all
x 6= 0. We list some examples and notation that we will use in the paper:
Example 1. Let D denote a separable associative algebra over k, of degree 3. Let ND
denote its norm and TD the trace. Then with 1D the unit element of D and # : D โ D
the (classical) adjoint map, we get a quadratic Jordan algebra structure on D, which we will
denote by D+ .
Example 2. Let (B, ฯ) be a separable associative algebra over k with an involution ฯ of the
second kind (over its center). With the unit element 1 of B and the restriction of the norm
NB of B to (B, ฯ)+ := {b โ B|ฯ(b) = b}, we get a cubic norm structure on (B, ฯ)+ which is
a substructure of B+ .
Example 3. Let C be an octonion algebra over a field k with n as its norm map and t its
trace. Let x 7โ x denote its canonical involution. Let ฮณ = diag(ฮณ1 , ฮณ2 , ฮณ3 ) โ GL3 (k) and
H3 (C, ฮณ) := {x = (xij ) โ M3 (C)|ฮณ โ1 xt ฮณ = x and xii โ k, 1 โค i โค 3},
where M3 (C) is the algebra of 3 ร 3 matrices with
It follows that any x โ H3 (C, ฮณ) has the form
๏ฃซ
ฮฑ1 ฮณ2 c
๏ฃญ
x = ฮณ1 c ฮฑ2
ฮณ1 b ฮณ2 a
entries in C and xt is the transpose of x.
๏ฃถ
ฮณ3 b
ฮณ3 a๏ฃธ ,
ฮฑ3
where ฮฑi โ k, a, b, c โ C. Define
N (x) := ฮฑ1 ฮฑ2 ฮฑ3 โ ฮณ2 ฮณ3 ฮฑ1 n(a) โ ฮณ3 ฮณ1 ฮฑ2 n(b) โ ฮณ1 ฮณ2 ฮฑ3 n(c) + ฮณ1 ฮณ2 ฮณ3 t(abc),
1 := e11 + e22 + e33 ,
and
x# := ฮฑ2 ฮฑ3 โ ฮณ2 ฮณ3 n(a) + ฮฑ3 ฮฑ1 โ ฮณ3 ฮณ1 n(b) + ฮฑ1 ฮฑ2 โ ฮณ1 ฮณ2 n(c)
+(ฮณ1 bc โ ฮฑ1 a)[23] + (ฮณ2 ca โ ฮฑ2 b)[31] + (ฮณ3 ab โ ฮฑ3 c)[12],
5
R-triviality
where a[ij] := ฮณj aeij + ฮณi aeji in terms of the matrix units. This defines a cubic norm
structure (see [30]), hence a Jordan algebra, called a reduced Albert algebra over k. We
call a reduced Albert algebra split if the coordinate octonion algebra is split, in which case
H3 (C, ฮณ) โผ
= H3 (C) := H3 (C, 1).
Tits process : 1. Let D be a finite dimensional associative k-algebra of degree 3 with norm
ND and trace TD . Let ฮป โ kโ . We define a cubic norm structure on the k-vector space
D โ D โ D by
1 := (1, 0, 0), N ((x, y, z)) := ND (x) + ฮปND (y) + ฮปโ1 ND (z) โ TD (xyz),
(x, y, z)# := (x# โ yz, ฮปโ1 z # โ xy, ฮปy # โ zx).
The (quadratic) Jordan algebra associated to this norm structure is denoted by J(D, ฮป). We
regard D+ as a subalgebra of J(D, ฮป) through the first summand. Recall (see [32], 5.2) that
J(D, ฮป) is a division algebra if and only if ฮป is not a norm from D. This construction is called
the first Tits process arising from the parameters D and ฮป.
2. Let K be a quadratic eฬtale extension of k and B be a separable associative algebra of
degree 3 over K with a K/k involution ฯ. Let u โ (B, ฯ)+ be a unit such that NB (u) = ยตยต
for some ยต โ K โ , where a 7โ a denotes the nontrivial k-automorphism of K. We define a
cubic norm structure on the k-vector space (B, ฯ)+ โ B by the formulae:
N ((b, x)) := NB (b) + TK (ยตNB (x)) โ TB (bxuฯ(x)),
(b, x)# := (b# โ xuฯ(x), ยตฯ(x)# uโ1 โ bx), 1 := (1B , 0).
The (quadratic) Jordan algebra corresponding to this cubic norm structure is denoted by
J(B, ฯ, u, ยต). We note that (B, ฯ)+ can be identified with a subalgebra of J(B, ฯ, u, ยต)
through the first summand. Recall (see [32], 5.2) that J(B, ฯ, u, ยต) is a division algebra
if and only if ยต is not a norm from B. This construction is called the second Tits process
arising from the parameters B, u, ยต.
Note that when K = k ร k, then B = D ร D โฆ and ฯ is the switch involution, where D โฆ is
the opposite algebra of D. In this case, the second construction J(B, ฯ, u, ยต) can be identified
with a first construction J(D, ฮป).
Albert algebras : In the Tits process (1) described above, if we start with a central simple
algebra D and ฮป โ kโ , we get a first Tits construction Albert algebra A = J(D, ฮป) over k.
Similarly, in the Tits process (2) above, if we start with a central simple algebra (B, ฯ) with
center a quadratic eฬtale algebra K over k and an involution ฯ of the second kind, u, ยต as
described above, we get a second Tits construction Albert algebra A = J(B, ฯ, u, ยต) over k.
One knows that all Albert algebras can be obtained via Tits constructions.
An Albert algebra is a division algebra if and only if its (cubic) norm N is anisotropic over
k (see [21], ยง39). We also recall here that a first construction Albert algebra A is either a
division algebra, or it is split, i.e., is isomorphic to H3 (C) with C the split octonion algebra
k. Moreover, any Albert division algebra arising from a first construction is split over any of
its cubic subfields.
If A = J(B, ฯ, u, ยต) as above, then A โk K โผ
= J(B, ยต) as K-algebras, where K is the center
of B (see [21], 39.4).
Hexagonal systems : A hexagonal system is a cubic norm structure whose norm is
anisotropic. We say a hexagonal system is of type 27/k if it arises from a first Tits construction Albert division algebra over k, and of type 27/K, for K a quadratic field extension of k,
6
Maneesh Thakur
if it arises from a Tits second construction Albert division algebra, corresponding to (B, ฯ)+
and K is the center of B.
Pure first and second constructions : Let A be an Albert algebra over k. If A is a first
construction, but not a second construction with respect to a degree 3 central simple algebra
whose center is a quadratic field extension of k, then we call A a pure first construction
Albert algebra. Similarly pure second construction Albert algebras are those which are not
obtainable through the first construction.
We recall at this stage that if A is an Albert division algebra, then any subalgebra of A is
either k or a cubic subfield of A or of the form (B, ฯ)+ for a degree 3 central simple algebra
B with an involution ฯ of the second kind over its center K, a quadratic eฬtale extension of k
(see [16], Chap. IX, ยง12, Lemma 2, [30]).
Norm similarities of Albert algebras : Let A be an Albert algebra over k and N denote
its norm map. A norm similarity of A is a bijective linear map f : A โ A such that
N (f (x)) = ฮฝ(f )N (x) for all x โ A and some ฮฝ(f ) โ k โ . Since we are working over k infinite,
norm similarities are synonimous with isotopies of Albert algebras (see [16], Chap. VI, Thm.
6, Thm. 7).
Adjoints and U -operators : Let A be an Albert algebra over k and N be its norm map.
Recall, for a โ A the U -operator Ua is given by Ua (y) := T (a, y)a โ a# ร y, y โ A. When
a โ A is invertible, it can be shown that Ua is a norm similarity of A, in fact, for any
x โ A, N (Ua (x)) = N (a)2 N (x) when a is invertible.
For a central simple algebra D of degree 3 over k, the adjoint map a 7โ a# satisfies
ND (a) = aa# = a# a, โ a โ D. It can be shown that (xy)# = y # x# for all x, y โ D. It also
follows that N (x# ) = N (x)2 .
Algebraic groups from Albert algebras : In this paper, for a k-algebra X and a field
extension L of k, We will denote by XL the L-algebra X โk L. Let A be an Albert algebra
over k with norm N and k be an algebraic closure of k. The full group of automorphisms
Aut(A) := Aut(Ak ) is a simple algebraic group of type F4 defined over k and all simple
groups of type F4 defined over k arise this way. When A is a division algebra, Aut(A) is
anisotropic over k. We will denote the group of k-rational points of Aut(A) by Aut(A). Note
that A is a division algebra precisely when the norm form N of A is anisotropic (see [40],
Thm. 17.6.5).
The full group Str(A) of norm similarities of N , called the structure group of A, is
a connected reductive group over k, of type E6 . We denote by Str(A) the group of krational points Str(A)(k). The U -operators Ua , for a โ A invertible, are norm similarities
and generate a normal subgroup of Str(A), called the inner structure group of A, which
we will denote by Instr(A). The commutator subgroup Isom(A) of Str(A) is the full group
of isometries of N and is a simple, simply connected group of type E6 , anisotropic over k if
and only if N is anisotropic, if and only if A is a division algebra (see [39], [40]). Note that
Aut(A) is the stabilizer of 1 โ A in Str(A).
On occasions, we will need to treat an algebra X as an algebraic variety (particularly
when dealing with R-equivalence etc.). In such a situation, if no confusion is likely, we shall
continue to denote the underlying (affine) space by X. Morphisms X โ Y or rational maps
would carry similar meanings. Base change of an object X defined over a base field k to an
extension L of k will be denoted by XL . We record the following observations with proofs :
Proposition 2.1. Let A be an Albert division algebra over k. Then Aut(A), Str(A) and
Isom(A) are split by a degree 6 extension of k.
7
R-triviality
1. A is a first construction if and only if A ( hence Aut(A) ) has a degree 3 splitting field
and, A is a pure first construction if and only if every minimal splitting field of A is
cubic cyclic.
2. A is a pure second construction if and only if A ( hence Aut(A) ) has no splitting field
of degree 3 over k.
Proof. Write A as a second construction A = J(B, ฯ, u, ยต) for suitable parameters as decribed
in the preliminaries. If A is a first construction, any cubic subfield of A splits A (see [28],
Thm. 4.7), hence splits Aut(A) and the statement follows. Let K be the center of B, which
must be a quadratic field extension of k if A is not a first construction. Base changing to K
we have A โ K โผ
= J(B, ยต). By the argument presented, there is a cubic extension L of K
that splits A โ K. Hence A is split by the degree 6 extension LK of k. To prove (1), note
that if A is a first construction, A has a cubic splitting field. Conversely, if A has a degree
3 splitting field L over k, then the invariant f3 (A) โ H 3 (k, Z/2) vanishes over L and hence
over k by Springerโs theorem. Hence f3 (A) = 0 and A is a first construction ([21], 40.5). The
assertion about pure first construction follows from ([44], Thm. 2.1). Proof of (2) follows
from (1).
Proposition 2.2. Let A be an Albert division algebra over k. Then A is a first Tits construction if and only if Str(A) (equivalently Isom(A)) is split by a cubic extension of k.
Proof. First assume that A is an Albert division algebra over k arising from a first Tits
construction. Then A is split by any cubic extension L โ A of k (see [28], Thm. 4.7) and
hence, by ([40], Thm. 17.6.3), L also splits the structure group Str(A) of A. Conversely, if
Str(A) splits over a cubic extension L of k, then, by ([40], Thm. 17.6.5), the Albert algebra
A is reduced over L. By ([40], Thm. 17.6.3), the stabilizer of 1 โ A โk L is the split group of
type F4 over L and equals Aut(A โk L). Hence, by ([21], 40.5), Aut(A โk L) has its mod-2
invariant f3 (A โk L) = f3 (A) โk L = 0. It follows that the coordinatizing octonion algebra
of A โk L is split over L. Hence, by Springerโs theorem, f3 (A) = 0. Therefore A must be a
first Tits construction over k ([21], 40.5).
Strongly inner group of type E6 : Let H be a simple, simply connected algebraic group
defined and strongly inner of type E6 over k (see [46] for definition). Then H is isomorphic
to Isom(A), the (algebraic) group of all norm isometries of an Albert algebra A over k.
Moreover, H is anisotropic if and only if A is a division algebra (see [40], Thm. 17.6.5).
78 : Let G be a simple, simply connected algebraic group with
Groups with Tits index E8,2
78 over k. The index has associated diagram as below:
Tits index E8,2
โข
โข
โข
โข
โข
โข
โข
โข
The anisotropic kernel of such a group is a simple, simply connected, strongly inner group of
type E6 and by ([51], [46]), can be realized as the group Isom(A) of norm isometries of an
Albert division algebra A over k. Let ฮ denote the Tits building associated to G. Then ฮ is
a Moufang hexagon associated to a hexagonal system of type 27/F , where F is a quadratic
field extension K of k (this is when A is written as a second construction J(B, ฯ, u, ยต) with
Z(B) = K) or F = k (when A is a first construction). The group G(k) is the group of โlinearโ
78 as automorphisms of a
automorphisms of ฮ. The explicit realization of groups of type E8,2
Moufang hexagon as above is due to Tits and Weiss and is detailed in their monograph ([51]).
8
Maneesh Thakur
78 : Let H be a simple, simply connected algebraic group over
Groups with Tits index E7,1
78
k with Tits index E7,1 over k. Then the anisotropic kernel of H is a simple, simply connected
strongly inner group of type E6 and is isomorphic to Isom(A) for an Albert division algebra
A over k (see [46]). The Tits index of H has associated diagram as below:
โข
โข
โข
โข
โข
โข
โข
Following Max Koecher ([20]), one can realize H as follows: fix an Albert divsion algebra A
over k. Let ฮ(A) be the (algebraic) group of birational transformations of A generated by
the structure group Str(A) and the maps
x 7โ ta (x) = x + a ( a โ Ak ), x 7โ j(x) = โxโ1 (x โ Ak ).
78 and any algebraic group over k with this Tits index arises this way
Then ฮ(A) has type E7,1
(see [46]). Any element of f โ ฮ(A) is of the form
f = w โฆ ta โฆ j โฆ tb โฆ j โฆ tc , w โ Str(A), a, b, c โ Ak .
This was proved by Koecher when k is infinite and has characteristic 6= 2 and by O. Loos in
arbitrary chatacteristics ([22]), in the context of Jordan pairs.
Remark : In light of Proposition 2.1 and Proposition 2.2, the anisotropic kernel of a simple,
78 or E 78 , is split by a degree 6
simply connected group G defined over k, with Tits index E8,2
7,1
extension of k.
We have
78
Corollary 2.1. Let G be a simple, simply connected algebraic group over k with index E8,2
78
or E7,1 , such that the anisotropic kernel H of G is split by a cubic extension of k. Then
Hโผ
= Isom(A) for an Albert division algebra A over k arising from the first Tits construction.
Proof. This is immediate from Proposition 2.2 and the above discussion.
R-equivalence in algebraic groups : Let X be an irreducible variety over a field k with
X(k) nonempty. Following Manin ([23]) we define points x, y โ X(k) to be R-equivalent if
there exists a sequence x0 = x, x1 , ยท ยท ยท , xn = y of points in X(k) and rational mape fi : A1k โ
X, 1 โค i โค n, defined over k and regular at 0 and 1, such that fi (0) = xiโ1 , fi (1) = xi .
When G is a connected algebraic group defined over k, the set of elements of G(k) which
are R-equivalent to 1 โ G(k) is a normal subgroup RG(k) of G(k). The set G(k)/R of Requivalence classes in G(k) is in natural bijection with the quotient G(k)/RG(k) and therefore
carries a natural group structure, and we identify G(k)/R with the group G(k)/RG(k). This
group measures the obstruction to rational parameterizing of points of G(k).
We say G is R-trivial if G(L)/R = {1} for all field extensions L of k. Recall that a variety
X defined over k is said to be k-rational if X is birationally isomorphic over k to an affine
space. It is well known (see [52], Chap. 6, Prop. 2) that if G is k-rational then G is R-trivial.
Let G be a connected reductive group defined over k and assume G is k-isotropic, i.e.,
admits a k-embedding Gm ึโ G such that the image is not contained in Z(G), the center of
G. Let G(k)โ denote the subgroup of G(k) generated by the k-rational points of the unipotent
radicals of the k-parabolic subgroups of G. Then G(k)โ is normal in G(k) and the quotient
W (k, G) = G(k)/G(k)โ is the Whitehead group of G.
R-triviality
9
By a theorem of Gille ([13], Thm. 7.2) if G is a semisimple, simply connected and absolutely
almost simple group, defined and isotropic over k, then W (k, G) โผ
= G(k)/R. The Kneser-Tits
problem asks if for such a group G, its Whitehead group is trivial, or more generally, to
compute the Whitehead group. In this paper, we prove
78 or
Theorem 2.1. Let G be a simple, simply connected algebraic group over k of type E7,1
78 or strongly inner type E , whose anisotropic kernel is split by a cubic extension of k.
E8,2
6
Then G is R-trivial.
Corollary 2.2. Let G be a simple, simply connected algebraic group, defined and isotropic
78 or E 78 , and anisotropic kernel split by a cubic extension
over a field k, with Tits index E8,2
7,1
of k. then the Kneser-Tits conjecture holds for G. Moreover, G(L) is projectively simple, for
any field extension L or k.
Corollary 2.3. Let G be a simple, simply connected algebraic group, defined and isotropic
78 or E 78 . Then there exists a quadratic field extension K
over a field k, with Tits index E8,2
7,1
of k such that G is R-trivial over K, i.e., for any extension F of K, G(F )/R = {1}.
We will prove this result in steps. The key result in proving the above theorem is our Main
theorem:
Theorem 2.2. Let A be an Albert division algebra over k arising from the first Tits construction. Then Str(A) is R-trivial.
Corollary 2.4. Tits-Weiss conjecture : Let A be an Albert division algebra arising from
the first Tits construction. Then Str(A) = C.Instr(A), where C is the subgroup of Str(A)
consisting of scalar homotheties Ra : A โ A, a โ kโ .
3
Automorphisms and R-triviality
Let A be an Albert algebra over k and S a subalgebra of A. We will denote by Aut(A/S)
the (closed) subgroup of Aut(A) consisting of automorphisms of A which fix S pointwise and
Aut(A, S) will denote the closed subgroup of automorphisms of A stabilizing S. The group
of k-rational points of these groups will be denoted by ordinary fonts, for example Aut(A) =
Aut(A)(k) and so on. When A is a division algebra, any proper subalgebra S of A is either k
or a cubic subfield or a 9-dimensional (degree 3) Jordan subalgebra, which is of the form D+
for a degree 3 central division algebra D over k or of the form (B, ฯ)+ for a central division
algebra B of degree 3 over a quadratic extension K of k, with an involution ฯ of the second
kind over K/k (cf. Thm. 1.1, [31]). We record below a description of some subgroups of
Aut(A) which we shall use in the sequel, we refer to ([21], 39.B) and ([11]) for details.
Proposition 3.1. Let A be an Albert algebra over k.
1. Suppose S = D+ โ A for D a degree 3 central simple k-algebra. Write A = J(D, ยต)
for some ยต โ kโ . Then Aut(A/S) โผ
= SL(1, D), the algebraic group of norm 1 elements
in D.
2. Let S = (B, ฯ)+ โ A for B a degree 3 central simple algebra of degree 3 over a
quadratic extension K of k with an involution ฯ of the second kind over K/k. Write
A = J(B, ฯ, u, ยต) for suitable parameters. Then Aut(A/S) โผ
= SU(B, ฯu ), where ฯu :=
Int(u) โฆ ฯ.
10
Maneesh Thakur
In particular, the subgroups described in (1) and (2) are simply connected, simple of type A2 ,
defined over k and hence are rational, therefore are R-trivial.
The last assertion is due to the fact that connected reductive groups of absolute rank at most
2 are rational (see [6]). For an algebraic group G defined over k, we denote the (normal)
subgroup of elements in G(k) that are R-equivalent to 1 โ G(k) by R(G(k)).
Extending automorphisms : Let A be an Albert (division) algebra and S โ A a subalgebra. Then, under certain conditions, we can extend automorphisms of S to automorphisms
of A (e.g. when S is nine dimensional, see [34], Thm. 3.1, [26], Thm. 5.2). We need certain
explicit extensions for our results, we proceed to describe these (cf. [21], 39.B). We will need
the following important result in the sequel frequently, so we record it below ([25] or [21],
40.13 and Lemma 5.4 of [26] for arbitrary characteristics):
Lemma 3.1. Let (B, ฯ) be a degree 3 central simple algebra with center K, a quadratic eฬtale
algebra and ฯ an involution of the second kind. Let w โ B โ be such that ฮป := NB (w) satisfies
ฮปฮป = 1. Then there exists q โ U (B, ฯ) such that ฮป = NB (q).
First, let S be a 9-dimensional subalgebra of A. Then we may assume S = (B, ฯ)+ for a
degree 3 central simple algebra with center K, a quadratic eฬtale extension of k (see [31]).
We then have A โผ
= J(B, ฯ, u, ยต) for suitable parameters. Recall that any automorphism of
S is of the form x 7โ pxpโ1 with p โ Sim(B, ฯ), where Sim(B, ฯ) = {g โ B โ |gฯ(g) โ kโ }.
This is immediate from the fact that any norm similarity of S is of the form x 7โ ฮณgxฯ(g) for
some ฮณ โ kโ and g โ B โ (see Thm. 5.12.1, [17]) and that among these, automorphisms are
precisely the norm similarities that fix the identity element of S (see [18], Thm. 4). Recall
the notation ฯu := Int(u) โฆ ฯ. We have,
Proposition 3.2. Let A = J(B, ฯ, u, ยต) be an Albert algebra over k, S := (B, ฯ)+ and
K = Z(B) be as above. Let ฯ โ Aut(S) be given by ฯ(x) = gxg โ1 for g โ Sim(B, ฯ) with
gฯ(g) = ฮป โ kโ and ฮฝ := NB (g) โ K โ . Let q โ U (B, ฯu ) be arbitrary with NB (q) = ฮฝฬ โ1 ฮฝ.
Then the map ฯe : A โ A, given by
(a, b) 7โ (gag โ1 , ฮปโ1 ฯ(g)# bq),
is an automorphism of A extending ฯ.
Proof. To show ฯe is an automorphism, we first note that ฯe is a k-linear bijection. Hence,
e
by ([24], Page 507), it suffices to check ฯ(1)
= 1 and ฯe preserves norms. The first condition
is obvious. Let us verify the second. We first note some formulae which will be used in the
computation below:
NB (ฯ(g)) = ฮฝ, NB (g# ) = NB (g)2 = ฮฝ 2 , NB (ฯ(g)# ) = ฮฝ 2 , NB (gฯ(g)) = ฮฝฮฝ = ฮป3 ,
NB (g) = gg # = ฮฝ, ฮป2 = (gฯ(g))# = ฯ(g)# g # , NB (q) = ฮฝ โ1 ฮฝ.
Also, since q โ U (B, ฯu ), we have
1 = qฯu (q) = quฯ(q)uโ1 , qu = uฯ(q)โ1 .
Now, for (a, b) โ A, we compute using the above formulae,
e b)) = N ((gag โ1 , ฮปโ1 ฯ(g)# bq))
N (ฯ(a,
11
R-triviality
= NB (gag โ1 )+TK (ยตNB (ฮปโ1 ฯ(g)# bq))โTB (gag โ1 (ฮปโ1 ฯ(g)# bq)uฯ(ฮปโ1 ฯ(g)# bq))
= NB (a)+TK (ยตฮปโ3 ฮฝฬ 2 NB (b)NB (q))โTB (gag โ1 (ฮปโ1 ฯ(g)# bq)u(ฯ(q)ฯ(b)g# ฮปโ1 ))
= NB (a)+TK (ยต(ฮฝ ฮฝฬ)โ1 ฮฝฬ 2 NB (b)ฮฝฬ โ1 ฮฝ)โTB (gag โ1 ฮปโ1 ฮป2 (g # )โ1 bquฯ(q)ฯ(b)ฮฝgโ1 ฮปโ1 )
= NB (a)+TK (ยตNB (b))โTB (gag โ1 gฮฝ โ1 bquฯ(q)ฯ(b)ฮฝgโ1 )
= NB (a)+TK (ยตNB (b))โTB (abuฯ(b)) = N ((a, b)).
Hence ฯe is an automorphism of A extending ฯ.
Corollary 3.1. Let A = J(D, ยต) be an Albert algebra, which is a first construction. Let
ฯ โ Aut(D+ ) be given by ฯ(x) = gxg โ1 for g โ D โ and x โ D+ . Then the map
(x, y, z) 7โ (gxg โ1 , gyhโ1 , hzgโ1 ),
for any h โ D โ with ND (g) = ND (h), is an automorphism of A extending ฯ.
Proof. We identify A = J(D, ยต) with the second construction J(D ร D โฆ , วซ, 1, (ยต, ยตโ1 )), where
วซ is the switch involution on B = D ร D โฆ and apply the proposition.
Note that, for g โ Sim(B, ฯ), the extension ฯe of ฯ as constructed above, can be simplified
as follows: let p = ฮปฮฝ โ1 g, where gฯ(g) = ฮป โ kโ and ฮฝ = NB (g) โ K โ . Then ฮป3 = ฮฝ ฮฝฬ and
p โ U (B, ฯ), since
pฯ(p) = ฮปฮฝ โ1 gฮปฮฝฬ โ1 ฯ(g) = ฮป2 (ฮฝ ฮฝฬ)โ1 (gฯ(g)) = ฮป3 ฮปโ3 = 1.
e using gฯ(g) = ฮป, ฯ(g# )g# = ฮป2 , gg# = ฮฝ, becomes,
Hence the expression for ฯ,
e b) = (gag โ1 , ฮปโ1 ฯ(g# )bq)
ฯ(a,
= (ฮปฮฝ โ1 gaฮปโ1 ฮฝgโ1 , ฮปโ1 ฮฝฬฯ(g)โ1 bq)
= (papโ1 , ฯ(ฮปโ1 ฮฝg โ1 )bq) = (papโ1 , ฯ(p)โ1 bq) = (papโ1 , pbq).
We have,
Proposition 3.3. Let A = J(B, ฯ, u, ยต) be an Albert algebra and S := (B, ฯ)+ โ A and
K = Z(B), a quadratic eฬtale extension of k. Then any automorphism of A stabilizing S is
of the form (a, b) 7โ (papโ1 , pbq) for p โ U (B, ฯ) and q โ U (B, ฯu ) with NB (p)NB (q) = 1.
We have
Aut(A, (B, ฯ)+ ) โผ
= [U (B, ฯ) ร U (B, ฯu )]det /K (1) ,
where
[U (B, ฯ) ร U (B, ฯu )]det := {(p, q) โ U (B, ฯ) ร U (B, ฯu )|NB (p) = NB (q)},
and K (1) denotes the group of norm 1 elements in K, embedded diagonally.
Proof. Let ฯ โ Aut(A, S) and let ฮท := ฯ|S โ Aut(S). Then ฮท(a) = gag โ1 for some g โ
Sim(B, ฯ). Let ฮป := gฯ(g) โ kโ and ฮฝ := NB (g) โ K โ . We extend ฮท to an automorphism ฮทe
of A by the formula
ฮทe(a, b) = (papโ1 , pbq โฒ ),
12
Maneesh Thakur
where p = ฮปฮฝ โ1 g and q โฒ โ U (B, ฯu ) is arbitrary with NB (q โฒ )NB (p) = 1. Then p โ U (B, ฯ)
as discussed above and the automorphism ฮทeโ1 ฯ of A fixes S = (B, ฯ)+ pointwise. Hence, by
([21], 39.16),
ฮทeโ1 ฯ(a, b) = (a, bq โฒโฒ )
for some q โฒโฒ โ SU (B, ฯu ). Therefore we get
ฯ(a, b) = ฮทe(a, bq โฒโฒ ) = (papโ1 , pbq โฒโฒ q โฒ ).
We set q = q โฒโฒ q โฒ โ U (B, ฯu ) and the proof of the first assertion is complete. Now, if q โ
U (B, ฯu ) is arbitrary, with NB (q) = ฮฝ โ K โ . Then ฮฝฮฝ = 1. Hence, by Lemma 3.1, there
exists p โ U (B, ฯ) with NB (p) = ฮฝ โ1 .
Then, by the computations done before, it follows that (b, x) 7โ (pbpโ1 , pxq) is an automorphism of A stabilizing (B, ฯ)+ . Hence any automorphism ฯ of A which stabilizes (B, ฯ)+
is precisely of the form (b, x) 7โ (pbpโ1 , pxq) for some p โ U (B, ฯ), q โ U (B, ฯu ) with
NB (p)NB (q) = 1.
The map f : [U (B, ฯ) ร U (B, ฯu )]det โ Aut(A, (B, ฯ)+ ) given by (p, q) 7โ [(b, x) 7โ
(pbpโ1 , pxq โ1 )] is a surjective homomorphism with ker(f ) = {(p, p)|p โ K (1) } โผ
= K (1) , inducing the required isomorphism between the two groups.
Corollary 3.2. Let A = J(D, ยต) be a first Tits construction Albert algebra. Then any
automorphism of A stabilizing D+ โ A is of the form
(x, y, z) 7โ (gxg โ1 , gyhโ1 , hzgโ1 ),
where g, h โ D โ and ND (h) = ND (g).
Proof. As before, we identify A = J(D, ยต) with a second Tits construction J(DรD โฆ , วซ, 1, (ยต, ยตโ1 ))
and apply the proposition.
4
Norm similarities and R-triviality
In the last section, we extended automorphisms of a 9-dimensional subalgebra of an Albert
algebra to an automorphism of the Albert algebra. In this section, we analyse norm similarities of an Albert algebra A in the same spirit, study rationality and R-triviality properties
of some subgroups of Str(A).
First we make some simple observations. Since any norm similarity of A fixing the identity
element 1 of A is necessarily an automorphism of A, it follows that for any k-subalgebra
S โ A the subgroup Str(A/S) of all norm similarities that fix S pointwise, is equal to the
subgroup Aut(A/S) of Aut(A), i.e., Str(A/S) =Aut(A/S). Recall that we denote the
(normal) subgroup of Str(A) generated by the U -operators of A, by Instr(A). We will now
prove some results on norm similarities that will be needed in the paper. We begin with
Theorem 4.1. Let A be any Albert algebra. Then Instr(A) โ R(Str(A)(k)).
Proof. Let ฯ โ Instr(A). Then ฯ = Ua Ub Uc ยท ยท ยท with a, b, c, ยท ยท ยท โ A. Let, for t โ A1k , at :=
(1 โ t)a + t โ Ak , similarly bt , ct , ยท ยท ยท be defined. Let ฮธ : A1k โStr(A) be defined by ฮธ(t) =
Uat Ubt Uct ยท ยท ยท Then ฮธ is a rational map defined over k, with domain the (open) subset of A1k
consisting of t such that at , bt , ct , ยท ยท ยท are invertible elements of Akฬ . Clearly ฮธ is regular and
defined at 0 and 1 and ฮธ(t) โ Str(A) with ฮธ(0) = ฯ, ฮธ(1) = 1. Hence the assertion is
proved.
R-triviality
13
The theorem below is a generalization of Corollary 4.2 of ([44]) over a field k of arbitrary
characteristic :
Theorem 4.2. Let A be an Albert division algebra over k and ฯ โ Aut(A) an automorphism
of A. Then ฯ fixes a cubic subfield of A pointwise.
Proof. Let Aฯ denote the subalgebra of fixed points of ฯ. In light of the fact that proper
subalgebras of an Albert division algebras are of dimension 1, 3 or 9, and that Dimk (Aฯ ) is
invariant under base change, we may work with Ak . Since the eigenvalues of ฯ are the same
as the eigenvalues of its semisimple part, we may further assume ฯ is semisimple. Let T be
a maximal torus containing ฯ. By (Theorem 3, [9]), the group of all automorphisms of Ak
fixing a primitive idempotent is isomorphic to Spin(9). We can conjugate T to a maximal
torus in Spin(9) (over k) to conclude that T fixes a vector w, w โ
/ k. Hence ฯ fixes some
v โ A, v โ
/ k. Then v generates a cubic subfield L of A and ฯ fixes L pointwise.
The following theorem is a generalization of Theorem 5.3 of ([44]) to arbitrary characteristics
:
Theorem 4.3. Let A be a first Tits construction Albert division algebra over k. Let ฯ โ
Aut(A) be such that ฯ fixes a cubic cyclic subfield of A pointwise. Then ฯ is a product of two
automorphisms, each stabilizing a 9-dimensional subalgebra of A.
Proof. The proof goes along the exact lines of the proof given in ([44]), except that we use
Theorem 4.2 above in place of (Corollary 4.2, [44]).
We have the following corollary to the above, with proof exactly as in ([44], Cor. 5.1), we
will use this in the paper for k of arbitrary characteristics:
Corollary 4.1. Let A be a first Tits construction Albert division algebra over k and ฯ โ
Aut(A) be such that ฯ(L) = L for a cubic cyclic subfield L โ A. Then ฯ is a product of three
automorphisms of A, each stabilizing a 9-dimensional subalgebra of A.
The following result is a generalization of Theorem 5.10 of ([44]), for arbitrary characteristics
:
Theorem 4.4. Let A be an Albert division algebra arising from the first Tits construction.
Let L โ A be a cubic cyclic subfield. Then Str(A, L) โ C.Instr(A).H, where H denotes the
subgroup of Aut(A) generated by automorphisms stabilizing 9-dimensional subalgebras of A
and C is the group of all scalar homotheties in Str(A) .
Proof. The proof goes along the exact lines of the proof of Thm 5.10 in ([44]), except that
we use Corollary 4.1 above instead of (Cor.5.1, [44]).
Extending norm similarities : Let A be an Albert (division) algebra and S a 9-dimensional
subalgebra of A. Given an element ฯ โ Str(S), we wish to extend it to an element of Str(A).
Though this can be achieved using a recent result of Garibaldi-Petersson ([15], Prop. 7.2.4),
we need certain explicit extension for the purpose of proving R-triviality of the algebraic
groups described in the introduction, which we now proceed to describe.
We have S โผ
= (B, ฯ)+ for a suitable degree 3 central division algebra B over a quadratic
extension K of k with an involution ฯ of the second kind. Therefore we have A โผ
= J(B, ฯ, u, ยต)
for suitable parameters. For our purpose, by conjugating with a suitable automprphism of
14
Maneesh Thakur
A, we may assume S = (B, ฯ)+ , A = J(B, ฯ, u, ยต) and ฯ โ Str((B, ฯ)+ ). Let b0 = ฯ(1) and
ฮป = NB (b0 ). By ([17], Chap.V, Thm. 5.12.10), Str((B, ฯ)+ ) consists of the maps
x 7โ ฮปaxฯ(a), x โ (B, ฯ)+ , a โ B โ , ฮป โ kโ .
Hence there exists ฮณ โ kโ and g โ B โ such that
ฯ(x) = ฮณgxฯ(g), โx โ S.
Let ฮฝ := NB (g) โ K = Z(B) and let
ฮด = NB (ฯu (g)โ1 g) = NB (g)
โ1
NB (g) = ฮฝฬ โ1 ฮฝ,
where ฯu = Int(u) โฆ ฯ. Then ฮดฮดฬ = 1. By Lemma 3.1, there exists q โ U (B, ฯu ) such that
ฮด = NB (q). Define ฯe : A โ A by setting
e
ฯ((b,
x)) = ฮณ(gbฯ(g), ฯ(g)# xq).
(โ)
e
Clearly ฯ((b,
0)) = (ฯ(b), 0). Hence ฯe is an extension of ฯ to A and is clearly a k-linear
bijective endomorphism of A. We now compute
e
N (ฯ((b,
x))) = ฮณ 3 N ((gbฯ(g), ฯ(g)# xq))
2
= ฮณ 3 [NB (g)NB (g)NB (b) + TK (ยตNB (g) NB (x)NB (q))
โTB (gbฯ(b)ฯ(g)# xquฯ(q)ฯ(x)g # )].
โ1
Now substituting N (q) = NB (g) NB (g), ฮฝ = NB (g) = gg # and qu = uฯ(q)โ1 using
qฯu (q) = 1 = quฯ(q)uโ1 in the RHS of the above equation and simplifying, we get
e
N (ฯ((b,
x))) = ฮณ 3 ฮฝ ฮฝฬN ((b, x)).
Therefore ฯe โ Str(A, S). We have proved
Theorem 4.5. Let A be an Albert division algebra over k and S โ A be a 9-dimensional
subalgebra. Then every element ฯ โ Str(S) admits an extension ฯe โ Str(A). Let S =
(B, ฯ)+ and A = J(B, ฯ, u, ยต) for suitable parameters. Let ฯ โ Str(S) be given by b 7โ
ฮณgbฯ(g) for b โ (B, ฯ)+ , g โ B โ and ฮณ โ kโ . Then for any q โ U (B, ฯu ) with NB (q) =
NB (ฯ(g)โ1 g), the map ฯe given by
e
ฯ((b,
x)) = ฮณ(gbฯ(g), ฯ(g)# xq),
is a norm similarity of A extending ฯ.
Corollary 4.2. Let A = J(D, ยต) be a first construction Albert algebra. Let ฯ โ Str(D+ ) be
given by x 7โ ฮณaxb for ฮณ โ kโ and a, b โ D โ . Then the map ฯe : A โ A given by
(x, y, z) 7โ ฮณ(axb, b# yc, cโ1 za# ),
where b, c โ D โ are such that ND (a) = ND (b)ND (c), is a norm similarity of A extending ฯ.
15
R-triviality
Now, let ฮท โ Str(A, S) be arbitrary and let ฯ := ฮท|S. We extend ฯ to an element ฯe โ Str(A)
according to (โ). Then we have
ฯeโ1 โฆ ฮท โ Str(A/S) = Aut(A/S) โผ
= SU (B, ฯu ).
Hence there exists q โฒ โ SU (B, ฯu ) such that
ฯeโ1 โฆ ฮท((b, x)) = (b, xq โฒ ) โb โ (B, ฯ)+ , x โ B.
Write ฮธqโฒ for the automorphism (b, x) 7โ (b, xq โฒ ). Then ฮท = ฯe โฆ ฮธqโฒ . Also, since ฮท((B, ฯ)+ ) =
(B, ฯ)+ , there exists ฮณ โ kโ and g โ B โ , such that
ฮท((b, 0)) = ฮณ(gbฯ(g), 0) โb โ (B, ฯ)+ .
Therefore, we have
ฮท((b, x)) = ฮณ(gbฯ(g), ฯ(g)# xq0 )
for all (b, x) โ A and some q0 โ U (B, ฯu ) with N (q0 ) = NB (ฯ(g)โ1 g). We have therefore
associated a triple (ฮณ, (g, q0 )) โ kโ ร B โ ร U (B, ฯu ) to ฮท โ Str(A, S) with ฮณ โ kโ and g โ B โ
arbtrary and q0 โ U (B, ฯu ) with NB (q0 ) = NB (ฯ(g)โ1 g).
Conversely, for any triple (ฮณ, (g, q0 )) โ kโ ร B โ ร U (B, ฯu ) with ฮณ โ kโ , g โ B โ arbitrary
and q0 โ U (B, ฯu ) such that NB (q0 ) = NB (ฯ(g)โ1 g), we define ฮท : A โ A by the formula (โ)
:
ฮท((b, x)) = ฮณ(gbฯ(g), ฯ(g)# xq0 ).
By a straight forward calculation exactly as above, it follows that
N (ฮท((b, x))) = ฮณ 3 ฮฝ ฮฝฬN ((b, x)).
Therefore ฮท โ Str(A, S). Hence we have proved
Theorem 4.6. Let A = J(B, ฯ, u, ยต) be an Albert division algebra, written as a second
Tits construction and S = (B, ฯ)+ . The group Str(A, S) consists of the maps (b, x) 7โ
ฮณ(gbฯ(b), ฯ(g)# xq) where ฮณ โ kโ , g โ B โ are arbitrary and q โ U (B, ฯu ) satisfies NB (q) =
NB (ฯ(g)โ1 g). We have,
โ
โผ k ร H0 ,
Str(A, (B, ฯ)+ ) =
Kโ
where H0 = {(g, q) โ B โ ร U (B, ฯu )|NB (q)NB (ฯ(g)โ1 g) = 1} and K โ ึโ kโ ร H0 via
ฮฑ 7โ (NK (ฮฑ)โ1 , ฮฑ, ฮฑโ1 ฮฑ).
Proof. Only the last assertion needs to be proved. Let
H0 = {(g, q) โ B โ ร U (B, ฯu )|NB (q)NB (ฯ(g)โ1 g) = 1}.
We define f : kโ ร H0 โ Str(A, (B, ฯ)+ ) by
(ฮณ, (g, q)) 7โ [(b, x) 7โ ฮณ.(gbฯ(g), ฯ(g)# xq โ1 )].
Then, by our calculations before, f is a surjective homomorphism. We compute ker(f ). Let
(ฮณ, (g, q)) โ Ker(f ). Then
ฮณ(gbฯ(g), ฯ(g)# xq โ1 ) = (b, x) โb โ (B, ฯ)+ , x โ B.
(โโ)
16
Maneesh Thakur
Taking b = 1, x = 1 in the above relation gives
ฮณgฯ(g) = 1, ฮณฯ(g)# q โ1 = 1.
(โ โ โ)
Now gฯ(g) = ฮณ โ1 gives NB (g)NB (g) = ฮณ โ3 and ฯ(g)# = ฮณ โ2 (g# )โ1 . Also gg # = NB (g)
gives (g# )โ1 = NB (g)โ1 g. Therefore, we get from the above equation
ฮณฯ(g)# = ฮณ(ฮณ โ2 (g# )โ1 ) = ฮณ โ1 NB (g)โ1 g = q,
and thus g = ฮณNB (g)q and ฯ(g)# = ฮณ โ1 q. Substituting this in (โโ) we get
ฮณ(ฮณNB (g)qbฯ(q)NB (g)ฮณ, ฮณ โ1 qxq โ1 ) = (b, x) โb โ (B, ฯ)+ , x โ B.
This gives, using NB (g)NB (g) = ฮณ โ3 ,
(qbq โ1 , qxq โ1 ) = (b, x) โb โ (B, ฯ)+ , x โ B.
Hence q โ K โ โฉ U (B, ฯu ) = K (1) . Thus g = ฮณNB (g)q โ K โ and, by (โ โ โ), NK (g) = gฯ(g) =
ฮณ โ1 . Therefore,
q = ฮณ โ1 NB (g)โ1 g = ฮณ โ1 g โ3 g = ฮณ โ1 g โ2 = ฯ(g)ggโ2 = ฯ(g)g โ1 .
Hence (ฮณ, g, q) = (NK (g)โ1 , g, ฯ(g)gโ1 ). This shows
ker(f ) = {(NK (ฮฑ)โ1 , ฮฑ, ฮฑโ1 ฮฑ)|ฮฑ โ K โ },
and the proof is complete.
Corollary 4.3. Let A = J(D, ยต) be a first construction Albert algebra. Then the group
Str(A, D+ ) consists of the maps
(x, y, z) 7โ ฮณ(axb, b# yc, cโ1 za# ),
where a, b, c โ D โ , ฮณ โ kโ and ND (a) = ND (b)ND (c).
5
R-triviality results
In this section, we proceed to develop our results on R-triviality of various groups and also
prove our main theorem. We need a version of a theorem of Yanchevskii ([21], 17.25) for
degree 3 division algebras in arbitrary characteristics, which we prove now:
Proposition 5.1. Let (B, ฯ) be a degree 3 central division algebra over its center K, a
quadratic eฬtale extension of k, with ฯ an involution of the second kind. Then every nonzero
element g โ B admits a factorization g = zs with s โ (B, ฯ)+ and z โ B โ is such that
zฯ(z) = ฯ(z)z.
Proof. We may assume characteristic of k is 2, the proof when characteristic is not 2 is
as in ([21], 17.25). Then (B, ฯ)+ = Sym(B, ฯ) = Skew(B, ฯ) and Dimk (Sym(B, ฯ)) = 9.
Since ฯ restricts to the nontrivial k-automorphism of K, K 6โ Sym(B, ฯ). Hence Dimk (K +
Sym(B, ฯ)) = 10. Also g โ B โ , hence
Dimk (g.Sym(B, ฯ)) = Dimk (Sym(B, ฯ)) = 9.
17
R-triviality
Hence g.Sym(B, ฯ) โฉ (K + Sym(B, ฯ)) 6= 0. Thus we can find s0 โ Sym(B, ฯ) โ {0}, ฮป โ K
and z0 โ Sym(B, ฯ) such that gs0 = ฮป + z0 . Let z := ฮป + z0 . Then z โ B โ and
zฯ(z) = (ฮป + z0 )(ฯ(ฮป) + z0 ) = (ฯ(ฮป) + z0 )(ฮป + z0 ) = ฯ(z)z.
Moreover, g.s0 = z implies g = z.(s0 )โ1 . Hence we have the required factorization g = zs for
s = sโ1
0 .
We now have
Theorem 5.1. Let A be an Albert (division) algebra. Let S โ A be a 9-dimensional subalgebra. Then, with the notations as above, Str(A, S) is R-trivial.
Proof. Let ฯ โ Str(A, S). Since Dim(S) = 9, S โผ
= (B, ฯ)+ for a suitable degree 3 central
simple algebra over a quadratic eฬtale extension K of k, with an involution ฯ of the second
kind. Conjugating by a suitable automorphism of A, we may assume S = (B, ฯ)+ and
A = J(B, ฯ, u, ยต) for suitable parameters. Let
H0 = {(g, q) โ B โ ร U (B, ฯu )|NB (ฯ(g)โ1 g) = NB (q)}.
Clearly H0 is a subgroup of B โ รU (B, ฯu ). Then, by Theorem 4.6, ฯ((b, x)) = ฮณ(gbฯ(g), ฯ(g)# xq)
for ฮณ โ kโ and (g, q) โ H0 . By Proposition 5.1, we can write g = zs with s, z โ B โ satisfying
โ1
ฯu (z)z = zฯu (z), ฯu (s) = s. Then, since NB (ฯ(s)โ1 s) = NB (s) NB (s) = 1, it follows that
(s, 1) โ H0 .
Since the scalar homotheties in Str(A, S) constitute a 1 dimensional k-split torus, by ([52],
ยง16, Prop. 2, 16.2, Prop. 3), scalar multiplications over k are in R(Str(A, S)(k)).
Hence we may assume ฯ((b, x)) = (gbฯ(g), ฯ(g)# xq). Now, using g = zs as above (with
ฯu (s) = s, ฯu (z)z = zฯu (z)) and that (s, 1) โ H0 , writing ฮธ for the norm similarity
(b, x) 7โ (sbฯ(s), ฯ(s)# x), we have ฯ = ฯ โฒ โฆ ฮธ, where ฯ โฒ โ Str(A, S) with ฯ โฒ ((b, x)) :=
(zbฯ(z), ฯ(z)# xq), ฯu (z)z = zฯu (z) and (z, q) โ H0 .
Claim : ฮธ โ R(Str(A, S)(k)). To see this, define st := (1 โ t)s + t โ Bk and let ฮป : A1k โ
Str(A, S) be defined by
ฮป(t)((b, x)) = (st bฯ(st ), ฯ(st )# x), (b, x) โ Ak = J(Bk , ฯ, u, ยต) = (Bk , ฯ)+ โ Bk .
Then ฮป is a rational map, defined over k, regular at 0 and 1 and ฮป(0) = ฮธ, ฮป(1) = 1 in
Str(A, S). This settles the claim.
Hence it only remains to show that ฯ โฒ โ R(Str(A, S)(k)). For this, observe that p :=
ฯu (z)โ1 z โ U (B, ฯu ) since zฯu (z) = ฯu (z)z. We have,
NB (p) = NB (z)
โ1
โ1
NB (z) = NB (gsโ1 )
NB (gsโ1 ) = NB (ฯ(g)โ1 g) = NB (q).
Hence q = pq โฒ for some q โฒ โ SU (B, ฯu ). We therefore have (z, q) = (z, pq โฒ ) โ H0 for some
q โฒ โ SU (B, ฯu ).
Hence (z, q) = (z, p)(1, q โฒ ) and (1, q โฒ ) โ H0 . Also SU(B, ฯu ) โ Str(A, S) via ฮท 7โ [(b, x) 7โ
(b, xฮท)], ฮท โ SU(B, ฯu ). By ([6]), SU(B, ฯu ) is rational, hence R-trivial. Hence the automorphism ฯ0โฒ : (b, x) 7โ (b, xq โฒ ) belongs to R(Str(A, S)(k)).
Let ฯ0 โ Str(A, S) be defined by ฯ0 (b, x) := (zbฯ(z), ฯ(z)# xp). Then ฯ โฒ = ฯ0โฒ โฆ ฯ0 .
Claim : ฯ0 โ R(Str(A, S)(k)). To see this, define zt = (1 โ t)z + t โ Bk . Then ฯu (zt )zt =
zt ฯu (zt ). Let qt = ฯu (zt )โ1 zt whenever zt โ Bkโ . Then qt โ U(B, ฯu ) and the map
f : A1k โ Str(A, S), f (t)((b, x)) = (zt bฯ(zt ), ฯ(zt )# xqt )
18
Maneesh Thakur
is defined on an open subset of A1k , is a rational map and f (t) โ Str(A, S) corresponds to
(zt , qt ) โ H0 . In particular, f (0) corresponds to the pair (z0 , q0 ) = (z, p), hence f (0) = ฯ0 .
Now f (1) corresponds to (z1 , q1 ) = (1, q1 ) โ H0 . But q1 = ฯu (z1 )โ1 z1 = 1 since z1 = 1. Hence
f (1) = 1 โ Str(A, S). This settles the claim and the proof of the theorem is complete.
Corollary 5.1. Let A be an Albert (division) algebra and S a 9-dimensional subalgebra of
A. Then Aut(A, S) โ R(Str(A)(k)).
We now can prove
Theorem 5.2. Let A be a first Tits construction Albert division algebra and L โ A a cubic
cyclic subfield. Then Str(A, L) โ R(Str(A)(k)).
Proof. By Theorem 4.4, Str(A, L) โ C.Instr(A).H. By Theorem 4.1 it follows that C.Instr(A) โ
R(Str(A)(k)), where C is the subgroup of Str(A) consisting of scalar homotheties and H
is the subgroup of Aut(A) generated by all automorphisms stabilizing 9-dimensional subalgebras of A. So it suffices to prove H โ R(Str(A)(k)). Any element of H is a product of
automorphisms, each stabilizing some 9-dimensional subalgebra of A. Let h โ H and write
h = h1 h2 ยท ยท ยท hr with hi โ Aut(A, Si ), Si a 9-dimensional subalgebra of A. But by the above
theorem Aut(A, Si ) โ Str(A, Si ) โ R(Str(A)(k)). Hence h โ R(Str(A)(k)) and the proof is
complete.
Corollary 5.2. Assume that A is a first Tits construction and L โ A a cyclic cubic subfield.
Then Aut(A, L) โ R(Str(A)(k)).
Proof. We have Aut(A, L) โ Str(A, L), hence the result follows from Theorem 5.2.
Theorem 5.3. Let A be an Albert division algebra, arising from the first Tits construction.
Then Aut(A) โ R(Str(A)(k)).
Proof. Fix a cubic cyclic extension E โ A, which is possible by ([29]). Let ฯ โ Aut(A). If
ฯ(E) = E, then ฯ โ Aut(A, E) and by Theorem 5.2, ฯ โ R(Str(A)(k)).
So we may assume F := ฯ(E) 6= E. Let S be the subalgebra of A generated by E and F .
Then (cf. [31], Thm. 1.1), S is 9-dimensional. Hence S = (B, ฯ)+ for a degree 3 central simple
algebra B over a quadratic eฬtale extension K of k, with an involution of the second kind over
K. Hence we may write A = J(B, ฯ, u, ยต) for suitable parameters. If Z(B) = K = k รk, then
we have (B, ฯ)+ = D+ for a degree 3 central division algebra D over k, and A = J(D, ยต0 )
for some ยต0 โ kโ .
Then, by the classical Skolem-Noether theorem, ฯ|E : E โ F extends to an automorphism
of D+ and hence, by Corollary 3.1, to an automorphism ฮธ of A, ฮธ(D+ ) = D+ and ฮธ|E = ฯ|E.
Hence ฯ := ฯโ1 โฆ ฮธ fixes E pointwise. By Corollary 5.2, ฯ โ Aut(A, E) โ R(Str(A)(k)).
Also, ฮธ โ Aut(A, D+ ). Hence by Corollary 5.1, ฮธ โ Aut(A, D+ ) โ R(Str(A)(k)). It follows
that ฯ โ R(Str(A)(k)).
So now we assume K is a field. First extend ฯ|E to ฯโฒ : EK โ F K โ B to a K-linear
isomorphism. By Skolem-Noether theorem, there exists g โ B โ such that ฯโฒ = Int(g) :
EK โ F K. Since ฯ(E) = F , it follows that Int(g)(E) = F = ฯ(E) โ (B, ฯ)+ . Therefore
ฯ(gxg โ1 ) = gxg โ1 โx โ E.
This yields
ฯ(g)โ1 xฯ(g) = gxg โ1 โx โ E.
19
R-triviality
Hence ฯ(g)g centralizes E and hence EK in B. Since EK is maximal commutative in B, it
follows that ฯ(g)g โ EK. Also ฯ(g)g โ (B, ฯ)+ . Hence ฯ(g)g โ E. Similarly, it follows that
gฯ(g) โ F .
Let e := ฯ(g)g โ E and f := gฯ(g) โ F . Define ฯ โ Str(S) by
ฯ(x) = gxฯ(g), x โ S.
Then for any x โ E we have xe โ E. Hence,
ฯ(x) = gxฯ(g) = gxeg โ1 = ฯ(xe) โ ฯ(E) = F.
Therefore ฯ(E) = F and ฯ(1) = f โ F . Since A is a first Tits construction and F is cyclic,
there is a degree 3 central division algebra D over k, such that F โ D+ โ A (see [28], Cor.
4.5).
By ([44], Lemma 5.1), there exists ฯ โ C.Instr(A) such that ฯ(f ) = 1, ฯ(D+ ) = D+ and
ฯ(F ) = F . Hence ฯ โฆ ฯ(1) = 1.
We extend ฯ to an element ฯe โ Str(A, S) by the formula in Theorem 4.5. Then ฯ โฆ ฯe โ
e
e
Str(A) and ฯ โฆ ฯ(1)
= 1. Hence ฯ โฆ ฯe โ Aut(A) with ฯ โฆ ฯ(E)
= F . Therefore ฯโ1 โฆ ฯ โฆ ฯe โ
โ1
โ1
e
Aut(A) and ฯ โฆ ฯ โฆ ฯ(E) = E. Hence, by Theorem 5.2, ฯ โฆ ฯ โฆ ฯe โ R(Str(A)(k)). Also,
ฯ โ Str(A, D+ ), and ฯe โ Str(A, S). We have already shown in Theorem 5.1 that these are
subgroups of R(Str(A)(k)). It now follows that ฯ โ R(Str(A)(k)).
Lemma 5.1. Let L be a cubic extension of k and ฮป โ kโ. Let S denote the first Tits process
J(L, ฮป) over k. Let a โ Lโ. Define ฯ โ Str(S) by
ฯ = RNL (a) U(0,0,1) U(0,NL (a)โ1 ,0) .
Then ฯ(a) = 1.
Proof. The proof follows from a calculation exactly same as in the proof of (Lemma 5.1,
[44]).
We are now in a position to prove our main result:
Theorem 5.4. Let A be an Albert division algebra arising from the first Tits construction.
Then Str(A) is R-trivial.
Proof. Let ฯ โ Str(A) and a := ฯ(1). If a โ k โ , we have Ra โ R(Str(A)(k)) and Raโ1 โฆ
ฯ(1) = 1. Hence, by Theorem 5.3, Raโ1 โฆ ฯ โ Aut(A) โ R(Str(A)(k)). This implies
ฯ โ R(Str(A)(k)). So we may assume a โ
/ kโ . Then L := k(a) โ A is a cubic separable
subfield and, by ([28], Cor. 4.5), there is ฮป โ kโ such that the Tits process S = J(L, ฮป) โ A.
Define ฯ โ Str(S) by
ฯ = RN (a) U(0,0,1) U(0,N (a)โ1 a,0) .
By the above lemma ฯ(a) = 1. We now extend ฯ to ฯ
e โ Str(A) using (โ). Then ฯ
e(S) = S
and hence by Theorem 5.1, ฯ
e โ R(Str(A)(k)). Also,
ฯ
e โฆ ฯ(1) = ฯ
e(a) = 1.
Hence ฯ
e โฆ ฯ โ Aut(A) โ R(Str(A)(k)) and it follows that ฯ โ R(Str(A)(k)).
Theorem 5.5. Let A be an Albert division algebra arising from the first Tits construction
over a field k. Then Isom(A) is R-trivial.
20
Maneesh Thakur
Proof. Let ฯ โ Isom(A) = Isom(A)(k) โ Str(A) = Isom(A)(k). By Theorem 5.4, Str(A)
is R-trivial. Let ฮธ : A1k โ Str(A) be a rational map connecting ฯ to 1 in Str(A), ฮธ(0) =
ฯ, ฮธ(1) = 1. Let ฯt := ฮธ(t), at := ฯt (1), ฮปt := N (at ). Let ฯt := Rฮปโ1 Uaโ1
Uat ฯt . Then
0
t
ฯt (1) =
โ1
ฮปโ1
t Ua0 Uat ฯt (1)
=
3
ฮปโ1
t Ua0 (at ).
Since
N (a0 ) = N (ฯ0 (1)) = N (ฯ(1)) = 1,
we have
2
3
N (ฯt (1)) = ฮปโ3
t N (a0 ) N (at ) = 1,
It follows that ฯt โ Isom(A). Also, t 7โ ฯt is a rational map A1k โ Isom(A). Now
ฮป0 = N (ฯ0 (1)) = N (ฯ(1)) = 1 as ฯ is a norm isometry. Hence
ฯ0 = Uaโ1
Uฯ(1) ฯ0 = ฯ,
0
and ฯ1 = 1. This proves the assertion.
6
78
Tits-Weiss conjecture and E8,2
In this section, we will prove the Tits-Weiss conjecture for Albert division algebras that
arise from the first Tits construction. Recall that in this paper, we denote by Str(A) the
group Str(A)(k) of k-rational points of the algebraic group Str(A), the full group of norm
similarities of A. We denote by Isom(A) the full group of norm isometries of A and
Isom(A) := Isom(A)(k). By ([39], Thm. 7.3.2) Isom(A) is a connected, simple, simply
connected algebraic group of type E6 defined over k. It follows that Isom(A) is the commutator subgroup of Str(A). Let C denote the subgroup of Str(A) consisting of all scalar
homotheties Ra , a โ kโ .
Tits-Weiss conjecture : Let A be as above, then Str(A) = C.Instr(A).
Str(A)
= {1}. This is equivalent to the KneserEquivalently, the conjecture predicts that C.Instr(A)
78
Tits conjecture for groups of type E8,2 .
78 and G(k)โ
Let G be a simple, simply connected group defined over k, with Tits index E8,2
be the subgroup of G(k) generated by the k-rational points of the unipotent radicals of
G(k)
parabolic k-subgroups of G. The Kneser-Tits conjecture for G predicts that G(k)
โ = {1}.
The (reductive) anisotropic kernel of G is the structure group Str(A) of a uniquely (upto
isotopy) determined Albert division algebra A defined over k (see [46], 3.3.1). It is proved
G(k) โผ
Str(A)
in ([51], 37.41, 42.3.6) that G(k)
โ = C.Instr(A) . Hence, to prove the Tits-Weiss conjecture,
we need to show the first quotient is trivial. By (Thm. 7.2, [13]), it suffices to prove G is
R-trivial. In fact, it suffices to prove W (k, G) = G(k)/G(k)โ โผ
= G(k)/R = {1}.
Let S be a maximal k-split torus in G. By the Bruhat-Tits decomposition for G, it follows
that there is a birational k-isomorphism G โผ
= U ร ZG (S) ร U, where U is the unipotent
radical of a minimal parabolic k-subgroup containing S. It is well known that the underlying
variety of U is rational over k. Hence, by ([52], Prop. 1, ยง16), it follows that
G(k) โผ ZG (S)(k)
.
=
R
R
Again, by ([14], 1.2),
ZG (S)(k) โผ ZG (S)
(k)/R.
=
R
S
21
R-triviality
Hence, to prove the Tits-Weiss conjecture, it suffices to prove that the second quotient above
is trivial. We now proceed to prove this. Note that H := ZG (S) is a connected reductive
k-subgroup of G, is the reductive anisotropic kernel of G and its commutator subgroup Hโฒ
is simple k-anisotropic, strongly inner of type E6 . Hence, by ([46], 3.3), Hโฒ = Isom(A). We
first prove
Lemma 6.1. The connected center of H equals S.
Proof. We know that H is connected reductive and its connected center contains S. We
have H = Hโฒ .Z(H)โฆ , an almost direct product of groups. Since Hโฒ is simple of type E6 ,
Rank(Hโฒ ) = 6. Let T be any maximal k-torus in Hโฒ . The connected center Z(H)โฆ of H is a
torus Sโฒ โ S and Sโฒ โฉ T is finite. Hence T.Sโฒ is a torus in H of dimension 6 + rank(Sโฒ ) and
rank(Sโฒ ) โฅ 2. Therefore
Rank(G) = 8 โฅ 6 + rank(Sโฒ ).
It follows that Sโฒ = S.
In light of this lemma, we have
ZG (S)
Hโฒ S
Hโฒ
(k)/R =
(k)/R โผ
(k)/R.
= โฒ
S
S
H โฉS
It is well known (see Thm. 7.3.2, [39]. Thm. 14.27, [41]) that for an Albert algebra A over
k, Str(A) is a connected reductive group defined over k. We need information on its center:
Lemma 6.2. Let A be an Albert algebra over k. Then the group Str(A) is connected reductive
with center Gm . The commutator [Str(A), Str(A)] = Isom(A) and the sequence
{1} โ Isom(A) โ Str(A) โ Gm โ {1}
is exact, where Str(A) โ Gm maps a norm similarity to its factor of similitude.
Proof. That Str(A) is connected reductive is proved in (3.3.1, [46], [39]). Let ฯ โ Z(Str(A)).
We choose two 9-dimensional degree 3 separable k-subalgebras of A, say S1 and S2 such that
S1 โฉ S2 = k (see [35], Lemma 5.2). Let ฮธi โ Aut(A/Si ) be such that Aฮธi = Si . Then since
ฯ commutes with ฮธi , i = 1, 2, ฯ must stabilize both S1 as well as S2 . Hence ฯ stabilizes
S1 โฉ S2 = k. Thus a := ฯ(1) โ kโ and ฯ = Raโ1 โฆ ฯ โ Aut(A). Hence ฯ โ Z(Aut(A)).
But Aut(A) is a group of type F4 , hence has trivial center. It follows that ฯ = Ra . Hence
Z(Str(A)) = Gm , the k-subgroup of Str(A) consisting of all scalar homotheties Ra , a โ Gm .
The remaining assertions follow from ([39], Thm. 7.3.2) and ([41]. Thm. 14.27).
Now we observe that maximal k-split tori in G are conjugate by G(k) and G โ Str(A) over
k (see [51], 42.6). Hence we may assume that S โ Z(Str(A)). Denote by Z the center of
Str(A). We have
Str(A) = [Str(A), Str(A)].Z = Isom(A).Z.
Since both S and Z are split over k, by ([1], 8.5. Corollary) we have a decomposition S = Z.Sโฒ
of k-tori, with Z โฉ Sโฒ = {1}. Hence, since Hโฒ = [Str(A), Str(A)] = Isom(A), we have
Hโฒ S = Hโฒ Z.Sโฒ = Isom(A)Z.Sโฒ = Str(A).Sโฒ .
Also, since Z โฉ Sโฒ = {1} and Sโฒ โ S = Z(H)โฆ , it follows that Str(A) โฉ Sโฒ = {1}. We therefore
have
ZG (S)
Hโฒ S โผ Str(A) ร Sโฒ โผ Str(A)
=
.
=
=
S
S
Z ร Sโฒ
Z
22
Maneesh Thakur
Finally, by Hilbert Theorem-90, H 1 (k, Z) = {1}. Hence, it follows that
Str(A)
Str(A)(k)
(k) โผ
.
=
Z
Z(k)
We can now state and prove
Theorem 6.1. Let G be a simple, simply connected algebraic group over k with Tits index
78 , whose anisotropic kernel is split by a cubic extension of k. Then G is R-trivial.
E8,2
Proof. Let H denote the reductive anisotropic kernel of G as in the above discussion. Then,
by Corollary 2.1, [H, H] = Isom(A) for an Albert division algebra A over k, arising from a
first Tits construction. We have already shown
G(k)/R โผ
=
Str(A)
Str(A)(k)
(k)/R โผ
/R.
=
Z
Z(k)
Also, by Theorem 5.4, when A is a first Tits construction, Str(A) is R-trivial. Let L be any
field extension of k. If A โk L is split, then G splits over L and hence W (L, G) = {1}. If
Aโk L is division, then the Tits index of G over L does not change and the anisotropic kernel
of G over L corresponds to Str(A โk L). Hence
W (L, G) = G(L)/R =
Str(A)(L)
/R = {1},
Z(L)
the last equality holds because Str(A) is R-trivial : since
Str(A)
Z (L)
=
Str(A)(L)
Z(L) ,
any element
Str(A)
Z (L)
of
is represented by an element of Str(A)(L) and any element of Str(A)(L) can
be joined to the identity element by an L-rational image of A1L , as Str(A) is R-trivial. The
result now follows.
Remark : Note that we have proved above also that Str(A)
Z , the adjoint form of E6 corresponding to a first Tits construction Albert algebra A over a field k is R-trivial.
Corollary 6.1. Tits-Weiss Conjecture : Let A be a first Tits construction Albert division
algebra. Then Str(A) = C.Instr(A).
Proof. This follows immediately from the above theorem and that
G is as in the above theorem.
7
Str(A)
C.Instr(A)
โผ
=
G(k)
R ,
where
78
Groups with index E7,1
78 . The
In this brief section, we wish to explore R-triviality issues for simple groups of type E7,1
reason for considering such groups is that these groups also have their anisotropic kernels as
the structure groups of Albert division algebras and all groups of this type arise this way (see
[46], 3.3.1).
We will consider the groups ฮ with this index whose anisotropic kernel is the structure
group of an Albert division algebra, that is a Tits first construction. These groups were
studied by Max Koecher in ([20]). We use the explicit description of ฮ given by Max Koecher.
Fix an Albert division algebra A over k. Let ฮ(A) be the full group of birational transformations generated by j : Ak โ Ak , j(x) := (โx)โ1 and the translations ta : x 7โ a+x, a, x โ
Ak . Then every element of ฮ(A) has an expression f = w โฆ ta โฆ j โฆ tb โฆ j โฆ tc , a, b, c โ Ak .
23
R-triviality
In particular Str(A) is contained in ฮ(A) and Isom(A) is the anisotropic kernel (up to a
central torus) of ฮ(A). More precisely, let Z denote, as before, the center of Str(A), which is a
Gm defined over k. Let S โ ฮ(A) be a maximal k-split torus containing Z. Then H = Zฮ (S)
is a connected reductive k-subgroup of G, is the reductive anisotropic kernel of ฮ = ฮ(A).
Since k-rank of ฮ is 1, we have S = Z. It follows from this that Z(H)โฆ = Z. We have, as in
the previous section
Zฮ (S)
ฮ(k)/R โผ
(k)/R.
= Zฮ (S)(k)/R โผ
=
S
Now,
H = Zฮ (S) = Hโฒ .Z(H)โฆ = Isom(A).Z = Str(A).
Hence
Zฮ (S)
Str(A)
=
.
S
Z
We have shown in the last section that Str(A)
Z (k)/R = {1}. Hence we have, by arguments
78 ,
quite analougous to the proof of R-triviality of groups with index E8,2
Theorem 7.1. Let ฮ be a simple, simply connected algebraic group over k with Tits index
78 , whose semisimple anistropic kernel is split over a cubic extension of k. Then ฮ is
E7,1
R-trivial.
Reduced Albert algebras : In this mini-section, we wish to explore the group Str(A)
when A is a reduced Albert algebra, mainly the R-triviality of such groups. We recall at this
stage our result from ([44]), which. in fact, holds over fields of arbitrary characteristics :
Theorem 7.2. Let A be a reduced Albert algebra over any field k. Then Str(A) = C.Instr(A),
where C denotes the subgroup of Str(A) of scalar homotheties of A and Instr(A) is the inner
structure group.
Proof. This follows from a result of J. R. Faulkner ([9], Thm. 1, [10]), that for any reduced
Albert algebra A, the group Isom(A) is simple modulo its center. Given ฯ โ Str(A), let
a := ฯ(1) and ฮฑ := N (a). Then ฮฑ 6= 0 and Ua is invertible. We now consider ฯ :=
Rฮฑโ1 Ua ฯ โ Str(A). Then ฯ โ Isom(A). Since Instr(A) is a normal subgroup of Str(A) and
norm similarities of the form Ua1 Ua2 ...Uar โ Isom(A) whenever ฮ N (ai ) = 1, it follows that
(Instr(A) โฉ Isom(A)).Z 6= {1} and hence
(Instr(A) โฉ Isom(A)).Z = Isom(A),
where Z is the center of Isom(A) and consists of scalar homotheties Rc with c โ kโ , c3 = 1.
Therefore ฯ โ C.Instr(A) and hence ฯ โ C.Instr(A). This completes the proof.
We have already shown in ยง4 that Instr(A) โ R(Str(A)(k)). Hence it follows from the
above theorem that Str(A) โ R(Str(A)(k)). This inclusion is independent of the base field,
hence Str(A) is R-trivial. We record this as
Theorem 7.3. Let A be a reduced Albert algebra over a field k. Then Str(A) is R-trivial.
Theorem 7.4. Let A be an Albert algebra arising from the first Tits construction. Then
any norm similarity of A is a product of norm similarities, each stabilizing a 9-dimensional
subalgebra of A.
24
Maneesh Thakur
Proof. First assume A is split. Let ฯ โ Str(A) and ฯ(1) = a. Then, ฯ := RN (a)โ1 โฆ Ua โฆ ฯ โ
Isom(A) and RN (a)โ1 โฆ Ua โ Str(A) stabilizes any subalgebra of A containing a. By a result
of Faulkner cited above, Isom(A) is a simple group modulo its center, which contains scalar
homotheties. Hence Isom(A) is generated by norm isometries which stabilize 9-dimensional
subalgebras and the result follows. Now assume A is a division algebra. As above, we
may assume ฯ โ Isom(A). As in the proof of Theorem 5.4, we reduce to the case when
ฯ โ Aut(A). Again, using the arguments in the proof of Theorem 5.3, we may assume
that ฯ stabilizes a cubic cyclic extension E โ A, i.e. ฯ โ Str(A, E). By Theorem 4.4,
Str(A, E) โ C.Instr(A).H, where C is the subgroup of scalar homoteties on A, Instr(A) is
the subgroup of Str(A) generated by the U -operators of A and H is the subgroup of Aut(A)
generated by automorphisms that stabilize 9-dimensional subalgebras of A. Hence ฯ admits
the required factorization.
Theorem 7.5. Let A be a reduced Albert algebra over a field k. Then Isom(A) is R-trivial.
Proof. Let ฯ โ Isom(A) = Isom(A)(k) โ Str(A). By Theorem 7.3 Str(A) is R-trivial.
Now, by an argument exactly as in the proof of Theorem 5.5, the result follows.
8
Retract rationality
Recall that a an irreducible variety X defined over a field k is retract k-rational if there
exists a non-empty open subset U โ X, defined over k such that the identity map of U factors
through an open subset V of an affine space Am
k , i.e. there exists morphisms f : U โ V and
r : V โ U such that r โฆ f = idU (see 2.2, [13]). The following result is proved in ([13], Prop.
5.4, Thm. 5.9):
Theorem 8.1. Let G be a semisimple, simply connected, absolutely almost simple group,
defined and isotropic over an infinite field k, then the following are equivalent
1. G is W -trivial, i.e. W (F, G) = {1} for all field extensions F/k.
2. G is a retract k-rational variety.
Combining this with our results, we have,
Corollary 8.1. Let G be a simple, simply connected algebraic group defined over a field k
78 or E 78 whose anisotropic kernel splits over a cubic extension of k. Then
with Tits index E8,2
7,1
G is retract k-rational.
Proof. By Corollary 2.1, the anisotropic kernel of G is isomorphic to Isom(A) for a first
Tits construction Albert division algebra A over k. Since if A is a first Tits construction, for
any field extension F of k, A โk F is either split or a division algebra (see [28], Cor. 4.2).
Let AF := A โk F . By Theorem 7.2, Str(AF ) = C.Instr(AF ) when AF is split and by our
result on Tits-Weiss conjecture, Str(AF ) = C.Instr(AF ) also when AF is a division algebra.
Hence, by Theorem 6.1 and Theorem 7.1 we have W (F, G) = {1}. This proves the assertion
on G.
Theorem 8.2. Let A be a reduced Albert algebra over a field k. Then Isom(A) is retract
rational.
R-triviality
25
Proof. Note that when A is a reduced Albert algebra, the algebraic group Isom(A) is simple,
simply connected and k-isotropic. The assertion now follows from the R-triviality of this
group, settled in Theorem 7.5.
Acknowledgement
Part of this work was done when I visited Linus Kramer of the Mathematics Institute, University of Muenster, in March 2016. The stay was supported by the Deutsche Forschungsgemeinschaft through SFB 878. His help is gratefully acknowledged. I thank Richard Weiss and
Tom De Medts for some very useful discussions and suggestions. I have immensely benefitted from discussions with Bernhard Muhlherr, Gopal Prasad and Dipendra Prasad. I thank
Holger Petersson and Otmar Loos for their encouragement and interest in this work.
References
[1] A. Borel, Linear Algebraic Groups, GTM 126, Springer Verlag, New York, 1991.
[2] Lien Boelaert, Tom De Medts, Anastasia Stavrova, Moufang sets and structurable division algebras, Preprint, available on the arXiv: http://arxiv.org/abs/1603.00780.
[3] Chetan Balwe and Anand Sawant, R-equivalence and A1 -connectedness in anisotropic
groups, to appear in IMRN.
[4] V. Chernousov, A. Merkurjev, R-equivalence and Special Unitary Group, J. Algebra,
209 (1998), 175-198.
[5] V. Chernousov, A. Merkurjev, R-equivalence in spinor groups, J. Amer. Math. Soc., 14
(2001), no. 3, 509-534.
[6] Vladimir I. Chernousov and Vladimir P. Platonov, The rationality problem for semisimple group varieties, J. Reine Angew. Math. 504 (1998), 1-28.
[7] J.-L. Colliot-Theฬlene, J.-J. Sansuc, La R-eฬquivalence sur les tores, Ann. Scient. Ec.
Norm. Sup., 4e serie, 10 (1977), 175-230.
[8] V. Chernousov, L. Timoshenko, On the group of R-equivalence classes of semisimple
groups over arithmetic fields, (Russian) Algebra i Analiz 11 (1999), no. 6, 191-221;
translation in St. Petersburg Math. J. 11 (2000), no. 6, 1097-1121.
[9] John R. Faulkner, Octonion planes in characteristic 2, Bull. AMS. 75 (1969), 980-983.
[10] John R. Faulkner, Octonion planes defined by quadratic Jordan algebras, Mem. AMS.,
104, 1970.
[11] Joseph C. Ferrar and Holger P. Petersson, Exceptional simple Jordan algebras and Galois
cohomology, Arch. Math., Vol. 61 (1993), 517-520.
[12] Skip Garibaldi, Kneser-Tits for a rank 1 form of E6 (After Veldkamp), Compositio
Math. 143 (2007), 191-200.
[13] Philippe Gille, Le Probleฬme de Kneser-Tits, Seฬminaire Bourbaki 982 (2007), Asteฬrisque
326 (2009), 39-81.
26
Maneesh Thakur
[14] Philippe Gille, Speฬcialisation de la R-eฬquivalence pour les groupes reฬductifs, Trans. AMS.
356 (2004), 4465-4474.
[15] Skip Garibaldi and Holger P. Petersson, Outer automorphisms of algebraic groups and
a Skolem-Noether theorem for Albert algebras, to appear in Documenta Mathematica.
[16] N. Jacobson, Structure and representations of Jordan algebras, AMS. Providence, R. I.,
1968, AMS. Colloquium Publications, Vol. XXXIX.
[17] N. Jacobson, Finite-dimensional division algebras over fields, Springer Verlag, Berlin,
1996.
[18] N. Jacobson, Some groups of transformations defined by Jordan algebras-I, J. reine
angew. Math. 201 (1959), No. 3/4, 178-195.
[19] N. Jacobson, Some groups of transformations defined by Jordan Algebras. III. Groups of
type E6 , J. reine angew. Math. 207 (1961), 61-85.
[20] Max Koecher, Uber eine Gruppe von rationalen Abbildungen, Invent. Math. 3, (1967)
136-171.
[21] M. A. Knus, A. Merkurjev, M. Rost, J. P. Tignol, The Book of Involutions, AMS.
Colloquium Publications, Vol. 44, 1998.
[22] Ottmar Loos, On algebraic groups defined by Jordan pairs, Nagoya Math. J., Vol. 74
(1979), 23-66.
[23] Yu. I. Manin, Cubic forms, North-Holland, Amsterdam, 1974.
[24] K. McCrimmon, The Freudenthal-Springer-Tits constructions of exceptional Jordan algebras, Trans. AMS. 139 (1969), 495-510.
[25] A. S. Merkurjev, The norm principle for algebraic groups, Algebra i Analiz 7 (1996), no.
2, 243-264.
[26] H. P. Petersson, Structure theorems for Jordan algebras of degree three over fields of
arbitrary characteristic, Comm. Algebra 32 (2004), no. 3, 1019โ1049.
[27] H. P. Petersson, Albert algebras, mini-course, Fields Institute workshop on exeptional algebras and groups, University of Ottawa, 2012. (available on the URL
http://www.fernuni-hagen.de/petersson/vortraege).
[28] H. P. Petersson, M. Racine, Springer forms and the first Tits construction of exceptional
Jordan division algebras, Manuscripta Math. 45 (1984), no. 3, 249-272.
[29] H. P. Petersson, M. Racine, An elementary approach to the Serre-Rost invariant of Albert
algebras, Indag. Mathem., N.S. 7 (1996), no. 3, 343-365.
[30] H. P. Petersson, M. Racine, Albert algebras, Jordan algebras (Oberwolfach, 1992)(W.
Kaup and McCrimmon, eds), de Gruyter, Berlin, 1994, no. 3, 197-207.
[31] H. P. Petersson, M. Racine, Classification of algebras arising from the Tits process, J.
Algebra 98 (1986), no. 1, 244โ279.
R-triviality
27
[32] H. P. Petersson, M. Racine, Jordan algebras of degree 3 and the Tits process, J. Algebra
98 (1986), no.1, 211-243.
[33] V. P. Platonov and A. Rapinchuk, Algebraic groups and number theory, Pure and Applied
Mathematics, Vol. 139, Academic Press Inc., Boston, MA, 1994.
[34] R. Parimala, R. Sridharan, M. L. Thakur, A classification theorem for Albert algebras,
Trans. AMS. 350 (1998), no. 3, 1277-1284.
[35] R. Parimala, R. Sridharan, Maneesh L. Thakur, Titsโ constructions of Jordan algebras
and F4 bundles on the plane, Compositio Math. 119 (1999), 13-40.
[36] R. Parimala, J. P. Tignol, Richard M. Weiss, The Kneser-Tits conjecture for groups with
66 over an arbitrary field, Transform. Groups. 17 (2012), no. 1, 209-231.
Tits-index E8,2
[37] Gopal Prasad, On the Kneser-Tits problem for triality forms, Comment. Math. Helv.
83 (2008), no. 4, 913-925.
[38] Gopal Prasad, M. S. Raghunathan, On the Kneser-Tits problem, Comment. Math. Helv.
60 (1985), no. 1, 107-121.
[39] T. A. Springer and F. D. Veldkamp, Octonions, Jordan Algebras and Exceptional Groups,
Springer Monographs in Mathematics, Springer-Verlag, Berlin, (2000).
[40] T. A. Springer, Linear Algebraic Groups, Second Edition, Progress in Mathematics,
Birkhauser, Boston, 1998.
[41] T. A. Springer, Jordan algebras and algebraic groups, Ergebnisse der Mathematik und
ihrer Grenzgebiete, Band 75, Springer-Verlag, 1973.
[42] Tom De Medts and Hendrik Van Maldeghem, Moufang Generalized Polygons, Topics in
Diagram Geometry, Quaderni di Matematica, Volume 12 (edited by Antonio Pasini),
59-126, Dept. Math., Seconda Univ. Napoli, Caserta, 2003.
[43] Tom De Medts and Yoav Segev, A course on Moufang sets, Innovations in Incidence
Geometry, Vol. 9 (2009), pp. 79-122.
[44] Maneesh Thakur. Automorphisms of Albert algebras and a conjecture of Tits and Weiss,
Trans. AMS. 365 (2013), no. 6., 3041-3068.
[45] J. Tits, Groupes de Whitehead de groupes algeฬbriques simples sur un corps, in Seฬminaire
Bourbaki, Vol. 1976/77, Exp. 505, Lecture Notes in Math., No. 677, Springer, BerlinHeidelberg-New York, 1978, pp. 218-236.
[46] J. Tits, Strongly inner anisotropic forms of simple algebraic groups, Journal of Alg. 131
(1990), 648-677.
[47] J. Tits, Classification of buildings of spherical type and Moufang polygons: A Survey,
Colloquio Internazionale sulle Teorie Combinatorie (Roma, 1973), Tomo I, pp. 229โ246.
Atti dei Convegni Lincei, No. 17, Accad. Naz. Lincei, Rome, 1976.
[48] J. Tits, Classification of algebraic semisimple groups, Algebraic Groups and Discontinuous Subgroups (Proc. Sympos. Pure Math., Boulder, Colo., 1965) (A. Borel and G. D.
Mostow, eds.), Vol. 9, AMS., Providence, R.I., 1966, 33-62.
28
Maneesh Thakur
[49] F. D. Veldkamp, Unitary groups in projective octave planes, Compositio Math. 19 (1968),
213-258.
[50] F. D. Veldkamp, Unitary groups in Hjelmslev-Moufang planes, Math. Z. 108 (1969),
288-312.
[51] J. Tits, R. M. Weiss, Moufang Polygons, Springer Monographs in Mathematics, Springer
Verlag, 2002.
[52] V. E. Voskresenskii, Algebraic Groups and Their Birational Invariants, Translation of
Math. Monographs, Vol 179, AMS, Providence, RI, 1998.
[53] R. M. Weiss, The Structure of Spherical Buildings, Princeton University Press, 2003,
Princeton.
[54] R. M. Weiss, Quadrangular Algebras, Princeton University Press, Mathematical Notes
46, Princeton University Press, 2006, Princeton.
| 4math.GR
|
arXiv:1708.02740v1 [cs.LG] 9 Aug 2017
A Data Prism:
Semi-Verified Learning in the Small-ฮฑ Regime
Michela Meister
[email protected]
Gregory Valiant
[email protected]
August 10, 2017
Abstract
We consider a simple model of unreliable or crowdsourced data where there is an underlying set
of n binary variables, each โevaluatorโ contributes a (possibly unreliable or adversarial) estimate of the
values of some subset of r of the variables, and the learner is given the true value of a constant number
of variables. We show that, provided an ฮฑ-fraction of the evaluators are โgoodโ (either correct, or with
independent noise rate p < 1/2), then the true values of a (1 โ วซ) fraction of the n underlying variables
can be deduced as long as ฮฑ > 1/(2 โ 2p)r . For example, if each โgoodโ worker evaluates a random
set of 10 items and there is no noise in their responses, then accurate recovery is possible provided the
fraction of good evaluators is larger than 1/1024. This result is optimal in that if ฮฑ โค 1/(2 โ 2p)r , the
large dataset can contain no information. This setting can be viewed as an instance of the semi-verified
learning model introduced in [3], which explores the tradeoff between the number of items evaluated by
each worker and the fraction of โgoodโ evaluators. Our results require the number of evaluators to be
extremely large, > nr , although our algorithm runs in linear time, Or,วซ (n), given query access to the
large dataset of evaluations. This setting and results can also be viewed as examining a general class of
semi-adversarial CSPs with a planted assignment.
This extreme parameter regime, where the fraction of reliable data is small (inverse exponential in
the amount of data provided by each source), is relevant to a number of practical settings. For example,
settings where one has a large dataset of customer preferences, with each customer specifying preferences for a small (constant) number of items, and the goal is to ascertain the preferences of a specific
demographic of interest. Our results show that this large dataset (which lacks demographic information)
can be leveraged together with the preferences of the demographic of interest for a constant number
of randomly selected items, to recover an accurate estimate of the entire set of preferences, even if the
fraction of the original dataset contributed by the demographic of interest is inverse exponential in the
number of preferences supplied by each customer. In this sense, our results can be viewed as a โdata
prismโ allowing one to extract the behavior of specific cohorts from a large, mixed, dataset.
1 Introduction
Imagine that you have access to a large dataset of market research. Specifically, the dataset consists of
customer evaluations of products. While the total set of products is large, of size n, each customer is only
asked to evaluate a small (perhaps randomly selected) subset of r = 2, 3, etc. of those products. Long
after the dataset is collected, suppose you wish to identify the preferences of some special demographic of
customersโperhaps the customers who are full-time students. Let ฮฑ denote a lower bound on the fraction
of the surveyed customers that were full-time students, but assume that we do not have this demographic
information in our datasetโall we have is the set of evaluations of each customer. How can we leverage this
dataset to learn anything about the student-demographic?
1
If ฮฑ โช 1/2, this problem seems hopeless because the amount of data contributed by non-students
might swamp the portion of the dataset contributed by the demographic of interest. Nevertheless, the main
result of this paper shows that one could hire some students to evaluate a constant, k, number of (random)
products in the set of size n, and then leverage that constant amount of information together with the large
dataset to return accurate evaluations of the student-demographic preferences on all n items. This claim
will hold provided the number of items evaluated by each of the customers in the dataset, r > log2 (1/ฮฑ).
The guarantees of the algorithm will ensure that, with high probability, at most an วซ-fraction of the returned
evaluations are incorrect (where kโthe number of products evaluated by the hired students, is a function
of วซ that is independent of the total number of items, n). In particular, this strong success guarantee holds
irrespective of the behavior of the non-student demographics in the original datasetโin particular, they could
even be adversarial, provided by a single malicious entity who is trying to disguise the feedback provided
by the student-demographic.
The above setting, where one has a large dataset reflecting a number of demographics, and wishes to
leverage the large dataset in conjunction with a very small set of โverifiedโ datapoints from one demographic
of interest, seems widely applicable beyond the market research domain. Indeed, there are many biological
or health-related datasets where the โdemographic of interestโ might be a trait that is expensive to evaluate.
For example, perhaps one has a large database of medical records, and wishes to investigate the propensity
of certain medical conditions for the subset of people with a specific genetic mutation. The large dataset of
medical records will likely not contain information about whether individuals have the mutation in question.
Nevertheless, our results imply that accurate inferences about this subset of people can likely be made as
long as 1) the fraction of people with the mutation in the large dataset is not minuscule, and 2) one can obtain
a small (i.e. constant) amount of data from individuals with the genetic mutation in question, for example
studying a constant number of individuals who are known to have the mutation.
1.1 Formal Model
We formally model this problem as an instance of the semi-verified learning model proposed by Charikar,
Steinhardt, and Valiant [3]. Suppose there is a set of n Boolean variables, V = {v1 , . . . , vn }, and m
โworkersโ who each provide an evaluation of the values of a randomly selected subset of r of the variables.
Suppose that an ฮฑ-fraction of the workers are โreliableโ and submit evaluations with the property that each
of their r reported values is incorrect independently with probability โค prel . We make no assumptions on
the evaluations submitted by the (1 โ ฮฑ)m unreliable workersโthese evaluations could be biased, arbitrary,
or even adversarially chosen with the goal of confounding the learning algorithm. In addition to this large
dataset, we also receive k โช n, m โverifiedโ data points that consist of the values of a random subset of the
variables of size k. The goal of the learner will be to return assignments to the n variables, such that with
probability at least 1 โ ฮด, at most วซn of these returned assignments differ from their true values.
Previous work [12, 3] focussed on the regime where the number of workers, m = ฮ(n). In contrast, we
will allow m โซ n, and focus on the interplay between the number of variables evaluated by each individual,
r, and the fraction of reliable workers, ฮฑ. Throughout, our positive results hold when the number of verified
data points, k, is a constant that is independent of n, but dependent on วซ, ฮด, and ฮฑ.
1.2 Summary of Results and Connections to Random CSPs
Our main result is the following:
Theorem 1. Fix a failure probability ฮด > 0 and accuracy parameter วซ > 0. Consider a set of n items
that each have a Boolean value, and m reviewers who each evaluate a uniformly random subset of r out
of the n items. Suppose that ฮฑm of the reviewers are โgoodโ in that each of their r reviews is correct
(independently) with probability at least 1 โ p โฅ 1/2. Given sufficiently many reviewers, accurate reviews
2
of at least (1 โ วซ)n items can be inferred given the true values of a constant (independent of n) sized random
1
subset of the variables, provided the fraction of good reviewers satisfies ฮฑ > (2โ2p)
r.
Specifically, given the values of a random, constant-sized subset of the items of size k = Oฬ 1วซ ยท 22r log(1/ฮด) ,
with probability at least 1โฮด one can recover accurate evaluations of at least (1โวซ)n of the items, provided
1
r
ฮฑ > (2โ2p)
r and the number of reviewers m = ฮฬฮฑ,ฮด,วซ (n ).
Additionally, the algorithm runs in time linear in the number of items, n, given the ability to query the
dataset for reviewers who have evaluated a given set of items in constant time. Specifically, the runtime of
the algorithm is Oฮด,วซ,r (n), where the hidden constant hides an exponential dependence on r, and polynomial
dependence on 1/วซ and log(1/ฮด).
The following straightforward observation demonstrates that the above theorem is optimal in the relationship between the fraction of good reviewers, ฮฑ, and the number of items reviewed by each individual, r,
and the error rate of each good reviewer, p:
Observation 1. If each good reviewer incorrectly reviews each item independently with probability p, and
1
the fraction of good reviewers satisfies ฮฑ = (2โ2p)
r where r denotes the number of items evaluated by each
reviewer, then the remaining (1 โ ฮฑ) fraction of reviewers can behave such that for every set of r items, for
a randomly selected reviewer, the distribution of reviews for those items will be uniform over the 2r possible
review vectors. Hence the dataset contains no useful information.
One reason why Theorem 1 is surprising is that this inverse exponential dependence between the number
of reviews per reviewers, r, and the fraction of โgoodโ reviewers, can not be attained via the usual approach
of low-rank matrix approximation that is often applied to this problem of recommendation systems (e.g. [2,
9]). To see why these approaches cannot be applied, note that for any matrix in which all rows have at most
r entries, there is a rank r matrix that exactly agrees with all entries. Intuitively, each of these r factors is
capable of representing a different subset of the reviewers. Still, at best this would result in an algorithm
that is capable of capturing r different groups of reviewers; in other words, it seems extremely unlikely that
such approaches could yield positive results in the setting where the fraction of โgoodโ reviewers was less
than 1/r, in contrast to our results that allow this fraction to be 1/exp(r).
The setting of Theorem 1 can be easily mapped into the language of a constraint satisfaction problem.
Given the evaluations of the reviewers, we build the constraint satisfaction problem by associating a Boolean
variable to each of the n items, and for every set of r variables, we define the set of allowable assignments
to those variables to include any of the 2r review vectors that constitutes more than a 1/2r fraction of the
review vectors for the associated items. (In other words, if at most a 1/2r fraction of the reviewers who
evaluated a given set of r items submitted a vector of reviews ฯ = (ฯ1 , . . . , ฯr ), then ฯ is not an allowable
1
assignment for those variables.) The requirement that ฮฑ > (2โ2p)
r guarantees that, for every set of r items,
irrespective of the behaviors of the (1 โ ฮฑ) fraction of bad reviewers, for a randomly selected reviewer, the
probability that the r reviews are all correct is strictly larger than 1/2r . Additionally, our requirement on the
number of reviewers, m, ensures that with high probability (by elementary concentration bounds) for every
set of r items, there are sufficiently many reviewers assigned to that set of r items, so as to ensure that the
number of accurate ratings (provided by the good reviewers) exceeds a 1/2r fraction of the overall reviews
for that set of r items. Hence, with high probability, we obtain a constraint satisfaction problem such that
for every set of r variables 1) the correct assignment is in the set of allowable assignments, and 2) at least
one of the 2r possible assignments is disallowed.
Given this mapping from the review/evaluation setting to constraint satisfaction problems, Theorem 1
will follow immediately from the following result concerning a class of adversarial constraint satisfaction
problems:
3
Theorem 2. Consider a set of n Boolean variables, and a planted assignment ฯ โ {0, 1}n . Suppose that
for each subset of r variables, t = {v1 , . . . , vr }, there is a subset Ct โ {0, 1}r of assignments such that
|Ct | โค 2r โ 1 and the planted assignment ฯ (restricted to the variables in t) is in set Ct . Given the ability
to query the planted assignment values for a constant number of variables chosen uniformly at random, the
planted assignment can be recovered with up to วซn errors, for any constant วซ > 0.
Specifically, for any วซ, ฮด > 0, after querying the values of
1 2r
ยท 2 log(1/ฮด)
k = Oฬ
วซ
variables, with probability at least 1 โ ฮด we can output an assignment ฯ โฒ โ {0, 1}n that differs from the
planted assignment, ฯ, in at most วซn values. Additionally, the algorithm will run in time Or,วซ,ฮด (n).
There is a simple V C-dimension argument together with a sphere-packing result of Haussler [7] that
yields a tighter information theoretic recovery result, yielding an analog of the above theorem with polynomial (rather than super-exponential) dependence on r.1 Specifically, the number of verified assignments
must be k = O( 1วซ (r log(1/วซ) + log(1/ฮด)). This V C-dimension approach, however, seems to yield an algorithm with runtime at least nr , as opposed to the linear time algorithms of Theorems 1 and 2. For practical
settings, having a linear-time algorithm seems quite important; that said, exploring this problem from an
information theoretic perspective is also worthwhile. One natural question is whether one can achieve a
best-of-both-worlds: a near-linear time algorithm with a polynomial dependence on r. We discuss this
problem more in Section 4.
Proposition 1. As in Theorem 2, consider a set of n Boolean variables, and a planted assignment ฯ โ
{0, 1}n . Suppose that for each subset of r variables, t = {v1 , . . . , vr }, there is a subset Ct โ {0, 1}r of assignments such that |Ct | โค 2r โ1 and the planted assignment ฯ (restricted to the variables in t) is consistent
with Ct . Given the ability to query the planted assignment values for k = O 1วซ (r log(1/วซ) + log(1/ฮด))
random entries, with probability at least 1 โ วซ one can recover an assignment that disagrees with ฯ on at
most วซn values.
Proof. Let S โ {0, 1}n be the set of assignments that are consistent with all of the sets of partial assignments
to the r-tuples specified by the sets Ct . The Vapnik-Chervonenkis (VC) dimension of the set S is at most
r, since, by assumption, for every r-tuple of variables, t = {v1 , . . . , vr }, there are at most |Ct | โค 2r โ 1
possible assignments to those variables. As was shown by Haussler (Theorem 1 in [7]), for any subset S of
n
the Boolean hypercube
with VC dimension at most r, for every วซ > 0 there exists a set T โ {0, 1} of size
2e r
at most e(r + 1) วซ such that for every point x โ S, there exists a point tx โ T that agrees with x on at
least (1 โ วซ)n coordinates.
Let Tวซ/2 denote such a covering set corresponding to the set S, such that every x โ S is distance at most
nวซ/2 from an element of Tวซ/2 . We can use our k = O 1วซ (r log(1/วซ) + log(1/ฮด)) random coordinates of
the vector ฯ โ S to find, with probability at least 1 โ ฮด, a point in Tวซ/2 of distance at most nวซ from ฯ by
simply choosing the element of Tวซ/2 that agrees with the largest fraction of the k random samples. This
follows from 1) leveraging a Chernoff bound to show that out of the k samples, at most a (2/3)วซ fraction
will disagree with the element of Tวซ/2 that has distance วซn/2, and 2) a union bound over |Tวซ/2 | Chernoff
bounds to argue that none of the elements of Tวซ/2 that have distance at least วซn will disagree in fewer than
a (2/3)วซ fraction of indices. Together, this yields that the probability that the element of Tวซ/2 that agrees
with the largest fraction of the k random samples has distance greater than วซn from the true assignment, is
at most |Tวซ/2 |exp(O(โkวซ)) = |Tวซ/2 |(1/วซ)O(r) ฮด, which is at most ฮด for a suitable choice of the constant in
the โOโ term of k = O 1วซ (r log(1/วซ) + log(1/ฮด)) .
1
We thank an anonymous reviewer of an early version of this paper for drawing our attention to this.
4
One implication of the above result is that for any Boolean constraint satisfaction problem for which
1) there exists a satisfying assignment, and 2) for every subset of r variables the constraints forbid at least
one of the 2r possible assignments, it must be the case that there are only a constant number of โวซ-similar
solution clusters,โ where an วซ-similar solution cluster is a set of assignments that differ from each other
in at most วซn locations. Indeed, the number of such clusters will be at most 2k , where k = Oฬ(r/วซ) is as
specified in Theorem 2 and Proposition 1, is a bound on the number of variables whose assigned value must
be queried to achieve a constant probability of failure ฮด < 1. Note that this number of solution clusters is
independent of n.
This structure of the satisfying assignments is slightly surprising given the following two simple examples: the first example illustrates that it is possible for such CSPs to have at least two extremely different
satisfying assignments, and the second illustrates that it is possible for such CSPs to have super-constant
sized solution clustersโclusters of size โฆ(n)โalthough all the assignments in such a cluster are quite similar.
Example 1. Consider the setting where the underlying assignment to all n variables is T , and for every
pair of variables, the set of allowable assignments is {(F, F ), (T, T )}. Based on these constraints, there
are two possible satisfying assignmentsโeither all T or all F . A single โverifiedโ data point is sufficient to
distinguish between these two sets of assignments.
The following example illustrates that, in general, it is impossible to guarantee that the learner will
correctly output the exact assignment, unless the number of verified datapoints k = ฮ(n).
Example 2. Consider the setting where each set of r values has the constraint that precludes the (F, F, . . . , F )
r-tuple. In this case, there is a single solution cluster consisting of all assignments to the n variables such
that at most r โ 1 of the variables are F and the remaining n โ r + 1 are T . In this case, it is impossible
to distinguish between these assignments with any significant probability using fewer than ฮ(n) verified
evaluations.
Despite the above examples, it is still unclear whether the information theoretic bound of Proposition 1
is tight; particularly for small constant วซ, it is not clear the extent to which the number of วซ-separated solution
clusters can grow as วซ decreases.
1.3 Related Work
Motivated by the increasing practical importance of robust estimationโand more generally, robust learning and optimizationโthere has been recent interest in these problems from both an information theoretic
and computational perspective. Recent works tackled this general problem in several basic settings, including robust linear regression [1], and robustly estimating the mean and covariance of natural classes of
distribution, including multivariate Gaussians [4, 10]. The focus of these works was largely on establishing computationally efficiency algorithms for these tasks that approach the information theoretic (minimax)
guarantees achieved by more naive or brute-force algorithms. All three works focussed on the regime in
which a majority of the data is assumed to be โgoodโโdrawn from the distribution or cohort of interest. In
the case of [1], the recovery guarantees require that this fraction of good data satisfies ฮฑ โฅ 64
65 .
The recent works [12] and [3] consider the setting where a minority of the data is โgoodโ (i.e. ฮฑ <
1/2), with the latter paper formally proposing the โsemi-verifiedโ learning model where one may obtain a
small amount of โverifiedโ data that has been drawn from the distribution/cohort in question. The former
paper, [12] considers a similar item evaluation setting to the setting we consider, but focusses on the regime
where the number of evaluators is on the same order as the number of items being evaluated. In this regime,
they show that วซ-accurate recovery is possible provided that the number of items reviewed by each evaluator
is O( วซ41ฮฑ3 ) .
5
In contrast, we consider the regime in which the number of evaluators might be significantly larger
than the number of items, but establish an optimal tradeoff between the fraction of good reviewers and
the number of items evaluated by each reviewer, demonstrating the surprising ability to tolerate a fraction
of good evaluators that is inverse exponential in the number of items evaluated by each evaluator. For
the context of leveraging these techniques as a โprismโ to extract information about specific demographics
from a large, mixed dataset, this small-ฮฑ regime seems especially significant. The techniques of this paper,
via local algorithms and the constraint-satisfaction perspective, also differ significantly from the previous
approaches to robust estimation which rely on more geometric or spectral structure.
The general challenge of developing algorithms and estimators that are robust to corruptions in the input
data dates back to the early work of [13], and has led to a significant body of work on โRobust Statisticsโ,
which explores a number of different models for the data corruptions, and largely focusses on the regime in
which a majority of the data is โgood.โ Much of this work is orthogonal to the objectives of this paper, and
we refer the reader to the surveys of [8] and [6].
2 The Algorithm
In this section we describe a simplified algorithm that obtains the claimed result of Theorem 2 with the
exception of two key properties: as-described, the runtime of this algorithm is O(nr ) rather than Or (n), and
this algorithm will require a number of โverifiedโ samples that is inverse polynomial in the error parameter
วซ, as opposed to the nearly inverse linear dependence specified in the theorem. The algorithm to which
Theorem 2 applies is an extension of this algorithm, and we describe it in Section 3.
The overall structure of the algorithm is to reduce an instance of the problem with non-trivial constraints
on all sets of r variables, to an instance of the problem that has non-trivial constraints on all sets of r โ 1
variables. In general, the true assignment might not satisfy the constraints that we derive on the sets of r โ 1
variables, though we will be able to leverage any such derived constraints that are discovered to be false. We
begin by providing the intuition for the algorithm in the case that r = 2, and then in Section 2.2 describe the
intuition for the reduction from constraints on sets of r variables to constraints on r โ 1-tuples. We formally
describe the general algorithm in Section 3.
2.1 Intuition: Restricting to Pessimistic Constraints
Our algorithm will proceed iteratively, with the goal of each iteration being to inspect at most a constant
number of randomly sampled โverifiedโ variable values, and return accurate guesses for at least a constant
fraction of the variables. The algorithm will then recursively iterate this procedure on the remaining variables
until all but 2วซ n variables have been assigned guesses; assignments to these last โค วซn/2 variables can be
chosen arbitrarily.
To begin, consider the setting where r = 2, and for every pair of variables (x, y) we have a set of
allowable assignments, C(x,y) โ {T, F }2 , with |C(x,y) | โค 3. Each such set provides at least two implications, one of the form x = X =โ y = Y and one of the form y = Y โฒ โ x = X โฒ for some choice
of X, X โฒ , Y, Y โฒ โ {T, F }. For example, if the assignment (T, F ) 6โ C(x,y) , then we have the implications
x = T =โ Y = T and y = F =โ x = F . In other words, there is at least one value of variable x that
would imply the value of variable y, and similarly for y.
Hence, if we fix variable x, and consider the implications derived from the sets C(x,y) as y ranges over
all n โ 1 other variables, there must be an assignment to variable x that would imply the values of at least
n/2 variables. We will refer to this assignment as the โoptimisticโ value of x, as this assignment to x would
immediately yield the values of at least half the remaining variables, and we would be done with the current
iteration of the algorithm, and would then recurse on the remaining variables that have not been assigned
6
values.
The first key idea of our algorithm is that we will assume that all variables take their โpessimisticโ values.
We will then โcheckโ this assumption by revealing the true values of a random sample of O(log(1/ฮด)/วซ)
of these variables. If all of these values are consistent with the โpessimisticโ values, we can conclude that
with probability at least 1 โ ฮด, at least (1 โ วซ)n of the variables actually take their โpessimisticโ values, and
hence we can simply output this assignment. If, however, any of our O(log(1/ฮด)/วซ) random checks fails,
that means that we have found a variable that takes its โoptimisticโ value, and hence that one variable, x,
together with the n โ 1 constraint sets C(x,ยท) that involve it, imply the values of at least n/2 variables. In
either case, our constant (dependent on วซ, ฮด) number of checks has yielded an accurate assignment to at least
half the variables. This simple algorithm in the r = 2 case is summarized in the following pseudo-code:
FindAssigments, r = 2:
Input: Set of n variables, and for every pair (x, y), a set of allowable assignments to those variables C(x,y) โ
{T, F }2 , with |Ct | โค 3. Error parameter วซ > 0 and failure parameter ฮด > 0.
Output: Assignments to each of the n variables.
โข While there exists โฅ วซn/2 variables without assignments
โ Let nโฒ denote the number of remaining variables, and for each of these, determine an โoptimisticโ
assignment that would imply the values of at least nโฒ /2 other variables, and define a variableโs
โpessimisticโ value to be the opposite assignment.
randomly chosen variables and their โverifiedโ assignments. (If
โ Consider a set of 10 log(1/ฮด)
วซ2
of these variables lie in the set of nโฒ > วซn/2 variables in consideration,
fewer than log(1/ฮด)
วซ
output FAIL)
โ If all the verified assignments for variables in the set of nโฒ agree with their pessimistic assignments, then assign these nโฒ variables their pessimistic assignments.
โ Otherwise, we must have found a variable whose verified assignment is its optimistic assignment,
and we can assign the values of at least nโฒ /2 variables accordingly.
2.2 From r-tuples to r โ 1-tuples: Pessimism All The Way Down
Given the algorithm for the r = 2 case, which is successful provided every pair of variables has at least one
forbidden assignment, the question is how to reduce the setting with constraints on sets of r โฅ 3 variables, to
the setting of constraints on sets of r โ 1 variables. The following trivial lemma is the key to this reduction:
Lemma 1. Given an r-tuple and set of at most 2r โ 1 allowable assignments to those r variables, then for
any subset of r โ 1 of those variables, there exists an assignment to those r โ 1 variables that would imply
the value of the rth variable.
Proof. Consider a r โ 1 tuple, t, and an additional variable v, and the set of โค 2r โ 1 allowable assignments
to the r-tuple (t โช v). If the restriction of these assignments to the r โ 1 variables in t contains all 2rโ1
possible assignments, it must be the case that for at least one of these assignments, there is a unique value
that v must assume, otherwise this r-tuple would have all 2r possible assignments. If the restriction of the
2r โ 1 assignments to the r โ 1 tuple do not contain all 2rโ1 assignments, then any such assignment would
(vacuously) imply the value of the rth variable.
The utility of this lemma is that if we have an r โ 1-tuple of variables, t, then by considering all possible
additional variables v 6โ t, there exists an assignment to t that determines the value of at least a 1/2rโ1
7
fraction of the variables not in t. Hence we can designate an โoptimisticโ assignment with the property
that if that assignment holds, then it will imply assignments to at least a 1/2rโ1 fraction of the remaining
variables. We will then assume that this โoptimisticโ assignment is not allowed, thereby reducing the set
of allowable assignments of variables in t to size 2rโ1 โ 1, and proceed inductively. In this sense, at some
intermediate step of this algorithm where we are considering sets of r โฒ < r variables, the allowable sets
of assignments that we are considering may not be completely accurate, as we are not verifying whether
the sets actually do take their โoptimisticโ assignments or not. However, if a r โฒ -tuple of variables actually
takes the values of a forbidden/optimistic assignment, then either it will immediately imply the values of
a constant (i.e. at least 1/2r ) fraction of variables, or it must be a subset of a larger tuple that takes its
โoptimisticโ assignment. Which of these two cases holds can be easily decided via querying the values of a
(constant) number of random variables. We describe the full algorithm in the following section.
2.3 The Basic Algorithm
The high-level structure of the algorithm described in the previous part takes the form of a โdescendingโ
pass followed by an โascendingโ pass. In the descending pass, we iteratively turn constraints on r0 tuples
into constraints on r0 โ 1 tuples, then r0 โ 2 tuples, etc; all the while, we forbid โoptimisticโ assignments to
ensure that in the rth level, each r tuple has at most 2r โ 1 allowable assignments. This descending phase
terminates with r = 1, where we have our โpessimisticโ conjectured assignments to all variables. We then
randomly check a few of these values; if we do not discover any inconsistencies with the conjectured values,
then we can safely conclude that most of the conjectured values are correct.
If we have discovered any inconsistencies, then we begin the ascending phase that investigates and
checks any discovered โoptimisticโ assignments. One minor wrinkle is that we should not trust the > 1/2r
fraction of values that appear to be implied by an optimistic assignment to a set of r < r0 โ1 variables. These
implications might be the result of forbidding an optimistic assignment for some larger tuple. Nevertheless,
if we randomly check some of the implications, then we will either verify the accuracy of these implications,
or have found an optimistic assignment to a r + 1 tuple. In this sense, the ascending phase will either
terminate upon satisfactorily verifying a significant (constant sized) subset of the set of output assignments,
or we will have found an โoptimisticโ assignment to a r0 โ 1 tuple, and the implications of r0 โ 1 tuples are
based directly on the given set of constraints to r0 -tuples, which are valid by assumption. Hence each phase
of the algorithm will return assignments to a constant (at least 1/2r0 ) fraction of the variables.
FindAssigments:
Input: Set of n variables, integer r0 , and for every tuple t โ [n]r0 of r0 distinct variables, a set of allowable
assignments to those variables Ct โ {T, F }r0 , with |Ct | โค 2r0 โ 1. Error parameter วซ > 0 and failure
parameter ฮด > 0.
Output: Assignments to at least (1 โ 2วซ )n variables.
โข While there exists โฅ วซn/2 variables without assignments, run DESCEND on the set of unassigned
variables and their corresponding sets of allowable assignments.
8
DESCEND:
Input: For each r-tuple, a set C of assignments to those variables, with |C| โค 2r โ 1.
1. If r = 1, AscendAndVerify(set of assigned values to each variable, r = 1).
2. Else, for every r โ 1 tuple, t, we will create a set Ct of โค 2rโ1 โ 1 assignments:
โข Find an โoptimisticโ assignment ฯt that would determine at least a 1/2r fraction of variables not
in t. (The existence of such an assignment is guaranteed by Lemma 1.)
โข Set Ct = {T, F }rโ1 \ ฯt .
3. Run DESCEND on the set of r โ 1-tuples and their corresponding sets of assignments, each of size
2rโ1 โ 1.
ASCEND AND VERIFY:
Input: Proposed assignments ฯv for each variable v โ V for some set V of variables. Integer r indicating the
size of the tuples whose constraints generated the proposed assignments, and assignment ฯt to a r โ 1-tuple
t, such that Ctโชv provided the implication ฯt โ ฯv . Access to sets of allowable assignments corresponding
to all tuples of size r โฒ โ {r, . . . , r0 }. Constant A = 2r0 log(1/ฮด) log(1/วซ))/วซ2 .
1. Randomly sample A verified variable assignments.
2. If all verified variable assignments agree with the proposed assignments, ฯv , then permanently assign
v โ V with their proposed assignments, ฯv .
3. Otherwise, let v denote a variable whose true/verified assignment av 6= ฯv , disagrees with the proposed assignment to v. Hence (ฯt , av ) 6โ Ctโชv so assignment (ฯt , av ) together with the constraints on
the r + 1 tuples must imply at least a 1/2r fraction of variable assignments. Denote these assignments
by ฯ new .
โข Run AscendAndVerify(ฯ new , r + 1, {t โช v}, (ฯt , av ))
3 An Efficient Algorithm
The linear-time variant of the basic algorithm described in the previous section hinges on two observations.
The first is that for a given r-tuple t, rather than consulting all ฮ(n) constraints Ctโชxi for all xi 6โ t to determine the โoptimisticโ assignment to t, one can determine an assignment that implies at least a 21 21r fraction
of the variable values, with high probability, via sampling a constant (independent of n but dependent on
r, วซ, ฮด) number of such constraints. Note that this sampling does not look at any of the โverifiedโ variable
assignmentsโit just samples which of the constraints to consider. We formalize this ability to efficiently
determine an โoptimisticโ assignment via the following subroutine, and the following lemma characterizing
its performance.
9
FIND OPTIMISTIC ASSIGNMENT:
Input: Set of n variables X, r-tuple t, the ability to query constraints Ctโฒ for |tโฒ | = r0 โฅ r (i.e. the ability to
find optimistic assignments to tuples tโฒ with |tโฒ | = r0 ) and probability of failure ฮณ > 0.
Output: An optimistic assignment ฯt to t that would, with probability at least 1 โ ฮณ, imply the assignments
to at least a 1/2r+1 fraction of other variables via the constraints Ctโชx . We define Ct := {T, F }r \ {ฯt }.
1. If r = r0 then return constraint Ct .
2. Else
โข Select s = 3 ยท 2|t| log(1/ฮณ) variables x1 , . . . , xs uniformly at random from X \ t.
โข For each of these s variables, xi , compute Ctโชxi via a (recursive) call to
F indOptimisticAssignment(X, t โช xi , P robF ailure = ฮณ/(2s)).
โข Define assignment ฯt โ {T, F }r to be the lexicographically first assignment that, via the constraints {Ctโชxi }, imply at least a 1/2r fraction of variables {x1 , . . . , xs }. [Note that such an
assignment exists, since for each xi , |Ctโชxi | โค 2r+1 โ 1 has at least one out of the 2r possible
assignment to t that would imply that value of xi .]
โข Call ฯt the โoptimisticโ assignment to tuple t, and store Ct = {T, F }r \ ฯt .
The following two lemmas quantify the performance of the above algorithm. The first lemma characterizes the probability of failure, and the proof follows immediately from standard Chernoff tail bounds.
Lemma 2. With probability at least 1 โ ฮณ the optimistic assignment ฯt returned by algorithm FindOptimisticAssignment on input X and t has the property that for at least a 1/2|t|+1 fraction of variables x โ X,
the assignment ฯt together with the constraint set Ctโชx that would be computed by the algorithm on input
tuple t โช x, implies the value of variable x.
Proof. Letting p denote the true fraction of variables, x, whose assignments are implied by ฯt and Ctโชx .
Recall that ฯt was chosen based on s independent samples, yielding an empirical estimate pฬ โฅ 1/2|t| , and
โ s
standard tail bounds yield that Pr[pฬ > 2p] โค e 3ยท2|t| , yielding the lemma, since s = 3 ยท 2|t| log(1/ฮณ).
Lemma 3. Given constant-time query access to the constraint sets Ctโฒ for tuples satisfying |tโฒ | = r0 , for
any tuple t, algorithm FindOptimisticAssignment on input t and probability of failure ฮณ > 0 returns Ct and
2
runs in time/queries (2 log(1/ฮณ))O(r0 ) , which is independent of the size of the variable set, |X|.
Proof. Note that computing Ct calls O(2|t| log(1/ฮณ)) computations of Ctโฒ for |tโฒ | = |t| + 1, each called with
error parameter 2|t| smaller. When |t| = r0 , Ct is obtained via a single constant-time query. Expanding this
recursion yields the above lemma.
The second observation that underpins the efficient algorithm is that we do not need to determine the
optimistic assignments and form constraints Ct for all nr r-tuples t. For each phase of the algorithm, which
returns assignments to a constant fraction of the unassigned variablesโat least 1/2r0 โit suffices to find a
single tuple t that takes its โoptimisticโ assignment. Indeed, such a tuple, by definition, takes values that
imply assignments to a constant fraction of the remaining variables. And for each of these variables, x,
whose assignment is implied by the assignment to the tuple t, the value of variable x can be determined
in constant time by consulting the constraint Ctโชx . This observation is clarified in the following algorithm,
which is an adaptation of the Descend/AscendAndVerify algorithm described in the previous section.
Finally, we highlight the fact that the algorithm proceeds iteratively. Given an initial set of variables,
Y , at some intermediate step in the algorithm, we let X denote the set of variables for which we have not
10
yet output an assignment. The algorithm will terminate when |X| โค วซ|Y |/2. The goal of the current step
of the algorithm will be to output assignments to at least a 1/2r0 fraction of variables in X, such that the
|Y |
วซ
fraction of such assignments that are incorrect is bounded by 2 log(2/วซ)
|X| . Given this bound on the fraction
of incorrect
returned at this phase of the algorithm, the total fraction of errors is bounded by
R 1 assignments
วซ
ยท 1t dt = วซ where the first วซ/2 is a bound on the error due to the arbitrary assignments to
วซ/2 + t=วซ/2 2 log(2/วซ)
the last โค วซ|Y |/2 variables. The benefit of having the target accuracy increase as |X| decreases is because
we are given verified samples, drawn uniformly at random from Y . To โcheckโ a proposed assignment to set
X to a target accuracy of ฮณ, we need at least 1/ฮณ verified samples from the set X (ignoring the logarithmic
dependence on the probability of failure). To guarantee that this number of verified samples is obtained from
|Y |
verified samples from Y . Using the above trick of having the desired
set X, we will need to draw โ ฮณ|X|
accuracy degrade as |X| decreases, for each phase of the algorithm, a set of
|Y |/|X|
|Y |
วซ
2 log(2/วซ) |X|
= Oฬ(1/วซ) verified
samples is requiredโas opposed to the ฮ(1/วซ2 ) samples that would have been required if we had fixed the
target error rate to be วซ for all rounds of the algorithm.
EFFICIENT FIND ASSIGNMENTS:
Input: Set of n variables Y , integer r0 and for every r0 -tuple t โ Y , a set of allowable assignments Ct with
|Ct | โค 2r0 โ 1. Error parameter วซ > 0 and probability of failure ฮด.
Output: Set of T /F assignments to each x โ Y .
โข Set T = r0 ยท 2r0 +1 log(2/วซ).
โข While there are at least วซn/2 unassigned variables:
1. Let X โ Y denote the set of unassigned variables.
2. Let วซX =
|Y |
วซ
2 log(2/วซ) |X|
|
denote the target accuracy of this round, and set s = 10 วซX|Y|X|
log(10T /ฮด).
3. Take s verified samples, revealing the planted assignment values for each of these variables. Let
X1 โ X denote the subset of these variables that are in set X, and for each x โ X1 let ax denote
|X|
the verified assignment to variable x. If |X1 | < s 2|Y
| output FAIL.
4. For each x โ X1 , determine Cx via FindOptimisticAssignments with failure parameter ฮณ =
ฮด/T .
5. If, for all x โ X1 , ax = Cx , then for every variable x โ X, compute and output assignment Cx .
6. Otherwise, let x1 โ X1 denote a variable for which ax
EfficientAscend(X, i, x1 , ax1 , s).
11
6=
Cx , and run
EFFICIENT ASCEND:
Input: Set of variables X, integer i โ {1, . . . , r0 โ 1}, tuple t with |t| = i, verified assignments at โ
{T, F }|t| to tuple t, and parameter s.
Output: Output to a subset of variables in set X.
1. If i โฅ r0 output FAIL.
2. Take si = s ยท 2i verified samples, and let Xi+1 denote the intersection of X with this set of variables
with verified assignments, with ax denoting the verified assignment to variable x โ Xi+1 .
3. For each x โ Xi+1 , determine Ctโชx via a call to FindOptimisticAssignment(X, tโชx, F ailureP rob =
โฒ
ฮด/(10T ยท si )), and let Xi+1
โ Xi+1 denote the subset of variables x โ Xi+1 for which the constraint
โฒ | โค s |X| output FAIL.
Ctโชx together with at implies a value ฯx for x. If |Xi+1
i 4ยท2i |Y |
โฒ , it holds that ฯ = a , then for every variable x โ X, compute C
4. If, for all x โ Xi+1
x
x
tโชx and output
assignment ฯx if ฯx is implied by Ctโชx and at .
โฒ
5. Otherwise, let xi+1 โ Xi+1
denote a variable for which Ctโชxi+1 and at implies assignment ฯxi+1 6=
axi+1 . Run EfficientAscend(X, i + 1, t โช xi+1 , (at , axi+1 ), s).
Proposition 2. Algorithm EfficientFindAssignments, when run with error parameter วซ and probability of
failure ฮด, has the following properties:
โข The algorithm will require at most Oฬ 1วซ ยท 22r0 log(1/ฮด) verified samples drawn uniformly at random
from the set of variables, Y .
โข With probability at least 1 โ ฮด, the algorithm will output assignments to each variable x โ Y , such
that at most an วซ fraction of the assignments disagree with the planted assignment.
โข The algorithm runs in time Or0 ,วซ,ฮด (n), where the hidden constant is a function of r0 , วซ, ฮด.
Proof. The high level outline of the execution of algorithm EfficientFindAssignments is that in each step of
the outer WHILE loop, an assignment to at least a 1/2r0 +1 fraction of the remaining unassigned variables,
X, will be output. This continues until |X| โค วซn/2, at which point these remaining variables can be assigned
arbitrary labels and the algorithm terminates. Hence there will be at most O (2r0 log(1/วซ)) iterations of the
while loop. In the iteration conducted on unassigned variable set X โ Y , the goal will be to return assignn
วซ
ments such that the fraction of returned assignments that are incorrect is at most 2 log(2/วซ)
|X| , where |Y | = n
is the total number of initial variables. Provided these accuracy
goals are met at each step of the algorithm,
R1
วซ
the overall fraction of errors will be bounded by วซ/2 + f =วซ/2 f1 ยท 2 log(2/eps)
df = วซ, where the first term is
the errors due to the arbitrary assignment to the remaining โค วซn/2 variables. Additionally,
the number of
verified samples required in each iteration is at most O(r0 s ยท s2r0 ) = Oฬ 2r0 1วซ log(1/ฮด) , hence the total
number of verified samples across the O (2r0 log(1/วซ)) iterations will be bounded by Oฬ(22r0 log(1/ฮด)/วซ),
as claimed.
We now analyze each run of the WHILE loop in EfficientFindAssignments, and the recursive calls to
EfficientAscend. At a high level, in each recursive call to EfficientAscend, either an assignment to at least a
1/2r0 +1 fraction of the remaining unassigned variables is returned via the implications from some (verified)
optimistic assignment to a tuple, t; or, we have found a tuple tโชxi+1 for which we have verified assignments
to all |t| + 1 variables, and for which that assignment, (at , axi+1 ) 6โ Ctโชxi+1 is the optimistic assignment, in
which case the subsequent call to EfficientAscend considers this strictly larger tuple tโฒ = t โช xi+1 .
12
To bound the runtime of the algorithm, note that each run of the algorithm requires constant time (dependent on r0 , วซ, ฮด but independent of the number of variables, |X|, up until the point in the algorithm when
an assignment will be output (Step 4 in EfficientAscend). At this point in the algorithm, at a computational
expense of Or0 ,วซ,ฮด (|X|), an assignment to a constant fraction, at least 1/2r0 +1 of the remaining variables
will be output, and the algorithm will then be repeated on the remaining unassigned variables. Hence, the
overall runtime of the algorithm will be linear in the number of variables.
To bound the probability that a given run of the WHILE loop fails to successfully output an assignY
วซ
ment to at least |X|/2r0 +1 variables that meets the target accuracy of 2 log(2/วซ)
|X| , we will leverage a union
bound over a number of standard Chernoff tail bounds. First, note that the probability that EfficientFindAssignments outputs โFAILโ in Step 3 in a given round of the algorithm is bounded by the probability that
|X1 | โค E[|X1 |/2], where X1 is a sum of i.i.d 0/1 random variables, hence this probability is bounded by
ฮด
, where T, as specified in EfficientFindAssignments is a bound on the number of
exp(โE[|X1 |]/8) โค 10T
calls to EfficientAscend which bounds the number of runs of the WHILE loop. Given that |X1 | โฅ E[|X1 |/2],
the probability that the assignment output in Step 5 of EfficientFindAssignments does not meet the target
Y
วซ
|X1 | โค ฮด .
accuracy, วซX = 2 log(2/วซ)
10T
|X| , is bounded by (1 โ วซX )
The remaining probability of failure stems from the execution of EfficientAscend. In this algorithm,
failure can stem from three different issues: 1) the constant number of constraints Cยท computed via FindOptimisticAssignment prior to Step 4 of EfficientAscend can be erroneous and fail to imply the desired fraction
of assignments. The probability of this is bounded by ฮด/(10T si ), which is sufficient to guarantee that every
optimistic assignment/constraint set Cยท that is computed during the execution of the algorithm is accurate
and implies the desired fraction of assignments, aside from the O(|Y |) constraints computed during the assignment output stepsโStep 4 of EfficientAscend and Step 5 of EfficientFindAssignments. EfficientAscend
will never output FAIL during Step 1, as the constraints corresponding to to i = r0 are the constraints on
r0 -tuples, which are satisfied by assumption. The final potential failure mode of the algorithm is Step 3
of EfficientAscend, if the random set of verified assignments is insufficiently large to verify (to the target
accuracy) a given potential set of assignments implied by an optimistic assignment via Ctโชx . Given that the
assignment at to tuple t is optimistic, as guaranteed by the validity of FindOptimisticAssignments described
above, this probability of failure is also a trivial application of standard Chernoff bounds, guaranteeing that
โฒ | in Step 3 of EfficientAscend deviates from a lower bound on its expectation by
the random variable |Xi+1
at most a factor of 1/2.
A union bound over these probabilities of failure for each of the โค T runs of the EfficientAscend
algorithm yields the desired proposition.
4 Future Work
This work shows that it is possible to tolerate a fraction of โgoodโ data, ฮฑ, that is inverse exponential in
r0 , the sparsity of each datapoint (i.e. the number of evaluations submitted per reviewer), provided the
number of datapoints/reviewers is sufficiently large to ensure that each set of r items has been evaluated by
a significant number of good reviewers. Our algorithm runs in time linear in the number of items to review
(provided the ability to query summary statistics of the set of reviewers who have evaluated a given sets of
items), and uses a constant number of โverifiedโ reviews, which is independent of the total number of items
to review, and depends inverse linearly on the desired error (to logarithmic factors).
One natural question is prompted by the results of [12], which provide efficient algorithms for the regime
where r = poly(1/ฮฑ), but where the number of reviewers is linear in the number of items being reviewed
(and uses a constant, dependent on ฮฑ, วซ, ฮด verified reviews). Is it possible to achieve the best-of-both-worlds:
r = polylog(1/ฮฑ), and a number of reviewers that is linear, or grows significantly more slowly than the nr
that we require, while leveraging a constant number of verified reviews?
13
To this end, our algorithm only ever considers โsingle-hopโ implications of proposed assignments: an
assignment to a set of r variables is considered โoptimisticโ if it directly implies values for a significant
fraction of the other variables. It is easy to imagine extending this definition to also consider longer chains
of implication. Perhaps a specific assignment to r variables would imply values to c1 additional variables,
which in turn would imply values to c2 variables, etc. Indeed, in the basic setting of r = 2, this approach
can be realized to yield an algorithm that only requires constraints on a random subset of size O(n3/2 ), as
opposed to the O(n2 ) constraints assumed in this work.
From a computational perspective, it seems unlikely that such an approach could be pushed to yield an
efficient algorithm for the regime in which fewer than nr/2 sets of r variables have nontrivial constraints.
Indeed, even for random instances of r โ SAT with a planted solution, efficient algorithms below this
threshold have been elusive (see, for example, the recent related work on random CSPs with planted assignments [5, 11]).
From a purely information theoretic perspectiveโthe picture is not entirely clear either. In contrast to
random CSPs, our setting is complicated by the adversarial nature of the constraints that are placed on the
r-tuples. Even for a semi-adversarial setting where tuples are chosen at random, and an adversary chooses
the constraints to place on those random tuples, it is not immediately clear how to analyze the extent to
which implications โpropagateโ. A second difficulty is that the goal of our setting is not just to find a
satisfying assignment, but to find something close to a specific planted assignment. Our results imply, for
the setting we consider, that there are at most a constant number of solution clusters. It seems interesting
to investigate the extent to which this holds for semi-adversarial CSPs with fewer constraints, perhaps with
nr/2 constraints being the threshold between a constant and super-constant number of such clusters.
References
[1] Kush Bhatia, Prateek Jain, and Purushottam Kar. Robust regression via hard thresholding. In Advances
in Neural Information Processing Systems, pages 721โ729, 2015.
[2] Emmanuel J Candes and Yaniv Plan. Matrix completion with noise. Proceedings of the IEEE,
98(6):925โ936, 2010.
[3] M. Charikar, J. Steinhardt, and G. Valiant. Learning from untrusted data. In Symposium on Theory of
Computing (to appear), 2017.
[4] Ilias Diakonikolas, Gautam Kamath, Daniel M Kane, Jerry Li, Ankur Moitra, and Alistair Stewart.
Robust estimators in high dimensions without the computational intractability. In Foundations of
Computer Science (FOCS), 2016 IEEE 57th Annual Symposium on, pages 655โ664. IEEE, 2016.
[5] Vitaly Feldman, Will Perkins, and Santosh Vempala. On the complexity of random satisfiability problems with planted solutions. In Proceedings of the Forty-Seventh Annual ACM on Symposium on
Theory of Computing, pages 77โ86. ACM, 2015.
[6] Frank R Hampel, Elvezio M Ronchetti, Peter J Rousseeuw, and Werner A Stahel. Robust statistics:
the approach based on influence functions, volume 114. John Wiley & Sons, 2011.
[7] David Haussler. Sphere packing numbers for subsets of the boolean n-cube with bounded vapnikchervonenkis dimension. Journal of Combinatorial Theory, Series A, 69(2):217โ232, 1995.
[8] Peter J Huber. Robust statistics. Springer, 2011.
[9] Raghunandan H Keshavan, Andrea Montanari, and Sewoong Oh. Matrix completion from a few entries. IEEE Transactions on Information Theory, 56(6):2980โ2998, 2010.
14
[10] Kevin A Lai, Anup B Rao, and Santosh Vempala. Agnostic estimation of mean and covariance. In
Foundations of Computer Science (FOCS), 2016 IEEE 57th Annual Symposium on, pages 665โ674.
IEEE, 2016.
[11] Prasad Raghavendra, Satish Rao, and Tselil Schramm. Strongly refuting random csps below the spectral threshold. arXiv preprint arXiv:1605.00058, 2016.
[12] Jacob Steinhardt, Gregory Valiant, and Moses Charikar. Avoiding imposters and delinquents: Adversarial crowdsourcing and peer prediction. In Advances in Neural Information Processing Systems,
pages 4439โ4447, 2016.
[13] John W Tukey. A survey of sampling from contaminated distributions. Contributions to probability
and statistics, 2:448โ485, 1960.
15
| 7cs.IT
|
SCUT-FBP5500โก: A Diverse Benchmark Dataset for
Multi-Paradigm Facial Beauty Prediction
AbstractโFacial beauty prediction (FBP) is a significant visual
recognition problem to make assessment of facial attractiveness
that is consistent to human perception. To tackle this problem, various data-driven models, especially state-of-the-art deep
learning techniques, were introduced, and benchmark dataset
become one of the essential elements to achieve FBP. Previous
works have formulated the recognition of facial beauty as a
specific supervised learning problem of classification, regression
or ranking, which indicates that FBP is intrinsically a computation problem with multiple paradigms. However, most of
FBP benchmark datasets were built under specific computation
constrains, which limits the performance and flexibility of the
computational model trained on the dataset. In this paper, we
argue that FBP is a multi-paradigm computation problem, and
propose a new diverse benchmark dataset, called SCUT-FBP5500,
to achieve multi-paradigm facial beauty prediction. The SCUTFBP5500 dataset has totally 5500 frontal faces with diverse
properties (male/female, Asian/Caucasian, ages) and diverse labels (face landmarks, beauty scores within [1, 5], beauty score
distribution), which allows different computational models with
different FBP paradigms, such as appearance-based/shape-based
facial beauty classification/regression model for male/female of
Asian/Caucasian. We evaluated the SCUT-FBP5500 dataset for
FBP using different combinations of feature and predictor,
and various deep learning methods. The results indicates the
improvement of FBP and the potential applications based on the
SCUT-FBP5500.
I. I NTRODUCTION
Assessing facial beauty seems natural for human being,
but an absolute definition of facial beauty remains elusive.
Recently, facial beauty prediction (FBP) have attracted evergrowing interest in the pattern recognition and machining
learning communities [8]โ[10], which aims to achieve automatic human-consistent facial attractiveness assessment by
a computational model. It has application potential in facial
makeup synthesis/recommendation [10]โ[12], content-based
image retrieval [16], aesthetic surgery [10], or face beautification [4]โ[7].
From the computational perspective, FBP is still a challenging problem. It is involved with the formulation of visual
This work was supported in part by the National Natural Science Foundation of China (NSFC) under Grant 61472144 and Grant 61502176; in
part by GDSTP under Grant 2015B010101004, Grant 2015B010130003,
Grant 2015B010131004; in part by the National Key Research & Development
Plan of China under Grant 2016YFB1001405; and in part by Fundamental Research Funds for the Central Universities (No.2017BQ058). *Corresponding
author: Lianwen Jin.
Beau
utyscore
e
arXiv:1801.06345v1 [cs.CV] 19 Jan 2018
Lingyu Liang, Luojun Lin, Lianwen Jin*, Duorui Xie and Mengru Li
South China University of Technology, Guangzhou 510641, China
E-mail:{lianwen.jin, lianglysky}@gmail.com
โก Dataset Download URL: https://github.com/HCIILAB/SCUT-FBP5500-Database-Release
5
4
3
2
1
0
Asia
Female
1
2
3
4
5
Asia
Male
Caucasian
Female
Caucasian
Male
Fig. 1. The images with different facial properties and beauty scores from
the proposed SCUT-FBP5500 benchmark dataset. The dataset download URL
is shown below the title.
representation and predictor for the abstract concept of facial
beauty. To tackle this problem, various data-driven models,
were introduced into FBP. One line of the works follows the
classic pattern recognition process, which constructs the FBP
system using the combination of the hand-crafted features
and the shallow predictors. The related hand-crafted feature
derived from visual recognition includes the geometric features, like the geometric ratios and landmark distances [8],
[15], [19]โ[21], [23], and the texture features, like the Gabor/SIFT-like features [24]โ[26]. Then, a shallow FBP predictoris
trained by the extracted feature in a statistical manner.
Another line of works is advanced by the reviving of neural
networks, especially the stat-of-the-art deep learning [14].
The hierarchial structure of the deep learning model allows
to build an end-to-end FBP system that automatically learns
both the representation and the predictor of facial beauty
simultaneously from the data. Many works indicate that FBP
TABLE I
R EPRESENTATIVE DATABASES FOR FACIAL B EAUTY P REDICTION
Database
Image Num.
Labelers/Image
Beauty Class
Face Property
Face Landmarks
Publicly Available
ร
โ
ร
Y. Eisenthal et al. [15]
184
28 or 18
7
Caucasian Female
F. Chen et al. [22]
23412
unknown
2
Asian Male/Female
H. Gunes et al. [35]
215
46
10
Female
J. Fan et al. [23]
432
30
7
Generated Female
M. Redi et al. [34]
10141
78-549
10
Multiple (Sampled from AVA [16])
SCUT-FBP [1]
500
70
5
Asian Female
SCUT-FBP5500
5500
60
5
Asian/Caucasian; Male/Female
based on deep learning is superior to the shallow predictors
with hand-crafted facial feature [1]โ[3], [29], [30], [33].
Most of current FBP models are data-driven, which makes
benchmark dataset become one of the essential elements
for FBP. There have been many works of the benchmark
datasets [16], [22]โ[24], [30], [33]โ[35] involved with FBP,
but most of these datasets focus on a specific problem with
specific computation constrains, as shown in Table I. Yan
et al. [24] regarded FBP as a ranking problem, and proposed a dataset with low-resolution images gathered from
social networks. Fan et al. [23] focused on the geometry
analysis of FBP and proposed a dataset containing computergenerated faces with different facial proportions. The Northeast China database [22], Shanghai database [21], Hot-Or-Not
database [32], [33], AVA database [16] and re-sampled face
subset of AVA database [34] are large-scale databases involved
with FBP, where the Northeast China [22] and Shanghai
database [21] are limited for geometric facial beauty analysis
without attractiveness ratings; Hot-Or-Not database [32], [33]
only focuses on the appearance-based FBP; and the AVA
database [16], [34] is originally designed for aesthetic analysis
of entire images but not the facial attractiveness. In our previous work, Xie et al. [1] published a SCUT-FBP benchmark
dataset, which has led to many FBP models [1]โ[3], [31],
[37], especially the hierarchial CNN-based FBP models with
the state-of-the-art deep learning [1]โ[3], [37]. Despite the
prevalent usage of the SCUT-FBP, it only contains 500 Asian
Female faces, which may limit the performance of the datademanded model for FBP.
We find that FBP have been formulated the recognition
of facial beauty as a specific supervised learning problem
of classification [15], [20], [27], [30], regression [13], [19],
[23], [29], [38] or ranking [24], [25], [37]. It indicates that
FBP is intrinsically a computation problem with multiple
paradigms. Previous databases built under specific computation constrains would limit the performance and flexibility
of the computational model trained on the dataset, and it is
difficult to compare different models derived from the dataset
with specific computation paradigm. Therefore, this paper
argues that FBP is a multi-paradigm computation problem,
and proposes a new diverse benchmark dataset, called SCUTFBP5500, to achieve multi-paradigm facial beauty prediction.
โ
โ
ร
โ
โ
ร
ร
ร
โ
โ
โ
The SCUT-FBP5500 dataset has totally 5500 frontal faces
with diverse properties (male/female, Asian/Caucasian, ages)
and diverse labels (face landmark, beauty score, beauty score
distribution), which allows different computational model with
different FBP paradigms, such as appearance-based/shapebased facial beauty classification/regression/ranking model for
male/female with Asian/Caucasian. Furthermore, the diverse
faces with beauty scores gathered from 60 different labelers
can lead to many interesting research, such as cross-culture
facial beauty analysis, personalized FBP [36], or automatic
face beautification [4]โ[7]. Both shallow prediction model
with hand-crafted feature and the state-of-the-art deep learning
models were evaluated on the dataset, and the results indicates
the improvement of FBP and the potential applications by the
SCUT-FBP5500.
The main contributions of this paper can be summarized as
following:
1) Dataset. We propose a new large-scale SCUT-FBP5500
benchmark dataset that has totally 5500 frontal faces
with diverse properties and diverse labels, which allows
construction of FBP models with different paradigms.
2) Benchmark Analysis. We analyze the samples, score
labels, labelers and facial landmarks of the SCUTFBP5500 statistically, and the visualization of the data
illustrates the properties of the SCUT-FBP5500.
3) Facial Beauty Prediction Evaluation. Both shallow
prediction model with hand-crafted feature and deep
learning models are trained on the SCUT-FBP5500 for
evaluation, and the results indicates the improvement of
FBP based on the proposed dataset with better diversity.
II. C ONSTRUCTION OF SCUT-FBP5500 DATASET
A. Face Images Collection
The SCUT-FBP5500 Dataset contains 5500 frontal, unoccluded faces aged from 15 to 60 with neutral expression.
It can be divided into four subsets with different races and
gender, including 2000 Asian females, 2000 Asian males,
750 Caucasian females and 750 Caucasian males. Most of
the images of the SCUT-FBP5500 were collected from Internet, where some portions of Asian faces were from the
DataTang [39] and some Caucasian faces were from the 10k
US Adult database [40].
TABLE II
T HE O UTLIER N UMBER AND P ORTION OF B EAUTY S CORES OF
C AUCASIAN FEMALE (CF), C AUCASIAN MALE (CM), A SIAN FEMALE
(AF) AND A SIAN MALE (AM).
Subset
Total Score Num.
Outlier Num.
Outlier Portion
CF
45000
143
0.3%
CM
45000
181
0.4%
AF
120000
356
0.3%
AM
120000
497
0.4%
(a) Score distribution of CF
(b) Score distribution of CM
(c) Score distribution of AF
(d) Score distribution of AM
Fig. 2. Gaussian fitting (yellow curve) and piecewise fitting (red and blue
curve) for the visualization of the beauty score distribution of Caucasian
female (CF), Caucasian male (CM), Asian female (AF) and Asian male (AM).
Fig. 3. Distribution of standard deviations of Caucasian female, Asian female,
Caucasian male and Asian male, respectively.
(a) Box figure of CF
(b) Box figure of AF
(c) Box figure of CM
(d) Box figure of AM
B. Facial Beauty Scores and Facial Landmarks
All the images are labeled with beauty scores ranging from
[1, 5] by totally 60 volunteers aged from 18-27 (average 21.6),
where the beauty score 5 means most attractive and so on.
We developed a web-based GUI system to obtain the facial
beauty scores. The labeling system was deployed on the Ali
Cloud, and the labeling tasks are distributed to each volunteer
in crowdsourcing manners. The four subset, Asian male/female
and Caucasian male/female, are labeled separately, where each
face of the subset are randomly shown to the volunteer. Then,
the volunteer are asked to select the beauty scores within
[1, 5] for the face. To reduce the variance in the labeling
process, about 10% faces recurred randomly. If the correlation
coefficient of the two beauty score of the same faces is less
than 0.7, the volunteer would be asked to rate this face once
more to decide the final score.
To allow geometric analysis of facial beauty, 86 facial
landmarks are located to the significant facial components
of each images, such as eyes, eyebrows, nose and mouth.
A GUI landmarks location system is developed, where the
original location of the landmarks are initialized by the active
shape model (ASM) trained by the SCUT-FBP dataset. Then,
the detected landmarks by ASM are modified manually by
volunteers to ensure the accuracy.
Fig. 4. Box figures of standard deviations of Caucasian female (CF), Asian
female (AF), Caucasian male (CM) and Asian male (AM), respectively.
III. B ENCHMARK A NALYSIS OF THE SCUT-FBP5500
We made benchmark analysis of the beauty scores, labelers
and face landmarks of the SCUT-FBP5500 with different
gender and races, including Asian female (AF), Asian male
(AM), Caucasian female (CF) and Caucasian male (CM).
A. Distribution of Beauty Scores
We visualize the distribution of the beauty scores of AF,
AM, CF and CM, respectively. To obtain better visualization,
we preprocess the data and filter the outliers of the beauty
scores. We regard the average score of all the 60 labelers as
the ground-truth. If the score of specific labeler for the same
face differs from the ground-truth over 2, the score is treated
as outlier and is removed from the distribution visualization.
TABLE III
C ORRELATION C OEFFICIENTS BETWEEN M ALE AND F EMALE L ABELERS
FOR B EAUTY S CORE OF C AUCASIAN FEMALE (CF), C AUCASIAN MALE
(CM), A SIAN FEMALE (AF) AND A SIAN MALE (AM).
Female Labelers
Male Labelers
All Labelers
CF
0.785
0.791
0.788
AF
0.800
0.795
0.785
CM
0.747
0.763
0.743
AM
0.793
0.797
0.782
All Faces
0.785
0.781
0.770
distributions of the original data and the preprocessed data is
mostly similar. Therefore, we visualized the score distribution
of the SCUT-FBP5500 using the preprocessed data for all
the four subset, respectively. Two distribution fitting schemes
are used: one is Gaussian fitting (yellow curve), the other is
piecewise fitting (red and blue curve), as shown in Fig. 2. The
results indicates that the beauty scores of all the four subset
can be approximately fitted by a mixed distribution model with
two Gaussian components.
B. Standard Deviation of Beauty Scores
Female Labeler
Male Labeler
All Labeler
CF
AF
CM
AM
All Faces
We calculate the standard deviation of the scores gathered
from different labelers to the ground-truth, and illustrate the
results as histogram in Fig. 3 and as box figure in Fig. 4. We
observe that the distribution of standard deviations is similar
to Gaussian distribution, and most of the standard deviations
are within a reasonable range of [0.6, 0.7].
C. Correlation of Male/Female Labelers
2nd PC
1st PC
Fig. 5. Correlation Coefficient of male and female labelers for beauty score
of CF, AF, CM, AM and all the faces in SCUT-FBP5500.
In this subsection, we investigate the correlation between the
male and female Asian labelers for the beauty scores, as shown
in Table III and Fig. 5. We observe that the correlation of Asian
faces is persistently larger than Caucasian. It is consistent to
the psychological research that human have better facial beauty
perception for the faces from the same race.
5th PC
4th PC
3rd PC
D. PCA Analysis of Facial Geometry
mean-4*sigma
mean
mean+4*sigma
(a) PCA Analysis of AF
1st PC
โฌแปฯขเฝแปาใแถโขโฑะแค฿เฆฌเฃช
We visualize the 86-points face landmarks of the dataset
using principle component analysis (PCA). Fig. 6 illustrate
the mean and the five first principle component of the facial
geometry of Asian female (AF) and Asian male (AM), where
the landmarks data of Caucasian share similar distribution to
Asian faces. We observe that the face shape is one of the
main component influence the face geometry of beauty, which
is consistent to related psychological research and previous
works in [21], [22]
2nd PC
IV. FBP E VALUATION VIA H AND -C RAFTED F EATURE AND
S HALLOW P REDICTOR
4th PC
3rd PC
This section, we evaluate the SCUT-FBP5500 using the
hand-crafted feature with shallow predictor, while the next
section introduce some state-of-the-art deep learning model
to achieve FBP.
5th PC
A. Geometric Feature with Shallow Predictor
We extract a 18-dimensional ratio feature vector from the
faces and formulate FBP based on different regression mod(b) PCA Analysis of AM
els, such as the linear regression (LR), Gaussian regression
เณ
โฌแปฯขเฝแปาใแถโขโฑะแค฿เฆฌเฃช
Fig. 6. PCA analysis of face landmarks of Asian female (AF) and Asian (GR), and support vector regression (SVR). Comparison were
performed for Caucasian female/male and Asian female/male
male (AM).
subsets, and the performance of different model are measured
using pearson correlation coefficient (PC) [15], maximum abThe number and portion of the outliers in the four subset are solute error (MAE) and root mean square error (RMSE) after
listed in Table II, and the small portion of outlier indicate the 10 folds cross validation. The results are listed in Table IV and
reliability of the labeling process for beauty score.
Table V, which can be regarded as a baseline for the geometric
Since the outlier portion of the beauty score is tiny, the analysis of FBP.
mean-4*sigma
mean
mean+4*sigma
TABLE IV
FACIAL BEAUTY PREDICTION USING GEOMETRIC FEATURE WITH
SHALLOW MODELS FOR SUBSETS OF DIFFERENT RACES AND GENDER
PC
MAE
RMSE
PC
MAE
RMSE
Asian Female
LR
GR
SVR
0.6771
0.7057
0.7008
0.402
0.387
0.3876
0.5246
0.5057
0.5089
Caucasian Female
LR
GR
SVR
0.6809
0.7263
0.7093
0.3986
0.3862
0.4001
0.5239
0.4908
0.5087
Asian Male
LR
GR
SVR
0.6348
0.6923
0.6816
0.3894
0.3572
0.356
0.5085
0.4752
0.4823
Caucasian Male
LR
GR
SVR
0.6063
0.63
0.6397
0.3871
0.3689
0.3617
0.4899
0.4784
0.4739
TABLE V
FACIAL BEAUTY PREDICTION USING G EOMETRIC F EATURE WITH
TABLE VII
C OMPARISON OF A LEX N ET [41], R ES N ET-18 [42] AND
R ES N E X T-50 [43] IN MEASUREMENT OF PC, MAE AND RMSE BY
5- FOLD CROSS VALIDATION
PC
AlexNet
ResNet-18
ResNeXt-50
MAE
AlexNet
ResNet-18
ResNeXt-50
RMSE
AlexNet
ResNet-18
ResNeXt-50
1
0.8667
0.8847
0.8985
1
0.2633
0.248
0.2306
1
0.3408
0.3258
0.3025
2
0.8645
0.8792
0.8932
2
0.2605
0.2459
0.2285
2
0.3449
0.3286
0.3084
3
0.8615
0.8929
0.9016
3
0.2681
0.243
0.226
3
0.3538
0.3184
0.3016
4
0.8678
0.8932
0.899
4
0.2609
0.2383
0.2349
4
0.3438
0.3107
0.3044
5
0.8566
0.9004
0.9064
5
0.2728
0.2383
0.2258
5
0.3576
0.2994
0.2918
Average
0.8634
0.89
0.8997
Average
0.2651
0.2419
0.2291
Average
0.3481
0.3166
0.3017
SHALLOW MODELS FOR THE WHOLE DATASET
Linear Regression
Gaussian Regression
SVR
0.5948
0.4289
0.5531
0.6738
0.3914
0.5085
0.6668
0.3898
0.5132
PC
MAE
RMSE
TABLE VI
FACIAL BEAUTY PREDICTION USING G ABOR FEATURE WITH TWO
SAMPLING SCHEME ON WHOLE DATASET
PC
MAE
RMSE
86-keypoints
GR
SVR
0.7472
0.6691
0.3554
0.3891
0.4599
0.5065
64UniSample
GR
SVR
0.6764
0.8065
0.4014
0.3976
0.5177
0.5126
Fig. 7. Two sampling schemes to extract the appearance feature of FBP,
where the left one is the 86-keypoints method and the right one is the
UniSamplePoint method.
B. Appearance Feature with Shallow Predictor
We extract 40 Gabor feature maps from every original
image in five directions and eight angles. Then, we obtain
the appearance feature of FBP using two different sampling
schemes that extracts some component of the Gabor feature
maps as following:
โข Sample 86-keypoints from each 40 Gabor feature maps
to obtain a 3340-dimensional feature vector, as shown in
the right sub-figure of Fig. 7;
โข Use 64UniSample to obtain a 2560-dimensional feature
vector, as shown in the left sub-figure of Fig. 7.
Finally, we use PCA to reduce the extracted feature dimension
before we train the predictor. The results of the appearancebased shallow predictors for all the data are shown in Table VI.
TABLE VIII
C OMPARISON OF A LEX N ET [41], R ES N ET-18 [42] AND
R ES N E X T-50 [43] IN MEASUREMENT OF PC, MAE AND RMSE BY 60%
TRAINING AND 40% TESTING
PC
MAE
RMSE
AlexNet
ResNet-18
ResNeXt-50
0.8298
0.2938
0.3819
0.8513
0.2818
0.3703
0.8777
0.2518
0.3325
V. FBP E VALUATION VIA D EEP P REDICTOR
We evaluate three recently proposed CNN models with
different structures for FBP, including AlexNet [41], ResNet18 [42] and ResNeXt-50 [43]. All these CNN models are
trained by initializing weights using networks pre-trained on
the ImageNet dataset. The evaluation of were performed under
two different experiment settings as following:
1) The models were trained and tested using 5-fold cross
validation, which means each fold containing 20% samples (1100 images). The accuracy of each fold and the
average of all the 5 fold are shown in Table VII.
2) The models were trained using 60% samples (3300
images), and tested with the rest 40% (2200 images).
The results are shown in Table VIII.
The results illustrates that the deepest CNN-based ResNeXt50 model [43] obtains the best performance comparing to
the ResNet-18 and AlexNet in both the experiment setting.
It can be observed that all the deep CNN model are superior
to the shallow predictor with hand-crafted geometric feature
in Table V or appearance feature in Table VI. It indicates
the effectiveness and powerfulness of the end-to-end feature
learning deep model for FBP.
Comparing the results of Table VII and Table VIII, we also
find that the accuracy of all the 5-fold cross validation is
slightly higher than the results of the split of 60% training
and 40% testing. One of the reasons may be due to the
amounts and diversity of the training samples, since the 5-fold
cross validation use 80% samples to train the models. This
observation indicates that the data augmentation techniques
may further improve the performance of the deep FBP model,
which merits exploring in the future.
VI. C ONCLUSION
In this paper, we introduce a new diverse benchmark
dataset, called SCUT-FBP5500, to achieve multi-paradigm
facial beauty prediction. The SCUT-FBP5500 dataset has
totally 5500 frontal faces with diverse properties (male/female,
Asian/Caucasian, ages) and diverse labels (face landmarks,
beauty scores within [1, 5], beauty score distribution). Benchmark analysis have been made for the beauty scores and
landmarks in SCUT-FBP5500, and the visualization of the data
shows the statistical properties of the dataset. Since the SCUTFBP5500 is designed for multi-paradigm, it can be adapted
to different FBP models for different tasks, like appearancebased or shape-based model for facial beauty classification/regression/ranking. We evaluated the SCUT-FBP5500 using different combinations of feature and predictor, and deep
learning models, where the results indicates the reliability of
the dataset.
R EFERENCES
[1] D. Xie, L. Liang, L. Jin, J. Xu and M. Li, โSCUT-FBP: A Benchmark
Dataset for Facial Beauty Perception,โ in Proc. of IEEE SMC, pp. 18211826, 2015.
[2] L. Liang, D. Xie, L. Jin, J. Xu, M. Li, and L. Lin, โRegion-aware
scattering convolution networks for facial beauty prediction,โ in Proc.
of IEEE ICIP, pp. 2861-2865, 2017.
[3] J. Xu, L. Jin, L. Liang, Z. Feng, D. Xie, and H. Mao, โFacial attractiveness
prediction using psychologically inspired convolutional neural network
(PI-CNN),โ in Proc. of IEEE ICASSP, pp. 1657-1661, 2017.
[4] L. Liang, L. Jin, and D. Liu, โEdge-aware label propagation for mobile
facial enhancement on the cloud,โ IEEE Trans. on Circuits and Systems
for Video Technology, vol. 27, no. 1, pp. 125-138, 2017.
[5] L. Liang, L. Jin, and X. Li, โFacial skin beautification using adaptive
region-aware mask,โ IEEE Trans. on Cybernetics, vol. 44, no. 12, pp.
2600-2612, 2014.
[6] J. Li, X. Chao, L. Liu, X. Shu, and S. Yan, โDeep face beautification,โ
Proc. ACM International Conference on Multimedia, pp. 793-794, 2015.
[7] T. Leyvand, D. Cohen-Or, G. Dror, and D. Lischinski, โData-driven
enhancement of facial attractiveness,โ ACM Trans. Graph., pp. 28:1-10,
2008.
[8] H. Gunes, โA survey of perception and computation of human beauty,โ
in Proc. of J-HGBU, pp. 19-24, 2011.
[9] A. Laurentini and A. Bottino, โComputer analysis of face beauty: A
survey,โ Comput. Vision and Image Underst., vol. 125, pp. 184โ199, 2014.
[10] D. Zhang, F. Chen, and Y. Xu, Computer models for facial beauty
analysis. Springer International Publishing Switzerland, 2016.
[11] L. Liu, J. Xing, S. Liu, H. Xu, X. Zhou, and S. Yan, โWow! you
are so beautiful today!,โ ACM Transactions on Multimedia Computing,
Communications, and Applications, vol. 11, no. 1s, p. 20, 2014.
[12] K. Scherbaum, T. Ritschel, M. Hullin, T. Thormaฬhlen, V. Blanz and
H. Seidel, โComputer-suggested facial makeup,โ Comput. Graph. Forum,
vol. 30, no. 2, pp. 485-492, 2011.
[13] Y. Mu, โComputational facial attractiveness prediction by aestheticsaware features,โ Neurocomputing, vol. 99, pp. 59-64, 2013.
[14] Y. LeCun, Y. Bengio and G. Hinton, โDeep learning,โ Nature, vol. 251,
pp. 436-444, 2015.
[15] Y. Eisenthal, G. Dror and E. Ruppin, โFacial Attractiveness: Beauty and
the Machine,โ Neural Computation, vol. 18, pp. 119-142, 2006.
[16] N. Murray, L. Marchesotti L, and F. Perronnin, โAVA: A large-scale
database for aesthetic visual analysis,โ in Proc. of CVPR, pp. 2408-2415,
2012.
[17] A. Laurentini and A. Bottino, โComputer analysis of face beauty: A
survey,โ Computer Vision and Image Understanding, vol. 125, pp. 184199, 2014.
[18] I. Stephen, M. Law Smith, M. Stirrat, and D. Perrett, โFacial skin
coloration affects perceived health of human faces,โ International Journal
of Primatology, vol. 30, no. 6, pp. 845-857, 2009.
[19] A. Kagian, G. Dror, T. Leyvand, D. Cohen-Or, and E. Ruppin, โA
humanlike predictor of facial attractiveness,โ in Proc. of NIPS, pp. 649656, 2006.
[20] H. Mao, L. Jin and M. Du, โAutomatic classification of Chinese female
facial beauty using Support Vector Machine,โ in Proc. of IEEE SMC, pp.
4842-4846, 2009.
[21] D. Zhang, Q. Zhao and F. Chen, โQuantitative analysis of human facial
beauty using geometric features,โ Pattern Recognition, vol. 44, no. 4, pp.
940-950, 2011.
[22] F. Chen and D. Zhang, โA benchmark for geometric facial beauty study,โ
Medical Biometrics, pp. 21-32, 2010.
[23] J. Fan, K. P. Chau, X. Wan, L. Zhai and E. Lau, โPrediction of facial
attractiveness from facial proportions,โ Pattern Recognition, vol. 45, pp.
2326-2334, 2012.
[24] H. Yan, โCost-sensitive ordinal regression for fully automatic facial
beauty assessment,โ Neurocomputing, no. 129, pp. 334-342, 2014.
[25] H. Altwaijry and S. Belongie, โRelative ranking of facial attractiveness,โ
in IEEE Workshop on WACV, pp. 117-124, 2013.
[26] Y. Chen, H. Mao, L. Jin, โA novel method for evaluating facial
attractivenessโ, in IEEE Proc. ICALIP, pp. 1382-1386, 2010.
[27] W. Chiang, H. Lin, C. Huang, L. Lo, and S. Wan, โThe cluster
assessment of facial attractiveness using fuzzy neural network classifier
based on 3D Moir features,โ Pattern Recognition, vol. 47, no. 3, pp.
1249-1260, 2014.
[28] S. Kalayci, H. K. Ekenel, and H. Gunes, โAutomatic analysis of facial
attractiveness from video,โ in Proc. of ICIP, pp. 4191-4195, 2014.
[29] J. Gan, L. Li, Y. Zhai and Y. Liu, โDeep self-taught learning for facial
beauty prediction,โ Neurocomputing, no. 144, pp. 295-303, 2014.
[30] S. Wang, M. Shao and Y. Fu, โAttractive or not? Beauty prediction with
attractiveness-aware encoders and robust late fusion,โ ACM Multimedia,
pp. 805-808, 2014.
[31] Y. Ren and X. Geng, โSense beauty by label distribution learning,โ in
Proc, IJCAI, pp. 2648โ2654, 2017.
[32] R. White, A. Eden, and M. Maire, โAutomatic prediction of human
attractiveness,โ UC Berkeley CS280A Proj., vol. 1, p. 2, 2004.
[33] D. Gray, K. Yu, W. Xu and Y. Gong, โPredicting facial beauty without
landmarks,โ in Proc. ECCV, 2010.
[34] M. Redi, N. Rasiwasia, G. Aggarwal and A. Jaimes, โThe Beauty
of Capturing Faces: Rating the Quality of Digital Portraits,โ in IEEE
Workshops on AFGR, pp. 1-8, 2015.
[35] H. Gunes and M. Piccardi, โAssessing facial beauty through proportion
analysis by image processing and supervised learning,โ International
Journal of Human-Computer Studies, vol. 64, no. 12, pp. 1184-1199,
2006.
[36] J. Whitehill and J.R. Movellan, โPersonalized facial attractiveness prediction,โ in Proc. AFGR, 2008.
[37] Y. Fan, S. Liu, B. Li, Y. Fan, Z. Guo, A. Samal, J. Wan and Stan Z.
Li โLabel Distribution based facial attractiveness computation by deep
residual learningโ, IEEE Transactions on Multimedia, 2017 (Online).
[38] B. Davis and S. Lazebnik, โAnalysis of human attractiveness using
manifold kernel regression,โ in Proc. ICIP, 2008.
[39] โDataTang,โ url: http://datatang.com/.
[40] W.A. Bainbridge, P. Isola and A. Oliva, โThe intrinsic memorability of
face images.โ Journal of Experimental Psychology: General, vol. 142,
no. 4, pp. 1323-1334, 2013.
[41] A. Krizhevsky, I. Sutskever, and G. E. Hinton, โImagenet classification
with deep convolutional neural networks,โ in Proc, NIPS, 2012, pp. 1097โ
1105.
[42] K. He, X. Zhang, S. Ren, and J. Sun, โDeep residual learning for image
recognition,โ in Proc, CVPR, 2016, pp. 770โ778.
[43] S. Xie, R. Girshick, P. Dollaฬr, Z. Tu, and K. He, โAggregated
residual transformations for deep neural networks,โ arXiv preprint
arXiv:1611.05431, 2016.
| 1cs.CV
|
1
Degrees of Freedom of the Broadcast Channel
with Hybrid CSI at Transmitter and Receivers
arXiv:1709.02884v1 [cs.IT] 9 Sep 2017
Mohamed Fadel, Student Member, IEEE, and Aria Nosratinia, Fellow, IEEE
Abstract
In general the different links of a broadcast channel may experience different fading dynamics
and, potentially, unequal or hybrid channel state information (CSI) conditions. The faster the fading
and the shorter the fading block length, the more often the link needs to be trained and estimated at
the receiver, and the more likely that CSI is stale or unavailable at the transmitter. Disparity of link
fading dynamics in the presence of CSI limitations can be modeled by a multi-user broadcast channel
with both non-identical link fading block lengths as well as dissimilar link CSIR/CSIT conditions.
This paper investigates a MISO broadcast channel where some receivers experience longer coherence
intervals (static receivers) and have CSIR, while some other receivers experience shorter coherence
intervals (dynamic receivers) and do not enjoy free CSIR. We consider a variety of CSIT conditions
for the above mentioned model, including no CSIT, delayed CSIT, or hybrid CSIT. To investigate the
degrees of freedom region, we employ interference alignment and beamforming along with a product
superposition that allows simultaneous but non-contaminating transmission of pilots and data to different
receivers. Outer bounds employ the extremal entropy inequality as well as a bounding of the performance
of a discrete memoryless multiuser multilevel broadcast channel. For several cases, inner and outer
bounds are established that either partially meet, or the gap diminishes with increasing coherence times.
Index Terms
Broadcast channel, Channel state information, Coherence time, Coherence diversity, Degrees of
freedom, Fading channel, Multilevel broadcast channel, Product superposition.
The authors are with the Department of Electrical Engineering, University of Texas at Dallas, Richardson, TX 750830688 USA, E-mail: [email protected];[email protected]. This work was presented in part at the IEEE International
Symposium on Information Theory (ISIT), Germany, June 2017 [1].
March 26, 2018
DRAFT
2
I. I NTRODUCTION
The performance of a broadcast channel depends on both the channel dynamics as well as
the availability and the quality of channel state information (CSI) on the two ends of each
link [2]โ[5]. The two issues of CSI and the channel dynamics are practically related. The faster
the fading, the more often the channel needs training, thus consuming more channel resources,
while a very slow fading link requires infrequent training, therefore slow fading models often
assume that CSIR is available due to the cost of training being small when amortized over time.
In practice, in a broadcast channel some links may fade faster or slower than others. Recently,
it has been shown [6], [7], that the degrees of freedom of the broadcast channel are affected
by the disparity of link fading speeds, but existing studies have focused on a few simple and
uniform CSI conditions, e.g., neither CSIT nor CSIR were available in [6], [7] for any user. This
paper studies a broadcast channel where the links experience both disparate fading conditions
as well as non-uniform or hybrid CSI conditions.
A review of the relevant literature is as follows. Under perfect instantaneous CSI, the degrees
of freedom of a broadcast channel increase with the minimum of the transmit antennas and
the total number of receivers antennas [8], [9]. However, due to the time-varying nature of the
channel and feedback impairments, perfect instantaneous transmit-side CSI (CSIT) may not be
available, and also receive-side CSI (CSIR) can be assumed for slow-fading channels only.
Broadcast channel with perfect CSIR has been investigated under a variety of CSIT conditions,
including imperfect, delayed, or no CSIT [2]โ[4], [10]โ[12]. In the absence of CSIT, Huang et
al. [2] and Vaze and Varanasi [3] showed that the degrees of freedom collapse to that of the
single-receiver, since the receivers are stochastically equivalent with respect to the transmitter.
For a MISO broadcast channel Lapidoth et al. [4] conjectured that as long as the precision of
CSIT is finite, the degrees of freedom collapse to unity. This conjecture was recently settled in
the positive by Davoodi and Jafar in [10]. Moreover, for a MISO broadcast channel under perfect
delayed CSIT Maddah-Ali and Tse in [11] showed using retrospective interference alignment
that the degrees of freedom are
1
1
1+ 12 +...+ K
> 1, where K is the number of the transmit antennas
and also the number of receivers. A scenario of mixed CSIT was investigated in [12], where the
transmitter has partial knowledge on the current channel in addition to delayed CSI.
The potential variation between the quality of feedback links has led to the model of hybrid
March 26, 2018
DRAFT
3
CSIT, where the CSIT with respect to different links may not be identical [10], [13]โ[15]. A
MISO broadcast channel with perfect CSIT for some receivers and delayed for the others was
studied by Tandon et al. in [13] and Amuru et al. in [14]. Davoodi and Jafar in [10] showed
that for a MISO two-receiver broadcast channel under perfect CSIT for one user and no CSIT
for the other, the degrees of freedom collapse to unity. Tandon et al. in [15] considered a MISO
broadcast channel with alternating hybrid CSIT to be perfect, delayed, or no CSIT with respect
to different receivers.
As mentioned earlier, investigation of broadcast channels under unequal link fading dynamics
is fairly recent. An achievable degrees of freedom region for one static and one dynamic receiver
was given in [16]โ[19] via product superposition, producing a gain that is now known as
coherence diversity. Coherence diversity gain was further investigated in [6], [7] for a K-receiver
broadcast channel with neither CSIT nor CSIR. Also, a broadcast channel was investigated in
[20], where the receivers MIMO fading links experience nonidentical spacial correlation.
In this paper, we consider a multiuser model under a hybrid CSIR scenario where a group of
receivers, denoted static receivers, are assumed to have CSIR, and another group with shorter
link coherence time, denoted dynamic receivers, do not have free CSIR. We consider this model
under a variety of CSIT conditions, including no CSIT, delayed CSIT, and two hybrid CSIT
scenarios. In each of these conditions, we analyze the degrees of freedom region. A few new
tools are introduced, and inner and outer bounds are derived that partially meet in some cases.
The results of this paper are cataloged as follows.
In the absence of CSIT, an outer bound on the degrees of freedom region is produced via
bounding the rates of a discrete memoryless multilevel broadcast channel [21], [22] and then
applying the extremal entropy inequality [23], [24]. Our achievable degrees of freedom region
meets the outer bound in the limiting case where the coherence times of the static and dynamic
receivers are the same.
For delayed CSIT, we use the outdated CSI model that was used by Maddah-Ali and Tse [11]
under i.i.d. fading and assuming global CSIR at all nodes. Noting that our model does not have
uniform CSIR, we produced a technique with alignment over super-symbols to utilize outdated
CSIT but merge it together with product superposition to reuse the pilots of the dynamic receivers
for the purpose of transmission to static receivers. Moreover, we develop an outer bound that
is suitable for block-fading channels with different coherence times, by appropriately enhancing
March 26, 2018
DRAFT
4
static
Tx
dynamic
Fig. 1.
A broadcast channel with multiple static and multiple dynamic users
the channel to a physically-degraded broadcast channel and then applying the extremal entropy
inequality [23], [24]. For one static and one dynamic receiver, our achievable degrees of freedom
partially meet our outer bound, and furthermore the gap decreases with the dynamic receiver
coherence time T .
Under hybrid CSIT, we analyze two conditions: First, we consider perfect CSIT for the static
receivers and no CSIT with respect to the dynamic receivers. The achievable degrees of freedom
in this case are obtained using product superposition with the dynamic receiverโs pilots reused
and beamforming for the static receivers to avoid interference. Second, we consider perfect CSIT
with respect to the static receivers and delayed CSIT with respect to the dynamic receivers. An
achievable transmission scheme is proposed via a combination of beamforming, interference
alignment, and product superposition methodologies. The outer bounds for the two hybrid-CSIT
cases were based on constructing an enhanced physically degraded channel and then applying the
extremal entropy inequality. For one static receiver with perfect CSIT and one dynamic receiver
with delayed CSIT, the gap between the achievable and the outer sum degrees of freedom is
1
.
T
II. S YSTEM M ODEL
Consider a broadcast channel with multiple single-antenna receivers and the transmitter is
equipped with Nt antennas. The expressions โreceiverโ and โuserโ are employed without distinction throughout the paper, indicating the receiving terminals in the broadcast channel. The
channels of the users are modeled as Rayleigh block fading where the channel coefficients
remain constant over each block and change independently across blocks [25], [26]. As shown
in Fig. 1, the users are partitioned into two sets based on channel availability and the length of the
coherence interval: one set of dynamic users and another set of static users. The former contains
March 26, 2018
DRAFT
5
TABLE I
N OTATION
Static Users
Dynamic Users
mโฒ
m
MISO channel gains
g1 , . . . , gmโฒ
h1 , . . . , hm
received signals (continuous)
โฒ
y1โฒ , . . . , ym
โฒ
y1 , . . . , ym
DMC receive variables
โฒ
Y1โฒ , . . . , Ym
โฒ
Y1 , . . . , Ym
transmission rates
โฒ
R1โฒ , . . . , Rm
โฒ
R1 . . . , Rm
โฒ
M1โฒ , . . . , Mm
โฒ
M1 , . . . , Mm
dโฒ1 , . . . , dโฒmโฒ
d1 , . . . , dm
number of users
messages
degrees of freedom
coherence time
T
โฒ
T
General Variables
X
transmit signal
ฯ
signal-to-noise ratio
Ui , Vj , W
auxiliary random variables
H
set of all channel gains
Dx
vertex of degrees of freedom region
ei
canonical coordinate vector
m dynamic users having coherence time T and no free CSIR1 , and the latter contains mโฒ static
users having coherence time T โฒ and perfect instantaneous CSIR. We consider the transmitter is
equipped with more antennas than the number of dynamic and static users, i.e., Nt โฅ mโฒ + m.
The received signals yjโฒ (t), yi (t) at the static user j, and the dynamic user i, respectively, at
time instant t are
yjโฒ (t) = gjโ (t)x(t) + zjโฒ (t),
j = 1, . . . , mโฒ ,
yi (t) = hโ i (t)x(t) + zi (t),
i = 1, . . . , m,
(1)
where x(t) โ CNt is the transmitted signal, zjโฒ (t), zi (t) denote the corresponding additive i.i.d.
Gaussian noise of the users, and gj (t) โ CNt , hi (t) โ CNt denote the channels of the static
user j and the dynamic user i whose coefficients stay the same over T โฒ and T time instances,
1
This means that the cost of knowing CSI at the receiver, e.g., by channel estimation, is not ignored.
March 26, 2018
DRAFT
6
respectively. The distributions of gj and hi are globally known at the transmitter and at the users.2
Having CSIR, the value of gj (t) is available instantaneously and perfectly at the static user j.
Furthermore, the static user j obtains an outdated version of the dynamic users channels hi , and
also the dynamic user i obtains an outdated version of the static users channel gi (completely
stale) [11]. CSIT for each user can take one of the following:
โข
Perfect CSIT: the channel vectors, gj (t), hi (t), are available at the transmitter instantaneously and perfectly.
โข
Delayed CSIT: the channel vectors, gj (t), hi (t), are available at the transmitter after they
change independently in the following block (completely stale [11]).
โข
No CSIT: the channel vectors, gj (t), hi (t), cannot not be known at the transmitter.
We consider the broadcast channel with private messages for all users and no common
โฒ
messages. More specifically, we assume that the independent messages Mjโฒ โ [1 : 2nRi (ฯ) ], Mi โ
[1 : 2nRi (ฯ) ] associated with rates Rjโฒ (ฯ), Ri (ฯ) are communicated from the transmitter to the
static user j and dynamic user i, respectively, at ฯ signal-to-noise ratio. The degrees of freedom
of the static and dynamic users achieving rates Rjโฒ (ฯ), Ri (ฯ) can be defined as
Rjโฒ (ฯ)
,
ฯโโ log(ฯ)
Ri (ฯ)
di = lim
,
ฯโโ log(ฯ)
j = 1, . . . , mโฒ ,
dโฒj = lim
i = 1, . . . , m.
(2)
The degrees of freedom region is defined as
โฒ +m
โฒ
โ(R1โฒ (ฯ), . . . , Rm
D = (dโฒ1 , . . . , dโฒmโฒ , d1 , . . . , dm ) โ Rm
โฒ (ฯ), R1 (ฯ), . . . , Rm (ฯ)) โ C(ฯ),
+
Rjโฒ (ฯ)
Ri (ฯ)
, di = lim
, j = 1, . . . , mโฒ , i = 1, . . . , m ,
ฯโโ log(ฯ)
ฯโโ log(ฯ)
dโฒj = lim
(3)
where C(ฯ) is the capacity region at ฯ signal-to-noise ratio. The sum degrees of freedom is
defined as
Csum (ฯ)
,
ฯโโ log(ฯ)
dsum = lim
where
โฒ
Csum (ฯ) = max
m
X
j=1
2
Rjโฒ (ฯ)
+
m
X
(4)
Ri (ฯ).
(5)
i=1
Also, the coherence times of all channels are globally known at the transmitter and at the users.
March 26, 2018
DRAFT
7
Y1โ
X
Y2โ
p(y3โ|y2โ)
p(ymโโ|ymโ-1โ)
p(y3|y2)
p(ym|ym-1)
Ymโโ
p(y1โ,y1|x)
Y1
Fig. 2.
p(y2โ|y1โ)
p(y2|y1)
Y2
Ym
Discrete memoryless multiuser multilevel broadcast channel
In the sequel, we study the degrees of freedom of the above MISO broadcast channel under
different CSIT scenarios that could be perfect, delayed or no CSIT.
III. N O CSIT
FOR
A LL U SERS
In this section, we study the broadcast channel defined in Section II when there is no CSIT for
all users. In particular, we give outer and achievable degrees of freedom regions in Section III-B
and Section III-C, respectively. The outer degrees of freedom region is based on the construction
of an outer bound on the rates of a multiuser multilevel discrete memoryless channel that is given
in Section III-A.
A. Multiuser Multilevel Broadcast Channel
The multilevel broadcast channel was introduced by Borade et al. [21] as a three-user broadcast
discrete memoryless broadcast channel where two of the users are degraded with respect to each
other. The capacity of this channel under degraded message sets was established by Nair and El
Gamal [22]. Here, we study a multiuser multilevel broadcast channel with two sets of degraded
users (see Fig. 2). One set contains mโฒ users with Yjโฒ received signal at user j, and the other set
contains m users with Yi received signal at user i. Therefore,
X โY1โฒ โ Y2โฒ โ ยท ยท ยท โ Ymโฒ โฒ
X โY1 โ Y2 โ ยท ยท ยท โ Ym
March 26, 2018
(6)
DRAFT
8
form two Markov chains. We consider a broadcast channel with (mโฒ + m) private messages and
no common message. An outer bound for the above multilevel broadcast channel is given in the
following theorem.
Theorem 1: The rate region of the multilevel broadcast channel with two sets of degraded
users (Eq. (6)) is outer bounded by the intersection of
R1 โคI(Umโฒ , W ; Y1|V1 ) โ I(W ; Ymโฒ โฒ |Umโฒ ),
(7)
Ri โคI(Viโ1 ; Yi |Vi ),
(8)
Rjโฒ โคI(Ujโ1 ; Yjโฒ |Uj ),
i = 2, . . . , m,
j = 1, . . . , mโฒ โ 1,
โฒ
โฒ
โฒ
โฒ
Rm
โฒ โคI(W ; Ymโฒ |Umโฒ ) + I(X; Ymโฒ |Umโฒ , W ) โ I(X; Ymโฒ |Umโฒ โ1 ),
(9)
(10)
and
Ri โคI(Uฬiโ1 ; Yi |Uฬi ),
i = 1, . . . , m โ 1,
(11)
Rm โคI(Wฬ ; Ym |Uฬm ) + I(X; Ym|Uฬm , Wฬ ) โ I(X; Ym|Uฬmโ1 ),
(12)
R1โฒ โคI(Uฬm , Wฬ ; Y1โฒ |Vฬ1 ) โ I(Wฬ ; Ym |Uฬm ),
(13)
Rjโฒ โคI(Vฬjโ1; Yjโฒ |Vฬj ),
(14)
j = 2, . . . , mโฒ ,
for some pmf
p(u1 , . . . , umโฒ , uฬ1 , . . . , uฬm , v1 , . . . , vm , vฬ1 , . . . , vฬmโฒ , w, wฬ, x),
(15)
where
Umโฒ โ ยท ยท ยท โ U1 โX โ (Y1 , . . . , Ym, Y1โฒ , . . . , Ymโฒ โฒ )
Vm โ ยท ยท ยท โ V1 โ (W, Umโฒ ) โX โ (Y1 , . . . , Ym, Y1โฒ , . . . Ymโฒ โฒ )
Uฬm โ ยท ยท ยท โ Uฬ1 โX โ (Y1 , . . . Ym , Y1โฒ , . . . , Ymโฒ โฒ )
Vฬmโฒ โ ยท ยท ยท โ Vฬ1 โ (Wฬ , Uฬm ) โX โ (Y1 , . . . Ym , Y1โฒ , . . . , Ymโฒ โฒ )
(16)
forms Markov chains and U0 = Uฬ0 , X.
Proof: See Appendix I.
Remark 1: Theorem 1 is an extension of the Koฬrner-Marton outer bound [27, Theorem 5] to
more than two users, and it recovers the Koฬrner-Marton bound when m = mโฒ = 1.
March 26, 2018
DRAFT
9
Remark 2: For the multiuser multilevel broadcast channel characterized by (6), we establish
the capacity for degraded message sets in Appendix II, where one common message is communicated to all receivers and one further private message is communicated to one receiver.
B. Outer Degrees of Freedom Region
In the sequel, we give an outer bound on the degrees of freedom of the broadcast channel
defined in Section II when there is no CSIT for all users. The outer bound development depends
on the results of Theorem 1 in Section III-A.
Theorem 2: An outer bound on the degrees of freedom region of the fading broadcast channel
characterized by Eq. (1) without CSIT is,
โฒ
m
X
dโฒj โค 1,
m
X
di โค 1 โ
(17)
j=1
i=1
mโฒ
X
j=1
dโฒj
+
m
X
i=1
di โค
๏ฃฑ
๏ฃด
๏ฃฒ1
๏ฃด
๏ฃณ4
3
1
,
T
T = T โฒ , โT = 0
(18)
(19)
otherwise,
where โT is the offset between the two coherence intervals.
Proof: Equations (17) and (18) are outer bounds for a broadcast channel whose users are
either all homogeneously static or all homogeneously dynamic [7], [18]. The remainder of the
proof is dedicated to establishing (19). We enhance the channel by giving all users global CSIR.
When T โฒ = T and โT = 0, (19) follows directly from [7], [18]. When T โฒ 6= T or โT 6= 0,
having no CSIT, the channel belongs to the class of multiuser multilevel broadcast channels in
Section III-A. We then use the two outer bounds developed for the multilevel broadcast channels
to generate two degrees of freedom bounds, and merge them to get the desired result.
We begin with the outer bound described in (7)-(10); we combine these equations to obtain
P
P
partial sum-rate bounds on the static ( Rjโฒ ) and dynamic ( Ri ) receivers:
โฒ
m
X
Rjโฒ
j=1
โค
โฒ โ1
m
X
โฒ
โฒ
I(Ujโ1 ; yjโฒ |Uj , H) + I(W ; ym
โฒ |Umโฒ , H) + I(x; ymโฒ |Umโฒ , W, H)
j=1
โฒ
โ I(x; ym
โฒ |Umโฒ โ1 , H)
March 26, 2018
DRAFT
10
=
โฒ โ1
m
X
โฒ
โฒ
h(yjโฒ |Uj , H) โ h(yjโฒ |Ujโ1 , H) + I(W ; ym
โฒ |Umโฒ , H) + h(ymโฒ |Umโฒ , W, H)
j=1
โฒ
โ h(ym
โฒ |Umโฒ โ1 , H) + o(log(ฯ))
(20)
โฒ
โฒ
=I(W ; ym
โฒ |Umโฒ , H) + h(ymโฒ |Umโฒ , W, H) + o(log(ฯ)),
(21)
where H is the set of all channel vectors, (20) follows from the chain rule, h(yjโฒ |x, H) =
o(log(ฯ)), and (21) follows since the received signals of all static users, yjโฒ , have the same
statistics [7], [18]. Also, using Theorem 1,
m
X
Rj โคI(Umโฒ , W ; y1|V1 , H) โ
โฒ
I(W ; ym
โฒ |Umโฒ , H)
+
m
X
I(Vjโ1; yj |Vj , H)
j=2
j=1
=h(y1 |V1 , H) โ h(y1 |Umโฒ , W, H) โ
โฒ
I(W ; ym
โฒ |Umโฒ , H)
+
m
X
h(yj |Vj , H)
j=2
โ h(yj |Vjโ1, H)
(22)
โฒ
= โ h(y1 |Umโฒ , W, H) โ I(W ; ym
โฒ |Umโฒ , H) + h(ym |Vm , H) + o(log(ฯ))
(23)
โฒ
โค โ h(y1 |Umโฒ , W, H) โ I(W ; ym
โฒ |Umโฒ , H) + log(ฯ) + o(log(ฯ)),
(24)
where (22) follows from the chain rule, (23) follows since yj have the same statistics, and (24)
โฒ
follows since h(ym |Vm , H) โค n log(ฯ) + o(log(ฯ)). Define Yj,k
to be the received signal of user
j at time instance k. From (21) and (24), we can obtain the bound (27) on the rates.
mโฒ
m
1X โฒ X
1
1
โฒ
โฒ
Rj +
Rj โค I(W ; ym
h(ym
โฒ |Umโฒ , H) +
โฒ |Umโฒ , W, H) โ h(y1 |Umโฒ , W, H)
2 j=1
2
2
j=1
โฒ
โ I(W ; ym
โฒ |Umโฒ , H) + log(ฯ) + o(log(ฯ))
1
โฒ
= h(ym
โฒ |Umโฒ , W, H) โ h(y1 |Umโฒ , W, H) + log(ฯ) + o(log(ฯ))
2
1
โฒ
โค h(ym
โฒ , y1 |Umโฒ , W, H) โ h(y1 |Umโฒ , W, H) + log(ฯ) + o(log(ฯ))
2
n
X
1
โฒ
โฒ
โฒ
โค
h(ym
โฒ ,k , y1,k |Umโฒ , W, H, ymโฒ ,1 , . . . , ymโฒ ,kโ1 , y1,1 , . . . , y1,kโ1 )
2
k=1
(25)
โฒ
โฒ
โ h(y1,k |Umโฒ , W, H, ym
โฒ ,1 , . . . , ymโฒ ,kโ1 , y1,1 , . . . , y1,kโ1 ) + log(ฯ)
+ o(log(ฯ))
โค
March 26, 2018
max
Tr{ฮฃx }โคฯ,ฮฃx <0
(26)
EH
1
log |I + Hฮฃx Hโ | โ log(1 + hโ 1 ฮฃx h1 ) + log(ฯ)
2
DRAFT
11
+ o(log(ฯ)),
(27)
where (25) and (26) follow from the chain rule and that conditioning does not increase differential
entropy, and (27) follows from extremal entropy inequality [23], [24], [28]. In order to bound (27),
we use a specialization of [29, Lemma 3] as follows.
Lemma 1: Consider two random matrices H1 โ CN1 รNt and H2 โ CN2 รNt , where N1 โฅ N2 .
For a covariance matrix ฮฃx , where Tr{ฮฃx } โค ฯ, we have
1
1
log |I + H1 ฮฃx Hโ 1 | โ
log |I + H2 ฮฃx Hโ 2 | โค o(log(ฯ)). (28)
ฮฃx min{Nt , N1 }
min{Nt , N2 }
The proof of Lemma 1 is omitted as it directly follows from [29, Lemma 3]. Lemma 1 yields
max
the following outer bound on the degrees of freedom:
mโฒ
m
1X โฒ X
d +
di โค 1.
2 j=1 j i=1
(29)
We now repeat the exercise of bounding the sum rates and deriving degrees of freedom, this
time starting from (11)-(14). By following bounding steps parallel to (21), (24), (27),
โฒ
m
X
m
dโฒj
j=1
1X
di โค 1.
+
2 i=1
(30)
Adding (29) and (30) yields the outer bound (19), completing the proof of Theorem 2.
C. Achievable Degrees of Freedom Region
Theorem 3: The fading broadcast channel described by Eq. (1) can achieve the following
degrees of freedom without CSIT:
m
X
di โค 1 โ
m
X
di โค 1.
i=1
mโฒ
X
j=1
dโฒj
+
1
,
T
(31)
(32)
i=1
Proof: The achievable scheme uses product superposition [17], [18], where the transmitter
uses one antenna to send the super symbol to two users: one dynamic and one static,
xโ = xs xโ d ,
(33)
where xs โ C is a symbol intended for the static user,
xโ d = [xฯ , xโ ฮด ]
March 26, 2018
(34)
DRAFT
12
where xฯ โ C is a pilot and xฮด โ CT โ1 is a super symbol intended for the dynamic user. Since
degrees of freedom analysis is insensitive to the additive noise, we omit the noise component
in the following.
yโ = hxs [xฯ , xโ ฮด ]
= [hxฯ , hxโ ฮด ],
(35)
where h = hxs . The dynamic user estimates the equivalent channel h during the first time
instance and then decodes xฮด coherently based on the channel estimate. The static receiver only
utilizes the received signal during the first time instance:
y1โฒ = gxs .
(36)
Knowing its channel gain g, the static receiver can decode xs . The achievable degrees of freedom
of the two users are,
(dโฒ , d) =
1
1
.
,1 โ
T
T
(37)
We now proceed to prove that the degrees of freedom region characterized by (31) and (32) can
be achieved via a combination of two-user product superposition strategies that were outlined
above, and single-user strategies. For clarity of exposition we refer to (31), which describes
the degrees of freedom constraints of the dynamic receivers, as the non-coherent bound, and
to (32) as the coherent bound. The non-negativity of degrees of freedom restricts them to the
โฒ
m+m
. The intersection of the coherent bound and the non-negative orthant
non-negative orthant R+
is a (mโฒ + m)โsimplex that has m + mโฒ + 1 vertices. The non-coherent bound is a hyperplane
that partitions the simplex with mโฒ + 1 vertices on one side of the non-coherent bound and m
on the other. Therefore the intersection of the simplex with the non-coherent bound produces
a polytope with (mโฒ + 1)(m + 1) vertices.3 For illustration, see Fig. 3 showing the three-user
degrees of freedom with two static users and Fig. 4 with one static user.
We now verify that each of the (mโฒ + 1)(m + 1) vertices can be achieved with either a
single-user strategy, or via a two-user product superposition strategy:
โข
mโฒ vertices corresponding to single-user transmission to each static user j achieving one
degree of freedom.
3
This can be verified with a simple counting exercise involving the number of edges of the simplex that cross the non-coherent
bound.
March 26, 2018
DRAFT
13
d
d1
Non-coherent bound
Non-coherent bound
d2
Coherent bound
dโ2
dโ
dโ1
Fig. 3.
Achievable degrees of freedom region of one
dynamic and two static users
โข
Coherent bound
Fig. 4. Achievable degrees of freedom region of one static
and two dynamic users
m vertices corresponding to single-user transmission to each dynamic user i achieving
(1 โ T1 ) degrees of freedom.
โข
mโฒ m vertices corresponding to product superposition applied to all possible pairs of static
and dynamic users, achieving
1
T
degrees of freedom for one static user and (1 โ T1 ) degrees
of freedom for one dynamic user.
โข
One trivial vertex at the origin, corresponding to no transmission achieving zero degrees of
freedom for all users.
Hence, the number of the vertices is mโฒ + m + mโฒ m + 1 = (m + 1)(mโฒ + 1). This completes the
achievability proof of Theorem 3.
Remark 3: When the static and dynamic users have the same coherence time, the inner and
outer bounds on degrees of freedom coincide. In this case it is degrees of freedom optimal to
serve two-users at a time (one dynamic and one static).
IV. D ELAYED CSIT
FOR ALL USERS
Under delayed CSIT, the transmitter knows each channel gain only after it is no longer valid.
This condition is also known as outdated CSIT. We begin by proving inner and outer bounds
March 26, 2018
DRAFT
14
when transmitting only to static users, only to dynamic users, and to one static and one dynamic
user. We then synthesize this collection of bounds into an overall degrees of freedom region.
A. Transmission to Static Users
Theorem 4: The degrees of freedom region of the fading broadcast channel characterized by
Eq. (1) with delayed CSIT and having mโฒ static users and no dynamic users is
1
j = 1, . . . , mโฒ .
(38)
1 ,
1 + + . . . + mโฒ
Proof: The special case of fast fading (T โฒ = 1) was discussed by Maddah-Ali and Tse
dโฒj โค
1
2
in [11], where the achievability was established by retrospective interference alignment that
aligns the interference using the outdated CSIT, and the converse was proved by generating
an improved channel without CSIT having a tight degrees of freedom region against TDMA
according to the results in [2], [3]. For T โฒ โฅ 1, the achievability is established by employing
retrospective interference alignment presented in [11] over super symbols each of length T โฒ .
The converse is proved by following the same procedures in [11] to generate a block-fading
improved channel without CSIT and with identical coherence intervals of length T โฒ . According
to the results of [7], [18], TDMA is tight against the degrees of freedom region of the improved
channel.
B. Transmission to Dynamic Users
Theorem 5: The fading broadcast channel characterized by Eq. (1), with delayed CSIT and
having m dynamic users and no static users, can achieve the degrees of freedom
di โค
1
1 + + ...+
1
2
1 (1
m
โ
m
),
T
i = 1, . . . , m.
(39)
An outer bound on the degrees of freedom region is
di โค1 โ
m
X
1
,
T
(40)
m
.
(41)
1 + + . . . + m1
i=1
Proof: The achievability part can be proved as follows. At the beginning of each super
di โค
1
2
symbol, m pilots are sent for channel estimation. Then retrospective interference alignment
in [11] over super symbols is employed during the remaining (T โ m) instances, to achieve (39).
March 26, 2018
DRAFT
15
For the converse part, (41) is proved by giving the users global CSIR, and then applying
Theorem 4. Moreover, (40) is the single-user bound for each dynamic user that can be proved as
follows. For a single user with delayed CSIT, feedback does not increase the capacity [30], and
consequently the assumption of delayed CSIT can be removed. Hence, the single-user bound for
each dynamic user with delayed CSIT is the same as the single-user bound without CSIT [26].
C. Transmission to One Static and One Dynamic User
Theorem 6: The fading broadcast channel characterized by Eq. (1), with delayed CSIT and
having one static and one dynamic user, can achieve the following degrees of freedom
2
1 2
2
(1 + ), (1 โ ) ,
3
T 3
T
1
1
D2 : (dโฒ , d) = ( , 1 โ ).
T
T
D1 : (dโฒ , d) =
(42)
(43)
Furthermore, the achievable degrees of freedom region is the convex hull of the above degrees
of freedom pairs.
Proof: From Section III-C, product superposition achieves the pair (43) that does not require
CSIT for any of the two users. The remainder of the proof is dedicated to the achievability of the
pair (42). We provide a transmission scheme based on retrospective interference alignment [11]
along with product superposition.
1) The transmitter first emits a super-symbol intended for the static user:
X1 = [X1,1 , ยท ยท ยท , X1,โ ],
where โ =
Tโฒ
,
T
(44)
and each X1,n โ C2รT occupies T time instances and has the following
structure:
X1,n = [Uฬn , Uฬn Un ],
n = 1, . . . , โ,
(45)
both the diagonal matrix Uฬn โ C2ร2 and Un โ C2ร(T โ2) contain symbols intended for the
โฒ
โฒ
โฒ
โ
โ
static user. The components of y1โ = [y1,1
, ยท ยท ยท , y1,โ
] are:
โฒ
โ
y1,n
=[g1โ Uฬn , g1โ Uฬn Un ],
โ
โ
=[gฬ1,n
, gฬ1,n
Un ],
March 26, 2018
n = 1, . . . , โ
(46)
DRAFT
16
โ
= g1โ Uฬn . The static user by definition knows g1 so it can decode Uฬn which
where gฬ1,n
โฒ
yields 2 TT degrees of freedom. The remaining
โ
Un involve
(T โ 2) observations in gฬ1,n
Tโฒ
T
โฒ
2 TT (T โ 2) unknowns, so they require a further
Tโฒ
T
(T โ 2) independent observations for
reliable decoding.
โ
โ
The components of y1โ = [y1,1
, ยท ยท ยท , y1,โ
] are
โ
=[hโ 1,n Uฬn , hโ 1,n Uฬn Un ],
y1,n
n = 1, . . . , โ
=[hฬโ 1,n , hฬโ 1,n Un ],
(47)
where hฬโ 1,n = hโ 1,n Uฬn is the equivalent channel estimated by the dynamic user. The dynamic
user saves hฬโ 1,n Un for interference cancellation in the upcoming steps.
2) The transmitter sends a second super symbol intended for the dynamic user:
X2 = [X2,1 , ยท ยท ยท , X2,โ ],
(48)
where
X2,n = [Uฬn , Uฬn Vn ],
n = 1, . . . , โ,
(49)
Uฬn โ C2ร2 is diagonal and includes 2 independent symbols intended for the static user,
and Vn โ C2ร(T โ2) contains independent symbols intended for the dynamic user. The
โ
โ
components of y2โ = [y2,1
, ยท ยท ยท , y2,โ
] are
โ
y2,n
=[hโ 2,n Uฬn , hโ 2,n Uฬn Vn ],
n = 1, . . . , โ
=[hฬโ 2,n , hฬโ 2,n Vn ],
(50)
where hฬโ 2,n = hโ 2,n Uฬn is the equivalent channel estimated by the dynamic user. The dynamic
user saves hฬโ 2,n Vn which includes
Tโฒ
T
Tโฒ
(T โ
T
โฒโ
y2,โ
] are
unknowns, and hence an additional
โฒ
โฒ
โ
components of y2โ = [y2,1
, ยทยทยท ,
โฒ
(T โ 2) independent observations about 2 TT (T โ 2)
2) observations are needed to decode Vn . The
โฒ
y2,n
=[g2โ Uฬn , g2โ Uฬn Vn ],
n = 1, . . . , โ
โ
โ
=[gฬ2,n
, gฬ2,n
Vn ],
(51)
โ
where gฬ2,n
= g2โ Uฬn is the equivalent channel estimated by the static user; the static user
โ
saves gฬ2,n
Vn for the upcoming steps. Knowing g2 , the static user achieves 2 TT further
โฒ
degrees of freedom from decoding Uฬn .
March 26, 2018
DRAFT
17
3) The transmitter emits a third super symbol consisting of a linear combination of the signals
generated from the first and the second super symbols.
X3 = [X3,1 , ยท ยท ยท , X3,โ ],
(52)
where
โ
X3,n = [Uฬn , Uฬn (hฬโ 1,n Un + gฬ2,n
Vn )],
n = 1, . . . , โ,
(53)
Uฬn โ C2ร2 is diagonal and contains 2 independent symbols intended for the static user,
โฒ
and hence the static user achieves further 2 TT degrees of freedom.
โ
The static user cancels gฬ2,n
Vn saved during the second super symbol and obtains hฬโ 1,n Un
that includes the additional independent
Tโฒ
T
(T โ 2) observations needed for decoding Un .
Tโฒ
Therefore, the static user achieves 2 T (T โ 2) further degrees of freedom. The dynamic
user estimates the equivalent channel hฬโ 3,n = hโ 3,n Uฬn , cancels hฬโ 1,n Un saved during the
โ
Vn that contains the additional observations needed
first super symbol, and obtains gฬ2,n
โฒ
for decoding Vn . Hence, the dynamic user achieves 2 TT (T โ 2) degrees of freedom.
In aggregate, over 3T โฒ time instants, the static and dynamic user achieve the degrees of freedom
dโฒ = 6
Tโฒ
Tโฒ
+ 2 (T โ 2),
T
T
d=2
Tโฒ
(T โ 2).
T
(54)
This completes the proof of Theorem 6.
Theorem 7: An outer bound on the degrees of freedom region of the fading broadcast channel
characterized by Eq. (1), with one static and one dynamic user having delayed CSIT, is
dโฒ
+ d โค 1,
2
d
dโฒ + โค 1,
2
(55)
(56)
1
.
(57)
T
Proof: The inequality (57) represents the single-user outer bound [26]. We prove the
dโค1โ
bound (55) as follows. We enhance the original channel by giving both users global CSIR. In
addition, the channel output of the dynamic user, y(t), is given to the static user. Therefore,
the channel outputs at time instant t are (y โฒ(t), y(t), H) at the static user, and (y(t), H) at the
dynamic user. The enhanced channel is physically degraded [31], [32], hence, removing the
delayed CSIT does not reduce the capacity [33]. Also,
Rโฒ โคI(x(t); y โฒ(t), y(t)|U, H) = h(y โฒ(t), y(t)|U, H) โ h(y โฒ (t), y(t)|U, x(t), H)
March 26, 2018
DRAFT
18
R โคI(U; y(t)|H) = h(y(t)|H) โ h(y(t)|U, H),
(58)
where U is an auxiliary random variable, and U โ x โ (y โฒ(t), y(t)) forms a Markov chain.
Therefore,
1
Rโฒ
+ R โคh(y(t)|H) + h(y โฒ(t), y(t)|U, H) โ h(y(t)|U, H) + o(log(ฯ))
2
2
1
(59)
โค log(ฯ) + h(y โฒ(t), y(t)|U, H) โ h(y(t)|U, H) + o(log(ฯ))
2
1
โค log(ฯ) +
max
EH
log |I + Hฮฃx Hโ | โ log(1 + hโ (t)ฮฃx h(t)) + o(log(ฯ))
Tr{ฮฃx }โคฯ,ฮฃx <0
2
(60)
โค log(ฯ) + o(log(ฯ)),
(61)
where (59) follows since h(y(t)|H) โค log(ฯ)+o(log(ฯ)) [34], (60) follows from extremal entropy
inequality [23], [24], [29], and (61) follows from Lemma 1. Hence, the bound (55) is proved.
A similar argument, with the role of the two users reversed, leads to the bound (56).
Remark 4: The inner and outer bounds obtained for the two-user case partially meet, with
the gap diminishing with the coherence time of the dynamic user as shown in Fig. 5 and Fig. 6
for T = 15 and T = 30, respectively.
D. Transmission to arbitrary number of static and dynamic users
Theorem 8: The fading broadcast channel characterized by Eq. (1), with delayed CSIT, can
achieve the multiuser degrees of freedom characterized by vectors Di ,
1
D1 :
1
1 + 2 + ...+
โฒ
m
X
1
mโฒ i=1
eโ i ,
1
2
2
2
D2 , . . . , Dmmโฒ +1 : (1 + )eโ j + (1 โ )eโ mโฒ +i , j = 1, . . . , mโฒ , i = 1, . . . , m,
3
T
3
T
m
m โ
1
m X โ
Dmmโฒ +2 , . . . , Dmmโฒ +mโฒ +2 : ej +
e , j = 1, . . . , mโฒ ,
(1 โ )
T
T i=1 i
1 + 21 + . . . + m1
(62)
(63)
(64)
where ej is the canonical coordinate vector. Their convex hull characterized an achievable degrees
of freedom region.
Proof: The achievability of (62) was proved in Section IV-A via multiuser transmission to
static users. The achievability of (63) was proved in Section IV-C, via a two-user transmission
to a dynamic-static pair.
March 26, 2018
DRAFT
19
1.5
Achievable region
Outer region
1
0.5
0
0
Fig. 5.
0.2
0.4
0.6
0.8
1
1.2
One static and one dynamic with delayed CSIT and T = 15
1.5
Achievable region
Outer region
1
0.5
0
0
Fig. 6.
0.2
0.4
0.6
0.8
1
1.2
One static and one dynamic with delayed CSIT and T = 30
March 26, 2018
DRAFT
20
We now show the achievability of (64) via retrospective interference alignment [11] along with
product superposition. Over a super symbol of length T , consider the following transmission:
X = [U, UV],
(65)
where U โ Cmรm is diagonal and includes m independent symbols intended for the static user j,
and V โ Cmร(T โm) is a super symbol containing independent symbols intended for the dynamic
users according to retrospective interference alignment [11]. Therefore, the static user decodes
U. Thus, over T time instants, the static user achieves m degrees of freedom and the dynamic
users achieve
1
1 (T
1+ 12 +...+ m
โ m), hence (64) is achieved.
Theorem 9: An outer bound on the degrees of freedom of the fading broadcast channel
characterized by Eq. (1), with delayed CSIT, is
โฒ
m
X
dโฒj
di
+
โค 1,
โฒ
m + m i=1 m
(66)
m
m
X
dโฒj X
di
+
โค 1,
โฒ
โฒ
m
m
+
m
j=1
i=1
(67)
m
X
j=1
โฒ
dโฒj โค 1,
โj = 1, . . . , mโฒ ,
(68)
1
, โi = 1, . . . , m.
(69)
T
Proof: The inequalities (68), (69) represent the single-user bounds on the static and the
di โค 1 โ
dynamic users, respectively [26], [34]. The remainder of the proof is dedicated to establishing
the bounds (66) and (67).
We enhance the channel by providing global CSIR as well as allowing full cooperation among
static users and full cooperation among dynamic users. The enhanced channel is equivalent to
a broadcast channel with two users: one static equipped with mโฒ antennas and one dynamic
โฒ
equipped with m antennas. Define Y โฒ โ Cm and Y โ Cm to be the received signals of the
static and the dynamic super-user, respectively, in the enhanced channel. We further enhance
the channel by giving Y to the static user, generating a physically degraded channel since
X โ (Y โฒ , Y) โ Y forms a Markov chain. Feedback including delayed CSIT has no effect
on capacity [33], therefore we remove it from consideration. Subsequently, we can utilize the
Koฬrner-Marton outer bound [27],
โฒ
m
X
Rjโฒ โคI(X; Y โฒ, Y|U, H)
j=1
March 26, 2018
DRAFT
21
m
X
Ri โคI(U; Y|H).
(70)
i=1
Therefore, from applying extremal entropy inequality [23], [29], [35] and Lemma 1,
โฒ
m
X
j=1
m
X
Rjโฒ
1
1
Ri
โฒ
+
โค
I(X;
Y
,
Y|U,
H)
+
I(U; Y|H)
mโฒ + m i=1 m mโฒ + m
m
=
mโฒ
1
1
1
h(Y โฒ, Y|U, H) + o(log(ฯ)) + h(Y|H) โ h(Y|U, H)
+m
m
m
โค log(ฯ) + o(log(ฯ)).
(71)
Therefore, the bound (66) is proved. Similarly, we can prove the bound (67) using the same
steps after switching the roles of the two users in the enhanced channel.
V. H YBRID CSIT: P ERFECT CSIT
FOR THE
S TATIC U SERS
AND
N O CSIT
FOR THE
DYNAMIC U SERS
Theorem 10: The fading broadcast channel characterized by Eq. (1), with perfect CSIT for
the static users and no CSIT for the dynamic users, can achieve the following multiuser degrees
of freedom,
โฒ
D1 :
m
X
eโ j ,
(72)
j=1
โฒ
D2 , . . . , Dm+1
m
1
1X โ
ej + (1 โ )eโ i ,
:
T j=1
T
i = 1, . . . , m.
(73)
Therefore, their convex hull is also achievable.
Proof: D1 is achieved by inverting the channels of the static users at the transmitter and
then every static user achieves one degree of freedom. D2 , . . . , Dm+1 in (73) are achieved using
product superposition along with channel inversion as follows. The transmitted signal over T
instants is,
X = [u, uvโ ],
where u =
Pmโฒ
j=1 bj uj ,
(74)
uj is a symbol intended for the static user j, gjโ bj = 0, and v โ CT โ1
contain independent symbols intended for the dynamic user i. Each of the static users receive
an interference-free signal during the first time instant achieving one degrees of freedom. The
dynamic user estimates its equivalent channel during the first time instant and decodes v during
the remaining (T โ 1) time instants.
March 26, 2018
DRAFT
22
Theorem 11: An outer bound on the degrees of freedom of the fading broadcast channel
characterized by Eq. (1), with perfect CSIT for the static users and no CSIT for the dynamic
users, is
โฒ
m
X
j=1
m
X
dโฒj
+
di โค 1,
mโฒ + 1 i=1
dโฒj โค 1,
m
X
(75)
โj = 1, . . . , mโฒ ,
(76)
1
.
(77)
T
i=1
Proof: The inequalities (76) represent single-user bounds for the static users [34], and (77)
di โค 1 โ
is a time-sharing outer bound for the dynamic users that was established in [7], [18]. It remains
to prove (75), as follows.
We enhance the channel by giving global CSIR to all users and allowing full cooperation
between the static users. This gives rise to an equivalent static user with mโฒ antennas receiving
Y โฒ over an equivalent channel G and noise Zโฒ . At this point, we have a multi-user system where
CSIT is available with respect to one user, but not others. We then bound the performance
of this system with that of another (similar) system that has no CSIT. To do so, we use the
local statistical equivalence property developed and used in [13], [15], [36]. First, we draw
Gฬ, Zฬ according to the distribution of G, Zโฒ and independent of them. We enhance the channel
by providing Yฬ = GฬX + Zฬ to the static receiver and Gฬ to all receivers. Because we do not
provide Gฬ to the transmitter, there is no CSIT with respect to Yฬ. According to [36], we have
h(Yฬ, Y โฒ|H) = h(Y โฒ |H) + o(log(ฯ)), where H = (G, Gฬ, h1 , . . . , hm ), therefore we can remove
Y โฒ from the enhanced channel without reducing its degrees of freedom. This new equivalent
channel has one user with mโฒ antennas receiving (Yฬ, H), m single-antenna users receiving
(yi , H), and no CSIT.4 Having no CSIT, the enhanced channel is in the form of a multilevel
broadcast channel studied in Section III-A, and hence using Theorem 1,
โฒ
m
X
Rjโฒ โคI(W ; Yฬ|U, H) + I(X; Yฬ|U, W, H)
j=1
4
In the enhanced channel after removal of Y โฒ , the transmitter and receivers still share information about G, but this random
variable is now independent of all (remaining) transmit and receive variables.
March 26, 2018
DRAFT
23
R1 โคI(U, W ; y1|V1 , H) โ I(W ; Yฬ|U, H)
Ri โคI(Viโ1 ; yi |Vi , H),
i = 2, . . . , m.
(78)
The dynamic receiver received signals have the same distribution. By following bounding steps
parallel to (22), (23), (24),
m
X
Ri โค log(ฯ) + o(log(ฯ)) โ I(W ; Yฬ|U, H) โ h(y1 |U, W, H).
(79)
j=1
Therefore,
โฒ
m
X
j=1
m
X
Rjโฒ
1
h(Yฬ|U, W, H)
+
R
โค
log(ฯ)
+
o(log(ฯ))
+
(
โ
1)I(W
;
Yฬ|U,
H)
+
i
mโฒ + 1 j=1
mโฒ + 1
mโฒ + 1
โ h(y1 |U, W, H),
โค log(ฯ) + o(log(ฯ)) +
(80)
h(Yฬ, y1 |U, W, H)
โ h(y1 |U, W, H)
mโฒ + 1
โค log(ฯ) + o(log(ฯ)),
(81)
(82)
where the last inequality follows from applying the extremal entropy inequality [23], [29], [35]
and Lemma 1. This concludes the proof of the bound (75).
VI. H YBRID CSIT: P ERFECT CSIT
FOR THE
S TATIC U SERS
AND
D ELAYED CSIT
FOR THE
DYNAMIC U SERS
We begin with inner and outer bounds for one static and one dynamic user, then extend the
result to multiple users. The transmitter knows the channel of the static users perfectly and
instantaneously, and an outdated version of the channel of the dynamic users.
A. Transmitting to One Static and One Dynamic User
Theorem 12: For the fading broadcast channel characterized by Eq. (1) with one static and
one dynamic user, with perfect CSIT for the static user and delayed CSIT for the dynamic user,
the achievable degrees of freedom region is the convex hull of the vectors,
1
1 1
, โ
),
2T 2 2T
1
1
D2 :(dโฒ, d) = ( , 1 โ ).
T
T
D1 :(dโฒ, d) = (1 โ
March 26, 2018
(83)
(84)
DRAFT
24
Proof: The degrees of freedom (84) can be achieved by product superposition as discussed
in Section III, without CSIT. We proceed to prove the achievability of (83).
1) Consider [u1 ,
ยทยทยท ,
uT โ1 ] to be a complex 2 ร (T โ 1) matrix containing symbols
intended for the static user, [v1 , ยท ยท ยท , vT โ1 ] intended for the dynamic user, and b โ C is
a beamforming vector so that gโ b = 0. In addition we define u0 = 0, v0 = 1. Using these
components, the transmitter constructs and transmits a super-symbol of length T , whose
value at time t is:
xโ 1 (t) = ut + b vt .
(85)
Note that x1 (0) = b does not carry any information for either user, and serves as a pilot.
The received super symbol at the static user is:
โฒ
y1โ = [0, gโ u1 , ยท ยท ยท , gโ uT โ1 ].
(86)
The received super symbol at the dynamic user
y1โ =[hโ 1 b, (hโ 1 u1 + hโ 1 bv1 ), ยท ยท ยท , (hโ 1 uT โ1 + hโ 1 bvT โ1 )].
(87)
The dynamic user estimates its equivalent channel hโ 1 b from the received value in the first
time instant. The remaining terms include symbols intended for the dynamic user plus
some interference, whose cancellation is the subject of the next step.
2) The transmitter next sends a second super symbol of length T ,
x2 = [uฬ, uฬ(hโ 1 u1 ), ยท ยท ยท , uฬ(hโ 1 uT โ1 )],
(88)
where uฬ โ C is a symbol intended for the static user. Hence,
y2โ = [h2 uฬ, h2 uฬ(hโ 1 u1 ), ยท ยท ยท , h2 uฬ(hโ 1 uT โ1 )].
(89)
The dynamic user estimates the equivalent channel h2 uฬ during the first time instant and
then acquires hโ 1 ut , the interference in (87). Therefore, using y1 , y2 , the dynamic user
solves for vt achieving (T โ 1) degrees of freedom. Furthermore,
โฒ
y2โ = [g1 uฬ, g1 uฬ(hโ 1 u1 ), ยท ยท ยท , g1 uฬ(hโ 1 uT โ1 )].
(90)
The static user solves for uฬ achieving one degree of freedom and also uses hโ 1 ut to solve
for ut achieving further 2 (T โ 1) degrees of freedom.
March 26, 2018
DRAFT
25
In summary, during 2T instants, the static user achieves (2T โ 1) degrees of freedom and the
dynamic user achieves (T โ 1) degrees of freedom. This shows the achievability of (83).
Theorem 13: For the fading broadcast channel characterized by Eq. (1) with one static and
one dynamic user, where there is perfect CSIT for the static user and delayed CSIT for the
dynamic user, an outer bound on the degrees of freedom region is,
dโฒ
+ d โค1,
2
dโฒ โค1,
(91)
(92)
1
.
(93)
T
Proof: The inequalities (92) and (93) represent the single-user outer bounds [26], [34]. It
d โค1 โ
only remains to prove the outer bound (91), as follows.
1) We enhance the channel by giving global CSIR to both users and also give y to the static
user. The enhanced channel is physically degraded having (Y โฒ , G) at the static user and
(y, G) at the dynamic user, where Y โฒ , (y โฒ, y) and G , (h, g). In a physically degraded
channel, causal feedback (including delayed CSIT) does not affect capacity [33], so we
can remove the delayed CSIT with respect to the dynamic user.
2) We now use another enhancement with the motivation to remove the remaining CSIT (noncausal, with respect to the static user). This is accomplished, similar to Theorem 11, via
local statistical equivalence property [13], [15], [36] in the following manner. We create a
channel Gฬ, and noise Zฬ with the same distribution but independently of the true channel
and noise, and a signal Yฬ = GฬX + Zฬ. A genie will give Yฬ to the static receiver and Gฬ
to both receivers. It has been shown [36] that h(Yฬ, Y โฒ |H) = h(Y โฒ |H) + o(log ฯ), where
H = (G, Gฬ), therefore we can remove Y โฒ from the enhanced channel without reducing
its degrees of freedom.
3) The enhanced channel is still physically degraded, therefore [31], [32]
Rโฒ โคI(x; Yฬ|U, H) = h(Yฬ|U, H) + o(log(ฯ))
R โคI(U; y|H) = h(y|H) โ h(y|U, H),
(94)
where U is an auxiliary random variable, and U โ x โ (y โฒ , y) forms a Markov chain.
Therefore,
1
1 โฒ
R + R โคh(y|H) + h(Yฬ|U, H) โ h(y|U, H) + o(log(ฯ))
2
2
March 26, 2018
DRAFT
26
1.5
Achievable region
Outer region
1
0.5
0
0
Fig. 7.
0.2
0.4
0.6
0.8
1
1.2
One static and one dynamic user with hybrid CSIT and T = 15
โค log(ฯ) + o(log(ฯ)),
(95)
where the last inequality follows from extremal entropy inequality and Lemma 1 [23],
[29], [35]. This concludes the proof of the bound (91).
Remark 5: For the above broadcast channel with hybrid CSIT, the achievable sum degrees of
freedom is dsum =
3
2
โ T1 , and the outer bound on the sum degrees of freedom is dsum โค 32 . The
gap decreases with the dynamic user coherence time (see Fig. 7 and 8).
B. Multiple Static and Dynamic Users
Theorem 14: The fading broadcast channel characterized by Eq. (1), with perfect CSIT for
the static users and delayed CSIT for the dynamic users, can achieve the following degrees of
freedom,
โฒ
D1 :
m
X
eโ j ,
(96)
j=1
D2 , . . . , Dmmโฒ +1 : (1 โ
March 26, 2018
1
1 โ
1 โ
)ej + ( โ
)e ,
2T
2 2T i
j = 1, . . . , mโฒ , i = 1, . . . , m,
(97)
DRAFT
27
1.5
Achievable region
Outer region
1
0.5
0
0
Fig. 8.
0.2
0.4
0.6
0.8
1
1.2
One static and one dynamic user with hybrid CSIT and T = 30
โฒ
Dmmโฒ +2 , . . . , Dmmโฒ +m+2
mโฒ
Dmmโฒ +m+3
m
1
1X โ
ej + (1 โ )eโ i ,
:
T j=1
T
mX โ
1
:
ej + (
1
T j=1
1 + 2 + ...+
i = 1, . . . , m,
(98)
m
m X โ
(1
โ
))
e.
1
T i=1 i
m
(99)
The achievable region consists of the convex hull of the above vectors.
Proof: D1 is achieved by inverting the channel of the static users at the transmitter, providing
one degree of freedom per static user. The achievability of D2 , . . . , Dmmโฒ +1 was established in
Section VI-A, and that of Dmmโฒ +2 , . . . , Dmmโฒ +m+2 was proved in Section V without CSIT for the
dynamic user, so it remains achievable with delayed CSIT. Dmmโฒ +m+3 is achieved by retrospective
interference alignment [11] along with product superposition, as follows. The transmitted signal
over T instants is
X = [Uฬ, UฬV],
(100)
where Uฬ โ Cmรm contains independent symbols intended for the static users sent by inverting the
channels of the static users. Therefore, during the first m time instants, each static user receives
an interference-free signal and achieves m degree of freedom, and furthermore the dynamic users
estimate their equivalent channels. During the remaining time instants, each dynamic receiver
March 26, 2018
DRAFT
28
obtains coherent observations of (T โ m) transmit symbols, which are pre-processed, combined
and interference-aligned into super-symbols V according to retrospective interference alignment
techniques of [11]. Accordingly, each dynamic receiver achieves
1
1 (1
1+ 12 +...+ m
โ
m
)
T
degrees of
freedom.
Theorem 15: An outer bound on the degrees of freedom region of the fading broadcast channel
characterized by Eq. (1), with perfect CSIT for the static users and delayed CSIT for the dynamic
users, is
โฒ
m
X
j=1
m
X
dโฒj
di
+
โค 1,
โฒ
m + m i=1 m
m
X
i=1
di โค
1+
dโฒj โค 1,
(101)
1
2
m
+ ...+
1
m
,
j = 1, . . . , mโฒ ,
(102)
(103)
1
,
i = 1, . . . , m.
(104)
T
Proof: The inequalities (103) and (104) represent the single-user outer bounds for the static
di โค 1 โ
and dynamic users, respectively [26], [34]. According to Theorem 5, (102) represents an outer
bound for the dynamic users. It only remains to prove (101) as follows.
1) The original channel is enhanced by giving the users global CSIR. Furthermore, we assume
full cooperation between the static users and between the dynamic users. The resulting
enhanced channel is a broadcast channel with two users: one static user equipped with
mโฒ antennas, received signal Y โฒ , channel G, and noise noise Zโฒ , and one dynamic user
equipped with m antennas, received signal Y, channel H, and noise Z.
2) We further enhance the channel by giving Y to the static user, constructing a physically
degraded channel. For the enhanced channel, the static receiver is equipped with mโฒ + m
โฒ
antennas and has received signal Yฬ = [Y โ , Y โ ]โ , channel Gฬ = [Gโ , Hโ ]โ , and noise
โฒ
Zฬ = [Zโ , Z โ ]โ . Since any causal feedback (including delayed CSIT) does not affect the
capacity of a physically degraded channel [33], the delayed CSIT for the dynamic receiver
can be removed.
3) We now use another enhancement with the motivation to remove the remaining CSIT
(non-causal, with respect to the static user). We create an artificial channel and noise, Gฬ,
Zฬ, with the same distribution but independent of Gฬ, Zฬ, and a signal Yฬ = GฬX + Zฬ. A
March 26, 2018
DRAFT
29
genie will give Yฬ to the static receiver and Gฬ to both receivers. It has been shown [36]
that h(Yฬ, Yฬ|H) = h(Yฬ|H) + o(log ฯ), where H = (Gฬ, Gฬ), therefore we can remove Yฬ
from the enhanced channel without reducing its degrees of freedom.
4) The enhanced channel is physically degraded without CSIT, therefore [31], [32],
โฒ
m
X
Rjโฒ โค I(X; Yฬ|U, H)
m
X
Ri โค I(U; Y|H).
j=1
(105)
i=1
Hence,
โฒ
m
X
j=1
m
X
Rjโฒ
1
1
1
Ri
+
โค โฒ
h(Yฬ|U, H) + h(Y|H) โ h(Y|U, H) + o(log(ฯ))
โฒ
m + m j=1 m m + m
m
m
โค log(ฯ) + o(log(ฯ)),
(106)
where the last inequality follows from the extremal entropy inequality [23], [29], [35] and
Lemma 1 and since h(Y|H) โค m log(ฯ) + o(log(ฯ)) [34]. This concludes the proof of the
bound (101).
VII. C ONCLUSION
A multiuser broadcast channel was studied where some receivers experience longer coherence
intervals and have CSIR while other receivers experience a shorter coherence interval and do not
enjoy free CSIR. The degrees of freedom were studied under delayed CSIT, hybrid CSIT, and
no CSIT. Among the techniques employed were interference alignment and beamforming along
with product superposition for the inner bounds. The outer bounds involved a bounding of the
rate region of the multiuser (discrete memoryless) multilevel broadcast channel. Some highlights
of the results are: for one static and one dynamic user with delayed CSIT, the achievable degrees
of freedom region partially meets the outer bound. For one static user with perfect CSIT and one
dynamic user with delayed CSIT, the gap between the achievable and the outer sum degrees of
freedom is inversely proportional to the dynamic user coherence time. For each of the considered
CSI conditions, inner and outer bounds were also found for arbitrary number of users.
From these results we conclude that in the broadcast channel, coherence diversity delivers gains
that are distinct from, and augment, the gains from beamforming and interference alignment.
March 26, 2018
DRAFT
30
The authors anticipate that the tools and results of this paper can be helpful for future studies
of hybrid CSIT/CSIR in other multi-terminal networks.
A PPENDIX I
P ROOF
OF
T HEOREM 1
Recall, Mjโฒ , Mi are the messages of users j = 1, . . . , mโฒ and i = 1, . . . , m, respectively. We
โฒ
โฒ
enhance the channel by assuming that user j = 1, . . . , mโฒ knows the messages Mj+1
, . . . , Mm
โฒ
and M1 , . . . , Mm and user i = 1, . . . , m knows the messages Mi+1 , . . . , Mm . Using Fanoโs
inequality, chain rule, and data processing inequality we can bound the rates of the static user
j = 1, . . . , mโฒ ,
โฒ
โฒ
โฒ
โฒ
nRjโฒ โค I(Mjโฒ ; Yj,1
, . . . , Yj,n
|Mj+1
, . . . , Mm
โฒ , M1 , . . . , Mm )
(107)
=
n
X
โฒ
I(Mjโฒ ; Yj,k
|Uj,k )
(108)
โค
n
X
โฒ
โฒ
โฒ
I(Mjโฒ , Uj,k , Yjโ1,1
, . . . , Yjโ1,kโ1
; Yj,k
|Uj,k )
(109)
=
n
X
โฒ
I(Ujโ1,k ; Yj,k
|Uj,k )
(110)
k=1
k=1
k=1
where
โฒ
โฒ
โฒ
โฒ
, . . . , Mm
Uj,k = Mj+1
โฒ , M1 , . . . , Mm , Yj,1 , . . . , Yj,kโ1 ,
โฒ
denotes the received signal of user j at time instant k,
Yj,k
Umโฒ โ ยท ยท ยท โ U1 โ X โ (Y1โฒ , . . . , Ymโฒ โฒ , Y1 , . . . , Ym)
forms a Markov chain, and U0 = X. The rate of static user mโฒ can be bounded as
n
X
โฒ
I(Umโฒ โ1,k ; Ymโฒ โฒ ,k |Umโฒ ,k )
nRmโฒ โค
=
โค
=
k=1
n
X
k=1
n
X
k=1
n
X
k=1
March 26, 2018
I(Xk ; Ymโฒ โฒ ,k |Umโฒ ,k )
โ
n
X
I(Xk ; Ymโฒ โฒ ,k |Umโฒ โ1,k )
(111)
(112)
k=1
I(Xk , Y1,k+1, . . . , Y1,n ; Ymโฒ โฒ ,k |Umโฒ ,k )
โ
n
X
I(Xk ; Ymโฒ โฒ ,k |Umโฒ โ1,k )
(113)
k=1
I(Y1,k+1, . . . , Y1,n ; Ymโฒ โฒ ,k |Umโฒ ,k )
+
n
X
I(Xk ; Ymโฒ โฒ ,k |Umโฒ ,k , Y1,k+1, . . . , Y1,n )
k=1
DRAFT
31
โ
n
X
I(Xk ; Ymโฒ โฒ ,k |Umโฒ โ1,k )
(114)
k=1
=
n
X
I(Wk ; Ymโฒ โฒ ,k |Umโฒ ,k )
+
n
X
I(Xk ; Ymโฒ โฒ ,k |Umโฒ ,k , Wk )
I(Xk ; Ymโฒ โฒ ,k |Umโฒ โ1,k ),
k=1
k=1
k=1
โ
n
X
(115)
n
where Wk = Y1,k+1
. Similarly,
nRi โคI(Mi ; Yi,1, . . . , Yi,n |Mi+1 , . . . , Mm )
=
=
=
n
X
k=1
n
X
k=1
n
X
(116)
I(Mi ; Yi,k |Vi,k )
(117)
I(Mi , Vi,k , Yiโ1,k+1, . . . , Yiโ1,n ; Yi,k |Vi,k )
(118)
I(Viโ1,k ; Yi,k |Vi,k ),
(119)
k=1
where we define Vi,k , (Mi+1 , . . . , Mm , Yi,k+1, . . . , Yi,n ), which leads to the Markov chain Vm โ
ยท ยท ยท โ V1 โ (Umโฒ , W ) โ X โ (Y1โฒ , . . . , Ymโฒ โฒ , Y1 , . . . , Ym ) . Using the chain rule and Csiszaฬr
sum identity [37], we obtain the bound (125).
R1 โค
n
X
I(M1 , . . . , Mm ; Y1,k |V1,k )
(120)
โค
n
X
I(M1 , . . . , Mm , Y1,k+1, . . . , Y1,n ; Y1,k |V1,k )
(121)
=
n
X
I(M1 , . . . , Mm , Y1,k+1, . . . , Y1,n , Ymโฒ โฒ ,1 , . . . , Ymโฒ โฒ ,kโ1 ; Y1,k |V1,k )
(122)
k=1
k=1
k=1
โ
n
X
I(Ymโฒ โฒ ,1 , . . . , Ymโฒ โฒ ,kโ1; Y1,k |M1 , . . . , Mm , Y1,k+1, . . . , Y1,n )
(123)
k=1
=
n
X
=
n
X
I(Umโฒ ,k , Wk ; Y1,k |V1,k ) โ
n
X
I(Y1,k+1, . . . , Y1,n ; Ymโฒ โฒ ,k |Umโฒ ,k )
(124)
I(Umโฒ ,k , Wk ; Y1,k |V1,k ) โ
n
X
I(Wk ; Ymโฒ โฒ ,k |Umโฒ ,k ).
(125)
k=1
k=1
k=1
k=1
By introducing a time-sharing auxiliary random variable, Q, [38] and defining
X ,(XQ , Q),
March 26, 2018
โฒ
Yjโฒ , (Yj,Q
, Q)
DRAFT
32
Yi ,(Yi,Q , Q),
Ui , (Ui,Q , Q)
Vj ,(Vj,Q , Q),
W , (WQ , Q),
(126)
we establish (7)-(10). Similarly, we can follow the same steps to prove (11)-(14) after switching
the role of the two sets of variables Y1โฒ , . . . , Ymโฒ โฒ and Y1 , . . . , Ym . This completes the proof of
Theorem 1.
A PPENDIX II
M ULTILEVEL B ROADCAST C HANNEL
WITH
D EGRADED M ESSAGE S ETS
Here, we study the capacity of the multiuser multilevel broadcast channel that is characterized
by (6) with degraded message sets. In particular, M0 โ 1 : 2nR0 is to be communicated to
all receivers, and furthermore M1 โ 1 : 2nR1 is to be communicated to receiver Y1 .5 A threereceiver special case was studied by Nair and El Gamal [22] where the idea of indirect decoding
was introduced, and the capacity is the set of rate pairs (R1 , R0 ) such that
R0 โค min I(U; Y2 ), I(V ; Y1โฒ ) ,
R1 โคI(X; Y1|U),
R0 + R1 โคI(V ; Y1โฒ ) + I(X; Y1|V ),
(127)
for some pmf p(u, v)p(x|v). In the sequel, we give a generalization of Nair and El Gamal for
multiuser multilevel broadcast channel.
Theorem 16: The capacity of multiuser multilevel broadcast channel characterized by (6),
with degraded message sets, is the set of rate pairs (R1 , R0 ) such that
R0 โค min I(U; Ym ), I(V ; Ymโฒ โฒ ) ,
R1 โคI(X; Y1|U),
R0 + R1 โคI(V ; Ymโฒ โฒ ) + I(X; Y1 |V ),
(128)
for some pmf p(u, v)p(x|v).
Proof: The converse parallels the proof of the converse of the three-receiver case studied
by Nair and El Gamal in [22] after replacing Y2 , Y1โฒ with Ym , Ymโฒ โฒ , respectively. In particular, U
5
For compactness of expression, here we refer to each receiver by the variable denoting its received signal.
March 26, 2018
DRAFT
33
and V are defined as follows.
Uk , (M0 , Y1,1, . . . , Y1,kโ1, Ym,k+1, . . . , Ym,n ),
Vk , (M0 , Y1,1, . . . , Y1,kโ1, Ymโฒ โฒ ,k+1, . . . , Ymโฒ โฒ ,n ),
k = 1, . . . , n, and let Q be a time-sharing random variable uniformly distributed over the
set {1, . . . , n} and independent of X n , Y1n , Ym,1 , . . . , Ym,n , Ymโฒ โฒ ,1 , . . . , Ymโฒ โฒ ,n . We then set U =
(UQ , Q), V = (VQ , Q), X = XQ , Y1 = Y1,Q , Ym = Ym,Q , and Ymโฒ โฒ = Ymโฒ โฒ ,Q . This completes the
converse part of the proof.
The achievability part uses superposition coding and indirect decoding as follows.
โข
Rate splitting: divide the private message M1 into two independent messages M10 at rate
R10 and M11 at rate R11 , where R1 = R10 + R11 .
โข
Codebook generation: fix a pmf p(u, v)p(x|v) and randomly and independently generate
Q
2nR0 sequences un (m0 ), m0 โ 1 : 2nR0 , each according to nk=1 pU (uk ). For each m0 ,
randomly and conditionally independently generate 2nR10 sequences v n (m0 , m10 ), m10 โ [1 :
Q
2nR10 ], each according to nk=1 pV |U (vk |uk (m0 )). For each pair (m0 , m10 ), randomly and
conditionally independently generate 2nR11 sequences xn (m0 , m10 , m11 ), m11 โ [1 : 2nR11 ],
Q
each according to nk=1 pX|V (xk |vk (m0 , m10 )).
โข
Encoding: to send the message pair (m0 , m1 ) = (m0 , m10 , m11 ), the encoder transmits
xn (m0 , m10 , m11 ).
โข
Decoding at the users Y2 , . . . , Ym : decoder i declares that mฬ0i โ [1 : 2nR0 ] is sent if it is
(n)
the unique message such that (un (mฬ0i ), yin) โ Tวซ . Hence, by law of large numbers and
the packing lemma [38], the probability of error tends to zero as n โ โ if
R0 <
min {I(U; Yi ) โ ฮด(วซ)},
2โคiโคm
= I(U; Ym ) โ ฮด(วซ),
(129)
where the last equality follows from applying data processing inequality on the Markov
chain U โ X โ Y1 โ Y2 โ ยท ยท ยท โ Ym .
โข
Decoding at Y1 : decoder 1 declares that (mฬ01 , mฬ10 , mฬ11 ) is sent if it is the unique message
triple such that un (mฬ01 ), v n (mฬ01 , mฬ10 ), xn (mฬ01 , mฬ10 , mฬ11 ), y1n โ [1 : 2nR0 ]. Hence, by law
of large numbers and the packing lemma [38], the probability of error tends to zero as
March 26, 2018
DRAFT
34
n โ โ if
R11 < I(X; Y1|V ) โ ฮด(วซ),
R10 + R11 < I(X; Y1|U) โ ฮด(วซ),
R0 + R10 + R11 < I(X; Y1) โ ฮด(วซ).
โข
(130)
Decoding at users Y1โฒ , . . . , Ymโฒ โฒ : decoder j decodes m0 indirectly by declaring mฬ0j is sent
(n)
if it is the unique message such that (un (mฬ0j ), v n (mฬ0j , m10 ), zjn ) โ Tวซ
for some m10 โ
[1 : 2nR0 ]. Hence, by law of large numbers and packing lemma, the probability of error
tends to zero as n โ โ if
R0 + R10 <
min
{I(U, V ; Yjโฒ ) โ ฮด(วซ)},
min
{I(V ; Yjโฒ ) โ ฮด(วซ)},
1โคjโคmโฒ
=
1โคjโคmโฒ
= I(V ; Ymโฒ โฒ ) โ ฮด(วซ),
(131)
where the last two equalities follow from applying the chain rule and data processing
inequality on the Markov chain U โ V โ X โ Y1โฒ โ Y2โฒ โ ยท ยท ยท โ Ymโฒ โฒ .
By combining the bounds in (129), (130), (131), substituting R10 + R11 = R1 , and eliminating
R10 and R11 by the Fourier-Motzkin procedure [22], the proof of the achievability is completed.
R EFERENCES
[1] M. Fadel and A. Nosratinia, โBlock-fading broadcast channel with hybrid CSIT and CSIR,โ in IEEE International
Symposium on Information Theory (ISIT), June 2017, pp. 1873โ1877.
[2] C. Huang, S. Jafar, S. Shamai, and S. Vishwanath, โOn degrees of freedom region of MIMO networks without channel
state information at transmitters,โ IEEE Trans. Inf. Theory, vol. 58, no. 2, pp. 849โ857, Feb. 2012.
[3] C. Vaze and M. Varanasi, โThe degree-of-freedom regions of MIMO broadcast, interference, and cognitive radio channels
with no CSIT,โ IEEE Trans. Inf. Theory, vol. 58, no. 8, pp. 5354โ5374, Aug. 2012.
[4] A. Lapidoth, S. Shamai, and M. Wigger, โOn the capacity of fading MIMO broadcast channels with imperfect transmitter
side-information,โ arXiv preprint cs/0605079, 2006.
[5] S. Jafar, โBlind interference alignment,โ IEEE J. Sel. Topics Signal Process., vol. 6, no. 3, pp. 216โ227, June 2012.
[6] M. Fadel and A. Nosratinia, โBroadcast channel under unequal coherence intervals,โ in IEEE International Symposium on
Information Theory (ISIT), July 2016, pp. 275โ279.
[7] โโ, โCoherence disparity in broadcast and multiple access channels,โ IEEE Trans. Inf. Theory, vol. 62, no. 12, pp.
7383โ7401, Dec. 2016.
March 26, 2018
DRAFT
35
[8] G. Caire and S. Shamai, โOn the achievable throughput of a multiantenna Gaussian broadcast channel,โ IEEE Trans. Inf.
Theory, vol. 49, no. 7, pp. 1691โ1706, July 2003.
[9] H. Weingarten, Y. Steinberg, and S. Shamai, โThe capacity region of the Gaussian multiple-input multiple-output broadcast
channel,โ IEEE Trans. Inf. Theory, vol. 52, no. 9, pp. 3936โ3964, Sept. 2006.
[10] A. Davoodi and S. Jafar, โAligned image sets under channel uncertainty: Settling a conjecture by Lapidoth, Shamai and
Wigger on the collapse of degrees of freedom under finite precision CSIT,โ arXiv preprint arXiv:1403.1541, 2014.
[11] M. Maddah-Ali and D. Tse, โCompletely stale transmitter channel state information is still very useful,โ IEEE Trans. Inf.
Theory, vol. 58, no. 7, pp. 4418โ4431, July 2012.
[12] T. Gou and S. Jafar, โOptimal use of current and outdated channel state information: Degrees of freedom of the MISO
BC with mixed CSIT,โ IEEE Commun. Lett., vol. 16, no. 7, pp. 1084โ1087, July 2012.
[13] R. Tandon, M. A. Maddah-Ali, A. Tulino, H. V. Poor, and S. Shamai, โOn fading broadcast channels with partial channel
state information at the transmitter,โ in International Symposium on Wireless Communication Systems (ISWCS), Aug. 2012,
pp. 1004โ1008.
[14] S. Amuru, R. Tandon, and S. Shamai, โOn the degrees-of-freedom of the 3-user MISO broadcast channel with hybrid
CSIT,โ in IEEE International Symposium on Information Theory (ISIT), 2014, pp. 2137โ2141.
[15] R. Tandon, S. Jafar, S. Shamai, and V. Poor, โOn the synergistic benefits of alternating CSIT for the MISO broadcast
channel,โ IEEE Trans. Inf. Theory, vol. 59, no. 7, pp. 4106โ4128, July 2013.
[16] Y. Li and A. Nosratinia, โProduct superposition for MIMO broadcast channels,โ IEEE Trans. Inf. Theory, vol. 58, no. 11,
pp. 6839โ6852, Nov. 2012.
[17] โโ, โCoherent product superposition for downlink multiuser MIMO,โ IEEE Trans. Wireless Commun., vol. PP, no. 99,
pp. 1โ9, 2014.
[18] M. Fadel and A. Nosratinia, โCoherent, non-coherent, and mixedโCSIR broadcast channels: Multiuser degrees of freedom,โ
in IEEE International Symposium on Information Theory (ISIT), June 2014, pp. 2574โ2578.
[19] โโ, โCoherence disparity in time and frequency,โ in Proc. IEEE Global Telecommunication Conference (GLOBECOMโ16), Dec. 2016, pp. 1โ6.
[20] F. Zhang, M. Fadel, and A. Nosratinia, โSpatially correlated MIMO broadcast channel: Analysis of overlapping correlation
eigenspaces,โ in IEEE International Symposium on Information Theory (ISIT), June 2017, pp. 1097โ1101.
[21] S. Borade, L. Zheng, and M. Trott, โMultilevel broadcast networks,โ in IEEE International Symposium on Information
Theory (ISIT), June 2007, pp. 1151โ1155.
[22] C. Nair and A. Gamal, โThe capacity region of a class of three-receiver broadcast channels with degraded message sets,โ
IEEE Trans. Inf. Theory, vol. 55, no. 10, pp. 4479โ4493, Oct. 2009.
[23] T. Liu and P. Viswanath, โAn extremal inequality motivated by multiterminal information-theoretic problems,โ IEEE Trans.
Inf. Theory, vol. 53, no. 5, pp. 1839โ1851, May 2007.
[24] R. Liu, T. Liu, V. Poor, and S. Shamai, โA vector generalization of Costaโs entropy-power inequality with applications,โ
IEEE Trans. Inf. Theory, vol. 56, no. 4, pp. 1865โ1879, Apr. 2010.
[25] T. Marzetta and B. Hochwald, โCapacity of a mobile multiple-antenna communication link in Rayleigh flat fading,โ IEEE
Trans. Inf. Theory, vol. 45, no. 1, pp. 139โ157, Jan. 1999.
[26] L. Zheng and D. Tse, โCommunication on the Grassmann manifold: a geometric approach to the noncoherent multipleantenna channel,โ IEEE Trans. Inf. Theory, vol. 48, no. 2, pp. 359โ383, Feb. 2002.
March 26, 2018
DRAFT
36
[27] K. Marton, โA coding theorem for the discrete memoryless broadcast channel,โ IEEE Trans. Inf. Theory, vol. 25, no. 3,
pp. 306โ311, May 1979.
[28] S. Yang, M. Kobayashi, D. Gesbert, and X. Yi, โDegrees of freedom of time correlated MISO broadcast channel with
delayed CSIT,โ IEEE Trans. Inf. Theory, vol. 59, no. 1, pp. 315โ328, Jan. 2013.
[29] X. Yi, S. Yang, D. Gesbert, and M. Kobayashi, โThe degrees of freedom region of temporally correlated MIMO networks
with delayed CSIT,โ IEEE Trans. Inf. Theory, vol. 60, no. 1, pp. 494โ514, Jan. 2014.
[30] C. Shannon, โThe zero error capacity of a noisy channel,โ IEEE Trans. Inf. Theory, vol. 2, no. 3, pp. 8โ19, Sept. 1956.
[31] P. Bergmans, โRandom coding theorem for broadcast channels with degraded components,โ IEEE Trans. Inf. Theory,
vol. 19, no. 2, pp. 197โ207, Mar. 1973.
[32] โโ, โA simple converse for broadcast channels with additive white Gaussian noise,โ IEEE Trans. Inf. Theory, vol. 20,
no. 2, pp. 279โ280, Mar. 1974.
[33] A. E. Gamal, โThe feedback capacity of degraded broadcast channels (corresp.),โ IEEE Trans. Inf. Theory, vol. 24, no. 3,
pp. 379โ381, May 1978.
[34] E. Telatar, โCapacity of multi-antenna Gaussian channels,โ European transactions on telecommunications, vol. 10, no. 6,
pp. 585โ595, 1999.
[35] H. Weingarten, T. Liu, S. Shamai, Y. Steinberg, and P. Viswanath, โThe capacity region of the degraded multiple-input
multiple-output compound broadcast channel,โ IEEE Trans. Inf. Theory, vol. 55, no. 11, pp. 5011โ5023, Oct. 2009.
[36] P. Mukherjee, R. Tandon, and S. Ulukus, โSecure degrees of freedom region of the two-user MISO broadcast channel with
alternating CSIT,โ IEEE Trans. Inf. Theory, vol. PP, no. 99, pp. 1โ1, Apr. 2017.
[37] I. Csiszaฬr and J. Koฬrner, โInformation theory : Coding theorems for discrete memoryless channels,โ Budapest: Akadeฬmiai
Kiadoฬ, 1981.
[38] A. E. Gamal and Y. Kim, Network information theory.
March 26, 2018
Cambridge University Press, 2011.
DRAFT
| 7cs.IT
|
arXiv:1208.3882v1 [cs.DC] 19 Aug 2012
Coordination Level Modeling and Analysis of
Parallel Programs using Petri Nets
Francisco Heron de Carvalho-Junior
Departamento de Computacฬงaฬo
Universidade Federal do Cearaฬ (UFC)
Fortaleza, Brazil
Rafael Dueire Lins
Centro de Informaฬtica
Universidade Federal de Pernambuco
Recife, Brazil
March 2005
Abstract
In the last fifteen years, the high performance computing (HPC) community has claimed for parallel programming environments that reconciles generality, higher level of abstraction, portability, and efficiency for
distributed-memory parallel computing platforms. The Hash component
model appears as an alternative for addressing HPC community claims
for fitting these requirements. This paper presents foundations that will
enable a parallel programming environment based on the Hash model to
address the problems of โdebuggingโ, performance evaluation and verification of formal properties of parallel program by means of a powerful,
simple, and widely adopted formalism: Petri nets.
1
Introduction
Haskell# is a parallel extension to Haskell [6], the most widely used non-strict
pure functional programming language [25]. It makes possible the coordination
of a set of functional processes written in Haskell through a configuration language, called HCL (Haskell# Configuration Language). Thus, Haskell# separate the programming task in two levels: the computation level, where functional
processes are written in Haskell, and the coordination level, where functional
processes are coordinated. The coordination media of Haskell# is also called
the Hash component model. In recent works, we have generalized the Hash component model in order to support other programming languages than Haskell
at the computation level. Functional processes are now units, possibly written
1
in any programming language supported by a programming environment that
complies to the Hash component model. In this paper, we still suppose that
units are the functional processes of Haskell#.
The coordination level of Haskell# , i. e. the Hash component model, was designed in order to make possible to translate the coordination media of Haskell#
programs onto Petri nets. This paper addresses the issue of presenting a translation schema for that, demonstrating its use to formal analysis of them, involving
verification of formal properties. The use of Petri nets allows for reusing existing
automatic tools based on this formalisms for reasoning about Hash programs,
such as PEP [4] and INA [21]. Further extensions could make possible performance evaluation using timed or stochastic Petri Nets variants [14, 26].
In the rest of the paper, we use the Hash component model to refer to the
coordination level of Haskell# , i.e. it is assumed that functional processes are
written in Haskell (functional modules) and they communicate through either
stream-based or singleton communication channels that link their input and
output ports. Such concepts are not present in the general definition of the
Hash component model.
In additional to this introduction, this paper comprises the following sections. Section 2 presents additional details about the Hash component model.
Section 3 presents a translation schema of Hash programs onto Petri nets. Section 4 demonstrates how Petri net models of Hash programs may be used for
verification of formal concurrency properties of Hash programs.
2
The Hash Component Model
Distributed parallel programs may be viewed as collections of processes that interact by exchanging messages during execution. Current programming models
provide the ability to describe computation of processes by augmenting common languages with notations for explicit message passing. However, they do
not provide ability to modularize concerns that appear in the design of parallel applications, including the concern of parallelism itself, which are scattered
across the implementation of processes. We advocate that this is the key feature
for integrating advanced software engineering techniques in the development environment of HPC parallel applications. In sequential programming, the focus
is on modularization of concerns, since there are a unique conceptual โprocessโ
and efficiency requirements are less restrictive. This is the essential difference
that makes sequential programming actually more suitable for current software
engineering techniques for large scale applications than current parallel programming.
The Hash component model may be viewed as a new paradigm for developing message passing programs. Now, they may be viewed from two orthogonal
perspective dimensions: the dimension of processes and the dimension of components.
A process correspond to the related notion derived from conventional message passing programming. Thus, they are agents that perform computational
2
tasks, communicating through communication channels. Conceptually, Hash
channels, like in OCCAM [17], are point-to-point, synchronous, typed and unidirectional. Bounded buffers are also supported. The disciplined use of channels
is the feature that makes possible formal analysis of parallel programs by using
Petri nets, the main topic of this paper.
A component is an abstract entity that address a functional or non-functional
concern of the application or its execution environment in the parallel program.
A component describe the role of a set of processes with respect to a given
concern. The sets of components that respectively implement a set of concerns
may overlap, allowing for modular separation of concerns that are interlaced
across implementation of processes (cross-cutting concerns). The separation of
cross-cutting concerns is an active research area in object-oriented programming of large scale applications [19]. A Hash program is defined by a main
component that address the overall application concern. Some common examples of cross-cutting non-functional concerns that appears in HPC applications
are: placement of processes onto processors, secure policies for accessing computing resources on grids, fault-tolerance schemes for long-running applications,
parallel debugging, execution timing, and so on.
Hash programming is performed from the perspective of components, instead
of processes, but resulting in the specification of the topology of a network of
parallel processes.
Components may be composed or simple. Composed components are programmed using the Hash configuration language (HCL), being built by hierarchical composition of other components, called inner components. HCL may be
viewed as a language for gluing and orchestrating components, i.e. a connector language. It is distinguished from other compositional languages because it
supports composition of parallel components by overlapping the concerns they
address. Conventional compositional languages only allows nested composition
of sequential components. Simple components addresses functional concerns,
implemented using a host language, supposed to be sequential. Simple components are the atoms of functionality in Hash programs, constituting the leaves
in their component hierarchy.
The Hash component model supports parallel programming with skeletons
[11] without any additional language support. Partial topological skeletons may
expose topological patterns of interaction between processes in a Hash program,
which may be used to produce more efficient code for specific architectures and
execution environments [8]. They are implemented as composed components
parameterized by their addressed concerns.
The Hash component model has origins in Haskell# [6], where the host language used to program simple components is Haskell. Haskell enables separation
between coordination and computation code, by attaching lazy streams to communication channels at coordination level, avoiding the use of communication
primitives in communication code [5]. This paper on focused in Haskell# .
In the next section, it is described how composed components, and skeletons, are programmed using Hash configurations, while programming of simple
components, in Haskell, is described in Section 2.2.
3
# Programming
Message Passing Programming
(Efficient, Portable, Expressive)
(Structured, High Level of Abstraction)
# Program
recv!
recv! send!
# compiler
โ code generation โ
# compiler
โ unfolding โ
send!
computable
computable
computable
send!
send!
send!
send!
recv!
recv!
recv! send!
send!
nonโcomputable
Unit
send!
Process
# Process
Process View
Component View
Process View
concerns are scattered among processes,but
it is possible to factorize them into components
concerns are encapsulated into components
send!
recv! send!
Process Slice
Port
Channel
recv!
recv!
requires
programmer
intervention
Component
recv!
recv!
recv!
concerns are scattered among processes and
it is not possible to factorize them into components
Figure 1: Component Perspective versus Process Perspective
2.1
Programming Composed Components
Composed components define coordination media of Haskell# programs, where
all parallelism concerns are addresses without mention to entities at computation
levels, where computations are specified. Composed components are written in
HCL (Hash Configuration Language). Also, they define the core of the Hash
component model, supported by Haskell#.
The configuration of a composed component specifies how a collection units,
agents that perform specific tasks, interact by means of point-to-point, typed,
and unidirectional communication channels, for addressing a given parallel programming concern. For that, a unit is instantiated from an interface and associated to a component (Figure 2). The latter specifies the task performed
by the unit, since functional modules describe addressed concerns, while the
former specifies how the unit interacts with the coordination medium. A unit
associated with a simple component is called process, while a unit associated
with a composed component is called a cluster. A interface of a unit is defined
by a set of typed input and output ports and a protocol. The protocol of an
interface specifies the order in which ports may be activated during execution of
the units instantiated from that interface, by means of an embedded language
whose constructors have semantic equivalence to regular expressions controlled
by semaphores. This formalism is equivalent to place/transition Petri nets, allowing for formal property analysis, simulation and performance evaluation of
programs using available Petri net tools [10], such as PEP [16] and INA [21].
A port is activated between the time in which it becomes ready to perform a
Assignmennt
Instantiation
interface declaration
Unit (nonโvirtual)
Virtual Unit
Interface or Interface Class
unit declaration
assign declaration
Figure 2: Instantiating and Configuring a Unit
4
A
C
e
b
F
d
F
unification
A
CDE
B
D
a
e
a
e
b
G
d
B
b
G
c
factorization
E
c
Figure 3: Unification/Factorization
communication operation and the time it completes this operation, according
to the communication mode of the channel where the port is connected.
Units interact through communication channels, which connect an output
port from an unit (transmitter ) to an input port of another one (receiver ). The
types of the connected ports must be the same. The supported communication
modes, inspired on MPI, are : synchronous, buffered and ready.
In a unit specification, interface ports can be replicated to form groups.
Groups may be of two kinds: any and all, according to the semantics of activation. The activation of a group of ports of kind all implies activation of all
its port members. The activation of a group of ports of kind any implies that
one of the port members will be put ready for communication but only one will
complete communication. The chosen port is one of the activated ports whose
communication pairs are also activated at that instant. From the internal perspective of the unit, groups are treated as indivisible entities, while from the
perspective of the coordination medium, port members are referred directly in
order to forming channels. Input and output ports (groups individually) of the
unit interface must be mapped to arguments and return points of the component
assigned to it, respectively. Wire functions are useful when it is necessary to
transform values at the boundary between ports and arguments/exit points. A
particularly useful use of wire functions is to aggregate data received from input
ports belonging to a group of ports of kind all to a unique value, passed to the
associated argument. Similarly, wire functions allow that a value produced in
an exit point to be mapped onto a collection of values in order to be sent by the
port members of the associated group of output ports of kind all. Wire functions
A
A[1]
B
B[1]
A[2]
replication
C
C
D
D
Figure 4: An Illustrative Example of Replication
5
B[2]
TORUS<3>
SQMATMULT
X9
PIPELINE<3>
overlapping
FARM<9>
topological
reorganization
O
V
E
R
L
A
P
P
I
N
G
n
w
MMShift
ab
e
c
s
Figure 5: Topology of Matrix Multiplication Using a Torus
increases the changes for reusing a component, resolving possible conflicts.
Two operations are defined on units: unification and factorization. Unification allows to unify a collection of units, forming a single unit. Factorization is
the inverse of unification, allowing units to be divided into many virtual units.
Replication, a third operation applied to units, allows that the network induced
by a collection of units to be replicated. All operations assume that units are
fully connected. Behavioral and connectivity preserving restrictions are applied,
but not formalized here. Connectivity restrictions imply the possibility of to
replicate ports whenever it is necessary to adjust topological connectivity after
an operation. Figures 3 and 4 present illustrative examples of these operations.
2.1.1
Virtual Units and Skeletons
To allow overlapping of components and the support for skeletons, the notion
of virtual unit has been introduced. A unit is virtual whenever there is no
component associated with it. In other terms, the task performed by a virtual
unit is not defined. Components are partially parameterized in its addressed
concern by means of placing virtual units in its constitution. A component that
comprises at least one virtual unit is called an abstract component, or a partial
topological skeleton. These terms are used as synonyms. When a programmer
re-use an abstract component for specification of a Hash program, it must to
assign components to the virtual units comprising it.
Abstract components may not instantiate applications. It is necessary to
describe the computation performed by their constituent virtual units. The
assignment operation is used allows to associate a component to a virtual unit,
making it a non-virtual unit. Also, there is a superseding operation, which
allows to take a non-virtual unit for replacing a virtual unit of the topology. The
behavioural compatibility restrictions from the non-virtual unit to the replaced
virtual unit guarantees that any sequence of communication actions that is
6
...
X9=
...
...
...
...
...
P
i
p
e
โ
L
i
n
e
...
Figure 6: Composing Pipe-Lines to Form a Systolic Mesh
valid in the non-virtual unit remains valid in the virtual unit. The superseding
operation is a โsyntactic sugarโ of HCL, since it may be implemented using
unification and assignment.
Figure 6 shows how a skeleton describing a systolic mesh of processes, implemented by overlapping a collection of pipe-line skeleton instances. The abstract
components PipeLine is used to describe interaction of processes placed at the
mesh lines and columns. Each unit in SystolicMesh abstract component is
formed by two slices: one described by the unit that comes from the vertical
PipeLine component and the other described by the unit that comes from the
horizontal one.
2.2
Programming Simple Components
Simple components, also called functional modules, are atoms of functionalities
in Hash programming. The collection of simple components in a Hash program
describes its computation media. Simple components might be programmed
virtually in any general purpose language, called host language. For that, it is
needed to define which host language constructions correspond to the arguments
and return points of the underlying functional module. It is preferred that no
extensions to the host language be necessary for this purpose, keeping transparency between coordination and computation media. Simple components may
be overlapped when configuring composed components. The goal is to implement a really multi-lingual approach for parallel programming. For that, it has
been proposed to use CCA (Common Component Architecture) [2], a recent
standard proposed for integrating components written in different languages in
a parallel environment. Another possibility is to use heterogeneous implementations of MPI [24, 23], recently proposed, facilitating this task since, in cluster
environments, Hash programs are compiled to MPI.
Since the translation schema onto Petri nets is defined on top of coordination
7
component CPipeLine <N> with
component SqMatMult<N> where
iterator i range [1,N]
interface ICPipe where
ports: i* โ o*
protocol: repeat seq{o!; i?} until <o & i>
[/ unit pipe[i] where ports: ICPipe /]
iterator i, j range [1,N]
use Skeletons.Common.{Torus, Farm}
use MMShift
interface ISqMatMult where
ports: j โ r # ITorus
protocol: seq {j?; repeat seq {s!;e!;n?;w?}
counter N }
connect pipe[i]โo to pipe[i+1]โi, buffered
component Torus <N> with
unit mm torus; assign Torus<N> to mm torus
unit mm farm; assign Farm<N> to mm farm
use Skeletons.Common.CPipeLine
iterator i, j range [1,N]
interface ITorus where
ports: ICPipe @ n โ s # ICPipe @ e โ w
protocol: repeat seq {par {s!; w!}; par {n?; e?}}
until <n & e & s & w>
[/ unit vpipe[i]; assign CPipeLine<N> to vpipe[i] /]
[/ unit hpipe[j]; assign CPipeLine<N> to hpipe[j] /]
[/ unify farm.worker[i + j ร N ], torus.node[i][j]
to sqmm[i][j] /] where ports: ISqMatMult
unify farm.distributor, farm.collector, sqmm[0][0]
to sqmm root where
ports: () โ ab # c โ () #
ISqMatMult @ mm
protocol: seq {ab!; c?; do mm }
[/ assign MMShift to sqmm[i][j] /]
[/ unify vpipe[i].pipe[j], hpile[j].pipe[i]
to node[i][j] where ports: ITorus /]
module MMShift(main) where
component Farm<N> with
main :: Num t โ t โ t โ [t] โ [t] โ ([t],[t],t)
main a b as i bs i = (as o,bs o,c)
where
c = matmult as o bs o
(as o, bs o) = (a:as i, b:bs i)
unit distributor where ports: () โ job
unit worker where ports: job โ result
protocol: seq {job?; result!}
unit collector where ports: result โ ()
connect distributor.job to worker.job, synchronous
connect worker.result to collector.result, synchronous
matmult :: Num t โ t โ [t] โ [t] โ t
matmult [] [] = 0
matmult (a:as) (b:bs) = a*b + matmult as bs
replicate N: worker
Figure 7: Configuration Code of Matrix Multiplication on a Torus
module Tracking(main) where
import Track
import Tallies
import Mcp types
main :: User spec info โ [(Particle,Seed)] โ ([[Event]],[Int])
main user info particle list = let eventsโs = map f particle list in (eventsโs, tally bal event lists)
where
f (particle@( , , , e, ), sd) = (Create source e):(track user info particle [] sd)
Figure 8: A Functional Module from MCP-Haskell#
8
<Component> โ component ({u1 :<Unit>, . . ., ui :<unit>}, {c1 :<Channel>, . . .,cj :<Channel>})
<Unit> โ unit (id, {p1 :<Port>, . . ., pk :<Port>}, <Typeu >)
<Typeu > โ repetitive | non-repetitive
<Behavior> โ protocol ({idsem , . . . , idsem
}, <Action>)
n
1
<Action> โ
|
|
|
|
|
|
|
|
|
skip
seq {a1 :<Action>; . . .; ak :<Action>}
par {a1 :<Action>; . . .; ak :<Action>}
alt {g1 :<Action>; . . .; gk :<Action>}
repeat until (<Action>, C)
repeat counter (<Action>, N)
repeat forever <Action>
signal id
wait id
activate id
<Port> โ port (id,<Direction>,<Multiplicity>,<Typep >,nesting f actor)
<Multiplicity> โ single | group (<Typeg >, {p1 :<Port>, . . ., pn :<Port>})
<Direction> โ input | output
<Typep > โ stream | non-stream
<Typeg > โ any | all
<Channel> โ connect (idport , idport , <ChanMode>)
<ChanMode> โ synchronous | buffered | ready
Figure 9: Abstract Hash Configuration Language Syntax
media, abstracting from computation media concerns, specific details about
programming simple components is not provided in this paper. For illustration,
Figure 8 presents an example of functional module from MCP-Haskell# program
[9], written in Haskell.
2.3
An Abstract Representation for Hash Components
In Figure 2.2, it is defined a simplified syntax for an abstract representation
of Hash configurations, named Abstract Hash. The abstract Hash configuration
language (AHCL) only captures information strictly relevant to the translation
schema onto Petri nets further presented. For example, interface declarations
and operations over units, such as unifications, factorizations, replications, and
assign operation are not represented in AHCL. It is supposed that these operations are all resolved before translation process. AHCL is not a simplification.
Indeed, in the compilation process of Hash configurations, AHCL correspond
to the intermediate code generated by the front-end compiler module, which
serves as input to all back-end modules. A back-end was developed for generating PNML (Petri Net Markup Language) code from a Hash configuration. The
following paragraph describes the structure of AHCL.
A component is composed by a set of units (u1 , . . . , ui ) and a set of channels (c1 , . . . , cj ). Units are described by an identifier, a collection of ports
(< Port >). A unit can be repetitive or non-repetitive (< Typeu >). The
interface of a unit is defined by a collection of ports and a protocol, described
by means of an embedded language that specifies valid orders for activation of
ports. This language have constructors equivalent to combinators of regular
9
<COMPONENT>
unidades repetitivas
<UNIT>
P2
...
P4
T2
...
P6
P3
T4
<UNIT>
P2
...
P4
T2
P5
P3
(P1) PROGRAM_BEGIN
<UNIT>
T1
P2
...
(P2) PROCESS_STARTED[proc_i]
(P3) PROCESS_RESTART_ENABLED[proc_i]
P4
(P4) PROCESS_FINISHED[proc_i]
(P5) PROGRAM_END_READY
...
~
unidades naoโrepetitivas
P1
(P6) PROGRAM_END
T3
<UNIT>
P2
...
(T1) T.PROCESSES_FORK
(T2) T.PROCESS_RESTART[proc_i]
P4
(T3) T.PROCESSES_NR_JOIN
(T4) T.PROCESSES_ALL_JOIN
Figure 10: Translating a Component
expressions controlled by balanced semaphores. A port is described by an identifier (id), a direction (< Direction >), a type (stream or non-stream) and a
nesting factor. Additionally, port multiplicity specifies if a port is a single port
or a group of ports. Notice that a group of port can be of two types: any or all.
All port identifiers are assumed to be distinct in an abstract Hash programs. A
channel connect two ports and is associated to a mode (synchronous, buffered
and ready). Notice that, abstract Hash syntax does not force that these two
ports be from opposite directions. This restriction is implicitly assumed.
3
Translating Hash programs into Petri Nets
In this section, a schema for translating Hash programs into Petri nets is introduced. In order to make translation schema easier to understand, it is informally
described using diagrams. The possibility of making intuitive visual descriptions
is an interesting feature of Petri nets.
The translation schema is specified inductively in the hierarchy of components at the coordination medium of the Hash program. Thus, simple components are ignored. The overall steps in the translation procedure of a Hash
program into an interlaced Petri net are:
1. Translating units: For each unit comprising the component (unit declarations), its interface is used for yielding an interlaced Petri net describing
activation order of their interface ports. In Hash configuration language,
it is defined by an embedded language, in interface declarations, whose
combinators have correspondence to operators of regular expression controlled by semaphores. This formalism was proved to have expressiveness
10
Interface or Interface Class
Assignmennt
Instantiation
interface declaration
Unit (nonโvirtual)
Virtual Unit
unit declaration
assign declaration
Figure 11: Unit = Interface (by instantiation) + Component (by assignment)
equivalence to Petri nets according to formal language theory. If a unit is
a cluster (a composed component is assigned to the unit), it is necessary to
generate the Petri net that corresponds to the assigned component. Using
information about mapping of argument/return points to input/output
ports of the unit, it is possible to synchronize behavior of the unit with
behavior of the component, in such way that they are compatible;
2. Synchronize units. Now that a Petri net exists for describing communication behavior (traces) of each unit, communication channels (connect
declarations) may be used for coordinating synchronized behavior of these
Petri nets (units);
3. Synchronize streams. For each port carrying a stream, a Petri net describing a protocol for stream synchronization is overlapped with the Petri
net produced in the last step. The semantics of stream communication
is described separately because it increases complexity of the generated
interlaced Petri net, making computationally hard its analysis. Thus, in
Hash programming environment, the programmer may decide not to include stream synchronization protocol. Obviously, information may be
lost, but it may not be necessary for some useful analysis.
The next sections provide details about the above translation steps. Also,
it is discussed how higher-level information encompassed in skeletons may be
used to simplify the generated network.
3.1
Modelling Components (ฮฅC )
In Figure 10, the Petri net resulted from application of translation function ฮฅC
to the configuration of a component is illustrated. The translation function ฮฅU
is applied to each unit comprising the component, generating a Petri net that
describes its communication behavior. The resulting Petri nets are connected in
order to model parallel execution of units. The places process started[j] and
process finished[j], 1 โค j โค n, where n is the number of units, correspond
to start places and stop places of the Petri nets modelling units, respectively.
When a token is placed on process started[j], the unit j is ready to initiate
execution, and when a token is placed on process finished[j], the unit j had
11
(T1) GROUP_PREPARE[g]
(P2) PORT_COMPLETE[p]
(T2) GROUP_COMPLETE[g]
...
(P4) GROUP_COMPLETE[g]
(T3) PORT_SEND[p] / PORT_RECV[p]
]
(P3) GROUP_PREPARED[g]
a[n
(P1) PORT_PREPARED[p]
]
a[2
]
a[1
a
ANY
ALL
Group of Ports
P1
T3
P2
T3
P2
T1
T2
P3
P2
P1
T2
P4
...
P4
P2
P1
T3
...
T3
P1
...
P3
<PORT>
group any
P2
...
T1
P2
P1
port
...
T3
P1
T3
...
Individual Port
<PORT>
group all
T3
<PORT>
single
P1
P2
Figure 12: Translating Unitโs Ports
finished. The transitions process restart[k], 1 โค k โค r, where r is the number of repetitive units, allows that repetitive units return back to its initial state
after finalization. They are introduced in the Petri net generated for each unit.
The place program end ready receives a mark when all non-repetitive units
terminates. In this case, the tokens in places process restart enabled[k],
1 โค k โค r, are removed, preventing repetitive processes execute again. At this
state, the program terminates after all repetitive processes also terminate, which
causes transition processes all join to be fired and a token to be deposited
in program end.
3.2
Modelling Units (ฮฅU )
This section intends to describe how individual units are translated into Petri
nets. Firstly, Figure 12 presents interlaced Petri nets that model the activation
of the ports of the interface of a unit. A mark in place port prepared[p]
indicates that the port p is prepared for communication. The firing of transition
port send[p]/port recv[p] models communication, causing the deposit of a
mark in place port complete[p] for indicating that communication has been
completed on port p. It is possible that two ports be active at the same time.
In groups of ports, the places group prepare[g] and group complete[g] are
connected to places port prepared[p] and port complete[p] of each port
p belonging to the group g that model local preparation and completion of
communication in ports belonging to the group, according to their semantics:
any or all. In groups of ports of kind all, all individual ports are activated
in consequence of activation of the group. In groups of ports of kind any,
only one port is chosen among the ports that are ready for communication
completion. For obeying this semantic restriction, the firing of a transition
port send[p]/port recv[p] of a port p in group g of kind any causes removal
of the marks in places port prepared[pโฒ ], for all places pโฒ belonging to g, in
12
<ACTION>
skip
p
Figure 13: Translating โNull Actionโ
such a way that all ports p, such that p 6= p, cannot complete communication
(firing of transition port send[p]/port recv[p]).
The order in which marks are placed in places port prepared[p], for any
p, is controlled by an interlaced Petri net that models the protocol of the unit.
The following sections discusses how primitive actions and action combinators
of behavior expressions are translated into Petri nets. The primitive actions
are: skip (null action), wait (increment semaphore primitive), signal (decrement semaphore primitive), ? (activation of input port), and ! (activation of
output ports). The combinators of actions are: seq (sequential actions), par
(concurrent actions), alt (non-deterministic choice among n actions), and if
(conditional choice between two actions).
3.2.1
Null Action (skip)
The skip combinator have no communication effect. Because that, it is known
as the โnull actionโ. Only one place is needed, where it is both start and stop
place (Figure 13) of the interlaced Petri net generated.
3.2.2
Sequencing (seq)
The seq combinator describes a total ordering for execution of a set of actions
(sequential execution), represented by a1 , a2 , . . . , an . It may be modelled by
sequential composition of the Petri nets induced for each action (Figure 14).
3.2.3
Concurrency (par)
The par combinator describes a concurrent (interleaving) execution of a set of
actions, represented by a1 , a2 , . . . , an . It may be modelled by parallel composi<ACTION> seq
<ACTION>
T1
<ACTION>
T1
T1
(T1) SEQ_NEXT_ACTION[seq_label, i]
Figure 14: Sequence of Actions
13
<ACTION>
<ACTION>
par
(P1) PAR_BEGIN[par_label]
<ACTION>
(P2) PAR_END[par_label]
T1
T2
<ACTION>
P1
P2
<ACTION>
(T1) PAR_FORK_ACTIONS[par_label]
(T2) PAR_JOIN_ACTIONS[par_label]
Figure 15: Interleaving (Concurrency) Among Actions
tion of the Petri nets induced by each action (Figure 15).
3.2.4
Non-Deterministic Choice (alt)
The alt combinator describes a conceptually non-deterministic choice among a
set of actions, represented by a1 , a2 , . . . , an . It may be modelled by composing
the Petri nets induced for each action using a conflict in place alt begin[alt label],
its start place (Figure 16). The firing of transitions alt select branch[alt label,
i], 1 โค i โค n, models the choice.
3.2.5
Streams and Conditions for Checking Stream Termination
The two combinators modelled in the next sections, repeat and if, requires
testing a condition in order to choose the next action to be performed. The
condition is defined by a logical predicate in its disjunctive normal form (DNF).
<ACTION>
alt
<ACTION>
T2
T1
(P1) ALT_BEGIN[alt_label]
<ACTION>
P2
P1
T2
...
T1
(P2) ALT_END[alt_label]
(T1) ALT_SELECT_BRANCH[alt_label,i]
(T2) ALT_END_ACTION[alt_label,i]
<ACTION>
T1
T2
Figure 16: Choice Among Actions
14
Logical variables are references to ports that carry streams. This section attempts to formalize the notion of streams in the Hash component model and
valuation of logical variables of termination-test conditions of streams.
A stream is defined as a sequence of semantically related data items, terminated with a special mark, that is transmitted through a channel. By making an
analogy with conventional message passing programming using MPI, a trivial
example of stream is a sequence of data items transmitted in calls to a specific
occurrence of MPI Send primitive in the context of an iteration. At each iteration, an item of the stream is transmitted. The termination of the iteration is
modelled, in the Hash program, by the end mark carried by the stream. Communication on channels that carry streams may be implemented using persistent
communication objects in the underlying messaging passing library, which may
reduce communication overhead.
Hash streams may be nested. Streams of streams, at any nesting depth may
(1,d)
be defined. A stream Sx , where d is the nesting factor of the stream and x is
a positive integer that indicates the order of a nested stream in a stream, may
be defined as following:
(i,d)
Sx
(i+1,d)
=
hS1
VALUE
(i+1,d)
, S2
(i+1,d)
, . . . , Sn
, EOS[i]i, n โฅ 0
, if i < d
, if i = d
(1)
where VALUE is a data item and EOS[i] is a termination value at nesting level
i. Notice that termination values should carry an integer indicating the nesting
level of the stream being terminated. The feature of nested streams appeared
in consequence of design of Haskell# . Streams at coordination level must be
associated to lazy lists in computation media 1 . The experience with Haskell#
programming have shown that laziness of Haskell nested lists may be useful in
some applications. This feature is analogous to communication operations that
occurs in context of nested iterations in MPI parallel programming.
In Hash configuration language, streams are declared by placing โ*โ symbols
after the identifier of a port in the declaration of interfaces. The number of
โ*โโs indicates the nesting factor of the stream carried by the port. Only ports
carrying streams of the same nesting levels may be connected through a channel.
It is defined that a port that transmit a single value (non-streamed) have nesting
level zero.
Now that the notion of streams is defined, it is possible to define the syntax
and semantics of predicates for testing synchronized termination of streams, a
necessary feature for combinators if and repeat. This kind of predicate will be
referred as stream predicate.
Syntactically, a stream predicate is a logical predicate in its disjunctive normal form. The logical operators supported are โ&โ, the logical and, and โ|โ,
the logical or. Disjunctions may be enclosed by โhโ and โiโ delimiters. Logical
variables are references to interface ports of a unit. The formal syntax of stream
predicates is shown below:
1 In
Haskell# , simple components are functional modules written in Haskell
15
stream predicate
โ sync conjunction 1 โ|โ . . . โ|โ sync conjunction n (n โฅ 1)
sync conjunction โ โhโ simple conjunction โiโ | simple conjunction
simple conjunction โ port id | ( port id1 โ&โ . . . โ&โ port idn ) (n โฅ 1)
Let d be the depth of nesting of an occurrence R of a repeat or if combinator
in relation to an outermost occurrence, if it exists (d = 0, if it does not exists).
Only port carrying streams with nesting factor equal or less than d can appear
in the termination condition of R. It is now possible to define semantics of
stream predicates, by defining how values of logical variables may be inferred
in execution of units. For instance, let p be a port carrying stream S (1,n) .
Its value is false whenever a data value (VALUE) or an ending value at nesting
level i (EOS[i]), such that i < d, was transmitted (sent or received) in its last
activation. Otherwise, it is true. The value of the stream predicate may evaluate
to true, false or fail. A value true is obtained by evaluating the stream
predicate ignoring semantics of angle brackets delimiters. A fail is obtained
if negation of some conjunction enclosed in angle brackets evaluates to true,
assuming the following identity that defines angle brackets semantics:
ยฌha(k,r) โง a(k,r+1) โง . . . โง a(k,s) i = ยฌa(k,r) โง ยฌa(k,r+1) โง . . . โง ยฌa(k,s)
(2)
If stream predicate evaluates neither to true or error, the value of the
stream predicate is false. Angle brackets delimiters are used for ensuring synchronization of the nature of values transmitted by streams, whenever necessary.
In order to make possible to model test of stream predicates with Petri nets,
it is firstly necessary to model stream communication by using this formalism.
Particularly, it is necessary to introduce, in the Petri net of the Hash program, places that can remember the kind of value transmitted in the last activation of ports that carry streams.
In a Hash program, for each port s that carries a stream with nesting factor
n, there are two sets of n + 1 places, here referred as Stream Flags(s) and
Stream Flags(s):
Stream Flags(s) = {stream port flag[s, k] | 0 โค k โค n}
Stream Flags(s) = {stream port flag dual[s, k] | 0 โค k โค n}
For some stream port s, the places in set Stream Flags(s) form a split
binary semaphore:
X
M (p) = 1
pโStream Flags(s)
Also, they are mutually exclusive with its corresponding places in Stream Flags(s):
โk : 0 โค k โค n : M (stream port flag[s, k]) + M (stream port flag dual[s, k]) = 1
For a port s carrying a stream with nesting factor n, the places Stream Flags(s)
and Stream Flags(s) are used to remember which kind of value was transmitted in the last activation of s. There are n + 1 possibilities:
16
P10
...
T5
...
P5
P10
P10
T7
P10
P10
T7
...
...
T5
P10
...
P10
...
P10
(P1) RU_CHECKING_CONDITIONS[r]
(P2) RU_CHECKING_CONDITION_L[r]
(P3) RU_CHECKING_CONDITION_T[r]
(P4) RU_CHECKING_CONDITION_F[r]
(P5) RU_SATISFIED_CONDITION_L[r]
(P6) RU_SATISFIED_CONDITION_T[r]
(P7) RU_SATISFIED_CONDITION_F[r]
(P8) RU_TERMINATED
(P9) RU_FAILED
(P10) STREAM_PORT_FLAG[p,i]
P2
P7
P4
T4
P9
<ACTION>
repeat ... until
T3
<ACTION>
P8
P1
T1
T2
P3
P10
T6
P10
...
T6
...
P10
P6
...
(T1) RU_CHECK_CONDITION[r]
(T2) RU_TERMINATE[r]
(T3) RU_FAIL[r]
(T4) RU_LOOP[r]
(T5) RU_SATISFY_CONJUNCTION_L[r,i]
(T6) RU_SATISFY_CONJUNCTION_T[r,i]
(T7) RU_SATISFY_CONJUNCTION_F[r,i]
P10
Figure 17: Stream Controlled Repetition
โข An ending marker at nesting level i (EOS[i]), for 0 โค i โค n โ 1;
โข A data value.
The places stream port flag[s,k], such that 0 โค k โค n โ 1, are respectively associated to ending marks EOS[k] of a port s carrying a stream
with nesting factor n. The place stream port flag[s,n] is associated to
a data value. Assuming the restrictions above, if there is a mark on the
stream port flag[s,k] place, then a value of its corresponding kind was transmitted in the last activation of the port.
All the above restrictions are guaranteed by the Petri net protocol for synchronization of streams introduced further, in Section 3.4. The next two sections
present respectively how to model repeat and if combinators, assuming the existence of sets of places Stream Flags(s) and Stream Flags(s).
3.2.6
Repetition Controlled by Stream Predicates
The repeat combinator is used to model repeated execution of an action. The
termination condition may be provided in a until or a counter clause. The
later will be introduced in the next section. The former uses a stream predicate
for testing termination of a repetition after each iteration. In the Petri net
modelling of repeat combinator with until clause, it is assumed existence of
the sub-network modelling stream communication introduced in Section 3.2.5.
In Figure 17, it is illustrated the Petri net resulted from translation of repeat combinator with an until clause to check termination. The conflict in
place ru checking conditions models the decision on to terminate or not the
17
<ACTION>
repeat ... counter
T1
P2
(P1) RC_ENTERING[r]
(P2) RC_REMAINING[r]
(P3) RC_PREPARED[r]
(P4) RC_PERFORMED[r]
(P5) RC_EXITING[r]
T2
n
P1
P3
<ACTION>
(T1) RC_ENTER[r]
(T2) RC_START_ACTION[r]
(T3) RC_FINISH_ACTION[r]
(T4) RC_EXIT[r]
P5
T4
n
T3
P4
Figure 18: Repeated Action by a Fixed Number of Times
<ACTION>
repeat ... forever
<ACTION>
RI_REPEAT[r]
Figure 19: Infinite Repetition (repeat)
18
P11
...
T7
...
P5
P11
P11
T6
P11
P11
P8
<ACTION>
if ... then ... else ...
T6
...
...
T7
P11
...
P10
P11
...
P11
P7
P4
T3
<ACTION>
then
T2
P9
P1
<ACTION>
else
P2
T1
T4
P6
P11
T5
P11
...
T5
...
P11
P3
...
(P1) IF_STARTED[r]
(P2) IF_CHECKING_CONDITIONS[r]
(P3) IF_CHECKING_CONDITION_E[r]
(P4) IF_CHECKING_CONDITION_T[r]
(P5) IF_CHECKING_CONDITION_F[r]
(P6) IF_SATISFIED_CONDITION_E[r]
(P7) IF_SATISFIED_CONDITION_T[r]
(P8) IF_SATISFIED_CONDITION_F[r]
(P9) IF_TERMINATED
(P10) IF_FAILED
(P11) STREAM_PORT_FLAG[p,i]
P11
(T1) IF_CHECK_CONDITION[r]
(T2) IF_THEN[r]
(T3) IF_FAIL[r]
(T4) IF_ELSE[r]
(T5) IF_SATISFY_CONJUNCTION_E[r,i]
(T6) IF_SATISFY_CONJUNCTION_T[r,i]
(T7) IF_SATISFY_CONJUNCTION_F[r,i]
Figure 20: Conditional
iteration. Values of logical variables corresponding to ports in the stream predicate are tested using their respective Stream Flags(s) and Stream Flags(s)
places. The arrangement of places and transitions in Figure 17 allows for testing
the value of stream predicates at each iteration. The mutual exclusive firing of
transitions ru terminate, ru fail and ru loop correspond, respectively, to
values true (execute one more iteration), false (termination) and error (abort
the program) for the stream predicate.
3.2.7
Bounded Repetition
The combinator repeat with termination condition defined by a counter clause
models repeated execution of an action by a fixed number of times. Its translation into Petri nets is illustrated in Figure 18. For a certain fixed bounded repetition r, the weight of arcs (rc enter[r], rc remaining[r]) and (rc performed[r], rc exit[r])
(n) define the number of repetitions of < ACT ION >.
3.2.8
Infinite Repetition
Whenever no termination condition is defined for a given occurrence of the
repeat combinator, the given action is repeated infinitely. The Petri net that
models this kind of repeat combinator is illustrated in Figure 19.
3.2.9
Conditional Choice (if )
The if combinator describes a conditional choice between to two actions. Its
translation into Petri nets is illustrated in Figure 20. The reader may notice
19
(P4) SEM_WAIT_BEGIN
(P1) SEM_SIGNAL_BEGIN
<ACTION>
signal
(P2) SEM_SIGNAL_END
(P5) SEM_WAIT_END
P3
P3
(T2) SEM_WAIT
(T1) SEM_SIGNAL
<ACTION>
wait
(P3) SEM_COUNTER
P1
P2
P5
P4
T1
T2
Figure 21: signal (left) and wait (right) Semaphore Primitives
the analogy between the construction of the Petri net in this diagram with the
Petri net generated for the repeat ... until combinator, mainly concerning the
test of the stream predicate.
3.2.10
Semaphore Primitives
The wait and signal (balanced counter) semaphore primitives and the par
combinator make behavior expressions comparable to labelled Petri nets in descriptive power [18]. In absence of semaphore primitives, only regular patterns
of unit behavior could be described. The semantic of semaphore primitives is
now defined using the notation introduced in [1] for concurrent synchronization:
wait(s): <await s > 0 โ s := s โ 1>
signal(s): < s := s + 1 >
The angle brackets model mutual exclusion (atomic actions in concurrent
processes), while the await statement models condition synchronization. The
wait primitive causes a process to delay until the value of the semaphore s is
greater than zero in order to decrement its value. Thus, the value of a semaphore
is greater than zero in any instant of execution of a unit. In concurrent systems
where synchronization is controlled by balanced counter semaphores, like in
behavior expressions here defined, the value of a semaphore must be the same
at the initial and final states of the system.
The signal and wait primitives are modelled using Petri nets as described in
Figure 21. Given a semaphore s, the number of marks in place sem counter[s]
models the semaphore value at a given state.
3.2.11
Port Activation
The Hash primitive actions ! and ? models respectively send and receive primitives in message passing programming. In Hash programs, they cause activation
of groups of ports and individual ports that are not member of any group. In
Section 3.2, the Petri net slice that model individual ports and groups of ports
is illustrated in Figure 12. An individual port p is prepared for communication
whenever a mark is deposited in place port prepared[p]. A group of ports
20
of kind all is prepared whenever all of its ports are prepared, while a group of
kind any is prepared whenever any of its ports are prepared. The communication is completed whenever a place is deposited in place port complete[p] or
group complete[p]. The activation a of a port p is defined as the time between
preparation of a port and completion of communication. The format of Petri
net slices induced by translation of occurrences of primitives ! and ? is illustrated in Figure 22. The firing of transition activate start[a] prepares port p
for communication and firing of transition activate stop[a] occurs whenever
the port completes communication. Notice that whenever a mark is deposited
in place activate on[p], the port p is active.
3.3
Communication between Units
In the translation of a component, the Petri net slices resulted from translation of their units form an interlaced Petri net that models their asynchronous
execution. Information regarding synchronization of units, by means of communication channels, is not yet included. In Figure 23, Petri net slices that model,
respectively, the three kinds of channels that may occur in a Hash program
(synchronous, buffered and ready) are presented. The translation function
ฮฅL is applied to each communication channel in a component, generating Petri
net slices according to the translation schema illustrated in Figure 23. These
Petri net slices are overlapped with the Petri net slices that models behavior of
units in order to model synchronous execution of the units.
For synchronous channels, communication pairs must be active at the
same time for communication to complete. For implementing that, it is only
necessary to unify the respective transitions modelling completion of communication from the respective pairs. For buffered channels (bounded buffers),
the sender does not need to wait completion of communication operation for
resuming execution. For that, whenever the sender port s in a channel c
is activated, transition port send[s] must be activated if there is a mark in
<ACTION>
activate
PORT_PREPARED[port]
PORT_COMPLETE[port]
T2
T1
P3
P2
P1
(P1) ACTIVATE_ENTERING[a]
(P2) ACTIVATE_ON[a]
(P3)ACTIVATE_EXITING[a]
from translation
of ports
(T1) ACTIVATE_START[a]
(T2) ACTIVATE_FINISH[a]
Figure 22: Activation of Ports
21
S
<CHAN NEL>
P1
P2
P1
<CHAN NEL>
P1
P2
T3
T1
#n
P1
P2
P1
P5
#1
P4
P2
(P1) PORT_PREPARED[p]
(P2) PORT_COMPLETE[p]
T3/T6
T5
P1
P2
<mode> = ready
<mode> = buffered n
<mode> = synchronous
(P5) CHAN_READY_IS_OPEN[c]
(P3) CHAN_BUFFER_FREE[c]
(T3) CHAN_SYNCHRONIZE[c]
(T1) PORT_SEND[p]
(T2) PORT_RECV[p]
P3
P2
T4
T2
T2
P2
P1
T1
connect a.o to b.i <mode>
P1
<CHAN NEL>
P2
(P4) CHAN_BUFFER_USED[c]
T3 = fusion of T1 and T2
(T4) CHAN_READY_SENDER_CLOSE[c]
(T5) CHAN_READY_RECEIVER_TRY_ENTER[c]
(T6) CHAN_READY_SENDER_OPEN[c]
from translation of ports
Figure 23: Modelling Communication Channels
place chan buffer free[c], which models the number of empty slots in the
buffer. The place chan buffer used[c], which receives a mark after activation of port send[s], models the number of used slots in the buffer. Notice that the sender blocks whenever there is no empty slots in the buffer.
Channels supporting ready mode require a more complex protocol. The place
chan ready is open[c] ensures that communication proceeds only if activation
of the sender port precedes activation of the receiver. Notice that whenever receiver is activated before sender, the sender cannot proceed, causing a deadlock
that may be detected by a Petri net verification tool. Using this approach, it is
possible to verify, for example, if a certain parallel program using ready channels may fail in some program state during execution. Ready communication
mode may improve communication performance of MPI programs, but unfortunately it is hard to ensure that communication semantics is safe in arbitrary
parallel programs. The modelling of communication semantics with Petri nets
may overcome these difficulties for debugging.
3.4
Synchronization of Streams Protocol
In Section 3.2.5, it was introduced two sets of places that must exist for each
stream port s: Stream Flags(s) and Stream Flags(s). Additionally, restrictions were introduced for their markings. They allow to check the kind of
the transmitted value in the last activation of the port, making possible to check
stream termination conditions that occurs in repeat and if combinators. This
section presents a protocol for updating marking of places Stream Flags(s)
and Stream Flags(s) in such a way that restrictions introduced in Section
3.2.5 are obeyed.
In Figure 24, it is illustrated how the network presented in Figure 22 (activation of ports) may be enriched in order to introduce a protocol for updating
places in Stream Flags(s) and Stream Flags(s), for an arbitrary stream
port s with nesting factor n. The Petri net slice introduced have the transitions
sp clear flag[s,i] e sp set flag[s,i], for 0 โค i โค n as its main components.
They are arranged in such a way that transitions inside the sets are mutually ex-
22
P6โs
Output Port/Group of Ports
P6โs
Input Port/Group of Ports
#1
...
...
#1
T2โs
T4โs
#1
T2โs
T5
T3
P2
P3
P4
P5
...
...
P3
P2
T4โs
#1
T5
T3
P4
P5
...
...
...
...
#1
#1
...
...
P7โs
P7โs
The receiver may decide which value has been received
only after completion of communication
Before the activation, the sender may decide which
kind of value is going to be transmitted
(P2) SP_CLEARING_FLAGS[s]
(P3) SP_CLEARED_FLAGS[s]
(P4) SP_SETTING_FLAGS[s]
(P5) SP_EXITING[s]
(P6) STREAM_PORT_FLAG[s,i]
(P7) STREAM_PORT_FLAG_DUAL[s,i]
(T2) SP_CLEAR_FLAG[s,i]
(T3) SP_START_SET_FLAGS[s]
(T4) SP_SET_FLAG[s,i]
(T5) SP_PREPARE_PORT[s]
Figure 24: Activation of Stream Ports
clusive. The firing of a transition in sp clear flag[s,i] clears the set of places
Stream Flags(s), by moving the mark in the corresponding cleared place
to the corresponding place in set Stream Flags(s). After that, all places in
Stream Flags(s) have exactly one mark, while all places in Stream Flags(s)
have zero mark. In sequence, one transition of set sp set flag[s,i] is fired causing the moving of a mark from one of the places in Stream Flags(s), chosen
non-deterministically, to the corresponding place in Stream Flags(s). This
sequence of actions models the test of the kind of the value transmitted in the
current activation of the port. Notice that the moment of the choice is different
for input and output ports. An input port only updates its Stream Flags(s)
after communication has been completed. This is in accordance with implementation semantics, once only after receiving the value, the receiver may check the
kind of the transmitted value.
3.4.1
Ensuring Consistency of Communication
Channel communication semantics imposes that the kind of value transmitted
by the sender in a given activation of a stream port is the same as the kind of
the value that the receiver receives in the corresponding activation.
In Figure 25, it is shown how this restriction is ensured for channels with
synchronous and ready mode of communication.
For the following description, consider that individual ports are groups containing only one port. Thus, consider a channel c connecting a sender stream
port s and a receiver stream port r, both with nesting factor n. The groups
where s and r are contained are respectively gs and gr .
For each i, 0 โค i โค n, it is necessary to create an arc that links the place
stream port flag[gs ,i] to the transition sp set flag[gr ,i], in such way that
consistency of Stream Flags(s) and Stream Flags(r) is forced after com-
23
#1
...
#1
...
...
...
...
#1
Sender Side
...
#1
...
Receiver Side
#1
...
...
...
...
Synchronous/Ready Channel
#1
...
The kind of the received value
must be the same kind of the
sent value
Figure 25: Ensuring the Consistency of Streams Connected through Synchronous Channels
munication completion. If two different senders, connected to ports belonging
to a group gr of kind all, decide to transmit values of different nesting levels in
a give activation of gr , a deadlock occurs. But it was possible to introduce a
Petri net slice for detecting this event.
Bounded buffered communication imposes a more complicated approach,
illustrated in Figure 26. Consider that channel c have a buffer of size b. For
each buffer slot k, 0 โค k โค b โ 1, in a channel connecting ports with nesting
factor n, there is a set of places buf slot flag[c,k,i], for 0 โค i โค n. They
remember the kind of value stored in a buffer slot k, after communication in
a channel c. Essentially, after firing transition sp set flag[gs ,i], the marking
of stream port flag[gs ,i] at the moment of the activation of the group gs
is saved in buf slot flag[c,k,i], where k is the number of the next available
buffer slot. If all slots are filled, the sender blocks until a slot is freed by the
receiver.
If gr is a group of kind all (notice that all groups with one port is of kind all),
an arc from each place buf slot flag[c,0,i] to transition sp set flag[gr ,i]
ensures that the marking of Stream Flags(r) reflects the kind of the oldest
value placed in the buffer by the sender, as semantics of buffered communication imposes. If gr is a group of kind any, it is necessary to introduce the
Petri net slice shown in Figure 27. It ensures to copy the marking of the places
buf slot flag[c,0,i] of the chosen receiver port r in gr . For that, the mutually exclusive places any group port activated[r], for each r belonging
to gr , remember which port of gr was chosen. They enable the appropriate
set of transitions any group copy flag[r], which are connected to places
buf slot flag[c,0,i] of the channel where the chosen port is connected. The
marking of this set of places is copied to places any group copied flag[r,i],
which are connected to transitions sp set flag[gr , i].
24
#1
...
#1
...
...
...
...
#1
Sender Side
P1
...
T1
P3
#1
T3โs
2
1
...
2
1
nโ1
n
...
P6
P5
P5
P6
P6
...
2
...
2
nโ1
P5
...
...
2
P5
2
P5
...
...
2
P5
P5
T3โs
T3โs
2
P5
...
2
...
P5
Buffered
Channel
#n
P2
P4
(T1) BUF_SLOTS_UNLOCK[c]
(T2) BUF_SLOT_SELECT[c,s]
(T3) BUF_SLOT_FLAG_SET[c,s,i]
(T4) BUF_SLOT_SHIFT_FLAG[c,s,i]
(T5) BUF_SLOTS_START_SHIFT[c]
(T6) BUF_SLOTS_FINISH_SHIFT[c]
T2โs
2
Buffer Management
(P1) BUF_SLOTS_LOCKED[c]
(P2) BUF_SLOTS_UNLOCKED[c]
(P3) BUF_SLOT_READY_UPDATE[c]
(P4) BUF_SLOT_UPDATED[c]
(P5) BUF_SLOT_FLAG[c,s,i]
(P6) BUF_SLOT_EMPTY[c,s]
(P7) BUF_SLOT_READY_SHIFT[c,s]
(P8) BUF_SLOTS_SHIFTED[c]
(P9) BUF_SLOTS_SHIFTING[c,s]
Receiver Side
T4โs
T4โs
P7
...
#1
P7
P7
...
P8
#1
...
...
...
...
P9
T6
T5
#1
...
The kind of the received value
must be the same kind of the
oldest sent value
Figure 26: Ensuring Consistency Streams Connected through Buffered Channels
P3โs
Activation of Groups
of Ports of Kind Any
...
T3
...
P1
T3
P3โs
P2
T3
...
P1
...
T3
P3โs
T1
(P1) ANY_GROUP_PORT_ACTIVATED[p]
(P2) ANY_GROUP_COPIED_FLAG[g,i]
(P3) BUF_SLOT_FLAG[p,0,i]
...
...
T2
P2
T2
T2
P2
T3
T3
P1
...
(T1) PORT_SEND[p] / PORT_RECV[p]
(T2) SP_SET_FLAG[g,i]
(T3) ANY_GROUP_COPY_FLAG[p,i]
...
T1
...
...
T1
T3
...
...
...
...
...
...
T3
T3
Figure 27: Copying Protocol for Groups of Input Ports of Kind any
25
The arrangement of the places buf slots locked[c] and buf slots unlocked[c]
and the transition buf slots unlock[c] avoids accesses to the buffer while it is
being updated after a transmission. The firing of a transition buf slot select[c,k]
means the selection of the next empty slot. Whenever the buffer is full (n marks
are deposited in place chan buffer used[c]), the sender must block for waiting
that the receiver consume the contents of the first slot entry.
After copying the kind of the value in the first slot of the buffer, it is discarded. For that, a shift operation, that occurs while a mark is deposited in place
buf slots shifting[c], allows to save the marking of places buf slot flag[c,k,i]
to buf slot flag[c,k โ 1,i], for 1 โค k โค n.
3.4.2
Ensuring Consistency of Order of Kind of Transmitted Values
The following example illustrates the needs for imposing one more restriction
in the Petri net slice of the stream control protocol. For instance, consider a
nested Haskell list of Intโs with nesting factor 4.
[[[[1],[5,6]],[[2,3]]],[],[[[[4,5,7],[8,9]]],[[6],[7,9]]]]
The correspondent stream in the Hash component model will transmit the
following values at each activation of the corresponding port:
{1,Eos 3, 5, 6,Eos 3,Eos 1, 2, 3,Eos 3,Eos 2,Eos 1,Eos 1, 4, 5, 7,
Eos 3, 8, 9,Eos 3,Eos 2,Eos 1, 6,Eos 3, 7, 9,Eos 3,Eos 2,Eos 1,Eos 0}
Notice that after transmitting a value Eos 2, it is not possible to transmit
a value Eos 0, since the enclosing stream at nesting level 1 was not finalized
yet. In this case, only values Eos 1, Eos 2, Eos 3 and a data item may be
transmitted.
Now, consider the general case for the transmission of given end marker at
nesting level k. If k โฅ 1, the next value to be transmitted may be any of the end
markers at nesting level greater than k โ 1 or a data item. If k = 0, the stream
is finalized. Any attempt to read a value in a finalized stream is considered an
error.
In Figure 28, it is shown how the Petri net slice presented in Figure 24 (output port) may be enriched in order to support the restriction stated in the last
paragraph. A mark is placed in place sp order fail[s] whenever an attempt
to activate a finalized stream port s (the kind of last transmitted value is Eos
0) occurs. For each nesting level i, four places and two transitions controls the
consistency of the order of the transmitted value. The place sp flag open[s,i]
receives a value whenever a value Eos i may be sent. Its mutually exclusive
dual place, named sp flag open dual[s,i] allows for resetting the marking of
sp flag open[s,i] after activation. Resetting procedure is implemented using
the next elements described here. The place sp cleaning flag[s,i] has a mark
whenever the resetting procedure is enabled for the port s in nesting level i. Its
corresponding place sp cleaned flag[s,i] has a mark after resetting procedure finishes. The transition sp clean[s,i] resets the place sp flag open[s,i]
26
P5
T3โs
(P1) SP_FLAG_OPEN[s,i]
(P2) SP_FLAG_OPEN_DUAL[s,i]
(P3) SP_CLEANING_FLAG[s,i]
(P4) SP_CLEANED_FLAG[s,i]
(P5) SP_FAIL
T1
P3
P1
P2
P4
...
T2
T1
P3
P1
(T1) SP_CLEAN[s,i]
(T2) SP_KEEP_CLEANED[s,i]
P2
T2
P4
...
...
...
(T3) SP_CLEAR_FLAG[s,i]
(T4) SP_SET_FLAG[s,i]
(T5) SP_PREPARE_PORT[s]
T1
P3
...
P1
P2
From Stream Output Port
T2
P4
T4โs
Figure 28: Consistency of the Order of Kind of Transmitted Stream Values
to its original state (zero marks), while transition sp keep cleaned[s,i] fires
whenever the place sp flag open[s,i] is already cleaned. Notice that the transitions sp keep cleaned[s,i] and sp clean[s,i] are mutual exclusive, since
sp flag open[s,i] and sp flag open dual[s,i] are too.
3.5
The Complexity of the Generated Petri Net
After overlapping the Petri net slice that models stream communication semantics, allowing to make precise analysis about behavior of Hash programs
at coordination level, the Petri net of simple Hash programs may become very
large. Large Petri nets may turn impossible for programmers the analysis without help of some automatic or higher level means. Also, it makes hard and
memory consuming the computations performed by the underlying Petri net
tools, such as computation of reachability and coverability graphs, place and
transition invariants, etc. These difficulties comes from transitory technological limitations, since processing power and memory amount of machines have
increased rapidly in the recent years and it is expected that they will continue
to increase in the next decades. Also, it is possible to use parallel techniques
to perform high computing demanding analysis, but this approach has been
exploited by few designers of Petri net tools. It is a reasonable assumption that
parallel programmers have access to some parallel computer.
Despite these facts, it is desirable to provide ways for helping programmers to
work with large Petri nets or simplifying the generated Petri net. The following
techniques have been proposed:
โข During the process of analysis, the programmer may decide not to augment the Petri net of the Hash program with the protocol for modelling
stream communication. This approach makes sense whenever the infor27
T5
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
component IS<problem class, num procs, max key log2, num buckets log2,
total keys log2, max iterations, max procs, test array size> with
#define PARAMETERS (IS Params problem class num procs max key log2 num buckets log2
total keys log2 max iterations max procs test array size)
iterator i range [1, num procs]
use Skeletons.{Misc.RShift, Collective.{AllReduce, AllToAllv}}
use IS FM โโ IS Functional Module
unit bs comm assign AllReduce<num procs, MPI SUM, MPI INTEGER> to bs comm
unit kb comm assign AllToAllv<num procs>
to kb comm
unit k shift
assign RShift<num procs> 0 โ
to k shift
interface IIS (bs*, kb*, k) โ (bs*, kb*, k)
where: bs@IAllReduce (UArray Int Int) # kb@IAllToAllv (Int, Ptr Int) # k@RShift Int
behaviour: seq {repeat seq {do bs; do kb} until <bs & kb>; do k}
[/ unify bs comm.p[i] # bs, kb comm.p[i] # kb, k comm.p[i] # k to is peer[i] # IIS
assign IS FM (PARAMETERS, bs, kb, k) โ (bs, kb, k) to is peer[i] # bs # kb # k /]
Figure 29: The Configuration Code of IS Program
mation provided by the protocol is not always necessary for the analysis
being conducted. This is the reason for the separation of the stream communication protocol from the rest of the Petri net in the Hash program;
โข Another approach that have been proposed, but for further works, is to
build higher level environments for analysis of Hash programs on top of
Petri net tools. Instead of programmers to manipulate Petri net components, they manipulate Hash program elements of abstraction. Then,
the analysis are transparently and automatically translated into proving
sequences using INA tool;
โข Specific translation schemas for skeletons might be specified in order to
simplify the generated Petri net. This approach is illustrated in the next
section. For instance, it is defined how higher-level information provided
by the use of collective communication skeletons might be used in the
translation process of Hash programs into Petri nets.
3.6
Modelling Collective Communication Skeletons
Message passing libraries, such as MPI, support special primitives for collective
communication. In Hash programming environment, it is defined a library of
skeletons that implement the pattern of communication involved in collective
communication operations supported by MPI. They are: Bcast, Scatter,
Scatterv, Reduce Scatter, Scan, Gather, Gatherv, Reduce, AllGather, AllGatherv, AllToAll, AllToAllv, and AllReduce. In the
next paragraphs, the use of collective communication skeletons is illustrated by
means of an example.
In Figure 29, the code for the Hash version of IS program, from NPB (NAS
Parallel Benchmarks) [3] is presented. IS is a parallel implementation of the
bucket sort algorithm, originally written in C/MPI. In this section, IS is used to
28
collective port
(a)
T1
P1
(b)
P1
join
transitions
P2
P2
T1
P2
P1
T1
...
...
T1
P1
...
P2
...
P1
P1
P2
P2
protocol for modelling
stream communication semantics
(P3) SP_CLEARING_FLAGS[d]
(P4) SP_CLEARED_FLAGS[d]
(P5) SP_SETTING_FLAGS[d]
(P6) SP_EXITING[d]
(P7) STREAM_PORT_FLAG[d,i]
(P8) STREAM_PORT_FLAG_DUAL[d,i]
P8โs
(c)
(P1) COLLECTIVE_PREPARED[d]
(P2) COLLECTIVE_COMPLETE[d]
#1
...
(T1) COLLECTIVE_JOIN[d]
(T2) COLLECTIVE_UNJOIN[d]
#1
P1
T1
P1
P5
P2
P6
T2
...
...
...
...
P1
T4
P4
P3
P2
T5โs
T3โs
P2
#1
...
P7โs
shared among all
collective ports
(T3) SP_CLEAR_FLAG[d,i]
(T4) SP_START_SET_FLAG[d,i]
(T5) SP_SET_FLAG[d,i]
Figure 30: Modelling Collective Communication Skeleton Semantics
illustrate the use of collective communication skeletons in a Hash program, motivating definition of a specific strategy for translating collective communication
patterns of interaction among units in a Hash program.
In the line 9 of Figure 29, it is declared that skeletons2 AllReduce and
AllToAllv will be used in the configuration. In lines 12, 13, and 14, three
units are declared, named bs comm, kb comm and k shift. The first two have
collective communication skeletons assigned to them, respectively AllReduce
and AllToAllv. Since skeletons are composed components, these units are
clusters of units that interact using the collective communication patterns described by the skeleton. In line 20, the unification of correspondent units that
comprise clusters bs comm, kb comm and k shift forms the units that comprise
the IS topology. The unification of virtual units from distinct cluster allows to
overlap skeletons. The behavior of the virtual units that result from unification,
2 Partial topological skeletons are composed components where at least one unit is virtual.
In the case of collective communication skeletons, all units are virtual.
29
named is peer[i], 1 โค i โค num procs, is specified by interface IIS. The simple
component IS FM is assigned to them for defining the computation of each
process in the IS program. Notice that IS is a SPMD program, where the task
performed by all processes is defined by the same simple component [7].
The interface IIS is declared from composition of IAllReduce, IAllToAllv and
IRShift interfaces, the interface slices of IIS. The interface slices are respectively
identified by bs, kb, and k. The use of combinator do is an abbreviation that
avoids to rewrite the behavior of interface slices. Thus, โdo bsโ relates to the
sequence of actions encapsulated in the specification of interface IAllReduce.
Using the above conventions for overlapping collective communication skeletons in order to form more complex topologies, it is simple to define a specific translation rule for patterns of collective communication interactions. The
identifiers of interface slices from collective communication skeletons might be
viewed as special kinds of ports (collective ports) and the operator do as its
activation operator. Notice that interface slices may be used in termination
conditions of streams, like in line 18. Collective ports have no direction, since
all processes participate in communication. All communication operations are
synchronous. The Figure 30(b) illustrates a Petri net slice that models a collective communication operation. The involved ports are collective ports that correspond to interface slices of units that participates in a certain collective communication operation, defined by the cluster of units that defines it. In Figure
30(c), it is illustrated how to augment the Petri net slice shown in Figure 30(b)
with a protocol for modelling stream communication semantics. It is important
to notice that the set of places Stream Flags(s) and Stream Flags(s) are
shared by all collective ports involved in a collective operation.
4
Petri Net Analysis of Formal Properties
In this section, solutions for two well known synchronization problems, implemented in Hash approach, illustrates the use of Petri nets for analyzing Hash
programs by verifying their formal properties.
4.1
Dining Philosophers
The dining philosophers problem is one of the most relevant synchronization
problems in concurrency theory. Since it was originally proposed by Dijkstra
in 1968 [12], it has been widely used for exercising the ability of concurrent
languages and models for providing elegant solutions for avoiding deadlocks in
concurrent programs. The dining philosophers problem is stated in the following
way:
Five philosophers are sited around a table for dinner. The philosophers spend their times eating and thinking. When a philosopher
wants to eat, he takes two forks from the table. When a philosopher
30
+
+
phil[0]
+
+
phil[0]
+
+
phil[1]
+
+
+ +
phil[4]
+
+
+
+
phil[3]
+
+
phil[4]
+
+
phil[2]
+
+
phil[1]
phil[3]
(a)
phil[2]
(b)
Figure 31: Hash Topologies for the Dining Philosophers Problem
wants to think, he keeps the two forks available on the table. However, there are only five forks available, requiring that each philosopher share their two forks with their neighbors. Thus, whenever a
philosopher is eating, its neighbors are thinking.
A solution to the dining philosopher problem establishes a protocol for ordering the activity of the philosophers. In Figure 31, Hash topologies for solutions
for the dining philosophers problem are presented. The first one, whose code is
presented in Figure 32(a), is an โanarchicalโ solution, where philosophers are
free to decide when to think or to eat. In this solution, the reader may observe
the use of buffered channels and groups of ports of kind any composing the
network topology. The one-slot buffered channel allows to model the fact that a
fork may be on the table waiting for a philosopher to acquire them. This occurs
whenever there is one message pending on the buffer. At the beginning of the
interaction, all philosophers have a fork and release them. When a philosopher
releases a fork, the semantics of group of ports of kind any ensures that if there
is a philosopher waiting for the fork, he will obtain the fork immediately. Otherwise, it is possible that the philosopher that released the fork have a chance
to acquire the fork again. This solution does not satisfy some of the enunciated
requisites for a good solution to an instance of the critical section problem. For
example, if all philosophers acquire their right (left) forks, they will be in deadlock. It is also possible that a philosopher never get a chance to obtain the forks
(eventual entry). The second solution, whose code is presented in Figure 32(b),
ensure all requisites. Additionally, it ensures maximal parallelism. In any state
of execution, there are two philosophers eating.
Figure 33 presents the Petri nets that model the respective behaviors of individual philosophers in the first and in the second solutions. Figure 34 presents
the Petri nets modelling the interaction among the five philosophers, after modelling communication channels. The figures are only illustrative, since the networks have a number of components intractable by simple visual inspection.
31
component DiningPhilosophers<N> with
index i range [0,N-1]
interface IPhil where ports: (rf get*, lf get*) โ (rf put*, rf put*)
protocol: seq {rf put!;
repeat seq {par {lf get?; rf get?};
par {lf put!; rf put!}}
until < lf get & rf get & lf put & rf put >}
[/ unit phil[i] where ports: IPhil
grouping: rf get {neighbor,self} any, lf get {neighbor,self} any,
rf put {neighbor,self} any, lf put {neighbor,self} any /]
[/ connect
connect
connect
connect
phil[i]โrf put[neighbor]
phil[i]โrf put[self]
phil[i]โlf put[neighbor]
phil[i]โlf put[self]
to
to
to
to
phil[i-1 mod N] โlf get[neighbor] ,
phil[i]
โrf get[self]
,
phil[i+1 mod N] โrf get[neighbor] ,
phil[i]
โlf get[self]
,
buffered
buffered
buffered
buffered
1
1
1
1 /]
(a)
component DiningPhilosophers<N> with
index i range [0,N-1]
interface IPhil [0] where ports: (rf get, lf get) โ (rf put, rf put)
protocol: repeat seq {lf put!;rf get?; lf get?; rf put!}
interface IPhil [1] where ports: (rf get, lf get) โ (rf put, rf put)
protocol: repeat seq {rf get?; lf put!; rf put!; lf get?}
[/ unit phil[i] where ports: IPhil [i mod 2] /]
[/ connect phil[i]โrf put to phil[i-1 mod N]โlf get, buffered
connect phil[i]โlf put to phil[i+1 mod N]โrf get, buffered /]
(b)
Figure 32: Hash Code for the First Solution of the Dining Philosophers Problem
32
(a)
(b)
Figure 33: Petri Net Modelling Behavior of One Philosopher
4.1.1
Proving Properties on the Dining Philosophers Solution
In this section, INA (Integrated Network Analyzer) is used as an underlying
engine for verifying formal properties about the above Hash solutions for the
dining philosophers problem. INA allows to perform several structural and dynamic analysis on the Petri net induced from the two solutions. Among other
possible analysis approaches, INA provides model checking facilities that allows
to check validity of CTL (Constructive Tree Logic) formulae, describing properties about the Hash program, on the reachability graph of its corresponding
Petri net. CTL is a suitable formalism, from branching-time temporal logics, for
expressing and verifying safety (invariance) and liveness properties of dynamic
systems. It allows temporal operators to quantify over paths that are possible
from a given state. There exist a superset of CTL, named CTLโ , that augments
expressive power of CTL by allowing to express fairness constrains that are not
allowed to be expressed in CTL. However, INA restricts to CTL because model
checking algorithms for CTL are more efficient (linear in the formula size) that
in CTLโ (exponential in the formula size).
Now, let us to introduce relevant properties that may be proved about solutions to the dining philosophers problems and to model these properties using
CTL. The dining philosophers problem may be thought as an instance of the
critical section problem. In fact, forks are critical sections, since it cannot be
taken by more than one philosopher. A good solution to an instance of the
critical section problem must ensure three properties [1]:
โข Mutual exclusion: Two adjacent philosophers cannot obtain the same
33
(a)
(b)
Figure 34: Petri nets for Dining Philosophers Hash Solutions
34
(a) Macros About Channels
sender prepared[c]
receiver prepared[c]
rendezvous[c]
buffer full[c]
buffer empty[c]
sender blocked[c]
sender blocked[c]
receiver blocked[c]
receiver blocked[c]
(b) Macros About Ports
port pair prepared[p]
port pair prepared[p]
=
=
=
=
=
=
=
=
=
=
=
port prepared[โ0 (c)]
port prepared[โ1 (c)]
sender ready[c] โง receiver ready[c]
ยฌchan buffer free[c]
ยฌchan buffer used[c]
sender ready[c] โง ยฌreceiver ready[c]
sender ready[c] โง buffer full[c]
receiver ready[c] โง ยฌsender ready[c]
receiver ready[c] โง buffer empty[c]
port prepared[โ1 โฆ โ0โ 1(p)]
port prepared[โ0 โฆ โ1โ 1(p)]
(c) Macros About Groups of Ports
group prepared[G]
group prepared[G]
=
=
i
โข
s
โข
โข
โข
b
โข
โข
โข
โข
โข
r
โข
โข
โข
โข
โข
โข
โข
o
โข
(โp)โG : port prepared[p]
(โp)โG : port prepared[p]
all
โข
any
โข
Table 1: Some Useful Formula Macros for Hash programming
fork (enter critical section);
โข Absence of deadlock: A deadlock occurs whenever there is at least
one active philosopher and all active (not terminated) philosophers are
blocked. The classical deadlock situation in dining philosophers problem
occurs when all philosophers acquire its right, or left, forks. In this state,
all philosophers may not proceed and they are not finished. Thus, they
are in deadlock;
โข Absence of unnecessary delay: If a philosopher demands its right
(left) fork and their right (left) neighbor is thinking, the philosopher is
not prevented from obtaining the fork;
โข Eventual entry: Each philosopher that demands for a fork eventually
will obtain it.
In the following paragraphs, the above properties are characterized using
CTL formulae. But before, intending to facilitate concise and modular specification of complex CTL formulas, we define the notion of CTL-formula macro. A
CTL-formula macro is new kind of CTL-formula of the form hmacro namei[q1 , q2 , . . . , qn ],
where hmacro namei is a macro name, qi , 1 โค i โค n, are qualifiers. CTLformulae macros may be expanded in flat CTL-formulae, by applying recursively their definitions. For instance, A CTL-formula macro is defined using the
following syntax:
hmacro namei[v1 , v2 , . . . , vn ] :: f
where hmacro namei is a name for the macro, vi , 1 โค i โค n, are qualifier
variables, and f is a CTL-formula (possibly making reference to CTL-formula
35
(a) Macros About Philosophers
(p = 0 . . . N โ 1)
phil demands lf[p]
=
phil demands rf[p]
=
phil posseses lf[p]
=
phil posseses rf[p]
=
phil is eating[p]
=
phil posseses lf[p] โง phil posseses rf[p]
phil is thinking[p]
=
ยฌphil is eating[p]
phil waiting[p]
=
phil demands rf[p] โจ phil demands lf[p]
phil finished[p]
=
process finished[phil[p]]
all phil finished
=
(โp)<N : phil finished[p]
(b) Macros About Forks
(f = 0 . . . N โ 1)
fork is free[f ]
= phil is thinking[f ] โง phil is thinking[f โN 1]
fork in use by right[f ]
= phil posseses lf[f ]
fork in use by left[f ]
= phil posseses rf[f โN 1]
fork in use[f ]
= fork in use by right[f ] โจ fork in use by left[f ]
Table 2: Some Useful Formula Macros for Dining Philosophers
macros). In a flat CTL-formula that appears in the right-hand-side of a CTLformula macro, qualifier variables are used as qualifiers for place and transition
identifiers and for references to enclosed CTL-formulae macros.
In Table 1, some useful CTL-formulae macros are defined for simplifying
specification of CTL formulae on the restrict domain of Hash programs. In Table
2, other CTL-formulae macros are defined, but now on the restrict domain of the
dining philosophers problem (application oriented). Notice that CTL-formulae
macros of Table 2 are defined on top of that defined in Table 1. Unlike the later
macros, the implementation of the former ones is not sensitive to modifications
in the underlying translation schema. This illustrates the transparency provided
by the use of CTL-formulae macros in an environment for proof and analysis of
formal properties.
We have used INA for proving the three properties enunciated above for
dining philosophers. The first three ones are safety properties. It may be proved
by negating a predicate describing a state that cannot be reached in execution
(bad state). The last one is a liveness property, for which validity of a predicate
must be checked in all possible states.
Proof of Mutual Exclusion. Safety property. One valid formulation for the
corresponding bad state is:
bad = EF (โf )0โคf <N : fork in use by right[f ] โง fork in use by left[f ]
Proof of Absence of deadlock.
the corresponding bad state is:
bad = EF
Safety property. One valid formulation for
(โp)0โคp<N : phil waiting[p] โจ phil finished[p] โง ยฌall phil finished
Proof of Absence of unnecessary delay.
mulation for the corresponding bad state is:
36
Safety property. One valid for-
out
is
[t]
out
transmitter
as
[(t,Bit)]
as
await
asl
[(t,Bit)]
as
corrupt_send
bs2
[Err (t,Bit)]
[Err Bit]
bs
ds
corrupt_ack
as
[Bit]
cs
in
[Err (t,Bit)]
bs
ds
sender side
bs1
ack
receiver
side
os
[t]
in
receiver
Figure 35: Hash Topology for of ABP (Alternating Bit Protocol)
EF
bad =
(โp)0โคf <N : fork is free[f ] โง (phil demands lf[f ] โจ phil demands rf[f โN 1])
Proof of Eventual entry. Liveness property. One valid formulation for the
corresponding good state is: :
good = AG [phil waiting[p] โ (AF [phil eating[p]])]
4.2
The Alternating Bit Protocol
The alternating bit protocol (ABP) is a simple and effective technique for managing retransmission of lost messages in fault-tolerant low level implementations of message passing libraries. Given a transmitter process A and a receiver
process B, connected by a point-to-point stream channel, ABP ensures that
whenever a message sent from A to B is lost, it is retransmitted.
The Hash implementation described here is based on a functional implementation described in [13]. The Figure 35 illustrates the topology of the component
ABP, which might be used for implementing ABP protocol. The virtual units
transmitter and receiver model the processes involved in the communication.
The other units implement the protocol. The units transmitter, out, await, and
corrupt ack implement the sender side of the ABP protocol, while the units receiver, in, ack, and corrupt send implement the receiver side. The await process
may retransmit a message repetitively until the message is received by process
ack. Retransmissions are modelled using streams with nesting factor 2 (streams
of streams). The elements of the nested stream correspond to the retransmission
attempts of a given value. The correct arrive of the message is performed by
inspecting the value received through the port ds. The processes corrupt ack
and corrupt send verify the occurrence of errors in the messages that arrive
at the sender and receiver, respectively, modelling the unreliable nature of the
communication channel. The Hash configuration code presented in Figure 36
implements the ABP component.
The Petri net induced by translating ABP component is presented in Figure
37.
37
component ABP with
use Out, Await, Corrupt, Ack, In
interface ABP Transmitter where ports: () โ (out*::t)
protocol: repeat out! until out
interface ABP Receiver t where ports: (in*::t) โ ()
protocol: repeat in? until in
interface Out where ports: (is::t) โ (as::(t,Bit))
protocol: repeat seq {is?; as!} until <is & as>
interface Await where ports: (as*::(t,Bit),ds**::Err Bit) โ (asโ**::(t,Bit))
protocol: repeat seq { as?; repeat seq {asโ !; ds?} until <asโ & ds>} until <as & asโ & ds>
interface Corrupt where ports: (as**::(t,Bit)) โ (bs**::Err (t,Bit))
protocol: repeat seq {as?; bs!} until <as & bs>
interface Ack where ports: (bs**::Err (t,Bit)) โ (cs**::Bit)
protocol: repeat seq {bs?; cs!} until <bs & cs>
interface In where ports: (bs**::Err (t,Bit)) โ (os*::t)
protocol: repeat seq { repeat bs? until bs; os!} until <bs & os>
unit transmitter where ports: ABP Transmitter () โ out
unit receiver
where ports: ABP Receiver in โ ()
unit
unit
unit
unit
unit
unit
out
await
corrupt ack
in
ack
corrupt send
connect
connect
connect
connect
connect
connect
connect
connect
*
*
*
*
*
*
*
*
where
where
where
where
where
where
ports:
ports:
ports:
ports:
ports:
ports:
transmitterโout
inโos
outโas
awaitโas
corrupt ackโds
corrupt sendโbs[0]
corrupt sendโbs[1]
ackโcs
IOut
IAwait
ICorrupt
IIn
IAck
ICorrupt grouping: bs*2 all
to
to
to
to
to
to
to
to
outโis
receiverโin
awaitโas
corrupt sendโas
ackโds
inโbs
ackโbs
corrupt ackโcs
assign
assign
assign
assign
assign
assign
Out
to
Await to
Corrupt to
In
to
Ack
to
Corrupt to
, buffered
, buffered
Figure 36: ABP Component
38
out
await
corrupt ack
in
ack
corrupt send
transmitter
await
receiver
corrupt_send
out
corrupt_ack
ack
in
Figure 37: Petri Net Induced by ABP Component
39
References
[1] G. Andrews. Concurrent Programming: Principles and Practice. Addison
Wesley, 1991.
[2] R. Armstrong, D. Gannon, A. Geist, K. Keahey, S. Kohn, L. McInnes, S.
Parker, and B. Smolinski. Towards a Common Component Architecture
for High-Performance Scientific Computing. In The 8th IEEE International
Symposium on High Performance Distributed Computing. IEEE, 1999.
[3] D. H. Bailey, T. Harris, W. Shapir, R. van der Wijngaart, A. Woo,
and M. Yarrow.
The NAS Parallel Benchmarks 2.0.
Technical
Report NAS-95-020, NASA Ames Research Center, December 1995.
http://www.nas.nasa.org/NAS/NPB.
[4] E. Best, J. Esparza, B. Grahlmann, S. Melzer, S. Rmer, and F. Wallner.
The PEP Verification System. In Workshop on Formal Design of Safety
Critical Embedded Systems (FEmSysโ97), 1997.
[5] F. H. Carvalho Junior, R. M. F. Lima, and R. D. Lins. Coordinating Functional Processes with Haskell# . In ACM Press, editor, ACM Symposium
on Applied Computing, Track on Coordination Languages, Models and Applications, pages 393โ400, March 2002.
[6] F. H. Carvalho Junior and R. D. Lins. Haskell# : Parallel Programming Made Simple and Efficient. Journal of Universal Computer Science,
9(8):776โ794, August 2003.
[7] F. H. Carvalho Junior and R. D. Lins. On the Implementation of SPMD
Applications using Haskell#. In 15th Brazilian Symposium on Computer
Architecture and High Performance Computing (SBAC-PAD 2003). IEEE
Press, November 2003.
[8] F. H. Carvalho Junior and R. D. Lins. Topological Skeletons in Haskell# .
In International Parallel and Distributed Processing Symposium (IPDPS).
IEEE Press, April 2003. 8 pages.
[9] F. H. Carvalho Junior, R. D. Lins, and R. M. F. Lima. Parallelising
MCP-Haskell# for Evaluating Haskell# Parallel Programming Environment. In UnB, editor, 13th Brazilian Symposium on Computer Architecture
and High-Performance Computing (SBAC-PAD 2001), September 2001.
[10] F. H. Carvalho Junior, R. D. Lins, and R. M. F. Lima. Translating
Haskell# Programs into Petri Nets. Lecture Notes in Computer Science
(VECPARโ2002), 2565:635โ649, 2002.
[11] M. Cole. Algorithm Skeletons: Structured Management of Paralell Computation. Pitman, 1989.
40
[12] E. C. Djikstra. The Structure of THE Multiprogramming System. Communications of the ACM, 11:341โ346, November 1968.
[13] P. Dybjer and H. P. Sander. A Functional Programming Approach to the
Specification and Verification of Concurrent Systems. Formal Aspects of
Computing, 1:303โ319, 1989.
[14] R. German. SPNL: Processes as Language-Oriented Building Blocks of
Stochastic Petri Nets. In 9th Conference on Computer Performance Evaluation, Modelling Techniques and Tools, pages 123โ134. Springer Verlag,
1997.
[15] J. Gischer. Shuffle Languages, Petri Nets, and Context-Sensitive Grammars. Communications of the ACM, 24(9):597โ605, September 1981.
[16] B. Grahlmann and E. Best. PEP - More than a Petri Net Tool. In Lecture
Notes in Computer Science (Tools and Algorithms for the Construction
and Analysis of Systems, Second Int. Workshop, TACASโ96, Passau, Germany), volume 1055, pages 397โ401. Springer Verlag, March 1996.
[17] Inmos. Occam Programming Manual. Prentice-Hall, C.A.R. Hoare Series
Editor, 1984.
[18] T. Ito and Y. Nishitani. On Universality of Concurrent Expressions with
Synchronization Primitives. Theoretical Computer Science, 19:105โ115,
1982.
[19] G. Kiczales, J. Lamping, Menhdhekar A., Maeda C., C. Lopes, J. Loingtier, and J. Irwin. Aspect-Oriented Programming. In Lecture Notes in
Computer Science (Object-Oriented Programming 11th European Conference โ ECOOP โ97), volume 1241, pages 220โ242. Springer-Verlag, November 1997.
[20] S. L. Peyton Jones and J. (editors) Hughes. Report on the Programming
Language Haskell 98, A Non-strict, Purely Functional Language, February
1999.
[21] S. Roch and P. Starke. Manual: Integrated Net Analyzer Version 2.2, 1999.
[22] A. C. Shaw. Software Descriptions with Flow Expressions. IEEE Transactions on Software Enginnering, SE-4(3):299โ325, May 1978.
[23] J. M. Squyres and A. Lumsdaine. A Component Architecture for
LAM/MPI. In Proceedings, 10th European PVM/MPI Usersโ Group Meeting, number 2840 in Lecture Notes in Computer Science, Venice, Italy,
September 2003. Springer-Verlag.
[24] J. M. Squyres, A. Lumsdaine, W. L. George, J. G. Hagedorn, and J. E.
Devaney. The interoperable message passing interface (IMPI) extensions
to LAM/MPI. In Proceedings, MPIDCโ2000, March 2000.
41
[25] S. Thompson. Haskell, The Craft of Functional Programming. AddisonWesley Publishers Ltd., 1996.
[26] A. Zimmermann, J. Freiheit, R. German, and G. Hommel. Petri Net Modelling and Performability Evaluation with TimeNET 3.0. In 11th Int. Conf.
on Modelling Techniques and Tools for Computer Performance Evaluation
(TOOLSโ2000), pages 188โ202. Lecture Notes in Computer Sciente, 2000.
A
The Formal Syntax of HCL
In what follows, it is described a context-free grammar for HCL, the Haskell#
Configuration Language, whose syntax and programming abstractions were informally presented in Section ??. Examples of HCL configurations and their
meanings were presented in Sections ?? and ??. The notation employed here
is similar to that used for describing syntax of Haskell 98 [20]. Indeed, some
non-terminals from that grammar are reused here, once some Haskell code appears in HCL configurations. They are faced italic and bold. A minor difference
on notation resides on the use of (. . .)? , instead of [. . .], for describing optional
terms. For simplicity, notation for indexed notation is ignored from the description of formal syntax of HCL. It may be resolver by a pre-processor, before
parsing.
A.1
Top-Level Definitions
configuration
header
static parameter list
component interface
declaration
A.2
โ
โ
โ
โ
โ
|
|
|
header declaration 1 . . . declaration n (n โฅ 0)
component ID static parameter list ? component interface ?
< ID1 . . . IDn > (n โฅ 0)
ports naming
| iterator decl | interface decl
import decl | use decl
unit decl
| assign decl
| replace decl | channel decl
unify decl | factorize decl | replicate decl | bind decl
haskell code
Use Declaration
use decl โ use use spec
use spec โ id | id.use spec | id.{ use spec 1 , . . . , use spec n }
A.3
(n โฅ 1)
Import Declaration
import decl โ impdecl
A.4
Iterator Declaration
iterator decl โ iterator id1 , . . ., idn range [ numeric exp , numeric exp ] (n โฅ 1)
42
A.5
Interface Declaration
interface decl โ interface (context =>)? ID tyvar 1 . . . tyvar k interface spec
interface spec โ interface ports spec
(where : interface inheritance)? (behavior : behavior expression)?
A.5.1
Interface Ports Description
interface ports spec โ port spec list -> port spec list
port spec list
โ port spec | ( port spec 1 , . . . , port spec n ) (n โฅ 2)
port spec
โ id (*)? (:: atype)? | id
A.5.2
Interface Composition
โ interface slice 1 # . . . # interface slice k (k โฅ 1)
interface inheritance
interface slice
โ id @ ID | ID ports naming composition
ports naming composition โ ports naming
| ( ports naming 1 # . . . # ports naming n ) (n โฅ 1)
ports naming
โ port naming list -> port naming list
port naming list
โ id | ( id1 , . . . , idn ) (n โฅ 1)
A.5.3
Interface Behavior
behavior expression โ
action
โ
|
|
|
condition
โ
disjunction
โ
sync conjunction
โ
simple conjunction โ
A.6
Unit Declaration
unit decl
unit spec
unit interface
wf setup
group spec
group type
wire function
A.7
(sem id1 , . . . , idn )? : action (n โฅ 1)
par { action 1 ; . . . ; action n } | seq { action 1 ; . . . ; action n }
alt { action 1 ; . . . ; action n } | repeat action condition ?
if condition then action else action
id ! | id ? | signal id | wait id (n โฅ 2)
until disjunction | counter numeric exp
sync conjunction 1 โ|โ . . . โ|โ sync conjunction n (n โฅ 1)
h simple conjunction i | simple conjunction
id | ( id1 & . . . & idn ) (n โฅ 1)
โ
โ
โ
โ
โ
โ
โ
unit unit spec
(*)? id (# unit interface)? (wire wf setup 1 , . . . , wf setup n )?
ID ports naming composition ? | interface spec
id (group type group spec)? (: wire function)?
{ id1 , . . ., idn } | * numeric exp
any | all
? | exp
Assignment Declaration
assign decl
โ assign assigned component to assigned unit
43
assigned component โ ID actual parameter list ? ports naming composition ?
actual parameter list โ < numeric exp 1 , . . . , numeric exp n > (n โฅ 1)
assigned unit
โ qid ports naming composition ?
A.8
Replace Declaration
replace decl โ replace qid ports naming composition ? by operand unit
A.9
Channel Declaration
channel decl โ connect qid -> qid to qid <- qid , comm mode
comm mode โ synchronous | buffered numeric exp | ready
A.10
Unification Declaration
โ unify operand unit 1 , . . . , operand unit n to unit spec
adjust wire wf setup 1 , . . . , wf setup k (n โฅ 2, k โฅ 1)
operand unit
โ qid # interface pattern 1 . . . # interface pattern n (n โฅ 1)
interface pattern โ port pattern list -> port pattern list | id
port pattern list โ pattern | ( pattern 1 , . . . , pattern n )
pattern
โ id | @ qid | |
unify decl
A.11
Factorization Declaration
factorize decl โ factorize operand unit to unit spec 1 . . . unit spec n
adjust wire wf setup 1 , . . . , wf setup k (n โฅ 2, k โฅ 1)
A.12
Replication Declaration
replicate decl โ replicate operand unit 1 , . . . , operand unit n into numeric exp
adjust wire wf setup 1 , . . . , wf setup k (n โฅ 2, k โฅ 1)
A.13
Bind Declaration
bind declaration โ bind qid -> qid to -> id | bind qid <- qid to <- id
A.14
Miscelaneous
haskell code โ topdecls
qid โ id1 โ.โ . . . โ.โ idn (n โค 2)
qID โ ID1 โ.โ . . . โ.โ IDn (n โค 2)
44
B
Foundations and Notations
In this section, it is discussed the formalisms that comprise the formal framework for the development of this work, concerning modelling of communication
behavior of processes, according to the Hash component model design principles.
B.1
Formal Languages
The theory of formal languages will be employed as a framework for the study
of patterns of communication interaction of Hash process in a parallel program.
The main interest is to investigate relations between descriptive power of concurrent expressions and Petri nets, in order to define a language for expressing
communication behavior of processes, embedded in the Hash language.
Definition 1 (Alphabet) An alphabet is a finite set of indivisible symbols,
denoted by ฮฃ.
Definition 2 (Word) A word is a finite sequence of symbols of some alphabet
ฮฃ. The symbol วซ denotes the empty word, whose length is zero.
Definition 3 (Kleeneโs Closure of an Alphabet ) A Kleeneโs closure of an
alphabet ฮฃ, denoted by ฮฃโ , is defined as below:
ฮฃโ = {w | w is a word in ฮฃ}
Thus, any sequence of symbols in ฮฃ, including วซ, belongs to ฮฃโ . It is common
to define ฮฃ+ as:
ฮฃ+ = ฮฃโ โ {วซ}
Definition 4 Given an alphabet ฮฃ, a formal language L is defined as follows:
L โ ฮฃโ
B.2
Labelled Petri Nets and Formal Languages
Now, notations and definitions concerning Petri nets are presented.
Definition 5 (Place/Transition Petri Net) A place/transition Petri net is
a directed bipartite graph that can be formalized as a quadruple (P, T, A, M0 ),
where:
1. P is a finite set of places, which can store an unlimited number of marks;
2. T is a finite set of transitions.
3. P โฉ T = โ
.
45
4. A defines a set of arcs, in such way that A โ ((P ร T ) โช (T ร P )) ร
N aturais. Thus, an arc can go from a transition to a place or from a
place to a transition. A number is associated to the arc, indicating its
weight. For simplicity, if the weight is omitted it is one ((p, t) โก (p, t, 1)).
5. The relation M0 โ P ร N defines the initial marking, or the number of
marks that are stored in each place at the initial state of the Petri net;
From the initial marking, a Petri net defines a set reachable markings. A
marking is reachable if it can be obtained from the initial marking by firing a
sequence of transitions, according to firing rules, formalized in what follows.
Definition 6 (Enabled Transition) Be ฮ , ฮ = (P, T, A, MO ), a Petri net
and t, t โ T , a transition of ฮ :
t is enabled โ (โp โ P, โm, n โ N : (p, t, m) โ A โง (p, n) โ M : n โฅ m)
Thus, a transition t is enabled if the number of marks in each one of its
input places is greater than or equal to the weight of the arc that links it to the
transition.
Definition 7 (Firing Rule and Reachable Markings) Be ฮ = (P, T, A, M0 )
a Petri net and a marking M of ฮ . The transition from the marking M to a new
marking Mโ is a side effect of firing an enabled transition t, and represented by
t
the relation M โ M โฒ , where:
M โฒ = Mฬ โช MI โช MO
MI = {(p, n โ m) | โm, n โ N : p โ P, (p, t, m) โ A, (p, n) โ M }
MO = {(p, n + m) | โm, n โ N : p โ P, (t, p, m) โ A, (p, n) โ M }
The sub-marking MI indicates the new marking for the input places of the
transition t, while MO indicates the new marking for output places of t. The
transition can be fire if it is enabled and the effect of firing is to remove marks
from input places and add marks to output places, according to the weights of
the arcs that link these places to t. It is necessary to generalize this definition
to cover the concept of (transitively) reachable marking. Thus, a marking Mn
is reachable from a mark M if there is a sequence of firing of transitions from
M to Mn :
t
t
t
t
n
3
2
1
Mn
ยทยทยท โ
M2 โ
M1 โ
Mโ
This notation can be abbreviated to:
ฯ
M โ Mn , where ฯ = t1 t2 ยท ยท ยท tn
The symbol ฯ denotes a sequence of firings of transitions.
46
Definition 8 (Labelled Petri nets) Be ฮฃ an alphabet. A labelled Petri net
is a 7-uple (P, T, A, M0 , ฯ), where (P, T, A, M0 ) is a place/transition Petri net
and ฯ : T โ ฮฃ โช {ฮป} is a function that associate transitions to a symbol in ฮฃ.
Transitions labelled with ฮป are called silent transitions.
Labelled Petri nets are an extension of Petri nets for generating formal languages. There are two classes of Petri net languages.
Definition 9 (Petri Net Language) Given a labelled Petri net ฮ = (P, T, A, M0 , ฯ),
we define the formal language generated by ฮ as:
ฯ
L(ฮ , M0 ) = {ฯ(ฯ) | โM : M0 โ M }.
Definition 10 (Petri Net Terminal Language) Given a Petri net ฮ (P, T, A, M0 , ฯ)
and a final marking Mf , we can define the terminal language generated by ฮ ,
with respect to Mf , by:
ฯ
T (N, M0 , Mf ) = {ฯ(ฯ) | M0 โ Mf }
Given a labelled Petri net ฮ , the language generated by ฮ defines the possible sequence of firing traces from its initial marking. The terminal language
generated by ฮ , with respect to final marking Mf , differs from ฮ language
because only that traces from M0 to Mf are considered.
Definition 11 (Classes of Petri Nets Languages) We denote the class of
all Petri net languages as โฮป 0 , and the class of all Petri net terminal languages
as โฮป 1 . It is simple to demonstrable that โฮป 0 โ โฮป 1 .
B.3
Interlaced Petri Nets
Interlaced Petri nets are an alternative extension to labelled Petri nets, introduced in this article for simplifying specification of the translation schema of
Hash programs into labelled Petri nets. Like hierarchic Petri nets [], interlaced
Petri nets allows that complex and large scale Petri nets be implemented in
a simpler and modular way. It does not modify descriptive power of labelled
Petri nets. However, while hierarchic Petri nets allow only nesting composition
of Petri nets, interlaced Petri nets also allow overlapping of them. Given a set of
Petri net slices, each one addressing different concerns, they may be overlapped
to form an interlaced Petri net. Interlaced Petri nets may also be viewed as
Petri net slices for composing higher level interlaced Petri nets.
Definition 12 (Interlaced Petri Nets) An interlaced Petri net ฮ can be defined inductively as:
1. (Base) A tuple (P, T, A, M0 , ฯ, ฮด), where (P, T, A, M0 , ฯ) represents a labelled Petri net and ฮด : (P โช T ) โ 2โ is a function that maps Petri net
nodes (places and transitions) onto a list of qualifiers, represents a simple
interlaced Petri net;
47
2. (Induction) Let ฮ 1 , ฮ 2 , . . . , ฮ n be interlaced Petri nets, called Petri net
slices in this context ( hypothesis). ฮ , such that ฮ = hฮ 1 , ฮ 2 , . . . , ฮ n i, is
a composed interlaced Petri net ( induction step).
3. Anything that may not be formed from application of inductive rules 1 and
2 is not an interlaced Petri net.
Definition 13 (Unfolding Composite Interlaced Petri Nets) An unfolded
interlaced Petri net ฮ ฬ is obtained from a interlaced petri net ฮ by applying the
transformation function ยต, defined below:
1. ยต [(P, T, A, M0 , ฯ, ฮด)] = (P, T, A, M0 , ฯ, ฮด)
ห ยต [ฮ 2 ] โช
ห ...โช
ห ยต [ฮ n ] (composite)
2. ยต [< ฮ 1 , ฮ 2 , . . . , ฮ n >] = ยต [ฮ 1 ] โช
ห correspond to the Petri net union operator, defined
The binary operator โช
as below:
ห
(P1 , T1 , A1 , M0 1 , ฯ1 , ฮด1 )โช(P
2 , T2 , A2 , M02 , ฯ2 , ฮด2 ) = (P1 โช P2 , T1 โช T2 , A1 โช A2 , M01 โช M0 2 , ฯ1 โช ฯ2 , ฮด1 โช ฮด2 )
Qualifiers are used to identify components of interlaced Petri nets (places or
transitions) that must be treated as the same component. These components
are said to be equivalent components. They may belong to distinct slices. Next,
qualifiers and identification rules are formalized.
Definition 14 (Qualifier) Let ฮ be a finite set of symbols. The set โ is informally defined as all qualifiers that can be induced from set ฮ. A qualifier ฮด,
ฮด โ โ, is defined from ฮ as following:
โข a, a โ ฮ, is a qualifier ( primitive qualifier);
โข A tuple (a1 , a2 , . . . , an ) is a qualifier ( composed qualifier), assuming that
each ai , 1 โค i โค n, is a primitive qualifier;
The following rule teaches how to identify equivalent vertices in an interlaced
Petri net, using their qualifiers.
Definition 15 (Identification of Vertices (Places or Transitions)) Let ฮ
be an interlaced Petri net. Consider its unfolded variant ยต [ฮ ] = (P, T, A, M0 , ฯ, ฮด).
Let V be the collection of components of ยต [ฮ ] (P โชT ). The following equivalence
relation is defined between two vertices v1 and v2 ({v1 , v2 } โ V ):
v1 โก v2 โ ({v1 , v2 } โ T โจ {v1 , v2 } โ P ) โง (ฮด(v1 ) โฉ ฮด(v2 ) 6= โ
)
48
B.4
Regular Expressions Controlled by Balanced Semaphores
(SCRE)
The following definitions are presented in order to introduce the class of regular
expressions controlled by balanced semaphores (SCRE). This generalization to
regular expressions, with descriptive power comparable to labelled Petri nets,
will be used to model a language for specification of communication behavior of
Hash processes.
Definition 16 (Regular Expressions) A regular expression E over an alphabet ฮฃ is inductively defined as follows:
1. a โ ฮฃ is a regular expression;
2. ฮป is a regular expression;
3. โ
is a regular expression;
4. Be S1 and S2 regular expression. Thus, (S1 ), S1 ยท S2 , S1 + S2 e, S1 โ are
also regular expressions.
Definition 17 (Regular Language) Be E a regular expression over ฮฃ. The
formal language generated by E, LRE (E), is defined in the following way:
1. LRE (โ
) = โ
2. LRE (ฮป) = {ฮป}
3. LRE (a) = {a}, para a โ ฮฃ,
4. LRE ((E)) = LRE (E)
5. LRE (E1 .E2 ) = {xy | x โ LRE (E1 ) โง y โ LRE(E2 )}
6. LRE (E1 + E2 ) = {x | x โ LRE (E1 ) โจ x โ LRE (S2 )}
S
7. LRE (E โ ) = LRE (Ei )
where:
1. E 0 = ฮป
2. E i = E iโ1 E, i > 0
The class of regular languages are denoted by RE.
A previous version of the Hash language used regular expressions to model
communication traces of processes [5]. However, Petri nets are far more expressive than simple regular expressions for describing communication traces.
This fact motivated us to generalize the adopted approach, using some class of
synchronized concurrent expressions shown to be equivalent to Petri nets. Concurrent expressions are an extension to regular expressions defined to model
concurrency. Some authors refer to these languages as shuffle languages.
49
Definition 18 (Concurrent Expressions) Be ฮฃ an alphabet. A concurrent
expression S over ฮฃ is defined by the following rules:
1. If S is a regular expression over ฮฃ, then S is a concurrent expression;
2. If S1 e S2 are concurrent expressions, then S1 โ S2 , e S1 โ are concurrent
expressions;
The operators โ and โ distinguish, at least syntactically, non-regular concurrent expressions. The language generated by concurrent expressions are defined below.
Definition 19 (Concurrent Languages) Be S a concurrent expression over
ฮฃ. The concurrent language LCE (S) is defined according to the following rules:
1. LCE (S) = LRE(S), if S is a well-formed regular expression.
2. LCE (S1 โ S2 ) = {x1 y1 x2 y2 ยท ยท ยท xk yk | x1 x2 ยท ยท ยท xk โ LCE (S1 ) โง y1 y2 ยท ยท ยท yk โ
LCE (S2 )},
S
3. LCE (S โ ) = LCE (Sโi ).
where:
1. S โ0 = ฮป
2. S โi = S โiโ1 โ S, i > 0.
The class of concurrent languages are denoted by CE. It is clear that CE โ
RE, because every regular expression is a concurrent expression. But there is a
strongest and important result that relates concurrent and regular languages.
Theorem 1 ([22], Relating Concurrent and Regular Expressions) If S
is a concurrent expression that does not makes use of โ operator, then LCE (S)
is regular.
Another important result gives bounds to the expressiveness of concurrent
expressions.
Theorem 2 ([15], Bounds to Concurrent Expressions Expressiveness)
If S is a concurrent expression, than LCE (S) is a context-sensitive language.
In order to increase expressivity of concurrent expressions, allowing than
to express recursively enumerable languages, synchronized concurrent expressions[18] were proposed. They extend concurrent expressions with synchronization mechanisms and has been used extensively in 80โs to analyse expressiveness of synchronization mechanisms of concurrency, mainly that based on
semaphores.
50
Definition 20 (Synchronized Concurrent Expressions) Be ฮฃ an alphabet and โฆ a set of symbols that denote synchronization primitives, where ฮฃ and
โฆ are disjoint. A concurrent expression E over ฮฃ โช โฆ is called synchronized
concurrent expression and the language (LS (โฆ)) is said to be a synchronization
mechanism over E. A synchronized concurrent expression over ฮฃ โช โฆ, adopting the synchronization mechanism K, where K= LS (โฆ), will be denoted by
(E, ฮฃ, โฆ, K).
The class of synchronized concurrent expression is denoted by SCE. The next
definition defines the language of a synchronized concurrent expression, which
gives a meaning for the synchronization mechanism.
Definition 21 (Synchronized Concurrent Languages) Be (S, ฮฃ, โฆ, K) a
synchronized concurrent expression, where K = LS (โฆ). The language of S,
LSCE (S) is defined as below:
LSCE (S) = {h(x) | x โ LCE (x), h(x) โ K},
where the homomorphisms h and h are defined as follwing:
a aโฮฃ
h(a) =
ฮป aโโฆ
h(a) =
ฮป
a
aโฮฃ
aโโฆ
The class of synchronized concurrent languages that uses a synchronization
mechanism K is denoted by SCEK .
This definition parameterizes the adopted synchronization mechanism. The
most common are that based on semaphores, whose most significative examples
are presented in the following paragraphs
Be โฆn a set of synchronization primitives com n sฤฑฬmbolos, where:
โฆn = {ฯi , ฯi | i = 1, ยท ยท ยท , n}
The following semaphore-based synchronization mechanisms can be defined
over โฆn [18].
1. Counter semaphore: LS (โฆn ) = C(n), where:
C(n) = LCE ((ฯ1 ยทฯ1 + ฯ1 ))โ โ (ฯ2 ยทฯ2 + sigma2 ))โ โ ยท ยท ยทโ (ฯn ยทฯn + ฯn ))โ )
C = {C(n) | n โฅ 0, whereC(0) = ฮป}
2. [0]-counter semaphore: LS (โฆn ) = C0 (n), where:
C0 (n) = LCE ((ฯ1 ยท ฯ1 ))โ โ (ฯ2 ยท ฯ2 ))โ โ ยท ยท ยท โ (ฯn ยท ฯn ))โ )
C0 = {C0 (n) | n โฅ 0, whereC0 (0) = ฮป}
51
3. Binary semaphore: LS (โฆn ) = B(n), where:
B(n) = LCE ((ฯ1 ยท ฯ1 + ฯ1 ))โ โ (ฯ2 ยท ฯ2 + sigma2))โ โ ยท ยท ยท โ (ฯn ยท ฯn + ฯn ))โ )
B = {B(n) | n โฅ 0, whereB(0) = ฮป}
4. [0]-binary semaphore: LS (โฆn ) = B0 (n), where:
B0 (n) = LCE ((ฯ1 ยท ฯ1 ))โ โ (ฯ2 ยท ฯ2 ))โ โ ยท ยท ยท โ (ฯn ยท ฯn ))โ )
B0 = {B0 (n) | n โฅ 0, whereB0 (0) = ฮป}
C, C0 , B, B0 denote the sets of synchronization primitives with any number
of primitives.
This notation can be generalized to any synchronization mechanism other
than semaphores. Let CE(n) beSthe family of synchronization mechanisms
with n primitives. Then CE = CE(n), n = 0 . . . n. Thus, C(n), C0 (n),
B(n), B0 (n) are special cases of CE(2n). A concurrent expression controlled
by a semaphore system will be called as a semaphore controlled concurrent
expression.
Many important results about the expressive power of synchronized concurrent expressions were presented[]. But, in this work, one deserve special attention. It establishes the equivalence of synchronized regular expressions that uses
[0]-counter semaphores as synchronization protocol to Petri nets. Synchronized
regular expressions are defined below.
Definition 22 (Regular Expressions Controlled by Balanced Semaphores)
Regular expressions controlled by balanced semaphores (RECBS) are defined as
[0]-counter synchronized concurrent expressions that does not make use of โ
operator.
The class of RECBSโs is denoted by RECBS. Remember that theorem 1 guarantees that concurrent expressions without โ operator are equivalent to regular
expressions. However the presence of โ operator and [0]-counter semaphores
guarantees that this kind of expression may generate a richer class of formal
languages than simple regular expressions, a fact enunciated by the following
theorem.
Theorem 3 (Equivalence of RECBS to Petri nets [] ) The class of languages generated by a RECBS is โฮป 1 .
The result in theorem 3 are convenient for our purpose to make descriptive
power of the Hash language equivalent to descriptive power of Petri nets. The
use of RECBS avoids the use of โ operator. Shaw [22], when introducing
flow expressions to make software descriptions gave two interpretations for โ:
a parallel loop and as a sequential loop that creates a process (fork ) in each
iteration. Neither interpretation is practical in the Hash language, because it
assumes static parallelism.
52
| 6cs.PL
|
P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โข Scaling Reliably โข 2017
arXiv:1704.07234v2 [cs.PL] 8 May 2017
Scaling Reliably: Improving the
Scalability of the Erlang Distributed
Actor Platform
Phil Trinder, Natalia Chechina, Nikolaos Papaspyrou,
Konstantinos Sagonas, Simon Thompson, Stephen Adams, Stavros Aronis,
Robert Baker, Eva Bihari, Olivier Boudeville, Francesco Cesarini,
Maurizio Di Stefano, Sverker Eriksson, Viktoria Fordos, Amir Ghaffari,
Aggelos Giantsios, Rockard Green, Csaba Hoch, David Klaftenegger,
Huiqing Li, Kenneth Lundin, Kenneth MacKenzie, Katerina Roukounaki,
Yiannis Tsiouris, Kjell Winblad
RELEASE EU FP7 STREP (287510) project
www.release-project.eu/
April 25, 2017
Abstract
Distributed actor languages are an effective means of constructing scalable reliable systems, and the Erlang
programming language has a well-established and influential model. While the Erlang model conceptually
provides reliable scalability, it has some inherent scalability limits and these force developers to depart from
the model at scale. This article establishes the scalability limits of Erlang systems, and reports the work of
the EU RELEASE project to improve the scalability and understandability of the Erlang reliable distributed
actor model.
We systematically study the scalability limits of Erlang, and then address the issues at the virtual machine,
language and tool levels. More specifically: (1) We have evolved the Erlang virtual machine so that it can
work effectively in large scale single-host multicore and NUMA architectures. We have made important
changes and architectural improvements to the widely used Erlang/OTP release. (2) We have designed and
implemented Scalable Distributed (SD) Erlang libraries to address language-level scalability issues, and
provided and validated a set of semantics for the new language constructs. (3) To make large Erlang systems
easier to deploy, monitor, and debug we have developed and made open source releases of five complementary
tools, some specific to SD Erlang.
Throughout the article we use two case studies to investigate the capabilities of our new technologies and
tools: a distributed hash table based Orbit calculation and Ant Colony Optimisation (ACO). Chaos Monkey
experiments show that two versions of ACO survive random process failure and hence that SD Erlang
preserves the Erlang reliability model. While we report measurements on a range of NUMA and cluster
architectures, the key scalability experiments are conducted on the Athos cluster with 256 hosts (6144 cores).
Even for programs with no global recovery data to maintain, SD Erlang partitions the network to reduce
network traffic and hence improves performance of the Orbit and ACO benchmarks above 80 hosts. ACO
measurements show that maintaining global recovery data dramatically limits scalability; however scalability
is recovered by partitioning the recovery data. We exceed the established scalability limits of distributed
Erlang, and do not reach the limits of SD Erlang for these benchmarks at this scale (256 hosts, 6144 cores).
1
I.
Introduction
stant messaging server [77].
In Erlang, the actors are termed processes
and are managed by a sophisticated Virtual
Machine on a single multicore or NUMA
host, while distributed Erlang provides relatively transparent distribution over networks
of VMs on multiple hosts. Erlang is supported
by the Open Telecom Platform (OTP) libraries
that capture common patterns of reliable distributed computation, such as the client-server
pattern and process supervision. Any largescale system needs scalable persistent storage and, following the CAP theorem [39],
Erlang uses and indeed implements Dynamostyle NoSQL DBMS like Riak [49] and Cassandra [50].
While the Erlang distributed actor model
conceptually provides reliable scalability, it has
some inherent scalability limits, and indeed
large-scale distributed Erlang systems must depart from the distributed Erlang paradigm in
order to scale, e.g. not maintaining a fully connected graph of hosts. The EU FP7 RELEASE
project set out to establish and address the scalability limits of the Erlang reliable distributed
actor model [67].
After outlining related work (Section II) and
the benchmarks used throughout the article
(Section III) we investigate the scalability limits of Erlang/OTP, seeking to identify specific
issues at the virtual machine, language and
persistent storage levels (Section IV).
We then report the RELEASE project work to
address these issues, working at the following
three levels.
Distributed programming languages and
frameworks are central to engineering large
scale systems, where key properties include
scalability and reliability. By scalability we
mean that performance increases as hosts and
cores are added, and by large scale we mean
architectures with hundreds of hosts and tens
of thousands of cores. Experience with high
performance and data centre computing shows
that reliability is critical at these scales, e.g.
host failures alone account for around one failure per hour on commodity servers with approximately 105 cores [11]. To be usable, programming languages employed on them must
be supported by a suite of deployment, monitoring, refactoring and testing tools that work
at scale.
Controlling shared state is the only way to
build reliable scalable systems. State shared by
multiple units of computation limits scalability
due to high synchronisation and communication costs. Moreover shared state is a threat
for reliability as failures corrupting or permanently locking shared state may poison the
entire system.
Actor languages avoid shared state: actors or
processes have entirely local state, and only interact with each other by sending messages [2].
Recovery is facilitated in this model, since actors, like operating system processes, can fail
independently without affecting the state of
other actors. Moreover an actor can supervise
other actors, detecting failures and taking remedial action, e.g. restarting the failed actor.
Erlang [6, 19] is a beacon language for reliable scalable computing with a widely emulated distributed actor model. It has influenced the design of numerous programming languages like Clojure [43] and F# [74],
and many languages have Erlang-inspired
actor frameworks, e.g. Kilim for Java [73],
Cloud Haskell [31], and Akka for C#, F# and
Scala [64]. Erlang is widely used for building reliable scalable servers, e.g. Ericssonโs
AXD301 telephone exchange (switch) [79], the
Facebook chat server, and the Whatsapp in-
1. We have designed and implemented a
set of Scalable Distributed (SD) Erlang libraries to address language-level reliability and scalability issues. An operational
semantics is provided for the key new
s_group construct, and the implementation is validated against the semantics (Section V).
2. We have evolved the Erlang virtual machine
so that it can work effectively in large-scale
single-host multicore and NUMA architectures. We have improved the shared
2
P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โข Scaling Reliably โข 2017
ETS tables, time management, and load
balancing between schedulers. Most of
these improvements are now included in
the Erlang/OTP release, currently downloaded approximately 50K times each
month (Section VI).
3. To facilitate the development of scalable
Erlang systems, and to make them maintainable, we have developed three new
tools: Devo, SDMon and WombatOAM,
and enhanced two others: the visualisation tool Percept, and the refactorer Wrangler. The tools support refactoring programs to make them more scalable, easier to deploy at large scale (hundreds of
hosts), easier to monitor and visualise their
behaviour. Most of these tools are freely
available under open source licences; the
WombatOAM deployment and monitoring tool is a commercial product (Section VII).
Throughout the article we use two benchmarks to investigate the capabilities of our new
technologies and tools. These are a computation in symbolic algebra, more specifically
an algebraic โorbitโ calculation that exploits
a non-replicated distributed hash table, and
an Ant Colony Optimisation (ACO) parallel
search program (Section III).
We report on the reliability and scalability
implications of our new technologies using Orbit, ACO, and other benchmarks. We use a
Chaos Monkey instance [14] that randomly
kills processes in the running system to demonstrate the reliability of the benchmarks and
to show that SD Erlang preserves the Erlang
language-level reliability model. While we
report measurements on a range of NUMA
and cluster architectures as specified in Appendix A, the key scalability experiments are
conducted on the Athos cluster with 256 hosts
and 6144 cores. Having established scientifically the folklore limitations of around 60 connected hosts/nodes for distributed Erlang systems in Section 4, a key result is to show that
the SD Erlang benchmarks exceed this limit
and do not reach their limits on the Athos clus-
ter (Section VIII).
Contributions. This article is the first systematic presentation of the coherent set of
technologies for engineering scalable reliable
Erlang systems developed in the RELEASE
project.
Section IV presents the first scalability study
covering Erlang VM, language, and storage
scalability. Indeed we believe it is the first
comprehensive study of any distributed actor language at this scale (100s of hosts, and
around 10K cores). Individual scalability studies, e.g. into Erlang VM scaling [8], or language and storage scaling have appeared before [38, 37].
At the language level the design, implementation and validation of the new libraries (Section V) have been reported piecemeal [21, 60],
and are included here for completeness.
While some of the improvements made to
the Erlang Virtual Machine (Section i) have
been thoroughly reported in conference publications [66, 46, 47, 69, 70, 71], others are reported here for the first time (Sections iii, ii).
In Section VII, the WombatOAM and SDMon tools are described for the first time, as
is the revised Devo system and visualisation.
The other tools for profiling, debugging and
refactoring developed in the project have previously been published piecemeal [52, 53, 55, 10],
but this is their first unified presentation.
All of the performance results in Section VIII
are entirely new, although a comprehensive
study of SD Erlang performance is now available in a recent article by [22].
II.
Context
i. Scalable Reliable Programming
Models
There is a plethora of shared memory concurrent programming models like PThreads
or Java threads, and some models, like
OpenMP [20], are simple and high level. However synchronisation costs mean that these
models generally do not scale well, often struggling to exploit even 100 cores. Moreover, re3
P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โข Scaling Reliably โข 2017
liability mechanisms are greatly hampered by
the shared state: for example, a lock becomes
permanently unavailable if the thread holding
it fails.
The High Performance Computing (HPC)
community build large-scale (106 core) distributed memory systems using the de facto
standard MPI communication libraries [72]. Increasingly these are hybrid applications that
combine MPI with OpenMP. Unfortunately,
MPI is not suitable for producing general purpose concurrent software as it is too low level
with explicit message passing. Moreover, the
most widely used MPI implementations offer
no fault recovery:1 if any part of the computation fails, the entire computation fails. Currently the issue is addressed by using what
is hoped to be highly reliable computational
and networking hardware, but there is intense
research interest in introducing reliability into
HPC applications [33].
Server farms use commodity computational
and networking hardware, and often scale to
around 105 cores, where host failures are routine. They typically perform rather constrained
computations, e.g. Big Data Analytics, using reliable frameworks like Google MapReduce [26]
or Hadoop [78]. The idempotent nature of the
analytical queries makes it relatively easy for
the frameworks to provide implicit reliability:
queries are monitored and failed queries are
simply re-run. In contrast, actor languages like
Erlang are used to engineer reliable general
purpose computation, often recovering failed
stateful computations.
ii.
Actor Languages
The actor model of concurrency consists of independent processes communicating by means
of messages sent asynchronously between processes. A process can send a message to any
other process for which it has the address (in
Erlang the โprocess identifierโ or pid), and
the remote process may reside on a different
host. While the notion of actors originated
1 Some fault tolerance is provided in less widely used
MPI implementations like [27].
4
in AI [42], it has been used widely as a general metaphor for concurrency, as well as being
incorporated into a number of niche programming languages in the 1970s and 80s. More recently it has come back to prominence through
the rise of not only multicore chips but also
larger-scale distributed programming in data
centres and the cloud.
With built-in concurrency and data isolation, actors are a natural paradigm for engineering reliable scalable general-purpose systems [1, 41]. The model has two main concepts:
actors that are the unit of computation, and
messages that are the unit of communication.
Each actor has an address-book that contains the
addresses of all the other actors it is aware of.
These addresses can be either locations in memory, direct physical attachments, or network
addresses. In a pure actor language, messages
are the only way for actors to communicate.
After receiving a message an actor can do
the following: (i) send messages to another
actor from its address-book, (ii) create new actors, or (iii) designate a behaviour to handle the
next message it receives. The model does not
impose any restrictions in the order in which
these actions must be taken. Similarly, two
messages sent concurrently can be received in
any order. These features enable actor based
systems to support indeterminacy and quasicommutativity, while providing locality, modularity, reliability and scalability [41].
Actors are just one message-based paradigm,
and other languages and libraries have related
message passing paradigms. Recent example
languages include Go [28] and Rust [62] that
provide explicit channels, similar to actor mailboxes. Probably the most famous message
passing library is MPI [72], with APIs for many
languages and widely used on clusters and
High Performance Computers. It is, however,
arguable that the most important contribution
of the actor model is the one-way asynchronous
communication [41]. Messages are not coupled
with the sender, and neither they are transferred synchronously to a temporary container
where transmission takes place, e.g. a buffer, a
queue, or a mailbox. Once a message is sent,
P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โข Scaling Reliably โข 2017
the receiver is the only entity responsible for
that message.
Erlang [6, 19] is the pre-eminent programming language based on the actor model, having a history of use in production systems,
initially with its developer Ericsson and then
more widely through open source adoption.
There are now actor frameworks for many
other languages; these include Akka for C#, F#
and Scala [64], CAF2 for C++, Pykka3 , Cloud
Haskell [31], PARLEY [51] for Python, and Termite Scheme [35], and each of these is currently
under active use and development. Moreover,
the recently defined Rust language [62] has a
version of the actor model built in, albeit in an
imperative context.
iii. Erlangโs Support for Concurrency
In Erlang, actors are termed processes, and virtual machines are termed nodes. The key elements of the actor model are: fast process creation and destruction; lightweight processes,
e.g. enabling 106 concurrent processes on a single host with 8GB RAM; fast asynchronous
message passing with copying semantics; process monitoring; strong dynamic typing, and
selective message reception.
By default Erlang processes are addressed
by their process identifier (pid), e.g.
Pong_PID = spawn(fun some_module:pong/0)
spawns a process to execute the anonymous
function given as argument to the spawn primitive, and binds Pong_PID to the new process
identifier. Here the new process will execute the pong/0 function which is defined in
some_module. A subsequent call
Pong_PID ! finish
sends the messaged finish to the process identified by Pong_PID. Alternatively, processes can
be given names using a call of the form:
register(my_funky_name, Pong_PID)
2 http://actor-framework.org
3 http://pykka.readthedocs.org/en/latest/
which registers this process name in the nodeโs
process name table if not already present. Subsequently, these names can be used to refer to
or communicate with the corresponding processes (e.g. send them a message):
my_funky_process ! hello.
A distributed Erlang system executes on multiple nodes, and the nodes can be freely deployed across hosts, e.g. they can be located
on the same or different hosts. To help make
distribution transparent to the programmer,
when any two nodes connect they do so transitively, sharing their sets of connections. Without considerable care this quickly leads to a
fully connected graph of nodes. A process may
be spawned on an explicitly identified node,
e.g.
Remote_Pong_PID = spawn(some_node,
fun some_module:pong/0).
After this, the remote process can be addressed
just as if it were local. It is a significant burden on the programmer to identify the remote
nodes in large systems, and we will return to
this in Sections ii, i.2.
iv. Scalability and
Erlang Systems
Reliability
in
Erlang was designed to solve a particular
set of problems, namely those in building
telecommunicationsโ infrastructure, where systems need to be scalable to accommodate hundreds of thousands of calls concurrently, in soft
real-time. These systems need to be highlyavailable and reliable: i.e. to be robust in the
case of failure, which can come from software
or hardware faults. Given the inevitability of
the latter, Erlang adopts the โlet it failโ philosophy for error handling. That is, encourage
programmers to embrace the fact that a process
may fail at any point, and have them rely on
the supervision mechanism, discussed shortly,
to handle the failures.
Figure 1 illustrates Erlangโs support for concurrency, multicores and distribution. Each
Erlang node is represented by a yellow shape,
5
P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โข Scaling Reliably โข 2017
Figure 1: Conceptual view of Erlangโs concurrency, multicore support and distribution.
and each rectangle represents a host with an IP
address. Each red arc represents a connection
between Erlang nodes. Each node can run on
multiple cores, and exploit the inherent concurrency provided. This is done automatically
by the VM, with no user intervention needed.
Typically each core has an associated scheduler
that schedules processes; a new process will be
spawned on the same core as the process that
spawns it, but work can be moved to a different
scheduler through a work-stealing allocation
algorithm. Each scheduler allows a process
that is ready to compute at most a fixed number of computation steps before switching to
another. Erlang built-in functions or BIFs are implemented in C, and at the start of the project
were run to completion once scheduled, causing performance and responsiveness problems
if the BIF had a long execution time.
Scaling in Erlang is provided in two different ways. It is possible to scale within a single
node by means of the multicore virtual machine
exploiting the concurrency provided by the
multiple cores or NUMA nodes. It is also possible to scale across multiple hosts using multiple
distributed Erlang nodes.
Reliability in Erlang is multi-faceted. As in
all actor languages each process has private
state, preventing a failed or failing process
from corrupting the state of other processes.
Messages enable stateful interaction, and contain a deep copy of the value to be shared, with
no references (e.g. pointers) to the sendersโ
internal state. Moreover Erlang avoids type
errors by enforcing strong typing, albeit dynamically [7]. Connected nodes check liveness
6
with heartbeats, and can be monitored from
outside Erlang, e.g. by an operating system
process.
However, the most important way to achieve
reliability is supervision, which allows a process
to monitor the status of a child process and
react to any failure, for example by spawning
a substitute process to replace a failed process.
Supervised processes can in turn supervise
other processes, leading to a supervision tree.
The supervising and supervised processes may
be in different nodes, and on different hosts,
and hence the supervision tree may span multiple hosts or nodes.
To provide reliable distributed service registration, a global namespace is maintained on
every node, which maps process names to pids.
It is this that we mean when we talk about a
โreliableโ system: it is one in which a named
process in a distributed system can be restarted
without requiring the client processes also to
be restarted (because the name can still be used
for communication).
To see global registration in action, consider
a pong server process
global:register_name(pong_server,
Remote_Pong_PID).
Clients of the server can send messages to the
registered name, e.g.
global:whereis_name(pong_server)!finish.
If the server fails the supervisor can spawn a
replacement server process with a new pid and
register it with the same name (pong_server).
Thereafter client messages to the pong_server
will be delivered to the new server process. We
return to discuss the scalability limitations of
maintaining a global namespace in Section V.
v.
ETS: Erlang Term Storage
Erlang is a pragmatic language and the actor
model it supports is not pure. Erlang processes,
besides communicating via asynchronous message passing, can also share data in public
memory areas called ETS tables.
P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โข Scaling Reliably โข 2017
The Erlang Term Storage (ETS) mechanism
is a central component of Erlangโs implementation. It is used internally by many libraries and
underlies the in-memory databases. ETS tables
are key-value stores: they store Erlang tuples
where one of the positions in the tuple serves
as the lookup key. An ETS table has a type
that may be either set, bag or duplicate_bag,
implemented as a hash table, or ordered_set
which is currently implemented as an AVL tree.
The main operations that ETS supports are table creation, insertion of individual entries and
atomic bulk insertion of multiple entries in a
table, deletion and lookup of an entry based
on some key, and destructive update. The operations are implemented as C built-in functions
in the Erlang VM.
The code snippet below creates a set ETS
table keyed by the first element of the entry; atomically inserts two elements with keys
some_key and 42; updates the value associated
with the table entry with key 42; and then looks
up this entry.
Table = ets:new(my_table,
[set, public, {keypos, 1}]),
ets:insert(Table, [
{some_key, an_atom_value},
{42, {a,tuple,value}}]),
ets:update_element(Table, 42,
[{2, {another,tuple,value}}]),
[{Key, Value}] = ets:lookup(Table, 42).
ETS tables are heavily used in many Erlang
applications. This is partly due to the convenience of sharing data for some programming
tasks, but also partly due to their fast implementation. As a shared resource, however, ETS
tables induce contention and become a scalability bottleneck, as we shall see in Section i.
III.
Benchmarks for scalability
and reliability
The two benchmarks that we use throughout this article are Orbit, that measures scalability without looking at reliability, and
Ant Colony Optimisation (ACO) that allows
us to measure the impact on scalability of
adding global namespaces to ensure reliability.
The source code for the benchmarks, together with more detailed documentation, is available at https://github.
com/release-project/benchmarks/.
The
RELEASE project team also worked to improve the reliability and scalability of other
Erlang programs including a substantial (approximately 150K lines of Erlang code) SimDiasca simulator [16] and an Instant Messenger
that is more typical of Erlang applications [23]
but we do not cover these systematically here.
i.
Orbit
Orbit is a computation in symbolic algebra,
which generalises a transitive closure computation [57]. To compute the orbit for a given
space [0..X ], a list of generators g1 , g2 , ..., gn are
applied on an initial vertex x0 โ [0..X ]. This
creates new values ( x1 ...xn ) โ [0..X ], where
xi = gi ( x0 ). The generator functions are applied on the new values until no new value is
generated.
Orbit is a suitable benchmark because it has
a number of aspects that characterise a class
of real applications. The core data structure
it maintains is a set and, in distributed environments is implemented as a distributed hash
table (DHT), similar to the DHTs used in replicated form in NoSQL database management
systems. Also, in distributed mode, it uses
standard peer-to-peer (P2P) techniques like a
credit-based termination algorithm [61]. By
choosing the orbit size, the benchmark can be
parameterised to specify smaller or larger computations that are suitable to run on a single
machine (Section i) or on many nodes (Sectioni). Moreover it is only a few hundred lines
of code.
As shown in Figure 2, the computation is
initiated by a master which creates a number
of workers. In the single node scenario of the
benchmark, workers correspond to processes
but these workers can also spawn other processes to apply the generator functions on a
subset of their input values, thus creating intraworker parallelism. In the distributed version
7
P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โข Scaling Reliably โข 2017
Figure 2: Distributed Erlang Orbit (D-Orbit) architecture: workers are mapped to nodes.
of the benchmark, processes are spawned by
the master node to worker nodes, each maintaining a DHT fragment. A newly spawned
process gets a share of the parentโs credit, and
returns this on completion. The computation
is finished when the master node collects all
credit, i.e. all workers have completed.
ii.
Ant Colony Optimisation (ACO)
Ant Colony Optimisation [29] is a metaheuristic which has been applied to a large
number of combinatorial optimisation problems. For the purpose of this article, we have
applied it to an NP-hard scheduling problem
known as the Single Machine Total Weighted
Tardiness Problem (SMTWTP) [63], where a
number of jobs of given lengths have to be arranged in a single linear schedule. The goal is
to minimise the cost of the schedule, as determined by certain constraints.
The ACO method is attractive from the point
of view of distributed computing because it
can benefit from having multiple cooperating
colonies, each running on a separate compute
node and consisting of multiple โantsโ. Ants
are simple computational agents which concur-
Figure 3: Distributed Erlang Two-level Ant Colony Optimisation (TL-ACO) architecture.
8
rently compute possible solutions to the input
problem guided by shared information about
good paths through the search space; there is
also a certain amount of stochastic variation
which allows the ants to explore new directions. Having multiple colonies increases the
number of ants, thus increasing the probability
of finding a good solution.
We implement four distributed coordination
patterns for the same multi-colony ACO computation as follows. In each implementation,
the individual colonies perform some number
of local iterations (i.e. generations of ants) and
then report their best solutions; the globallybest solution is then selected and is reported
to the colonies, which use it to update their
pheromone matrices. This process is repeated
for some number of global iterations.
Two-level ACO (TL-ACO) has a single master
node that collects the coloniesโ best solutions
and distributes the overall best solution back to
the colonies. Figure 3 depicts the process and
node placements of the TL-ACO in a cluster
with NC nodes. The master process spawns
NC colony processes on available nodes. In
the next step, each colony process spawns NA
ant processes on the local node. Each ant iterates I A times, returning its result to the colony
master. Each colony iterates I M times, reporting their best solution to, and receiving the
globally-best solution from, the master process.
We validated the implementation by applying
TL-ACO to a number of standard SMTWTP
instances [25, 13, 34], obtaining good results
in all cases, and confirmed that the number of
perfect solutions increases as we increase the
number of colonies.
Multi-level ACO (ML-ACO). In TL-ACO the
master node receives messages from all of the
colonies, and thus could become a bottleneck.
ML-ACO addresses this by having a tree of
submasters (Figure 4), with each node in the
bottom level collecting results from a small
number of colonies. These are then fed up
through the tree, with nodes at higher levels
selecting the best solutions from their children.
Globally Reliable ACO (GR-ACO). In ML-ACO
if a single colony fails to report back the sys-
P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โข Scaling Reliably โข 2017
Figure 4: Distributed Erlang Multi-level Ant Colony Optimisation (ML-ACO) architecture.
tem will wait indefinitely. GR-ACO adds fault
tolerance, supervising colonies so that a faulty
colony can be detected and restarted, allowing
the system to continue execution.
Scalable Reliable ACO (SR-ACO) also adds
fault-tolerance, but using supervision within
our new s_groups from Section i.1, and the
architecture of SR-ACO is discussed in detail
there.
i.
Scaling Erlang on a Single Host
To investigate Erlang scalability we built
BenchErl, an extensible open source benchmark suite with a web interface.4 BenchErl
shows how an applicationโs performance
changes when resources, like cores or schedulers, are added; or when options that control
these resources change:
โข the number of nodes, i.e. the number of
Erlang VMs used, typically on multiple
hosts;
IV.
Erlang Scalability Limits
This section investigates the scalability of
Erlang at VM, language, and persistent storage levels. An aspect we choose not to explore
is the security of large scale systems where,
for example, one might imagine providing enhanced security for systems with multiple clusters or cloud instances connected by a Wide
Area Network. We assume that existing security mechanisms are used, e.g. a Virtual Private
Network.
โข the number of cores per node;
โข the number of schedulers, i.e. the OS threads
that execute Erlang processes in parallel,
and their binding to the topology of the
cores of the underlying computer node;
โข the Erlang/OTP release and flavor; and
โข the command-line arguments used to start
the Erlang nodes.
4 Information about BenchErl is available at http://
release.softlab.ntua.gr/bencherl/.
9
P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โข Scaling Reliably โข 2017
20000
with intra-worker parallelism, 10048, 128
without intra-worker parallelism, 10048, 128
18000
16000
time (ms)
14000
12000
10000
8000
6000
4000
2000
0
0
10
20
30
40
50
60
70
60
70
# Schedulers
40
with intra-worker parallelism, 10048, 128
without intra-worker parallelism, 10048, 128
35
30
Speedup
25
20
15
10
5
0
0
10
20
30
40
50
# Schedulers
Figure 5: Runtime and speedup of two configurations of the Orbit benchmark using
Erlang/OTP R15B01.
Using BenchErl, we investigated the scalability of an initial set of twelve benchmarks
and two substantial Erlang applications using a single Erlang node (VM) on machines
with up to 64 cores, including the Bulldozer
machine specified in Appendix A. This set of
experiments, reported by [8], confirmed that
some programs scaled well in the most recent
Erlang/OTP release of the time (R15B01) but
also revealed VM and language level scalability
bottlenecks.
Figure 5 shows runtime and speedup curves
for the Orbit benchmark where master and
workers run on a single Erlang node in configurations with and without intra-worker parallelism. In both configurations the program
scales. Runtime continuously decreases as we
add more schedulers to exploit more cores.
The speedup of the benchmark without intraworker parallelism, i.e. without spawning additional processes for the computation (green
10
curve), is almost linear up to 32 cores but increases less rapidly from that point on; we see a
similar but more clearly visible pattern for the
other configuration (red curve) where there is
no performance improvement beyond 32 schedulers. This is due to the asymmetric characteristics of the machineโs micro-architecture,
which consists of modules that couple two conventional x86 out-of-order cores that share the
early pipeline stages, the floating point unit,
and the L2 cache with the rest of the module [3].
Some other benchmarks, however, did not
scale well or experienced significant slowdowns when run in many VM schedulers
(threads). For example the ets_test benchmark
has multiple processes accessing a shared ETS
table. Figure 6 shows runtime and speedup
curves for ets_test on a 16-core (eight cores
with hyperthreading) Intel Xeon-based machine. It shows that runtime increases beyond
two schedulers, and that the program exhibits
a slowdown instead of a speedup.
For many benchmarks there are obvious reasons for poor scaling like limited parallelism
in the application, or contention for shared resources. The reasons for poor scaling are less
obvious for other benchmarks, and it is exactly
these we have chosen to study in detail in subsequent work [8, 46].
A simple example is the parallel BenchErl
benchmark, that spawns some n processes,
each of which creates a list of m timestamps
and, after it checks that each timestamp in the
list is strictly greater than the previous one,
sends the result to its parent. Figure 7 shows
that up to eight cores each additional core leads
to a slowdown, thereafter a small speedup is
obtained up to 32 cores, and then again a slowdown. A small aspect of the benchmark, easily overlooked, explains the poor scalability.
The benchmark creates timestamps using the
erlang:now/0 built-in function, whose implementation acquires a global lock in order to return a unique timestamp. That is, two calls to
erlang:now/0, even from different processes
are guaranteed to produce monotonically increasing values. This lock is precisely the bot-
P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โข Scaling Reliably โข 2017
10000
160000
[2512,1264,640]
9000
8000
120000
7000
100000
time (ms)
time (ms)
[70016,640]
140000
6000
5000
80000
60000
4000
40000
3000
20000
2000
1000
0
0
2
4
6
8
10
12
14
16
0
10
20
30
# Schedulers
40
50
60
70
# Schedulers
1.6
1
[2512,1264,640]
[70016,640]
0.9
1.4
0.8
1.2
Speedup
Speedup
0.7
1
0.8
0.6
0.5
0.4
0.6
0.3
0.4
0.2
0.2
0.1
0
2
4
6
8
10
12
14
16
# Schedulers
0
10
20
30
40
50
60
70
# Schedulers
Figure 6: Runtime
and
speedup
of
the
ets_test BenchErl benchmark using
Erlang/OTP R15B01.
Figure 7: Runtime and speedup of the BenchErl
benchmark
called
parallel
using
Erlang/OTP R15B01.
tleneck in the VM that limits the scalability
of this benchmark. We describe our work to
address VM timing issues in Figure iii.
tion as there is no need to discover nodes, and
the design works well for small numbers of
nodes. However at emergent server architecture scales, i.e. hundreds of nodes, this design
becomes very expensive and system architects
must switch from the default Erlang model, e.g.
they need to start using hidden nodes that do
not share connection sets.
We have investigated the scalability limits
imposed by network connectivity costs using
several Orbit calculations on two large clusters:
Kalkyl and Athos as specified in Appendix A.
The Kalkyl results are discussed by [21], and
Figure 29 in Section i shows representative
results for distributed Erlang computing orbits with 2M and 5M elements on Athos. In
all cases performance degrades beyond some
scale (40 nodes for the 5M orbit, and 140 nodes
for the 2M orbit). Figure 32 illustrates the additional network traffic induced by the fully
connected network. It allows a comparison be-
Discussion Our investigations identified contention for shared ETS tables, and for
commonly-used shared resources like timers,
as the key VM-level scalability issues. Section VI outlines how we addressed these issues
in recent Erlang/OTP releases.
ii.
Distributed Erlang Scalability
Network Connectivity Costs When any normal distributed Erlang nodes communicate,
they share their connection sets and this typically leads to a fully connected graph of nodes.
So a system with n nodes will maintain O(n2 )
connections, and these are relatively expensive
TCP connections with continual maintenance
traffic. This design aids transparent distribu-
11
P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โข Scaling Reliably โข 2017
tween the number of packets sent in a fully connected network (ML-ACO) with those sent in
a network partitioned using our new s_groups
(SR-ACO).
paper [37] investigates the impact of data size,
and computation time in P2P calls both independently and in combination, and the scaling
properties of the common Erlang/OTP generic
server processes gen_server and gen_fsm.
Global Information Costs Maintaining
global information is known to limit the
scalability of distributed systems, and crucially
the process namespaces used for reliability
are global. To investigate the scalability
limits imposed on distributed Erlang by
such global information we have designed
and implemented DE-Bench, an open source,
parameterisable and scalable peer-to-peer
benchmarking framework [37, 36]. DE-Bench
measures the throughput and latency of
distributed Erlang commands on a cluster of
Erlang nodes, and the design is influenced
by the Basho Bench benchmarking tool for
Riak [12]. Each DE-Bench instance acts as
a peer, providing scalability and reliability
by eliminating central coordination and any
single point of failure.
To evaluate the scalability of distributed
Erlang, we measure how adding more hosts
increases the throughput, i.e. the total number of successfully executed distributed Erlang
commands per experiment. Figure 8 shows
the parameterisable internal workflow of DEBench. There are three classes of commands
in DE-Bench:(i) Point-to-Point (P2P) commands,
where a function with tunable argument size
and computation time is run on a remote
node, include spawn, rpc, and synchronous
calls to server processes, i.e. gen_server
or gen_fsm. (ii) Global commands, which
entail synchronisation across all connected
nodes, such as global:register_name and
global:unregister_name. (iii) Local commands,
which are executed independently by a single
node, e.g. whereis_name, a look up in the
local name table.
The benchmarking is conducted on 10 to 100
host configurations of the Kalkyl cluster (in
steps of 10) and measures the throughput of
successful commands per second over 5 minutes. There is one Erlang VM on each host and
one DE-Bench instance on each VM. The full
Here we focus on the impact of different proportions of global commands, mixing global
with P2P and local commands. Figure 9
shows that even a low proportion of global
commands limits the scalability of distributed
Erlang, e.g. just 0.01% global commands limits
scalability to around 60 nodes. Figure 10 reports the latency of all commands and shows
that, while the latencies for P2P and local commands are stable at scale, the latency of the
global commands increases dramatically with
scale. Both results illustrate that the impact of
global operations on throughput and latency
in a distributed Erlang system is severe.
12
Explicit Placement While network connectivity and global information impact performance
at scale, our investigations also identified explicit process placement as a programming issue
at scale. Recall from Section iii that distributed
Erlang requires the programmer to identify an
explicit Erlang node (VM) when spawning a
process. Identifying an appropriate node becomes a significant burden for large and dynamic systems. The problem is exacerbated in
large distributed systems where (1) the hosts
may not be identical, having different hardware
capabilities or different software installed; and
(2) communication times may be non-uniform:
it may be fast to send a message between VMs
on the same host, and slow if the VMs are on
different hosts in a large distributed system.
These factors make it difficult to deploy applications, especially in a scalable and portable
manner. Moreover while the programmer may
be able to use platform-specific knowledge to
decide where to spawn processes to enable an
application to run efficiently, if the application
is then deployed on a different platform, or if
the platform changes as hosts fail or are added,
this becomes outdated.
P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โข Scaling Reliably โข 2017
Figure 8: DE-Benchโs internal workflow.
Figure 9: Scalability vs. percentage of global commands in Distributed Erlang.
Discussion Our investigations confirm three
language-level scalability limitations of Erlang
from developer folklore.(1) Maintaining a fully
connected network of Erlang nodes limits scalability, for example Orbit is typically limited
to just 40 nodes. (2) Global operations, and crucially the global operations required for reliability, i.e. to maintain a global namespace, seriously limit the scalability of distributed Erlang
systems. (3) Explicit process placement makes it
hard to built performance portable applications
for large architectures. These issues cause designers of reliable large scale systems in Erlang
to depart from the standard Erlang model, e.g.
using techniques like hidden nodes and stor-
ing pids in data structures. In Section V we
develop language technologies to address these
issues.
iii.
Persistent Storage
Any large scale system needs reliable scalable
persistent storage, and we have studied the
scalability limits of Erlang persistent storage alternatives [38]. We envisage a typical large
server having around 105 cores on around
100 hosts. We have reviewed the requirements for scalable and available persistent storage and evaluated four popular Erlang DBMS
against these requirements. For a target scale
13
P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โข Scaling Reliably โข 2017
Figure 10: Latency of commands as the number of Erlang nodes increases.
of around 100 hosts, Mnesia and CouchDB
are, unsurprisingly, not suitable. However,
Dynamo-style NoSQL DBMS like Cassandra
and Riak have the potential to be.
We have investigated the current scalability limits of the Riak NoSQL DBMS using the
Basho Bench benchmarking framework on a
cluster with up to 100 nodes and independent disks. We found that that the scalability limit of Riak version 1.1.1 is 60 nodes on
the Kalkyl cluster. The study placed into the
public scientific domain what was previously
well-evidenced, but anecdotal, developer experience.
We have also shown that resources like memory, disk, and network do not limit the scalability of Riak. By instrumenting the global
and gen_server OTP libraries we identified a
specific Riak remote procedure call that fails
to scale. We outline how later releases of Riak
are refactored to eliminate the scalability bottlenecks.
Discussion We conclude that Dynamo-like
NoSQL DBMSs have the potential to deliver reliable persistent storage for Erlang at our target
scale of approximately 100 hosts. Specifically
an Erlang Cassandra interface is available and
Riak 1.1.1 already provides scalable and available persistent storage on 60 nodes. Moreover
14
the scalability of Riak is much improved in
subsequent versions.
V. Improving Language Scalability
This section outlines the Scalable Distributed
(SD) Erlang libraries [21] we have designed
and implemented to address the distributed
Erlang scalability issues identified in Section ii.
SD Erlang introduces two concepts to improve
scalability. S_groups partition the set of nodes
in an Erlang system to reduce network connectivity and partition global data (Section i.1).
Semi-explicit placement alleviates the issues of
explicit process placement in large heterogeneous networks (Section i.2). The two features
are independent and can be used separately
or in combination. We overview SD Erlang in
Section i, and outline s_group semantics and
validation in Sections ii, iii respectively.
i.
SD Erlang Design
i.1
S_groups
reduce both the number of connections a node
maintains, and the size of name spaces, i.e.
they minimise global information. Specifically
names are registered on, and synchronised between, only the nodes within the s_group. An
s_group has the following parameters: a name,
P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โข Scaling Reliably โข 2017
a list of nodes, and a list of registered names. A
node can belong to many s_groups or to none.
If a node belongs to no s_group it behaves as a
usual distributed Erlang node.
The s_group library defines the functions
shown in Table 1. Some of these functions
manipulate s_groups and provide information
about them, such as creating s_groups and providing a list of nodes from a given s_group.
The remaining functions manipulate names
registered in s_groups and provide information about these names. For example, to register a process, Pid, with name Name in s_group
SGroupName we use the following function. The
name will only be registered if the process is
being executed on a node that belongs to the
given s_group, and neither Name nor Pid are
already registered in that group.
s_group:register_name(SGroupName, Name,
Pid) -> yes | no
To illustrate the impact of s_groups on scalability we repeat the global operations experiment from Section ii (Figure 9). In the SD
Erlang experiment we partition the set of nodes
into s_groups each containing ten nodes, and
hence the names are replicated and synchronised on just ten nodes, and not on all nodes
as in distributed Erlang. The results in Figure 11 show that with 0.01% of global operations throughput of distributed Erlang stops
growing at 40 nodes while throughput of SD
Erlang continues to grow linearly.
The connection topology of s_groups is extremely flexible: they may be organised into
a hierarchy of arbitrary depth or branching,
e.g. there could be multiple levels in the tree
of s_groups; see Figure 12. Moreover it is not
necessary to create an hierarchy of s_groups,
for example, we have constructed an Orbit implementation using a ring of s_groups.
Given such a flexible way of organising distributed systems, key questions in the design
of an SD Erlang system are the following. How
should s_groups be structured? Depending on
the reason the nodes are grouped โ reducing
the number of connections, or reducing the
namespace, or both โ s_groups can be freely
structured as a tree, ring, or some other topology. How large should the s_groups be? Smaller
s_groups mean more inter-group communication, but the synchronisation of the s_group
state between the s_group nodes constrains the
maximum size of s_groups. We have not found
this constraint to be a serious restriction. For
example many s_groups are either relatively
small, e.g. 10-node, internal or terminal elements in some topology, e.g. the leaves and
nodes of a tree. How do nodes from different
s_groups communicate? While any two nodes
can communicate in an SD Erlang system, to
minimise the number of connections communication between nodes from different s_groups
is typically routed via gateway nodes that belong to both s_groups. How do we avoid single
points of failure? For reliability, and to minimise
communication load, multiple gateway nodes
and processes may be required.
Information to make these design choices is
provided by the tools in Section VII and by
benchmarking. A further challenge is how to
systematically refactor a distributed Erlang application into SD Erlang, and this is outlined in
Section i. A detailed discussion of distributed
system design and refactoring in SD Erlang
provided in a recent article [22].
We illustrate typical SD Erlang system designs by showing refactorings of the Orbit and
ACO benchmarks from Section III. In both distributed and SD Erlang the computation starts
on the Master node and the actual computation
is done on the Worker nodes. In the distributed
Erlang version all nodes are interconnected,
and messages are transferred directly from the
sending node to the receiving node (Figure 2).
In contrast, in the SD Erlang version nodes
are grouped into s_groups, and messages are
transferred between different s_groups via Submaster nodes (Figure 13).
A fragment of code that creates an s_group
on a Sub-master node is as follows:
create_s_group(Master,
GroupName, Nodes0) ->
case s_group:new_s_group(GroupName,
Nodes0) of
{ok, GroupName, Nodes} ->
15
P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โข Scaling Reliably โข 2017
Table 1: Summary of s_group functions.
Function
Description
new_s_group(SGroupName, Nodes)
Creates a new s_group consisting of some nodes.
delete_s_group(SGroupName)
Deletes an s_group.
add_nodes(SGroupName, Nodes)
Adds a list of nodes to an s_group.
remove_nodes(SGroupName, Nodes)
Removes a list of nodes from an s_group.
s_groups()
Returns a list of all s_groups known to the node.
own_s_groups()
Returns a list of s_group tuples the node belongs
to.
own_nodes()
Returns a list of nodes from all s_groups the node
belongs to.
own_nodes(SGroupName)
Returns a list of nodes from the given s_group.
info()
Returns s_group state information.
register_name(SGroupName, Name, Pid)
Registers a name in the given s_group.
re_register_name(SGroupName, Name, Pid)
Re-registers a name (changes a registration) in a
given s_group.
unregister_name(SGroupName, Name)
Unregisters a name in the given s_group.
registered_names({node,Node})
Returns a list of all registered names on the given
node.
registered_names({s_group,SGroupName})
Returns a list of all registered names in the given
s_group.
whereis_name(SGroupName, Name)
Return the pid of a name registered in the given
whereis_name(Node, SGroupName, Name)
s_group.
send(SGroupName, Name, Msg)
Send a message to a name registered in the given
send(Node, SGroupName, Name, Msg)
s_group.
Master ! {GroupName, Nodes};
_ -> io:format("exception: message")
end.
distributed Erlang and SD Erlang Orbit and
ACO is presented in Section VIII.
Similarly, we introduce s_groups in the
GR-ACO benchmark from Section ii to create Scalable Reliable ACO (SR-ACO); see Figure 12. Here, apart from reducing the number of connections, s_groups also reduce the
global namespace information. That is, instead of registering the name of a pid globally, i.e. with all nodes, the names is registered only on all nodes in the s_group with
s_group:register_name/3.
A comparative performance evaluation of
i.2
16
Semi-Explicit Placement
Recall from Section iii that distributed Erlang
spawns a process onto an explicitly named
Erlang node, e.g.
spawn(some_node,fun some_module:pong/0).
and also recall the portability and programming effort issues associated with such explicit
placement in large scale systems discussed in
Section ii.
P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โข Scaling Reliably โข 2017
1e+09
9e+08
Throughput
7e+08
5e+08
3e+08
1e+08
10
20
30
40
50
60
70
80
90
100
Number of nodes
Distributed Erlang
SD Erlang
Figure 11: Global operations in Distributed Erlang vs. SD Erlang.
represents a sub-master process
represents a colony process
master node
Level 0
master process
represents an ant process
P1
represents an s_group
P2
Level 1
P16
represents a node
node1
node2
node16
node1
node1
node16
node1
node1
node16
colony nodes in this level
Level 2
Figure 12: SD Erlang ACO (SR-ACO) architecture.
To address these issues we have developed a
semi-explicit placement library that enables the
programmer to select nodes on which to spawn
processes based on run-time information about
the properties of the nodes. For example, if
a process performs a lot of computation one
would like to spawn it on a node with considerable computation power, or if two processes
are likely to communicate frequently then it
would be desirable to spawn them on the same
node, or nodes with a fast interconnect.
ated hosts, such as total and currently available
RAM, installed software, hardware configuration, etc. The second deals with a notion of communication distances which models the communication times between nodes in a distributed
system.
Therefore, instead of specifying
a node we can use the attr:choose_node/1
function to define the target node, i.e.
We have implemented two Erlang libraries
to support semi-explicit placement [60]. The
first deals with node attributes, and describes
properties of individual Erlang VMs and associ-
[60] report an investigation into the communication latencies on a range of NUMA and
cluster architectures, and demonstrate the effectiveness of the placement libraries using the
spawn(attr:choose_node(Params),
fun some_module:pong/0).
17
P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โข Scaling Reliably โข 2017
Figure 13: SD Erlang (SD-Orbit) architecture.
ML-ACO benchmark on the Athos cluster.
ii.
S_group Semantics
For precise specification, and as a basis for validation, we provide a small-step operational
semantics of the s_group operations [21]. Figure 14 defines the state of an SD Erlang system
and associated abstract syntax variables. The
abstract syntax variables on the left are defined
as members of sets, denoted {}, and these in
turn may contain tuples, denoted (), or further
sets. In particular nm is a process name, p a
pid, ni a node_id, and nis a set of node_ids.
The state of a system is modelled as a four
tuple comprising a set of s_groups, a set of
f ree_groups, a set of f ree_hidden_groups, and
a set of nodes. Each type of group is associated with nodes and has a namespace. An
s_group additionally has a name, whereas a
f ree_hidden_group consists of only one node,
i.e. a hidden node simultaneously acts as a
node and as a group, because as a group it has
a namespace but does not share it with any
other node. Free normal and hidden groups
have no names, and are uniquely defined by
the nodes associated with them. Therefore,
group names, gr_names, are either NoGroup
or a set of s_group_names. A namespace is a
set of name and process id, pid, pairs and is
18
replicated on all nodes of the associated group.
A node has the following four parameters: node_id identifier, node_type that can
be either hidden or normal, connections, and
group_names, i.e. names of groups the node
belongs to. The node can belong to either a list
of s_groups or one of the free groups. The type
of the free group is defined by the node type.
Connections are a set of node_ids.
Transitions in the semantics have the form
(state, command, ni) โโ (state0 , value) meaning
that executing command on node ni in state
returns value and transitions to state0 .
The semantics is presented in more detail
by [21], but we illustrate it here with the
s_group:registered_names/1 function from
Section i.1. The function returns a list of names
registered in s_group s if node ni belongs to the
s_group, an empty list otherwise (Figure 15).
Here โ denotes disjoint set union; IsSGroupNode returns true if node ni is a member of some
s_group s, false otherwise; and OutputNms returns a set of process names registered in the
ns namespace of s_group s.
iii.
Semantics Validation
As the semantics is concrete it can readily be
made executable in Erlang, with lists replacing
sets throughout. Having an executable seman-
P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โข Scaling Reliably โข 2017
(grs, fgs, fhs, nds) โ {state} โก {s_group}, {free_group}, {free_hidden_group}, {node}
gr โ grs โก {s_group} โก s_group_name, {node_id}, namespace
fg โ fgs โก {free_group} โก {node_id}, namespace
fh โ fhs โก {free_hidden_group} โก node_id, namespace
nd โ nds โก {node} โก node_id, node_type, connections, gr_names
gs โ { gr_names} โก NoGroup, {s_group_name}
ns โ {namespace} โก {(name, pid)}
cs โ {connections} โก {node_id}
nt โ {node_type} โก { Normal, Hidden}
s โ { NoGroup, s_group_name}
Figure 14: SD Erlang state [21].
(grs,fgs, fhs, nds), s_group : registered_names(s), ni
โโ (grs, fgs, fhs, nds), nms)
โโ (grs, fgs, fhs, nds), {}
where
(s, {ni} โ nis, ns) โ grs0 โก grs
nms โก OutputNms(s, ns)
if IsSGroupNode(ni, s, grs
otherwise
IsSGroupNode(ni, s, grs) = โnis, ns, grs0 . (s, {ni} โ nis, ns) โ grs0 โก grs
OutputNms(s, ns) = (s, nm) | (nm, p) โ ns
Figure 15: SD Erlang Semantics of s_group:registered_names/1 Function
tics allows users to engage with it, and to understand how the semantics behaves vis ร vis
the library, giving them an opportunity to assess the correctness of the library against the
semantics.
Better still, we can automatically assess how
the system behaves in comparison with the
(executable) semantics by executing them in
lockstep, guided by the constraints of which
operations are possible at each point. We do
that by building an abstract state machine
model of the library. We can then generate random sequences (or traces) through the
model, with appropriate library data gener-
ated too. This random generation is supported
by the QuickCheck property-based testing system [24, 9].
The architecture of the testing framework
is shown in Figure 16. First an abstract state
machine embedded as an โeqc_statemโ module is derived from the executable semantic
specification. The state machine defines the
abstract state representation and the transition
from one state to another when an operation
is applied. Test case and data generators are
then defined to control the test case generation;
this includes the automatic generation of eligible s_group operations and the input data to
19
P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โข Scaling Reliably โข 2017
those operations. Test oracles are encoded as
the postcondition for s_group operations.
During testing, each test command is applied to both the abstract model and the
s_group library. The application of the test
command to the abstract model takes the abstract model from its current state to a new
state as described by the transition functions;
whereas the application of the test command
to the library leads the system to a new actual
state. The actual state information is collected
from each node in the distributed system, then
merged and normalised to the same format
as the abstract state representation. For a test
to be successful, after the execution of a test
command, the test oracles specified for this
command should be satisfied. Various test oracles can be defined for s_group operations; for
instance one of the generic constraints that applies to all the s_group operations is that after
each s_group operation, the normalised system
state should be equivalent to the abstract state.
Thousands of tests were run, and three kinds
of errors โ which have subsequently been
corrected โ were found. Some errors in the
library implementation were found, including one error due to the synchronisation between nodes, and the other related to the
remove_nodes operation, which erroneously
raised an exception. We also found a couple
of trivial errors in the semantic specification
itself, which had been missed by manual examination. Finally, we found some situations
Figure 16: Testing s_groups using QuickCheck.
20
where there were inconsistencies between the
semantics and the library implementation, despite their states being equivalent: an example
of this was in the particular values returned
by functions on certain errors. Overall, the automation of testing boosted our confidence in
the correctness of the library implementation
and the semantic specification. This work is
reported in more detail by [54].
VI.
Improving VM Scalability
This section reports the primary VM and library improvements we have designed and
implemented to address the scalability and reliability issues identified in Section i.
i. Improvements to Erlang Term Storage
Because ETS tables are so heavily used in
Erlang systems, they are a focus for scalability
improvements. We start by describing their
redesign, including some improvements that
pre-date our RELEASE project work, i.e. those
prior to Erlang/OTP R15B03. These historical
improvements are very relevant for a scalability
study and form the basis for our subsequent
changes and improvements. At the point when
Erlang/OTP got support for multiple cores (in
release R11B), there was a single reader-writer
lock for each ETS table. Optional fine grained
locking of hash-based ETS tables (i.e. set, bag
or duplicate_bag tables) was introduced in
Erlang/OTP R13B02-1, adding 16 reader-writer
locks for the hash buckets. Reader groups to
minimise read synchronisation overheads were
introduced in Erlang/OTP R14B. The key observation is that a single count of the multiple readers must be synchronised across many
cache lines, potentially far away in a NUMA
system. Maintaining reader counts in multiple (local) caches makes reads fast, although
writes must now check every reader count. In
Erlang/OTP R16B the number of bucket locks,
and the default number of reader groups, were
both upgraded from 16 to 64.
We illustrate the scaling properties of the
P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โข Scaling Reliably โข 2017
50
12
R11B-5
R13B02-1
R14B
R16B
45
40
1 RG
2 RG
4 RG
8 RG
16 RG
32 RG
64 RG
10
35
8
30
6
25
20
4
15
10
2
5
0
0
60
10
20
30
40
50
60
70
R11B-5
R13B02-1
R14B
R16B
50
0
0
10
20
30
40
50
14
12
10
40
60
70
1 RG
2 RG
4 RG
8 RG
16 RG
32 RG
64 RG
8
30
6
20
4
10
0
2
0
10
20
30
40
50
60
70
0
0
10
20
30
40
50
60
70
Figure 17: Runtime of 17M ETS operations in
Erlang/OTP releases: 10% updates (left) and
1% updates (right). The y-axis shows time
in seconds (lower is better) and the x-axis is
number of OS threads (VM schedulers).
Figure 18: Runtime of 17M ETS operations with varying numbers of reader groups: 10% updates
(left) and 1% updates (right). The y-axis
shows runtime in seconds (lower is better)
and the x-axis is number of schedulers.
ETS concurrency options using the ets_bench
BenchErl benchmark on the Intel NUMA machine with 32 hyperthreaded cores specified in
Appendix A. The ets_bench benchmark inserts
1M items into the table, then records the time to
perform 17M operations, where an operation
is either a lookup, an insert, or a delete. The
experiments are conducted on a hash-based
(set) ETS table with different percentages of
update operations, i.e. insertions or deletions.
Figure 17 shows the runtimes in seconds of
17M operations in different Erlang/OTP versions, varying the number of schedulers (xaxis), reflecting how the scalability of ETS tables has improved in more recent Erlang/OTP
releases. Figure 18 shows the runtimes in seconds of 17M operations on an ETS table with
different numbers of reader groups, again varying the number of schedulers. We see that one
reader group is not sufficient with 10% updates, nor are two with 1% updates. Beyond
that, different numbers of reader groups have
little impact on the benchmark performance
except that using 64 groups with 10% updates
slightly degrades performance.
We have explored four other extensions or
redesigns in the ETS implementation for better
scalability. 1. Allowing more programmer control over the number of bucket locks in hashbased tables, so the programmer can reflect
the number of schedulers and the expected
access pattern. 2. Using contention-adapting
trees to get better scalability for ordered_set
ETS tables as described by [69]. 3. Using queue
delegation locking to improve scalability [47].
4. Adopting schemes for completely eliminating the locks in the meta table. A more complete discussion of our work on ETS can be
found in the papers by [69] and [47].
Here we outline only our work on
contention-adapting (CA) trees. A CA tree
monitors contention in different parts of a
21
P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โข Scaling Reliably โข 2017
ii.
Operations / Microsecond
20
15
10
set
ordset
AVL-CA tree
Treap-CA tree
5
0
0
10
20
30
40
Number of Threads
50
60
70
30
40
Number of Threads
50
60
70
Operations / Microsecond
25
20
set
ordset
AVL-CA tree
Treap-CA tree
15
10
5
0
0
10
20
Figure 19: Throughput of CA tree variants: 10% updates (left) and 1% updates (right).
tree-shaped data structure, introducing routing nodes with locks in response to high contention, and removing them in response to low
contention. For experimental purposes two
variants of the CA tree have been implemented
to represent ordered_sets in the virtual machine of Erlang/OTP 17.0. One extends the
existing AVL trees in the Erlang VM, and the
other uses a Treap data structure [5]. Figure 19
compares the throughput of the CA tree variants with that of ordered_set and set as the
number of schedulers increases. It is unsurprising that the CA trees scale so much better
than an ordered_set which is protected by a
single readers-writer lock. It is more surprising
that they also scale better than set. This is due
to hash tables using fine-grained locking at a
fixed granularity, while CA trees can adapt the
number of locks to the current contention level,
and also to the parts of the key range where
contention is occurring.
22
Improvements to Schedulers
In the Erlang VM, a scheduler is responsible
for executing multiple processes concurrently,
in a timely and fair fashion, making optimal
use of hardware resources. The VM implements preemptive multitasking with soft realtime guarantees. Erlang processes are normally
scheduled on a reduction count basis where
one reduction is roughly equivalent to a function call. Each process is allowed to execute
until it either blocks waiting for input, typically
a message from some other process, or until it
has executed its quota of reductions.
The Erlang VM is usually started with one
scheduler per logical core (SMT-thread) available on the host machine, and schedulers are
implemented as OS threads. When an Erlang
process is spawned it is placed in the run queue
of the scheduler of its parent, and it waits on
that queue until the scheduler allocates it a
slice of core time. Work stealing is used to balance load between cores, that is an idle scheduler may migrate a process from another run
queue. Scheduler run queues are visualised in
Figure iii.2.
The default load management mechanism
is load compaction that aims to keep as many
scheduler threads as possible fully loaded with
work, i.e. it attempts to ensure that scheduler threads do not run out of work. We
have developed a new optional scheduler utilisation balancing mechanism that is available from
Erlang/OTP 17.0. The new mechanism aims
to balance scheduler utilisation between schedulers; that is, it will strive for equal scheduler
utilisation on all schedulers.
The scheduler utilisation balancing mechanism has no performance impact on the system
when not enabled. On the other hand, when
enabled, it results in changed timing in the system; normally there is a small overhead due
to measuring of utilisation and calculating balancing information, which depends on the underlying primitives provided by the operating
system.
The new balancing mechanism results in a
better distribution of processes to schedulers,
P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โข Scaling Reliably โข 2017
reducing the probability of core contention. Together with other VM improvements, such as
interruptable BIFs and garbage collection, it
results in lower latency and improved responsiveness, and hence reliability, for soft real-time
applications.
iii. Improvements to Time Management
Soon after the start of the RELEASE project,
time management in the Erlang VM became
a scalability bottleneck for many applications,
as illustrated by the parallel benchmark in Figure i. The issue came to prominence as other,
more severe, bottlenecks were eliminated. This
subsection motivates and outlines the improvements to time management that we made;
these were incorporated into Erlang/OTP 18.x
as a new API for time and time warping. The
old API is still supported at the time of writing,
but its use is deprecated.
The original time API provides the
erlang:now/0 built-in that returns โErlang system timeโ or time since Epoch with micro second resolution. This time is the basis for all
time internally in the Erlang VM.
Many of the scalability problems of
erlang:now/0 stem from its specification, written at a time when the Erlang VM was not
multi-threaded, i.e. SMT-enabled. The documentation promises that values returned by it
are strictly increasing and many applications
ended up relying on this. For example applications often employ erlang:now/0 to generate
unique integers.
Erlang system time should align with the
operating systemโs view of time since Epoch or
โOS system timeโ. However, while OS system
time can be freely changed both forwards and
backwards, Erlang system time cannot, without invalidating the strictly increasing value
guarantee. The Erlang VM therefore contains a
mechanism that slowly adjusts Erlang system
time towards OS system time if they do not
align.
One problem with time adjustment is that
the VM deliberately presents time with an in-
accurate frequency; this is required to align
Erlang system time with OS system time
smoothly when these two have deviated, e.g.
in the case of clock shifts when leap seconds
are inserted or deleted. Another problem is
that Erlang system time and OS system time
can differ for very long periods of time. In the
new API, we resolve this using a common OS
technique [59], i.e. a monotonic time that has
its zero point at some unspecified point in time.
Monotonic time is not allowed to make leaps
forwards and backwards while system time is
allowed to do this. Erlang system time is thus
just a dynamically varying offset from Erlang
monotonic time.
Time Retrieval Retrieval of Erlang system
time was previously protected by a global mutex, which made the operation thread safe, but
scaled poorly. Erlang system time and Erlang
monotonic time need to run at the same frequency, otherwise the time offset between them
would not be constant. In the common case,
monotonic time delivered by the operating system is solely based on the machineโs local clock
and cannot be changed, while the system time
is adjusted using the Network Time Protocol
(NTP). That is, they will run with different frequencies. Linux is an exception with a monotonic clock that is NTP adjusted and runs with
the same frequency as system time [76]. To
align the frequencies of Erlang monotonic time
and Erlang system time, we adjust the frequency of the Erlang monotonic clock. This
is done by comparing monotonic time and system time delivered by the OS, and calculating
an adjustment. To achieve this scalably, one
VM thread calculates the time adjustment to
use at least once a minute. If the adjustment
needs to be changed, new adjustment information is published and used to calculate Erlang
monotonic time in the future.
When a thread needs to retrieve time, it reads
the monotonic time delivered by the OS and
the time adjustment information previously
published and calculates Erlang monotonic
time. To preserve monotonicity it is important that all threads that read the same OS
23
P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โข Scaling Reliably โข 2017
180000
15B01 (now()) [70016,640]
17.4 (now()) [70016,640]
18.1 (now()) [70016,640]
18.1 (monotonic_time()) [70016,640]
160000
140000
time (ms)
120000
100000
80000
60000
40000
20000
0
0
10
20
30
40
50
60
70
60
70
# Schedulers
30
18.1 (monotonic_time()) [70016,640]
25
20
Speedup
monotonic time map this to exactly the same
Erlang monotonic time. This requires synchronisation on updates to the adjustment information using a readers-writer (RW) lock. This
RW lock is write-locked only when the adjustment information is changed. This means that
in the vast majority of cases the RW lock will
be read-locked, which allows multiple readers
to run concurrently. To prevent bouncing the
lock cache-line we use a bespoke reader optimised RW lock implementation where reader
threads notify about their presence in counters on separate cache-lines. The concept is
similar to the reader indicator algorithm described by [48, Fig. 11] and alternatives include
the ingress-egress counter used by [18] and the
SNZI algorithm of [30].
15
10
Timer Wheel and BIF Timer The timer
wheel contains all timers set by Erlang processes. The original implementation was protected by a global mutex and scaled poorly. To
increase concurrency, each scheduler thread
has been assigned its own timer wheel that is
used by processes executing on the scheduler.
The implementation of timers in
Erlang/OTP uses a built in function (BIF),
as most low-level operations do.
Until
Erlang/OTP 17.4, this BIF was also protected
by a global mutex. Besides inserting timers
into the timer wheel, the BIF timer implementation also maps timer references to a timer in
the timer wheel. To improve concurrency, from
Erlang/OTP 18 we provide scheduler-specific
BIF timer servers as Erlang processes. These
keep information about timers in private ETS
tables and only insert one timer at the time
into the timer wheel.
Benchmarks We have measured several
benchmarks on a 16-core Bulldozer machine
with eight dual CPU AMD Opteron 4376 HEs.5
We present three of them here.
The first micro benchmark compares the execution time of an Erlang receive with that of
a receive after that specifies a timeout and
5 See ยง2.5.4 of the RELEASE project Deliverable 2.4
(http://release-project.eu/documents/D2.4.pdf).
24
5
0
0
10
20
30
40
50
# Schedulers
Figure 20: BenchErl
parallel
benchmark
using
erlang:monotonic_time/0
or
erlang:now/0 in different Erlang/OTP
releases: runtimes (left) and speedup obtained
using erlang:monotonic_time/0 (right).
provides a default value. The receive after
sets a timer when the process blocks in the
receive, and cancels it when a message arrives. In Erlang/OTP 17.4 the total execution
time with standard timers is 62% longer than
without timers. Using the improved implementation in Erlang/OTP 18.0, total execution time
with the optimised timers is only 5% longer
than without timers.
The second micro benchmark repeatedly
checks the system time, calling the built-in
erlang:now/0 in Erlang/OTP 17.4, and
calling both erlang:monotonic_time/0 and
erlang:time_offset/0 and adding the results
in Erlang/OTP 18.0. In this machine, where
the VM uses 16 schedulers by default, the 18.0
release is more than 69 times faster than the
17.4 release.
The third benchmark is the parallel BenchErl
P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โข Scaling Reliably โข 2017
benchmark from Section i. Figure 20 shows
the results of executing the original version of
this benchmark, which uses erlang:now/0 to
create monotonically increasing unique values,
using three Erlang/OTP releases: R15B01, 17.4,
and 18.1. We also measure a version of the
benchmark in Erlang/OTP 18.1 where the call
to erlang:now/0 has been substituted with a
call to erlang:monotonic_time/0. The graph
on its left shows that: 1. the performance of
time management has remained roughly unchanged between Erlang/OTP releases prior
to 18.0; 2. the improved time management in
Erlang/OTP 18.x make time management less
likely to be a scalability bottleneck even when
using erlang:now/0, and 3. the new time API
(using erlang:monotonic_time/0 and friends)
provides a scalable solution. The graph on the
right side of Figure 20 shows the speedup that
the modified version of the parallel benchmark
achieves in Erlang/OTP 18.1.
VII.
Scalable Tools
This section outlines five tools developed in the
RELEASE project to support scalable Erlang
systems. Some tools were developed from
scratch, like Devo, SDMon and WombatOAM,
while others extend existing tools, like Percept
and Wrangler. These include tooling to transform programs to make them more scalable,
to deploy them for scalability, to monitor and
visualise them. Most of the tools are freely
available under open source licences (Devo,
Percept2, SD-Mon, Wrangler); while WombatOAM is a commercial product. The tools have
been used for profiling and refactoring the
ACO and Orbit benchmarks from Section III.
The Erlang tool โecosystemโ consists of
small stand-alone tools for tracing, profiling
and debugging Erlang systems that can be used
separately or together as appropriate for solving the problem at hand, rather than as a single, monolithic, super-tool. The tools presented
here have been designed to be used as part of
that ecosystem, and to complement already
available functionality rather than to duplicate
it. The Erlang runtime system has built-in
support for tracing many types of events, and
this infrastructure forms the basis of a number
of tools for tracing and profiling. Typically the
tools build on or specialise the services offered
by the Erlang virtual machine, through a number of built-in functions. Most recently, and
since the RELEASE project was planned, the
Observer6 application gives a comprehensive
overview of many of these data on a node-bynode basis.
As actor frameworks and languages (see
Section ii) have only recently become widely
adopted commercially, their tool support remains relatively immature and generic in nature. That is, the tools support the language
itself, rather than its distinctively concurrent
aspects. Given the widespread use of Erlang,
tools developed for it point the way for tools
in other actor languages and frameworks. For
example, just as many Erlang tools use tracing support provided by the Erlang VM, so
can other actor frameworks, e.g. Akka can use
the Kamon7 JVM monitoring system. Similarly, tools for other actor languages or frameworks could use data derived through OS-level
tracing frameworks DTrace8 and SystemTap9
probes as we show in this section for Erlang,
provided that the host language has tracing
hooks into the appropriate infrastructure.
i.
Refactoring for Scalability
Refactoring [65, 32, 75] is the process of changing how a program works without changing
what it does. This can be done for readability,
for testability, to prepare it for modification or
extension, or โ as is the case here โ in order
to improve its scalability. Because refactoring
involves the transformation of source code, it
is typically performed using machine support
in a refactoring tool. There are a number of
tools that support refactoring in Erlang: in the
RELEASE project we have chosen to extend
Wrangler10 [56]; other tools include Tidier [68]
6 http://www.erlang.org/doc/apps/observer/
7 http://kamon.io
8 http://dtrace.org/blogs/about/
9 https://sourceware.org/systemtap/wiki
10 http://www.cs.kent.ac.uk/projects/wrangler/
25
P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โข Scaling Reliably โข 2017
and RefactorErl [44].
Supporting API Migration The SD Erlang libraries modify Erlangโs global_group library,
becoming the new s_group library; as a result, Erlang programs using global_group will
have to be refactored to use s_group. This kind
of API migration problem is not uncommon, as
software evolves and this often changes the API
of a library. Rather than simply extend Wrangler with a refactoring to perform this particular operation, we instead added a framework
for the automatic generation of API migration
refactorings from a user-defined adaptor module.
Our approach to automatic API migration
works in this way: when an API functionโs
interface is changed, the author of this API
function implements an adaptor function, defining calls to the old API in terms of the new.
From this definition we automatically generate
the refactoring that transforms the client code
to use the new API; this refactoring can also be
supplied by the API writer to clients on library
upgrade, allowing users to upgrade their code
automatically. The refactoring works by generating a set of rules that โfold inโ the adaptation
to the client code, so that the resulting code
works directly with the new API. More details
of the design choices underlying the work and
the technicalities of the implementation can be
found in a paper by [52].
Support for Introducing Parallelism We
have introduced support for parallelising explicit list operations (map and foreach), for process introduction to complete a computationally intensive task in parallel, for introducing a
worker process to deal with call handling in an
Erlang โgeneric serverโ and to parallelise a tail
recursive function. We discuss these in turn
now; more details and practical examples of
the refactorings appear in a conference paper
describing that work [55].
Uses of map and foreach in list processing are among of the most obvious places
where parallelism can be introduced. We
have added a small library to Wrangler, called
26
para_lib, which provides parallel implementations of map and foreach. The transformation
from an explicit use of sequential map/foreach
to the use of their parallel counterparts is
very straightforward, even manual refactoring would not be a problem. However a
map/foreach operation could also be implemented differently using recursive functions,
list comprehensions, etc.; identifying this kind
of implicit map/foreach usage can be done using Wranglerโs code inspection facility, and a
refactoring that turns an implicit map/foreach
to an explicit map/foreach can also be specified using Wranglerโs rule-based transformation API.
If the computations of two non-trivial tasks
do not depend on each other, then they can
be executed in parallel. The Introduce a New
Process refactoring implemented in Wrangler
can be used to spawn a new process to execute
a task in parallel with its parent process. The
result of the new process is sent back to the parent process, which will then consume it when
needed. In order not to block other computations that do not depend on the result returned
by the new process, the receive expression is
placed immediately before the point where the
result is needed.
While some tail-recursive list processing
functions can be refactored to an explicit map
operation, many cannot due to data dependencies. For instance, an example might perform a
recursion over a list while accumulating results
in an accumulator variable. In such a situation it is possible to โfloat outโ some of the
computations into parallel computations. This
can only be done when certain dependency
constraints are satisfied, and these are done by
program slicing, which is discussed below.
Support for Program Slicing Program slicing is a general technique of program analysis
for extracting the part of a program, also called
the slice, that influences or is influenced by a
given point of interest, i.e. the slicing criterion.
Static program slicing is generally based on
program dependency including both control
dependency and data dependency. Backward
P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โข Scaling Reliably โข 2017
intra-function slicing is used by some of the
refactorings described above; it is also useful
in general, and made available to end-users
under Wranglerโs Inspector menu [55].
Our work can be compared with that in
PaRTE11 [17], a tool developed in another EU
project that also re-uses the Wrangler front end.
This work concentrates on skeleton introduction, as does some of our work, but we go
further in using static analysis and slicing in
transforming programs to make them suitable
for introduction of parallel structures.
ii.
Scalable Deployment
We have developed the WombatOAM tool12 to
provide a deployment, operations and maintenance framework for large-scale Erlang distributed systems. These systems typically consist of a number of Erlang nodes executing on
different hosts. These hosts may have different
hardware or operating systems, be physical or
virtual, or run different versions of Erlang/OTP.
Prior to the development of WombatOAM, deployment of systems would use scripting in
Erlang and the shell, and this is the state of
the art for other actor frameworks; it would be
possible to adapt the WombatOAM approach
to these frameworks in a straightforward way.
Architecture The
architecture
of
WombatOAM is summarised in Figure 21.
Originally the system had problems addressing full scalability because of the role played
by the central Master node; in its current
version an additional layer of Middle Managers
was introduced to allow the system to scale
easily to thousands of deployed nodes. As the
diagram shows, the โnorthboundโ interfaces
to the web dashboard and the command-line
are provided through RESTful connections
to the Master. The operations of the Master
are delegated to the Middle Managers that
11 http://paraphrase-enlarged.elte.hu/
downloads/D4-3_user_manual.pdf
12 WombatOAM
(https://www.erlang-solutions.
com/products/wombat-oam.html) is a commercial tool
available from Erlang Solutions Ltd.
engage directly with the managed nodes. Each
managed node runs a collection of services that
collect metrics, raise alarms and so forth; we
describe those now.
Services WombatOAM is designed to collect,
store and display various kinds of information
and event from running Erlang systems, and
these data are accessed and managed through
an AJAX-based Web Dashboard; these include
the following.
Metrics WombatOAM supports the collection
of some hundred metrics โ including, for
instance, numbers of processes on a node
and the message traffic in and out of the
node โ on a regular basis from the Erlang
VMs running on each of the hosts. It can
also collect metrics defined by users within
other metrics collection frameworks, such
as Folsom13 , and interface with other tools
such as graphite14 which can log and display such information. The metrics can be
displayed as histograms covering different
windows, such as the last fifteen minutes,
hour, day, week or month.
Notifications As well as metrics, it can support event-based monitoring through the
collection of notifications from running
nodes. Notifications, which are one time
events can be generated using the Erlang
System Architecture Support Libraries,
SASL, which is part of the standard distribution, or the lager logging framework15 ,
and will be displayed and logged as they
occur.
Alarms Alarms are more complex entities.
Alarms have a state: they can be raised, and
once dealt with they can be cleared; they
also have identities, so that the same alarm
may be raised on the same node multiple
times, and each instance will need to be
13 Folsom collects and publishes metrics through an
Erlang API: https://github.com/boundary/folsom
14 https://graphiteapp.org
15 https://github.com/basho/lager
27
P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โข Scaling Reliably โข 2017
Wombat
Web
Dashboard
Wombat
CLI
REST
REST
Northbound Interface
Metrics
API
Notif.
API
Alarms
API
Orchestration
API
Node
manager
Metrics
Notif.
Alarms
Orchestration
Node
manager
Metrics
Notif.
Alarms
Orchestration
Topology
API
Erlang
Master
Core
Core DB
(including
Topology and
Orchestration
data)
Topology
Erlang
Middle Manager
Core
Erlang
elibcloud/
Libcloud
Erlang/RPC
Provision
VMs
(REST)
Provision
software
(SSH)
Infrastructure
Provider
Agents
Metrics
agent
Virtual machine
error_logger
agent
lager
agent
Alarms
agent
Managed Erlang Node
Figure 21: The architecture of WombatOAM.
dealt with separately. Alarms are generated by SASL or lager, just as for notifications.
Topology The Topology service handles
adding, deleting and discovering nodes.
It also monitors whether they are accessible, and if not, it notifies the other services,
and periodically tries to reconnect. When
the nodes are available again, it also notifies the other services. It doesnโt have a
middle manager part, because it doesnโt
talk to the nodes directly: instead it asks
the Node manager service to do so.
Node manager This service maintains the connection to all managed nodes via the
28
Erlang distribution protocol. If it loses
the connection towards a node, it periodically tries to reconnect. It also maintains
the states of the nodes in the database (e.g.
if the connection towards a node is lost,
the Node manager changes the node state
to DOWN and raises an alarm). The Node
manager doesnโt have a REST API, since
the node states are provided via the Topology serviceโs REST API.
Orchestration This service can deploy new
Erlang nodes on already running machines. It can also provision new virtual machine instances using several cloud
providers, and deploy Erlang nodes on
those instances. For communicating with
P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โข Scaling Reliably โข 2017
the cloud providers, the Orchestration
service uses an external library called
Libcloud,16 for which Erlang Solutions has
written an open source Erlang wrapper
called elibcloud, to make Libcloud easier to use from WombatOAM. Note that
WombatOAM Orchestration doesnโt provide a platform for writing Erlang applications: it provides infrastructure for deploying them.
Deployment The mechanism consists of the
following five steps.
1. Registering a provider. WombatOAM provides the same interface for different
cloud providers which support the OpenStack standard or the Amazon EC2 API.
WombatOAM also provides the same interface for using a fixed set of machines.
In WombatOAMโs backend, this has been
implemented as two driver modules: the
elibcloud driver module which uses the
elibcloud and Libcloud libraries to communicate with the cloud providers, and
the SSH driver module that keeps track of
a fixed set of machines.
2. Uploading a release. The release can be either a proper Erlang release archive or a
set of Erlang modules. The only important
aspect from WombatOAMโs point of view
is that start and stop commands should
be explicitly specified. This will enable
WombatOAM start and stop nodes when
needed.
3. Defining a node family. The next step is creating the node family, which is the entity
that refers to a certain release, contains
deployment domains that refer to certain
providers, and contains other information
necessary to deploy a node.
4. Defining a deployment domain. At this step
a deployment domain is created that specifies(i) which providers should be used for
16 The unified cloud API [4]:
apache.org
https://libcloud.
provisioning machines; (ii) the username
that will be used when WombatOAM connects to the hosts using SSH.
5. Node deployment. To deploy nodes a
WombatOAM user needs only to specify
the number of nodes and the node family these nodes belong to. Nodes can be
dynamically added to, or removed from,
the system depending on the needs of the
application. The nodes are started, and
WombatOAM is ready to initiate and run
the application.
iii.
Monitoring and Visualisation
A key aim in designing new monitoring and
visualisation tools and adapting existing ones
was to provide support for systems running on
parallel and distributed hardware. Specifically,
in order to run modern Erlang systems, and
in particular SD Erlang systems, it is necessary
to understand both their single host (โmulticoreโ) and multi-host (โdistributedโ) nature.
That is, we need to be able to understand how
systems run on the Erlang multicore virtual
machine, where the scheduler associated with
a core manages its own run queue, and processes migrate between the queues through
a work stealing algorithm; at the same time,
we have to understand the dynamics of a distributed Erlang program, where the user explicitly spawns processes to nodes.17
iii.1
Percept2
Percept218 builds on the existing Percept tool
to provide post hoc offline analysis and visualisation of Erlang systems. Percept2 is designed
to allow users to visualise and tune the parallel performance of Erlang systems on a single
node on a single manycore host. It visualises
Erlang application level concurrency and identifies concurrency bottlenecks. Percept2 uses
17 This is in contrast with the multicore VM, where
programmers have no control over where processes are
spawned; however, they still need to gain insight into the
behaviour of their programs to tune performance.
18 https://github.com/RefactoringTools/percept2
29
P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โข Scaling Reliably โข 2017
Erlang built in tracing and profiling to monitor
process states, i.e. waiting, running, runnable,
free and exiting. A waiting or suspended process is considered an inactive and a running or
runnable process is considered active. As a program runs with Percept, events are collected
and stored to a file. The file is then analysed,
with the results stored in a RAM database, and
this data is viewed through a web-based interface. The process of offline profiling for a
distributed Erlang application using Percept2
is shown in Figure 22.
Percept generates an application-level
zoomable concurrency graph, showing the
number of active processes at each point
during profiling; dips in the graph represent
low concurrency. A lifetime bar for each
process is also included, showing the points
during its lifetime when the process was active,
as well as other per-process information.
Percept2 extends Percept in a number of
ways โ as detailed by [53] โ including most
importantly:
โข Distinguishing between running and
runnable time for each process: this is
apparent in the process runnability comparison as shown in Figure 23, where orange represents runnable and green represents running. This shows very clearly
where potential concurrency is not being
exploited.
โข Showing scheduler activity: the number
of active schedulers at any time during the
profiling.
โข Recording more information during execution, including the migration history of
a process between run queues; statistics
about message passing between processes:
the number of messages and the average
message size sent/received by a process;
the accumulated runtime per-process: the
accumulated time when a process is in a
running state.
โข Presenting the process tree: the hierarchy
structure indicating the parent-child relationships between processes.
30
โข Recording
dynamic
function
call
graph/count/time: the hierarchy structure showing the calling relationships
between functions during the program
run, and the amount of time spent in a
function.
โข Tracing of s_group activities in a distributed system. Unlike global group,
s_group allows dynamic changes to the
s_group structure of a distributed Erlang
system. In order to support SD Erlang, we
have also extended Percept2 to allow the
profiling of s_group related activities, so
that the dynamic changes to the s_group
structure of a distributed Erlang system
can be captured.
We have also improved on Percept as follows.
โข Enabling finer-grained control of what
is profiled. The profiling of port activities, schedulers activities, message passing, process migration, garbage collection and s_group activities can be enabled/disabled, while the profiling of process runnability (indicated by the โprocโ
flag) is always enabled.
โข Selective function profiling of processes.
In Percept2, we have built a version of
fprof, which does not measure a functionโs
own execution time, but measures everything else that fprof measures. Eliminating
measurement of a functionโs own execution time gives users the freedom of not
profiling all the function calls invoked during the program execution. For example,
they can choose to profile only functions
defined in their own applicationsโ code,
and not those in libraries.
โข Improved dynamic function callgraph.
With the dynamic function callgraph, a
user is able to understand the causes of
certain events, such as heavy calls of a particular function, by examining the region
around the node for the function, including the path to the root of the graph. Each
edge in the callgraph is annotated with
P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โข Scaling Reliably โข 2017
Figure 22: Offline profiling of a distributed Erlang application using Percept2.
Figure 23: Percept2: showing processes running and runnable (with 4 schedulers/run queues).
the number of times the target function
is called by the source function as well as
further information.
Finally, we have also improved the scalability
of Percept in three ways. First we have parallelised the processing of trace files so that multiple data files can be processed at the same
time. We have also compressed the representation of call graphs, and cached the history of
generated web pages. Together these make the
system more responsive and more scalable.
iii.2
DTrace/SystemTap tracing
DTrace provides dynamic tracing support for
various flavours of Unix, including BSD and
Mac OS X, and SystemTap does the same for
Linux; both allow the monitoring of live, running systems with minimal overhead. They
can be used by administrators, language developers and application developers alike to examine the behaviour of applications, language
implementations and the operating system during development or even on live production
systems. In comparison to other similar tools
and instrumentation frameworks, they are relatively lightweight, do not require special recompiled versions of the software to be examined, nor special post-processing tools to
create meaningful information from the data
gathered. Using these probs, it is possible to
identify bottlenecks both in the VM itself and
31
P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โข Scaling Reliably โข 2017
Run Queues
4500
RunQueue15
RunQueue14
RunQueue13
RunQueue12
RunQueue11
RunQueue10
RunQueue9
RunQueue8
RunQueue7
RunQueue6
RunQueue5
RunQueue4
RunQueue3
RunQueue2
RunQueue1
RunQueue0
4000
3500
3000
2500
2000
1500
1000
500
0
Figure 24: DTrace: runqueue visualisation of bang
benchmark with 16 schedulers (time on Xaxis).
in applications.
VM bottlenecks are identified using a large
number of probes inserted into Erlang/OTPโs
VM, for example to explore scheduler runqueue lengths. These probes can be used to
measure the number of processes per scheduler, the number of processes moved during
work stealing, the number of attempts to gain
a run-queue lock, how many of these succeed
immediately, etc. Figure 24 visualises the results of such monitoring; it shows how the size
of run queues vary during execution of the
bang BenchErl benchmark on a VM with 16
schedulers.
Application bottlenecks are identified by an
alternative back-end for Percept2, based on
DTrace/SystemTap instead of the Erlang builtin tracing mechanism. The implementation reuses the existing Percept2 infrastructure as far
as possible. It uses a different mechanism for
collecting information about Erlang programs,
a different format for the trace files, but the
same storage infrastructure and presentation
facilities.
iii.3
Devo
Devo19 [10] is designed to provide real-time online visualisation of both the low-level (single
node, multiple cores) and high-level (multi19 https://github.com/RefactoringTools/devo
32
ple nodes, grouped into s_groups) aspects of
Erlang and SD Erlang systems. Visualisation
is within a browser, with web sockets providing the connections between the JavaScript visualisations and the running Erlang systems,
instrumented through the trace tool builder
(ttb).
Figure 25 shows visualisations from devo
in both modes. On the left-hand side a single compute node is shown. This consists of
two physical chips (the upper and lower halves
of the diagram) with six cores each; with hyperthreading this gives twelve virtual cores,
and hence 24 run queues in total. The size of
these run queues is shown by both the colour
and height of each column, and process migrations are illustrated by (fading) arc between the
queues within the circle. A green arc shows migration on the same physical core, a grey one
on the same chip, and blue shows migrations
between the two chips.
On the right-hand side of Figure 25 is a visualisation of SD-Orbit in action. Each node
in the graph represents an Erlang node, and
colours (red, green, blue and orange) are used
to represent the s_groups to which a node belongs. As is evident, the three nodes in the
central triangle belong to multiple groups, and
act as routing nodes between the other nodes.
The colour of the arc joining two nodes represents the current intensity of communication
between the nodes (green quiescent; red busiest).
iii.4
SD-Mon
SD-Mon is a tool specifically designed for monitoring SD-Erlang systems. This purpose is
accomplished by means of a shadow network of
agents, that collect data from a running system. An example deployment is shown in
Figure 26, where blue dots represent nodes
in the target system and the other nodes make
up the SD-Mon infrastructure. The network is
deployed on the basis of a configuration file
describing the network architecture in terms of
hosts, Erlang nodes, global group and s_group
partitions. Tracing to be performed on moni-
P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โข Scaling Reliably โข 2017
p0 9152 0
p0 10890 0
p0 10891 0
p0 9501 0
Figure 25: Devo: low and high-level visualisations of
SD-Orbit.
tored nodes is also specified within the configuration file.
An agent is started by a master SD-Mon node
for each s_group and for each free node. Configured tracing is applied on every monitored
node, and traces are stored in binary format in
the agent file system. The shadow network follows system changes so that agents are started
and stopped at runtime as required, as shown
in Figure 27. Such changes are persistently
stored so that the last configuration can be reproduced after a restart. Of course, the shadow
network can be always updated via the User
Interface.
Each agent takes care of an s_group or of a
free node. At start-up it tries to get in contact
with its nodes and apply the tracing to them as
stated by the master. Binary files are stored in
the host file system. Tracing is internally used
in order to track s_group operations happening
at runtime. An asynchronous message is sent
to the master whenever one of these changes occurs. Since each process can only be traced by
a single process at a time, each node (included
those belonging to more than one s_group) is
controlled by only one agent. When a node is
removed from a group or when the group is
deleted, another agent takes over, as shown in
Figure 27. When an agent is stopped, all traces
on the controlled nodes are switched off.
The monitoring network is also supervised,
in order to take account of network fragility,
and when an agent node goes down another
node is deployed to play its role; there are also
periodic consistency checks for the system as a
whole, and when an inconsistency is detected
then that part of the system can be restarted.
SD-Mon does more than monitor activities
one node at a time. In particular inter-node and
inter-group messages are displayed at runtime.
As soon as an agent is stopped, the related
tracing files are fetched across the network by
the master and they are made available in a
readable format in the master file system.
SD-Mon provides facilities for online visualisation of this data, as well as post hoc offline
analysis. Figure 28 shows, in real time, messages that are sent between s_groups. This data
33
P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โข Scaling Reliably โข 2017
Figure 26: SD-Mon architecture.
can also be used as input to the animated Devo
visualisation, as illustrated in the right-hand
side of Figure 25.
VIII.
Figure 27: SD-Mon evolution. Before (top) and after
eliminating s_group 2 (bottom).
Systemic Evaluation
Preceding sections have investigated the improvements of individual aspects of an Erlang
system, e.g. ETS tables in Section i. This section analyses the impact of the new tools and
technologies from Sections V, VI, VII in concert.
We do so by investigating the deployment, reliability, and scalability of the Orbit and ACO
benchmarks from Section III. The experiments
reported here are representative. Similar experiments show consistent results for a range of
micro-benchmarks, several benchmarks, and
the very substantial (approximately 150K lines
of Erlang) Sim-Diasca case study [16] on several state of the art NUMA architectures, and
the four clusters specified in Appendix A. A coherent presentation of many of these results is
available in an article by [22] and in a RELEASE
project deliverable20 . The bulk of the experiments reported here are conducted on the
Athos cluster using Erlang/OTP 17.4 and the
20 See Deliverable 6.2, available online. http://www.
release-project.eu/documents/D6.2.pdf
34
P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โข Scaling Reliably โข 2017
Figure 28: SD-Mon: online monitoring.
associated SD Erlang libraries.
The experiments cover two measures of scalability. As Orbit does a fixed size computation, the scaling measure is relative speedup (or
strong scaling), i.e. speedup relative to execution time on a single core. As the work in ACO
increases with compute resources, weak scaling
is the appropriate measure. The benchmarks
also evaluate different aspects of s_groups: Orbit evaluates the scalability impacts of network
connections, while ACO evaluates the impact
of both network connections and the global
namespace required for reliability.
D-Orbit performs better on a small number
of nodes as communication is direct, rather
than via a gateway node. As the number of
nodes grows, however, SD-Orbit delivers better
speedups, i.e. beyond 80 nodes in case of 2M
orbit elements, and beyond 100 nodes in case
of 5M orbit elements. When we increase the
size of Orbit beyond 5M, the D-Orbit version
fails due to the fact that some VMs exceed the
available RAM of 64GB. In contrast SD-Orbit
experiments run successfully even for an orbit
with 60M elements.
ii.
i.
Orbit
Figure 29 shows the speedup of the D-Orbit
and SD-Orbit benchmarks from Section i.1. The
measurements are repeated seven times, and
we plot standard deviation. Results show that
Ant Colony Optimisation (ACO)
Deployment The deployment and monitoring of ACO, and of the large (150K
lines of Erlang) Sim-Diasca simulation using
WombatOAM (Section ii) on the Athos cluster
is detailed in [22].
35
P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โข Scaling Reliably โข 2017
450
Relative Speedup
400
300
200
100
0
0
50(1200)
100(2400)
150(3600)
Number of nodes (cores)
D-Orbit W=2M
D-Orbit W=5M
200(4800)
257(6168)
SD-Orbit W=2M
SD-Orbit W=5M
Figure 29: Speedup of distributed Erlang vs. SD Erlang Orbit (2M and 5M elements) [Strong Scaling].
An example experiment deploys 10,000
Erlang nodes without enabling monitoring,
and hence allocates three nodes per core (i.e.
72 nodes on each of 139 24-core Athos hosts).
Figure 30 shows that WombatOAM deploys
the nodes in 212s, which is approximately 47
nodes per second. It is more common to have
at least one core per Erlang node, and in a related experiment 5000 nodes are deployed, one
per core (i.e. 24 nodes on each of 209 24-core
Athos hosts) in 101s, or 50 nodes per second.
Crucially in both cases the deployment time
is linear in the number of nodes. The deployment time could be reduced to be logarithmic
in the number of nodes using standard divideand-conquer techniques. However there hasnโt
been the demand to do so as most Erlang systems are long running servers.
The measurement data shows two important facts: it shows that WombatOAM scales
well (up to a deployment base of 10,000 Erlang
nodes), and that WombatOAM is non-intrusive
because its overhead on a monitored node is
typically less than 1.5% of effort on the node.
We conclude that WombatOAM is capable
of deploying and monitoring substantial distributed Erlang and SD Erlang programs. The
experiments in the remainder of this section
36
use standard distributed Erlang configuration
file deployment.
Reliability SD Erlang changes the organisation of processes and their recovery data at
the language level, so we seek to show that
these changes have not disrupted Erlangโs
world-class reliability mechanisms at this level.
As we havenโt changed them we donโt exercise Erlangโs other reliability mechanisms, e.g.
those for managing node failures, network congestion, etc. A more detailed study of SD
Erlang reliability, including the use of replicated databases for recovering Instant Messenger chat sessions, finds similar results [23].
We evaluate the reliability of two ACO versions using a Chaos Monkey service that kills
processes in the running system at random [14].
Recall that GR-ACO provides reliability by registering the names of critical processes globally,
and SR-ACO registers them only within an
s_group (Section ii).
For both GR-ACO and SR-ACO a Chaos
Monkey runs on every Erlang node, i.e. master, submasters, and colony nodes, killing a
random Erlang process every second. Both
ACO versions run to completion. Recovery,
at this failure frequency, has no measurable
P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โข Scaling Reliably โข 2017
Time (sec)
200
160
120
80
0
2000
4000
6000
Number of nodes (N)
Experimental data
8000
10000
Best fit: 0.0125N+83
Figure 30: Wombat Deployment Time
Execution time (s)
16
12
8
4
0
0
50(1200)
GR-ACO
100(2400)
150(3600)
Number of nodes (cores)
SR-ACO
200(4800)
250(6000)
ML-ACO
Figure 31: ACO execution times, Erlang/OTP 17.4 (RELEASE) [Weak Scaling].
37
P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โข Scaling Reliably โข 2017
impact on runtime. This is because processes
are recovered within the Virtual machine using
(globally synchronised) local recovery information. For example, on a common X86/Ubuntu
platform typical Erlang process recovery times
are around 0.3ms, so around 1000x less than
the Unix process recovery time on the same
platform [58]. We have conducted more detailed experiments on an Instant Messenger
benchmark, and obtained similar results [23].
We conclude that both GR-ACO and SRACO are reliable, and that SD Erlang preserves
distributed Erlang reliability model. The remainder of the section outlines the impact of
maintaining the recovery information required
for reliability on scalability.
Scalability Figure 31 compares the runtimes
of the ML, GR, and SR versions of ACO (Section ii) on Erlang/OTP 17.4(RELEASE). As outlined in Section i.1, GR-ACO not only maintains a fully connected graph of nodes, it registers process names for reliability, and hence
scales significantly worse than the unreliable
ML-ACO. We conclude that providing reliability with standard distributed Erlang process
registration dramatically limits scalability.
While ML-ACO does not provide reliability,
and hence doesnโt register process names, it
maintains a fully connected graph of nodes
which limits scalability. SR-ACO, that maintains connections and registers process names
only within s_groups scales best of all. Figure 31 illustrates how maintaining the process
namespace, and fully connected network, impacts performance. This reinforces the evidence from the Orbit benchmarks, and others, that partitioning the network of Erlang
nodes significantly improves performance at
large scale.
To investigate the impact of SD Erlang on
network traffic, we measure the number of sent
and received packets on the GPG cluster for
three versions of ACO: ML-ACO, GR-ACO,
and SR-ACO. Figure 32 shows the total number
of sent packets. The highest traffic (the red line)
belongs to the GR-ACO and the lowest traffic
belongs to the SR-ACO (dark blue line). This
38
shows that SD Erlang significantly reduces the
network traffic between Erlang nodes. Even
with the s_group name registration SR-ACO
has less network traffic than ML-ACO that has
no global name registration.
iii.
Evaluation Summary
We have shown that WombatOAM is capable
of deploying and monitoring substantial distributed Erlang and SD Erlang programs like
ACO and Sim-Diasca. The Chaos Monkey experiments with GR-ACO and SR-ACO show
that both are reliable, and hence that SD Erlang
preserves the distributed Erlang language-level
reliability model.
As SD Orbit scales better than D-Orbit, SRACO scales better than ML-ACO, and SRACO has significantly less network traffic,
we conclude that, even when global recovery
data is not maintained, partitioning the fullyconnected network into s_groups reduces network traffic and improves performance. While
the distributed Orbit instances (W=2M) and
(W=5M) reach scalability limits at around 40
and 60 nodes, Orbit scales to 150 nodes on SD
Erlang (limited by input size), and SR-ACO
is still scaling well on 256 nodes (6144 cores).
Hence not only have we exceeded the 60 node
scaling limits of distributed Erlang identified
in Section ii, we have not reached the scaling
limits of SD Erlang on this architecture.
Comparing GR-ACO and ML-ACO scalability curves shows that maintaining global recovery data, i.e. a process name space, dramatically limits scalability. Comparing GRACO and SR-ACO scalability curves shows
that scalability can be recovered by partitioning
the nodes into appropriately-sized s_groups,
and hence maintaining the recovery data only
within a relatively small group of nodes. These
results are consistent with other experiments.
IX.
Discussion
Distributed actor platforms like Erlang, or
Scala with Akka, are a common choice for
internet-scale system architects as the model,
P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โข Scaling Reliably โข 2017
Figure 32: Number of sent packets in ML-ACO, GR-ACO, and SR-ACO.
with its automatic, and VM-supported reliability mechanisms makes it extremely easy to engineer scalable reliable systems. Targeting emergent
server architectures with hundreds of hosts
and tens of thousands of cores, we report a
systematic effort to improve the scalability of a
leading distributed actor language, while preserving reliability. The work is a vade mecum
for addressing scalability of reliable actor languages and frameworks. It is also high impact,
with downloads of our improved Erlang/OTP
running at 50K a month.
We have undertaken the first systematic
study of scalability in a distributed actor language, covering VM, language and persistent storage levels. We have developed the
BenchErl and DE-Bench tools for this purpose.
Key VM-level scalability issues we identify include contention for shared ETS tables and for
commonly-used shared resources like timers.
Key language scalability issues are the costs of
maintaining a fully-connected network, maintaining global recovery information, and explicit process placement. Unsurprisingly the
scaling issues for this distributed actor language are common to other distributed or parallel languages and frameworks with other
paradigms like CHARM++ [45], Cilk [15], or
Legion [40]. We establish scientifically the folklore limitations of around 60 connected nodes
for distributed Erlang (Section IV).
The actor model is no panacea, and there can
still be scalability problems in the algorithms
that we write, either within a single actor or in
the way that we structure communicating actors. A range of pragmatic issues also impact
the performance and scalability of actor systems, including memory occupied by processes
(even when quiescent), mailboxes filling up,
etc. Identifying and resolving these problems
is where tools like Percept2 and WombatOAM
are needed. However, many of the scalability
issues arise where Erlang departs from the private
state principle of the actor model, e.g. in maintaining shared state in ETS tables, or a shared
global process namespace for recovery.
We have designed and implemented a set
of Scalable Distributed (SD) Erlang libraries
to address language-level scalability issues. The
key constructs are s_groups for partitioning the
network and global process namespace, and
semi-explicit process placement for deploying
distributed Erlang applications on large heterogeneous architectures in a portable way. We
have provided a state transition operational semantics for the new s_groups, and validated
39
P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โข Scaling Reliably โข 2017
the library implementation against the semantics using QuickCheck (Section V).
To improve the scalability of the Erlang VM
and libraries we have improved the implementation of shared ETS tables, time management
and load balancing between schedulers. Following a systematic analysis of ETS tables,
the number of fine-grained (bucket) locks and
of reader groups have been increased. We
have developed and evaluated four new techniques for improving ETS scalability:(i) programmer control of number of bucket locks;
(ii) a contention-adapting tree data structure
for ordered_sets; (iii) queue delegation locking; and (iv) eliminating the locks in the meta
table. We have introduced a new scheduler utilisation balancing mechanism to spread work to
multiple schedulers (and hence cores), and new
synchronisation mechanisms to reduce contention on the widely-used time management
mechanisms. By June 2015, with Erlang/OTP
18.0, the majority of these changes had been included in the primary releases. In any scalable
actor language implementation such thoughtful design and engineering will be required
to schedule large numbers of actors on hosts
with many cores, and to minimise contention
on shared VM resources (Section VI).
To facilitate the development of large Erlang
systems, and to make them understandable we
have developed a range of tools. The proprietary WombatOAM tool deploys and monitors
large distributed Erlang systems over multiple, and possibly heterogeneous, clusters or
clouds. We have made open source releases of
four concurrency tools: Percept2 now detects
concurrency bad smells; Wrangler provides enhanced concurrency refactoring; the Devo tool
is enhanced to provide interactive visualisation
of SD Erlang systems; and the new SD-Mon
tool monitors SD Erlang systems.
We anticipate that these tools will guide the design
of tools for other large scale distributed actor
languages and frameworks (Section VII).
We report on the reliability and scalability
implications of our new technologies using a
range of benchmarks, and consistently use the
Orbit and ACO benchmarks throughout the
40
article. While we report measurements on a
range of NUMA and cluster architectures, the
key scalability experiments are conducted on
the Athos cluster with 256 hosts (6144 cores).
Even when global recovery data is not maintained, partitioning the network into s_groups
reduces network traffic and improves the performance of the Orbit and ACO benchmarks
above 80 hosts. Crucially we exceed the 60
node limit for distributed Erlang and do not
reach the scalability limits of SD Erlang with
256 nodes/VMs and 6144 cores. Chaos Monkey experiments show that two versions of
ACO are reliable, and hence that SD Erlang preserves the Erlang reliability model. However
the ACO results show that maintaining global
recovery data, i.e. a global process name space,
dramatically limits scalability in distributed
Erlang. Scalability can, however, be recovered
by maintaining recovery data only within appropriately sized s_groups. These results are
consistent with experiments with other benchmarks and on other architectures (Section VIII).
In future work we plan to incorporate
RELEASE technologies, along with other technologies in a generic framework for building
performant large scale servers. In addition, preliminary investigations suggest that some SD
Erlang ideas could improve the scalability of
other actor languages.21 For example the Akka
framework for Scala could benefit from semiexplicit placement, and Cloud Haskell from
partitioning the network.
Appendix A: Architecture
Specifications
The specifications of the clusters used for measurement are summarised in Table 2. We also
use the following NUMA machines. (1) An
AMD Bulldozer with 16M L2/16M L3 cache,
128GB RAM, four AMD Opteron 6276s at
2.3 GHz, 16 โBulldozerโ cores each, giving a total of 64 cores. (2) An Intel NUMA with 128GB
RAM, four Intel Xeon E5-4650s at 2.70GHz,
21 See Deliverable 6.7 (http://www.release-project.
eu/documents/D6.7.pdf), available online.
P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โข Scaling Reliably โข 2017
Table 2: Cluster Specifications (RAM per host in GB).
Cores
per
Name
max
Hosts
host
total
avail.
20
16
320
320
Kalkyl
348
8
2,784
1,408
TinTin
160
16
2,560
2,240
Athos
776
24
18,624
6,144
GPG
Processor
RAM
Intel Xeon E5-2640v2 8C,
2GHz
Intel Xeon
2.26GHz
5520v2
4C,
64
24โ72
Interconnection
10GB Ethernet
InfiniBand
Gb/s
20
AMD Opteron 6220v2 Bull2:1
oversub64โ128 scribed
dozer 8C, 3.0GHz
QDR
Infiniband
Intel Xeon E5-2697v2 12C,
2.7GHz
64
Infiniband
FDR14
each with eight hyperthreaded cores, giving a
total of 64 cores.
[3] Bulldozer (microarchitecture),
2015.
https://en.wikipedia.org/wiki/
Bulldozer_(microarchitecture).
Acknowledgements
[4] Apache SF. Liblcoud, 2016. https://
libcloud.apache.org/.
We would like to thank the entire RELEASE
project team for technical insights and administrative support. Roberto Aloi and Enrique Fernandez Casado contributed to the development
and measurement of WombatOAM. This work
has been supported by the European Union
grant RII3-CT-2005-026133 โSCIEnce: Symbolic
Computing Infrastructure in Europeโ, IST-2011287510 โRELEASE: A High-Level Paradigm for
Reliable Large-scale Server Softwareโ, and by
the UKโs Engineering and Physical Sciences
Research Council grant EP/G055181/1 โHPCGAP: High Performance Computational Algebra and Discrete Mathematicsโ.
[5] C. R. Aragon and R. G. Seidel. Randomized search trees. In Proceedings of the 30th
Annual Symposium on Foundations of Computer Science, pages 540โ545, October 1989.
[6] Joe Armstrong. Programming Erlang: Software for a Concurrent World. Pragmatic
Bookshelf, 2007.
[7] Joe Armstrong. Erlang. Commun. ACM,
53:68โ75, 2010.
[1] Gul Agha. ACTORS: A Model of Concurrent
Computation in Distributed Systems. PhD
thesis, MIT, 1985.
[8] Stavros Aronis, Nikolaos Papaspyrou, Katerina Roukounaki, Konstantinos Sagonas, Yiannis Tsiouris, and Ioannis E.
Venetis. A scalability benchmark suite for
Erlang/OTP. In Torben Hoffman and John
Hughes, editors, Proceedings of the Eleventh
ACM SIGPLAN Workshop on Erlang, pages
33โ42, New York, NY, USA, September
2012. ACM.
[2] Gul Agha. An overview of Actor languages. SIGPLAN Not., 21(10):58โ67, 1986.
[9] Thomas Arts, John Hughes, Joakim Johansson, and Ulf Wiger. Testing telecoms
References
41
P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โข Scaling Reliably โข 2017
software with Quviq QuickCheck. In Proceedings of the 2006 ACM SIGPLAN workshop on Erlang, pages 2โ10, New York, NY,
USA, 2006. ACM.
[10] Robert Baker, Peter Rodgers, Simon
Thompson, and Huiqing Li. Multi-level Visualization of Concurrent and Distributed
Computation in Erlang. In Visual Languages and Computing (VLC): The 19th International Conference on Distributed Multimedia Systems (DMS 2013), 2013.
[11] Luiz Andrรฉ Barroso, Jimmy Clidaras, and
Urs Hรถlzle. The Datacenter as a Computer.
Morgan and Claypool, 2nd edition, 2013.
Symposium, TFP 2014. Revised Selected Papers, volume 8843 of LNCS, pages 104โ121.
Springer, 2015.
[18] Irina Calciu, Dave Dice, Yossi Lev, Victor Luchangco, Virendra J. Marathe, and
Nir Shavit. NUMA-aware reader-writer
locks. In Proceedings of the 18th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, pages 157โ166,
New York, NY, USA, 2013. ACM.
[19] Francesco Cesarini and Simon Thompson. Erlang Programming: A Concurrent
Approach to Software Development. OโReilly
Media, 1st edition, 2009.
[12] Basho Technologies. Riakdocs. Basho
Bench, 2014.
http://docs.basho.
com/riak/latest/ops/building/
benchmarking/.
[20] Rohit Chandra, Leonardo Dagum, Dave
Kohr, Dror Maydan, Jeff McDonald, and
Ramesh Menon. Parallel Programming in
OpenMP. Morgan Kaufmann, San Francisco, CA, USA, 2001.
[13] J. E. Beasley. OR-Library: Distributing
test problems by electronic mail. The
Journal of the Operational Research Society, 41(11):1069โ1072, 1990. Datasets
available at http://people.brunel.ac.
uk/~mastjjb/jeb/orlib/wtinfo.html.
[21] Natalia Chechina, Huiqing Li, Amir
Ghaffari, Simon Thompson, and Phil
Trinder. Improving the network scalability of Erlang. J. Parallel Distrib. Comput.,
90(C):22โ34, 2016.
[14] Cory Bennett and Ariel Tseitlin. Chaos
monkey released into the wild. Netflix
Blog, 2012.
[15] Robert D Blumofe, Christopher F Joerg,
Bradley C Kuszmaul, Charles E Leiserson,
Keith H Randall, and Yuli Zhou. Cilk: An
efficient multithreaded runtime system. In
Proceedings of the fifth ACM SIGPLAN symposium on Principles and practice of parallel
programming, pages 207โ216. ACM, 1995.
[16] Olivier Boudeville. Technical manual of
the sim-diasca simulation engine. EDF
R&D, 2012.
[17] Istvรกn Bozรณ, Viktรณria Fรถrdoฬs, Dรกniel Horpรกcsi, Zoltรกn Horvรกth, Tamรกs Kozsik, Judit Koฬszegi, and Melinda Tรณth. Refactorings to enable parallelization. In Jurriaan
Hage and Jay McCarthy, editors, Trends in
Functional Programming: 15th International
42
[22] Natalia Chechina, Kenneth MacKenzie,
Simon Thompson, Phil Trinder, Olivier
Boudeville, Viktรณria Fรถrdoฬs, Csaba Hoch,
Amir Ghaffari, and Mario Moro Hernandez. Evaluating scalable distributed
Erlang for scalability and reliability. IEEE
Transactions on Parallel and Distributed Systems, 2017.
[23] Natalia Chechina, Mario Moro Hernandez, and Phil Trinder. A scalable reliable
instant messenger using the SD Erlang libraries. In Erlangโ16, pages 33โ41, New
York, NY, USA, 2016. ACM.
[24] Koen Claessen and John Hughes.
QuickCheck: a lightweight tool for
random testing of Haskell programs.
In Proceedings of the 5th ACM SIGPLAN
International Conference on Functional
Programming, pages 268โ279, New York,
NY, USA, 2000. ACM.
P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โข Scaling Reliably โข 2017
[25] H. A. J. Crauwels, C. N. Potts, and L. N.
van Wassenhove. Local search heuristics
for the single machine total weighted tardiness scheduling problem. INFORMS
Journal on Computing, 10(3):341โ350, 1998.
The datasets from this paper are included
in Beasleyโs ORLIB.
[26] Jeffrey Dean and Sanjay Ghemawat.
Mapreduce: Simplified data processing on
large clusters. Commun. ACM, 51(1):107โ
113, 2008.
[27] David Dewolfs, Jan Broeckhove, Vaidy
Sunderam, and Graham E. Fagg. FTMPI, fault-tolerant metacomputing and
generic name services: A case study. In
EuroPVM/MPIโ06, pages 133โ140, Berlin,
Heidelberg, 2006. Springer-Verlag.
[28] Alan AA Donovan and Brian W
Kernighan. The Go programming language.
Addison-Wesley Professional, 2015.
[29] Marco Dorigo and Thomas Stรผtzle. Ant
Colony Optimization. Bradford Company,
Scituate, MA, USA, 2004.
[30] Faith Ellen, Yossi Lev, Victor Luchangco,
and Mark Moir. SNZI: scalable NonZero
indicators. In Proceedings of the 26th Annual
ACM Symposium on Principles of Distributed
Computing, pages 13โ22, New York, NY,
USA, 2007. ACM.
[31] Jeff Epstein, Andrew P. Black, and Simon Peyton-Jones. Towards Haskell in
the Cloud. In Haskell โ11, pages 118โ129.
ACM, 2011.
[32] Martin Fowler. Refactoring: Improving the
Design of Existing Code. Addison-Wesley
Longman Publishing Co., Inc., Boston,
MA, USA, 1999.
[33] Ana Gainaru and Franck Cappello. Errors
and faults. In Fault-Tolerance Techniques for
High-Performance Computing, pages 89โ144.
Springer International Publishing, 2015.
[34] Martin Josef Geiger.
New instances
for the Single Machine Total Weighted
Tardiness Problem. Technical Report
Research Report 10-03-01, March 2010.
Datasets available at http://logistik.
hsu-hh.de/SMTWTP.
[35] Guillaume Germain. Concurrency oriented programming in termite scheme.
In Proceedings of the 2006 ACM SIGPLAN
workshop on Erlang, pages 20โ20, New
York, NY, USA, 2006. ACM.
[36] Amir Ghaffari. De-bench, a benchmark
tool for distributed erlang, 2014. https:
//github.com/amirghaffari/DEbench.
[37] Amir Ghaffari. Investigating the scalability limits of distributed Erlang. In Proceedings of the 13th ACM SIGPLAN Workshop
on Erlang, pages 43โ49. ACM, 2014.
[38] Amir Ghaffari, Natalia Chechina, Phip
Trinder, and Jon Meredith. Scalable persistent storage for Erlang: Theory and practice. In Proceedings of the 12th ACM SIGPLAN Workshop on Erlang, pages 73โ74,
New York, NY, USA, 2013. ACM.
[39] Seth Gilbert and Nancy Lynch. Brewerโs
conjecture and the feasibility of consistent,
available, partition-tolerant web services.
ACM SIGACT News, 33:51โ59, 2002.
[40] Andrew S Grimshaw, Wm A Wulf, and
the Legion team. The Legion vision of a
worldwide virtual computer. Communications of the ACM, 40(1):39โ45, 1997.
[41] Carl Hewitt. Actor model for discretionary, adaptive concurrency. CoRR,
abs/1008.1459, 2010.
[42] Carl Hewitt, Peter Bishop, and Richard
Steiger. A universal modular ACTOR formalism for artificial intelligence. In IJCAIโ73, pages 235โ245, San Francisco, CA,
USA, 1973. Morgan Kaufmann.
[43] Rich Hickey. The Clojure programming
language. In DLSโ08, pages 1:1โ1:1, New
York, NY, USA, 2008. ACM.
43
P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โข Scaling Reliably โข 2017
[44] Zoltรกn Horvรกth, Lรกszlรณ Lรถvei, Tamรกs
Kozsik, Rรณbert Kitlei, Anikรณ Nagynรฉ Vรญg,
Tamรกs Nagy, Melinda Tรณth, and Roland
Kirรกly. Building a refactoring tool for
Erlang. In Workshop on Advanced Software
Development Tools and Techniques, WASDETT 2008, 2008.
[45] Laxmikant V Kale and Sanjeev Krishnan.
Charm++: a portable concurrent object
oriented system based on c++. In ACM
Sigplan Notices, volume 28, pages 91โ108.
ACM, 1993.
[46] David Klaftenegger, Konstantinos Sagonas, and Kjell Winblad. On the scalability
of the Erlang term storage. In Proceedings
of the Twelfth ACM SIGPLAN Workshop on
Erlang, pages 15โ26, New York, NY, USA,
September 2013. ACM.
[47] David Klaftenegger, Konstantinos Sagonas, and Kjell Winblad. Delegation locking libraries for improved performance of
multithreaded programs. In Euro-Par 2014
Parallel Processing., volume 8632 of LNCS,
pages 572โ583. Springer, 2014.
[48] David Klaftenegger, Konstantinos Sagonas, and Kjell Winblad. Queue delegation
locking. IEEE Transactions on Parallel and
Distributed Systems, 2017. To appear.
[49] Rusty Klophaus. Riak core: Building distributed applications without shared state.
In ACM SIGPLAN Commercial Users of
Functional Programming, CUFP โ10, pages
14:1โ14:1, New York, NY, USA, 2010.
ACM.
[50] Avinash Lakshman and Prashant Malik.
Cassandra: A decentralized structured
storage system. SIGOPS Oper. Syst. Rev.,
44(2):35โ40, April 2010.
[51] J. Lee et al. Python actor runtime library,
2010. osl.cs.uiui.edu/parley/.
[52] Huiqing Li and Simon Thompson. Automated API Migration in a User-Extensible
Refactoring Tool for Erlang Programs. In
44
Tim Menzies and Motoshi Saeki, editors,
Automated Software Engineering, ASEโ12.
IEEE Computer Society, 2012.
[53] Huiqing Li and Simon Thompson. Multicore profiling for Erlang programs using
Percept2. In Proceedings of the Twelfth ACM
SIGPLAN workshop on Erlang, 2013.
[54] Huiqing Li and Simon Thompson. Improved Semantics and Implementation
Through Property-Based Testing with
QuickCheck. In 9th International Workshop
on Automation of Software Test, 2014.
[55] Huiqing Li and Simon Thompson. Safe
Concurrency Introduction through Slicing.
In PEPM โ15. ACM SIGPLAN, January
2015.
[56] Huiqing Li, Simon Thompson, Gyรถrgy
Orosz, and Melinda Tรถth. Refactoring
with Wrangler, updated. In ACM SIGPLAN Erlang Workshop, volume 2008, 2008.
[57] Frank Lubeck and Max Neunhoffer. Enumerating large Orbits and direct condensation. Experimental Mathematics, 10(2):197โ
205, 2001.
[58] Andreea Lutac, Natalia Chechina, Gerardo Aragon-Camarasa, and Phil Trinder.
Towards reliable and scalable robot communication. In Proceedings of the 15th International Workshop on Erlang, Erlang 2016,
pages 12โ23, New York, NY, USA, 2016.
ACM.
[59] LWN.net.
The high-resolution timer
API, January 2006. https://lwn.net/
Articles/167897/.
[60] Kenneth MacKenzie, Natalia Chechina,
and Phil Trinder. Performance portability
through semi-explicit placement in distributed Erlang. In Proceedings of the 14th
ACM SIGPLAN Workshop on Erlang, pages
27โ38. ACM, 2015.
[61] Jeff Matocha and Tracy Camp. A taxonomy of distributed termination detection
P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โข Scaling Reliably โข 2017
algorithms. Journal of Systems and Software,
43(221):207โ221, 1998.
[62] Nicholas D Matsakis and Felix S Klock II.
The Rust language. In ACM SIGAda Ada
Letters, volume 34, pages 103โ104. ACM,
2014.
[63] Robert McNaughton. Scheduling with
deadlines and loss functions. Management
Science, 6(1):1โ12, 1959.
[64] Martin Odersky et al. The Scala programming language, 2012. www.scala-lang.org.
[65] William F. Opdyke. Refactoring ObjectOriented Frameworks. PhD thesis, University of Illinois at Urbana-Champaign,
1992.
[66] Nikolaos Papaspyrou and Konstantinos
Sagonas. On preserving term sharing in
the Erlang virtual machine. In Torben
Hoffman and John Hughes, editors, Proceedings of the 11th ACM SIGPLAN Erlang
Workshop, pages 11โ20. ACM, 2012.
[67] RELEASE Project Team. EU Framework
7 Project 287510 (2011โ2015), 2015. http:
//www.release-project.eu.
[68] Konstantinos Sagonas and Thanassis
Avgerinos.
Automatic refactoring of
Erlang programs. In Principles and Practice of Declarative Programming (PPDPโ09),
pages 13โ24. ACM, 2009.
range updates using contention adapting
search trees. In Languages and Compilers
for Parallel Computing - 28th International
Workshop, volume 9519 of LNCS, pages
37โ53. Springer, 2016.
[72] Marc Snir, Steve W. Otto, D. W.
Walker, Jack Dongarra, and Steven HussLederman. MPI: The Complete Reference.
MIT Press, Cambridge, MA, USA, 1995.
[73] Sriram Srinivasan and Alan Mycroft.
Kilim: Isolation-typed actors for Java. In
ECOOPโ08, pages 104โ128, Berlin, Heidelberg, 2008. Springer-Verlag.
[74] Don Syme, Adam Granicz, and Antonio
Cisternino. Expert F# 4.0. Springer, 2015.
[75] Simon Thompson and Huiqing Li. Refactoring tools for functional languages. Journal of Functional Programming, 23(3), 2013.
[76] Marcus Vรถlker. Linux timers, May 2014.
[77] WhatsApp, 2015. https://www.whatsapp.
com/.
[78] Tom White. Hadoop - The Definitive Guide:
Storage and Analysis at Internet Scale (3. ed.,
revised and updated). OโReilly, 2012.
[79] Ulf Wiger. Industrial-Strength Functional
programming: Experiences with the Ericsson AXD301 Project. In Implementing
Functional Languages (IFLโ00), Aachen, Germany, September 2000. Springer-Verlag.
[69] Konstantinos Sagonas and Kjell Winblad.
More scalable ordered set for ETS using
adaptation. In Proc. ACM SIGPLAN Workshop on Erlang, pages 3โ11. ACM, September 2014.
[70] Konstantinos Sagonas and Kjell Winblad.
Contention adapting search trees. In Proceedings of the 14th International Symposium on Parallel and Distributed Computing,
pages 215โ224. IEEE Computing Society,
2015.
[71] Konstantinos Sagonas and Kjell Winblad.
Efficient support for range queries and
45
| 6cs.PL
|
Top Tips to Make Your Research Irreproducible
Neil P. Chue Hong1 , Tom Crick2 , Ian P. Gent3 , Lars Kotthoff4 and Kenji Takeda5
1
arXiv:1504.00062v2 [cs.CE] 8 Apr 2015
2
Software Sustainability Institute, University of Edinburgh, UK
Department of Computing & Information Systems, Cardiff Metropolitan University, UK
3
School of Computer Science, University of St Andrews, UK
4
Insight Centre for Data Analytics, University College Cork, Ireland
5
Microsoft Research, Cambridge, UK
1
[email protected]
http://www2.epcc.ed.ac.uk/~ neilc/
2
[email protected]
http://drtomcrick.com/
3
[email protected]
http://ian.gent
4
[email protected]
http://4c.ucc.ie/~ larsko/
5
[email protected]
http://research.microsoft.com/en-us/people/kenjitak/
1 April 2015
We have noticed (and contributed to) a number of manifestos, guides and top tips on how to make
research reproducible [1, 2, 3, 4, 5, 6, 7, 8, 9, 10]; however, we have seen very little published on how to
make research irreproducible.
Irreproducibility is the default setting for all of science, and irreproducible research is particularly
common across the computational sciences. The study of making your work irreproducible without
reviewers complaining is a much neglected area; we feel therefore that by encapsulating some of our top
tips1 on irreproducibility, we will be filling a much-needed gap in the domain literature. By following our
starter tips, you can ensure that if your work is wrong, nobody will be able to check it; if it is correct,
you will make everyone else do disproportionately more work than you to build upon it. In either case
you are the beneficiary.
It is an unfortunate convention of science that research should pretend to be reproducible; our top
tips will help you salve the conscience of certain reviewers still bound by this fussy conventionality,
enabling them to enthusiastically recommend acceptance of your irreproducible work.
1. Think โBig Pictureโ. People are interested in the science, not the dull experimental setup, so
donโt describe it. If necessary, camouflage this absence with brief, high-level details of insignificant
aspects of your methodology.
2. Be abstract. Pseudo-code is a great way of communicating ideas quickly and clearly while
giving readers no chance to understand the subtle implementation details (particularly the custom
toolchains and manual interventions) that actually make it work.
3. Short and sweet. Any limitations of your methods or proofs will be obvious to the careful reader,
so there is no need to waste space on making them explicit2 . However much work it takes colleagues
to fill in the gaps, you will still get the credit if you just say you have amazing experiments or
proofs (with a hat-tip to Pierre de Fermat: โCuius rei demonstrationem mirabilem sane detexi
hanc marginis exiguitas non caperet.โ).
4. The deficit model. Youโre the expert in the domain, only you can define what algorithms and
data to run experiments with. In the unhappy circumstance that your methods do not do well on
1
N.B. We are by no means claiming this is an exhaustive list for making your research irreproducible...
Space saved in this way can be used to cite the critical papers in the field, i.e. those papers that will inflate your own
(as well as potential reviewersโ) h-index.
2
1
community curated benchmarks, you should create your own bespoke benchmarks and use those
(and preferably not make them available to others).
5. Donโt share. Doing so only makes it easier for other people to scoop your research ideas, understand how your code actually works3 instead of why you say it does, or worst of all to understand
that your code doesnโt actually work at all.
However, our most important tip is deceptively but beautifully simple: to ensure your work is
irreproducible, make sure that you cannot reproduce it yourself . If you were able to reproduce
it, there would always be the danger of somebody else being able to do exactly the same as you. Much
else follows from this; for example, complete confidence in your own inability to reproduce work saves
tedious time revising your work on advice from reviewers: if you are unable to browbeat the editor into
accepting it as is, you can always resubmit elsewhere. A major advantage of this key insight is that
no strict discipline is required to ensure self-irreproducibility: in our experience, irreproducibility can
happily occur after only the tiniest amount of carelessness at one of any number of stages.
We make a simple conjecture: an experiment that is irreproducible is exactly equivalent to
an experiment that was never carried out at all. The happy consequences of this conjecture for
experts in irreproducibility will be published elsewhere, with extremely impressive experimental support.
We close with a mantra for scientists interested in irreproducibility:
After Publishing Research, Irreproducibility Lets False Observations Obtain Longevity!
References
[1] Andreas Prlicฬ and James B. Procter. Ten Simple Rules for the Open Development of Scientific
Software. PLoS Computational Biology, 12(8), 2012.
[2] Geir Kjetil Sandve, Anton Nekrutenko, James Taylor, and Eivind Hovig. Ten Simple Rules for
Reproducible Computational Research. PLoS Computational Biology, 9(10), 2013.
[3] Ian P. Gent. The Recomputation Manifesto. Available from: http://arxiv.org/abs/1304.3674,
April 2013.
[4] Lucas N. Joppa, Greg McInerny, Richard Harper, Lara Salido, Kenji Takeda, Kenton OโHara,
David Gavaghan, and Stephen Emmott. Troubling Trends in Scientific Software Use. Science,
340(6134):814โ815, 2013.
[5] Ian P. Gent and Lars Kotthoff. Recomputation.org: Experience of its first year and lessons learned.
In Recomputability 2014, December 2014.
[6] Greg Wilson, D. A. Aruliah, C. Titus Brown, Neil P. Chue Hong, Matt Davis, Richard T. Guy,
Steven H. D. Haddock, Kathryn D. Huff, Ian M. Mitchell, Mark D. Plumbley, Ben Waugh, Ethan P.
White, and Paul Wilson. Best Practices for Scientific Computing. PLoS Biology, 12(1), 2014.
[7] Carole Goble. Better Software, Better Research. IEEE Internet Computing, 18(5):4โ8, 2014.
[8] Tom Crick, Benjamin A. Hall, and Samin Ishtiaq. โCan I Implement Your Algorithm?โ: A Model
for Reproducible Research Software. In Proceedings of 2nd International Workshop on Sustainable
Software for Science: Practice and Experiences (WSSSPE2), 2014.
[9] Tom Crick, Benjamin A. Hall, Samin Ishtiaq, and Kenji Takeda. โShare and Enjoyโ: Publishing
Useful (and Usable) Scientific Models. In Proceedings of 1st International Workshop on Recomputability, 2014.
[10] Victoria Stodden and Sheila Miguez. Best Practices for Computational Science: Software Infrastructure and Environments for Reproducible and Extensible Research. Journal of Open Research
Software, 2(1):1โ6, 2014.
3
An exemplary example: http://www.phdcomics.com/comics.php?f=1689
2
| 5cs.CE
|
RESTRICTION ESTIMATES FOR THE FREE TWO STEP
NILPOTENT GROUP ON THREE GENERATORS
arXiv:1704.07876v1 [math.GR] 25 Apr 2017
VALENTINA CASARINO AND PAOLO CIATTI
Abstract. Let G be the free two step nilpotent Lie group on three generators and let
L be a subLaplacian on it. We compute the spectral resolution of L and prove that the
operators arising from this decomposition enjoy a Tomas-Stein type estimate.
1. Introduction
Starting from the observation of E. Stein that, when the Lebesgue exponent p is sufficiently close to 1, the Fourier transform of an Lp function restricts in a sense, that may
be made precise, to a compact hypersurface of nonvanishing curvature, various forms of
restriction theorems for the Fourier transform became one of the main theme of analysis.
The most satisfactory result obtained so far in this theory is the Stein-Tomas theorem,
which concerns the restriction in the L2 - sense of the Fourier transform of a function
n`1
in Lp pRn q, with 1 ฤ p ฤ 2 n`3
, to the sphere S nยด1 . This result was proved in the mid
seventies of the last century and, as any very important theorem, has now a great deal
of extensions and applications in different branches of mathematics. In particular, it was
observed by Stein himself and by R. Strichartz in [Str] that the Stein-Tomas estimates
can be interpreted as bounds concerning the mapping properties between Lebesgue spaces
of the operators arising in the spectral decomposition of the Euclidean Laplacian.
This point of view is emphasised in the works of C. Sogge, who studied the boundedness
of the spectral projections of the Laplace-Beltrami operator on the spheres in [So1] and
more generally on compact Riemannian manifolds in [So2]. Few years later D. Mรผller
proved for the first time a result of this sort for a subelliptic operator, the subLaplacian
on the Heisenberg group. In the series of papers [C1], [C2], [CCi2], [CCi4] the authors of
this article studied a sort of combination of the previous results considering estimates for
the joint spectral projections of a Laplace-Beltrami operator and a subLaplacian.
Some years ago we started in [CCi2] and [CCi3] an investigation devoted to extend the
result of Mรผller to subLaplacians on more general two step nilpotent Lie groups. In those
papers we considered groups enjoying a special nondegeneracy condition, according to
which the quotient with respect to a codimension one subspace of the center is isomorphic
to a Heisenberg group.
In this paper we are instead concerned with the mapping properties of the operators
arising in the spectral decomposition of an invariant subLaplacian on the free two step
2000 Mathematics Subject Classification. 22E25; 22E30, 43A80, 47B40.
Key words and phrases. Free nilpotent Lie groups. Sub-Laplacians. Restriction theorems.
Research supported by the Italian Ministero dellโIstruzione, dellโUniversitร e della Ricerca through
PRIN โReal and Complex Manifolds: Geometry, Topology and Harmonic Analysisโ and the GNAMPA
project 2016 โCalcolo funzionale per operatori subellittici su varietร โ.
1
2
VALENTINA CASARINO AND PAOLO CIATTI
nilpotent Lie group on three generators. In this group the quotient with respect to a
codimension one subspace of the center is isomorphic to the direct product of the three
dimensional Heisenberg group and the real line. Therefore, the nondegeneracy property
we exploited in the previous works here is absent. However, the analysis on this group
is made easier by the fact that the abelian component in the quotients with respect to
the planes in the center is always one dimensional and by the fact that the combined
action of the rotation group on the two layers of the Lie algebra gives rise to a family of
automorphisms.
We conclude the introduction with a short description of the next sections.
In Section 2 we describe some features of the group G we are concerned with. Decomposing its Lie algebra g into the direct sum z โ v, where z is the center, we see that once
a nontrivial linear form ยต on z has been fixed, the quotient of g with respect to the null
space of ยต is the direct product of a three dimensional Heisenberg algebra times the real
line. Moreover, these two components, the Heisenberg and the abelian one, depend only
on the line in zห spanned by ยต.
Then in Section 3 we derive the spectral decomposition of an L2 function f with respect
to the subLaplacian. This decomposition is expressed first of all in terms of the Fourier
transform f ยต of f on z, which for every ยต in the dual of z is a function living on v. This
transform is followed by the section of the Fourier transform of f ยต in the direction of
the radical of ยต, which is finally decomposed into eigenfunctions of the two dimensional
twisted Laplacian.
Finally, in Section 4 we prove that the operators arising from the spectral decomposition
of the subLaplacian are bounded for 1 ฤ s ฤ 6{5 and 1 ฤ p ฤ 2 from the nonisotropic
Lebesgue space Lsz Lpv , in which the integrations in z and v are weighted with exponents s
1
and p, to Lsz L2v . The basic ingredients in these estimates are provided by the Stein-Tomas
theorem, which in fact dictates the range of the exponents concerning the integration
on z, and by the estimates proved some years ago by H. Koch and F. Ricci in [KR] for
the twisted Laplacian. The range of exponents for which our estimates hold is sharp as
examples analogue to those provided in [CCi2] show.
2. Generalities
Let G be a free two step nilpotent Lie group on three generators. We assume that G is
connected and simply connected.
The Lie algebra, g, of G splits as a vector space into the direct sum g โ v โ z, where z is
the centre. Both v and z are three dimensional vector spaces. To proceed it is convenient
to introduce on g an inner product xยจ, ยจy with respect to which v and z are orthogonal
subspaces. The inner product induces a norm on g and a norm on gห , the space of linear
forms on g, which we will both denote by | ยจ |.
We shall always identify G with its Lie algebra g by means of the exponential mapping
and use coordinates px, zq with x โ px1 , x2 , x3 q P R3 labeling the points of v and z โ
pz1 , z2 , z3 q P R3 the points of z. The vector fields
X1 โ B x 1 `
x3
x2
B z2 ยด B z3 ,
2
2
X2 โ B x 2 `
x1
x3
B z3 ยด B z1 ,
2
2
X3 โ B x 3 `
x2
x1
B z1 ยด B z2
2
2
RESTRICTION ESTIMATES FOR THE FREE GROUP
3
are left invariant and satisfy
rX1 , X2 s โ Bz3 โ Z3 ,
rX2 , X3 s โ Bz1 โ Z1 ,
rX3 , X1 s โ Bz2 โ Z2 .
(2.1)
Fix a point ฯ in the unit sphere S โ tฮฝ P zห : |ฮฝ| โ 1u; here zห denotes the space of
linear forms on z. We call rฯ the radical of the skew-symmetric form
v ห v Q pX, Y q รร ฯprX, Y sq,
that is the space
rฯ โ tX P v : ฯprX, Y sq โ 0 for all Y P vu,
which as follows from (2.1) is one dimensional.
If Zฯ P z satisfies ฯpZฯ q โ 1, then |Zฯ | โ 1 and
rX, Y s โ ฯprX, Y sqZฯ ,
X, Y P v.
Thus if we fix two unit vectors Xฯ and Yฯ in vฯ satisfying ฯprXฯ , Yฯ sq โ 1, then the
subspace hฯ spanned by tXฯ , Yฯ , Zฯ u is a Lie algebra isomorphic to the three dimensional
Heisenberg algebra.
The subspace kฯ of z orthogonal to Zฯ coincides with the kernel of ฯ. Therefore the
quotient of g with respect to kฯ is isomorphic as a Lie algebra to the direct product of hฯ
and rฯ . To equip this algebra with a system of coordinates, we decompose a vector into
the sum
vฯ Vฯ ` xฯ Xฯ ` yฯ Yฯ ` zฯ Zฯ ,
where Vฯ is a unit vector in rฯ and pvฯ , xฯ , yฯ , zฯ q P R4 . We shall identify, with a slight
abuse of notation, ฯ with the linear form in vห canonically associated to Vฯ , writing
vฯ โ ฯpXq.
Fixing two orthonormal vectors tWฯ,1 , Wฯ,2 u in kฯ , we obtain an orthogonal basis
tZฯ , Wฯ,1 , Wฯ,2 u of z. Then any vector in g can be uniquely written as
vฯ Vฯ ` xฯ Xฯ ` yฯ Yฯ ` zฯ Zฯ ` wฯ,1 Wฯ,1 ` wฯ,2 Wฯ,2 ,
where pvฯ , xฯ , yฯ , zฯ , wฯ,1 , wฯ,2q P R6 are coordinates adapted to ฯ.
The transformation mapping X โ px1 , x2 , x3 q to pxฯ , yฯ , vฯ q is a rotation Rฯ P SOp3q
fixing Vฯ and hence
pxฯ , yฯ q โ xฯ Xฯ ` yฯ Yฯ โ Rฯ pXq ยด ฯpXqVฯ .
Since by the universal property rotations of v extend to automorphisms of g, Rฯ preserves
Zฯ and maps pz1 , z2 , z3 q to pwฯ,1 , wฯ,2, zฯ q.
3. The subLaplacian
The vector fields X1 , X2 , X3 generate by (2.1) the entire Lie algebra g. Therefore by
Hรถrmanderโs theorem the subLaplacian
L โ ยดX12 ยด X22 ยด X32
4
VALENTINA CASARINO AND PAOLO CIATTI
is a hypoelliptic differential operator. It is easy to see that
1
1
1
L โ ยดBx21 ยด Bx22 ยด Bx23 ` px2 Bx3 ยด x3 Bx1 qBz1 ` px3 Bx1 ยด x2 Bx3 qBz2 ` px1 Bx2 ยด x2 Bx1 qBz3
2
2
2
1 2
1 2
1 2
2 2
2 2
2 2
ยด px2 ` x3 qBz1 ยด px1 ` x3 qBz2 ยด px1 ` x2 qBz3
4
4
4
and hence that L is homogeneous with respect to the dilations defined by ฮดวซ pX, Zq โ
pวซx, วซ2 zq, วซ ฤ
0, that is
Lpf ห ฮดวซ q โ วซ2 pLf q ห ฮดวซ .
The subLaplacian is a symmetric operator on the Schwartz class and extends to a selfadjoint operator on L2 pGq with positive spectrum. Our plan in the section consists in
deriving its spectral decomposition. Our construction is largely inspired by the analogous
derivations in [ACDS] and [MMรผ]. To accomplish the task, given a Schwartz function f
on G, we take its partial Fourier transform in the central variables
ลผ
ยต
f pXq โ
eยดiยตpZq f pX, ZqdZ,
ยต P zห .
zห
We then introduce spherical coordinates in zห , writing ยต โ ฯฯ, where ฯ โ |ยต| and ฯ
belongs to S. In these coordinates the Fourier inversion formula in zห reads
ลผ ลผ8
f pX, Zq โ
eiฯฯpZq f ฯฯ pXqฯ2 dฯdฯ.
(3.1)
S
0
In particular, we have
Xa f pX, Zq โ
ลผ ลผ8
S
eiฯฯpZq Xaฯฯ f ฯฯ pXqฯ2 dฯdฯ,
a โ 1, 2, 3,
(3.2)
0
where the vector fields Xaฯฯ are the differential operators on v defined by
`
ห
Xa eยดiฯฯpZq gpXq โ eยดiฯฯpZq Xaฯฯ gpXq, a โ 1, 2, 3,
for any Schwartz function g. They are more explicitly given by
i
i
i
X1ฯฯ โ Bx1 ` ฯpฯ3 x2 ยดฯ2 x3 q, X2ฯฯ โ Bx2 ` ฯpฯ1 x3 ยดฯ3 x1 q, X3ฯฯ โ Bx3 ` ฯpฯ2 x1 ยดฯ1 x2 q,
2
2
2
ฯฯ
where ฯa โ ฯ pZa q, a โ 1, 2, 3. Defininig the differential operator L on v by
`
ห
L eยดiฯฯpZq gpXq โ eยดiฯฯpZq Lฯฯ gpXq,
(3.3)
we find
i
i
i
Lฯฯ โ ยดBx21 ยด Bx22 ยด Bx23 ` ฯฯ1 px3 Bx1 ยด x2 Bx3 q ` ฯฯ2 px2 Bx3 ยด x3 Bx1 q ` ฯฯ3 px2 Bx1 ยด x1 Bx2 q
2
2
2
1
1
1 2 2 2
` ฯ ฯ1 px2 ` x23 q ` ฯ2 ฯ22px21 ` x23 q ` ฯ2 ฯ32ฯ2 px21 ` x22 q.
4
4
4
In the coordinates pvฯ , xฯ , yฯ , zฯ , wฯ,1 , wฯ,2q the operator Lฯฯ becomes
i
1 2 2
2
2
2
2
Lฯฯ
xฯ ,yฯ ,vฯ โ ยดBvฯ ยด Bxฯ ยด Byฯ ` ฯpyฯ Bxฯ ยด xฯ Byฯ q ` ฯ pxฯ ` yฯ q
2
4
โ ยดBv2ฯ ` โฯxฯ ,yฯ ,
(3.4)
RESTRICTION ESTIMATES FOR THE FREE GROUP
5
where
โฮปs,t
ห
ห
ห
B2
ฮป2 ` 2
B2
i
B
B
โยด 2 ยด 2 ` ฮป t ยดs
`
s ` t2
Bs
Bt
2
Bs
Bt
4
is the two dimensional ฮป-twisted Laplacian.
The spectrum of โฮปs,t consists of eigenvalues, which are given by ฮปp2k ` 1q with k โ
0, 1, 2, ยจ ยจ ยจ . We write the spectral decomposition of g with respect to โฮปs,t as
gps, tq โ
8
รฟ
ฮฮปk gps, tq,
(3.5)
kโ0
where ฮฮปk maps L2 pR2 q onto the eigenspace associated to ฮปp2k ` 1q. These are integral
operators (for more details about them see, for instance, [Th, p.19 ff]) satisfying the
estimates
1
1
1
}ฮฮปk f }L2 pR2 q ฤ Cฮป p ยด 2 p2k ` 1qฮณp p q }f }Lp pR2 q , 1 ฤ p ฤ 2 ,
(3.6)
proved by H. Koch and F. Ricci in [KR]; here ฮณ is the piecewise affine function on r 21 , 1s
defined by
#
ห ห
1
ยด1
if 1 ฤ p ฤ 56 ,
1
ฮณ
(3.7)
:โ p1 1 1
p
p ยด p q if 56 ฤ p ฤ 2.
2 2
In order to decompose f ฯฯ into eigenfunctions of the twisted Laplacian, we define
the function gฯ,ฯ โ f ฯฯ ห Rฯยด1 , where Rฯยด1 is the inverse of Rฯ . Since pxฯ , yฯ , vฯ q โ
Rฯ px1 , x2 , x3 q โ Rฯ X, recalling that vฯ โ ฯpXq and pxฯ , yฯ q โ Rฯ pXq ยด ฯpXqVฯ , we
have f ฯฯ pXq โ gฯ,ฯ pxฯ , yฯ , vฯ q โ gฯ,ฯ pRฯ pXq ยด ฯpXqVฯ , ฯpXqq. Then it makes sense to
decompose the function gฯ,ฯ pxฯ , yฯ , vฯ q in eigenfuctions of โฯxฯ ,yฯ , obtaining
f ฯฯ pXq โ gฯ,ฯ pxฯ , yฯ , vฯ q
8
รฟ
โ
ฮฯk gฯ,ฯ pxฯ , yฯ , vฯ q
โ
kโ0
8
รฟ
kโ0
`
ห
ฮฯk pf ฯฯ ห Rฯยด1 q Rฯ pXq ยด ฯpXqVฯ , ฯpXq .
Taking the partial Fourier transform of gฯ,ฯ in rฯ , it follows that
ลผ8
`
ห
Fฯ gฯ,ฯ pxฯ , yฯ ; ฮพq โ
eยดisฮพ gฯ,ฯ Rฯ pXq ยด ฯpXqVฯ ` sVฯ ds
โ
ยด8
8
รฟลผ8
kโ0 ยด8
and also
Fฯ gฯ,ฯ pxฯ , yฯ ; ฮพq โ
`
ห
eยดisฮพ ฮฯk gฯ,ฯ Rฯ pXq ยด ฯpXqVฯ ` sVฯ ds,
8
รฟ
kโ0
`
ห
ฮฯk Fฯ gฯ,ฯ Rฯ pXq ยด ฯpXqVฯ ; ฮพ ,
6
VALENTINA CASARINO AND PAOLO CIATTI
since the operators ฮฯk and Fฯ , acting on different spaces, namely vฯ and rฯ , commute.
Thus, inverting the Fourier transform we obtain
8 ลผ8
รฟ
gฯ,ฯ pxฯ , yฯ , vฯ q โ
eivฯ ฮพ ฮฯk Fฯ gฯ,ฯ pxฯ , yฯ ; ฮพqdฮพ.
kโ0 ยด8
Hence, we have
8 ลผ8
รฟ
ฯฯ
f pXq โ
kโ0 ยด8
`
ห
eiฯpXqฮพ ฮฯk Fฯ pf ฯฯ ห Rฯยด1 q Rฯ pXq ยด ฯpXqVฯ ; ฮพ dฮพ,
(3.8)
which plugged in (3.1) yields
ลผ8
8 ลผ ลผ8
รฟ
`
ห
iฯฯpZq
e
eiฯpXqฮพ ฮฯk Fฯ pf ฯฯ ห Rฯยด1 q Rฯ pXq ยด ฯpXqVฯ ; ฮพ dฮพฯ2 dฯdฯ.
f pX, Zq โ
kโ0 S
ยด8
0
(3.9)
We may now deduce from (3.9) the spectral decomposition of f with respect to L by
replacing the arguments of the sum and the integrals with generalised eigenfunctions. To
do that we notice that by (3.2) we have
ลผ ลผ8
Lf pX, Zq โ
eiฯฯpZq Lฯฯ f ฯฯ pXqฯ2 dฯdฯ,
S
0
which by (3.8) and (3.4) implies
ยธ
ห ลผ
ลผ ลผ8
8
8
รฟ
`
ห
eiฯpXqฮพ ฮฯk Fฯ pf ฯฯ ห Rฯยด1 q Rฯ pXq ยด ฯpXqVฯ ; ฮพ dฮพ ฯ2 dฯdฯ
eiฯฯpZq Lฯฯ
S
โ
kโ0 ยด8
0
8
รฟ
ลผ ลผ8
kโ0 S
eiฯฯpZq
0
ห
หห
ลผ8
`
ห
ห
2
ฯ
ivฯ ฮพ ฯ
ฯฯ
ยด1
ห pยดBvฯ ` โxฯ ,yฯ q
e ฮk Fฯ pf ห Rฯ q xฯ , yฯ ; ฮพ dฮพ ห
โ
8 ลผ ลผ8
รฟ
kโ0 S
ห
หลผ 8
ยด8
0
ivฯ ฮพ
e
8 ลผ ลผ8
รฟ
kโ0 S
ห
หลผ 8
2
pฮพ `
ivฯ ฮพ
e
kโ0 S
ห
ยด8
ห
Rฯยด1 q
`
หห
ห
ห
xฯ , yฯ ; ฮพ dฮพ ห
Rฯ pXq
ฯ2 dฯdฯ
0
8 ลผ ลผ8
รฟ
หลผ 8
โฯxฯ ,yฯ qฮฯk Fฯ pf ฯฯ
eiฯฯpZq
2
pฮพ ` ฯp2k `
ยด8
โ
ฯ2 dฯdฯ
eiฯฯpZq
ยด8
โ
Rฯ pXq
1qqฮฯk Fฯ pf ฯฯ
ห
Rฯยด1 q
eiฯฯpZq
`
หห
ห
ห
xฯ , yฯ ; ฮพ dฮพ ห
Rฯ pXq
ฯ2 dฯdฯ
0
iฯpXqฮพ
e
2
pฮพ ` ฯp2k `
1qqฮฯk Fฯ pf ฯฯ
ห
Rฯยด1 q
`
ห
ห
Rฯ pXq ยด ฯpXqVฯ ; ฮพ dฮพ ฯ2 dฯdฯ,
RESTRICTION ESTIMATES FOR THE FREE GROUP
7
ห
where หRฯ pXq means that the integral must be computed in xฯ Xฯ `yฯ Yฯ โ Rฯ pXqยดฯpXqVฯ
and vฯ โ ฯpXq.
Replacing in the last integral ฯp2k ` 1q with ฯ we obtain
ลผ8 ลผ8
ลผ รฟ
8
ยด3
p2k ` 1q
eiฯฯpZq{p2k`1q eiฯpXqฮพ pฮพ 2 ` ฯq
Lf pX, Zq โ
ห
ยด8 0
S kโ0
`
ฯ{p2k`1q
ฮk
Fฯ pf ฯฯ{p2k`1q ห Rฯยด1 q Rฯ pXq
ห
ยด ฯpXqVฯ ; ฮพ ฯ2 dฯdฮพdฯ,
from which, setting ยต โ ฮพ 2 ` ฯ and using Fubiniโs theorem, we deduce
ลผ8 ลผ8
ลผ รฟ
8
2
ยด3
p2k ` 1q
eipยตยดฮพ qฯpZq{p2k`1q eiฯpXqฮพ pยต ยด ฮพ 2 q2
Lf pX, Zq โ
ยด8
S kโ0
ฮพ2
`
ห
2
pยตยดฮพ 2 q{p2k`1q
ห ยตฮk
Fฯ pf pยตยดฮพ qฯ{p2k`1q ห Rฯยด1 q Rฯ pXq ยด ฯpXqVฯ ; ฮพ dยตdฮพdฯ
ลผ8 ลผ รฟ
ลผ ?ยต
8
2
โ
ยต
p2k ` 1qยด3 ? eipยตยดฮพ qฯpZq{p2k`1q eiฯpXqฮพ pยต ยด ฮพ 2 q2
ห
ยด ยต
S kโ0
0
2
pยตยดฮพ 2 q{p2k`1q
ฮk
Fฯ pf pยตยดฮพ qฯ{p2k`1q
`
ห
ห Rฯยด1 q Rฯ pXq ยด ฯpXqVฯ ; ฮพ dฮพdฯdยต.
The expression for Lf just derived shows that if we write
ลผ8
f pX, Zq โ Pยต f pX, Zqdยต,
(3.10)
0
where
Pยต f pX, Zq โ
ลผ รฟ
8
p2k ` 1q
ยด3
?
eipยตยดฮพ
2 qฯpZq{p2k`1q
eiฯpXqฮพ pยต ยด ฮพ 2 q2
(3.11)
ยด ยต
S kโ0
pยตยดฮพ 2 q{p2k`1q
ห ฮk
ลผ ?ยต
Fฯ pf pยตยดฮพ
2 qฯ{p2k`1q
then
`
ห
ห Rฯยด1 q Rฯ pXq ยด ฯpXqVฯ ; ฮพ dฮพdฯ,
LPยต f โ ยตPยต f.
Thus, (3.10) provides the spectral resolution of f with respect to L.
4. The restriction theorem
In this section we show that the operators Pยต satisfy some restriction estimates. To
state and prove this result we introduce nonisotropic norms on G defined, for 1 ฤ p, s ฤ 8,
by
หลผ หลผ
ยธ p1
หp
s
}f }Lsz Lpv โ
|f pX, Zq|s dZ
dV
,
v
z
with the obvious modifications when s or p equal 8. We shall prove the following theorem.
Theorem 4.1. Let f be a Schwartz function on G and let 1 ฤ p ฤ 2 and 1 ฤ s ฤ 65 , then
}Pยต f }Lsz 1 L2v ฤ Cยต3p s ยด s1 q`3p p ยด 2 q }f }Lsz Lpv .
1
These estimates are false for s ฤ
65 .
1
1
1
(4.1)
8
VALENTINA CASARINO AND PAOLO CIATTI
Proof. The sharpness of the range of s where the estimates hold may be proved with a
suitable and easy modification of the example provided in [CCi2]. So we prove only the
bound (4.1).
The dependence on ยต in the right hand side of (4.1) is dictated by the homogeneity of
L. Therefore, it suffices to discuss the case ยต โ 1.
To reduce the complexity of the notation and make the formulas more readable we
consider a tensor function f pX, Zq โ ฮฑpZqฮฒpXq, with ฮฑ and ฮฒ Schwartz functions on z
and v. Then (3.11) reduces to
ห
ห
ลผ ลผ1 รฟ
8
p1 ยด ฮพ 2 q2 i p1ยดฮพ2 qฯpZq iฯpXqฮพ
p1 ยด ฮพ 2 qฯ
P1 f pX, Zq โ
ฮฑฬ
e 2k`1 e
3
2k ` 1
S ยด1 kโ0 p2k ` 1q
1ยดฮพ2
2k`1
ห ฮk
`
ห
Fฯ pฮฒ ห Rฯยด1 q Rฯ pXq ยด ฯpXqVฯ ; ฮพ dฮพdฯ,
where ฮฑฬ denotes the Fourier transform of ฮฑ.
Consider another tensor function gpX, Zq โ ฮณpZqฮดpXq, with }ฮณ}Lsz โ 1 and }ฮด}Lqv โ 1,
and compute
ลผ ลผ
xP1 f, gy โ
P1 f pX, ZqgpX, ZqdZdX.
v
z
Then we have
ห
ห
ลผ ลผ หลผ ลผ 1 รฟ
8
p1 ยด ฮพ 2 q2 i p1ยดฮพ2 qฯpZq iฯpXqฮพ
p1 ยด ฮพ 2 qฯ
xP1 f, gy โ
ฮฑฬ
e 2k`1 e
3
2k ` 1
v z
S ยด1 kโ0 p2k ` 1q
ยธ
1ยดฮพ2
`
ห
ห ฮk2k`1 Fฯ pฮฒ ห Rฯยด1 q Rฯ pXq ยด ฯpXqVฯ ; ฮพ dฮพdฯ ฮณpZqฮดpXqdZdX
ห ห
ห
ห
ลผ ลผ1 รฟ
8
p1 ยด ฮพ 2 q2
p1 ยด ฮพ 2 qฯ
p1 ยด ฮพ 2 qฯ
โ
ฮฑฬ
ฮณฬ
3
2k ` 1
2k ` 1
S ยด1 kโ0 p2k ` 1q
หลผ
ยธ
1ยดฮพ2
`
ห
ห
eiฯpXqฮพ ฮk2k`1 Fฯ pฮฒ ห Rฯยด1 q Rฯ pXq ยด ฯpXqVฯ ; ฮพ ฮดpXqdX dฮพdฯ.
v
Changing the variables in the integral over v we obtain (since | det Rฯ | โ 1)
ห ห
ห
ห
ลผ ลผ1 รฟ
8
p1 ยด ฮพ 2 qฯ
p1 ยด ฮพ 2 q2
p1 ยด ฮพ 2 qฯ
ฮณฬ
xP1 f, gy โ
ฮฑฬ
3
2k ` 1
2k ` 1
S ยด1 kโ0 p2k ` 1q
ยธ
หลผ
1ยดฮพ2
`
ห
ห
eivฯ ฮพ ฮk2k`1 Fฯ pฮฒ ห Rฯยด1 q xฯ , yฯ ; ฮพ pฮด ห Rฯยด1 qpxฯ , yฯ , vฯ qdxฯ dyฯ dvฯ dฮพdฯ
v
ห ห
ห
ห
ลผ ลผ1 รฟ
8
p1 ยด ฮพ 2 q2
p1 ยด ฮพ 2 qฯ
p1 ยด ฮพ 2 qฯ
โ
ฮฑฬ
ฮณฬ
3
2k ` 1
2k ` 1
S ยด1 kโ0 p2k ` 1q
หลผ
ยธ
1ยดฮพ2
`
ห
ฮk2k`1 Fฯ pฮฒ ห Rฯยด1 q xฯ , yฯ ; ฮพ Fฯ pฮด ห Rฯยด1 qpxฯ , yฯ ; ฮพqdxฯ dyฯ dฮพdฯ.
ห
vฯ
RESTRICTION ESTIMATES FOR THE FREE GROUP
9
Setting
ฮจpฯ; ฮพ, kq โ
ลผ
vฯ
we write
1ยดฮพ2
`
ห
ฮk2k`1 Fฯ pฮฒ ห Rฯยด1 q xฯ , yฯ ; ฮพ Fฯ pฮด ห Rฯยด1 qpxฯ , yฯ ; ฮพqdxฯ dyฯ ,
(4.2)
ยธ
ห ห
ห
ลผ หลผ ห
8
รฟ
p1 ยด ฮพ 2 q2 1
p1 ยด ฮพ 2 qฯ
p1 ยด ฮพ 2 qฯ
ฮจpฯ; ฮพ, kqdฯ dฮพ.
ฮฑฬ
xP1 f, gy โ
ฮณฬ
p2k ` 1q3 ยด1 S
2k ` 1
2k ` 1
kโ0
Then the Cauchy-Schwarz inequality yields
ลผ1
8
รฟ
1
|xP1 f, gy| ฤ
p1 ยด ฮพ 2 q2 ฮฆpฮพ, kq
3
p2k ` 1q ยด1
kโ0
หลผ ห ห
หห2 ยธ 21 หลผ ห ห
หห2 ยธ 21
2
2
ห
ห
ห
ห
หฮฑฬ p1 ยด ฮพ qฯ ห dฯ
หฮณฬ p1 ยด ฮพ qฯ ห dฯ
ห
dฮพ,
ห
ห
2k ` 1 ห
2k ` 1 ห
S
S
where we set
ฮฆpฮพ, kq โ sup |ฮจpฯ; ฮพ, kq|
(4.3)
ฯPS
to simplify the notation. We remind that according to the Tomas-Stein theorem in R3
the inequality
ห 21
หลผ
1
2
|ฮทฬ prฯq| dฯ
ฤ Cs r ยด3{s }ฮท}Lsz
S
holds for 1 ฤ s ฤ
4
3
and r ฤ
0, where
|xP1 f, gy| ฤ }ฮฑ}Lsz
8
รฟ
1
s
`
1
s1
โ 1. Thus, we obtain (being }ฮณ}Lsz โ 1)
1
kโ0 p2k ` 1q
3ยด s61
ลผ1
6
p1 ยด ฮพ 2 q2ยด s1 ฮฆpฮพ, kqdฮพ.
(4.4)
ยด1
To estimate the integral in the last formula, we remind the definition (4.3) of ฮฆ (see
also (4.2)) and use the Cauchy-Schwarz inequality in the integral on vฯ to obtain
ลผ1
ลผ1
6
2 2ยด s61
ฮฆpฮพ, kqdฮพ ฤ
p1 ยด ฮพ 2 q2ยด s1
p1 ยด ฮพ q
ยด1
ยด1
หลผ
ห
2
1ยดฮพ
ห
ห
`
ห
2k`1
ยด1
ยด1
ห หห ฮk Fฯ pฮฒ ห Rฯ q xฯ , yฯ ; ฮพ Fฯ pฮด ห Rฯ qpxฯ , yฯ ; ฮพqdxฯ dyฯ หห dฮพ
vฯ
ฤ
ลผ1
6
p1 ยด ฮพ 2 q2ยด s1
ยด1
ยธ 12
หลผ ห
ห2
1ยดฮพ2
ห
ห 2k`1
`
ห
ยด1
ห
หฮ
ห k Fฯ pฮฒ ห Rฯ q xฯ , yฯ ; ฮพ ห dxฯ dyฯ
vฯ
ห
หลผ
vฯ
ห
ห
หFฯ pฮด ห Rฯยด1 qpxฯ , yฯ ; ฮพqห2 dxฯ dyฯ
ห1
2
dฮพ.
10
VALENTINA CASARINO AND PAOLO CIATTI
A further application of the Cauchy-Schwarz inequality then implies
ลผ1
6
p1 ยด ฮพ 2 q2ยด s1 ฮฆpฮพ, kqdฮพ
ยด1
ฤ
หลผ
1
12
p1 ยด ฮพ 2q4ยด s1
ยด1
(4.5)
ยธ1
ห2
ลผ ห 1ยดฮพ2
2
ห 2k`1
ห
`
ห
ยด1
หฮ
ห
ห k Fฯ pฮฒ ห Rฯ q xฯ , yฯ ; ฮพ ห dxฯ dyฯ dฮพ
vฯ
ห
หลผ 8 ลผ
ยด8
vฯ
ห
ห
หFฯ pฮด ห Rยด1 qpxฯ , yฯ ; ฮพqห2 dxฯ dyฯ dฮพ
ฯ
ห 12
.
Since the Plancherel theorem applied to Fฯ yields
ลผ8 ลผ
ลผ ลผ8
ห
ห
ห
ห2
ยด1
หpฮด ห Rฯยด1 qpxฯ , yฯ , vฯ qห2 dxฯ dyฯ dvฯ
หFฯ pฮด ห Rฯ qpxฯ , yฯ ; ฮพqห dฮพdxฯ dyฯ โ
vฯ
ยด8
ยด8
vฯ
โ }ฮด}L2v โ 1,
(being | det Rฯ | โ 1), (4.5) reduces to
ลผ1
6
p1 ยด ฮพ 2 q2ยด s1 ฮฆpฮพ, kqdฮพ
ยด1
ฤ
หลผ
1
p1 ยด ฮพ 2 q
4ยด 12
s1
ยด1
ลผ
vฯ
(4.6)
ยธ1
ห 1ยดฮพ2
ห2
2
ห 2k`1
ห
`
ห
ยด1
หฮ
ห
.
ห k Fฯ pฮฒ ห Rฯ q xฯ , yฯ ; ฮพ ห dxฯ dyฯ dฮพ
Then in force of the Koch-Ricci estimates (3.6) we deduce from (4.6) that
ลผ1
1
1
1
6
p1 ยด ฮพ 2 q2ยด s1 ฮฆpฮพ, kqdฮพ ฤ C p2k ` 1qฮณ p p qยดp p ยด 2 q
ยด1
ห
หลผ
1
p1 ยด ฮพ 2 q
p
4ยด 12
`2 p1 ยด 12
s1
ยด1
q
หลผ
vฯ
ห
`
หห
หFฯ pฮฒ ห Rยด1 q xฯ , yฯ ; ฮพ หp dxฯ dyฯ
ฯ
ห2
p
dฮพ
(4.7)
ยธ 21
.
Applying the Hรถlder inequality in (4.7) to the integration in ฮพ with exponents p1 {2 and
p {pp1 ยด 2q โ p{p2 ยด pq, we deduce that
ลผ1
6
p1 ยด ฮพ 2 q2ยด s1 ฮฆpฮพ, kqdฮพ
1
ยด1
ฤ C p2k ` 1q
ฮณ p p1 qยดp p1 ยด 12 q
หลผ 1
4p
3
p1 ยด ฮพ qp1ยด s1 q 2ยดp `1 dฮพ
2
ยด1
ห p1 ยด 21
ห 11
ยจ
p
ห pp1
ลผ 8 หลผ
ห
`
หหp
ยด1
หFฯ pฮฒ ห R q xฯ , yฯ ; ฮพ ห dxฯ dyฯ
dฮพ โ .
หห
ฯ
ยด8
vฯ
The first integral is finite since s1 ฤ 4, which implies that
ห
ห
3
2
4p
1ยด 1
`1ฤ
ฤ
0.
s 2ยดp
2ยดp
RESTRICTION ESTIMATES FOR THE FREE GROUP
11
Therefore, we have
ลผ1
6
p1 ยด ฮพ 2 q2ยด s1 ฮฆpฮพ, kqdฮพ
ยด1
ยจ
ลผ 8 หลผ
ฮณ p p1 qยดp 1p ยด 21 q ห
ฤ C p2k ` 1q
ยด8
vฯ
ห
`
หห
หFฯ pฮฒ ห Rฯยด1 q xฯ , yฯ ; ฮพ หp dxฯ dyฯ
ห pp1
ห 11
p
dฮพ โ .
Now, being p1 {p ฤ 1, we may use the Minkowski integral inequality, which gives
ลผ1
6
p1 ยด ฮพ 2 q2ยด s1 ฮฆpฮพ, kqdฮพ
ยด1
ฤ C p2k ` 1q
ฮณ p p1 qยดp p1 ยด 12 q
หลผ หลผ
8
ยด8
vฯ
ห
`
หห 1
หFฯ pฮฒ ห Rยด1 q xฯ , yฯ ; ฮพ หp dฮพ
ฯ
ห p1
p
dxฯ dyฯ
ยธ p1
.
Then we apply the Hausdorff-Young inequality in the inner integral to Fฯ and replace the
coordinates xฯ , yฯ , vฯ with x, y, v,
ลผ1
6
p1 ยด ฮพ 2 q2ยด s1 ฮฆpฮพ, kqdฮพ
ยด1
ฤ C p2k ` 1q
ฮณ p p1 qยดp p1 ยด 12 q
หลผ หลผ 8
ยด8
vฯ
ฤ C p2k ` 1q
ฮณ p p1 qยดp p1 ยด 12 q
deducing that
ลผ1
ยด1
หลผ
v
ห
ห 1p
ห
ห
`
หpฮฒ ห Rยด1 q xฯ , yฯ , vฯ qหp dvฯ dxฯ dyฯ
ฯ
ห `
ห
หฮฒ x, y, vqหp dxdydv
ห p1
,
p1 ยด ฮพ 2q2ยด s1 ฮฆpฮพ, kqdฮพ ฤ C p2k ` 1qฮณ p p qยดp p ยด 2 q }ฮฒ}Lpv .
1
6
1
1
(4.8)
Finally, plugging (4.8) in (4.4) we obtain
|xP1 f, gy| ฤ C}ฮฑ} }ฮฒ}
Lsz
Lpv
8
รฟ
p2k ` 1q s1 ยด3`ฮณ p p qยดp p ยด 2 q
6
1
1
1
(4.9)
kโ0
ฤ C}ฮฑ}Lsz }ฮฒ}Lpv โ C}f }Lsz Lpv .
The series in fact converges for 1 ฤ s ฤ 4{3 and 1 ฤ p ฤ 2 since by (3.7), when 1 ฤ p ฤ 56 ,
we have
ห
ห ห ห
1 1
6
1
ยด
ฤ ยด2
ยด3`ฮณ
ยด
s1
p
p 2
and, when
6
5
ฤ p ฤ 2,
6
ยด3`ฮณ
s1
ห
ห ห ห
3
1 1
1
ยด
ฤยด .
ยด
p
p 2
2
From (4.9) the estimate asserted in the statement follows by duality, proving the theorem.
12
VALENTINA CASARINO AND PAOLO CIATTI
References
[ACDS]
[C1]
[C2]
[CCi1]
[CCi2]
[CCi3]
[CCi4]
[KR]
[MMรผ]
[Mรผ]
[So1]
[So2]
[Str]
[Th]
F. Astengo, M. Cowling, B. Di Blasio, M. Sundari, Hardyโs uncertainty principle on certain
Lie groups, J. London Math. Soc. (2), 62 (2000), no. 2, 461โ472.
V. Casarino, Norms of complex harmonic projection operators, Canad. J. Math., 55 (2003),
no. 6, 1134โ1154.
V. Casarino, Two-parameter estimates for joint spectral projections on complex spheres, Math.
Z., 261 (2009), no. 2, 245โ259.
V. Casarino and P. Ciatti, Transferring Lp eigenfunction bounds from S 2n`1 to hn , Studia
Math., 194 (2009), no. 1, 23โ42.
V. Casarino and P. Ciatti, A Restriction Theorem for Mรฉtivier Groups, Advances in Mathematics, 245 (2013), 52โ77.
V. Casarino and P. Ciatti, Restriction estimates for the full Laplacian on Mรฉtivier Groups,
Rend. Lincei Mat. Appl. 24 (2013), 165โ179.
V. Casarino and P. Ciatti, Lp Joint Eigenfunction Bounds on Quaternionic
Spheres, J. Fourier Anal. Appl., electronically published on 14 October 2016, DOI:
http://dx.doi.org/10.1007/s00041-016-9506-6 (to appear in print).
H. Koch and F. Ricci, Spectral projections for the twisted Laplacian, Studia Math. 180 (2007),
no. 2, 10โ110.
A. Martini and D. Mรผller, Lp spectral multipliers on the free group N3,2 , Studia Math. 217
(2013), no. 1, 41โ55.
D. Mรผller, A restriction theorem for the Heisenberg group, Ann. of Math. (2), 131 (1990), no.
3, 567โ587.
C. Sogge, Oscillatory integrals and spherical harmonics, Duke Math. J. (2), 53 (1986), no. 1,
43โ65.
C. Sogge, Concerning the Lp norm of spectral clusters for second-order elliptic operators on
compact manifolds, J. Funct. Anal., 77 (1988), no. 1, 123โ138.
R. Strichartz, Harmonic analysis as spectral theory of Laplacians, J. Funct. Anal., 87 (1989),
no.1, 51โ148.
S. Thangavelu, Harmonic Analysis on the Heisenberg Group, Progress in Mathematics, Vol.
159, Birkhรคuser Boston Inc., Boston, MA, 1998.
Universitร degli Studi di Padova, Stradella san Nicola 3, I-36100 Vicenza, Italy
E-mail address: [email protected]
Universitร degli Studi di Padova, Via Marzolo 9, I-35100 Padova, Italy
E-mail address: [email protected]
| 4math.GR
|
arXiv:1606.03809v3 [cs.PL] 29 Dec 2017
Why Nominal-Typing Matters
in Object-Oriented Programming
Moez A. AbdelGawad
College of Mathematics and Econometrics, Hunan University
Changsha 410082, Hunan, P.R. China
Informatics Research Institute, SRTA-City
New Borg ElArab, Alexandria, Egypt
[email protected]
January 1, 2018
Abstract
type systems. Recently, a domain-theoretic model of
nominally-typed OOP was compared to well-known
models of structurally-typed OOP. Combined, these
comparisons provide both a clear technical account
and a deep mathematical account of the relation between nominal and structural OO type systems that
have not been presented before, and they help demonstrate the key value of nominal typing and nominal
subtyping to OO developers and language designers.
We believe a clearer understanding of the key semantic advantage of pure nominal OO typing over
pure structural OO typing can help remedy the existing schism. We believe future foundational OO
PL research, to further its relevance to mainstream
OOP, should be based less on structural models of
OOP and more on nominal ones instead.
The statements โinheritance is not subtypingโ and
โmainstream OO languages unnecessarily place restrictions over inheritanceโ have rippled as mantras
through the PL research community for years. Many
mainstream OO developers and OO language designers, however, do not accept these statements. In
nominally-typed OO languages that these developers
and language designers are dearly familiar with, inheritance simply is subtyping; and they believe OO
type inheritance is an inherently nominal notion, not
a structural one.
Nominally-typed OO languages, such as Java, C#,
C++, and Scala, are among the most used programming languages today. However, the value of nominal
typing to mainstream OO developers, as a means for
designing robust OO software, seems to be in wait for
full appreciation among PL researchersโthereby perpetuating an unnecessary schism between many OO
developers and language designers and many OO PL
researchers, with each side discounting, if not even
disregarding, the views of the other.
In this essay we strengthen and complement earlier
efforts to demonstrate the semantic value of nominal typing by presenting a technical comparison between nominal OO type systems and structural OO
1
Introduction
In 1990, Cook et al. shocked the programming languages (PL) research community by declaring that,
in object-oriented programming, โinheritance is not
subtyping,โ meaning there is no one-to-one correspondence between type inheritance and subtyping
in OO programming languages, further adding that
mainstream OO languages unnecessarily โplace re1
strictions over inheritance.โ Over the years, these
statements rippled, as mantras, through the PL research community.
To this day, however, many mainstream OO developers and OO language designers cannot digest or
accept not identifying type inheritance with subtyping. Simply, the statement of Cook et al. is not true
in nominally-typed OO languages that these developers and language designers are dearly familiar with.
Further, they see that the so-called โrestrictionโ of
type inheritance in nominally-typed OO languages is
strongly justified, or, more so, that a structural view
of inheritance is in fact an unjustified redefinition of
type inheritance, which they view as an inherently
nominal notion.
Nominally-typed OO languages are among the
top most-used programming languages today. Examples of nominally-typed OO languages include
many industrial-strength mainstream OO programming languages such as Java [44], C# [1], C++ [2],
and Scala [61]. Nominally-typed OO languages have
remained among the top most-used programming
languages for over a decade [14, 5]. And, even by the
most conservative measures, these languages are expected to remain among the top most-used OO programming languages in the near future, if not the far
one, too.
In spite of this, the value of nominal typing and
nominal subtyping to mainstream OO developers, as
a means for designing robust OO software that can
be readily understood and maintained, as well as the
value of properties of OO type systems that depend
on nominality to them (such as the identification of
type inheritance with subtyping), seem to be not yet
fully appreciated among OO PL researchers. This
has led to a continuing tension and schism between
two large and significant communities: many mainstream OO developers and OO language designers, on
one side, and many OO PL researchers, on the other
side, with each of both sides discounting, and even
disregarding, the views and opinions of the other.
In nominally-typed (a.k.a., nominatively-typed)
OO languages, objects and their types are nominal, meaning that objects and their types carry class
names information as part of the meaning of objects
and of the meaning of their types. Class namesโ
and interface names and trait names in OO languages
that support these notionsโare used as type names
in nominally-typed OO languages. Classโand interface and traitโbehavioral contracts, typically written informally in code documentation comments, are
specifications of the behavioral design intentions of
OO software developers. In nominally-typed OOP, a
reference to a class (or interface or trait) name is invariably considered a reference to the associated contract too. Given this association of type names to
corresponding behavioral contracts, nominal typing
allows associating types of objects with (formal or informal) behavioral contracts.
By using type names in their code, OO developers using nominally-typed OO languages have a simple way to refer to the corresponding contractsโ
referring to them as richer specifications of object
state and behavior that can be checked statically and
that can be used during runtime. This readily access
to richer object specificationsโwhich cannot be expressed in a natural way using non-nominal (a.k.a.,
structural) record types that, by definition, include
no class names informationโmakes nominally typed
OO languages closer to being semantically typed languages than structurally typed OO languages are.
The first mathematical models of OOP to gain
widespread recognition among programming languages (PL) researchers were developed while OOP
was making its first steps into mainstream computer
programming. (See Section 2.) These early models
were structural models of OOP. As the developers
of these models themselves (e.g., Cardelli) explained,
this was due to influence from functional programming research extant at that time. These models of
OOP, thus, reflected a view of OOP that does not
include class names information.
Being structural, objects were viewed in these models simply as being records (of functions). Object
types, in accordance, were viewed as record types,
where the type of an object only specifies the structure of the object, meaning that object types carry
information only on the names of the members of objects (i.e., fields and methods) and, inductively, on
the (structural) types of those members. Examples
of structurally-typed OO languages include lesserknown languages such as OโCaml [48], Modula-3 [27],
2
Moby [39], PolyTOIL [21], and Strongtalk [19].1 In
pure structurally-typed OO languages, class names
information (also called nominal information) is not
used as part of the identity of objects and their types,
neither during static type checking nor at runtime.
Accordingly, nominal information is missing in structural mathematical models of OOP.
The main practical advantage of structural typing
over nominal typing in OO languages seems to be
their โflexibility,โ i.e., the ability in a structurallytyped OO language to have supertypes get defined
โafter the factโ (i.e., after their subtypes are already
defined). In light of mainstream OO developers of
statically-typed OO languages not adopting structural typing, the โinflexibilityโ of nominally-typed
OO languages seems not to be enough justification for
wider use of structural typing, particularly in light of
the advantages of nominal typing we discuss in this
essay.
We attempt thus in this essay to further close
the gap that exists between programming language
researchers who maintain a structurally-typed view
of OOP (and who believe in conclusions based on
this view, such as inheritance and subtyping not being in one-to-one correspondence) and mainstream
OO software developers and OO language designers who maintain a nominally-typed view of OO
software (and who, accordingly, reject conclusions
based on the structural view) by giving a precise
technical account of the relation between nominal
and structural OO type systems. The essay complements the recent mathematical comparison of a
nominal domain-theoretic model of OOP to structural domain-theoretic models of OOP.
This essay is structured as follows. First, in Section 2 we give some details on the history of modeling
OOP, particularly details relevant to realizing differences between nominal typing and structural typing
and to the development of nominal and structural
models of OOP.
Given that structural typing, more or less, is understood well among PL researchers, in Section 3 we directly demonstrate the value of behavioral contracts
and nominal typing in mainstream nominally-typed
OO languages using a comparison, followed by a discussion of the comparison. In Section 3.1 we first
discuss, in some detail, the value of contracts and
the value of identifying inheritance with subtyping in
mainstream OO software design. Then, using code
examples, in Section 3.2 and Section 3.3 we compare
nominally-typed OO type systems and structurallytyped ones to more vividly illustrate the main technical differences between them. We then conclude in
Section 3.4 by discussing the nominal and structural
views of type names and of recursive-types, and the
importance of recursive types in mainstream OOP.
We conclude the essay by summarizing our findings, and making some final remarks, in Section 4.
2
Related Work
Even though object-oriented programming emerged
in the 1960s, and got mature and well-established
in mainstream software development in the 1980s,
the differences between nominally-typed and
structurally-typed OO programming languages
started getting discussed by PL researchers only
in the 1990s [53, 65, 68]. In spite of an early hint
by Cardelli (see below), the value of investigating
nominal typing and nominal subtyping and their
value to OO developers was not appreciated much
howeverโthat is, until about a decade later, around
the year 2000.
In the eighties, while mainstream OOP was in its
early days, Cardelli built the first denotational model
of OOP [24, 25]. Cardelliโs work was pioneering, and
naturally, given the research on modeling functional
programming extant at that time (which Cardelli
heavily referred to and relied on), the model Cardelli
constructed was a structural denotational model of
OOP.2
1 A discussion of statically-typed versus dynamically-typed
OO languages (including the non-well-defined so-called โducktypingโ), and the merits and demerits of each, is beyond the
scope of this essay. The interested reader should check [56]. In
this essay, we focus on nominal and structural statically-typed
OO languages.
2 Quite significantly, Cardelli in fact also hinted at looking
for investigating nominal typing [26, p.2]. Sadly, Cardelliโs hint
went largely ignored for years, and structural typing was rather
assumed superior to nominal typing instead, particularly after
3
In the late eighties/early nineties, Cook and his colleagues worked to improve on Cardelliโs model. Unlike Cardelli, Cook et al. emphasized in their work
the importance of self-references in OOP, at the value
level and at the type level. Their research led them to
break the identification of type/interface inheritance
with subtyping [32, 35, 34].3
In 1994, Bruce and others presented a discussion of
the problem of binary methods in OOP [22] (a โbinary methodโ is a method that takes a parameter
or more of the same type as the class the method
is declared in4 ). Later, Bruce and Simons promoted
the structural view of OOP and conclusions based on
it in a number of publications (e.g., [23] and [66]),
in spite of the disagreement between these conclusions and the fundamental intuitions of a significant
portion of mainstream OO developers and language
designers [28].
Under the pressure of this disagreement, some PL
researchers then started in the late nineties/early
2000s stressing the significance of the differences between nominally-typed OOP and structurally-typed
OOP, and they started acknowledging the practical
value of nominal typing and nominal subtyping [63].
Accordingly some attempts were made to develop OO
languages with complex type systems that are both
nominally- and structurally-typed [38, 62, 42, 54, 55,
61, 4]. However, in the eyes of mainstream OO developers, these โhybridโ languages have more complex
type systems than those of languages that are either
simply purely nominally-typed or purely structurallytyped. This more complexity typically results in
lesser productivity for developers who attempt to use
both of the typing approaches in their software (see
also discussion at the end of Section 3.4).
As to operational models of OOP, Abadi and
Cardelli were the first to present such a model [6,
7]. Again, their model had a structural view of
OOP. However, operational models of nominallytyped OOP got later developed. In their seminal
work, Igarashi, Pierce, and Wadler presented Featherweight Java (FJ) [45] as an operational model
of a nominally-typed OO language. Even though
FJ is not the first operational model of nominallytyped OOP (see [36], [60] and [40, 41], for example), FJ is the most widely known operational model
of (a tiny core subset of) a nominally-typed mainstream OO language, namely Java. The development
of FJ and other operational models of nominallytyped OOP motivated the construction of NOOP as
the first domain-theoretic model of nominally-typed
OOP [8, 10].5
Given the different basis for deriving data structuring in functional programming (based on standard branches of mathematics) and in object-oriented
programming (based on biology and taxonomy6),
5 Featherweight Java [45] offers a very clear operational semantics for a tiny nominally-typed OO language. It is worth
mentioning that domain-theoretic models of nominally-typed
OO languages, as more foundational models that have fewer
assumptions than operational ones, provide a denotational
justification for the inclusion of nominal information in FJ.
The inclusion of nominal information in NOOP was crucial
for proving the identification of inheritance with subtyping in
nominally-typed OOP [8, 10]. In FJ [45], the identification
of inheritance with subtyping was taken as an assumption
rather than being proven as a consequence of nominality. Also,
domain-theoretic models such as NOOP allows discussing issues of OOP such as type names, โself-typesโ and binary methods on a more foundational level than provided by operational
models of OOP such as FJ. The more abstract description of
denotational models results in a conceptually clearer understanding of the programming notions described as well as the
relations between them.
(It is also worth mentioning that NOOP was developed,
partially, in response to the technical challenge Pierce presented in his LICSโ03 lecture [64] in which Pierce looked for the
precise relation between structural and nominal OO type systems, notably after the development of FJ was concluded, implying that the question about the relation remained an open
question after the development of FJ. As to their purpose, it
is customary that denotational models and operational ones
play complementary roles, where denotational models are usually of more interest to programming language designers, while
operational ones are usually of more interest to programming
language implementers.)
6 Which is a fact that seemingly is nowadays forgotten by
some PL researchers but that Cardelli explicitly mentions
in [24, 25].
the publication of Cook et al.โs and Bruce et al.โs work as we
later discuss.
3 A discussion of Cardelliโs model and of Cookโs model and
a comparison of NOOP, a nominal domain-theoretic model
of OOP [8, 10], versus the structural models of Cardelli and
Cook is presented in [11, 13].
4 See our later discussion of โfalse/spurious binary
methodsโโmethods that are mistakenly identified by structural OO type systems as being binary methods but their semantics are not those of true binary methods.
4
we uncover a third so-far-unrecognized problem in
pure structurally-typed OO languages that we call
the problem of โspurious binary methods.โ
We then conclude our demonstration of the value
of nominal typing by discussing, in some depth, the
nominal and structural views of type names and
of recursive-types, and the importance of recursive
types in mainstream OOP in Section 3.4.
The discussions and comparisons in this section
demonstrate that nominal typing in nominally-typed
OO programming languages causes typing and subtyping in these languages to be closer to semantic
typing and subtyping, respectively, because of the association of nominal information with class contracts.
This closeness to semantic typing, the simplicity of
the resulting software design mental model, and the
importance of recursive types to mainstream OO developers and OO language designers help explain the
practical value of nominal typing to mainstream OO
developers and OO language designers.
some PL researchers have also expressed dissatisfaction with assuming that the views of programming
based on researching functional programming (including a view that assumes structural typing) may
apply, without qualifications, to object-oriented programming. In addition to Pierce and other earlier
and later researchers pointing out the importance
of distinguishing between nominal typing and structural typing, MacQueen [51], for example, also noted
many mismatches between Standard ML (a popular functional programming language [59]) and classbased OO languages such as Java and C++. Later,
Cook [33] also pointed out differences between objects of OOP and abstract data types (ADTs) that
are common in functional programming.
These research results run in a similar vein as ours
since they somewhat also point to some mismatches
between the theory and practice of programming
languagesโtheory being more mathematics-based,
functional, and structurally-typed, and practice being more biology/taxonomy-based, object-oriented,
and nominally-typed.
3
3.1
Nominally-Typed OOP versus Structurally-Typed OOP
Contracts, Nominality and The
Liskov Substitution Principle
(LSP)
Contracts are widely-used notions in mainstream OO
software development. A contract in an OO program is similar to a contract in the real world: It
specifies what an object expects of client objects and
what client objects can expect of it. Members of an
objectโi.e., its fields and methodsโand properties
of these members form the objectโs interface with the
outside world; the buttons on the front of a television
set, for example, are the interface between us and the
electrical wiring on the other side of the TVโs plastic
casing. One presses the โpowerโ button and he or
she are promised this will turn the television on and
off. In its most common form, an interface is a group
of related methods together with a contract giving
promises on the behavior of these methods. Similarly, a class contract is an agreement that instances
of the class will expose (present as their public interface, or API) certain methods, certain properties,
and certain behaviors.
In this section we first informally and less-technically,
discuss the importance of contracts, and of nominal
typing and nominal subtyping to mainstream OO developers in Section 3.1โbriefly discussing DbC (Design by Contract) in the process, then we discuss how
LSP (Liskovโs Substitution Principle) expresses the
importance of preserving contracts upon inheritance.
In Section 3.2 and Section 3.3, we then present
code examples that illustrate how nominally-typed
OOP and structurally-typed OOP compare to each
other from a technical point of view, and illustrate
how structural typing and structural subtyping sometimes force the breaking of contracts. In the comparison we discuss two key problems with structural OO
type systems, namely, โspurious subsumption,โ and
its converse, โmissing subsumption.โ7 In Section 3.3.1,
7 A technical overview of main OO typing notions that explains some of the technical jargon used in this essay is pre-
sented in [9].
5
Provider
Client
Contract Examples Examples of contracts in OO
software are plenty. Examples familiar to most Java
developers, for example, include the contract of the
Comparable interface promising its clients a total
ordering on its elements and requiring that classes
that implement the interface adhere to this promise,
and the contract of class Object promising that the
equals() method and the hashCode() method are
in agreement and requiring subclasses that override
one of the two methods to override the other method
accordingly.
Also in Java, class JComponent contains a default implementation of all of the methods in the
Accessible interface, but JComponent is not actually declared to implement the interface, because
the contract associated with Accessible is not satisfied by the default implementation provided in
JComponent. This example stresses the association of
inherited contracts with superclass names. In mainstream OO software, if a class extends another class
or implements an interface it is declaring that it inherits the contract associated with the superclass or
superinterface and will maintain it. Likewise, if a
class does not maintain the contract associated with
another class or interface it does not declare itself as
extending or implementing the class or interface. We
discuss this point further in Section 3.1.1.
Other examples of contracts may also include a
class that implements tree layout algorithms. The
contract of such a class may require the input graph
to be a tree, and may promise as result, if the input
is a tree, to produce a layout that has no overlapping
nodes, edges or labels.
In general, contracts, whether written formally or
informally, usually contain the following pieces of
information: side effects, preconditions, postconditions, invariants, and, sometimes, even performance
guarantees. In Java, class contracts, as a set of
requirements and promises, are usually stated in
Javadoc comments. Requirements of a contract are
simply any conditions on the use of the class, for example: conditions on argument values, conditions on
the order of execution of methods, conditions on execution in a multi-threaded or parallel environment.
Two further, rather artificial, examples for contracts, that we will expound on below to show the dif-
Benefit
(4) Output guaranteed to
comply to postconditions
(no need to check output)
(2) Input guaranteed to
comply to preconditions
(no need to check input)
Obligation
(1) Satisfy
preconditions
(3) Satisfy
postconditions
Table 1: Design By Contract (DbC): Benefits and
Obligations [Source: [46]]
ferences between nominal typing and structural typing, are the promise that an animal can play with any
another animal, and the promise that a (mathematical) set contains no repeated elements. In particular,
we use these two examples to show how structural
subtyping can lead to breaking contracts associated
with classes/interfaces/traits.
From the presented examples, it is easy to see
that a contract is made of two parts: requirements
upon the caller (โthe clientโ) made by the class (โthe
providerโ) and promises made by the class to the
caller. If the caller fulfills the requirements, then the
class promises to deliver some well-defined service.
Requirements may be enforced by throwing checked
or unchecked exceptions when the stated conditions
are violated. Promises can be enforced by assertions
at the end of a method.
Further, according to proponents of โDesign By
Contractโ (DbC), classes of a software system communicate with one another on the basis of precisely
defined benefits and obligations [57, 58]. If preconditions are not obeyed by the client of the class method,
the service provider will deny its service. If any
postcondition or invariant is violated, it uncovers a
problem on the service provider side [46]. As such,
the benefits and obligations of clients and providers,
along with their relative chronological order, can be
summarized as in Table 1.
Nominally-Typed OOP Moving on from DbC to
the design of mainstream OO type systems, OO languages should ideally include behavioral contracts in
object types. Motivated by DbC, contracts are used
6
Provider
Client
by mainstream OO developers for constructing robust, reliable, reusable and maintainable OO software, since contracts promise specified properties of
objects. For example, in his widely-known book titled โEffective Javaโ [16, 17], Joshua Bloch reflects
on the use of contracts in mainstream OOP and asserts the value of contracts to OO software design by
writing that,
โNo class is an island. Instances of one
class are frequently passed to another. Many
classes depend on the objects passed to them
obeying the contracts associated with their
superclasses ... once youโve violated the contract, you simply donโt know how other objects will behave when confronted with your
object.โ
Obligation
(1) Satisfy contract requirements
(3) Satisfy contract promises
Table 2: Contracts in Nominally-Typed OOP: Benefits and Obligations
world. In a statically-typed language the tractable
component of the contract is enforced at build time
by the compiler. In Java, for example, if a class claims
to implement an interface, all methods defined by
that interface must appear in its source code before
the class will successfully compile, and during run
time it is assumed the promises given by the interface
are maintained by the class. The same happens if a
class claims to extend another class, or if an interface
claims to extend another interface. This inheritance
of requirements and promises is sometimes referred
to as interface inheritance, contract inheritance, or
type inheritance.8
While using inheritance, it may be necessary to
make changes to a superclass contract. Some changes
to a specification/contract will break the caller, and
some will not. For determining if a change will break
a caller, professional OO developers use the memorable phrase โrequire no more, promise no lessโ: if
the new specification does not require more from the
caller than before, and if it does not promise to de-
In practice however, the inclusion of behavioral
contracts in object types is too much to ask of a type
checker (because of the general problem of not being
able to statically check contracts, since behavioral
contracts are remarkably expressive). The solution
OO language designers choose is to go with an approximation. The association of class names with
contracts, and OO type systems respecting nominal
information in typing and subtyping decisions, allows
a nominally-typed OO type system to be a tractable
approximation of DbC; hence, OO language designers
of many mainstream OO languages use nominal typing. Nominally-typed OO languages typically do not
require the enforcement of requirements and promises
of contracts; requirements and promises are rather assumed to hold, thereby encouraging but not requiring
developers to enforce the contracts. To accurately reflect how contracts are used in nominally-typed OOP,
Table 1 can as such be modified into Table 2.
3.1.1
Benefit
(4) Output assumed to
comply to contract
promises (no need to
check output)
(2) Input assumed to
comply to contract
requirements (no need
to check input)
8 According to [67], โProgrammers employ inheritance for a
number of different purposes: to provide subtyping, to reuse
code, to allow subclasses to customise superclassesโ behaviour,
or just to categorise objectsโ. Inheritance as only being โa
method by which classes share implementationsโ (i.e., it being a โcode sharing/code reuseโ technique), is a very limited
notion of inheritance that, unfortunately, is still entertained
by some OO PL researchers. Code sharing is only a part of
the fuller picture of OO inheritance, and is only a means towards the higher goal of classes sharing their contracts (and
even their architectures [37, 14]), not just their code. Inheritance as โcontract sharingโ is the notion of inheritance that we
are generally interested in and discuss in this essay.
Inheritance, Subsumption and Contract Preservation
As to the inheritance of contracts in mainstream
OOP, implementing an interface, for example, allows
a class in an OO program to become more formal
about the behavior it promises to provide. Interfaces form a contract between a class and the outside
7
liver less than before, then the new specification is
compatible with the old, and will not break the caller.
Bloch [16, 17], hinting at the conventional wisdom among mainstream OO developers that identifies type inheritance with subtyping, proceeds to
conclude, based on his earlier observations about contracts, that
programming. Whenever these principles are violated, a program becomes more difficult to understand and to maintain. (For example, after his discussion of contracts Bloch then gives examples demonstrating problems, in the Java libraries which Bloch
himself coauthored, that resulted from violating these
principles [16, 17].)
Based on the discussion of contracts and inheritance, two clear OO design principles among professional mainstream OO developers are:
โinheritance [of contracts] is appropriate
only in circumstances where the subclass really is a subtype of the superclass.โ
1. Whenever the contract of a class/interface/trait
is obeyed by an inheriting class (i.e., whenever we have type inheritance) we should have
subsumption between corresponding class types
(i.e., we should have subtyping), and, conversely,
As such, Bloch concludes that
โit is the responsibility of any subclass
overriding the methods of a superclass to
obey their general contracts; failure to do so
will prevent other classes that depend on the
contracts from functioning properly in conjunction with the subclass.โ
2. Whenever we have subsumption between two
class types (i.e., whenever we have subtyping)
the contracts (of the superclass type) should be
obeyed by the subclass type (i.e., we should have
type inheritance).
The requirement that subclasses maintain the contracts of their superclasses is expressed among professional OO developers by stating that well-designed
OO software should obey the Liskov substitution
principle (LSP) [49, 50]. According to Bloch [16, 17],
Given the importance of the LSP (as expressing the
preservation of contracts upon inheritance) to mainstream OO developers, and given that contracts are
typically specifications of object behavior, it is easy
to conclude that basing typing on contracts so as to
make typing and subtyping closer to behavioral typing and behavioral subtyping (sometimes also called
โsemantic typingโ and โsemantic subtypingโ) is a desirable property of an OO language.
To further illustrate the importance of identifying
inheritance with subtyping to OO software developers, in the following two sections we present code examples that point out two problems with structural
subtyping that do not exist in nominally-typed OOP.
The first problem is what is sometimes called the
problem of โspurious subsumptionโ ([63, p.253]), and
the second is the problem of inheritance not implying subtyping (which we call โmissing subsumptionโ),
i.e., that inheritance between two classes does not
imply subsumption between the two corresponding
class types (the converse of the spurious subsumption problem.)10
โThe LSP says that any important property of a type should also hold for its subtypes, so that any method written for the
type should work equally well on its subtypes [49, 50]โ.9
As such, as demonstrated by Bloch, it is common
knowledge among professional mainstream OO developers that subsumption (as expressed by the LSP)
and the identification of inheritance with subsumption (i.e., subtyping between object types) are an integral part of the mental model of object-oriented
9 The LSP is the third of the five OO design principles (the
L in โSOLIDโ) mainstream OO developers follow to design robust OO software. In the jargon of OO developers, OO code
โsmellsโ (in particular, it has a โrefused bequestโ) if some class
in the code does not obey LSP, i.e., if a derived classโthat is,
a subclassโin the code breaks the contract of one of its base
classes-โthat is, of one of its superclasses. The LSP thus expresses that class contracts are preserved by inheriting classes.
10 The code examples can be skipped by a reader familiar
with these two problems.
8
In the spurious subsumption problem, we have two
classes whose instances do not maintain the same
contract but are considered subtypes according to
structural subtyping rules, demonstrating an example of structural subtyping breaking LSP. In the missing subsumption problem, we have two classes whose
instances do maintain the same behavioral contract
but that are not considered subtypes in a structural
type system, due to structural type systems rebinding
self-types upon inheritance, demonstrating an example of structural subtyping thus breaking the identification between inheritance and subtyping.
Further, due to pure structural OO type systems
always requiring the rebinding of self-types upon inheritance, we also point out a so-far-unknown problem with pure structural subtyping that we call the
problem of โspurious binary methods.โ
We note in the code for class Set and class MultiSet
that the two classes support precisely the same set
of four operations on their instances having the same
signatures for these four operations. The different
contracts associated with the two classes, specifying
that the semantics and run-time behavior of their instances should agree with the corresponding mathematical notions, are reflected only in the different
class names of the two classes but not in the structure of the two classes.
Given that nominally-typed OOP respects class
names (and thus the associated class contracts) while
structurally-typed OOP ignores them, we have the final assignment in
3.2
correctly disallowed in nominally-typed OOP, but is
wrongly allowed in structurally-typed OOP. The assignment is not allowed in nominally-typed OOP because class MultiSet does not inherit from class Set,
while it is allowed in structurally-typed OOP because
of matching signatures of all operations supported
by the two classes. The assignment should not be
allowed because, if allowed (as demonstrated in the
code above), it will allow repetition of a setโs elements
in the value bound to variable s by the assignment
(given that it is an instance of MultiSet). Variable
s, by its declaration, is assumed to be a Set (with no
repeated elements), and the assignment, if allowed,
will thus break the contract of class Set associated
with variable s.
The problem of spurious subsumption is similar
to the problem of accidentally mistaking values of a
datatype for those of another datatype (think of using
floats for modeling euros and dollars then mistaking
euros for dollars or mistaking floats for either [63].)
Similarly, OO software developers think of an object
in the context of its class hierarchy and of the contracts associated with its class members. A key prescript of nominally-typed OOP is that class contracts
are inherited along with class members and should
be maintained by instances of inheriting subclasses.
Spurious subsumption in structurally-typed OOP al-
MultiSet m = new MultiSet ();
m . insert (2);
m . insert (2);
Set s = m ; // Allow assignment ?
Spurious Subsumption
In structurally-typed OOP, subtyping does not imply
inheritance, that is, we may have subtyping between
types corresponding to two classes (instances of one
can be used as that of the other) but not have an
inheritance relation between these two classes. To
illustrate, let us assume the following definitions for
class Set and class MultiSet (where the contract of
class Set disallows repetition of elements of a Set, in
agreement with the mathematical definition of sets,
whereas the contract of class MultiSet allows repetition of elements of a MultiSet, in agreement with
the mathematical definition of multisets, sometimes
also called bags),
class Set {
Boolean equals ( Object s ) { ... }
Void insert ( Object o ) { ... }
Void remove ( Object o ) { ... }
Boolean isMember ( Object o ) { ... }
}
class MultiSet {
Boolean equals ( Object ms ) { ... }
Void insert ( Object o ) { ... }
Void remove ( Object o ) { ... }
Boolean isMember ( Object o ) { ... }
}
9
lows for unintended breaking of this rule, since a
structural type checker fails to reject a program that
uses an object of one type where a behaviorally different, but structurally compatible, type is expected.11 .
3.3
Animal mate ( Animal a ) { ... }
}
class Cat extends Animal {
... // behavior specific to cats
Inheritance Is Not Subtyping
Another problem with structural subtyping is the
converse of the spurious subsumption problem. In
structurally-typed OO languages, structural subtyping does not require subtyping between types of
classes that are in the inheritance relation (and thus
have inherited contracts), i.e., inheritance does not
imply subtyping. In combination with subtyping not
implying inheritance (i.e., spurious subsumption),
structural subtyping thus totally separates the notions of inheritance and subtyping, based on its nonnominal view of inheritance which ignores the inheritance of class contracts associated with class names.
To illustrate inheritance not implying subtyping in
structurally-typed OOP, assume the following definitions for class Animal and class Cat
class Animal {
Void move ( Point to ) { ... }
Void eat ( Food some ) { ... }
Void breathe () { ... }
Void sleep ( Time period ) { ... }
... // more generic animal behavior ,
// and ...
11 For example, as mentioned earlier, interface Comparable
in Java, consisting of the single abstract method int
compareTo(Object o), has a public contract asserting that
compareTo defines a total ordering on instances of any class
inheriting from Comparable, and that clients of Comparable
can thus depend on this property.
An arbitrary class
with a method int compareTo(Object o), however, generallyspeaking does not necessarily obey this contract.
In
structurally-subtyped OO languages, instances of such a class
can be bound, by spurious subsumption, to variables of type
Comparable (similar to allowing the binding of the instance
first bound to variable m to variable s in the Set/MultiSet
example above). This is in spite of the fact that when a developer asserts that a class C implements Comparable, he or she
is asserting that compareTo() defines a total ordering on class
C, and the author of Comparable conversely asserting that if a
class C does not implement the Comparable interface, instances
of C cannot be bound to variables of type Comparable, since
the compareTo method of C may unintentionally or intentionally not define a total ordering on instances of C.
// generic animal behavior inherited
// from class Animal
// but , do Cats ...
Cat mate ( Cat c ) { ... }
// OR do they ...
Animal mate ( Animal a ) { ... } // ???
}
Structurally-typed and nominally-typed OOP disagree on the signature of method mate() in class Cat.
Structurally-typed OOP assumes that mate() is a binary method (See [22], where binary methods were
recognized as problematic and multiple approaches
were suggested for dealing with them. We discuss
them more technically in Section 3.4), and requires
the method to have the โmore naturalโ signature Cat
mate(Cat c), at the expense of making Cats (i.e., instances of class Cat) not be Animals (i.e., instances of
class Animal)12, when they (quite naturally) should
be ones13 .
Nominally-typed OOP, on the other hand, does not
assume the mate() method in class Animal to be a
binary method. It thus keeps using the same signature for the method upon its inheritance by class
Cat. In nominally-typed OOP, thus, Cats are indeed
Animals, meaning that nominally-typed mainstream
OOP does identify inheritance with subtyping. Given
how nominally-typed OOP and structurally-typed
OOP differ on whether inheritance implies subtyping,
12 That is, in structurally-typed OO languages the structural
type corresponding to class Cat is not a subtype of the structural type corresponding to class Animal (because of the contravariance of types of method arguments), unless some unintuitive structural notion, like โmatchingโ [23] (which expresses
โthe similarity of recursive structureโ between class Cat and
class Animal, but which did not gain traction or support in
mainstream OOP), is added to the language to be used as
a pseudo-replacement for subtyping. (See also discussions in
Section 3.4 and in [11, 13])
13 One may here recall Cardelliโs noting, in [24, 25], of the
โbiological originโ of OOP. This biological origin is the reason
OO inheritance is called โinheritanceโ in the first place.
10
the assignment Animal a = new Cat() is correctly
allowed in nominally-typed OOP, but is wrongly disallowed in structurally-typed OOP.
To summarize, the code examples presented
above demonstrate a fundamental difference between structurally-typed OOP and nominally-typed
OOP from the perspective of OO developers. In
structurally-typed OOP, where only class structure
is inherited but not class contracts, MultiSets are
Sets (contrary to their mathematical definition) and
Cats are not Animals (contrary to their โbiological
definitionโ). In nominally-typed OOP, where class
contracts are inherited (via class names) in addition
to class structure, MultiSets are not Sets (in agreement with their mathematical definition) and Cats
are Animals (in agreement with their โbiological definitionโ.)
In nominally-typed OOP whether subtyping is
needed or not is indicated by the presence or absence
of explicit inheritance declarations. Accordingly, the
code examples above make it clear, more generally,
that:
Structurally-typed OOP sometimes forces subtyping when it is unneeded, and sometimes bars it when
it is needed, while nominally-typed OOP only forces
subtyping when it is explicitly needed, and bars it
when, by omission, it is explicitly unneeded.
This conclusion demonstrates a fundamental semantic and practical value of nominal information to
OO developers of nominally-typed OO programming
languages.
method any method inside a class that takes an argument that has the same type as that of the class
the method is declared in. This causes methods like
playWith in class Animal, whose semantics is not
that of true binary methods, to be mistaken as ones,
and thus, in subclass Cat, for example, the playWith
method will have the restrictive signature
Void playWith(Cat a)
(allowing Cats to play only with other Cats but not
with other Animals.)
We call this so-far-unrecognized problem with
structural typing as the problem of โspurious binary methodsโ (or, โfalse binary methodsโ), since a
method is inadvertently considered as being a binary method when it should not be. Nominallytyped OO languages do not suffer from this problem, because nominally-typed OO languages treat
any such method as a regular (i.e., non-binary)
method, and thus the signature of the method does
not change upon inheritance in a nominally-typed
OO language.15
3.4
Nominal Typing, Type Names,
Recursive Types and Binary
Methods
Based on the discussion in the previous sections, a
fundamental technical difference between nominallytyped OO languages and structurally-typed OO languages clearly lies in how the two approaches of typing OO languages differently view and treat type
names.
3.3.1 Spurious Binary Methods
In structurally-typed OO languages, type names
are
viewed as being names for type variables that abA lesser-recognized problem with structurally-typed
breviate
type expressions (i.e., are โshortcutsโ). As
OOP, which is also related to binary methods, is the
such
type
names in structurally-typed OO languages
fact that, in a pure structurally-typed OO language
(i.e., one with no nominal typing features), a class
15 In nominally-typed OOP, โF-bounded Genericsโ (as used,
like Animal cannot have a method like, say,
for example, to define the generic class Enum in Java [43, 44]) offers a somewhat better alternativeโif also not a fully satisfacVoid playWith(Animal a)
that keeps having the same signature in its subclass tory oneโto support true binary methods, while keeping the
identification between inheritance and subtyping. Based on
Cat14 and any other subclasses of class Animal. Pure some preliminary research we made, we expect future research
structurally-typed OOP always treats as a binary to offer a more satisfactory alternative for supporting true bi14 So
as to allow Cats to play with Dogs and Mouses (i.e.,
mice!), for example.
nary methods in nominally-typed OO languagesโhopefully a
fully satisfactory alternative. (Also see related discussion close
to the end of Section 3.4.)
11
are useful, and are even necessary for defining recursive type expressions. As variable names, however,
recursive type names in structurally-typed OO languages (such as the name of a class when used inside
the definition of the class, which gets interpreted as
โself-typeโ) get rebound to different types upon inheritance, and they get rebound to types that, if they
were subtypes, could break the contravariant subtyping rule of method parameter types and thus break
the type safety of structurally-typed OO languages.
Structurally-typed OO languages resolve this situation by breaking the one-to-one correspondence between inheritance and subtyping as we demonstrated
in the earlier code examples in Section 3.2 and Section 3.3.
In nominally-typed OO languages, however, nominality of types means type names are viewed as
part of the identity and meaning of type expressions given the association of type names with public
class contracts. This means that class names cannot be treated as variable names. Accordingly, in a
nominally-typed OO program type names have fixed
meanings that do not change upon inheritance. Further, the fixed type a type name is bound to in a
nominally-typed OO program does not break the contravariant subtyping of method parameters when the
method and its type get inherited by subclasses, thus
not necessitating breaking the identification between
inheritance and subtyping as we demonstrated by the
earlier code examples in Section 3.2 and Section 3.3.
In class-based OOP, a class can directly refer to
itself (using class names) in the signature of a field,
or that of a method parameter or return value. This
kind of reference is called a self-reference, a recursive
reference, or, sometimes, a circular reference. Also,
mutually-dependent classes, where a class refers to
itself indirectly (i.e., via other classes), are allowed
in class-based OOP. This kind of reference inside a
class, indirectly referencing itself, is called an indirect self-reference, a mutually-recursive reference, or,
a mutually-circular reference.
As Pierce [63] noted, nominally-typed OO languages allow readily expressing circular (i.e.,
mutually-dependent) class definitions. Since objects
in mainstream OOP are characterized as being selfreferential values (are โself-aware,โ or โautognosticโ ac-
cording to Cook [33]), and since self-referential values can be typed using recursive types [52], there is a
strong and wide need for circular class definitions in
OOP. As such, direct and indirect circular type references are quite common in mainstream OOP [33].
The ease by which recursive typing can be expressed
in nominally-typed OO languages is one of the main
advantages of nominally-typed OOP. According to
Pierce [63, p.253],
โThe fact that recursive types come essentially for free in nominal systems is a
decided benefit [of nominally-typed OO languages].โ
As a demonstration of the influence of views of selfreferential classes on properties of OO type systems,
when nominal and structural domain-theoretic models of OOP are compared (as done in brief, e.g., in [8,
10], and in detail, e.g., in [11]), it is easy to see that
self-referential classes are viewed differently by nominal models of OOP than by structural models and
that these different views of self-referential classes, in
particular, make nominal domain-theoretic models of
OOP lead to a simple mathematical proof of the identification between type inheritance and subtypingโa
different conclusion than the one reached based on
structural models. (In particular, the inclusion of
class signature constructs in NOOP led to the simplicity of the mathematical proof of this identification. See [8, 10, 13] for more details.)
Aside from theory, the difference between the
nominal and the structural views of type names in
OOP demonstrates itself most prominently, in practice, in the different support and the different treatment provided by nominally-typed OO languages
and by structurally-typed OO languages to โbinary
methodsโ. As mentioned in Section 3.3, a โbinary
methodโ is a method that takes a parameter or more
of the same type as the class the method is declared
in [22]. The problem of binary methods and requiring them to be supported in OO languages was a
main factor behind structural models of OOP leading
to not identifying type inheritance with subtyping.
Structurally-typed OO languages, given their view of
type names as type variable names that can get rebound, require the type of the argument of a method,
12
when identified as a binary method and upon inheritance of the method, to be that of the type corresponding to the subclass.
Nominally-typed OO languages, on the other hand,
with their fixed interpretation of type names, offer a somewhat middle-ground solution between totally avoiding binary methods and overly embracing
them as pure structurally-typed OO languages do.
Nominally-typed OO languages treat a method taking in an argument of the same class as that in which
the method is declared like any other method, needing no special treatment. Nominally-typed OOP thus
does not quite support binary methods, but, for good
reasons (i.e., so as to not break the identification
of inheritance of contracts with subtyping nor lose
other advantages of nominal typing), offers only a
good approximation to binary methods. Given that
the meaning of types names in nominally-typed OO
languages does not change upon inheritance, these
languages provide methods whose type, upon inheritance, only approximates that of true binary methods: The type of the input parameter of a method
that approximates a binary method is guaranteed to
be a supertype of its type if it were a true binary
method. Given that the type of the parameter does
not change in subclasses, the degree of approximation
gets lesser the deeper in the inheritance hierarchy the
method gets inherited.
In light of the โspurious binary methodsโ problem
we uncovered in structural OO type systems (see Section 3.3), we believe providing approximations to binary methods is a smart design choice by nominal OO
type systems, even if it is likely that avoiding spurious binary methods may have not been consciously
intended. It should also be noted that the problem
of spurious binary methods provides justification for
nominally-typed OO languages being cautious about
fully embracing binary methods by treating a method
that looks like a binary method as indeed being one.
Also, as we hinted to in earlier sections, in our opinion structural typing having arguably better support
for binary methods does not justify using structural
OO typing, since structural type systems have their
own problems in their support of binary methods
(i.e., the problem of spurious binary methods). We
conjecture that F-bounded generics, or some other
notion16 may provide a better solution for binary
methods in nominally-typed (and possibly also in
structurally-typed OOP) that does not require breaking the identification of inheritance with subtyping
(and thus does not require sacrificing the closeness
of nominal typing/subtyping to semantic and behavioral typing/subtyping and other advantages of nominal typing). In light of the โspurious binary methodsโ
problem, and requiring no explicit use of generics, in
our opinion a better approach towards supporting binary methods in mainstream OO languages might be
by allowing developers to explicitly mark or flag binary methods as being such, or, even more precisely,
to allow developers to mark specific parameters of
methods as being parameters that need to be treated
as those of binary methods.
As to โhybridโ OO languages, which add (some)
structural typing features to nominally-typed OO
languages17 , or vice versa, we conjecture that the useful part of the claimed โflexibilityโ of structural typing may be possible to achieve in nominally-typed OO
languages by supporting a separate notion of โcontract names,โ thereby splitting class names from contract names, then allowing classes to additionally define themselves as satisfying supercontracts of other
already-defined (sub)classes. We have not explored
this suggestion further however, since we believe it
may complicate nominal OO type systems. But we
believe that, if flexibility is an absolute necessity, then
splitting class names from contract names may be a
suggestion worthy of investigation. We believe this
suggestion to be a more viable optionโsimpler to
reason about and more in agreement with the nominal spirit of nominally-typed OO languagesโthan
using multiple dispatch ([30, 18, 31]), which was discussed in [22] as a possible solution to the problem of
binary methods, and also more viable than creating
hybrid languages. We believe that having an OO type
system be both nominally and structurally typed, as
16 For
example,
โimplicit self-type-variablesโ,
e.g.,
This/Self, which are implicit type variables because they
do not get included in class signatures, similar to โimplicit
self-variablesโ, e.g., this/self, which are not included in
method signatures.
17 Due to problems with supporting recursive types mentioned above, we believe most of these โhybridโ languages do
not support recursive structural types, for example.
13
in [38, 62, 42, 54, 55, 61, 4], makes the type system does not necessarily imply the similarity of behavvery complex (and probably even lends its โhybridโ ior, in nominally-typed OOP type inheritance implies
features unusable.)
refined contracts, and refined contracts imply subsumption between class types, and vice versa (i.e.,
in nominally-typed OOP, subsumption between class
4 Concluding Remarks
types implies refined contracts, implying type inheritance.)
In this essay we added to earlier efforts that aimed
Putting these facts together, it is clear that in
to demonstrate the semantic value of nominal typing, nominally-typed OOP different class names informaparticularly the association of class names with be- tion implies different contracts/types and different
havioral class contracts, by making a technical com- contracts/types imply different class names informaparison between nominal OO type systems and struc- tion. This identification of types with contracts, and
tural OO type systems. Recently, a domain-theoretic of subtyping with inheritance of contracts, makes
model of nominally-typed OOP, namely NOOP, was nominal typing and nominal subtyping closer to sealso compared to models of structurally-typed OOP. mantic typing and semantic subtyping.
These comparisons provide a clear and deep account
In the essay we thus stressed the practical value of
for the relation between nominal and structural OO nominal typing in mainstream OOP by particularly
type systems that, due to earlier lack of a domain- showing
theoretic model of nominally-typed OOP, has not
1. The value of nominal subtyping, at compile time
been presented before, and they should help furand at runtime, in respecting behavioral conther demonstrate, to OO PL researchers, the value
tracts and thus respecting design intents,
of nominal typing and nominal subtyping to mainstream OO developers and language designers, and
2. The value of the resulting identification between
instill in them a deeper appreciation of it.
inheritance and subtyping in providing a simpler
In the essay we particularly noted that nominal
conceptual model of OO software and of OO softtyping prevents types that structurally look the same
ware components, leading to a simpler design
from being confused as being the same type. Since
process of OO software, and
some objects having the same structure does not necessarily imply these objects have the same behav3. The value of making recursive types readily
ior, nominal typing identifies types only if they have
expressible, this being necessary for the static
the same class names information (nominal informatyping of โautognosticโ objects.
tion) and thus only if they assert maintaining the
same contract and not just assert having the same Our comparison also revealed the problem of โspuristructural interface. Thus, in nominally-typed OOP ous binary methods,โ so far an unrecognized problem
objects having the same class type implies them as- in structurally-typed OO languages.
serting they maintain the same contracts, and them
Further, the recent comparison of nominal and
asserting they maintain the same contracts implies structural denotational models of OOP demonstrates
them having the same type.
them having different views of fundamental notions of
Similarly, nominal subtyping allows subtyping re- mainstream OOP, namely of objects, of type names,
lations to be decided based on the refinement of con- of object/class types, of subtyping and of the relation
tracts maintained by the objects, not just based on between subtyping and type inheritance. In particthe refinements of their structure. By inclusion of ular, this comparison demonstrates that an object
contracts in deciding the subtyping relation, nominal in mainstream nominally-typed OOP is a record tosubtyping thus also prevents types that are superfi- gether with nominal information, that class types are
cially (i.e., structurally) similar from being confused record types whose elements (i.e., objects/class inas being subtypes. Since the similarity of structure stances) additionally respect statements of class con14
tracts, and that type inheritance is correctly identi- mainstream OOP, should be based less on structural
models of OOP and more on nominal ones instead.
fied with nominal subtyping.
Table 3 on the following page summarizes the main
differences between nominal typing and structural
References
typing we pointed out in this essay.
[1] C# language specification, version 3.0.
http://msdn.microsoft.com/vcsharp, 2007.
We hope the development of mathematical models of nominally-typed OOP and the comparisons
presented in this essay and elsewhere are significant
steps in providing a full account of the relation between nominal and structural OO type systems. We
further hope this essay clearly explains the rationale behind our belief that the significant practical
value and the significant semantic value of nominal
typing are the reasons for industrial-strength mainstream OO software developers correctly choosing to
use nominally-typed OO languages. We believe that
having a clear view of the rationale behind many OO
developersโ preference of nominally-typed OO languages, and having a more accurate technical and
mathematical view of nominally-typed OO software,
present programming languages researchers with better chances for progressing mainstream OO languages
and for making PL research relevant to more OO language designers and more mainstream OO software
developers.18
Finally, we believe a clearer understanding and
a deeper appreciation of a key semantic advantage
of nominal OO typing over structural OO typing
can help remedy the existing schism between OO
PL researchers on one hand and OO developers and
OO language designers on the other hand, offering
thereby better chances for progressing mainstream
OO languages. In particular, we believe future foundational OO PL research, to further its relevance to
18 Generics, for example, add to the expressiveness of type
systems of nominally-typed OO programming languages [15,
20, 29, 43, 44, 1, 17, 3, 47, 69]. As hinted to earlier, genericsโ
particularly so-called โF-bounded genericsโโseem to improve
the support for binary methods in nominally-typed OO languages while maintaining the identification between inheritance and subtyping. We believe building a domain-theoretic
model of generic nominally-typed OOP (e.g., along the lines
of [12]) may offer better chances for having a deeper understanding of features of generic mainstream OO languages, such
as Java erasure, variance annotations (including the notorious
Java wildcards), polymorphic methods, generic type inference
and so on.
[2] ISO/IEC 14882:2011: Programming Languages:
C++. 2011.
[3] The Scala programming language. www.scalalang.org, 2014.
[4] The
Go
programming
www.golang.org, 2015.
language.
[5] The
TIOBE
index.
http://www.tiobe.com/index.php/ content/paperinfo/ tpci/index.html, 2016.
[6] Martin Abadi and Luca Cardelli. A semantics of
object types. In Proc. LICSโ94, 1994.
[7] Martin Abadi and Luca Cardelli. A Theory of
Objects. Springer-Verlag, 1996.
[8] Moez A. AbdelGawad. NOOP: A Mathematical Model of Object-Oriented Programming. PhD
thesis, Rice University, 2012.
[9] Moez A. AbdelGawad. An overview of nominaltyping versus structural-typing in objectoriented programming (with code examples).
Technical report, arXiv.org:1309.2348 [cs.PL],
2013.
[10] Moez A. AbdelGawad. A domain-theoretic
model of nominally-typed object-oriented programming.
Journal of Electronic Notes in
Theoretical Computer Science (ENTCS), DOI:
10.1016/j.entcs.2014.01.002., 301:3โ19, 2014.
[11] Moez A. AbdelGawad. A comparison of NOOP
to structural domain-theoretic models of objectoriented programming. Preprint available at
http://arXiv.org/abs/1603.08648, 2016.
15
Nominally-Typed OOP
Object Interfaces
Nominal; Include class names
Contracts
(as richer specifications
of object behavior)
Types of Objects
Object Type
Expressions
Included (via class names) in
the meaning of objects, of their
interfaces and of their types
Class types
Structurally-Typed OOP
Structural; Do not
include class names
Ignored in the meaning
of objects, of object interfaces,
and of object types
Record types
Class signatures
Record type expressions
Class signatures, as object types,
are included in object meanings
Class names, being associated
with public class contracts,
are used as type names
Fixed. Cannot be
rebound upon inheritance
Includes inheritance of
class contracts
Respects contracts;
respects (type) inheritance
Objects do not carry their types
as part of object meanings
Type names are abbreviations/
synonyms for type expressions
(with no inherent fixed meaning)
Can be rebound
upon inheritance
Type Reification/Nominality
Type Names
Meaning of
Type Names
(Type) Inheritance
Subtyping
(Type) Inheritance
versus Subtyping
OO Software Design
Mental Model
Binary Methods
Spurious and Missing
Subsumption
Spurious Bin. Methods
Ignores behavioral class contracts
Ignores behavioral class contracts
One-to-one correspondence
Two relations independent
Simple; Inheritance hierarchy =
Subtyping hierarchy
Not supported.
Approximations provided
Complex; An inheritance hierarchy and
a separate, independโt subtyping hierarchy
Fully supported
(including false ones)
Neither can exist
Both can exist
Cannot exist
Can exist
Special constructs needed for
explicit expression
Further from semantic/behavioral
typing and subtyping
Recursive Types
Readily and naturally expressed
Typing and Subtyping
Closer to semantic/behavioral
typing and subtyping
Table 3: OO Nominal-Typing vs. OO Structural-Typing
16
[12] Moez A. AbdelGawad. Towards understand- [22] Kim Bruce, Luca Cardelli, Giuseppe Castagna,
ing generics. Technical report, arXiv:1605.01480
The Hopkins Objects Group, Gary Leavens, and
[cs.PL], 2016.
Benjamin C. Pierce. On binary methods. Theory
and Practice of Object Systems, 1994.
[13] Moez A. AbdelGawad and Robert Cartwright.
In nominally-typed OOP, objects are not mere [23] Kim B. Bruce. Foundations of Object-Oriented
records and inheritance Is subtyping. Submitted
Languages: Types and Semantics. MIT Press,
for journal publication, 2016.
2002.
[14] Jonathan Aldrich. The power of interoperabil[24] Luca Cardelli. A semantics of multiple inherity: Why objects are inevitable. In Proceedings
itance. In Proc. of the internat. symp. on seof the 2013 ACM International Symposium on
mantics of data types, volume 173, pages 51โ67.
New Ideas, New Paradigms, and Reflections on
Springer-Verlag, 1984.
Programming & Software, Onward! 2013, pages
101โ116, New York, NY, USA, 2013. ACM.
[25] Luca Cardelli. A semantics of multiple inheritance. Inform. and Comput., 76:138โ164, 1988.
[15] Joseph A. Bank, Barbara Liskov, and Andrew C.
Myers. Parameterized types and Java. Technical
[26] Luca Cardelli. Structural subtyping and the
report, 1996.
notion of power type. In ACM Proceedings of
POPL, 1988.
[16] Joshua Bloch. Effective java programming language guide, sun microsystems. Inc., Mountain
[27] Luca Cardelli, James Donahue, Lucille GlassView, CA, 2001.
man, Mick Jordan, Bill Kalsow, and Greg Nel[17] Joshua Bloch. Effective Java. Prentice Hall
son. Modula-3 Report (Revised), volume 52. DigPTR, 2008.
ital Systems Research Center, 1989.
[18] John Boyland and Giuseppe Castagna. Parasitic [28] Robert Cartwright and Moez A. AbdelGawad.
methods: An implementation of multi-methods
Inheritance Is subtyping (extended abstract).
for Java. In OOPSLA, 1997.
In The 25th Nordic Workshop on Programming
Theory (NWPT), Tallinn, Estonia, 2013.
[19] G. Bracha and D. Griswold. Strongtalk: typechecking Smalltalk in a production environment.
[29] Robert Cartwright and Jr. Steele, Guy L.
In OOPSLAโ93, pages 215โ230, 1993.
Compatible genericity with run-time types for
[20] Gilad Bracha,
Martin Odersky,
David
the Java programming language.
In Craig
Stoutamire, and Philip Wadler.
Making
Chambers, editor, ACM Symposium on Objectthe future safe for the past: Adding genericity
Oriented Programming: Systems, Languages
to the Java programming language. In Craig
and Applications (OOPSLA), volume 33, pages
Chambers, editor, ACM Symposium on Object201โ215, Vancouver, BC, October 1998. ACM,
Oriented Programming: Systems, Languages
ACM SIGPLAN.
and Applications (OOPSLA), volume 33, pages
183โ200, Vancouver, BC, October 1998. ACM, [30] C. Chambers. Object-oriented multi-methods in
Cecil. In ECOOP, 1992.
ACM SIGPLAN.
[21] K. Bruce, A. Schuett, R. van Gent, and A. Fiech. [31] C. Clifton, T. Millstein, G. Leavens, and
PolyTOIL: A type-safe polymorphic objectC. Chambers. MultiJava: Design rationale, comoriented language. ACM Transactions on Propiler implementation and applications. ACM
gramming Languages and Systems, 25(2):225โ
Transactions on Programming Languages and
290, 2003.
Systems, 28(3):517โ575, 2006.
17
[32] William R. Cook. A Denotational Semantics of
Inheritance. PhD thesis, Brown Univ., 1989.
[43] James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. The Java Language Specification.
Addison-Wesley, 2005.
[33] William R. Cook. On understanding data abstraction, revisited. volume 44, pages 557โ572. [44] James Gosling, Bill Joy, Guy Steele, Gilad
Bracha, and Alex Buckley. The Java Language
ACM, 2009.
Specification. Addison-Wesley, 2014.
[34] William R. Cook, Walter L. Hill, and Peter S.
[45] Atsushi Igarashi, Benjamin C. Pierce, and Philip
Canning. Inheritance is not subtyping. In
Wadler. Featherweight Java: A minimal core
POPLโ90 Proceedings, 1990.
calculus for Java and GJ.
ACM Transactions
on
Programming
Languages
and Systems,
[35] William R. Cook and Jens Palsberg. A denota23(3):396โ450,
May
2001.
tional semantics of inheritance and its correctness. In ACM Symposium on Object-Oriented [46] Reto Kramer. Examples of Design by Contract
Programming, Systems, Languages and Applicain Java. In Design and Components - Object
tions (OOPSLA), pages 433โ444, 1989.
World - Berlin, 1999.
[36] Sophia Drossopoulou, Susan Eisenbach, and Sar- [47] Angelika Langer. The Java Generics FAQ.
www.angelikalanger.com/GenericsFAQ/Javafraz Khurshid. Is the java type system sound?
GenericsFAQ.html, 2015.
TAPOS, 5(1):3โ24, 1999.
[37] Mohamed Fayad and Douglas C. Schmidt. [48] X. Leroy, D. Doligez, J. Garrigue, D. Rรฉmy, and
J. Vouillon. The Objective Caml system. AvailObject-oriented application frameworks. Comable at http://caml.inria.fr/.
mun. ACM, 40(10):32โ38, October 1997.
[49] Barbara Liskov. Keynote address-data abstrac[38] Robert Bruce Findler, Matthew Flatt, and
tion and hierarchy. In ACM Sigplan Notices, volMatthias Felleisen. Semantic casts: Contracts
ume 23, pages 17โ34. ACM, 1987.
and structural subtyping in a nominal world.
In ECOOP 2004โObject-Oriented Programming, [50] Barbara H Liskov and Jeannette M Wing. A
pages 365โ389. Springer, 2004.
behavioral notion of subtyping. ACM Transactions on Programming Languages and Systems
[39] K. Fisher and J. Reppy. The design of a class
(TOPLAS), 16(6):1811โ1841, 1994.
mechanism for Moby. In PLDI, 1999.
[51] David B. MacQueen. Should ML be objectoriented? Formal Aspects of Computing, 13:214โ
[40] Matthew Flatt, Shriram Krishnamurthi, and
232, 2002.
Matthias Felleisen. Classes and mixins. In Proceedings of the 25th ACM SIGPLAN-SIGACT
[52] David B. MacQueen, Gordon D. Plotkin, and
symposium on Principles of programming lanR. Sethi. An ideal model for recursive polymorguages, pages 171โ183. ACM, 1998.
phic types. Information and Control, 71:95โ130,
1986.
[41] Matthew Flatt, Shriram Krishnamurthi, and
Matthias Felleisen. A programmerโs reduction [53] Boris Magnusson. Code reuse considered harmsemantics for classes and mixins. In Formal
ful, 1991.
syntax and semantics of Java, pages 241โ269.
[54] Donna Malayeri and Jonathan Aldrich. InSpringer, 1999.
tegrating nominal and structural subtyping.
In ECOOP 2008โObject-Oriented Programming,
[42] J. Gil and I. Maman. Whiteoak: Introducing
pages 260โ284. Springer, 2008.
structural subtyping in Java. In OOPSLA, 2008.
18
[55] Donna Malayeri and Jonathan Aldrich. Is struc- [67] Ewan Tempero, Hong Yul Yang, and James
Noble. What programmers do with inheritural subtyping useful? an empirical study. In
tance in java. In Proceedings of the 27th EuESOP, 2009.
ropean Conference on Object-Oriented Program[56] Erik Meijer and Peter Drayton. Static typing
ming, ECOOPโ13, pages 577โ601, Berlin, Heiwhere possible, dynamic typing when needed:
delberg, 2013. Springer-Verlag.
The end of the cold war between programming
[68] Kresten Krab Thorup and Mads Torgersen. Unilanguages. In OOPSLA, 2004.
fying genericity. In ECOOP 99โObject-Oriented
Programming, pages 186โ204. Springer, 1999.
[57] Bertrand Meyer. Applying โdesign by contractโ.
Computer, 25(10):40โ51, 1992.
[69] Yizhou Zhang, Matthew C. Loring, Guido Salvaneschi, Barbara Liskov, and Andrew C. Myers.
[58] Bertrand Meyer. Object-Oriented Software ConLightweight, flexible object-oriented generics. In
struction. Prentice Hall, 1995.
Proceedings of the 36th ACM SIGPLAN Conference on Programming Language Design and Im[59] R. Milner, M. Tofte, R. Harper, and D. Macplementation, PLDI 2015, pages 436โ445, New
Queen. The Definition of Standard ML (ReYork, NY, USA, 2015. ACM.
vised). MIT Press, 1997.
[60] Tobias Nipkow and David Von Oheimb. Javalight
is type-safeโdefinitely. In Proceedings of the 25th
ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pages 161โ170.
ACM, 1998.
[61] Martin Odersky. The scala language specification, v. 2.7. http://www.scala-lang.org, 2009.
[62] Klaus Ostermann. Nominal and structural subtyping in component-based programming. Journal of Object Technology, 7(1):121โ145, 2008.
[63] Benjamin C. Pierce. Types and Programming
Languages. MIT Press, 2002.
[64] Benjamin C. Pierce. Types and programming
languages: The next generation. LICSโ03, 2003.
[65] Harry H Porter III. Separating the subtype
hierarchy from the inheritance of implementation. Journal of Object-Oriented Programming,
4(6):20โ29, 1992.
[66] Anthony J. H. Simons. The theory of classification, part 1: Perspectives on type compatibility.
Journal of Object Technology, 1(1):55โ61, MayJune 2002.
19
| 6cs.PL
|
arXiv:1307.8162v2 [math.AC] 24 Jan 2018
STILLMANโS QUESTION FOR EXTERIOR ALGEBRAS AND
HERZOGโS CONJECTURE ON BETTI NUMBERS OF SYZYGY
MODULES
JASON MCCULLOUGH
Abstract. Let K be a field of characteristic 0 and consider exterior algebras of finite dimensional K-vector spaces. In this short paper we exhibit
principal quadric ideals in a family whose Castelnuovo-Mumford regularity is
unbounded. This negatively answers the analogue of Stillmanโs Question for
exterior algebras posed by I. Peeva. We show that these examples are dual to
modules over polynomial rings that yield counterexamples to a conjecture of
J. Herzog on the Betti numbers in the linear strand of syzygy modules.
1. Introduction
Let K be a field and let S be the symmetric algebra of some finite dimensional
K-vector space. Stillman [12, Problem 3.14] posed the following question: Can the
projective dimension pdS (S/I) of a homogeneous ideal I be bounded purely in terms
of the number and degrees of the minimal generators of I? Caviglia showed that
this question was equivalent to the parallel question where one replaces projective
dimension by regularity. (cf. [10, Theorem 2.4]) Ananyan-Hochster [1] recently
gave a positive answer to this question in full generality.
Now let E be the positively graded exterior algebra of a finite dimensional Kvector space. While resolutions over E need not be finite, the regularity regE (M )
of a finitely generated E-module is finite since E is a Koszul algebra. Here regE (M )
is defined as
regE (M ) := sup{j โ i| TorE
i (M, K)j 6= 0}.
Irena Peeva posed the following variant of Stillmanโs Question at the Joint Introductory Workshop at MSRI in the fall of 2012:
Question 1.1 (Peeva). Can the regularity regE (E/I) of a homogeneous ideal I of
E be bounded purely in terms of the number and degrees of the generators?
Surprisingly, and contrary to the symmetric algebra case, the answer to this
question is no. In Section 4 we present a family of principal quadric ideals in
exterior algebras over an arbitrary field whose regularity is unbounded.
Now let M be a finitely generated, graded S-module where S = K[x1 , . . . , xn ].
Let d denote the minimal degree of a generator of M . We consider the Betti
numbers in the linear strand of M , that is:
ฮฒilin (M ) := ฮฒi,d+i (M ),
2010 Mathematics Subject Classification. Primary: 13D02 ; Secondary: 15A75.
1
2
JASON MCCULLOUGH
where ฮฒi,j (M ) = dimK TorSi (M, K)j . The length of the linear strand of M is
max{i | ฮฒilin (M ) 6= 0}. Herzog proposed the following lower bound on the Betti
numbers in the linear strand of kth syzygy modules.
Conjecture 1.2 (Herzog [8]). If M is a graded kth syzygy module over S with
linear strand of length p, then
p+k
lin
ฮฒi (M ) โฅ
.
i+k
The conjecture has been proved in the following cases:
(1) Herzog proved the case k = 0 in [8].
(2) Herzog was motivated by a result of Green [7] which contained the case
k = 1, i = 0. See also similar results by Eisenbud-Koh [5].
(3) Reiner and Welker [13] proved the case when M is a monomial ideal and
k = 1.
(4) Roฬmer [14] proved the following cases:
(a) When k = 1 and 0 โค i โค p.
p+k
lin
(b) When p > 0 and i = p โ 1; i.e. ฮฒpโ1
(M ) โฅ pโ1+k
= p + k.
(c) When M is Zn -graded, Roฬmer proved the conjecture in full generality.
By modifying a recent construction of Iyengar-Walker [9], we use the BernsteinGelโfand-Gelโfand (BGG) correspondence to produce counterexamples for virtually
all other cases of Herzogโs Conjecture. More precisely, in Section 3 we construct for
each n โฅ 1 a finitely generated, graded S = K[x1 , . . . , x2n ]-module M that is an
nth sygyzy module such that M has linear resolution of length n and has graded
Betti numbers
2n
2n
lin
ฮฒi (M ) =
โ
,
for 0 โค i โค n.
n+i
n+i+2
We note that for 0 โค i โค n โ 2 that
2n
2n
n+n
lin
ฮฒi (M ) =
โ
<
,
n+i
n+i+2
n+i
contradicting the conjecture. These examples are BGG dual to the principal quadric
E-ideals mentioned above.
We note that a different construction of Conca-Herbig-Iyengar [2] also gives a
family of counterexamples to Conjecture 1.2, although that was not their aim.
Specifically, they show [2, Theorem 5.1] that if S = K[x1 , . . . , xn , y1 , . . . , yn ] and I
is the ideal
I = ({xi yj , xi yj โ xj yi | 1 โค i, j โค n with i 6= j}) ,
then the cyclic module B = S/I has graded Betti numbers
๏ฃฑ
1
for i, j = 0
๏ฃด
๏ฃด
๏ฃด
๏ฃฒ 2n โ 2n โ 2 n for 1 โค i โค n โ 1 and j = i + 1
i+1
iโ1
i+1
ฮฒiS (B) =
2n
2n
๏ฃด
โ
for n โค i โค 2n and j = i + 2
๏ฃด
i
i+2
๏ฃด
๏ฃณ
0
otherwise
In particular, setting N = Syzn (B) gives an nth syzygy module with the same
graded Betti numbers (after a degree shift) as M above.
STILLMANโS QUESTION AND HERZOGโS CONJECTURE
3
2. The BGG Correspondence
We briefly recall the Bernstein-Gelโfand-Gelโfand (BGG) correspondence. We
refer the reader to [3] or [4] for more details. Let K be a field of characteristic
0. Fix a positive integer n. Let S = K[x1 , . . . , x2n ] denote a standard graded
polynomial ring over K. Set W = S1 and let V = HomK (W, K) denote the vectorspace dual of W . Let E = โงV be the exterior algebra of V . Let e1 , . . . , e2n be a dual
basis to x1 , . . . , x2n . Thus E = Khe1 , . . . , e2n i, which we also view as a positively
graded ring with deg(ei ) = 1 to keep the notation in this paper consistent. (In [3]
and [4], E is viewed as a negatively graded ring.)
Let L denote the functor from the category of graded E-modules to the category
of linear free complexes of S-modules defined as follows: Given any graded Emodule P , we define L(P ) to be S โK P viewed as a complex of graded free
S-modules, where L(P )i = S โK Pโi and the differential is induced by
L(P ) : ยท ยท ยท โ S โK Pโi
sโp
d
โi P
S โK P1โi โ ยท ยท ยท
7โ
sxj โ ej p
We extend L to a functor on complexes of E-modules by taking the total complex
of the resulting double complex. There is an adjoint function R from complexes of
S-modules to complexes of E-modules, defined in a similar way, which creates an
equivalence of bounded derived categories of graded S-modules and that of graded
E-modules. An important property of the equivalence for the purpose of this paper
is that under this equivalence the functor L identifies finitely generated E-modules
with linear free S-complexes.
3. Counterexamples to Herzogโs Conjecture
First we recall a well-known fact about exterior algebras:
Theorem 3.1 (cf. [11, Theorem 5.2]). Let f โ E2 = โง2 V be a generic element.
Then the linear transformation
fยท
โงr V โ โงr+2 V
is injective for r โค n โ 1 and is surjective for r โฅ n โ 1.
As remarked in [9], it suffices to pick f = e1 e2 + ยท ยท ยท + e2nโ1 e2n . We now come
to the first main result. By convention, we set m
k = 0 if k < 0 or if k > m.
Theorem 3.2. Fix n > 0 and a field K of characteristic 0. Let S = K[x1 , . . . , x2n ]
be a standard graded polynomial ring. There exists a finitely generated, graded Smodule M , generated by degree 0 elements such that reg(M ) = 1 and the graded
Betti numbers are
๏ฃฑ
2n
2n
๏ฃด
if i = j and 0 โค i โค n
๏ฃฒ i+1 โ iโ1
2n
2n
ฮฒi,j (M ) =
if j = i + 1 and n + 1 โค i โค 2n
i โ i+2
๏ฃด
๏ฃณ
0
otherwise.
2n
2n
In particular, if we set N = Syzn (M ), then ฮฒilin (N ) = n+i
โ n+i+2
, contradicting
Conjecture 1.2 for 0 โค i โค n โ 2.
Proof. Let f โ E2 be a general element. Consider the graded complex of free
E-modules
f
Gโข : E(2 โ 2n) โโ E(โ2n).
4
JASON MCCULLOUGH
Let Fโข = L(Gโข ). Since L(E) is the usual Koszul complex Kโข (x, S)[2n] with a shift
in homological degree, we have Fโข = cone(Kโข (x, S)[2] โ Kโข (x, S)).
The complex Fโข fits in a short exact sequence
0 โ Kโข (x, S)[1] โ Fโข โ Kโข (x, S) โ 0.
Since H0 (Kโข (x, S)) โผ
= K and Hi (Kโข (x, S)) = 0 for all i > 0, if follows that
(
K for i = 0, โ1
Hi (Fโข ) =
0
otherwise.
By Theorem 3.1, every possible cancelation in Fโข that can occur does occur.
Thus the minimal subcomplex Fโข โฒ of Fโข has graded Betti table
-1
0: 1
1: -
0
2n
-
1
2n
2
ยทยทยท
โ 1 ยทยทยท
-
n-1 2n
โ nโ2
-
2n
n
n
2n
โ
n
ยทยทยท
2n
ยท
ยท
ยท
n+2
2n-1 2n
2n
1
Note that under the BGG correspondence, the first linear strand corresponds
to L(AnnE (f )) and the second linear strand is L(E/(f )). In particular, Since
Hi (Fโฒโข ) = 0 for i > 0, if we set Fโฒโฅ0 to be the truncation of Fโฒโข , then Fโฒโฅ0 is the
minimal free resolution of an S-module M . (We shift graded degrees to ensure that
M is generated in degree 0.) In particular, M now has graded Betti table of the
form
0
ยทยทยท
n
ยท ยท ยท 2n-1 2n
1
n-1 2n
2n
0: 2n 2n
โ
1
ยท
ยท
ยท
โ
2
n
nโ2
2n
2n
ยทยทยท
2n
1
1:
n โ n+2
Setting N = Syzn (M ), we see that N is an nth syzygy with linear free resolution
and graded Betti numbers as prescribed above.
4. Peeva-Stillman Question for Exterior Algebras
Now let E be the exterior algebra of a finite dimensional K-vector space. Here
we set the exterior variables to have degree +1 rather than โ1, as in the previous
section. While resolutions over E need not be finite, since E is a Koszul algebra,
the regularity regE (M ) of a finitely generated E-module is finite. Here regE (M ) is
defined as
regE (M ) := sup{j โ i| TorE
i (M, K)j 6= 0}.
Irena Peeva posed the following variant of Stillmanโs Question at the Joint Introductory Workshop at MSRI in the Fall of 2012:
The following theorem gives the promised negative answer to Question 1.1.
Theorem 4.1. Let K be a field of characteristic 0. Fix any positive integer n. Let
V be V
the K-vector space with basis e1 , e2 , . . . , e2n and consider the exterior algebra
E = V . Set f = e1 e2 + e3 e4 + ยท ยท ยท + e2nโ1 e2n . Then regE (E/(f )) = n.
Proof. Consider the minimal free resolution of E/(f ) over E. Note that we may
identify Syz2 (E/(f )) with AnnE (f ). By Theorem 3.1, AnnE (f ) has no elements
of degree < n. Thus regE (E/(f )) โฅ n. On the other hand, by the proof of
STILLMANโS QUESTION AND HERZOGโS CONJECTURE
5
Theorem 3.2, we see that L(E/(f )) has a linear free S-resolution. By the Dictionary Theorem [3, Theorem 7.7], HomK (E/(f ), K) โผ
= AnnE (f ) has a linear free
E-resolution. Therefore regE (E/(f )) = n.
Remark 4.2. The previous theorem also holds over any field of positive characteristic
p > 0, but it is no longer true that Ann(f ) has a linear free resolution since in
particular f p = 0.
5. An Example
Finally we show how one can construct nth syzygy modules with linear free resolutions of length n and with graded Betti numbers smaller than those predicted by
Herzogโs Conjecture in Macaulay2. Here we make use of the BGG package written
by Abo, Decker, Eisenbud, Schreyer, Smith and Stillman. Here we demonstrate the
case n = 4.
i1 : n = 4;
i2 : E = QQ[e_1..e_(2*n),SkewCommutative=>true];
-- an exterior algebra in 2n variables
i3 : S = QQ[x_1..x_(2*n)];
-- a polynomial ring in 2n variables
i4 : I = ideal sum for i from 1 to n list e_(2*i-1)*e_(2*i)
o4 = ideal(e e + e e + e e + e e )
1 2
3 4
5 6
7 8
o4 : Ideal of E
i5 : betti res I
-- The resolution over E of E/I. reg(E/I) = n
o5 = total:
0:
1:
2:
3:
4:
0
1
1
.
.
.
.
1 2
3
4
5
6
7
8
9
1 42 288 1155 3520 9009 20384 42042 80640
. .
.
.
.
.
.
.
.
1 .
.
.
.
.
.
.
.
. .
.
.
.
.
.
.
.
. .
.
.
.
.
.
.
.
. 42 288 1155 3520 9009 20384 42042 80640
o5 : BettiTally
i6 : J = ann I;
o6 : Ideal of E
i7 : P = J / ideal product flatten entries vars E;
6
JASON MCCULLOUGH
i8 : loadPackage "BGG"
o8 = BGG
o8 : Package
i9 : F = bgg(2*n-2,P,S);
8
27
o9 : Matrix S <--- S
i10 : M = coker F ** S^{-(2*n-1)};
-- M is an S-module
i11 : betti res M
-- the linear strand of the resolution of M is L(J/(e_1*...*e_2n))
0 1 2 3 4 5 6
o11 = total: 8 27 48 42 42 48 27
0: 8 27 48 42 . . .
1: . . . . 42 48 27
7
8
.
8
8
1
.
1
o11 : BettiTally
i12 : G = bgg(n-1,comodule I,S);
42
o12 : Matrix S
48
<--- S
i13 : N = coker G ** S^{-n};
-- N is the nth syzygy module of M, with a shift in grading
i14 : betti res N
-- its resolution is L(E/I) under the BGG correspondence
0 1 2 3 4
o14 = total: 42 48 27 8 1
0: 42 48 27 8 1
o14 : BettiTally
It is clear that this is not the most extreme counterexample to Herzogโs Conjecture. Note that the module N above has rank 14 and is a 4th syzygy module over
S. By a Theorem of Bruns (cf. [6, Corollary 3.13]), there exists a free submodule
F โ N of rank 10 such N/F is a still a 4th syzygy module. The module N/F
would then have Betti table
0
1 2 3 4
0: 32 48 27 8 1
STILLMANโS QUESTION AND HERZOGโS CONJECTURE
7
It would be interesting to know in general what the minimal Betti numbers are for
a nth syzygy module with linear free resolution.
Acknowledgements
The author thanks Srikanth Iyengar, Irena Peeva, and Mark Walker for useful conversations concerning this paper and also Jerzy Weyman for pointing out
reference [11].
References
1. Tigran Ananyan and Melvin Hochster, Small subalgebras of polynomial rings and stillmanโs
conjecture, arXiv: 1610.09268, 2017.
2. Aldo Conca, Hans-Christian Herbig, and Srikanth Iyengar, Koszul property for the moment
map of some classical representations, arXiv: 1705.02688, 2017.
3. David Eisenbud, The geometry of syzygies, Graduate Texts in Mathematics, vol. 229, SpringerVerlag, New York, 2005, A second course in commutative algebra and algebraic geometry.
4. David Eisenbud, Gunnar Flรธystad, and Frank-Olaf Schreyer, Sheaf cohomology and free resolutions over exterior algebras, Trans. Amer. Math. Soc. 355 (2003), no. 11, 4397โ4426.
MR 1990756
5. David Eisenbud and Jee Koh, Some linear syzygy conjectures, Adv. Math. 90 (1991), no. 1,
47โ76.
6. E. Graham Evans and Phillip Griffith, Syzygies, London Mathematical Society Lecture Note
Series, vol. 106, Cambridge University Press, Cambridge, 1985.
7. Mark L. Green, Koszul cohomology and the geometry of projective varieties, J. Differential
Geom. 19 (1984), no. 1, 125โ171.
8. Juฬrgen Herzog, The linear strand of a graded free resolution, unpublished notes, 1998.
9. Srikanth Iyengar and Mark Walker, Examples of finite free complexes of small rank and
homology, arXiv: 1706.02156, 2017.
10. Jason McCullough and Alexandra Seceleanu, Bounding projective dimension, Commutative
Algebra. Expository Papers Dedicated to David Eisenbud on the Occasion of His 65th Birthday
(I. Peeva, Ed.), Springer-Verlag London Ltd., London, 2013.
11. Guillermo Moreno-Socฤฑฬas and Jan Snellman, Some conjectures about the Hilbert series of
generic ideals in the exterior algebra, Homology Homotopy Appl. 4 (2002), no. 2, part 2,
409โ426, The Roos Festschrift volume, 2.
12. Irena Peeva and Mike Stillman, Open problems on syzygies and Hilbert functions, J. Commut.
Algebra 1 (2009), no. 1, 159โ195.
13. V. Reiner and V. Welker, Linear syzygies of Stanley-Reisner ideals, Math. Scand. 89 (2001),
no. 1, 117โ132.
14. Tim Roฬmer, Bounds for Betti numbers, J. Algebra 249 (2002), no. 1, 20โ37.
E-mail address: [email protected]
Iowa State University, Department of Mathematics, Ames, IA 50011
| 0math.AC
|
Recruitment Market Trend Analysis with Sequential Latent
Variable Models
Chen Zhu1 , Hengshu Zhu1,2 , Hui Xiong3โ, Pengliang Ding1 , Fang Xie1
1
Baidu Inc., 2 Baidu Research-Big Data Lab, 3 Rutgers University,
{zhuchen02, zhuhengshu, dingpengliang, xiefang}@baidu.com, [email protected]
arXiv:1712.02975v1 [cs.AI] 8 Dec 2017
ABSTRACT
Recruitment market analysis provides valuable understanding of industry-specific economic growth and plays an important role for both employers and job seekers. With the
rapid development of online recruitment services, massive
recruitment data have been accumulated and enable a new
paradigm for recruitment market analysis. However, traditional methods for recruitment market analysis largely rely
on the knowledge of domain experts and classic statistical
models, which are usually too general to model large-scale
dynamic recruitment data, and have difficulties to capture
the fine-grained market trends. To this end, in this paper,
we propose a new research paradigm for recruitment market
analysis by leveraging unsupervised learning techniques for
automatically discovering recruitment market trends based
on large-scale recruitment data. Specifically, we develop
a novel sequential latent variable model, named MTLVM,
which is designed for capturing the sequential dependencies
of corporate recruitment states and is able to automatically
learn the latent recruitment topics within a Bayesian generative framework. In particular, to capture the variability of recruitment topics over time, we design hierarchical
dirichlet processes for MTLVM. These processes allow to
dynamically generate the evolving recruitment topics. Finally, we implement a prototype system to empirically evaluate our approach based on real-world recruitment data in
China. Indeed, by visualizing the results from MTLVM, we
can successfully reveal many interesting findings, such as the
popularity of LBS related jobs reached the peak in the 2nd
half of 2014, and decreased in 2015.
Keywords
Trend Analysis, Recruitment Market, Latent Variable Model
1.
INTRODUCTION
The scarcity of skilled talents has stimulated the global
recruitment industry in the past few years. An article from
โ
Corresponding Author.
Permission to make digital or hard copies of all or part of this work for personal or
classroom use is granted without fee provided that copies are not made or distributed
for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than
ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission
and/or a fee. Request permissions from [email protected].
KDD โ16, August 13-17, 2016, San Francisco, CA, USA
c 2016 ACM. ISBN 978-1-4503-4232-2/16/08. . . $15.00
DOI: http://dx.doi.org/10.1145/2939672.2939689
Forbes reported that, US corporations spend nearly $ 72
billion each year on a variety of recruiting services, and the
worldwide number is likely three times bigger [4]. Along
this line, a growing challenge is to provide an effective trend
analysis of recruitment market, such as forecasting recruitment demand and predicting market status. Both employers
and job seekers can benefit from the study of recruitment
market trends. Moreover, at the macro level, this analysis
can also provide valuable understanding of industry-specific
economic growth for business analysts.
With the rapid development of online recruitment services, such as Linkedin [7], Dice [3], and Lagou [6], massive recruitment posting data have been accumulated. For
example, as of the end of 2015, there are more than 1.3
million job positions from 100K+ companies across more
than 20 Internet-related industries, such as mobile Internet,
online-to-offline (O2O), and cloud computing, available at
Lagou [6]-a Chinese tech hiring service website. These huge
data enable a new paradigm for studying recruitment market trends in a holistic and fine-grained manner.
Recruitment market analysis is a classic topic in human
capital economics, where recruitment market is either treated
as a factor of macro economic phenomenons or the analysis is
focused on advising people to make the best job decisions in
a general economic framework [26, 27, 29]. However, previous studies rely largely on the knowledge of domain experts
and classic statistical models, and thus usually too general
to capture the high variability of recruitment market (e.g.,
the evolution of recruitment topics). Also, these studies
have limited efforts on understanding the fine-grained market trends, such as forecasting the recruitment situation for
a specific company in the next few months. Therefore, it is
very appealing to design a new research paradigm for recruitment market analysis through large-scale analysis on massive recruitment data. Along this line, there are some major
challenges. First, how to model the intrinsically sequential
dependency of recruitment states (e.g., Hiring Freeze) forming the market trend? Second, how to model the semantic
relationship between the market trend and job postings from
different companies? Finally, how to model the variability
of recruitment postings for a long time period?
To tackle these challenges, we propose an unsupervised
learning approach for recruitment market trend analysis,
which can automatically discern the underlying trend of
recruitment market. First, we develop a novel sequential
market trend latent variable model (MTLVM), which is designed for capturing the temporal dependencies of recruitment states of companies and is able to automatically learn
Figure 1: The trend of the number of job postings
related to different skill requirements over two years,
which indicates the demands of recruitment market.
the latent recruitment topics and demands from recruitment
data within a Bayesian generative framework. To be more
specific, we assume that the current recruitment state of a
specific company is influenced by its state in previous epoch,
and it will impel the company to review appropriate recruitment demands (e.g., R&D recruitment). Then, different recruitment demands will generate different recruitment topics (e.g., experienced algorithm engineer), which will finally
generate the recruitment postings. In particular, to capture
the variability of recruitment topics over time, we design a
hierarchical dirichlet processes for MTLVM, which can dynamically generate recruitment topics. Finally, we implement an intelligent prototype system to empirically evaluate our approach based on a real-world recruitment data
set collected from China for the time period from 2014 to
2015. Indeed, by visualizing the results from MTLVM, we
can successfully observe many interesting discoveries, such
as the popularity of LBS related jobs reaches the peak in the
2nd half of 2014, and decreases in 2015. Generally, the contributions of this paper can be summarized as follows.
โข To the best of our knowledge, this paper is the first
attempt to leverage unsupervised learning approach
for automatically modeling the trend of recruit market. This work provides a new research paradigm for
recruitment market analysis.
โข We propose a sequential latent variable model, named
MTLVM, for learning the latent recruitment states, demands, and topics simultaneously. Particularly, MTLVM
can dynamically generate recruitment topics by integrating hierarchical dirichlet processes.
โข We develop a prototype system for empirically evaluate our approach. Indeed, by visualizing the results
obtained from MTLVM, we can successfully observe
many interesting and useful findings.
2.
OVERVIEW
In this section, we first introduce some preliminaries of
recruitment market modeling, and then formally present the
overview of our model MTLVM.
(a) Jan, 2014-Jun, 2014
(b) Jul, 2014-Dec, 2014
(c) Jan, 2015-Jun, 2015
(d) Jul, 2015-Nov, 2015
Figure 2: The word cloud representation of job postings related to โMobile Software Engineerโ with respect to different epochs in our data set, where the
size of each keyword is proportional to its frequency.
2.1
Preliminaries
Recent years have witnessed the rapid development of online recruitment services, which have already become the
most important venue of talent seeking, especially for hightech companies. Therefore, the job posting data from these
services can help researchers better understand the trend
of recruitment market from the perspectives of not only an
individual company but also the whole industry.
Intuitively, different job postings can indicate different recruitment demands of companies, such as R&D related
positions, which usually change over different epochs. For
example, Figure 1 demonstrates the trend of the number
of job postings related to different skill requirements during January 2014 to November 2015 based on our real-world
data set. We can observe that skill โInformation Retrievalโ
becomes less popular, compared with other skills, such as
โData Miningโ, and โMachine Learningโ. Meanwhile, โSparkโ,
an emerging technique for big data processing, has attracted
more and more attention during these years. Indeed, such
evolution of recruitment demands is inherently determined
by the change of latent recruitment states of companies at
different epochs, which have strong sequential dependency.
For example, Alibaba, one of the largest E-Commerce companies in China, hugely enlarged the recruitment in 2014,
which is followed by the recruitment state โHiring Freezeโ
in 2015. As a result, its recruitment demands related to ECommerce largely shrank in 2015. To capture the change
of recruitment states, and model the semantic relationship
between recruitment demand and state, our model MTLVM
follows the Beysian latent variable model with first-order
Markov assumption, where current state is only determined
by the state at previous epoch.
Indeed, by further analyzing the descriptions of job postings, we observe that the detail of similar recruitment demands (e.g., Recruiting Mobile Software Engineer) will be
influenced by the corresponding recruitment states. Thus
the corresponding demands usually have high variability,
and generate different recruitment topics. For example,
ฮฑ
ฯc
&
ce,t
ฮณ1
Gc
De,t,m
ฮณ2
&
H
Q0
ฯe,t,m,n
ฮงe,t,m,n
ฮณ0
0HW
of unique recruitment states is C. Specifically, at the first
epoch, the corresponding ce,1 for all companies is sampled
from a uniform distribution. For the following epochs, if
company e releases some job postings at previous epoch
t โ 1, namely that ฯe,tโ1 exists, its current recruitment
state ce,t is sampled from a multinomial distribution determined by previous state ce,tโ1 . Otherwise, ce,t is drawn from
the overall recruitment state at epoch t โ 1, i.e., P (ce,t ) =
PC
c=1 P (ce,t |ctโ1 = c)P (ctโ1 = c), where P (ctโ1 = c) is the
average P (ce0 ,tโ1 ) of company e0 who has market state c at
epoch t โ 1. In addition, we name the chains consisting of
neighbouring ฯe,tโ1 that belong to the same company as a
data chain. Therefore, if a company only occasionally releases jobs, it may have more than one data chain according
to our formulation.
Furthermore, we define the generative process of job posting ฯe,t,m โ ฯe,t of company e at epoch t as follows. First, a
recruitment demand De,t,m is generated from the latent factor Gc which is sampled from a Dirichlet Process and determined by the current recruitment state ce,t . Then, we sample a recruitment topic ฯe,t,m,n from the demand De,t,m for
each observation ฯe,t,m,n . Finally, each observation ฯe,t,m,n
is generated from a multinomial distribution determined by
corresponding topic ฯe,t,m,n . Specifically, Figure 3 shows
the graphical representation of MTLVM.
Figure 3: The graphical representation of MTLVM.
3.
Figure 2 shows the word cloud representation 1 of job postings related to โMobile Software Engineerโ with respect to
different epochs. We can observe that, โMobile Game Developmentโ is a hot topic in the second half of 2014, while
โAndroid based Web Technologyโ becomes popular in the
first half 2015. To model the semantic relationships among
recruitment states, recruitment demands, and recruitment
topics, our model, MTLVM, follows the idea of Hierarchical
Dirichlet Processes, an infinity version of topic modeling, to
model the job postings. Therefore the topic number can be
automatically determined.
In this section, we will introduce the technical details of
our model MTLVM. And we illustrate the important mathematical notations in Table 1.
2.2
3.1
MODELING THE TREND OF RECRUITMENT MARKET
Model Inference
According to the introduction in Section 2, we can summarize the parameterizations of MTLVM as follows,
ฯc |ฮฑ โผ Diri(ฮฑ),
ce,t |{ฯc }C
c=1 , ce,tโ1
Overview of MTLVM
Formally, we regard the m-th job posting of company e
at epoch t as a bag of words ฯe,t,m = {ฯe,t,m,n }n , where
ฯe,t,m,n is the basic observation in job postings (e.g., keywords in job description), and |ฯe,t,m | = Ne,t,m . For modeling the trend of recruitment market, we first divide all job
postings into different data units {ฯe,t }e,t with respect to
companies and timestamps, which contain job postings of
company e at epoch t.
As introduced above, we assume that the current recruitment state of a specific company is influenced by its state
in previous epoch, and it will impel the company to review
appropriate recruitment demands. Then, different recruitment demands will generate different recruitment topics,
which will finally generate the recruitment postings. Therefore, we define a parameter ce,t to represent the recruitment state of company e at epoch t, where the number
1
All the words are originally in Chinese, and are automatically translated by a commercial translation tool [1].
โผ Multi(ฯce,tโ1 ),
Q0 |H, ฮณ0 โผ DP(ฮณ0 , H),
Gc |Q0 , ฮณ1 โผ DP(ฮณ1 , Q0 ),
De,t,m |{Gc }C
c=1 , ฮณ2 , ce,t
โผ DP(ฮณ2 , Gce,t ),
ฯe,t,m,n |Ge,t,m โผ De,t,m ,
ฯe,t,m,n |ฯe,t,m,n โผ Multi(ฯe,t,m,n ).
Following the above parameterizations, we can get the
joint probability distribution of ฯ and c as
P (ฯ, c|ฮ) =
Y
P (ce,t |ce,tโ1 , ฮ)P (ฯe,t |ฮ, ce,t ) ,
(1)
e,t
where ฮ is a set of hyper-parameters, including ฮฑ, H, ฮณ0 ,
ฮณ1 , ฮณ2 , and c0 . Specifically, c0 is a default initial recruitment
state and ฯc0 is fixed to (1/C, ..., 1/C). Indeed, the above
equation can be divided into two parts, i.e., P (ce,t |ce,tโ1 , ฮ)
that follows a multinomial distribution Multi(ฯce,tโ1 ), and
P (ฯe,t |ฮ, ce,t ) that follows Dirichlet Processes, respectively.
Specifically, P (ฯe,t |ฮ, ce,t ) can be computed by
Table 1: Mathematical Notations.
Me,t
P (ฯe,t |ฮ, ce,t ) =
Y
P (De,t,m |ฮ, Gce,t ) ร
Symbol
Description
ฯe,t,m,n
The n-th tokens at m-th job posting of company
e at epoch t.
The m-th job posting of company e at epoch t.
The observation unit containing job postings of
company e at epoch t.
The entire data set of job postings.
The recruitment state of company e at epoch t.
The hyperparameter of the Dirichlet prior on ฯc .
The transition matrix of recruitment state c.
The probability measure representing the recruitment strategy of state c.
The probability measure representing the recruitment demand of ฯe,t,m .
The recruitment topic of the n-th tokens at m-th
job posting of company e at epoch t.
The base measure for Dirichlet Process generating Gc .
The concentration parameter for Dirichlet Process generating Q0 .
The concentration parameter for Dirichlet Process generating Gc .
The concentration parameter for Dirichlet Process generating De,t,m .
The base measure for Dirichlet Process generating Q0 .
A set of hyperparameters, including ฮฑ, H, ฮณ0 ,
ฮณ1 , ฮณ2 , and c0 .
The default initial recruitment state.
The number of tokens at m-th job posting of
company e at epoch t.
The number of job postings of company e at
epoch t.
The number of unique recruitment states.
m=1
ฯe,t,m
ฯe,t
Ne,t,m
Y
P (ฯe,t,m,n |ฮ, De,t,m )P (ฯe,t,m,n |ฯe,t,m,n ) .
(2)
n=1
ฯ
ce,t
ฮฑ
ฯ
Gc
Therefore, the objective of learning MTLVM is to find a set
of optimal parameters in P (ce,t |ce,tโ1 , ฮ), P (De,t,m |ฮ, Gce,t ),
P (ฯe,t,m,n |ฮ, De,t,m ), and P (ฯe,t,m,n |ฯe,t,m,n ), which can maximize the probability of Equation 1. In this paper, we propose a two-step framework to learn our model by a Gibbs
Sampling method.
In the first step, we introduce how to optimize the transition matrix ฯ, which is constituted of P (ce,t |ce,tโ1 , ฮ), given
P (ฯe,t |ฮ, ce,t ). Depending on equation 1, we could get the
conditional distribution of ce,t
P (ce,t = c|cโe,t , ฯ, ฮ) =
P (ce,t = c, ฯe,t |ฯโe,t , ฮ)
P (ฯe,t |cโe,t , ฯโe,t , ฮ)
โe,t
โ P (ฯe,t |ce,t = c, ฮ)P (ce,t = c|c
De,t,m
ฯe,t,m,n
Q0
ฮณ0
ฮณ1
(3)
ฮณ2
, ฮ).
H
Since P (ฯe,t |ce,t = c, ฮ) is given, the only challenge is to
calculate P (ce,t = c|cโe,t , ฮ). Here we follow the inference
in [16] and give it directly.
โe,t
P (ce,t = c|c
โe,t
+ฮฑ
e,tโ1 ,c)
โe,t
+Cฮฑ
q(c
e,tโ1 )
q(c
where
โe,t
q(c)
โe,t
+I(ctโ1 =c=ct+1 )+ฮฑ
e,t+1 )
โe,t
q(c) +I(ctโ1 =c)+Cฮฑ
Me,t
,
(4)
C
means the number of recruitment states c ap-
The Application of MTLVM
After learning stage, MTLVM can be used for predicting
the future trend of recruitment market, e.g., recruitment
states, demands, topics, and basic observations. Specifically,
given a company e, we can estimate its current recruitment
state ce,t by
ce,t = arg max P (c|ฯe,t , ce,tโ1 , ฯ, ฮ),
c
c0
Ne,t,m
, ฯ, ฮ) = P (ฯe,t |ce,t = c, ฮ) ยท
q(c,c
โe,t
pearing except ce,t , and q(c
means the number of pair
e,tโ1 ,c)
ce,tโ1 , c appearing except ce,t .
In the second step, we introduce how to compute the parameters related to Dirichlet Process in Equation 2. Indeed,
this task can be regarded as an analog of the Chinese Restaurant Process (CRP) [8], and the metaphor can be explained
as follows. We have C cuisine styles (i.e., recruitment state)
and a franchise (i.e., company) with Me,t restaurants (i.e.,
job postings). Everyday, the franchise will change its cuisine
style according to the cuisine styles on last day. In Particular, the menus of different restaurants may be different, even
if they share the same cuisine style. At each table of each
restaurant, the dish (i.e., topic) is determined by the first
customer (i.e., the basic observation in job postings) sitting
there, and it is shared among all customers who sit at that
table. When a new customer enters the restaurant, she can
sit at an occupied table or a new table. If she chooses a new
table, she can order a new dish from the menu. According to
the above metaphor of CRP, we can easily obtained a Gibbs
sampling scheme for posterior sampling given ฯ [28]. The
detailed definition and inference can be found in Appendix.
3.2
ฮ
(5)
where ฯ is the transition matrix, and
P (ce,t |ฯe,t , ce,tโ1 , ฯ, ฮ) โ P (ce,t , ฯe,t |ce,tโ1 , ฯ, ฮ)
= P (ฯe,t |ce,t , ฮ)P (ce,t |ce,tโ1 , ฯ).
(6)
Therefore, the probability of recruitment state at the next
epoch ce,t+1 can be obtained by P (ce,t+1 ) = Multi(ฯce,t ).
Furthermore, the recruitment topics can be obtained in the
same way introduced in Section 3.1. Thus, the probability
of a basic observation ฯe,t+1,k (e.g., keywords in job description) from company e appearing at epoch t + 1 can be
computed by
P (ฯe,t+1,k |ฮ) =
C
X
P (ฯe,t+1,k |ce,t+1 , ฮ)P (ce,t+1 ), (7)
ce,t+1 =1
where P (ฯe,t+1,k |ce,t+1 ) can be obtained by Equation 2.
4.
EXPERIMENTS
In this section, we will study the performance of our model
MTLVM on a huge data set collected from a major online
recruitment website in China.
Furthermore, we have developed a web-based prototype
system to empirically evaluate our model. This system can
visualize the results of our model, provide in-depth analysis
of recruitment market analysis, and help people understand
the high variability of recruitment market. Figure 4 shows
a screenshot of this prototype system. In this system, we
show the trend analysis of the entire recruitment market
and the detail evolution of recruitment state of companies.
Table 3: Average VM/CM comparison.
MTLVM (C=5)
MTLVM (C=10)
MTLVM (C=20)
LDA
K
VM
CM
105
100
118
100
0.464
0.682
0.688
0.637
5.044
6.783
6.279
6.722
learning recruitment states and recruitment topics). Specially, following [28], we set a symmetric Dirichlet distribution with parameters of 0.5 for the prior H over topic distributions. For simplicity, ฮณ0 , ฮณ1 , and ฮณ2 are set to 1 directly,
and another hyperparameter ฮฑ is also be set to 1 empirically.
4.2
Figure 4: A screenshot of our system for recruitment
market analysis.
All of following visualization results in this section can be
obtained by this prototype system.
Table 2: The statistics of our real-world data set.
Raw Data Filtered Data
#
#
#
#
4.1
job postings
unique companies
data units
data chains
934,761
68,302
191,549
116,392
257,166
997
13,209
2,557
Data Set and Experimental Setup
The data set used in our experiments is collected from
a major online recruitment website in China and contains
934,761 job postings from 68,302 companies released from
January 2014 to November 2015. Specially, Figure 5(a) to
5(d) demonstrate some statistics of our data set. As mentioned above, โdata unitโ in Figure 5(c) means a job posting
set ฯe,t released by company e at epoch t and โdata chainโ
means chains consisting of neighbouring ฯe,tโ1 that belong
to the same company. From these statistics we can observe
that most of companies only randomly release very few job
postings, and therefore cannot represent the trend of recruitment market. To avoid such bias, we only conserve companies which have released more than 100 job postings. Table 2
shows the detailed statistics of our raw data set and the filtered data set. By the above pre-process, we filtered about
72% original data; and the number of companies declined
by 98.6%. However, the average number of job postings per
company increases from 13.7 to 258, and the average length
of chain also increases from 1.65 to 5.16, which make it more
reasonable for training MTLVM.
In particular, in each job posting, the keywords in job
description (e.g., job responsibility, skill requirements) are
treated as basic observations, and all stop words are removed to guarantee the modeling performance. Note that,
our model is trained with original Chinese words, and all
experimental results were translated into English by a commercial translation tool [1] for facilitating demonstration.
In the following subsections, we will comprehensively study
the performance of MTLVM in term of trend analysis (e.g.,
Evaluation of Recruitment Topics
How to quantitatively evaluate the performance of latent
variable models is always an open problem. Although perplexity and held-out likelihood are common measures for
evaluating prediction results, they cannot demonstrate how
coherent and meaningful the latent factors (e.g., recruitment
states and topics) are.
Therefore, in this paper, we follow the measures introduced in [31], which is inspired by [30, 13], for evaluating
MTLVM. Specifically, we picked up top 10 keywords for each
learned recruitment topic and asked 4 senior experts of human resource to evaluate its value. These experts are first
required to judge whether this topic is valuable. If a topic is
valuable, they need continue to judge how many words are
relevant in the top 10 keyword list. Based on these manually labeled results, the metrics Validity Measure (VM) and
Coherence Measure (CM) are defined as
VM =
# of relevant words
# of valid topics
, CM =
.
# of topics
# of words in valid topics
Besides, to evaluate how the number of recruitment states
affects the performance, we train MTLVM with different settings of state number, i.e., C = 5, 10, 20 respectively. Furthermore, we select widely used topic model Latent Dirichlet
Allocation (LDA) [12] as baseline. After convergence, the
numbers of topic in all our models, i.e., K, are automatically determined as about 100. Therefore, we set K as 100
for LDA.
Table 3 shows the average results of VM and CM. We can
observe that in terms of VM, both of MTLVM (C=20) and
MTLVM (C=10) outperform LDA a lot, and MTLVM (C=20)
has the best performance. In terms of CM, the performance
of MTLVM (C=10) is the best, while that of MTLVM (C=20)
is worse than LDA. It may be because that too many states
will make the model relatively sparse, and thus will make
relevant words scattered in different topics. In particular,
the performance of MTLVM (C=5) is the worst, which may
be because that few states cannot accurately describe the
market trend well. Overall, since MTLVM (C=10) has the
most balanced results, we set state number C = 10 in all of
following experiments.
4.3
Evaluation of Recruitment States
Here, we will empirically evaluate the learned recruitment
states from several aspects.
Figure 6 shows the trend of popularity of recruitment
states discovered by MTLVM over time. It is obvious that
(a)
(b)
(c)
(d)
Figure 5: The distribution of (a) the number of companies that release job posting in different epochs, (b)
the number of companies with respect to the number of their job postings, (c) the number of data units with
respect to the number of contained job postings, and (d) the number of data chains with respect to their
length.
Table 4: The probabilities of top recruitment topics of selected recruitment states (e.g., #1, #3, #4,
#9). The corresponding word cloud representations
of these topics are shown in figure 8.
state #3 state #4 state #5 state #9
top
top
top
top
4.3.1
Figure 6: The trend of popularity of recruitment
states discovered by our model over time.
Figure 7: The transition matrix of recruitment
states, where the i, j element means the transition
probability from i-th state to j-th state, and deeper
color means higher probability.
these states change over time dramatically. Specifically,
state #3 kepng a relative high popularity over the long period, while popularity of #6 is always low. Meanwhile, the
popularity of state #9 is rising dramatically since February
2015. Several other states, such as state #2, #7, and #10,
represent totally opposite trends. Furthermore, Figure 7
shows the transition matrix of recruitment states, where the
element of i-th row and j-th column represents the transition probability from state i to state j. We can observe
that, all states have the highest transition probabilities to
themselves, which is due to the momentum of recruitment
market. Also, the color of 3-th, and 9-th columns is relatively deeper, which indicates the importance of states #3,
and #9. All of above results show that our model MTLVM
has the ability to capture the high variability of recruitment
market by discovering these latent recruitment states.
#1
#2
#3
#4
0.22493
0.12399
0.10064
0.08932
0.22172
0.17637
0.11360
0.08725
0.18185
0.10126
0.07735
0.07242
0.19441
0.12350
0.10018
0.08021
Recruitment State Inspection
Here, we will test whether the recruitment states discovered by our model are comprehensible. To solve this problem, we select 4 representative recruitment states according
to above analysis and show their top 4 topics in figure 8
by word cloud representations, where the larger words have
higher generative probabilities. Meanwhile, Table 4 shows
the corresponding generative probabilities of these topics.
We can find that the topic about โprogrammingโ always
has very high probability in every state. In particular, the
top #1 topics in state #1, state #3, and state #9 are
the same. That means the demands for R&D related positions are always exuberant, since the high-probability words,
โlinuxโ and โmysqlโ, directly indicate the fundamental skill
requirements of R&D. Actually, the salary of software engineer has kept rising for a long time, which can support
this discovery of our model. These states also show that
the work about games and front-end are also very popular,
which is consistent with our real-world observations. Next,
we โขfurther
illustrated
in top
figure
Stateinspect
#3. Itstates
is obvious
that the
#18.
topic is about
R&D. The top #3 topic, containing โdataโ, โanalysisโ,
โresearchโ, and โalgorithmโ, indicates the demand of
recruiting senior researchers or algorithmic engineers.
The top #4 topic may be about propaganda (e.g.,
public relationship), because it contains several paperwork and advertising related words, such as โcomposeโ,
โeditโ, โWeChatโ and โblogโ(e.g., social network based
advertising). Besides, what makes this state different is the top #2 topic, which contains โhumanโ, โresourceโ, โofficeโ, and โassistโ. All of them are about administrative management obviously. Actually, in our
model, this topic only exists in this state. Since research development, propagandism, and administrative management are essential to any companies, we
can conclude that this state covers the fundamental
talent demands for most by high-tech companies. And
(a) state #3
(b) state #4
(c) state #5
(d) state #9
Figure 8: The word cloud representations of top 4 topics of selected recruitment states (e.g., #3, #4, #5,
#9), where the size of each keyword is proportional to its generative provability. The generative probabilities
of these recruitment topics are shown in table 4.
figure 6 also indicates state #3 is the most popular.
โข State #4. This state is closely related to state #5.
We can find that the top #2, #3, and #4 topics are
relative normal. And the top #1 topic, which contains
โdataโ, โprogrammingโ, and โalgorithmโ, is apparently
about R&D, too. However, what makes this topic different is word โlbsโ. Location-based Service (LBS),
such as map navigation or map localization, is the cornerstone of O2O, which is a kind of business model
that uses online and mobile to drive offline local sales
and become more and more popular since 2014. In
figure 6, we notice that the popularity of this topic increased in 2014 and declined in 2015. This may be because the industry doorsill of this field is related high,
so only a few large companies have capability to get
into this field. Actually, only the largest IT companies
in China, such as Baidu, Tencent, and sogou, provide
such service now.
โข State #5. This is a very Chinese-style recruitment
state. In top #4 topic, we find word โO2Oโ as well
as โmerchantโ and โbusinessโ. Actually, with the proposal of โInternet Plusโ [5], thousands of start-up companies, focusing on O2O, sprung up across the country.
Meanwhile, the others topics in this state are related
normal in terms of technology. The top #1 and #3
topics are just about some popular programming language, web-framework, and database. It may indicate
that โO2Oโ is just a business concept rather than a
technology concept.
โข State #9. As shown in figure 6, this state exploded
since February 2015. In the word cloud representations of its topics, the top #4 is related meaningful.
These high frequency words (โBaiduโ, โdataโ, โminingโ, โlargeโ, โdistributedโ) indicate this is a big data
related topic (e.g., large-scale machine learning and
data mining). Its trend directly reveals that high-tech
companies, such as Baidu, have paid more attention to
big data related fields.
4.3.2
Visualization of Trend over Companies
Here, we evaluate our model by checking the trend of several representative companies from a few important fields,
such as Baidu is a famous high-tech company and Alibaba
is the largest E-Commerce company in China. We visualize
the evolution of the recruitment states of these companies
in figure 9.
From figure 9, we can first observe that state #3 is a very
common state among most of companies. It is consistent
with the analysis from topics of this state. Besides, we find
that state #4, which is relevant to LBS, appears relatively
frequently among Baidu, Sogou, and Tencent in 2014. Actually, all of these companies provide map service in China,
especially Baidu. Baidu Map is the most popular navigation tool in China and many O2O companies use LBS API
provided by Baidu to improve their services. So Baidu has
remarkable strengths in LBS and has paid much attention
to it indeed. Furthermore, Tencent, as one of the largest IT
companies in China, its business is very scattered and covers
many fields, such as game, social network, media, and entertainment. This kind of business strategy is directly reflected
in Figure 9, where the recruitment state of Tencent changes
frequently. Meanwhile, Baidu, Alibaba and Sogou (another
search engine) prefer state #9, which is relevant to big data
(e.g., large-scale machine learning and data mining), in 2015.
Considering that their core business (search engine and Ecommerce) has several data-related practical applications
(advertising and recommender system), the preference is
also reasonable. In addition, we happened to find an interesting company, Zuora, whose state is almost state #9.
Actually, Zuora is an enterprise software company that aim
to automate billing, commerce, and finance operations with
a subscription business model. Such business model is naturally related to big data processing and thus has need for
senior data-related talents.
Furthermore, we can observe that state #5, which is related to O2O, appears in company Tuniu, Qunar, and Feiniu
frequently. Indeed, all of these companies aim to connect
offline merchants and online customers, which is high consistent with O2O. Both of Tuniu and Qunar aim to provide
one-stop travel booking service, such as hotel, ticket, car
rental, and so on. And Feiniu is a B2C E-commerce wesite
which is invested by a large retail corporation. The goal of
its establishment is to fuse traditional offline service channel
with online sale channel.
4.4
Evaluation of of Model Application
Here, we will evaluate the proposed model by predicting
basic observations in future.
As introduced in Section 3, we make prediction by calculating the probability of basic observations with equation 7.
So in this experiment, we will compare the likelihood of overall observations in test set to prove the performance of our
model. The test set is built up by the following approach.
We extract the recruitment postings in November 2015, the
companies of which had also released some jobs in October
2015. It means all of companies in test set have recruitment
states in the previous time span. In the end, the test set
contains 350 companies and 4002 recruitment postings. Besides, all of recruitment postings between January 2014 and
October 2015 are treated as train data.
We select two model as baselines. One is dynamic Topic
Model (DTM) [11]. DTM is a classic topic model for analyzing evolution of topics. It assumes topics evolve smoothly
with respect to time and thus chains topics in adjacent
epochs by state space models. Its performance was proved
by predicting the next year of Science given all the articles
from the previous years in [11]. It is obvious that DTM cannot be used for prediction directly, but due to its assumption, the topics extracted by it can model future data better
than static topic models in some cases. In this experiment,
we follow this method to prove the assumption of DTM is
not very solid in our problem and indicate the necessity of
our model. The code of DTM was got from [2]. The number
of topics is set to 100 and all of other parameters are set to
default values.
In addition, we developed a simple sequence approach,
called Byesian multivariate Hidden Markov Model (B-mHMM),
as the other baseline. Compared with MTLVM, this baseline
associates states with words directly. The joint probability
distribution of B-mHMM is as follows
Y
Y
P (ce,t |ce,tโ1 , ฯ)
P (ฯ, c|ฯ, ฮน) =
e,t
P (ฯe,t,m,n |ce,t , ฮน) , (8)
m,n
where the first term is the same to equation 1. And as shown
in second term, we assume that given the recruitment state,
Table 5: The prediction performance of MTLVM
and baseline methods in terms of log likelihood.
log likelihood
MTLVM
B-mHMM
DTM
-2095737.793
-2133504.721
-2599529.728
all of observations ฯe,t,m,n are conditionally independent in
B-mHMM and P (ฯe,t,m,n |ce,t , ฮน) = M ulti(ฮนce,t ). By this
baseline, we aim to prove the latent hierarchical structure of
our model are meaningful for modeling recruitment markets.
Because of the similarity of B-mHMM and MTLVM, The
details and inference of B-mHMM follow those of MTLVM
and are omitted here.
Table 5 shows the log likelihood of prediction with respect
to different models. The larger number means better performance. Both of B-mHMM and MTLVM outperform DTM
largely. It indicates it is reasonable to employ latent recruitment states to model the trend of recruitment markets. And
the performance of MTLVM is also better than that of BmHMM. All of these clearly validate the effectiveness of the
proposed model.
5.
RELATED WORK
Generally, the related works of this paper can be grouped
into two categories, namely recruitment market analysis,
and sequential latent variable model.
5.1
Recruitment Market Analysis
Traditionally, recruitment market analysis can be regarded
as a classic topic in human capital economics, which attracts
generations of researchers to contribute ever since Adam
Smith. From the Macro perspective, labor is always a crucial
element in studying gross economy growth, money market,
exchange market and the equilibrium [26], ever since Solow
proposed his growth model. Therefore, economists usually
study topics about, for example, the demographic structure
and participation rate of labor, the relation between inflation
and unemployment rate, and how labor contributes in gross
productivity or expenditures, etc [27]. In another Micro perspective, which is more relevant to our paper, all studies are
set off from a basic market cleaning framework [29], where
all employees choose their best balance between leisure and
work, while all employers hire with budget constrain, and
consequently the wage is derived as the marginal labor cost.
Later researches improve our understandings by releasing
constraints [19] (e.g., acknowledging the market with segmentations/barriers and as non-cleaning), or by detailed investigations (e.g., forming better utility functions of employees, and studying the actions of employees with game theory). Recently, several researchers in computer science try
to employ data mining technology to solve these problems,
such as offer categorization [24], job skill analysis [22].
However, previous research in economics efforts relies largely
on the knowledge of domain experts or classic statistical
models, and thus are usually too general to capture the
high variability of recruitment market, and neglect the finegrained market trend. On the other hand, the recent research in computer science still focuses on those traditional
human resource problems. Therefore, in this paper we pro-
Figure 9: Visualization of the change of recruitment states over several companies, with different colors
representing different states.
pose a new research paradigm for recruitment market analysis by leveraging unsupervised learning approach.
5.2
Sequential Latent Variable Model
Indeed, our novel sequential latent variable model MTLVM
can be regarded as a combination of both Hidden Markov
Model (HMM) and Hierarchical Dirichlet Processes (HDP)
within a Bayesian generative framework, which can intrinsically capture the sequential dependency and variability of
latent variable (e.g., recruitment states and topics).
Specially, HMM based sequential latent variable models
have been successfully applied to problems in a variety of
fields, such as signal processing and speech recognition [25,
21], biometrics [15], genetics [14, 23], economics [18], and
mobile Internet mining [20, 9, 33]. For much of their history,
HMMs have been implemented by using recursive algorithms
developed for parameter estimation [10], which are viewed
as โblack boxesโ by many statisticians. In recent years, some
researchers proposed to use Bayesian methods to simulate
HMM parameters from the posterior distribution, which can
provide more scalable and stable process of parameter estimation for HMM [16, 17]. Compared with the traditional
maximum-likelihood estimation (MLE) based HMM learning solution, the Bayesian methods can directly maximize
the probability of the hidden variables given the observed
data by integrating over all possible parameter values rather
than searching for an optimal set of parameter values. To
this end, the model proposed in this paper also follows a
Bayesian generative framework.
Latent Dirichlet Allocation (LDA) [12] based latent variable models, have become one of the most powerful tools for
mining textual data. However, most topic models [11, 31,
32] need a predefined parameter to indicate the number of
topics, and thus fail to capture the variability of topics. To
this end, the Hierarchical Dirichlet Processes (HDP) [28] is
proposed as an infinity version of topic model, which can
automatically learn the number of topics. Therefore, in this
paper we propose to ingrate HDP into our MTLVM for capturing the variability of latent recruitment topics.
6.
CONCLUSION
In this paper, we provided a large-scale data driven analysis of recruitment market trends. Specifically, we developed
a novel sequential latent variable model, named MTLVM,
which is designed for capturing the temporal dependencies
of corporate recruitment states and is able to automatically
learn the latent recruitment topics within a Bayesian generative framework. Moreover, to capture the variability of
recruitment topics over time, we designed hierarchical dirichlet processes for MTLVM. These processes allow to dynamically generate recruitment topics. Finally, we implemented
a prototype system to empirically evaluate our approach
based on large-scale real-world recruitment data. The results showed that our approach could effectively discover
recruitment market trends and provide guidances for both
job recruiters and job seekers.
7.
APPENDIX
Here, we will describe an analog of Chinese Restaurant
Process (CRP) for P (ฯe,t |ฮ, ce,t ) and corresponding inference in detail. Specifically, we first define {ฯe,t,m,z }z as variables sampled from Gce,t for each job posting and |ฯe,t,m | =
Ze,t,m . Each ฯe,t,m,n is linked with a ฯe,t,m,z and ze,t,m,n
is the index of ฯe,t,m,z for ฯe,t,m,n . In other words, we have
ฯe,t,m,n = ฯe,t,m,ze,t,m,n . Besides, let ie,t,m,z denote the
number of {ฯe,t,m,n }n linked with ฯe,t,m,z . According to
CRP, we can integrate out the De,t,m and get the conditional distribution of ฯe,t,m,n as follows.
ฯe,t,m,n |ฯe,t,m,1 , ..., ฯe,t,m,nโ1 , {Gc }c , ce,t , ฮณ2 โผ
Ze,t,m
X
z=1
ฮณ2
ie,t,m,z
ฮดฯ
+
Gc ,
n โ 1 + ฮณ2 e,t,m,z
n โ 1 + ฮณ2 e,t
(9)
where ฮดฯ is a probability measure concentrated at ฯ.
If a new ฯ is sampled, it indicates the second term on the
right-hand side of equation 9 is chosen. Then we need to add
Ze,t,m by 1, sample a new ฯ by equation 10, and allocate
ฯe,t,m,n to it. If the sampled value is an existed ฯ, we just
need allocate ฯe,t,m,n to it.
Second, we define {ฮทc,s }s as variables sampled from G0
for each recruitment state and |ฮทc | = Sc . Each ฯe,t,m,z is
linked with a ฮทc,s and se,t,m,z is the index of ฮทc,s for ฯe,t,m,z .
In other words, ฯe,t,m,z = ฮทc,se,t,m,z . Besides, let jc,s denote
the number of {ฯe,t,m,z }e,t,m , which is linked with ฮทc,s and
ce,t = c. Similarly, we can integrate out Gc and get the
conditional distribution of ฯe,t,m,z as follows.
ฯe,t,m,z |ฯ1,1,1,1 , ..., ฯe,t,m,zโ1 , Q0 , ฮณ1 โผ
Psc
j
j
Psc c,s
ฮดฮทc,s + Psc c,s
Q0 .
s=1
j
+ฮณ
j
+ฮณ
s=1 c,s
1
s=1 c,s
The sampling process is similar to ฯ.
1
(10)
Third, we let {ฮธk }k denote the variables sampled from
H and |ฮธ| is K. Each ฮทc,s is linked with a ฮธk and kc,s is
the index of ฮธk for ฮทc,s , i.e., ฮทc,s = ฮธkc,s . And we also let
ok denote the number of {ฮทc,s }c,s . Now we can write the
conditional distribution of ฮทc,s directly as
ฮทc,s |ฮท1,1 , ..., ฮทc,sโ1 , H, ฮณ0 โผ
PK
k=1
PK
ok
ฮด
ok +ฮณ0 ฮธk
+
k=1
PK
ok
H.
ok +ฮณ0
(11)
k=1
Next, we will describe a Gibbs sampling method yielded
from above. Specifically, we follow the inference method
in [28] and sample z, s, k and ฮธ, rather than dealing with ฯ,
ฯ and ฮท directly.
Sampling z, s, and k. Relying on equation 9, we can
easily compute the conditional distribution of ze,t,m,n by
P (ze,t,m,n = z|z โe,t,m,n , s, k, ฮธ, ฯ) โ
(
new,
ฮณ2 P (ฯe,t,m,n |ฮธke,se,t,m,z )
used,
iโe,t,m,n
e,t,m,z P (ฯe,t,m,n |ฮธke,se,t,m,z )
(12)
where iโe,t,m,n
is ie,t,m,z except the variable ฯe,t,m,n . The
e,t,m,z
likelihood of ze,t,m,n = z is simply P (ฯe,t,m,n |ฮธke,se,t,m,z )
given all of other variables. And the prior probability that
ze,t,m,n samples an existed ฯe,t,m,z is proportional to iโe,t,m,n
e,t,m,z
is ie,t,m,z . Its prior probability for a new ฯ is proportional
to ฮณ2 . The process of sampling s and k is similar to that of
sampling z.
Sampling ฮธ. Given z, s, and k, {ฮธk }k are mutually independent. So the conditional distribution for each ฮธk is only
related with all of ฯ that linked with it. It follows
P (ฮธk |z, t, k, ฮธโk , ฯ) โ h(ฮธk ) ยท
Q
c,s:kc,s =k
Q
e,t:ce,t =c
Q
m,z:se,t,m,z =s
Q
n:ze,t,m,n =z
P (ฯe,t,m,n |ฮธk ),
(13)
where h(ฮธk ) is the density of measure H at parameter ฮธk .
8.
REFERENCES
[1] Baidu translation. http://fanyi.baidu.com/.
[2] Code of dynamic topic model.
https://code.google.com/archive/p/
princeton-statistical-learning/downloads.
[3] Dice. http://www.dice.com/.
[4] Forbes article. http://suo.im/gxxz0.
[5] Internet plus.
https://en.wikipedia.org/wiki/Internet Plus.
[6] Lagou. http://www.lagou.com/.
[7] Linkedin. http://www.linkedin.com/.
[8] D. J. Aldous. Exchangeability and related topics.
Springer, 1985.
[9] T. Bao, H. Cao, E. Chen, J. Tian, and H. Xiong. An
unsupervised approach to modeling personalized
contexts of mobile users. Knowledge and Information
Systems, 31(2):345โ370, 2012.
[10] L. E. Baum, T. Petrie, G. Soules, and N. Weiss. A
maximization technique occurring in the statistical
analysis of probabilistic functions of markov chains.
The annals of mathematical statistics, 41(1):164โ171,
1970.
[11] D. M. Blei and J. D. Lafferty. Dynamic topic models.
In Proceedings of the 23rd international conference on
Machine learning, pages 113โ120. ACM, 2006.
[12] D. M. Blei, A. Y. Ng, and M. I. Jordan. Latent
dirichlet allocation. the Journal of machine Learning
research, 3:993โ1022, 2003.
[13] J. Chang, S. Gerrish, C. Wang, J. L. Boyd-Graber,
and D. M. Blei. Reading tea leaves: How humans
interpret topic models. In Advances in neural
information processing systems, pages 288โ296, 2009.
[14] G. A. Churchill. Stochastic models for heterogeneous
dna sequences. Bulletin of mathematical biology,
51(1):79โ94, 1989.
[15] D. R. Fredkin and J. A. Rice. Bayesian restoration of
single-channel patch clamp recordings. Biometrics,
pages 427โ448, 1992.
[16] S. Goldwater and T. Griffiths. A fully bayesian
approach to unsupervised part-of-speech tagging. In
Annual meeting-association for computational
linguistics, volume 45, page 744. Citeseer, 2007.
[17] S. Guha, L. Yi, and D. Neuberg. Bayesian hidden
markov modeling of array cgh data. Journal of the
American Statistical Association, 103:485โ497, 2008.
[18] J. D. Hamilton. A new approach to the economic
analysis of nonstationary time series and the business
cycle. Econometrica: Journal of the Econometric
Society, pages 357โ384, 1989.
[19] T. Hayashi and T. Sakai. Nash implementation of
competitive equilibria in the job-matching market.
International Journal of Game Theory, 38(4):453โ467,
2009.
[20] B. Huai, E. Chen, H. Zhu, H. Xiong, T. Bao, Q. Liu,
and J. Tian. Toward personalized context recognition
for mobile users: a semisupervised bayesian hmm
approach. ACM Transactions on Knowledge Discovery
from Data (TKDD), 9(2):10, 2014.
[21] B.-H. Juang and L. R. Rabiner. Hidden markov
models for speech recognition. Technometrics,
33(3):251โ272, 1991.
[22] C. Litecky, A. J. Igou, and A. Aken. Skills in the
management oriented is and enterprise system job
markets. In Proceedings of the 50th annual conference
on Computers and People Research, pages 35โ44.
ACM, 2012.
[23] J. S. Liu, A. F. Neuwald, and C. E. Lawrence.
Markovian structures in biological sequence
alignments. Journal of the American Statistical
Association, 94(445):1โ15, 1999.
[24] E. Malherbe, M. Cataldi, and A. Ballatore. Bringing
order to the job market: Efficient job offer
categorization in e-recruitment. In Proceedings of the
38th International ACM SIGIR Conference on
Research and Development in Information Retrieval,
pages 1101โ1104. ACM, 2015.
[25] L. R. Rabiner. A tutorial on hidden markov models
and selected applications in speech recognition.
Proceedings of the IEEE, 77(2):257โ286, 1989.
[26] D. Romer and C. Chow. Advanced Macroeconomic
Theory. Mcgraw-hill, 1996.
[27] C. Shapiro and J. E. Stiglitz. Equilibrium
unemployment as a worker discipline device. The
American Economic Review, 74(3):433โ444, 1984.
[28] Y. W. Teh, M. I. Jordan, M. J. Beal, and D. M. Blei.
Hierarchical dirichlet processes. Journal of the
american statistical association, 101(476), 2006.
[29] H. R. Varian and J. Repcheck. Intermediate
microeconomics: a modern approach, volume 6. WW
Norton & Company New York, NY, 2010.
[30] P. Xie and E. P. Xing. Integrating document
clustering and topic modeling. arXiv preprint
arXiv:1309.6874, 2013.
[31] H. Zhang, G. Kim, and E. P. Xing. Dynamic topic
modeling for monitoring market competition from
online text and image data. In Proceedings of the 21th
ACM SIGKDD International Conference on
Knowledge Discovery and Data Mining, pages
1425โ1434. ACM, 2015.
[32] C. Zhu, H. Zhu, Y. Ge, E. Chen, Q. Liu, T. Xu, and
H. Xiong. Tracking the evolution of social emotions
with topic models. Knowledge and Information
Systems, pages 1โ28, 2015.
[33] H. Zhu, C. Liu, Y. Ge, H. Xiong, and E. Chen.
Popularity modeling for mobile apps: A sequential
approach. Cybernetics, IEEE Transactions on,
45(7):1303โ1314, 2015.
| 2cs.AI
|
Matrix Completion and Related Problems via Strong Duality
Maria-Florina Balcanโ
Yingyu Liangโ
David P. Woodruffโก
Hongyang Zhangยง
arXiv:1704.08683v3 [cs.DS] 19 Jan 2018
Abstract
This work studies the strong duality of non-convex matrix factorization problems: we show that
under certain dual conditions, these problems and its dual have the same optimum. This has been well
understood for convex optimization, but little was known for non-convex problems. We propose a novel
analytical framework and show that under certain dual conditions, the optimal solution of the matrix
factorization program is the same as its bi-dual and thus the global optimality of the non-convex program
can be achieved by solving its bi-dual which is convex. These dual conditions are satisfied by a wide
class of matrix factorization problems, although matrix factorization problems are hard to solve in full
generality. This analytical framework may be of independent interest to non-convex optimization more
broadly.
We apply our framework to two prototypical matrix factorization problems: matrix completion and
robust Principal Component Analysis (PCA). These are examples of efficiently recovering a hidden matrix
given limited reliable observations of it. Our framework shows that exact recoverability and strong duality
hold with nearly-optimal sample complexity guarantees for matrix completion and robust PCA.
โ
Carnegie Mellon University. Email: [email protected]
University of Wisconsin-Madison. Email: [email protected]
โก
Carnegie Mellon University. Email: [email protected]
ยง
Corresponding author. Carnegie Mellon University. Email: [email protected]
โ
1
Introduction
Non-convex matrix factorization problems have been an emerging object of study in theoretical computer science [JNS13, Har14, SL15, RSW16], optimization [WYZ12, SWZ14], machine learning [BNS16, GLM16,
GHJY15, JMD10, LLR16, WX12], and many other domains. In theoretical computer science and optimization, the study of such models has led to significant advances in provable algorithms that converge to local
minima in linear time [JNS13, Har14, SL15, AAZB+ 16, AZ16]. In machine learning, matrix factorization
serves as a building block for large-scale prediction and recommendation systems, e.g., the winning submission for the Netflix prize [KBV09]. Two prototypical examples are matrix completion and robust Principal
Component Analysis (PCA).
This work develops a novel framework to analyze a class of non-convex matrix factorization problems
with strong duality, which leads to exact recoverability for matrix completion and robust Principal Component
Analysis (PCA) via the solution to a convex problem. The matrix factorization problems can be stated
as finding a target matrix Xโ in the form of Xโ = AB, by minimizing the objective function H(AB) +
1
2
n1 รr and B โ Rrรn2 with a known value of r min{n , n }, where
1 2
2 kABkF over factor matrices A โ R
H(ยท) is some function that characterizes the desired properties of Xโ .
Our work is motivated by several promising areas where our analytical framework for non-convex matrix
factorizations is applicable. The first area is low-rank matrix completion, where it has been shown that
a low-rank matrix can be exactly recovered by finding a solution of the form AB that is consistent with
the observed entries (assuming that it is incoherent) [JNS13, SL15, GLM16]. This problem has received a
tremendous amount of attention due to its important role in optimization and its wide applicability in many
areas such as quantum information theory and collaborative filtering [Har14, ZLZ16, BZ16]. The second area
is robust PCA, a fundamental problem of interest in data processing that aims at recovering both the low-rank
and the sparse components exactly from their superposition [CLMW11, NNS+ 14, GWL16, ZLZC15, ZLZ16,
YPCC16], where the low-rank component corresponds to the product of A and B while the sparse component
is captured by a proper choice of function H(ยท), e.g., the `1 norm [CLMW11, ABHZ16]. We believe our
analytical framework can be potentially applied to other non-convex problems more broadly, e.g., matrix
sensing [TBSR15], dictionary learning [SQW17a], weighted low-rank approximation [RSW16, LLR16], and
deep linear neural network [Kaw16], which may be of independent interest.
Without assumptions on the structure of the objective function, direct formulations of matrix factorization
problems are NP-hard to optimize in general [HMRW14, ZLZ13]. With standard assumptions on the structure
of the problem and with sufficiently many samples, these optimization problems can be solved efficiently, e.g.,
by convex relaxation [CR09, Che15]. Some other methods run local search algorithms given an initialization
close enough to the global solution in the basin of attraction [JNS13, Har14, SL15, GHJY15, JGN+ 17].
However, these methods have sample complexity significantly larger than the information-theoretic lower
bound; see Table 1 for a comparison. The problem becomes more challenging when the number of samples is
small enough that the sample-based initialization is far from the desired solution, in which case the algorithm
can run into a local minimum or a saddle point.
Another line of work has focused on studying the loss surface of matrix factorization problems, providing
positive results for approximately achieving global optimality. One nice property in this line of research is that
there is no spurious local minima for specific applications such as matrix completion [GLM16], matrix sensing [BNS16], dictionary learning [SQW17a], phase retrieval [SQW16], linear deep neural networks [Kaw16],
etc. However, these results are based on concrete forms of objective functions. Also, even when any local
minimum is guaranteed to be globally optimal, in general it remains NP-hard to escape high-order saddle
points [AG16], and additional arguments are needed to show the achievement of a local minimum. Most
importantly, all existing results rely on strong assumptions on the sample size.
1
Strong Duality
Primal Problem (1)
Bi-Dual Problem (2)
X
AB
Surface of (1) Surface of (2)
By Theorem 3.3
+ Dual Certificate
Common Optimal Solution
Figure 1: Strong duality of matrix factorizations.
1.1
Our Results
Our work studies the exact recoverability problem for a variety of non-convex matrix factorization problems.
The goal is to provide a unified framework to analyze a large class of matrix factorization problems, and to
achieve efficient algorithms. Our main results show that although matrix factorization problems are hard
to optimize in general, under certain dual conditions the duality gap is zero, and thus the problem can be
converted to an equivalent convex program. The main theorem of our framework is the following.
Theorems 3.3 (Strong Duality. Informal). Under certain dual conditions, strong duality holds for the
non-convex optimization problem
1
e B)
e =
(A,
argmin
F (A, B) = H(AB) + kABk2F , H(ยท) is convex and closed,
(1)
2
AโRn1 รr ,BโRrรn2
where โthe function H(ยท) is closedโ means that for each ฮฑ โ R, the sub-level set {X โ Rn1 รn2 : H(X) โค ฮฑ}
is a closed set. In other words, problem (1) and its bi-dual problem
e = argmin H(X) + kXkrโ ,
X
(2)
XโRn1 รn2
eB
e = X,
e where kXkrโ is a convex function defined
have exactly the same optimal solutions in the sense that
PA
r
1
2
2
2
by kXkrโ = maxM hM, Xi โ 2 kMkr and kMkr = i=1 ฯi (M) is the sum of the first r largest squared
singular values.
Theorem 3.3 connects the non-convex program (1) to its convex counterpart via strong duality; see Figure
1. We mention that strong duality rarely happens in the non-convex optimization region: low-rank matrix
approximation [OW92] and quadratic optimization with two quadratic constraints [BE06] are among the few
paradigms that enjoy such a nice property. Given strong duality, the computational issues of the original
problem can be overcome by solving the convex bi-dual problem (2).
The positive result of our framework is complemented by a lower bound to formalize the hardness of the
above problem in general. Assuming that the random 4-SAT problem is hard (see Conjecture 1) [RSW16],
we give a strong negative result for deterministic algorithms. If also BPP = P (see Section 6 for a discussion),
then the same conclusion holds for randomized algorithms succeeding with probability at least 2/3.
Theorem 6.1 (Hardness Statement. Informal). Assuming that random 4-SAT is hard on average, there is
a problem in the form of (1) such that any deterministic algorithm achieving (1 + )OPT in the objective
function value with โค 0 requires 2โฆ(n1 +n2 ) time, where OPT is the optimum and 0 > 0 is an absolute
constant. If BPP = P, then the same conclusion holds for randomized algorithms succeeding with probability
at least 2/3.
Our framework only requires the dual conditions in Theorem 3.3 to be verified. We will show that two
prototypical problems, matrix completion and robust PCA, obey the conditions. They belong to the linear
inverse problems of form (1) with a proper choice of function H(ยท), which aim at exactly recovering a hidden
matrix Xโ with rank(Xโ ) โค r given a limited number of linear observations of it.
For matrix completion, the linear measurements are of the form {Xโij : (i, j) โ โฆ}, where โฆ is the
support set which is uniformly distributed among all subsets of [n1 ] ร [n2 ] of cardinality m. With strong
2
Table 1: Comparison of matrix completion methods. Here ฮบ = ฯ1 (Xโ )/ฯr (Xโ ) is the condition number of
e obeys kX
e โ Xโ kF โค , n(1) = max{n1 , n2 } and
Xโ โ Rn1 รn2 , is the accuracy such that the output X
n(2) = min{n1 , n2 }. The first line of ours is an information-theoretic upper bound and the second line is a
polynomial-time approach.
Work
Sample Complexity
ยต-Incoherence
โ
[JNS13]
O ฮบ4 ยต2 r4.5 n(1) log n(1) log rkX kF
Condition (3)
โ 2
โ
n kX k
kX kF
[Har14]
O ยตrn(1) (r + log (1) F
Condition (3)
ฯ2
r
O(max{ยต6 ฮบ16 r4 , ยต4 ฮบ4 r6 }n(1) log2 n(1) )
n
o
qn
O(rn(1) ฮบ2 max ยต log n(2) , n(1) ยต2 r6 ฮบ4
[GLM16]
[SL15]
[ZWL15]
[KMO10a]
[Gro11]
[Che15]
Ours
Lower Bound1 [CT10]
O
ยต2 r4 ฮบ2
(1)
ฮบ2 max(ยต, log n
+ ยตr log
kXโ kF
(1) ))
ยต
โ
n(2) kX kF
Condition (3)
kXโ kF
n(1) log
1
3n
O
ยตr
log
n
log
(1)
(1)
n
o
qn
qn
O n(2) r n(1) ฮบ2 max ยต log n(2) , ยต2 r n(1) ฮบ4
(2)
(2)
2
โ
Condition (3)
(2)
O(ยตr2 n
[ZL16]
[GLZ17]
kXโi: k2 โค
O(ยตrn(1) log n(1) )
O(ยตrn(1) log2 n(1) )
O(ยตrn(1) log n(1) )
2
O(ฮบ ยตrn(1) log(n(1) ) log2ฮบ (n(1) ))
โฆ(ยตrn(1) log n(1) )
Condition (3)
Condition (3)
Similar to (3) and (13)
Conditions (3) and (13)
Condition (3)
Condition (3)
Condition (3)
Condition (3)
duality, we can either study the exact recoverability of the primal problem (1), or investigate the validity of
its convex dual (or bi-dual) problem (2). Here we study the former with tools from geometric functional
analysis. Recall that in the analysis of matrix completion, one typically requires a ยต-incoherence condition
for a given rank-r matrix Xโ with skinny SVD UฮฃVT [Rec11, CT10]:
r
r
ยตr
ยตr
T
T
,
and
kV ei k2 โค
,
for all i
(3)
kU ei k2 โค
n1
n2
where ei โs are vectors with i-th entry equal to 1 and other entries equal to 0. The incoherence condition
claims that information spreads throughout the left and right singular vectors and is quite standard in the
matrix completion literature. Under this standard condition, we have the following results.
Theorems 4.1, 4.3, and 4.2 (Matrix Completion. Informal). Xโ โ Rn1 รn2 is the unique matrix of rank
at most r that is consistent with the m measurements with high probability, provided m = O(ยต(n1 +
n2 )r log(n1 + n2 )) and Xโ satisfies incoherence (3). In addition, there exists a convex optimization for
matrix completion in the form of (2) that exactly recovers Xโ with high probability, provided that m =
O(ฮบ2 ยต(n1 + n2 )r log(n1 + n2 ) log2ฮบ (n1 + n2 )), where ฮบ is the condition number of Xโ .
To the best of our knowledge, our result is the first to connect convex matrix completion to non-convex
matrix completion, two parallel lines of research that have received significant attention in the past few years.
Table 1 compares our result with prior results.
For robust PCA, instead of studying exact recoverability of problem (1) as for matrix completion, we
investigate problem (2) directly. The robust PCA problem is to decompose a given matrix D = Xโ + Sโ
into the sum of a low-rank component Xโ and a sparse component Sโ [ANW12]. We obtain the following
theorem for robust PCA.
1
This lower bound is information-theoretic.
3
Theorems 5.1 (Robust PCA. Informal). There exists a convex optimization formulation for robust PCA in
โ
n1 รn2 and Sโ โ Rn1 รn2 with high
the form of problem (2) that exactly recovers
the incoherent
matrix X โ R
min{n
,n
}
1 2
probability, even if rank(Xโ ) = ฮ ยต log2 max{n
and the size of the support of Sโ is m = ฮ(n1 n2 ),
1 ,n2 }
where the support set of Sโ is uniformly distributedq
among all sets of cardinality m, and the incoherence
ฯr (Xโ ).
parameter ยต satisfies constraints (3) and kXโ kโ โค nยตr
1 n2
The bounds in Theorem 5.1 match the best known results in the robust PCA literature when the supports
of Sโ are uniformly sampled [CLMW11], while our assumption is arguably more intuitive; see Section 5.
Note that our results hold even when Xโ is close to full rank and a constant fraction of the entries have noise.
Independently of our work, Ge et al. [GJY17] developed a framework to analyze the loss surface of low-rank
problems, and applied the framework to matrix completion and robust PCA. Their bounds are: for matrix
completion, the sample complexity is O(ฮบ6 ยต4 r6 (n1 + n2 ) log(n1 + n2)); forrobust PCA, the outlier entries
1 n2
are deterministic and the number that the method can tolerate is O nยตrฮบ
5 . Zhang et al. [ZWG17] also
studied the robust PCA problem using non-convex optimization, where the
outlier entries are deterministic
1 n2
and the number of outliers that their algorithm can tolerate is O nrฮบ
. The strong duality approach is
unique to our work.
1.2
Our Techniques
Reduction to Low-Rank Approximation. Our results are inspired by the low-rank approximation problem:
min
AโRn1 รr ,BโRrรn2
1
e โ ABk2 .
kโฮ
F
2
(4)
We know that all local solutions of (4) are globally optimal (see Lemma 3.1) and that strong duality holds for
e โ Rn1 รn2 [GRG16]. To extend this property to our more general problem (1), our main
any given matrix โฮ
insight is to reduce problem (1) to the form of (4) using the `2 -regularization term. While some prior work
attempted to apply a similar reduction, their conclusions either depended on unrealistic conditions on local
solutions, e.g., all local solutions are rank-deficient [HYV14, GRG16], or their conclusions relied on strong
assumptions on the objective functions, e.g., that the objective functions are twice-differentiable [HV15].
e For concrete
Instead, our general results formulate strong duality via the existence of a dual certificate ฮ.
applications, the existence of a dual certificate is then converted to mild assumptions, e.g., that the number
of measurements is sufficiently large and the positions of measurements are randomly distributed. We will
illustrate the importance of randomness below.
e may not exist in the deterministic world.
The Blessing of Randomness. The desired dual certificate ฮ
A hardness result [RSW16] shows that for the problem of weighted low-rank approximation, which can
be cast in the form of (1), without some randomization in the measurements made on the underlying low
rank matrix, it is NP-hard to achieve a good objective value, not to mention to achieve strong duality. A
similar phenomenon was observed for deterministic matrix completion [HM12]. Thus we should utilize such
randomness to analyze the existence of a dual certificate. For matrix completion, the assumption that the
measurements are random is standard, under which, the angle between the space โฆ (the space of matrices
which are consistent with observations) and the space T (the space of matrices which are low-rank) is
small with high probability, namely, Xโ is almost the unique low-rank matrix that is consistent with the
measurements. Thus, our dual certificate can be represented as another form of a convergent Neumann series
concerning the projection operators on the spaces โฆ and T . The remainder of the proof is to show that such a
construction obeys the dual conditions.
To prove the dual conditions for matrix completion, we use the fact that the subspace โฆ and the
complement space T โฅ are almost orthogonal when the sample size is sufficiently large. This implies
4
the projection of our dual certificate on the space T โฅ has a very small norm, which exactly matches the dual
conditions.
Non-Convex Geometric Analysis. Strong duality implies that the primal
problem (1) and its bi-dual problem (2) have exactly the same solutions
ฮฉ"
e
e
e
in the sense that AB = X. Thus, to show exact recoverability of linear
inverse problems such as matrix completion and robust PCA, it suffices to
study either the non-convex primal problem (1) or its convex counterpart
(2). Here we do the former analysis for matrix completion. We mention
0
# โ {& โ }
that traditional techniques [CT10, Rec11, CRPW12] for convex optimization break down for our non-convex problem, since the subgradient of a
non-convex objective function may not even exist [BV04]. Instead, we
apply tools from geometric functional analysis [Ver09] to analyze the Descent Cone ) (& โ )
*
geometry of problem (1). Our non-convex geometric analysis is in stark
contrast to prior techniques of convex geometric analysis [Ver15] where
Figure 2: Feasibility.
convex combinations of non-convex constraints were used to define the
Minkowski functional (e.g., in the definition of atomic norm) while our method uses the non-convex constraint
null(A)
itself.
For matrix completion, problem (1) has two hard constraints: a) the rank of the output matrix should be
no larger than r, as implied by the form of AB; b) the output matrix should be consistent with the sampled
measurements, i.e., Pโฆ (AB) = Pโฆ (Xโ ). We study the feasibility condition of problem
(1)โ )from a geometric
-. (&
โ
eB
e = X is the unique feasible solution to problem (1) if and only if starting from Xโ , the0
perspective: A
rank of Xโ + D increases for all directions Dโs in the constraint set โฆโฅ = {D โ Rn1 รn2 : Pโฆ (Xโ + D) = /01 ร03 45
โ
45
) โฉ /01 ร03that
. (&requirement
Pโฆ (Xโ )} (a.k.a. the feasibility condition). This can be geometrically interpreted as-the
the
descent cone DS (Xโ ) = {t(X โ Xโ ) โ Rn1 รn2 : rank(X) โค r, t โฅ 0} and the constraint set โฆโฅ must
intersect uniquely at 0 (see Figure 2), which means Xโ is the unique matrix that satisfies the constraints a)
and b). This is shown by the following tangent cone argument.
Let S be the set of all matrices with rank at most r around the underlying matrix Xโ . In the tangent cone
argument, by definition, DS (Xโ ) is a subset of the tangent cone of S at Xโ . The latter cone of interest has a
very nice form, namely, it is just the space T mentioned above (the space of matrices which are low-rank).
Now leverage results from prior work which imply T โฉ โฆโฅ = {0} with a large enough sample size. Namely,
among all matrices of the form Xโ + D, D = 0 is the only matrix such that rank(Xโ + D) โค r and Xโ + D
is consistent with the observations.
Using this argument, we can show that the sample size needed for exact recovery in matrix completion
matches the known lower bound up to a constant factor.
Putting Things Together. We summarize our new analytical framework with the following figure.
Geometric
Analysis
Exact Recovery by Non-Convex Problem (1)
with Optimal Sample Complexity
Non-Convex Problem (1)
Exact Recovery by Convex
Problem (2)
(NP-hard in general)
Randomness
Construction of
Dual Certificate Reduction to
Strong Duality
Low-Rank
Approximation
Other Techniques. An alternative method is to investigate the exact recoverability of problem (2) via
standard convex analysis. We find that the sub-differential of our induced function k ยท krโ is very similar to
5
that of the nuclear norm. With this observation, we prove the validity of robust PCA in the form of (2) by
combining this property of k ยท krโ with standard techniques from [CLMW11].
2
Preliminaries
We will use calligraphy to represent a set, bold capital letters to represent a matrix, bold lower-case letters to
represent a vector, and lower-case letters to represent scalars. Specifically, we denote by Xโ โ Rn1 รn2 the
underlying matrix. We use X:t โ Rn1 ร1 (Xt: โ R1รn2 ) to indicate the t-th column (row) of X. The entry in
the i-th row, j-th column of X is represented by Xij . The condition number of X is ฮบ = ฯ1 (X)/ฯr (X). We
let n(1) = max{n1 , n2 } and n(2) = min{n1 , n2 }. For a function H(M) on an input matrix M, its conjugate
function H โ is defined by H โ (ฮ) = maxM hฮ, Mi โ H(M). Furthermore, let H โโ denote the conjugate
function of H โ .
We will frequently use rank(X) โค r to constrain the rank of X. This can be equivalently represented
as X = AB,
qPby restricting the number of columns of A and rows of B to be r. For norms, we denote by
2
kXkF =
ij Xij the Frobenius norm of matrix X. Let ฯ1 (X) โฅ ฯ2 (X) โฅ ... โฅ ฯr (X) be the non-zero
P
singular values of X. The nuclear norm (a.k.a. trace norm) of X is defined by kXkโ = ri=1 ฯi (X), and
the operator norm of X is kXk = ฯ1 (X). Denote
and
P by kXkโ = maxij |Xij |. For two matrices nA
รn
1
2 :
B of equal dimensions, we denote by hA, Bi = ij Aij Bij . We denote by โH(X) = {ฮ โ R
H(Y) โฅ H(X) + hฮ, Y โ Xi for any Y} the sub-differential
of function H evaluated at X. We define
(
0,
if X โ C;
the indicator function of convex set C by IC (X) =
For any non-empty set C, denote by
+โ, otherwise.
cone(C) = {tX : X โ C, t โฅ 0}.
We denote by โฆ the set of indices of observed entries, and โฆโฅ its complement. Without confusion,
โฆ also indicates the linear subspace formed by matrices with entries in โฆโฅ being 0. We denote by Pโฆ :
Rn1 รn2 โ Rn1 รn2 the orthogonal projector of subspace โฆ. We will consider a single norm for these
operators, namely, the operator norm denoted by kAk and defined by kAk = supkXkF =1 kA(X)kF . For any
orthogonal projection operator PT to any subspace T , we know that kPT k = 1 whenever dim(T ) 6= 0. For
distributions, denote by N (0, 1) a standard Gaussian random variable, Uniform(m) the uniform distribution
of cardinality m, and Ber(p) the Bernoulli distribution with success probability p.
3 `2 -Regularized Matrix Factorizations: A New Analytical Framework
In this section, we develop a novel framework to analyze a general class of `2 -regularized matrix factorization
problems. Our framework can be applied to different specific problems and leads to nearly optimal sample
complexity guarantees. In particular, we study the `2 -regularized matrix factorization problem
(P)
1
F (A, B) = H(AB) + kABk2F , H(ยท) is convex and closed.
2
AโRn1 รr ,BโRrรn2
min
We show that under suitable conditions the duality gap between (P) and its dual (bi-dual) problem is zero, so
problem (P) can be converted to an equivalent convex problem.
3.1
Strong Duality
b 2 โ hY,
b ABi for a fixed Y,
b leading to the objective
We first consider an easy case where H(AB) = 12 kYk
F
1 b
2
function 2 kY โ ABkF . For this case, we establish the following lemma.
6
b โ ABk2 is globally optimal,
b any local minimum of f (A, B) = 1 kY
Lemma 3.1. For any given matrix Y,
F
2
b The objective function f (A, B) around any saddle point has a negative second-order
given by svdr (Y).
directional curvature. Moreover, f (A, B) has no local maximum.2
The proof of Lemma 3.1 is basically to calculate the gradient of f (A, B) and let it equal to zero; see
b
b โ ABk2 for some Y
Appendix B for details. Given this lemma, we can reduce F (A, B) to the form 12 kY
F
plus an extra term:
1
1
1
F (A, B) = kABk2F + H(AB) = kABk2F + H โโ (AB) = max kABk2F + hฮ, ABi โ H โ (ฮ)
ฮ 2
2
2
(5)
1
1
= max k โ ฮ โ ABk2F โ kฮk2F โ H โ (ฮ) , max L(A, B, ฮ),
ฮ 2
ฮ
2
1
1
2
2
where we define L(A, B, ฮ) , 2 k โ ฮ โ ABkF โ 2 kฮkF โ H โ (ฮ) as the Lagrangian of problem (P),3
and the second equality holds because H is closed and convex w.r.t. the argument AB. For any fixed value of
ฮ, by Lemma 3.1, any local minimum of L(A, B, ฮ) is globally optimal, because minimizing L(A, B, ฮ)
is equivalent to minimizing 12 k โ ฮ โ ABk2F for a fixed ฮ.
e such that (A,
e B,
e ฮ)
e is a primal-dual saddle
The remaining part of our analysis is to choose a proper ฮ
e
e B).
e
point of L(A, B, ฮ), so that minA,B L(A, B, ฮ) and problem (P) have the same optimal solution (A,
For this, we introduce the following condition, and later we will show that the condition holds with high
probability.
e B)
e to problem (P), there exists an ฮ
e โ โX H(X)| e e such that
Condition 1. For a solution (A,
X=AB
eB
eB
eT = ฮ
eB
eT
โA
and
e T (โA
e B)
e =A
e T ฮ.
e
A
(6)
Explanation of Condition 1. We note that โA L(A, B, ฮ) = ABBT + ฮBT and โB L(A, B, ฮ) =
e ฮ)|
e
e in (6), then โA L(A, B,
AT AB + AT ฮ for a fixed ฮ. In particular, if we set ฮ to be the ฮ
e =0
A=A
e
e
e
e
and โB L(A, B, ฮ)|B=B
e = 0. So Condition 1 implies that (A, B) is either a saddle point or a local
e
e
minimizer of L(A, B, ฮ) as a function of (A, B) for the fixed ฮ.
The following lemma states that if it is a local minimizer, then strong duality holds.
e B)
e be a global minimizer of F (A, B). If there exists a dual certificate
Lemma 3.2 (Dual Certificate). Let (A,
e
e is a local minimizer of L(A, B, ฮ)
e for the fixed ฮ,
e
e then strong
ฮ satisfying Condition 1 and the pair (A, B)
eB
e = svdr (โฮ).
e
duality holds. Moreover, we have the relation A
e B,
e ฮ)
e is a primal-dual saddle
Proof Sketch. By the assumption of the lemma, we can show that (A,
point to the Lagrangian L(A, B, ฮ); see Appendix C. To show strong duality, by the fact that F (A, B) =
e = argmaxฮ L(A,
e B,
e ฮ), we have F (A,
e B)
e = L(A,
e B,
e ฮ)
e โค L(A, B, ฮ),
e
maxฮ L(A, B, ฮ) and that ฮ
e
e
e
for any A, B, where the inequality holds because (A, B, ฮ) is a primal-dual saddle point of L. So on the
e B)
e โค minA,B L(A, B, ฮ)
e โค maxฮ minA,B L(A, B, ฮ).
one hand, minA,B maxฮ L(A, B, ฮ) = F (A,
On the other hand, by weak duality, we have minA,B maxฮ L(A, B, ฮ) โฅ maxฮ minA,B L(A, B, ฮ).
Therefore, minA,B maxฮ L(A, B, ฮ) = maxฮ minA,B L(A, B, ฮ), i.e., strong duality holds. Therefore,
eB
e = argminAB L(A, B, ฮ)
e = argminAB 1 kABk2 + hฮ,
e ABi โ H โ (ฮ)
e = argminAB 1 k โ ฮ
e โ
A
F
2
2
e as desired.
ABk2F = svdr (โฮ),
This lemma then leads to the following theorem.
2
e is of full rank and does not
Prior work studying the loss surface of low-rank matrix approximation assumes that the matrix ฮ
have the same singular values [BH89]. In this work, we generalize this result by removing these two assumptions.
3
One can easily check that L(A, B, ฮ) = minM L0 (A, B, M, ฮ), where L0 (A, B, M, ฮ) is the Lagrangian of the constraint
optimization problem minA,B,M 12 kABk2F + H(M), s.t. M = AB. With a little abuse of notation, we call L(A, B, ฮ) the
Lagrangian of the unconstrained problem (P) as well.
7
%
โ,
*+
small
*
.
O
%&
%' = ฯ
!"#$
%&
%
$
large
%
,
(dual certificate)
Figure 3: Geometry of dual condition (7) for general matrix factorization problems.
e B)
e the optimal solution of problem (P). Define a matrix space
Theorem 3.3. Denote by (A,
e T + YB,
e X โ Rn2 รr , Y โ Rn1 รr }.
T , {AX
Then strong duality holds for problem (P), provided that
e โ โH(A
e B)
e , ฮจ,
(1) ฮ
e =A
e B,
e
(2) PT (โฮ)
e < ฯr (A
e B).
e
(3) kPT โฅ ฮk
(7)
e so that the conditions in Lemma 3.2 hold. ฮ
e should
Proof. The proof idea is to construct a dual certificate ฮ
satisfy the following:
(a)
(b)
(c)
e โ โH(A
e B),
e
ฮ
(by Condition 1)
eB
e + ฮ)
e B
e T = 0 and A
e T (A
eB
e + ฮ)
e = 0,
(A
(by Condition 1)
eB
e = svdr (โฮ).
e
A
(by the local minimizer assumption and Lemma 3.1)
(8)
eA
e โ )M(I โ B
eB
e โ ) and so kPT โฅ Mk โค kMk,
It turns out that for any matrix M โ Rn1 รn2 , PT โฅ M = (I โ A
eB
e and V the
a fact that we will frequently use in the sequel. Denote by U the left singular space of A
right singular space. Then the linear space T can be equivalently represented as T = U + V. Therefore,
eB
e + ฮ)
e B
e T = 0 and A
e T (A
eB
e + ฮ)
e = 0 imply
T โฅ = (U + V)โฅ = U โฅ โฉ V โฅ . With this, we note that: (b) (A
T
โฅ
โฅ
โฅ
e
e
e
e
e
e
e
e
e
e
e
e
AB + ฮ โ Null(A ) = Col(A) and AB + ฮ โ Row(B) (so AB + ฮ โ T ), and vice versa. And (c)
eB
e = svdr (โฮ)
e implies that for an orthogonal decomposition โฮ
e =A
eB
e + E, where A
eB
e โ T , and E โ
A
โฅ
e
e
e
e
e
e = svdr (โฮ).
e
T , we have kEk < ฯr (AB). Conversely, kEk < ฯr (AB) and condition (b) imply AB
e
e
e
e
e
e
Therefore, the dual conditions in (8) are equivalent to (1) ฮ โ โH(AB) , ฮจ; (2) PT (โฮ) = AB; (3)
e < ฯr (A
e B).
e
kPT โฅ ฮk
To show the dual condition in Theorem 3.3, intuitively, we need to show that the angle ฮธ between subspace
T and ฮจ is small (see Figure 3) for a specific function H(ยท). In the following (see Section E), we will
demonstrate applications that, with randomness, obey this dual condition with high probability.
4
Matrix Completion
In matrix completion, there is a hidden matrix Xโ โ Rn1 รn2 with rank r. We are given measurements
{Xโij : (i, j) โ โฆ}, where โฆ โผ Uniform(m), i.e., โฆ is sampled uniformly at random from all subsets of
[n1 ] ร [n2 ] of cardinality m. The goal is to exactly recover Xโ with high probability. Here we apply our
unified framework in Section 3 to matrix completion, by setting H(ยท) = I{M:Pโฆ (M)=Pโฆ (Xโ )} (ยท).
A quantity governing the difficulties of matrix completion is the incoherence parameter ยต. Intuitively,
matrix completion is possible only if the information spreads evenly throughout the low-rank matrix. This
intuition is captured by the incoherence conditions. Formally, denote by UฮฃVT the skinny SVD of a fixed
8
n1 ร n2 matrix X of rank r. Candรจs et al. [CLMW11, CR09, Rec11, ZLZ16] introduced the ยต-incoherence
n(1)
condition (3) to the low-rank matrix X. For conditions (3), it can be shown
p that 1 โค ยต โค r . The condition
holds for many random matrices with incoherence parameter ยต about r log n(1) [KMO10a].
We have two positive results. The first result is an information-theoretic upper bound: with the standard
incoherence condition (3), Xโ is the unique matrix of rank at most r that is consistent with the observations.
The proof is deferred to Appendix D.
Theorem 4.1 (Information-Theoretic Upper Bound). Let โฆ โผ Uniform(m) be the support set uniformly
distributed among all sets of cardinality m. Suppose that m โฅ cยตn(1) r log n(1) for an absolute constant
c. Then Xโ is the unique n1 ร n2 matrix of rank at most r with ยต-incoherence condition (3) such that
Pโฆ (X) = Pโฆ (Xโ ), with probability at least 1 โ nโ10
(1) .
Proof Sketch. We consider the feasibility of the matrix completion problem:
Find a matrix X โ Rn1 รn2 such that Pโฆ (X) = Pโฆ (Xโ ),
rank(X) โค r.
(9)
Our proof first identifies a feasibility condition for problem (9), and then shows that Xโ is the only matrix
which obeys this feasibility condition when the sample size is large enough. More specifically, we note that
Xโ obeys the conditions in problem (9). Therefore, Xโ is the only matrix which obeys condition (9) if and
only if Xโ + D does not follow the condition for all D, i.e., DS (Xโ ) โฉ โฆโฅ = {0}, where DS (Xโ ) is the
descent cone of all low-rank matrices. We note that the descent cone DS (Xโ ) is contained in the subspace T
by the tool of geometry functional analysis. Thus by a well-known fact that T โฉ โฆโฅ = {0} when the sample
size is large, the proof is completed.
We describe a simple finite-time inefficient algorithm given Theorem 4.1 in Section H. This positive
result matches a lower bound from prior work, which claims that the sample complexity in Theorem 4.1 is
optimal.
Theorem 4.2 (Information-Theoretic Lower Bound. [CT10], Theorem 1.7). Denote by โฆ โผ Uniform(m)
the support set uniformly distributed among all sets of cardinality m. Suppose that m โค cยตn(1) r log n(1)
for an absolute constant c. Then there exist infinitely many n1 ร n2 matrices X0 of rank at most r obeying
ยต-incoherence (3) such that Pโฆ (X0 ) = Pโฆ (Xโ ), with probability at least 1 โ nโ10
(1) .
Our second positive result converts the feasibility problem in Theorem 4.1 to a convex optimization
problem, which can be efficiently solved.
Theorem 4.3 (Efficient Matrix Completion). Let โฆ โผ Uniform(m) be the support set uniformly distributed
among all sets of cardinality m. Suppose Xโ has condition number ฮบ = ฯ1 (Xโ )/ฯr (Xโ ). Then there are
absolute constants c and c0 such that with probability at least 1 โ c0 nโ10
(1) , the output of the convex problem
e = argmin kXkrโ , s.t. Pโฆ (X) = Pโฆ (Xโ ),
X
(10)
X
e = Xโ , provided that m โฅ cฮบ2 ยตrn(1) log2ฮบ (n(1) ) log(n(1) ) and Xโ obeys
is unique and exact, i.e., X
ยต-incoherence (3).
e B)
e = argminA,B 1 kABk2 , s.t.Pโฆ (AB) =
Proof Sketch. We have shown in Theorem 4.1 that the problem (A,
F
2
eB
e = Xโ , with the optimal sample complexity. So if strong duality
Pโฆ (Xโ ), exactly recovers Xโ , i.e., A
holds, this non-convex optimization problem can be equivalently converted to the convex program (10). Then
Theorem 4.3 is straightforward from strong duality.
It now suffices to apply our unified framework in Section 3 to prove the strong duality. We show that
e B)
e be a
the dual condition in Theorem 3.3 holds with high probability by the following arguments. Let (A,
global solution to problem (10). For H(X) = I{MโRn1 รn2 : Pโฆ M=Pโฆ Xโ } (X), we have
e B)
e = {G โ Rn1 รn2 : hG, A
e Bi
e โฅ hG, Yi, for any Y โ Rn1 รn2 s.t. Pโฆ Y = Pโฆ Xโ }
ฮจ = โH(A
= {G โ Rn1 รn2 : hG, Xโ i โฅ hG, Yi, for any Y โ Rn1 รn2 s.t. Pโฆ Y = Pโฆ Xโ } = โฆ,
9
eB
e = Xโ . Then we only need to show
where the third equality holds since A
e โ โฆ,
(1) ฮ
e =A
e B,
e
(2) PT (โฮ)
e < 2 ฯr (A
e B).
e
(3) kPT โฅ ฮk
3
(11)
It is interesting to see that dual condition (11) can be satisfied if the angle ฮธ between subspace โฆ and subspace
T is very small; see Figure 3. When the sample size |โฆ| becomes larger and larger, the angle ฮธ becomes
smaller and smaller (e.g., when |โฆ| = n1 n2 , the angle ฮธ is zero as โฆ = Rn1 รn2 ). We show that the sample
size m โฅ โฆ(ฮบ2 ยตrn(1) log2ฮบ (n(1) ) log(n(1) )) is a sufficient condition for condition (11) to hold.
5
Robust Principal Component Analysis
In this section, we develop our theory for robust PCA based on our framework. In the problem of robust
PCA, we are given an observed matrix of the form D = Xโ + Sโ , where Xโ is the ground-truth matrix and
Sโ is the corruption matrix which is sparse. The goal is to recover the hidden matrices Xโ and Sโ from the
observation D. We set H(X) = ฮปkD โ Xk1 .
To make the information spreads evenly throughout the matrix, the matrix cannot have one entry whose
absolute value is significantly larger than other entries. For the robust PCA problem, Candรจs et al. [CLMW11]
introduced an extra incoherence condition (Recall that Xโ = UฮฃVT is the skinny SVD of Xโ )
r
ยตr
T
kUV kโ โค
.
(12)
n1 n2
In this work, we make the following incoherence assumption for robust PCA instead of (12):
r
ยตr
โ
ฯr (Xโ ).
kX kโ โค
n1 n2
(13)
Note that condition (13) is very similar to the incoherence condition (12) for the robust PCA problem, but the
two notions are incomparable. Note that condition (13) has an intuitive explanation, namely, that the entries
must scatter almost uniformly across the low-rank matrix.
We have the following results for robust PCA.
Theorem 5.1 (Robust PCA). Suppose Xโ is an n1 ร n2 matrix of rank r, and obeys incoherence (3) and
(13). Assume that the support set โฆ of Sโ is uniformly distributed among all sets of cardinality m. Then with
probability at least 1 โ cnโ10
(1) , the output of the optimization problem
e S)
e = argmin kXkrโ + ฮปkSk1 ,
(X,
s.t. D = X + S,
X,S
with ฮป =
ฯr (Xโ )
โ
n(1)
e = Xโ and S
e = Sโ , provided that rank(Xโ ) โค ฯr n(2)
is exact, namely, X
ยต log2 n
and m โค
(1)
ฯs n1 n2 , where c, ฯr , and ฯs are all positive absolute constants, and function k ยท krโ is given by (14).
The bounds on the rank of Xโ and the sparsity of Sโ in Theorem 5.1 match the best known results for
robust PCA in prior work when we assume the support set of Sโ is sampled uniformly [CLMW11].
6
Computational Aspects
Computational Efficiency. We discuss our computational efficiency given that we have strong duality. We
note that the dual and bi-dual of primal problem (P) are given by (see Appendix I)
10
(Dual, D1)
(Bi-Dual, D2)
1
โH โ (ฮ) โ kฮk2r ,
2
ฮโRn1 รn2
max
min
MโRn1 รn2
H(M) + kMkrโ ,
where kฮk2r =
r
X
ฯi2 (ฮ),
i=1
where kMkrโ
(14)
1
= maxhM, Xi โ kXk2r .
X
2
Problems (D1) and (D2) can be solved efficiently due to their convexity. In particular, Grussler et al. [GRG16]
provided a computationally efficient algorithm to compute the proximal operators of functions 12 k ยท k2r and
k ยท krโ . Hence, the Douglas-Rachford algorithm can find global minimum up to an error in function value in
time poly(1/) [HY12].
Computational Lower Bounds. Unfortunately, strong duality does not always hold for general non-convex
problems (P). Here we present a very strong lower bound based on the random 4-SAT hypothesis. This is by
now a fairly standard conjecture in complexity theory [Fei02] and gives us constant factor inapproximability
of problem (P) for deterministic algorithms, even those running in exponential time.
If we additionally assume that BPP = P, where BPP is the class of problems which can be solved in
probabilistic polynomial time, and P is the class of problems which can be solved in deterministic polynomial
time, then the same conclusion holds for randomized algorithms. This is also a standard conjecture in
complexity theory, as it is implied by the existence of certain strong pseudorandom generators or if any
problem in deterministic exponential time has exponential size circuits [IW97]. Therefore, any subexponential
time algorithm achieving a sufficiently small constant factor approximation to problem (P) in general would
imply a major breakthrough in complexity theory.
The lower bound is proved by a reduction from the Maximum Edge Biclique problem [AMS11]. The
details are presented in Appendix G.
Theorem 6.1 (Computational Lower Bound). Assume Conjecture 1 (the hardness of Random 4-SAT). Then
there exists an absolute constant 0 > 0 for which any deterministic algorithm achieving (1 + )OPT in the
objective function value for problem (P) with โค 0 , requires 2โฆ(n1 +n2 ) time, where OPT is the optimum. If
in addition, BPP = P, then the same conclusion holds for randomized algorithms succeeding with probability
at least 2/3.
Proof Sketch. Theorem 6.1 is proved by using the hypothesis that random 4-SAT is hard to show hardness
of the Maximum Edge Biclique problem for deterministic algorithms. We then do a reduction from the
Maximum Edge Biclique problem to our problem.
The complete proofs of other theorems/lemmas and related work can be found in the appendices.
Acknowledgments. We thank Rong Ge, Jason D. Lee, Zhouchen Lin, Tengyu Ma, Benjamin Recht and
Tuo Zhao for useful discussions. This work was supported in part by NSF grants NSF CCF-1422910, NSF
CCF-1535967, NSF CCF-1451177, NSF IIS-1618714, NSF CCF-1527371, a Sloan Research Fellowship, a
Microsoft Research Faculty Fellowship, DMS-1317308, Simons Investigator Award, Simons Collaboration
Grant, and ONR-N00014-16-1-2329. We would like to thank Rina Foygel for finding a bug in the proof of
Theorem 4.3 in a previous version.
11
A
Other Related Work
Non-convex matrix factorization is a popular topic studied in theoretical computer science [JNS13, Har14,
SL15, RSW16], machine learning [BNS16, GLM16, GHJY15, JMD10, LLR16], and optimization [WYZ12,
SWZ14]. We review several lines of research on studying the global optimality of such optimization problems.
Global Optimality of Matrix Factorization. While lots of matrix factorization problems have been shown
to have no spurious local minima, they either require additional conditions on the local minima, or are based
on particular forms of the objective function. Specifically, Burer and Monteiro [BM05] showed that one
can minimize F (AAT ) for any convex function F by solving for A directly without introducing any local
minima, provided that the rank of the output A is larger than the rank of the true minimizer Xtrue . However,
such a condition is often impossible to check as rank(Xtrue ) is typically unknown a priori. To resolve
the issue, Bach et al. [BMP08] and Journรฉe et al. [JBAS10] proved that X = AAT is a global minimizer
of F (X), if A is a rank-deficient local minimizer of F (AAT ) and F (X) is a twice differentiable convex
function. Haeffele and Vidal [HV15] further extended this result by allowing a more general form of objective
function F (X) = G(X) + H(X), where G is a twice differentiable convex function with compact level set
and H is a proper convex function such that F is lower semi-continuous. However, a major drawback of this
line of research is that these result fails when the local minimizer is of full rank.
Matrix Completion. Matrix completion is a prototypical example of matrix factorization. One line of work
on matrix completion builds on convex relaxation (e.g., [SS05, CR09, CT10, Rec11, CRPW12, NW12]),
which does not achieve the optimal sample complexity. Recently, Ge et al. [GLM16] showed that matrix
completion has no spurious local optimum, when |โฆ| is sufficiently large and the matrix Y is incoherent. The
result is only for positive semi-definite matrices and their sample complexity is not optimal.
Another line of work is built upon good initialization for global convergence. Recent attempts showed
that one can first compute some form of initialization (e.g., by singular value decomposition) that is close
to the global minimizer and then use non-convex approaches to reach global optimality, such as alternating
minimization, block coordinate descent, and gradient descent [KMO10b, KMO10a, JNS13, Kes12, Har14,
BKS16, ZL15, ZWL15, TBSR15, CW15, SL15]. In our result, in contrast, we can reformulate non-convex
matrix completion problems as equivalent convex programs, which guarantees global convergence from any
initialization.
Robust PCA. Robust PCA is also a prototypical example of matrix factorization. The goal is to recover both
the low-rank and the sparse components exactly from their superposition [CLMW11, NNS+ 14, GWL16,
ZLZC15, ZLZ16, YPCC16]. It has been widely applied to various tasks, such as video denoising, background
modeling, image alignment, photometric stereo, texture representation, subspace clustering, and spectral
clustering.
There are typically two settings in the robust PCA literature: a) the support set of the sparse matrix
is uniformly sampled [CLMW11, ZLZ16]; b) the support set of the sparse matrix is deterministic, but
the non-zero entries in each row or column of the matrix cannot be too large [YPCC16, GJY17]. In this
work, we discuss the first case. Our framework provides results that match the best known work in setting
(b) [CLMW11].
Other Matrix Factorization Problems. Matrix sensing is another typical matrix factorization problem [CRPW12, JNS13, ZWL15]. Bhojanapalli et al. [BNS16] and Tu et al. [TBSR15] showed that the
matrix recovery model minA,B 12 kA(AB โ Y)k2F , achieves optimality for every local minimum, if the
operator A satisfies the restricted isometry property. They further gave a lower bound and showed that the
unstructured operator A may easily lead to a local minimum which is not globally optimal.
Some other matrix factorization problems are also shown to have nice geometric properties such as the
property that all local minima are global minima. Examples include dictionary learning [SQW17a], phase
12
retrieval [SQW16], and linear deep neural networks
Q [Kaw16]. In multi-layer linear neural networks where the
โ
goal is to learn a multi-linear projection X = i Wi , each Wi represents the weight matrix that connects
the hidden units in the i-th and (i + 1)-th layers. The study of such linear models is central to the theoretical
understanding of the loss surface of deep neural networks with non-linear activation functions [Kaw16,
CHM+ 15]. In dictionary learning, we aim to recover a complete (i.e., square and invertible) dictionary matrix
A from a given signal X in the form of X = AB, provided that the representation coefficient B is sufficiently
sparse. This problem centers around solving a non-convex matrix factorization problem with a sparsity
constraint on the representation coefficient B [BMP08, SQW17a, SQW17b, ABGM14]. Other high-impact
examples of matrix factorization models range from the classic unsupervised learning problems like PCA,
independent component analysis, and clustering, to the more recent problems such as non-negative matrix
factorization, weighted low-rank matrix approximation, sparse coding, tensor decomposition [BCMV14,
AGH+ 14], subspace clustering [ZLZG15, ZLZG14], etc. Applying our framework to these other problems
is left for future work.
Atomic Norms. The atomic norm is a recently proposed function for linear inverse problems [CRPW12].
Many well-known norms, e.g., the `1 norm and the nuclear norm, serve as special cases of atomic norms. It
has been widely applied to the problems of compressed sensing [TBSR13], low-rank matrix recovery [CR13],
blind deconvolution [ARR14], etc. The norm is defined by the Minkowski functional associated with the
convex hull of a set A: kXkA = inf{t > 0 : X โ tA}. In particular, if we set A to be the convex hull of the
infinite set of unit-`2 -norm rank-one matrices, then k ยท kA equals to the nuclear norm. We mention that our
objective term kABkF in problem (1) is similar to the atomic norm, but with slight differences: unlike the
atomic norm, we set A to be the infinite set of unit-`2 -norm rank-r matrices for rank(X) โค r. With this, we
achieve better sample complexity guarantees than the atomic-norm based methods.
B
Proof of Lemma 3.1
b any local minimum of f (A, B) = 1 kY
b โ ABk2 is globally
Lemma 3.1 (Restated). For any given matrix Y,
F
2
optimal. The objective function f (A, B) around any saddle point has a negative second-order directional
curvature. Moreover, f (A, B) has no local maximum.
Proof. (A,B) is a critical point of f (A, B) if and only if โA f (A, B) = 0 and โB f (A, B) = 0, or
equivalently,
b T and AT AB = AT Y.
b
ABBT = YB
(15)
Note that for any fixed matrix A (resp. B), the function f (A, B) is convex in the coefficients of B (resp. A).
To prove the desired lemma, we have the following claim.
Claim 1. If two matrices A and B define a critical point of f (A, B), then the global mapping M = AB is
of the form
b
M = PA Y,
with A satisfying
bY
b T = AAโ Y
bY
b T AAโ = Y
bY
b T AAโ .
AAโ Y
(16)
Proof. If A and B define a critical point of f (A, B), then (15) holds and the general solution to (15) satisfies
B = (AT A)โ AT Y + (I โ Aโ A)L,
(17)
b = AAโ Y
b = PA Y
b by the property of the Moorefor any matrix L. So M = AB = A(AT A)โ AT Y
โ
T
โ
T
Penrose pseudo-inverse: A = (A A) A .
13
By (15), we also have
b T AT
ABBT AT = YB
b T.
or equivalently MMT = YM
b (B) can be rewritten as
Plugging in the relation M = AAโ Y,
bY
b T AAโ = Y
bY
b T AAโ .
AAโ Y
bY
b T AAโ is symmetric. Thus
Note that the matrix AAโ Y
bY
b T = AAโ Y
bY
b T AAโ ,
AAโ Y
as desired.
To prove Lemma 3.1, we also need the following claim.
Claim 2. Denote by I = {i1 , i2 , ..., ir } any ordered r-index set (ordered by ฮปij , j โ [r] from the largest
bY
b T โ Rn1 รn1 with p distinct values. Let UI =
to the smallest) and ฮปi , i โ [n1 ], the eigenvalues of Y
bY
bT โ
[ui1 , ui2 , ..., uir ] denote the matrix formed by the orthonormal eigenvectors U = [u1 , u2 , ..., un1 ] of Y
n
รn
1
1
R
associated with the ordered p eigenvalues, whose multiplicities are m1 , m2 , ..., mp (m1 + m2 +
... + mp = n1 ). Then two matrices A and B define a critical point of f (A, B) if and only if there exists an
ordered r-index set I, an invertible matrix C, and an r ร n matrix L such that
b + (I โ Aโ A)L,
A = (UD):I C and B = Aโ Y
(18)
where D is a p-block-diagonal matrix with each block equal to the orthogonal projector of dimension mi .
For such a critical point, we have
b
AB = PA Y,
1
f (A, B) =
2
!
bY
bT) โ
tr(Y
X
iโI
ฮปi
=
1X
ฮปi .
2
(19)
i6โI
bY
b T is a real symmetric covariance matrix. So it can always be represented as UฮUT ,
Proof. Note that Y
bY
b T and ฮ โ Rn1 รn1 is a
where U โ Rn1 รn1 is an orthonormal matrix consisting of eigenvectors of Y
T
b
b
diagonal matrix with non-increasing eigenvalues of YY .
If A and B satisfy (18) for some C, L, and I, then
b T
ABBT = YB
and
b
AT AB = AT Y,
which is (15). So A and B define a critical point of f (A, B).
For the converse, notice that
PUT A = UT A(UT A)โ = UT AAโ U = UT PA U,
or equivalently, PA = UPUT A UT . Thus (16) yields
UPUT A UT UฮUT = UฮUT UPUT A UT ,
or equivalently, PUT A ฮ = ฮPUT A . Notice that ฮ โ Rn1 รn1 is a diagonal matrix with p distinct eigenvalues
bY
b T . So PUT A is a block-diagonal matrix with p blocks, each of which is an orthogonal projector of
of Y
14
dimension mi , corresponding to the eigenvalues ฮปi , i โ [p]. Therefore, there exists an index set I such that
PUT A = D:I DT:I , where D is a block-diagonal matrix. It follows that
PA = UPUT A UT = UD:I DT:I UT = (UD):I (UD)T:I .
Since the column space of A coincides with the column space of (UD):I , A is of the form A = (UD):I C,
b + A(I โ Aโ A)L = PA Y
b and
and B is given by (17). Thus AB = A(AT A)โ AT Y
1 b
f (A, B) = kY
โ ABk2F
2
1 b
b 2
โ PA Yk
= kY
F
2
1
b 2
= kPAโฅ Yk
F
2
X
1
=
ฮปi .
2
i6โI
So the local minimizer of f (A, B) is given by (18) with I = ฮฆ, which is globally optimal according to
bY
b T . We then show that when I
(19), where ฮฆ is the index set corresponding to the r largest eigenvalues of Y
consists of other combinations of indices of eigenvalues, i.e., I =
6 ฮฆ, the corresponding pair (A, B) given by
(18) is a strict saddle point.
Claim 3. If I =
6 ฮฆ, then the pair (A, B) given by (18) is a strict saddle point.
Proof. Let i โ ฮฆ but i 6โ I, and denote by UD = R. It is enough to slightly perturb the column space of
A towards the direction of an eigenvector of ฮปi . More precisely, fix two indices i and j such that i โ ฮฆ,
e :j = (1 + 2 )โ1/2 (R:j + R:i ). Notice that i 6โ I. Thus
i 6โ I, and j is the largest index in I. For any , let R
eTR
e
e
e
e
eโ
eโ e
R
:j :j = I. Let A = RI C and B = A Y + (I โ A A)L. A direct calculation shows that
e B)
e = f (A, B) โ 2 (ฮปi โ ฮปj )/(2 + 22 ).
f (A,
Hence,
e B)
e โ f (A, B)
f (A,
1
= โ (ฮปi โ ฮปj ) < 0.
2
โ0
2
lim
Note that all critical points of f (A, B) are in the form of (18), and if I 6= ฮฆ, the pair (A, B) given by
(18) is a strict saddle point, while if I = ฮฆ, then the pair (A, B) given by (18) is a local minimum. We
conclude that f (A, B) has no local maximum. The proof is completed.
C
Proof of Lemma 3.2
e B)
e be a global minimizer of F (A, B). If there exists a dual certificate ฮ
e
Lemma 3.2 (Restated). Let (A,
e
e
e
e
as in Condition 1 such that the pair (A, B) is a local minimizer of L(A, B, ฮ) for the fixed ฮ, then strong
eB
e = svdr (โฮ).
e
duality holds. Moreover, we have the relation A
15
e โ ABk2 +
e B)
e is a local minimizer of L(A, B, ฮ)
e = 1k โ ฮ
Proof. By the assumption of the lemma, (A,
F
2
e where c(ฮ)
e is a function that is independent of A and B. So according to Lemma 3.1, (A,
e B)
e =
c(ฮ),
e namely, (A,
e B)
e globally minimizes L(A, B, ฮ) when ฮ is fixed to ฮ.
e Furthermore,
argminA,B L(A, B, ฮ),
โ
e โ โX H(X)| e e implies that A
eB
e โ โฮ H (ฮ)| e by the convexity of function H, meaning that
ฮ
X=AB
ฮ=ฮ
e B,
e ฮ). So ฮ
e = argmaxฮ L(A,
e B,
e ฮ) due to the concavity of L(A,
e B,
e ฮ) w.r.t. variable ฮ.
0 โ โฮ L(A,
e
e
e
Thus (A, B, ฮ) is a primal-dual saddle point of L(A, B, ฮ).
e =
We now prove the strong duality. By the fact that F (A, B) = maxฮ L(A, B, ฮ) and that ฮ
e B,
e ฮ), we have
argmaxฮ L(A,
e B)
e = L(A,
e B,
e ฮ)
e โค L(A, B, ฮ),
e โA, B.
F (A,
e B,
e ฮ)
e is a primal-dual saddle point of L. So on the one hand, we
where the inequality holds because (A,
have
e B)
e โค min L(A, B, ฮ)
e โค max min L(A, B, ฮ).
min max L(A, B, ฮ) = F (A,
A,B
ฮ
A,B
ฮ
A,B
On the other hand, by weak duality,
min max L(A, B, ฮ) โฅ max min L(A, B, ฮ).
A,B
ฮ
ฮ
A,B
Therefore, minA,B maxฮ L(A, B, ฮ) = maxฮ minA,B L(A, B, ฮ), i.e., strong duality holds. Hence,
eB
e = argmin L(A, B, ฮ)
e
A
AB
1
e โ ABk2 โ 1 kฮk
e 2 โ H โ (ฮ)
e
= argmin k โ ฮ
F
F
2
2
AB
1
e โ ABk2
= argmin k โ ฮ
F
2
AB
e
= svdr (โฮ),
as desired.
D
Proof of Theorem 4.1
Theorem 4.1 (Information-Theoretic Upper Bound. Restated). Let โฆ โผ Uniform(m) be the support set,
which is uniformly distributed among all sets of cardinality m. Suppose that m โฅ cยตn(1) r log n(1) for an
absolute constant c. Then Xโ is the unique n1 ร n2 matrix of rank at most r with ยต-incoherence (3) such
that Pโฆ (X) = Pโฆ (Xโ ), with probability at least 1 โ nโ10
(1) .
Proof. We note
that the sampling model Uniform(m) is equivalent to the sampling model Ber(p) with
m
p = ฮ n1 n2 , which we will frequently use in the sequel (see Appendix J). We consider the feasibility of
the matrix completion problem:
Find a matrix X โ Rn1 รn2 such that Pโฆ (X) = Pโฆ (Xโ ),
rank(X) โค r.
(20)
Our proof first identifies a feasibility condition for problem (20), and then shows that Xโ is the only matrix
that obeys this feasibility condition when the sample size is large enough. We denote by
S = {X โ Rn1 รn2 : rank(X) โค r},
16
and define
DS (Xโ ) = {t(X โ Xโ ) โ Rn1 รn2 : rank(X) โค r, t โฅ 0}.
We have the following proposition for the feasibility of problem (20).
Proposition D.1 (Feasibility Condition). Xโ is the unique feasible solution to problem (20) if DS (Xโ ) โฉ
โฆโฅ = {0}.
Proof. Notice that problem (20) is equivalent to another feasibility problem
Find a matrix D โ Rn1 รn2 such that rank(Xโ + D) โค r, D โ โฆโฅ .
Suppose that DS (Xโ ) โฉ โฆโฅ = {0}. Since rank(Xโ + D) โค r implies D โ DS (Xโ ), and note that D โ โฆโฅ ,
we have D = 0, which means Xโ is the unique feasible solution to problem (20).
The remainder of the proof is to show DS (Xโ ) โฉ โฆโฅ = {0}. To proceed, we note that the โescaping
through a meshโ techniques for matrix sensing do not work for matrix completion since โฆ is not drawn from
the Grassmanian according to the Haar measure. To address this issue, we instead need the following lemmas.
The first lemma claims that the tangent cone of the set S evaluated at Xโ is slightly larger than the cone
cone(S โ {Xโ }).
Lemma D.2 ([Jah07], Theorem 4.8). Let S be a non-empty subset of a real normed space. If S is star-shaped
w.r.t. some Xโ โ S, i.e., t(S โ {Xโ }) โ S โ {Xโ } for all t โ [0, 1], then it follows
cone(S โ {Xโ }) โ T (S, Xโ ),
where T (S, Xโ ) is the tangent cone of the set S at point Xโ defined by
T (S, Xโ ) = {ฮ โ Rn1 รn2 : โXn โ S, (an ) โ R+ s.t. Xn โ Xโ , an (Xn โ Xโ ) โ ฮ}.
The second lemma states that the tangent cone of the set S evaluated at Xโ can be represented in a closed
form.
Lemma D.3 ([SU15], Theorem 3.2). Let Xโ = UฮฃVT be the skinny SVD of matrix Xโ . The tangent cone
T (S, Xโ ) of the set S = {X โ Rn1 รn2 : rank(X) โค r} at Xโ is a linear subspace given by
T (S, Xโ ) = {ULT + MVT : L โ Rn2 รr , M โ Rn1 รr } , T .
Now we are ready to prove Theorem 4.1. By Lemma D.2 and D.3, we have
DS (Xโ ) = cone(S โ {Xโ }) โ T (S, Xโ ) = T ,
where the first equality holds by the definition of DS (Xโ ). So if T โฉ โฆโฅ = {0}, then DS (Xโ ) โฉ โฆโฅ = {0},
meaning that Xโ is the unique feasible solution to the problem (20). Thus the rest of proof is to find a
sufficient condition for T โฉ โฆโฅ = {0}. We have the following lemma.
Lemma D.4. Assume that โฆ โผ Ber(p) and the incoherence condition (3) holds. Then with probability at
โ
least 1 โ nโ10
1 โ p + p, provided that p โฅ C0 โ2 (ยตr log n(1) )/n(2) , where C0
(1) , we have kPโฆโฅ PT k โค
is an absolute constant.
17
Proof. If โฆ โผ Ber(p), we have, by Theorem E.2, that with high probability
kPT โ pโ1 PT Pโฆ PT k โค ,
provided that p โฅ C0 โ2
ยตr log n(1)
.
n(2)
Note, however, that since I = Pโฆ + Pโฆโฅ ,
PT โ pโ1 PT Pโฆ PT = pโ1 (PT Pโฆโฅ PT โ (1 โ p)PT )
and, therefore, by the triangle inequality
kPT Pโฆโฅ PT k โค p + (1 โ p).
Since kPโฆโฅ PT k2 โค kPT Pโฆโฅ PT k, the proof is completed.
We note that kPโฆโฅ PT k < 1 implies โฆโฅ โฉ T = {0}. The proof is completed.
E
Proof of Theorem 4.3
e B)
e = argminA,B 1 kABk2 , s.t.Pโฆ (AB) = Pโฆ (Xโ ),
We have shown in Theorem 4.1 that the problem (A,
F
2
eB
e = Xโ , with the optimal sample complexity. So if strong duality holds, this
exactly recovers Xโ , i.e., A
non-convex optimization problem can be equivalently converted to the convex program (10). Then Theorem
4.3 is straightforward from strong duality.
It now suffices to apply our unified framework in Section 3 to prove the strong duality. We show that the
e B)
e be a global solution to problem (10).
dual condition in Theorem 3.3 holds with high probability. Let (A,
For H(X) = I{MโRn1 รn2 : Pโฆ M=Pโฆ Xโ } (X), we have
e B)
e = {G โ Rn1 รn2 : hG, A
e Bi
e โฅ hG, Yi, for any Y โ Rn1 รn2 s.t. Pโฆ Y = Pโฆ Xโ }
ฮจ = โH(A
= {G โ Rn1 รn2 : hG, Xโ i โฅ hG, Yi, for any Y โ Rn1 รn2 s.t. Pโฆ Y = Pโฆ Xโ } = โฆ,
eB
e = Xโ . Then we only need to show
where the third equality holds since A
(1)
(2)
(3)
e โ โฆ,
ฮ
e =A
e B,
e
PT (โฮ)
(21)
e < 2 ฯr (A
e B).
e
kPT โฅ ฮk
3
We have the following lemma.
Lemma E.1. If we can construct an ฮ such that
(a)
ฮ โ โฆ,
(b)
e Bk
e F โค
kPT (โฮ) โ A
(c)
1
e B),
e
kPT โฅ ฮk < ฯr (A
3
s
r
e B),
e
ฯr (A
3n2(1)
e such that Eqn. (21) holds with probability at least 1 โ nโ10 .
then we can construct an ฮ
(1)
Proof. To prove the lemma, we first claim the following theorem.
18
(22)
Theorem E.2 ([CR09], Theorem 4.1). Assume that โฆ is sampled according to the Bernoulli model with
success probability p = ฮ( n1mn2 ), and incoherence condition (3) holds. Then there is an absolute constant
CR such that for ฮฒ > 1, we have
r
ฮฒยตn(1) r log n(1)
โ1
kp PT Pโฆ PT โ PT k โค CR
, ,
m
q
ฮฒยตn(1) r log n(1)
โฮฒ
with probability at least 1 โ 3n provided that CR
< 1.
m
e โ ฮ โ โฆ be the perturbation matrix between ฮ and ฮ
e
Suppose that Condition (22) holds. Let Y = ฮ
โ1
e
e
e
e
e
such that PT q
(โฮ) = AB. Such a Y exists by setting Y = Pโฆ PT (PT Pโฆ PT ) (PT (โฮ) โ AB). So
e B).
e We now prove Condition (3) in Eqn. (21). Observe that
kPT YkF โค 3nr2 ฯr (A
(1)
e โค kPT โฅ ฮk + kPT โฅ Yk
kPT โฅ ฮk
1
e B)
e + kPT โฅ Yk.
โค ฯr (A
3
(23)
e B).
e
So we only need to show kPT โฅ Yk โค 13 ฯr (A
Before proceeding, we begin by introducing a normalized version Qโฆ : Rn1 รn2 โ Rn1 รn2 of Pโฆ :
Qโฆ = pโ1 Pโฆ โ I.
With this, we have
PT Pโฆ PT = pPT (I + Qโฆ )PT .
Note that for any operator P : T โ T , we have
X
P โ1 =
(PT โ P)k whenever kPT โ Pk < 1.
kโฅ0
So according to Theorem E.2, the operator p(PT Pโฆ PT )โ1 can be represented as a convergent Neumann
series
X
p(PT Pโฆ PT )โ1 =
(โ1)k (PT Qโฆ PT )k ,
kโฅ0
because kPT Qโฆ PT k โค <
also note that
1
2
once m โฅ Cยตn(1) r log n(1) for a sufficiently large absolute constant C. We
p(PT โฅ Qโฆ PT ) = PT โฅ Pโฆ PT ,
19
because PT โฅ PT = 0. Thus
e B))k
e
kPT โฅ Yk = kPT โฅ Pโฆ PT (PT Pโฆ PT )โ1 (PT (โฮ) โ A
e B))k
e
= kPT โฅ Qโฆ PT p(PT Pโฆ PT )โ1 ((PT (โฮ) โ A
X
e B))k
e
=k
(โ1)k PT โฅ Qโฆ (PT Qโฆ PT )k ((PT (โฮ) โ A
kโฅ0
โค
X
e B))k
e F
k(โ1)k PT โฅ Qโฆ (PT Qโฆ PT )k ((PT (โฮ) โ A
kโฅ0
โค kQโฆ k
X
e B))k
e F
kPT Qโฆ PT kk kPT (โฮ) โ A
kโฅ0
4
e B)k
e F
kPT (โฮ) โ A
p
n n s r
1 2
e B)
e
โคฮ
ฯr (A
m
3n2(1)
โค
1
e B)
e
โค ฯr (A
3
with high probability. The proof is completed.
It thus suffices to construct a dual certificate ฮ such that all conditions in (22) hold. To this end, partition
โฆ = โฆ1 โช โฆ2 โช ... โช โฆb into b partitions of size q. By assumption, we may choose
128
1
qโฅ
Cฮฒฮบ2 ยตrn(1) log n(1) and b โฅ log2ฮบ 242 n2(1) ฮบ2
3
2
for a sufficiently large constant C. Let โฆj โผ Ber(q) denote the set of indices corresponding to the jeB
e and set ฮk = n1 n2 Pk Pโฆ (Wjโ1 ), Wk = A
eB
e โ PT (ฮk ) for
th partitions. Define W0 = A
j
j=1
q
k = 1, 2, ..., b. Then by Theorem E.2,
n1 n2
n1 n2
kWk kF = Wkโ1 โ
PT Pโฆk (Wkโ1 ) =
PT Pโฆk PT (Wkโ1 )
PT โ
q
q
F
F
1
โค
kWkโ1 kF .
2ฮบ
q r
โ
e B)
e โค
ee
So it follows that kWb kF โค (2ฮบ)โb kW0 kF โค (2ฮบ)โb rฯ1 (A
2 2 ฯr (AB).
24 n(1)
The following lemma together implies the strong duality of (10) straightforwardly.
Lemma E.3. Under the assumptions of Theorem 4.3, the dual certification Wb obeys the dual condition (22)
with probability at least 1 โ nโ10
(1) .
Proof. It is well known that for matrix completion, the Uniform model โฆ โผ Uniform(m) is equivalent
to the Bernoulli model โฆ โผ Ber(p), where each element in [n1 ] ร [n2 ] is included with probability p =
ฮ(m/(n1 n2 )) independently; see Section J for a brief justification. By the equivalence, we can suppose
โฆ โผ Ber(p).
To prove Lemma E.3, as a preliminary, we need the following lemmas.
Lemma E.4 ([Che15], Lemma 2). Suppose Z is a fixed matrix. Suppose โฆ โผ Ber(p). Then with high
probability,
๏ฃซ
๏ฃถ
s
log n(1)
log n(1)
k(I โ pโ1 Pโฆ )Zk โค C00 ๏ฃญ
kZkโ +
kZkโ,2 ๏ฃธ ,
p
p
20
where C00 > 0 is an absolute constant and
๏ฃฑ
๏ฃผ
s
sX
๏ฃฒ
๏ฃฝ
X
2
2
= max max
Zib , max
Zaj .
j
๏ฃณ i
๏ฃพ
a
kZkโ,2
b
Lemma E.5 ([CLMW11], Lemma 3.1). Suppose โฆ โผ Ber(p) and Z is a fixed matrix. Then with high
probability,
kZ โ pโ1 PT Pโฆ Zkโ โค kZkโ ,
provided that p โฅ C0 โ2 (ยตr log n(1) )/n(2) for some absolute constant C0 > 0.
Lemma E.6 ([Che15], Lemma 3). Suppose that Z is a fixed matrix and โฆ โผ Ber(p). If p โฅ c0 ยตr log n(1) /n(2)
for some c0 sufficiently large, then with high probability,
r
1 n(1)
1
k(pโ1 PT Pโฆ โ PT )Zkโ,2 โค
kZkโ + kZkโ,2 .
2 ยตr
2
Observe that by Lemma E.5,
kWj kโ
j
1
e Bk
e โ,
kA
โค
2
and by Lemma E.6,
kWj kโ,2 โค
1
2
r
n(1)
1
kWjโ1 kโ + kWjโ1 kโ,2 .
ยตr
2
So
kWj kโ,2
j r
n(1)
1
e Bk
e โ + 1 kWjโ1 kโ,2
โค
kA
2
ยตr
2
j r
j
n(1)
1
1
e
e
e Bk
e โ,2 .
โคj
kABkโ +
kA
2
ยตr
2
Therefore,
kPT โฅ ฮb k
โค
b
X
n1 n2
k
PT โฅ Pโฆj Wjโ1 k
q
j=1
=
b
X
kPT โฅ (
j=1
โค
b
X
j=1
k(
n1 n2
Pโฆj Wjโ1 โ Wjโ1 )k
q
n1 n2
Pโฆj โ I)(Wjโ1 )k.
q
21
Let p denote ฮ
q
n1 n2
. By Lemma E.4,
kPT โฅ ฮb k
b
X
0 log n(1)
โค C0
kWjโ1 kโ + C00
p
s
b
log n(1) X
kWjโ1 kโ,2
p
j=1
j=1
s
#
" r
j
b j
b
j
X
X
log
n
n
log
n
1
1
1
(1)
(1) e e
(1)
e Bk
e โ + C0
e Bk
e โ,2
โค C00
kA
j
kABkโ +
kA
0
p
2
p
2
ยตr
2
j=1
j=1
s
s
r
log
n
log
n
n
log n(1)
(1) e e
(1)
(1) e e
e Bk
e โ,2 .
โค C00
kABkโ + 2C00
kABkโ + C00
kA
p
p
ยตr
p
eB
e = Xโ , we note the facts that (we assume WLOG n2 โฅ n1 )
Setting A
r
r
ยตr
ยตr
โ
โ
T
T
T
โ
ฯ1 (X ) โค
ฮบฯr (Xโ ),
kX kโ,2 = max kei UฮฃV k2 โค max kei Ukฯ1 (X ) โค
i
i
n1
n1
and that
kXโ kโ = maxhXโ , ei eTj i = maxhUฮฃVT , ei eTj i = maxheTi Uฮฃ, eTj Vi
ij
โค
Substituting p = ฮ
F
ij
ij
max keTi UฮฃVT k2 keTj Vk2
ij
ฮบ2 ยตrn(1) log(n(1) ) log2ฮบ (n(1) )
n1 n2
ยตrฮบ
ฯr (Xโ ).
โค max kX kโ,2 keTj Vk2 โค โ
j
n1 n2
โ
e < 1 ฯr (Xโ ). The proof is completed.
, we obtain kPT โฅ ฮk
3
Proof of Theorem 5.1
Theorem 5.1 (Robust PCA. Restated). Suppose Xโ is n1 ร n2 , obeys incoherence (3) and (13). Assume that
the support set โฆ of Sโ is uniformly distributed among all sets of cardinality m. Then with probability at
least 1 โ cnโ10
(1) , the output of the optimization problem
e S)
e = argmin kXkrโ + ฮปkSk1 ,
(X,
s.t. D = X + S,
(24)
X,S
with ฮป =
ฯr (Xโ )
โ
n(1)
n
(2)
e = Xโ and S
e = Sโ , provided that rank(Xโ ) โค ฯr
is exact, namely, X
ยต log2 n
and m โค
(1)
ฯs n1 n2 , where c, ฯr , and ฯs are all positive absolute constants, and function k ยท krโ is given by (14).
F.1
Subgradient of the rโ Function
Lemma F.1. Let UฮฃVT be the skinny SVD of matrix Xโ of rank r. The subdifferential of k ยท krโ evaluated
at Xโ is given by
โkXโ krโ = {Xโ + W : UT W = 0, WV = 0, kWk โค ฯr (Xโ )}.
Proof. Note that for any fixed function f (ยท), the set of all optimal solutions of the problem
f โ (Xโ ) = maxhXโ , Yi โ f (Y)
Y
22
(25)
form the subdifferential of the conjugate function f โ (ยท) evaluated at Xโ . Set f (ยท) to be 12 k ยท k2r and notice
that the function 12 k ยท k2r is unitarily invariant. By Von Neumannโs trace inequality, the optimal solutions
to problem (25) are given by [U, Uโฅ ]Diag([ฯ1 (Y), ..., ฯr (Y), ฯr+1 (Y), ..., ฯn(2) (Y)])[V, Vโฅ ]T , where
n(2)
{ฯi (Y)}i=r+1
can be any value no larger than ฯr (Y) and {ฯi (Y)}ri=1 are given by the optimal solution to
the problem
r
r
X
1X 2
โ
max
ฯi (X )ฯi (Y) โ
ฯi (Y).
2
{ฯi (Y)}ri=1
i=1
The solution is unique such that ฯi (Y) = ฯi
F.2
(Xโ ),
i=1
i = 1, 2, ..., r. The proof is complete.
Dual Certificates
Lemma F.2. Assume that kPโฆ PT k โค 1/2 and ฮป < ฯr (Xโ ). Then (Xโ , Sโ ) is the unique solution to
problem (5.1) if there exists a pair (W, F) for which
Xโ + W = ฮป(sign(Sโ ) + F + Pโฆ K),
where W โ T โฅ , kWk โค
ฯr (Xโ )
,
2
F โ โฆโฅ , kFkโ โค 12 , and kPโฆ KkF โค 14 .
Proof. Let (Xโ + H, Sโ โ H) be any optimal solution to problem (24). By the definition of the subgradient,
the inequality follows
kXโ + Hkrโ + ฮปkSโ โ Hk1 โฅ kXโ krโ + ฮปkSโ k1 + hXโ + Wโ , Hi โ ฮปhsign(Sโ ) + Fโ , Hi
= kXโ krโ + ฮปkSโ k1 + hXโ โ ฮปsign(Sโ ), Hi + hWโ , Hi โ ฮปhFโ , Hi
= kXโ krโ + ฮปkSโ k1 + hXโ โ ฮปsign(Sโ ), Hi + ฯr (Xโ )kPT โฅ Hkโ + ฮปkPโฆโฅ Hk1
= kXโ krโ + ฮปkSโ k1 + hฮปF + ฮปPโฆ K โ W, Hi + ฯr (Xโ )kPT โฅ Hkโ + ฮปkPโฆโฅ Hk1
ฮป
ฮป
ฯr (Xโ )
= kXโ krโ + ฮปkSโ k1 +
kPT โฅ Hkโ + kPโฆโฅ Hk1 โ kPโฆ HkF .
2
2
4
We note that
kPโฆ HkF โค kPโฆ PT HkF + kPโฆ PT โฅ HkF
1
โค kHkF + kPT โฅ HkF
2
1
1
โค kPโฆ HkF + kPโฆโฅ HkF + kPT โฅ HkF ,
2
2
which implies that ฮป4 kPโฆ HkF โค ฮป4 kPโฆโฅ HkF + ฮป2 kPT โฅ HkF โค ฮป4 kPโฆโฅ Hk1 + ฮป2 kPT โฅ Hkโ . Therefore,
ฮป
ฯr (Xโ ) โ ฮป
kPT โฅ Hkโ + kPโฆโฅ Hk1
2
4
โ) โ ฮป
ฯ
(X
ฮป
r
โฅ kXโ + Hkrโ + ฮปkSโ โ Hk1 +
kPT โฅ Hkโ + kPโฆโฅ Hk1 ,
2
4
where the second inequality holds because (Xโ + H, Sโ โ H) is optimal. Thus H โ T โฉ โฆ. Note that
kPโฆ PT k < 1 implies T โฉ โฆ = {0}. This completes the proof.
kXโ + Hkrโ + ฮปkSโ โ Hk1 โฅ kXโ krโ + ฮปkSโ k1 +
According to Lemma F.2, to show the exact recoverability of problem (24), it is sufficient to find an
appropriate W for which
๏ฃฑ
๏ฃด
W โ T โฅ,
๏ฃด
๏ฃด
๏ฃด
๏ฃฒkWk โค ฯr (Xโ ) ,
2
(26)
โ
โ ))k โค ฮป ,
๏ฃด
kP
(X
+
W
โ
ฮปsign(S
โฆ
F
๏ฃด
4
๏ฃด
๏ฃด
๏ฃณkP โฅ (Xโ + W)k โค ฮป .
โ
โฆ
2
23
F.3
Dual Certification by Least Squares and the Golfing Scheme
The remainder of the proof is to construct W such that the dual condition (26) holds true. Before introducing
our construction, we assume โฆ โผ Ber(p), or equivalently โฆโฅ โผ Ber(1 โ p), where p is allowed be as large
as an absolute constant. Note that โฆโฅ has the same distribution as that of โฆ1 โช โฆ2 โช ... โช โฆj0 , where the
โฆj โs are drawn independently with replacement from Ber(q), j0 = dlog n(1) e, and q obeys p = (1 โ q)j0
(q = โฆ(1/ log n(1) ) implies p = O(1)). We construct W based on such a distribution.
Our construction separates W into two terms: W = WL + WS . To construct WL , we apply the golfing
scheme introduced by [Gro11, Rec11]. Specifically, WL is constructed by an inductive procedure:
Yj = Yjโ1 + q โ1 Pโฆj PT (Xโ โ Yjโ1 ), Y0 = 0,
WL = PT โฅ Yj0 .
To construct WS , we apply the method of least squares by [CLMW11], which is
X
WS = ฮปPT โฅ
(Pโฆ PT Pโฆ )k sign(Sโ ).
(27)
(28)
kโฅ0
Note that kPโฆ PT k โค 1/2. Thus kPโฆ PT Pโฆ k โค 1/4 and the Neumann series in (28) is well-defined.
Observe that Pโฆ WS = ฮป(Pโฆ โ Pโฆ PT Pโฆ )(Pโฆ โ Pโฆ PT Pโฆ )โ1 sign(Sโ ) = ฮปsign(Sโ ). So to prove the
dual condition (26), it suffices to show that
ฯr (Xโ )
,
4
(a) kWL k โค
ฮป
,
4
ฮป
โค ,
4
(b) kPโฆ (Xโ + WL )kF โค
(c) kPโฆโฅ (Xโ + WL )kโ
ฯr (Xโ )
,
4
ฮป
(e) kPโฆโฅ WS kโ โค .
4
(29)
(d) kWS k โค
F.4
(30)
Proof of Dual Conditions
Since we have constructed the dual certificate W, the remainder is to show that W obeys dual conditions
(29) and (30) with high probability. We have the following.
Lemma F.3. Assume โฆj โผ Ber(q), j = 1, 2, ..., j0 , and j0 = 2dlog n(1) e. Then under the other assumptions
of Theorem 5.1, WL given by (27) obeys dual condition (29).
Proof. Let Zj = PT (Xโ โ Yj ) โ T . Then we have
Zj = PT Zjโ1 โ q โ1 PT Pโฆj PT Zjโ1 = (PT โ q โ1 PT Pโฆj PT )Zjโ1 ,
and Yj =
Pj
k=1 q
โ1 P Z
โฆk kโ1
โ โฆโฅ . We set q = โฆ(โ2 ยตr log n(1) /n(2) ).
24
Proof of (a). It holds that
L
kW k = kPT โฅ Yj0 k โค
j0
X
kq โ1 PT โฅ Pโฆk Zkโ1 k
k=1
=
โค
j0
X
k=1
j0
X
kPT โฅ (q โ1 Pโฆk Zkโ1 โ Zkโ1 )k
kq โ1 Pโฆk Zkโ1 โ Zkโ1 k
k=1
๏ฃซ
โค C00 ๏ฃญ
log n(1)
q
j0
X
s
kZkโ1 kโ +
k=1
log n(1)
q
j0
X
๏ฃถ
kZkโ1 kโ,2 ๏ฃธ . (by Lemma E.4)
k=1
We note that by Lemma E.5,
kZkโ1 kโ
kโ1
1
kZ0 kโ ,
โค
2
and by Lemma E.6,
kZkโ1 kโ,2
1
โค
2
r
n(1)
1
kZkโ2 kโ + kZkโ2 kโ,2 .
ยตr
2
Therefore,
kZkโ1 kโ,2
kโ1 r
n(1)
1
1
kZ0 kโ + kZkโ2 kโ,2
โค
2
ยตr
2
kโ1 r
kโ1
n(1)
1
1
โค (k โ 1)
kZ0 kโ +
kZ0 kโ,2 ,
2
ยตr
2
and so we have
kWL k
๏ฃฎ
s
!๏ฃน
kโ1
kโ1r
j0 kโ1
j0
X
X
log
n
log
n
n
1
1
1
(1)
(1)
(1)
โค C00 ๏ฃฐ
kZ0 kโ+
kZ0 kโ+
kZ0 kโ,2 ๏ฃป
(k โ 1)
q
2
q
2
ยตr
2
k=1
k=1
๏ฃฎ
๏ฃน
s
s
log
n
n
log
n
log
n
(1)
(1)
(1)
(1)
โค 2C00 ๏ฃฐ
kXโ kโ +
kXโ kโ +
kXโ kโ,2 ๏ฃป
q
qยตr
q
r
โ
n(2)
n(2)
n1 n2
โ
โ
โ
โค 2C0
kX kโ +
kX kโ +
kX kโ,2
(since q = โฆ(ยตr log n(1) )/n(2) )
ยตr
ยตr
ยตr
ฯr (Xโ )
โค
, (by incoherence (13))
4
where we have used the fact that
kXโ kโ,2 โค
p
n(1) kXโ kโ โค
25
r
ยตr
ฯr (Xโ ).
n(2)
Proof of (b). Because Yj0 โ โฆโฅ , we have Pโฆ (Xโ + PT โฅ Yj0 ) = Pโฆ (Xโ โ PT Yj0 ) = Pโฆ Zj0 . It then
follows from Theorem E.2 that
kZj0 kF โค tj0 kXโ kF
โ
โค tj0 n1 n2 kXโ kโ
r
ยตr
j0 โ
ฯr (Xโ )
โคt
n1 n2
n1 n2
ฮป
โค . (tj0 โค eโ2 log n(1) โค nโ2
(1) )
8
Proof of (c). By definition, we know that Xโ + WL = Zj0 + Yj0 . Since we have shown kZj0 kF โค ฮป/8, it
suffices to prove kYj0 kโ โค ฮป/8. We have
kYj0 kโ โค q
โ1
โค q โ1
j0
X
k=1
j0
X
kPโฆk Zkโ1 kโ
kโ1 kXโ kโ
(by Lemma E.5)
k=1
r
n(2) 2
ยตr
ฯr (Xโ ) (by incoherence (13))
โค
C0 ยตr log n(1) n1 n2
ฮป
โค ,
8
ยตr(log n(1) )2 1/4
if we choose = C
for an absolute constant C. This can be true once the constant ฯr is
n(2)
sufficiently small.
We now prove that WS given by (28) obeys dual condition (30). We have the following.
Lemma F.4. Assume โฆ โผ Ber(p). Then under the other assumptions of Theorem 5.1, WS given by (28)
obeys dual condition (30).
Proof. According to the standard de-randomization argument [CLMW11], it is equivalent to studying the
case when the signs ฮดij of Sโij are independently distributed as
๏ฃฑ
๏ฃด
w.p. p/2,
๏ฃฒ1,
ฮดij = 0,
w.p. 1 โ p,
๏ฃด
๏ฃณ
โ1, w.p. p/2.
Proof of (d). Recall that
WS = ฮปPT โฅ
X
(Pโฆ PT Pโฆ )k sign(Sโ )
kโฅ0
= ฮปPT โฅ sign(Sโ ) + ฮปPT โฅ
X
(Pโฆ PT Pโฆ )k sign(Sโ ).
kโฅ1
โ
To bound the first term, we have ksign(Sโ )k โค 4 n(1) p [Ver10]. So kฮปPT โฅ sign(Sโ )k โค ฮปksign(Sโ )k โค
โ
4 pฯr (Xโ ) โค ฯr (Xโ )/8.
26
P
We now bound the second term. Let G = kโฅ1 (Pโฆ PT Pโฆ )k , which is self-adjoint, and denote by
Nn1 and Nn2 the 12 -nets of Sn1 โ1 and Sn1 โ1 of sizes at most 6n1 and 6n2 , respectively [Led05]. We know
that [Ver10]
kG(sign(Sโ ))k =
hG(yxT ), sign(Sโ )i
sup
xโSn2 โ1 ,yโSn1 โ1
โค4
hG(yxT ), sign(Sโ )i.
sup
xโNn2 ,yโNn1
Consider the random variable X(x, y) = hG(yxT ), sign(Sโ )i which has zero expectation. By Hoeffdingโs
inequality, we have
2t2
2t2
โค 2 exp โ
.
Pr(|X(x, y)| > t|โฆ) โค 2 exp โ
kGk2
kG(xyT )k2F
Therefore, by a union bound,
โ
n1 +n2
Pr(kG(sign(S ))k > t|โฆ) โค 2 ร 6
t2
exp โ
8kGk2
Note that conditioned on the event {kPโฆ PT k โค ฯ}, we have kGk =
t2
Pr(ฮปkG(sign(Sโ ))k > t) โค 2ร6n1 +n2 exp โ 2
8ฮป
1 โ ฯ2
ฯ2
P
.
kโฅ1 (Pโฆ PT
Pโฆ )k โค
ฯ2
.
1โฯ 2
So
2 !
Pr(kPโฆ PT k โค ฯ)+Pr(kPโฆ PT k > ฯ).
The following lemma guarantees that event {kPโฆ PT k โค ฯ} holds with high probability for a very small
absolute constant ฯ.
Lemma F.5 ([CLMW11], Cor 2.7). Suppose that โฆ โผ Ber(p) and incoherence (3) holds. Then with
2
โ2
probability at least 1 โ nโ10
(1) , kPโฆ PT k โค p + , provided that 1 โ p โฅ C0 ยตr log n(1) /n(2) for an
absolute constant C0 .
Setting t =
ฯr (Xโ )
,
8
this completes the proof of (d).
P
Proof of (e). Recall that WS = ฮปPT โฅ kโฅ0 (Pโฆ PT Pโฆ )k sign(Sโ ) and so
Pโฆโฅ WS = ฮปPโฆโฅ (I โ PT )
X
(Pโฆ PT Pโฆ )k sign(Sโ )
kโฅ0
X
= โฮปPโฆโฅ PT
(Pโฆ PT Pโฆ )k sign(Sโ ).
kโฅ0
Then for any (i, j) โ โฆโฅ , we have
*
S
Wij
= hWS , ei eTj i =
+
X
ฮปsign(Sโ ), โ
(Pโฆ PT Pโฆ )k Pโฆ PT (ei eTj ) .
kโฅ0
Let X(i, j) = โ
P
kโฅ0 (Pโฆ PT
Pโฆ )k Pโฆ PT (ei eTj ). By Hoeffdingโs inequality and a union bound,
!
Pr
S
sup |Wij
|
ij
> t|โฆ
โค2
X
ij
27
2t2
exp โ 2
ฮป kX(i, j)k2F
.
We note that conditioned on the event {kPโฆ PT k โค ฯ}, for any (i, j) โ โฆโฅ ,
kX(i, j)kF โค
โค
=
โค
โค
Then unconditionally,
!
Pr
S
sup |Wij
|
ij
>t
1
ฯkPT (ei eTj )kF
1 โ ฯ2
q
1
ฯ
1 โ kPT โฅ (ei eTj )k2F
1 โ ฯ2
q
1
ฯ
1 โ k(I โ UUT )ei k22 k(I โ VVT )ej k22
1 โ ฯ2
s
1
ยตr
ยตr
1โ
ฯ 1โ 1โ
1 โ ฯ2
n1
n2
r
ยตr ยตr
1
ฯ
+
.
2
1โฯ
n1
n2
2t2 (1 โ ฯ 2 )2 n1 n2
โค 2n1 n2 exp โ 2 2
ฮป ฯ ยตr(n1 + n2 )
Pr(kPโฆ PT k โค ฯ) + Pr(kPโฆ PT k > ฯ).
By Lemma F.5 and setting t = ฮป/4, the proof of (e) is completed.
G
Proof of Theorem 6.1
Our computational lower bound for problem (P) assumes the hardness of random 4-SAT.
Conjecture 1 (Random 4-SAT). Let c > ln 2 be a constant. Consider a random 4-SAT formula on n
variables in which each clause has 4 literals, and in which each of the 16n4 clauses is picked independently
with probability c/n3 . Then any algorithm which always outputs 1 when the random formula is satisfiable,
0
and outputs 0 with probability at least 1/2 when the random formula is unsatisfiable, must run in 2c n time
on some input, where c0 > 0 is an absolute constant.
Based on Conjecture 1, we have the following computational lower bound for problem (P). We show that
problem (P) is in general hard for deterministic algorithms. If we additionally assume BPP = P, then the
same conclusion holds for randomized algorithms with high probability.
Theorem 6.1 (Computational Lower Bound. Restated). Assume Conjecture 1. Then there exists an absolute
constant 0 > 0 for which any algorithm that achieves (1 + )OPT in objective function value for problem
(P) with โค 0 , and with constant probability, requires 2โฆ(n1 +n2 ) time, where OPT is the optimum. If in
addition, BPP = P, then the same conclusion holds for randomized algorithms succeeding with probability
at least 2/3.
Proof. Theorem 6.1 is proved by using the hypothesis that random 4-SAT is hard to show hardness of the
Maximum Edge Biclique problem for deterministic algorithms.
Definition 1 (Maximum Edge Biclique). The problem is
Input: An n-by-n bipartite graph G.
Output: A k1 -by-k2 complete bipartite subgraph of G, such that k1 ยท k2 is maximized.
28
[GL04] showed that under the random 4-SAT assumption there exist two constants 1 > 2 > 0 such
that no efficient deterministic algorithm is able to distinguish between bipartite graphs G(U, V, E) with
|U | = |V | = n which have a clique of size โฅ (n/16)2 (1 + 1 ) and those in which all bipartite cliques are of
size โค (n/16)2 (1 + 2 ). The reduction uses a bipartite graph G with at least tn2 edges with large probability,
for a constant t.
Given a given bipartite graph G(U, V, E), define H(ยท) as follows. Define the matrix Y and W: Yij = 1
if edge (Ui , Vj ) โ E, Yij = 0 if edge (Ui , Vj ) 6โ E; Wij = 1 if edge (Ui , Vj ) โPE, and Wij = poly(n) if
2 (Y โ (AB) )2 .
edge (Ui , Vj ) 6โ E. Choose a large enough constant ฮฒ > 0 and let H(AB) = ฮฒ ij Wij
ij
ij
2
Now, if there exists a biclique in G with at least (n/16) (1 + 2 ) edges, then the number of remaining
edges is at most tn2 โ (n/16)2 (1 + 1 ), and so the solution to min H(AB) + 12 kABk2F has cost at most
ฮฒ[tn2 โ (n/16)2 (1 + 1 )] + n2 . On the other hand, if there does not exist a biclique that has more than
(n/16)2 (1 + 2 ) edges, then the number of remaining edges is at least (n/16)2 (1 + 2 ), and so any solution
to min H(AB) + 21 kABk2F has cost at least ฮฒ[tn2 โ (n/16)2 (1 + 2 )]. Choose ฮฒ large enough so that
ฮฒ[tn2 โ (n/16)2 (1 + 2 )] > ฮฒ[tn2 โ (n/16)2 (1 + 1 )] + n2 . This combined with the result in [GL04]
completes the proof for deterministic algorithms.
To rule out randomized algorithms running in time 2ฮฑ(n1 +n2 ) for some function ฮฑ of n1 , n2 for which
ฮฑ = o(1), observe that we can define a new problem which is the same as problem (P) except the input
description of H is padded with a string of 1s of length 2(ฮฑ/2)(n1 +n2 ) . This string is irrelevant for solving
problem (P) but changes the input size to N = poly(n1 , n2 ) + 2(ฮฑ/2)(n1 +n2 ) . By the argument in the previous
paragraph, any deterministic algorithm still requires 2โฆ(n) = N ฯ(1) time to solve this problem, which is
super-polynomial in the new input size N . However, if a randomized algorithm can solve it in 2ฮฑ(n1 +n2 ) time,
then it runs in poly(N ) time. This contradicts the assumption that BPP = P. This completes the proof.
H
Matrix Completion by Information-Theoretic Upper Bound
Theorem 4.1 formulates matrix completion as a feasibility problem. However, it is a priori unclear if there is
an algorithm for finding Xโ with O(ยตn(1) r log n(1) ) sample complexity and incoherence (3) via solving the
feasibility problem. To answer this question, we mention that matrix completion can be solved in finite time
under these minimum assumptions, namely, we note that the feasibility problem is equivalent to finding a
zero of the polynomial
X
(eTi ABej โ Xโij )2 = 0
(i,j)โโฆ
w.r.t. the (n1 + n2 )r unknowns A and B. Since A can be assumed to be orthogonal, if the entries of Xโ
can be written down with poly(n) bits, then kBkF โค exp(poly(n)), which means if one rounds each of the
entries of B to the nearest additive grid multiple of 1/ exp(poly(n)), then we will get a rank-k matrix B
where each entry represents the true entry of the optimal B up to additive 1/ exp(poly(n)) error (of course
one cannot write down B in some cases if the entries are irrational). Such an A and B can be found in
exp((n1 + n2 )r) time [Ren92a, Ren92b, BPR96]. This gives an exponential time algorithm to solve the
feasibility problem in Theorem 4.1 for matrix completion.
I
Dual and Bi-Dual Problems
In this section, we derive the dual and bi-dual problems of non-convex program (P). According to (5), the
primal problem (P) is equivalent to
1
1
min max k โ ฮ โ ABk2F โ kฮk2F โ H โ (ฮ).
A,B ฮ 2
2
29
Therefore, the dual problem is given by
1
1
max min k โ ฮ โ ABk2F โ kฮk2F โ H โ (ฮ)
ฮ A,B 2
2
n
(2)
1 X 2
1
= max
ฯi (โฮ) โ kฮk2F โ H โ (ฮ)
ฮ 2
2
i=r+1
1
= max โ kฮk2r โ H โ (ฮ),
ฮ
2
where kฮk2r =
Pr
2
i=1 ฯi (ฮ).
(D1)
The bi-dual problem is derived by
1
min max0 โ kฮk2r โ H โ (ฮ0 ) + hM, ฮ0 โ ฮi
M ฮ,ฮ
2
1
2
0
โ
0
= min max hM, โฮi โ k โ ฮkr + max
hM,
ฮ
i
โ
H
(ฮ
)
M โฮ
ฮ0
2
= min kMkrโ + H(M),
(D2)
M
where kMkrโ = maxX hM, Xi โ 21 kXk2r is a convex function, and H(M) = maxฮ0 [hM, ฮ0 i โ H โ (ฮ0 )]
holds by the definition of conjugate function.
Problems (D1) and (D2) can be solved efficiently due to their convexity. In particular, [GRG16] provided
a computationally efficient algorithm to compute the proximal operators of functions 12 k ยท k2r and k ยท krโ .
Hence, the Douglas-Rachford algorithm can find the global minimum up to an error in function value in
time poly(1/) [HY12].
J
Equivalence of Bernoulli and Uniform Models
Lemma J.1. Let n be the number of Bernoulli trials and suppose that โฆ โผ Ber(m/n). Then with probability
at least 1 โ nโ10 , |โฆ| = ฮ(m), provided that m โฅ c log n for an absolute constant c.
Proof. By the scalar Chernoff bound, with > 0 we have
Pr(|โฆ| โค m โ n) โค exp โ2 n2 /(2m) ,
(31)
Pr(|โฆ| โฅ m + n) โค exp โ2 n2 /(3m) .
(32)
and
Taking = m/(2n) and m โฅ c1 log n in (31) for an appropriate absolute constant c1 , we have
Pr(|โฆ| โค m/2) โค exp(โm/4) โค
nโ10
.
2
(33)
Taking = m/n and m โฅ c2 log n in (32) for an appropriate absolute constant c2 , we have
Pr(|โฆ| โฅ 2m) โค exp(โm/3) โค
nโ10
.
2
(34)
Given (33) and (34), we conclude that m/2 < |โฆ| < 2m with probability at least 1 โ nโ10 , provided that
m โฅ c log n for an absolute constant c.
30
References
[AAZB+ 16] Naman Agarwal, Zeyuan Allen-Zhu, Brian Bullins, Elad Hazan, and Tengyu Ma. Finding approximate local minima for nonconvex optimization in linear time. arXiv preprint
arXiv:1611.01146, 2016.
[ABGM14] Sanjeev Arora, Aditya Bhaskara, Rong Ge, and Tengyu Ma. More algorithms for provable
dictionary learning. arXiv preprint arXiv:1401.0579, 2014.
[ABHZ16]
Pranjal Awasthi, Maria-Florina Balcan, Nika Haghtalab, and Hongyang Zhang. Learning and
1-bit compressed sensing under asymmetric noise. In Annual Conference on Learning Theory,
pages 152โ192, 2016.
[AG16]
Anima Anandkumar and Rong Ge. Efficient approaches for escaping higher order saddle points
in non-convex optimization. arXiv preprint arXiv:1602.05908, 2016.
[AGH+ 14]
Animashree Anandkumar, Rong Ge, Daniel J Hsu, Sham M Kakade, and Matus Telgarsky.
Tensor decompositions for learning latent variable models. Journal of Machine Learning
Research, 15(1):2773โ2832, 2014.
[AMS11]
Christoph Ambรผhl, Monaldo Mastrolilli, and Ola Svensson. Inapproximability results for
maximum edge biclique, minimum linear arrangement, and sparsest cut. SIAM Journal on
Computing, 40(2):567โ596, 2011.
[ANW12]
Alekh Agarwal, Sahand Negahban, and Martin J Wainwright. Noisy matrix decomposition
via convex relaxation: Optimal rates in high dimensions. The Annals of Statistics, pages
1171โ1197, 2012.
[ARR14]
Ali Ahmed, Benjamin Recht, and Justin Romberg. Blind deconvolution using convex programming. IEEE Transactions on Information Theory, 60(3):1711โ1732, 2014.
[AZ16]
Zeyuan Allen-Zhu. Katyusha: The first direct acceleration of stochastic gradient methods.
arXiv preprint arXiv:1603.05953, 2016.
[BCMV14] Aditya Bhaskara, Moses Charikar, Ankur Moitra, and Aravindan Vijayaraghavan. Smoothed
analysis of tensor decompositions. In ACM Symposium on Theory of Computing, pages
594โ603, 2014.
[BE06]
Amir Beck and Yonina C Eldar. Strong duality in nonconvex quadratic optimization with two
quadratic constraints. SIAM Journal on Optimization, 17(3):844โ860, 2006.
[BH89]
Pierre Baldi and Kurt Hornik. Neural networks and principal component analysis: Learning
from examples without local minima. Neural Networks, 2(1):53โ58, 1989.
[BKS16]
Srinadh Bhojanapalli, Anastasios Kyrillidis, and Sujay Sanghavi. Dropping convexity for faster
semi-definite optimization. In Annual Conference on Learning Theory, pages 530โ582, 2016.
[BM05]
Samuel Burer and Renato DC Monteiro. Local minima and convergence in low-rank semidefinite programming. Mathematical Programming, 103(3):427โ444, 2005.
[BMP08]
Francis Bach, Julien Mairal, and Jean Ponce. Convex sparse matrix factorizations. arXiv
preprint arXiv:0812.1869, 2008.
31
[BNS16]
Srinadh Bhojanapalli, Behnam Neyshabur, and Nati Srebro. Global optimality of local search
for low rank matrix recovery. In Advances in Neural Information Processing Systems, pages
3873โ3881, 2016.
[BPR96]
Saugata Basu, Richard Pollack, and Marie Francoise Roy. On the combinatorial and algebraic
complexity of quantifier elimination. J. ACM, 43(6):1002โ1045, 1996.
[BV04]
Stephen Boyd and Lieven Vandenberghe. Convex optimization. Cambridge university press,
2004.
[BZ16]
Maria-Florina Balcan and Hongyang Zhang. Noise-tolerant life-long matrix completion via
adaptive sampling. In Advances in Neural Information Processing Systems, pages 2955โ2963,
2016.
[Che15]
Yudong Chen. Incoherence-optimal matrix completion. IEEE Transactions on Information
Theory, 61(5):2909โ2923, 2015.
[CHM+ 15] Anna Choromanska, Mikael Henaff, Michael Mathieu, Gรฉrard Ben Arous, and Yann LeCun.
The loss surfaces of multilayer networks. In International Conference on Artificial Intelligence
and Statistics, 2015.
[CLMW11] Emmanuel J. Candรจs, Xiaodong Li, Yi Ma, and John Wright. Robust principal component
analysis? Journal of the ACM, 58(3):11, 2011.
[CR09]
Emmanuel J. Candรจs and Ben Recht. Exact matrix completion via convex optimization.
Foundations of Computational Mathematics, 9(6):717โ772, 2009.
[CR13]
Emmanuel J. Candรจs and Benjamin Recht. Simple bounds for recovering low-complexity
models. Mathematical Programming, pages 1โ13, 2013.
[CRPW12]
Venkat Chandrasekaran, Benjamin Recht, Pablo A Parrilo, and Alan S Willsky. The convex
geometry of linear inverse problems. Foundations of Computational Mathematics, 12(6):805โ
849, 2012.
[CT10]
Emmanuel J. Candรจs and Terence Tao. The power of convex relaxation: Near-optimal matrix
completion. IEEE Transactions on Information Theory, 56(5):2053โ2080, 2010.
[CW15]
Yudong Chen and Martin J. Wainwright. Fast low-rank estimation by projected gradient descent:
General statistical and algorithmic guarantees. arXiv preprint arXiv:1509.03025, 2015.
[Fei02]
Uriel Feige. Relations between average case complexity and approximation complexity. In
Proceedings of the 17th Annual IEEE Conference on Computational Complexity, Montrรฉal,
Quรฉbec, Canada, May 21-24, 2002, page 5, 2002.
[GHJY15]
Rong Ge, Furong Huang, Chi Jin, and Yang Yuan. Escaping from saddle points โ online
stochastic gradient for tensor decomposition. In Annual Conference on Learning Theory, pages
797โ842, 2015.
[GJY17]
Rong Ge, Chi Jin, and Zheng Yi. No spurious local minima in nonconvex low rank problems:
A unified geometric analysis. arXiv preprint: 1704.00708, 2017.
[GL04]
Andreas Goerdt and Andrรฉ Lanka. An approximation hardness result for bipartite clique. In
Electronic Colloquium on Computational Complexity, Report, volume 48, 2004.
32
[GLM16]
Rong Ge, Jason D Lee, and Tengyu Ma. Matrix completion has no spurious local minimum. In
Advances in Neural Information Processing Systems, pages 2973โ2981, 2016.
[GLZ17]
David Gamarnik, Quan Li, and Hongyi Zhang. Matrix completion from O(n) samples in linear
time. arXiv preprint arXiv:1702.02267, 2017.
[GRG16]
Christian Grussler, Anders Rantzer, and Pontus Giselsson. Low-rank optimization with convex
constraints. arXiv preprint arXiv:1606.01793, 2016.
[Gro11]
D. Gross. Recovering low-rank matrices from few coefficients in any basis. IEEE Transactions
on Information Theory, 57(3):1548โ1566, 2011.
[GWL16]
Quanquan Gu, Zhaoran Wang, and Han Liu. Low-rank and sparse structure pursuit via
alternating minimization. In International Conference on Artificial Intelligence and Statistics,
pages 600โ609, 2016.
[Har14]
Moritz Hardt. Understanding alternating minimization for matrix completion. In IEEE
Symposium on Foundations of Computer Science, pages 651โ660, 2014.
[HM12]
Moritz Hardt and Ankur Moitra. Algorithms and hardness for robust subspace recovery. arXiv
preprint: 1211.1041, 2012.
[HMRW14] Moritz Hardt, Raghu Meka, Prasad Raghavendra, and Benjamin Weitz. Computational limits
for matrix completion. In Annual Conference on Learning Theory, pages 703โ725, 2014.
[HV15]
Benjamin D Haeffele and Renรฉ Vidal. Global optimality in tensor factorization, deep learning,
and beyond. arXiv preprint arXiv:1506.07540, 2015.
[HY12]
Bingsheng He and Xiaoming Yuan. On the O(1/n) convergence rate of the douglasโrachford
alternating direction method. SIAM Journal on Numerical Analysis, 50(2):700โ709, 2012.
[HYV14]
Benjamin Haeffele, Eric Young, and Rene Vidal. Structured low-rank matrix factorization:
Optimality, algorithm, and applications to image processing. In International Conference on
Machine Learning, pages 2007โ2015, 2014.
[IW97]
Russell Impagliazzo and Avi Wigderson. P = BPP if E requires exponential circuits: Derandomizing the XOR lemma. In ACM Symposium on the Theory of Computing, pages 220โ229,
1997.
[Jah07]
Johannes Jahn. Introduction to the theory of nonlinear optimization. Springer Berlin Heidelberg,
2007.
[JBAS10]
Michel Journรฉe, Francis Bach, P-A Absil, and Rodolphe Sepulchre. Low-rank optimization on
the cone of positive semidefinite matrices. SIAM Journal on Optimization, 20(5):2327โ2351,
2010.
[JGN+ 17]
Chi Jin, Rong Ge, Praneeth Netrapalli, Sham M Kakade, and Michael I Jordan. How to escape
saddle points efficiently. arXiv preprint arXiv:1703.00887, 2017.
[JMD10]
Prateek Jain, Raghu Meka, and Inderjit S Dhillon. Guaranteed rank minimization via singular
value projection. In Advances in Neural Information Processing Systems, pages 937โ945, 2010.
[JNS13]
Prateek Jain, Praneeth Netrapalli, and Sujay Sanghavi. Low-rank matrix completion using
alternating minimization. In ACM Symposium on Theory of Computing, pages 665โ674, 2013.
33
[Kaw16]
Kenji Kawaguchi. Deep learning without poor local minima. arXiv preprint arXiv:1605.07110,
2016.
[KBV09]
Yehuda Koren, Robert Bell, and Chris Volinsky. Matrix factorization techniques for recommender systems. IEEE Computer, 42(8):30โ37, 2009.
[Kes12]
Raghunandan Hulikal Keshavan. Efficient algorithms for collaborative filtering. PhD thesis,
Stanford University, 2012.
[KMO10a]
Raghunandan H Keshavan, Andrea Montanari, and Sewoong Oh. Matrix completion from a
few entries. IEEE Transactions on Information Theory, 56(6):2980โ2998, 2010.
[KMO10b]
Raghunandan H Keshavan, Andrea Montanari, and Sewoong Oh. Matrix completion from
noisy entries. Journal of Machine Learning Research, 11:2057โ2078, 2010.
[Led05]
Michel Ledoux. The concentration of measure phenomenon. Number 89. American Mathematical Society, 2005.
[LLR16]
Yuanzhi Li, Yingyu Liang, and Andrej Risteski. Recovery guarantee of weighted low-rank
approximation via alternating minimization. In International Conference on Machine Learning,
pages 2358โ2367, 2016.
[NNS+ 14]
Praneeth Netrapalli, UN Niranjan, Sujay Sanghavi, Animashree Anandkumar, and Prateek
Jain. Non-convex robust PCA. In Advances in Neural Information Processing Systems, pages
1107โ1115, 2014.
[NW12]
Sahand Negahban and Martin J Wainwright. Restricted strong convexity and weighted matrix
completion: Optimal bounds with noise. Journal of Machine Learning Research, 13:1665โ1697,
2012.
[OW92]
Michael L Overton and Robert S Womersley. On the sum of the largest eigenvalues of a
symmetric matrix. SIAM Journal on Matrix Analysis and Applications, 13(1):41โ45, 1992.
[Rec11]
Benjamin Recht. A simpler approach to matrix completion. Journal of Machine Learning
Research, 12:3413โ3430, 2011.
[Ren92a]
James Renegar. On the computational complexity and geometry of the first-order theory of
the reals, part I: introduction. preliminaries. the geometry of semi-algebraic sets. the decision
problem for the existential theory of the reals. J. Symb. Comput., 13(3):255โ300, 1992.
[Ren92b]
James Renegar. On the computational complexity and geometry of the first-order theory of the
reals, part II: the general decision problem. preliminaries for quantifier elimination. J. Symb.
Comput., 13(3):301โ328, 1992.
[RSW16]
Ilya Razenshteyn, Zhao Song, and David P. Woodruff. Weighted low rank approximations with
provable guarantees. In ACM Symposium on Theory of Computing, pages 250โ263, 2016.
[SL15]
Ruoyu Sun and Zhi-Quan Luo. Guaranteed matrix completion via nonconvex factorization. In
IEEE Symposium on Foundations of Computer Science, pages 270โ289, 2015.
[SQW16]
Ju Sun, Qing Qu, and John Wright. A geometric analysis of phase retrieval. In IEEE International Symposium on Information Theory, pages 2379โ2383, 2016.
34
[SQW17a]
Ju Sun, Qing Qu, and John Wright. Complete dictionary recovery over the sphere I: Overview
and the geometric picture. IEEE Transactions on Information Theory, 63(2):853โ884, 2017.
[SQW17b]
Ju Sun, Qing Qu, and John Wright. Complete dictionary recovery over the sphere II: Recovery
by Riemannian trust-region method. IEEE Transactions on Information Theory, 63(2):885โ914,
2017.
[SS05]
Nathan Srebro and Adi Shraibman. Rank, trace-norm and max-norm. In International Conference on Computational Learning Theory, pages 545โ560. Springer, 2005.
[SU15]
Reinhold Schneider and Andrรฉ Uschmajew. Convergence results for projected line-search
methods on varieties of low-rank matrices via Lojasiewicz inequality. SIAM Journal on
Optimization, 25(1):622โ646, 2015.
[SWZ14]
Yuan Shen, Zaiwen Wen, and Yin Zhang. Augmented lagrangian alternating direction method
for matrix separation based on low-rank factorization. Optimization Methods and Software,
29(2):239โ263, 2014.
[TBSR13]
Gongguo Tang, Badri Narayan Bhaskar, Parikshit Shah, and Benjamin Recht. Compressed
sensing off the grid. IEEE Transactions on Information Theory, 59(11):7465โ7490, 2013.
[TBSR15]
Stephen Tu, Ross Boczar, Mahdi Soltanolkotabi, and Benjamin Recht. Low-rank solutions of
linear matrix equations via procrustes flow. arXiv preprint arXiv:1507.03566, 2015.
[Ver09]
Roman Vershynin. Lectures in geometric functional analysis. pages 1โ76, 2009.
[Ver10]
Roman Vershynin. Introduction to the non-asymptotic analysis of random matrices. arXiv
preprint: 1011.3027, 2010.
[Ver15]
Roman Vershynin. Estimation in high dimensions: A geometric perspective. In Sampling
theory, a renaissance, pages 3โ66. Springer, 2015.
[WX12]
Yu-Xiang Wang and Huan Xu. Stability of matrix factorization for collaborative filtering. In
International Conference on Machine Learning, pages 417โ424, 2012.
[WYZ12]
Zaiwen Wen, Wotao Yin, and Yin Zhang. Solving a low-rank factorization model for matrix
completion by a nonlinear successive over-relaxation algorithm. Mathematical Programming
Computation, 4(4):333โ361, 2012.
[YPCC16]
Xinyang Yi, Dohyung Park, Yudong Chen, and Constantine Caramanis. Fast algorithms for
robust PCA via gradient descent. In Advances in neural information processing systems, pages
4152โ4160, 2016.
[ZL15]
Qinqing Zheng and John Lafferty. A convergent gradient descent algorithm for rank minimization and semidefinite programming from random linear measurements. In Advances in Neural
Information Processing Systems, pages 109โ117, 2015.
[ZL16]
Qinqing Zheng and John Lafferty. Convergence analysis for rectangular matrix completion
using Burer-Monteiro factorization and gradient descent. arXiv preprint arXiv:1605.07051,
2016.
35
[ZLZ13]
Hongyang Zhang, Zhouchen Lin, and Chao Zhang. A counterexample for the validity of using
nuclear norm as a convex surrogate of rank. In European Conference on Machine Learning and
Principles and Practice of Knowledge Discovery in Databases, volume 8189, pages 226โ241,
2013.
[ZLZ16]
Hongyang Zhang, Zhouchen Lin, and Chao Zhang. Completing low-rank matrices with
corrupted samples from few coefficients in general basis. IEEE Transactions on Information
Theory, 62(8):4748โ4768, 2016.
[ZLZC15]
Hongyang Zhang, Zhouchen Lin, Chao Zhang, and Edward Chang. Exact recoverability of
robust PCA via outlier pursuit with tight recovery bounds. In AAAI Conference on Artificial
Intelligence, pages 3143โ3149, 2015.
[ZLZG14]
Hongyang Zhang, Zhouchen Lin, Chao Zhang, and Junbin Gao. Robust latent low rank
representation for subspace clustering. Neurocomputing, 145:369โ373, 2014.
[ZLZG15]
Hongyang Zhang, Zhouchen Lin, Chao Zhang, and Junbin Gao. Relations among some low
rank subspace recovery models. Neural Computation, 27:1915โ1950, 2015.
[ZWG17]
Xiao Zhang, Lingxiao Wang, and Quanquan Gu. A nonconvex free lunch for low-rank plus
sparse matrix recovery. arXiv preprint arXiv:1702.06525, 2017.
[ZWL15]
Tuo Zhao, Zhaoran Wang, and Han Liu. A nonconvex optimization framework for low rank
matrix estimation. In Advances in Neural Information Processing Systems, pages 559โ567,
2015.
36
| 8cs.DS
|
arXiv:1403.3148v4 [cs.SI] 15 Nov 2016
Heat Kernel Based Community Detection
Kyle Kloster
David F. Gleich
Purdue University
West Lafayette, IN
Purdue University
West Lafayette, IN
[email protected]
[email protected]
ABSTRACT
The heat kernel is a type of graph diffusion that, like the
much-used personalized PageRank diffusion, is useful in identifying a community nearby a starting seed node. We present
the first deterministic, local algorithm to compute this diffusion and use that algorithm to study the communities that it
produces. Our algorithm is formally a relaxation method for
solving a linear system to estimate the matrix exponential
in a degree-weighted norm. We prove that this algorithm
stays localized in a large graph and has a worst-case constant runtime that depends only on the parameters of the
diffusion, not the size of the graph. On large graphs, our experiments indicate that the communities produced by this
method have better conductance than those produced by
PageRank, although they take slightly longer to compute.
On a real-world community identification task, the heat kernel communities perform better than those from the PageRank diffusion.
Categories and Subject Descriptors
G.2.2 [Discrete mathematics]: Graph theoryโGraph algorithms; I.5.3 [Pattern recognition]: ClusteringโAlgorithms
General Terms
Algorithms,Theory
Keywords
heat kernel; local clustering
1.
INTRODUCTION
The community detection problem is to identify a set of
nodes in a graph that are internally cohesive but also separated from the remainder of the network. One popular way
to capture this idea is through the conductance measure of
a set. We treat this idea formally in the next section, but
Permission to make digital or hard copies of all or part of this work for personal or
classroom use is granted without fee provided that copies are not made or distributed
for profit or commercial advantage and that copies bear this notice and the full citation
on the first page. Copyrights for components of this work owned by others than the
author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or
republish, to post on servers or to redistribute to lists, requires prior specific permission
and/or a fee. Request permissions from [email protected].
KDDโ14, August 24โ27, 2014, New York, NY, USA.
Copyright is held by the owner/author(s). Publication rights licensed to ACM.
ACM 978-1-4503-2956-9/14/08 ...$15.00.
http://dx.doi.org/10.1145/2623330.2623706.
informally, the conductance of a set is a ratio of the number
of edges leaving the set to the number of edges touched by
the set of vertices. If this value is small, then it indicates a
set with many internal edges and few edges leaving.
In many surveys and empirical studies [17, 35, 49], the
conductance measure surfaces as one of the most reliable
measures of a community. Although this measure has been
critized for producing cavemen-type communities [24], empirical properties of real-world communities correlate highly
with sets produced by algorithms that optimize conductance [1].
Furthermore, state-of-the-art methods for identifying overlapping sets of communities use conductance to find realworld communities better than any alternative [54].
Virtually all of the rigorous algorithms that identify sets
of small conductance are based on min-cuts [6, 48], eigenvector computations [4, 21], or local graph diffusions [5, 14].
(One notable exception is the graclus method [17] that uses a
relationship between kernel k-means and a variant of conductance.) In this paper, we study a new algorithm that uses a
heat kernel diffusion [14] to identify small-conductance communities in a network. (The heat kernel is discussed formally
in Section 3.) Although the properties of this diffusion had
been analyzed in theory in Chungโs work [14], that work did
not provide an efficient algorithm to compute the diffusion.
Recently, Chung and Simpson stated a randomized Monte
Carlo method to estimate the diffusion [16].
This paper introduces an efficient and deterministic method
to estimate this diffusion. We use it to study the properties
of the small conductance sets identified by the method as
communities. For this use, a deterministic approach is critical as we need to differentiate between subtle properties
of the diffusion. Our primary point of comparison is the
well-known personalized PageRank diffusion [5], which has
been used to establish new insights into the properties of
communities in large scale networks [35]. Thus, we wish to
understand how the communities produced by the heat kernel compare to those produced by personalized PageRank.
The basic operation of our algorithm is a coordinate relaxation step. This has been used to efficiently compute
personalized PageRank [5, 23, 38] where it is known as the
โpushโ operation on a graph; the term โcoordinate relaxationโ
is the classical name for this operation, which dates back to
the Gauss-Seidel method. What distinguishes our approach
from prior work is the use of coordinate relaxation on an
implicitly constructed linear system that will estimate the
heat kernel diffusion, which is formally the exponential of
the random walk transition matrix.
We began looking into this problem recently in a workshop paper [28], where we showed that this style of algorithm
successfully estimates a related quantity. This paper tackles a fundamentally new direction and, although similar in
techniques, required an entirely new analysis. In particular,
we are able to estimate this diffusion in constant time in a
degree-weighted norm that depends only on the parameters
of the diffusion, and not the size of the graph. A Python
implementation of our algorithm to accomplish this task is
presented in Figure 2.
In the remainder of the paper, we first review these topics formally (Sections 2 and 3); present our algorithm (Section 4) and discuss related work (Section 5). Then we show
how our new approach differs from and improves upon the
personalized PageRank diffusion in synthetic and real-world
problems.
Summary of contributions.
ยท We propose the first local, deterministic method to accurately compute a heat kernel diffusion in a graph. The
code is simple and scalable to any graph where out-link
access is inexpensive.
ยท Our method is always localized, even in massive graphs,
because it has a provably constant runtime in a degreeweighted norm.
ยท We compare the new heat kernel diffusion method to the
venerable PageRank diffusion in synthetic, small, and large
networks (up to 2 billion edges) to demonstrate the differences. On large networks such as Twitter, our method
tends to produce smaller and tighter communities. It is
also more accurate at detecting ground-truth communities.
We make our experimental codes available in the spirit of
reproducible research:
https://www.cs.purdue.edu/homes/dgleich/codes/hkgrow
2.
PRELIMINARIES
We begin by fixing our notation. Let G = (V, E) be a
simple, undirected graph with n = |V | vertices. Fix an ordering of the vertices from 1 to n such that we can refer to a
vertex by itโs numeric ID. For a vertex v โ V , we denote by
dv the degree of node v. Let A be the associated adjacency
matrix. Because G is undirected, A is symmetric. Furthermore, let D be the diagonal matrix of degrees (Dii = di )
and P = (Dโ1 A)T = ADโ1 be the random walk transition
matrix. Finally, we denote by ei the vector (of an appropriate length) of zeros having a single 1 in entry i, and by e
the vector of all 1s.
Conductance. Given a subset S โ V , we denote by
vol(S) the sum of the degrees of all vertices in S, and by
โ(S), the boundary of S, the number of edges with one endpoint inside of S and one endpoint outside of S. With this
notation, the conductance of a set S is given by
ฯ(S) :=
โ(S)
min{vol(S), vol(V โ S)}
Conceptually, ฯ(S) is the probability that a random walk of
length one will land outside of S, given that we start from
a node chosen uniformly at random inside S.
Matrix exponential. The heat kernel of a graph involves the matrix exponential, and we wish to briefly mention some facts about this operation. See Higham [22] for a
more in-depth treatment. Consider a general matrix G. The
exponential function of a matrix is not just the exponential
applied element-wise, but rather is given by substituting the
matrix into the Taylor series expansion of the exponential
function:
โ
X
1 k
exp {G} =
G .
k!
k=0
That said, the exponential of a diagonal matrix is the exponential function applied to the diagonal entries. This phenomenon occurs because powers of a diagonal matrix are
simply the diagonal elements raised to the given power. For
any matrix G, if GT G = GGT (which is a generalization of
the notion of a symmetric matrix, called a normal matrix),
then G has an eigenvalue decomposition G = XฮXโ1 and
there is a simple, albeit inefficient, means of computing the
exponential: exp {G} = X exp {ฮ} Xโ1 . Computing the
matrix exponential, or even the product of the exponential
with a vector, exp {G} z, is still an active area of research [2].
3. FINDING SMALL CONDUCTANCE
COMMUNITIES WITH DIFFUSIONS
A graph diffusion is any sum of the following form:
f=
โ
X
ฮฑk Pk s
k=0
P
where k ฮฑk = 1 and s is a stochastic vector (that is, it is
non-negative and sums to one.) Intuitively, a diffusion captures how a quantity of si material on node i flows through
the graph. The terms ฮฑk provide a decaying weight that
ensures that the diffusion eventually dissipates. In the context of this paper, we are interested in the diffusions of single
nodes or neighborhood
P sets of a single vertex; and so in these
cases s = ei or s = iโS ei /|S| for a small set S. We call
the origins of the diffusion the seeds.
Given an estimate of a diffusion f from a seed, we can produce a small conductance community from it using a sweep
procedure. This involves computing Dโ1 f, sorting the nodes
in descending order by their magnitude in this vector, and
computing the conductance of each prefix of the sorted list.
Due to the properties of conductance, there is an efficient
means of computing all of these conductances. We then
return the set of smallest conductance as the community
around the seeds.
The personalized PageRank diffusion. One of the
most well-known instances of this framework is the personalized PageRank diffusion. Fix ฮฑ โ (0, 1). Then p is defined:
p = (1 โ ฮฑ)
โ
X
ฮฑk Pk s.
(1)
k=0
The properties of this diffusion have been studied extensively.
In particular, Andersen et al. [5] establish a local Cheeger
inequality using a particular algorithm called โpushโ that
locally distributes mass. The local Cheeger inequality informally states that, if the seed is nearby a set with small
conductance, then the result of the sweep procedure is a set
with a related conductance. Moreover, they show that their
โpushโ algorithm estimates f with an error ฮต in a degree1
weighted norm by looking at (1โฮฑ)ฮต
edges.
The heat kernel diffusion. Another instance of the
same framework is the heat kernel diffusion [14, 15]. It sim-
ply replaces the weights ฮฑk with tk /k!:
!
โ
X
tk
k
โt
(P)
s = exp {โt(I โ P)} s.
h=e
k!
k=0
satisfying the degree weighted bound:
kDโ1 exp {โt(I โ P)} s โ Dโ1 xkโ < ฮต.
(2)
While it was known that estimating h gave rise to a similar
type of local Cheeger inequality [15]; until Chung and Simpsonโs Monte Carlo approach [16], no methods were known
to estimate this quantity efficiently. Our new algorithm is a
deterministic approach that is more suitable for comparing
the properties of the diffusions. It terminates after exploring
2Net
edges (Theorem 1), where N is a parameter that grows
ฮต
slowly1 with ฮต.
Heat kernels compared to PageRank. These different sets of coefficients simply assign different levels of importance to walks of varying lengths: the heat kernel coefficients
tk
decay much more quickly than ฮฑk , and so the heat kerk!
nel more heavily weights shorter walks in the overall sum
(depicted in Figure 1). This property, in turn, will have important consequences when we study these methods in large
graphs in Section 6.
0
10
Weight
ฮฑ=0.99
By using standard properties of the matrix exponential, we
can factor exp {โt(I โ P)} = eโt exp {tP)} and scale by
et so that the above problem is equivalent to computing y
satisfying kDโ1 (exp {tP} s โ y)kโ < et ฮต. The element-wise
characterization is that y must satisfy:
|et hi โ yi | < et ฮตdi
for all i. A similar weighted objective was used in the push
algorithm for PageRank [5].
Outline of algorithm. To accomplish this, we first approximate exp {tP} with its degree N Taylor polynomial,
TN (tP), and then we compute TN (tP)s. But we use a large,
implicitly formed linear system to avoid explicitly evaluating the Taylor polynomial. Once we have the linear system,
we state a relaxation method in the spirit of Gauss-Seidel
and the PageRank push algorithm in order to compute an
accurate approximation of h.
4.1 Taylor Polynomial for exp{X}
Determining the exponential of a matrix is a sensitive computation with a rich history [41, 42]. For a general matrix
G, an approximation via the Taylor polynomial,
exp {G} =
โ
X
1
Gk
k!
k=0
โ5
10
t=1 t=5
0
ฮฑ=0.85
t=15
20
40
60
80
100
Length
Figure 1: Each curve represents the coefficients of
(ADโ1 )k in a sum of walks. The dotted blue lines give
ฮฑk , and the red give tk /k!, for the indicated values of
ฮฑ and t.
(3)
โ
N
X
1
Gk ,
k!
k=0
can be inaccurate when kGk is large and G has mixed signs,
as large powers Gk can contain large, oppositely signed numbers that cancel properly only in exact arithmetic. However,
we intend to compute exp {tP} s, where P, t, and s are
nonnegative, so the calculation does not rely on any delicate cancellations. Furthermore, our approximation need
not be highly precise. We therefore use the polynomial
P
k
tk
exp {tP} s โ TN (tP) = N
k=0 k! P for our approximation.
For details on choosing N , see Section 4.5. For now, assume
that we have chosen N such that
kDโ1 exp {tP} s โ Dโ1 TN (tP)skโ < ฮต/2.
4.
ALGORITHM
The overall idea of the local clustering algorithm is to
approximate a heat kernel vector of the form
h = exp {โt(I โ P)} s
so that we can perform a sweep over h. Here we describe a
coordinate-relaxation method, which we call hk-relax, for
approximating h. This algorithm is rooted in our recent
work on computing an accurate column of exp {P} [28]; but
is heavily tuned to the objective below. Thus, while the overall strategy is classical โ just as the PageRank push method
is a classic relaxation method โ the simplifications and efficient implementation are entirely novel. In particular, the
new objective in this paper enables us to get a constant runtime bound independent of any property of the graph, which
differs markedly from both of our previous methods [28, 27].
Our objective. Recall that the final step of finding a
small conductance community involves dividing by the degree of each node. Thus, our goal is to compute x โ h
1
Since the original publication of this work we have proven
an upperbound on N in terms of ฮต and t [26].
(4)
This way, if we compute y โ TN (tP)s satisfying
kDโ1 TN (tP)s โ Dโ1 ykโ < ฮต/2,
then by the triangle inequality we will have
kDโ1 exp {tP} s โ Dโ1 ykโ < ฮต,
(5)
our objective.
4.2 Error weights
Using a degree N Taylor polynomial, hk-relax ultimately
approximates h by approximating each term in the sum of
the polynomial times the vector s:
s + 1t Ps + ยท ยท ยท +
tN
PN s.
N!
The total error of our computed solution is then a weighted
k
sum of the errors at each individual term, tk! Pk s. We show
in Lemma 1 that these weights are given by the polynomials
ฯk (t), which we define now. For a fixed degree N Taylor
P
tk
polynomial of the exponential, TN = N
k=0 k! , we define
ฯk :=
Nโk
X
m=0
k!
tm
(m+k)!
for k = 0, ยท ยท ยท , N .
(6)
These polynomials ฯk (t) are closely related to the ฯ functions central to exponential integrators in ODEs [39]. Note
that ฯ0 = TN .
To guarantee the total error satisfies the criterion (3) then,
it is enough to show that the error at each Taylor term
satisfies an โ-norm inequality analogous to (3). This is
discussed in more detail in Section A.
4.3 Deriving a linear system
To define the basic step of the hk-relax algorithm and to
show how the ฯk influence the total error, we rearrange the
Taylor polynomial computation into a linear system.
Denote by vk the kth term of the vector sum TN (tP)s:
N
TN (tP)s = s + 1t Ps + ยท ยท ยท + tN! PN s
= v0 + v1 + ยท ยท ยท + vN .
(7)
(8)
k+1
t
t
Note that vk+1 = (k+1)!
Pk+1 = (k+1)
Pvk . This identity
implies that the terms vk exactly satisfy the linear system
๏ฃน
๏ฃน ๏ฃฎ
๏ฃน๏ฃฎ
๏ฃฎ
I
s
v0
โt
๏ฃบ ๏ฃฏ v1 ๏ฃบ ๏ฃฏ 0 ๏ฃบ
๏ฃฏ 1 P
I
๏ฃบ
๏ฃบ ๏ฃฏ
๏ฃบ๏ฃฏ
๏ฃฏ
๏ฃบ ๏ฃฏ .. ๏ฃบ ๏ฃฏ .. ๏ฃบ
๏ฃฏ
..
โt
๏ฃบ ๏ฃฏ . ๏ฃบ = ๏ฃฏ . ๏ฃบ . (9)
๏ฃฏ
.
P
2
๏ฃบ
๏ฃบ ๏ฃฏ
๏ฃบ๏ฃฏ
๏ฃฏ
๏ฃบ๏ฃฏ . ๏ฃบ ๏ฃฏ . ๏ฃบ
๏ฃฏ
..
.
.
๏ฃฐ
๏ฃป
๏ฃฐ
๏ฃป
๏ฃฐ
.
. ๏ฃป
.
I
โt
P
N
I
vN
0
Let v = [v0 ; v1 ; ยท ยท ยท ; vN ]. An approximate solution vฬ to
P
(9) would have block components vฬk such that N
k=0 vฬk โ
t
TN (tP)s, our desired approximation to e h. In practice, we
update only a single length n solution vector, adding all
updates to that vector, instead of maintaining the N + 1
different block vectors vฬk as part of vฬ; furthermore, the block
matrix and right-hand side are never formed explicitly.
With this block system in place, we can describe the algorithmโs steps.
# G is graph as dictionary - of - sets ,
# seed is an array of seeds ,
# t , eps , N , psis are precomputed
x = {} # Store x , r as dictionaries
r = {} # initialize residual
Q = collections . deque () # initialize queue
for s in seed :
r [( s ,0)] = 1./ len ( seed )
Q . append (( s ,0))
while len ( Q ) > 0:
(v , j ) = Q . popleft () # v has r [( v , j )] ...
rvj = r [( v , j )]
# perform the hk - relax step
if v not in x : x [ v ] = 0.
x [ v ] += rvj
r [( v , j )] = 0.
mass = ( t * rvj /( float ( j )+1.))/ len ( G [ v ])
# for neighbors of v
for u in G [ v ]:
next = (u , j +1) # in the next block
if j +1 == N : # last step , add to soln
x [ u ] += rvj / len ( G ( v ))
continue
if next not in r : r [ next ] = 0.
thresh = math . exp ( t )* eps * len ( G [ u ])
thresh = thresh /( N * psis [ j +1])/2.
if r [ next ] < thresh and \
r [ next ] + mass >= thresh :
Q . append ( next ) # add u to queue
r [ next ] = r [ next ] + mass
Figure 2: Pseudo-code for our algorithm as working python code. The graph is stored as a dictionary of sets so that the G[v] statement returns the set of neighbors associated with vertex
v. The solution is the vector x indexed by vertices and the residual vector is indexed by tuples
(v, j) that are pairs of vertices and steps j. A
fully working demo may be downloaded from github
https://gist.github.com/dgleich/7d904a10dfd9ddfaf49a.
4.4 The hk-relax algorithm
Given a random walk transition matrix P, scalar t > 0,
and seed vector s as inputs, we solve the linear system from
(9) as follows. Denote the initial solution vector by y and the
initial nN ร 1 residual by r(0) = e1 โ s. Denote by r(i, j) the
entry of r corresponding to node i in residual block j. The
idea is to iteratively remove all entries from r that satisfy
r(i, j) โฅ
et ฮตdi
.
2N ฯj (t)
(10)
To organize this process, we begin by placing the nonzero
entries of r(0) in a queue, Q(r), and place updated entries of
r into Q(r) only if they satisfy (10).
Then hk-relax proceeds as follows.
1. At each step, pop the top entry of Q(r), call it r(i, j),
and subtract that entry in r, making r(i, j) = 0.
2. Add r(i, j) to yi .
t
3. Add r(i, j) j+1
Pei to residual block rj+1 .
4. For each entry of rj+1 that was updated, add that
entry to the back of Q(r) if it satisfies (10).
Once all entries of r that satisfy (10) have been removed,
the resulting solution vector y will satisfy (3), which we
prove in Section A, along with a bound on the work required
to achieve this. We present working code for our method in
Figure 2 that shows how to optimize this computation using
sparse data structures. These make it highly efficient in
practice.
4.5 Choosing N
The last detail of the algorithm we need to discuss is how
to pick N . In (4) we want to guarantee the accuracy of
Dโ1exp {tP} s โ Dโ1 TN (tP)s. By using Dโ1 exp {tP} =
exp tPT Dโ1 and Dโ1 TN (tP) = TN (tPT )Dโ1 , we can
get a new upperbound on kDโ1 exp {tP} sโDโ1 TN (tP)skโ
by noting
n
o
k exp tPT Dโ1 s โ TN (tPT )Dโ1 skโ
n
o
โค k exp tPT โ TN (tPT )kโ kDโ1 skโ .
Since s is stochastic, we have kDโ1 skโ โค kDโ1 sk1 โค 1.
From [36] we know that the norm k exp tPT โTN (tPT )kโ
is bounded by
ktPT kN+1
(N + 2)
(N + 2)
tN+1
โ
โค
.
(N + 1)! (N + 2 โ t)
(N + 1)! (N + 2 โ t)
(11)
So to guarantee (4), it is enough to choose N that implies
(N+2)
tN +1
< ฮต/2. Such an N can be determined effi(N+1)! (N+2โt)
ciently simply by iteratively computing terms of the Taylor
polynomial for et until the error is less than the desired error for hk-relax. In practice, this required a choice of N no
greater than 2t log( 1ฮต ), which we think can be made rigorous.
4.6 Outline of convergence result
The proof proceeds as follows. First, we relate the error vector of the Taylor approximation E1 = TN (tP)s โ
x, to the error vector from solving the linear system described in Section 4.4, E2 = TN (tP)s โ y. Second, we express the error vector E2 in terms of the residual blocks
of the linear system (9); this will involve writing E2 as
a sum of residual blocks rk with weights ฯk (tP). Third,
we use the previous results to upperbound kDโ1 TN (tP)s โ
P
โ1
Dโ1 xkโ with N
rk kโ , and use this to show
k=0 ฯk (t)kD
that kDโ1 TN (tP)s โ Dโ1 xkโ < ฮต/2 is guaranteed by the
stopping criterion of hk-relax, (3). Finally, we prove that
performing steps of hk-relax until the stopping criterion is
attained requires work bounded by 2Nฯฮต1 (t) โค 2N et /ฮต.
5.
RELATED WORK
We wish to highlight a few ideas that have recently emerged
in the literature to clarify how our method differs. We discuss these in terms of community detection, the matrix exponential, fast diffusion methods, and relaxation methods.
Community detection and conductance. Conductance often appears in community detection and is known to
be one of the most important measures of a community [49].
The personalized PageRank method is one of the most scalable methods to find sets of small conductance, although
recent work opened up a new possibility with localized maxflow algorithms [48]. For the PageRank algorithm we use as
a point of comparison, Zhu et al. [56] recently provided an
improved bound on the performance of this algorithm when
finding sets with high internal conductance. The internal
conductance of a set is the minimum conductance of the
subgraph induced by the set and we would expect that realworld communities have large internal conductance. Due to
the similarity between our algorithm and the personalized
PageRank diffusion, we believe that a similar result likely
holds here as well.
The matrix exponential in network analysis. Recently, the matrix exponential has frequently appeared as a
tool in the network analysis literature. It has been used to
estimate node centrality [18, 20, 19], for link-prediction [31],
in graph kernels [30], and โ as already mentioned โ clustering
and community detection [14]. Many of these studies involve
fast ways to approximate the entire matrix exponential, instead of a single column as we study here. For instance,
Sui et al. [51] describe a low-parameter decomposition of a
network that is useful both for estimating Katz scores [25]
and the matrix exponential. Orecchia and Mahoney [46]
show that the heat kernel diffusion implicitly approximates
a diffusion operator using a particular type of generalized
entropy, which provides a principled rationale for its use.
Fast methods for diffusions. Perhaps the most related
work is a recent Monte Carlo algorithm by Chung and Simpson [16] to estimate the heat kernel diffusion via a random
walk sampling scheme. This approach involves directly simulating a random walk with transition probabilities that mirror the Taylor series expansion of the exponential. In comparison, our approach is entirely deterministic and thus more
useful to compare between diffusions, as it eliminates the algorithmic variance endemic to Monte Carlo simulations. A
similar idea is used by Borgs et al. [13] to achieve a randomized sublinear time algorithm to estimate the largest PageRank entries, and in fact, Monto Carlo methods frequently
feature in PageRank computations due to the relationship
between the diffusion and a random walk [7, 13, 8, 9]. Most
other deterministic approaches for the matrix exponential
involve at least one matrix-vector product [47, 2].
Relaxation methods. The algorithm we use is a coordinate relaxation method similar to Gauss-Seidel and GaussSouthwell. If we applied it to a symmetric positive definite
matrix, then it would be a coordinate descent method [37].
It has been proposed for PageRank in a few difference cases [23,
38, 5]. The same type of relaxation method has also been
used to estimate the Katz diffusion [12]. We recently used it
to estimate a column of the matrix exponential exp {P} ei
in a strict, 1-norm error and were able to prove a sublinear
convergence bound by assuming a very slowly growing maximum degree [28] or a power-law degree distribution [27].
This paper, in comparision, treats the scaled exponential
exp {โt(I โ P)} ei in a degree-weighted norm; it also shows
a constant runtime independent of any network property.
6. EXPERIMENTAL RESULTS
Here we compare hk-relax with a PageRank-based local
clustering algorithm, pprpush [5]. Both algorithms accept
as inputs a symmetric graph A and seed set s. The parameters required are t and ฮต, for hk-relax, and ฮฑ and ฮต for
pprpush. Both algorithms compute their respective diffusion ranks starting from the seed set, then perform a sweepcut on the resulting ranks. The difference in the algorithms
lies solely in the diffusion used and the particular parameters. We conducted the timing experiments on a Dual CPU
system with the Intel Xeon E5-2670 processor (2.6 GHz, 8
cores) with 16 cores total and 256 GB of RAM. None of
the experiments needed anywhere near all the memory, nor
any of the parallelism. Our implementation uses Matlabโs
sparse matrix data structure through a C++ mex interface.
It uses C++ unordered maps to store sparse vectors and is
equivalent to the code in Figure 2.
6.1 Synthetic results
In this section, we study the behavior of the PageRank
and heat kernel diffusions on the symbolic image graph of a
chaotic function f [50]. The graphs that result are loosely
reminiscent of a social network because they have pockets of
structure, like communities, and also chaotic behaviour that
results in a small-world like property.
The symbolic image of a function f is a graph where each
node represents a region of space, and edges represent the
action of the function in that region of space. We consider
two-dimensional functions f (x, y) in the unit square [0, 1]2
so that we can associate each node with a pixel of an image and illustrate the vectors as images. In Figure 3 (left),
we illustrate how the graph construction works. In the remaining examples, we let f be a map that results from a
chaotic, nonlinear dynamical system [50] (we use the T10
construction with k = 0.22, ฮท = 0.99 and sample 1000 points
from each region of space, then symmetrize the result and
discard weights). We discretize space in a 512 ร 512 grid,
which results in a 262, 144 node graph with 2M edges. In
Figure 3 (right), we also show the PageRank vector with uniform teleportation as an image to โillustrate the structureโ
in the function f .
Next, in Figure 4, we compare the vectors and sets identified by both diffusions starting from a single seed node.
We chose the parameters ฮฑ = 0.85 and t = 3 so the two
methods perform the same amount of work. These results
are what would be expected from Figure 1, and what many
of the remaining experiments show: PageRank diffuses to a
larger region of the graph whereas the heat-kernel remains
more focused in a sub-region. PageRank, then, finds a large
community with about 5,000 nodes whereas the heat kernel finds a small community with around 452 nodes with
slightly worse conductance. This experiment suggests that,
if these results also hold in real-world networks, then because real-world communities are often small [35], the heat
kernel diffusion should produce more accurate communities
in real-world networks.
(a) ppr vector ฮฑ = 0.85, ฮต = 10โ5 (b) ppr set, ฯ = 0.31, size = 5510
1
y
0
f(x,y)
0
x
1
Figure 3: (Left) An illustration of the symbolic image of a function f as a graph. Each large, blue
node represents a region of space. Thick, blue edges
represent how the thin, red values of the function behave in that region. (Right) The global PageRank
vector is then an image that illustrates features of
the chaotic map f and shows that it has pockets of
structure.
(c) hk vector t = 3, ฮต = 10โ5
(d) hk set, ฯ = 0.34, size = 455
Figure 4: When we compare the heat-kernel and
PageRank diffusions on the symbolic image of the
Chirikov map (see Figure 3), pprgrow finds a larger
set with slightly better conductance, whereas hkgrow finds a tighter set with about the same conductance. In real-world networks, these smaller sets
are more like real-world communities.
6.2 Runtime and conductance
We next compare the runtime and conductance of the algorithms on a suite of social networks. For pprpush, we fix
ฮฑ = 0.99, then compute PageRank for multiple values of
ฮต = 10โ2 , 10โ3 , 10โ4 , 10โ5 , and output the set of best conductance obtained. (This matches the way this method is
commonly used in past work.) For hk-relax, we compute
the heat kernel rank for four different parameter sets, and
output the set of best conductance among them: (t, ฮต) =
(10, 10โ4 ); (20, 10โ3 ); (40, 5 ยท 10โ3 ); (80, 10โ2 ). We also include in hk-relax an early termination criterion, in the case
that
the degrees of the nodes which are relaxed,
P the sum of 1.5
dil , exceeds n . However, even the smaller input graphs
(on which the condition is more likely to be met because of
the smaller value of n1.5 ) do not appear to have reached this
threshold. Furthermore, the main theorem of this paper imP
plies that the quantity
dil cannot exceed 2Nฯฮต1 (t) . The
datasets we use are summarized in Table 1; all datasets are
modified to be undirected and a single connected component.
These datasets were originally presented in the following papers [3, 10, 11, 32, 33, 34, 35, 40, 43, 44, 52, 55].
To compare the runtimes of the two algorithms, we display in Figure 5 for each graph the 25%, 50%, and 75% percentiles of the runtimes from 200 trials performed. For a
given graph, each trial consisted of choosing a node of that
graph uniformly at random to be a seed, then calling both
the PageRank and the heat kernel algorithms. On the larger
datasets, which have a much broader spectrum of node degrees and therefore greater variance, we instead performed
1,000 trials. Additionally, we display the 25%, 50%, and 75%
percentiles of the conductances achieved during the exact
same set of trials. The trendlines of these figures omit some
of the trials in order to better show the trends, but all of
the median results are plotted (as open circles). The figures
show that in small graphs, hk-relax is faster than pprpush,
but gets larger (worse) conductance. The picture reverses
for large graphs where hk-relax is slower but finds smaller
(better) conductance sets.
Cluster size and conductance. We highlight the individual results of the previous experiment on the symmetrized
twitter network. Here, we find that hk-relax finds sets of
better conductance than pprpush at all sizes of communities
in the network. See Figure 6.
6.3 Clusters produced vs. ground-truth
We conclude with an evaluation of identifying groundtruth communities in the com-dblp, com-lj, com-amazon,
com-orkut, com-youtube, and com-friendster datasets [40,
55]. In this experiment, for each dataset we first located 100
known communities in the dataset of size greater than 102
2
We thank AmirMahdi Ahmadinejad for pointing out a
small mistake in our original implementation of this experiment โ though we reported in Table 2 in our original publication [29] that we carried out this experiment on 100 commmunities of size greater than 10, Ahmadinejad noted that
in practice we had used some communities of size less than
10. The results shown here in Table 2 are from the corrected experiment, and in fact are even more favorable for
our hk-relax algorithm than our original reported results.
10,680
17,903
19,365
22,963
25,000
27,519
33,696
36,458
119,130
190,914
226,413
513,969
5,363,260
41,652,230
65,608,366
334,863
317,080
1,134,890
3,997,962
3,072,441
hkgrow 50%
25%
75%
pprgrow 50%
25%
75%
|E|
24,316
196,972
96,616
48,436
56,071
116,181
180,811
171,735
704,267
607,610
716,460
3,190,452
50,030,085
1,202,513,046
1,806,067,135
925,872
1,049,866
2,987,624
34,681,189
117,185,083
1.5
Runtime (s)
pgp-cc
ca-AstroPh-cc
marvel-comics-cc
as-22july06
rand-ff-25000-0.4
cond-mat-2003-cc
email-Enron-cc
cond-mat-2005-fix-cc
soc-sign-epinions-cc
itdk0304-cc
dblp-cc
flickr-bidir-cc
ljournal-2008
twitter-2010
friendster
com-amazon
com-dblp
com-youtube
com-lj
com-orkut
2
1
0.5
0
5
6
7
log10(|V|+|E|)
8
Conductances: hk vs. ppr
0
โ1
10
hkgrow 50%
25%
75%
pprgrow 50%
25%
75%
โ2
10
Table 2: The result of evaluating the heat kernel (hk)
vs. PageRank (pr) on finding real-world communities. The heat kernel finds smaller, more accurate,
sets with slightly worse conductance.
data
F1 -measure
conductance set size
hk
pr
hk
pr
hk
pr
amazon
dblp
youtube
lj
orkut
friendster
0.608
0.364
0.128
0.138
0.183
0.125
0.415
0.273
0.078
0.104
0.116
0.112
0.124
0.238
0.477
0.564
0.824
0.866
0.050
0.144
0.361
0.524
0.736
0.860
145
156
137
156
95
96
5,073
4,529
5,833
299
476
218
. Given one such community, using every single node as an
individual seed, we looked at the sets returned by hk-relax
with t = 5, ฮต = 10โ4 and pprpush using the standard procedure. We picked the set from the seed that had the highest
F1 measure. (Recall that the F1 measure is a harmonic
mean of precision and recall.) We report the mean of the
F1 measure, conductance, and set size, where the average
is taken over all 100 trials in Table 2. These results show
that hk-relax produces only slightly inferior conductance
scores, but using much smaller sets with substantially better
F1 measures. This suggests that hk-relax better captures
the properties of real-world communities than the PageRank
diffusion in the sense that the tighter sets produced by the
heat kernel are better focused around real-world communities than are the larger sets produced by the PageRank diffusion.
7.
CONCLUSIONS
These results suggest that the hk-relax algorithm is a viable companion to the celebrated PageRank push algorithm
and may even be a worthy competitor for tasks that require accurate communities of large graphs. Furthermore,
9
10
log10(Conductances)
Graph
Runtime: hk vs. ppr
Table 1: Datasets
|V |
5
6
7
log10(|V|+|E|)
8
9
Figure 5: (Top figure) Runtimes of the hk-relax
vs. ppr-push, shown with percentile trendlines from
a select set of experiments. (Bottom) Conductances
of hk-relax vs. ppr-push, shown in the same way.
we suspect that the hk-relax method will be useful for the
myriad other uses of PageRank-style diffusions such as linkprediction [31] or even logic programming [53].
In the future, we plan to explore this method on directed
networks as well as better methods for selecting the parameters of the diffusion. It is also possible that our new ideas
may translate to faster methods for non-conservative diffusions such as the Katz [25] and modularity methods [45],
and we plan to explore these diffusions as well.
Acknowledgements
This work was supported by NSF CAREER Award CCF1149756.
8. REFERENCES
[1] B. Abrahao, S. Soundarajan, J. Hopcroft, and R. Kleinberg.
On the separability of structural classes of communities. In
KDD, pages 624โ632, 2012.
[2] A. H. Al-Mohy and N. J. Higham. Computing the action of
the matrix exponential, with an application to exponential
integrators. SIAM J. Sci. Comput., 33(2):488โ511, March
2011.
[3] R. Alberich, J. Miro-Julia, and F. Rosselloฬ. Marvel universe
looks almost like a real social network. arXiv preprint
cond-mat/0202174, 2002.
[4] N. Alon and V. D. Milman. ฮป1 , isoperimetric inequalities
for graphs, and superconcentrators. J. of Comb. Theory,
Series B, 38(1):73โ88, 1985.
0.9
conductance
0.8
0.7
0.6
0.5
0.4
0.3
hk
ppr
0.2
0
1
density
0.1
2
3
4
log10(clustersize)
5
hk
ppr
0
0.2
0.4
0.6
conductance
0.8
1
Figure 6: The top figure shows a scatter plot of conductance vs. community size in the twitter graph for
the two community detection methods; the bottom
figure shows a kernel density estimate of the conductances achieved by each method, which shows that
hk-relax is more likely to return a set of lower conductance.
[5] R. Andersen, F. Chung, and K. Lang. Local graph
partitioning using PageRank vectors. In FOCS, 2006.
[6] R. Andersen and K. Lang. An algorithm for improving
graph partitions. In SODA, pages 651โ660, January 2008.
[7] K. Avrachenkov, N. Litvak, D. Nemirovsky, and
N. Osipova. Monte carlo methods in pagerank computation:
When one iteration is sufficient. SIAM J. Numer. Anal.,
45(2):890โ904, February 2007.
[8] B. Bahmani, K. Chakrabarti, and D. Xin. Fast personalized
pagerank on MapReduce. In SIGMOD, pages 973โ984, New
York, NY, USA, 2011. ACM.
[9] B. Bahmani, A. Chowdhury, and A. Goel. Fast incremental
and personalized pagerank. Proc. VLDB Endow.,
4(3):173โ184, Dec. 2010.
[10] M. Bogunฬaฬ, R. Pastor-Satorras, A. Dฤฑฬaz-Guilera, and
A. Arenas. Models of social networks based on social
distance attachment. Phys. Rev. E, 70(5):056122, Nov 2004.
[11] P. Boldi, M. Rosa, M. Santini, and S. Vigna. Layered label
propagation: A multiresolution coordinate-free ordering for
compressing social networks. In WWW, pages 587โ596,
March 2011.
[12] F. Bonchi, P. Esfandiar, D. F. Gleich, C. Greif, and L. V.
Lakshmanan. Fast matrix computations for pairwise and
columnwise commute times and Katz scores. Internet
Mathematics, 8(1-2):73โ112, 2012.
[13] C. Borgs, M. Brautbar, J. Chayes, and S.-H. Teng.
Multi-scale matrix sampling and sublinear-time pagerank
computation. Internet Mathematics, Online, 2013.
[14] F. Chung. The heat kernel as the PageRank of a graph.
PNAS, 104(50):19735โ19740, 2007.
[15] F. Chung. A local graph partitioning algorithm using heat
kernel pagerank. Internet Mathematics, 6(3):315โ330, 2009.
[16] F. Chung and O. Simpson. Solving linear systems with
boundary conditions using heat kernel pagerank. In
Algorithms and Models for the Web Graph, pages 203โ219.
Springer, 2013.
[17] I. S. Dhillon, Y. Guan, and B. Kulis. Weighted graph cuts
without eigenvectors a multilevel approach. IEEE Trans.
Pattern Anal. Mach. Intell., 29(11):1944โ1957, November
2007.
[18] E. Estrada. Characterization of 3d molecular structure.
Chemical Physics Letters, 319(5-6):713โ718, 2000.
[19] E. Estrada and D. J. Higham. Network properties revealed
through matrix functions. SIAM Review, 52(4):696โ714,
2010.
[20] A. Farahat, T. LoFaro, J. C. Miller, G. Rae, and L. A.
Ward. Authority rankings from HITS, PageRank, and
SALSA: Existence, uniqueness, and effect of initialization.
SIAM Journal on Scientific Computing, 27(4):1181โ1201,
2006.
[21] M. Fiedler. Algebraic connectivity of graphs. Czechoslovak
Mathematical Journal, 23(98):298โ305, 1973.
[22] N. J. Higham. Functions of Matrices: Theory and
Computation. SIAM, 2008.
[23] G. Jeh and J. Widom. Scaling personalized web search. In
WWW, pages 271โ279. ACM, 2003.
[24] U. Kang and C. Faloutsos. Beyond โcaveman communitiesโ:
Hubs and spokes for graph compression and mining. In
ICDM, pages 300โ309, Washington, DC, USA, 2011. IEEE
Computer Society.
[25] L. Katz. A new status index derived from sociometric
analysis. Psychometrika, 18(1):39โ43, March 1953.
[26] K. Kloster. Graph diffusions and matrix functions: Fast
algorithms and localization results. PhD thesis, Purdue
University, 2016.
[27] K. Kloster and D. F. Gleich. A fast relaxation method for
computing a column of the matrix exponential of stochastic
matrices from large, sparse networks. arXiv,
cs.SI:1310.3423, 2013.
[28] K. Kloster and D. F. Gleich. A nearly-sublinear method for
approximating a column of the matrix exponential for
matrices from large, sparse networks. In Algorithms and
Models for the Web Graph, page in press, 2013.
[29] K. Kloster and D. F. Gleich. Heat kernel based community
detection. In Proceedings of the 20th ACM SIGKDD
international conference on Knowledge discovery and data
mining, pages 1386โ1395. ACM, 2014.
[30] R. I. Kondor and J. D. Lafferty. Diffusion kernels on graphs
and other discrete input spaces. In ICML, pages 315โ322,
San Francisco, CA, USA, 2002. Morgan Kaufmann
Publishers Inc.
[31] J. Kunegis and A. Lommatzsch. Learning spectral graph
transformations for link prediction. In ICML, pages
561โ568, 2009.
[32] H. Kwak, C. Lee, H. Park, and S. Moon. What is Twitter,
a social network or a news media? In WWW, pages
591โ600, 2010.
[33] J. Leskovec, D. Huttenlocher, and J. Kleinberg. Signed
networks in social media. In CHI, pages 1361โ1370, 2010.
[34] J. Leskovec, J. Kleinberg, and C. Faloutsos. Graph
evolution: Densification and shrinking diameters. ACM
Trans. Knowl. Discov. Data, 1:1โ41, March 2007.
[35] J. Leskovec, K. J. Lang, A. Dasgupta, and M. W. Mahoney.
Community structure in large networks: Natural cluster
sizes and the absence of large well-defined clusters. Internet
Mathematics, 6(1):29โ123, September 2009.
[36] M. Liou. A novel method of evaluating transient response.
APPENDIX
Proceedings of the IEEE, 54(1):20โ23, 1966.
A. CONVERGENCE THEORY
[37] Z. Q. Luo and P. Tseng. On the convergence of the
coordinate descent method for convex differentiable
Here we state our main result bounding the work required by
minimization. J. Optim. Theory App., 72(1):7โ35, 1992.
hk-relax to approximate the heat kernel with accuracy as de10.1007/BF00939948.
scribed in (3).
[38] F. McSherry. A uniform approach to accelerated PageRank
Theorem 1. Let P, t, ฯk (t), and r be as in Section 4. If steps
computation. In WWW, pages 575โ582, 2005.
of hk-relax are performed until all entries of the residual satisfy
[39] B. V. Minchev and W. M. Wright. Norges
et ฮตdi
, then hk-relax produces an approximation x of
r(i, j) < 2Nฯ
teknisk-naturvitenskapelige universitet. 2005.
j (t)
[40] A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel, and
h = exp {โt(I โ P)} s satisfying
B. Bhattacharjee. Measurement and analysis of online
social networks. In Proceedings of the 7th ACM SIGCOMM
kDโ1 exp {โt(I โ P)} s โ Dโ1 xkโ < ฮต,
conference on Internet measurement, pages 29โ42. ACM,
and the amount of work required is bounded by
2007.
[41] C. Moler and C. Van Loan. Nineteen dubious ways to
2N (et โ 1)
2N ฯ1 (t)
โค
.
work(ฮต) โค
compute the exponential of a matrix. SIAM Review,
ฮต
ฮตt
20(4):801โ836, 1978.
[42] C. Moler and C. Van Loan. Nineteen dubious ways to
Producing x satisfying
compute the exponential of a matrix, twenty-five years
kDโ1 exp {โt(I โ P)} s โ Dโ1 xkโ < ฮต
later. SIAM Review, 45(1):3โ49, 2003.
[43] M. Newman. Network datasets.
is equivalent to producing y satisfying
http://www-personal.umich.edu/~mejn/netdata/, 2006.
kDโ1 exp {tP)} s โ Dโ1 ykโ < et ฮต.
[44] M. E. J. Newman. The structure of scientific collaboration
networks. PNAS, 98(2):404โ409, 2001.
We will show that the error vector in the hk-relax steps, TN (tP)sโ
[45] M. E. J. Newman. Modularity and community structure in
y, satisfies kDโ1 TN (tP)s โ Dโ1 ykโ < et ฮต/2.
networks. PNAS, 103(23):8577โ8582, 2006.
The following lemma expresses the error vector, TN (tP)s โ y,
[46] L. Orecchia and M. W. Mahoney. Implementing
as a weighted sum of the residual blocks rk in the linear system
regularization implicitly via approximate eigenvector
(9), and shows that the polynomials ฯk (t) are the weights.
computation. In ICML, pages 121โ128, 2011.
[47] L. Orecchia, S. Sachdeva, and N. K. Vishnoi.
Lemma 1. Let ฯk (t) be defined as in Section 4. Then in the
Approximating the exponential, the Lanczos method and
notation of Section 4.3, we can express the error vector of hkan Otilde(m)-time spectral algorithm for balanced
relax in terms of the residual blocks rk as follows
separator. In STOC, pages 1141โ1160, 2012.
N
[48] L. Orecchia and Z. A. Zhu. Flow-based algorithms for local
X
TN (tP)s โ y =
ฯk (tP)rk
(12)
graph clustering. In SODA, pages 1267โ1286, 2014.
k=0
[49] S. E. Schaeffer. Graph clustering. Computer Science
Review, 1(1):27โ64, 2007.
Proof. Consider (9). Recall that v = [v0 ; v1 ; ยท ยท ยท ; vN ] and
[50] D. L. Shepelyansky and O. V. Zhirov. Google matrix,
let S be the (N + 1) ร (N + 1) matrix of 0s with first subdiagonal
dynamical attractors, and ulam networks. Phys. Rev. E,
1
equal to [ 11 , 12 , ยท ยท ยท , N
]. Then we can rewrite this linear system
81(3):036213, March 2010.
more conveniently as
[51] X. Sui, T.-H. Lee, J. Whang, B. Savas, S. Jain, K. Pingali,
(I โ S โ (tP))v = e1 โ s.
(13)
and I. Dhillon. Parallel clustered low-rank approximation of
graphs and its application to link prediction. In
Let vk be the true solution vectors that the vฬk are approximating
H. Kasahara and K. Kimura, editors, Languages and
in (13). We showed in Section 4.3 that the error TN (tP)s โ y
Compilers for Parallel Computing, volume 7760 of Lecture
is in fact the sum of the errors vk โ vฬk . Now we will express
Notes in Computer Science, pages 76โ95. Springer Berlin
TN (tP)s โ y in terms of the residual partitions, i.e. rk .
Heidelberg, 2013.
At any given step we have r = e1 โ s โ (I โ S โ (tP))vฬ, so pre[52] C. (The Cooperative Association for Internet Data
multiplying by (I โ S โ (tP))โ1 yields (I โ S โ (tP))โ1 r = v โ vฬ,
Analyais). Network datasets.
because (I โ S โ (tP))v = e1 โ s exactly, by definition of v. Note
http://www.caida.org/tools/measurement/skitter/router_topology/,
that (I โ S โ (tP))โ1 r = v โ vฬ is the error vector for the linear
2005. Accessed in 2005.
system (13). From this, an explicit computation of the inverse
[53] W. Y. Wang, K. Mazaitis, and W. W. Cohen.
(see [28] for details) yields
Programming with personalized pagerank: A locally
๏ฃฎ
๏ฃฎ
๏ฃน
๏ฃน
groundable first-order probabilistic logic. In Proceedings of
!
v0 โ vฬ0
r0
N
X
the 22Nd ACM International Conference on Conference on
๏ฃฏ
๏ฃฏ
๏ฃบ
๏ฃบ
..
Sk โ (tP)k ๏ฃฐ .. ๏ฃป .
(14)
๏ฃฐ
๏ฃป=
Information & Knowledge Management, CIKM โ13,
.
.
k=0
pages 2129โ2138, New York, NY, USA, 2013. ACM.
vN โ vฬN
rN
[54] J. J. Whang, D. F. Gleich, and I. S. Dhillon. Overlapping
For our purposes, the full block vectors v, vฬ, r and their individual
community detection using seed set expansion. In CIKM,
partitions are unimportant: we want only their sum, because
pages 2099โ2108, New York, NY, USA, 2013. ACM.
P
TN (tP)s โ y = N
), as previously discussed.
[55] J. Yang and J. Leskovec. Defining and evaluating network
k=0 (vk โ vฬk P
communities based on ground-truth. In Proceedings of the
Next we use (14) to express N
k=0 (vk โ vฬk ), and hence
ACM SIGKDD Workshop on Mining Data Semantics,
TN (tP)s โ y,
MDS โ12, pages 3:1โ3:8, New York, NY, USA, 2012. ACM.
[56] Z. A. Zhu, S. Lattanzi, and V. Mirrokni. A local algorithm
in terms of the residual blocks rk . We accomplish this by examfor finding well-connected clusters. In ICML, pages
ining the coefficients of an arbitrary block rk in (14), which in
396โ404, 2013.
turn requires analyzing the powers of (S โ tP).
Fix a residual block rjโ1 and consider the product with a single
term (Sk โ (tP)k ). Since rjโ1 is in block-row j of r, it multiplies
with only the block-column j of each term (Sk โ (tP)k ), so we
want to know what the blocks in block-column j of (Sk โ (tP)k )
look like.
From [28] we know that
(
(jโ1)!
ej+m if 0 โค m โค N + 1 โ j
m
S ej = (jโ1+m)!
0
otherwise.
This means that block-column j of (Sm โ (tP)m ) contains only a
(jโ1)!
single nonzero block, (jโ1+m)! tm Pm , for all 0 โค m โค N + 1 โ j.
Hence, summing the n ร n blocks in block-column j of each power
(Sm โ (tP)m ) yields
N+1โj
X
m=0
(j โ 1)!tm
Pm
(j โ 1 + m)!
(15)
kDโ1 rk kโ <
=
m=0
k=0
=
N
X
k!tm
Pm
(k + m)!
!
โค
which is bounded above by
โ1
kD
ฯk (tP)rk ,
as desired.
P
Now that weโve shown TN (tP)s โ y = N
k=0 ฯk (tP)rk we can
upperbound kDโ1 TN (tP)s โ Dโ1 ykโ . To do this, we first show
that
(16)
To prove this claim, recall that P = AD . Since ฯk (t) is a
polynomial, we have Dโ1 ฯk (tP) = Dโ1 ฯk (tADโ1 ) = ฯk (tDโ1 A)Dโ1 ,
which equals ฯk (tPT )Dโ1 .
Taking the infinity norm and applying the triangle inequality
to the definition of ฯk (t) gives us
kDโ1 ฯk (tP)rk kโ โค
Nโk
X
m=0
tm k!
k(PT )m (Dโ1 rk )kโ .
(m + k)!
we have k(PT )m (Dโ1 rk )kโ โค
equals k(Dโ1 rk )kโ because PT
Then
k(PT )m kโ k(Dโ1 rk )kโ
which
is row-stochastic. Returning to our original objective, we then have
kDโ1 ฯk (tP)rk kโ โค
Nโk
X
m=0
tm k!
k(Dโ1 rk )kโ
(m + k)!
= ฯk (t)kDโ1 rk kโ ,
proving the claim in (16).
This allows us to continue:
TN (tP)s โ y =
N
X
ฯk (tP)rk
so
k=0
kDโ1 TN (tP)s โ Dโ1 ykโ โค
N
X
kDโ1 ฯk (tP)rk kโ
k=0
โค
N
X
ฯk (t)kDโ1 rk kโ .
k=0
The stopping criterion for hk-relax requires that every entry
of the residual satisfies r(i, j) <
to satisfying
r(i,j)
di
<
et ฮต
.
2Nฯj (t)
et ฮตdi
,
2Nฯj (t)
which is equivalent
This condition guarantees that
et ฮต/2.
ฯk (t)
et ฮต
2N ฯk (t)
Finally, we have that
โ1
TN (tP)s โ D
ykโ < et ฮต/2
implies kDโ1 (exp {โt(I โ P)} s โ x)kโ < ฮต/2, completing our
proof of the first part of Theorem 1.
k=0
โ1
ฯk (t)kDโ1 rk kโ
N
X
k=0
rk
kDโ1 ฯk (tP)rk kโ โค ฯk (t)kDโ1 rk kโ .
N
X
k=0
m=0
Nโk
X
N
X
Thus we have
kDโ1 TN (tP)s โ Dโ1 ykโ โค
as the matrix coefficient of rjโ1 in the right-hand side expression
P
PN
m
T
of N
โ (tP)m )r.
k=0 (vk โ vฬk ) = (e โ I)( m=0 S
Substituting k = j โ 1 on the right-hand side of (15) yields
!
N
N
X
X
T
m
m
(vk โ vฬk ) = (e โ I)
S โ (tP)
r
k=0
et ฮต
.
2Nฯk (t)
Bounding work.
It remains to bound the work required to perform steps of hkrelax until the stopping criterion is achieved.
Because the stopping criterion requires each residual entry to
satisfy
r(i, j)
et ฮต
<
di
2N ฯj (t)
we know that each step of hk-relax must operate on an entry
r(i, j) larger than this threshold. That is, each step we relax an
r(i,j)
et ฮต
โฅ 2Nฯ
.
entry of r satisfying d
(t)
i
j
Consider the solution vector y โ TN (tP)s and note that each
entry of y is really a sum of values that we have deleted from r.
But r always contains only nonnegative values: the seed vector s
is nonnegative, and each step involves setting entry r(i, j) = 0 and
adding a scaled column of P, which is nonnegative, to r. Hence,
PT
kyk1 equals the sum of the r(i, j) added to y,
l=1 r(il , jl ) =
kyk1 .
Finally, since the entries of y are nondecreasing (because they
only change if we add positive values r(i, j) to them), we know
that kyk1 โค kTN (tP)sk1 = ฯ0 (t) โค et . This implies, then, that
T
X
r(il , jl ) โค et .
l=1
Using the fact that the values of r(i, j) that we relax must satisfy
r(i,j)
et ฮต
โฅ 2Nฯ
we have that
d
(t)
i
j
T
X
dil et ฮต
โค et .
2N ฯjl (t)
l=1
Simplifying yields
T
X
l=1
dil
2N
โค
.
ฯjl (t)
ฮต
By Lemma 1 we know ฯk (t) โค ฯ1 (t) for each k โฅ 1, so we can
PT
PT
di
di
2N
l
l
l=1 ฯ (t) โค
l=1 ฯ (t) โค ฮต , giving us
lowerbound
jl
1
T
X
l=1
dil โค
2N ฯ1 (t)
.
ฮต
Finally, note that the dominating suboperation in each step
of hk-relax consists of relaxing r(i, j) and spreading this โheat
kernel rankโ to the neighbors of node i in block rj+1 . Since node
i has di neighbors, this step consists of di adds, and so the work
P
performed by hk-relax is T
l=1 dil , which is exactly the quantity
we bounded above.
This figure "chirikov-hk-set.png" is available in "png" format from:
http://arxiv.org/ps/1403.3148v4
This figure "chirikov-hk-vec.png" is available in "png" format from:
http://arxiv.org/ps/1403.3148v4
This figure "chirikov-pr-set.png" is available in "png" format from:
http://arxiv.org/ps/1403.3148v4
This figure "chirikov-pr-vec.png" is available in "png" format from:
http://arxiv.org/ps/1403.3148v4
This figure "chirikov-pr.png" is available in "png" format from:
http://arxiv.org/ps/1403.3148v4
| 8cs.DS
|
Modeling The Intensity Function Of Point Process Via Recurrent Neural Networks
Shuai Xiao1 , Junchi Yan23 , Stephen M. Chu3 , Xiaokang Yang1 , Hongyuan Zha4
arXiv:1705.08982v1 [cs.LG] 24 May 2017
1
Shanghai Jiao Tong University 2 East China Normal University 3 IBM Research โ China 4 Georgia Tech
{benjaminforever,xkyang}@sjtu.edu.cn, [email protected], [email protected], [email protected]
Abstract
Event sequence, asynchronously generated with random
timestamp, is ubiquitous among applications. The precise and
arbitrary timestamp can carry important clues about the underlying dynamics, and has lent the event data fundamentally
different from the time-series whereby series is indexed with
fixed and equal time interval. One expressive mathematical
tool for modeling event is point process. The intensity functions of many point processes involve two components: the
background and the effect by the history. Due to its inherent spontaneousness, the background can be treated as a time
series while the other need to handle the history events. In
this paper, we model the background by a Recurrent Neural
Network (RNN) with its units aligned with time series indexes while the history effect is modeled by another RNN
whose units are aligned with asynchronous events to capture the long-range dynamics. The whole model with event
type and timestamp prediction output layers can be trained
end-to-end. Our approach takes an RNN perspective to point
process, and models its background and history effect. For
utility, our method allows a black-box treatment for modeling the intensity which is often a pre-defined parametric form
in point processes. Meanwhile end-to-end training opens the
venue for reusing existing rich techniques in deep network for
point process modeling. We apply our model to the predictive
maintenance problem using a log dataset by more than 1000
ATMs from a global bank headquartered in North America.
Introduction
Event sequence is becoming increasingly available in a variety of applications such as e-commerce transactions, social network activities, conflicts, and equipment failures etc.
The event data can carry rich information not only about the
event attribute (e.g. type, participator) but also the timestamp
{zi , ti }N
i=1 indicating when the event occurs. Being treated
as a random variable when the event is stochastically generated in an asynchronous manner, the timestamp makes the
Correspondence author is Junchi Yan. This research was
partially supported by The National Key Research and Development Program of China (2016YFB1001003), NSFC (61602176,
61672231, 61527804, 61521062), STCSM (15JC1401700,
14XD1402100), China Postdoctoral Science Foundation Funded
Project (2016M590337), the 111 Program (B07022) and NSF
(IIS-1639792, DMS-1620345).
Copyright c 2017, Association for the Advancement of Artificial
Intelligence (www.aaai.org). All rights reserved.
event sequence fundamentally different from the time series
(Montgomery, Jennings, and Kulahci 2015) with equal and
fixed time interval, whereby the time point only serves as
a role for index {yt }Tt=1 . A major line of research (Aalen,
Borgan, and Gjessing 2008) has been devoted to study event
sequence, especially exploring the timestamp information
to model the underlying dynamics of the system, whereby
point process (Snyder and Miller 2012) has been a powerful
and compact framework in this direction.
Recently there are many machine learning based models for scalable point process modeling. We attribute the
progressions in this direction in part to the smart mathematical reformulations and optimization techniques e.g.
(Lewis and Mohler 2011; Zhou, Zha, and Song 2013b; Zhou,
Zha, and Song 2013a), as well as novel parametric forms
for the conditional intensity function (Shen et al. 2014;
Ertekin, Rudin, and McCormick 2015; Xu et al. 2016) as
carefully designed by researchersโ prior knowledge to capture the character of the dataset in study. However, one major
limitation of the parametric forms of point process is due to
their specialized and restricted expression capability for arbitrary distributed event data which trends to be oversimplified or even infeasible for capturing the problem complexity
in real applications. Moreover, it runs at the risk of model
underfitting due to the misjudgement on model choice. Recent works e.g. (Zhou, Zha, and Song 2013b) start to turn
to non-parametric form to fit the structure of a point process, but their method is under the Hawkes process formulation,while this formulation runs at the risk of model mischoice.
In this paper, we view the conditional intensity of a point
process as a nonlinear mapping between the predicted transient occurrence intensity of events with different types, and
the model input information of event participators, event
profile and the system history. Such a nonlinear mapping is
expected to be complex and flexible enough to model various characters of real event data for its application utility.
In fact, deep learning models, such as Convolutional Neural Networks (CNNs) (LeCun et al. 1998), Recurrent Neural Networks (RNNs) (Pascanu, Mikolov, and Bengio 2013)
have attracted wide attention in recent vision, speech and
language communities, and many of them has dominated the
competing results on perceptual benchmark tasks e.g. (Russakovsky et al. 2015). In particular, we turn to RNNs as a
Figure 1: Time series and event sequence can be synergically modeled. The former can be used to timely capture the
recent window for the time-varying features, while the latter can capture the long-range dependency over time. Note
the dependency in an event sequence can be easily captured
by an event sequence LSTM with less than 5 steps, while it
takes too much more steps if using a time series with a fixed
time interval e.g. 7 days in the figure (Note many unit steps
in the top time series are omitted in the figure for clarity).
natural way to encode such nonlinear and dynamic mapping,
in an effort for modeling an end-to-end nonlinear intensity
mapping without any prior knowledge.
Key idea and highlights Our model interprets the conditional intensity function of a point process as a nonlinear
mapping, which is synergetically established by a composite neural network with two RNNs as its building blocks.
As illustrated in Fig.1, time series (top row) and event sequence (bottom row) are distinct to each other in that time
series is more suitable to carry the synchronously (i.e. in a
fixed pace) and regularly updated or constant profile features, while the event sequence can compactly catch event
driven, more abrupt information, which can affect the condition intensity function over longer time period. More specifically, the highlights of this paper are:
1) We first make an observation that many conditional intensity functions can be viewed as an integration of two effects: i) spontaneous background component inherently affected by the internal (time-varying) attributes of the individual and the event type; ii) effects from history events.
Meanwhile, most information in real world can also be covered by continuously updated features like age, temperature,
and asynchronous event data such as clinical records, failures. This motivates us to devise a general approach.
2) Then we use an RNN whose units are aligned with
the time points of a time series as its units, and an RNN
whose units are aligned with events. The time series RNN
can timely track the spontaneous background while the event
sequence RNN is used to efficiently capture the long-range
dependency over history with arbitrary time intervals. This
allows to fit arbitrary dynamics of point process which otherwise will be very difficult or often impossible to be specified
by a parameterized model under certain assumptions.
3) To our best knowledge, this is the first work to fully in-
terpret and instantiate the conditional intensity function with
fused time series and event sequence RNNs. This opens up
the room for connecting the neural network techniques to
traditional point process that emphasizes more on specific
model driven by domain knowledge. More importantly the
introduction of a full RNN treatment lessen the efforts for
the design of (semi-)parametric point process model and
its complex learning algorithms which often call for special tricks that prohibiting the wide use for practitioners. In
contrast, neural networks and specifically RNN, is becoming
off-the-shelf tools and getting widely used recently.
4) Our model is simple, general and can be end-to-end
trained. We target to a predictive maintenance problem. The
data is from a global bank headquartered in North America, consisting decades of thousands of event logs for a large
number of Automated Teller Machines (ATMs). The stateof-the-art performance on failure type and timestamp prediction corroborates its suitability to real-world applications.
Related Work and Motivation
We view the related concepts and work in this section, which
is mainly focused on Recurrent Neural Networks (RNNs)
and their applications in time series and sequences data, respectively. Then we give our point of view on existing point
process methods and their connection to RNNs. All these
observations indeed motivate the work of this paper.
Recurrent neural network The building blocks of our
model are the Recurrent Neural Networks (RNNs) (Elman
1990; Pascanu, Mikolov, and Bengio 2013) and its modern
variant Long Short-Term Memory (LSTM) units (Hochreiter
and Schmidhuber 1997; Graves 2013). RNNs are dynamical
systems whose next state and output depend on the present
network state and input, which are more general models than
the feed-forward networks. RNNs have long been explored
in perceptual applications for many decades, however it can
be very difficult to train RNNs to learn long-range dynamics
perhaps in part due to the vanishing and exploding gradients problem. LSTMs provide a solution by incorporating
memory units that allow the network to learn when to forget previous hidden states and when to update hidden states
given new information. Recently, RNNs and LSTMs have
been successfully applied in large-scale vision (Gregor et al.
2015), speech (Graves, rahman Mohamed, and Hinton 2014)
and language (Sutskever, Vinyals, and Le. 2014) problems.
RNNs for series data From application perspective, we
view RNNs works by two scenarios as particularly considered in this paper: i) RNNs for synchronized series with
evenly spaced interval e.g. time series or indexed sequence
with pure order information e.g. language; ii) asynchronous
sequence with random timestamp e.g. event data.
i) Synchronized series: RNNs have been a long time a
natural tool for standard time series modeling and prediction (Connor, Martin, and Atlas 1994; Han et al. 2004;
Chandra and Zhang 2012; Chen, Chang, and Chang 2013),
whereby the indexed series data point is fed as input to an
(unfold) RNN. In a broader sense, video frames can also be
treated as time series and RNN are widely used in recent visual analytics works (Jain et al. 2016; Tripathi et al. 2016)
and so for speech (Graves, rahman Mohamed, and Hinton
2014). RNNs are also intensively adopted for sequence modeling tasks (Chung et al. 2014; Bengio et al. 2015) when only
order information is considered.
ii) Asynchronous event: In contrast, event sequence
with timestamp about their occurrence, which are asynchronously and randomly distributed over the continuous
time space, is another typical input type for RNNs (Du et
al. 2016; Choi et al. 2016; Esteban et al. 2016) and (Che et
al. 2016) (despite its title for โtime seriesโ). One key differentiation against the first scenario is that the timestamp or
time duration between events (together with other features)
is taken as input to the RNNs. By doing so, (long-range)
event dependency can be effectively encoded.
Point process Point process has been a principled framework for modeling event data (Aalen, Borgan, and Gjessing
2008). The dynamics of the point process can be well captured by its conditional intensity function whose definition
is briefly reviewed here: for a short time window [t, t + dt),
ฮป(t) represents the rate for the occurrence of a new event
conditioned on the history Ht = {zi , ti |ti < t}:
ฮป(t) = lim
โtโ0
E(N (t + โt) โ N (t)|Ht )
E(dN (t)|Ht )
=
โt
dt
where E(dN (t)|Ht ) is the expectation of the number of
events happened in the interval (t, t + dt] given the historical observations Ht . The conditional intensity function has
played a central role in point processes and many popular
processes vary on how it is parameterized.
1) Poisson process (Kingman 1992): the homogeneous
Poisson process has a very simple form for its intensity function: ฮป(t) = ฮป0 . Poisson process and its time-varying generalization are both assumed to be independent of the history.
2) Reinforced poisson processes (Pemantle 2007; Shen et
al. 2014): the model captures the โrich-get-richerโ mechanism characterized by a compact intensity function, which
is recently used for popularity prediction (Shen et al. 2014).
3) Hawkes process (Hawkes 1971): Hawkes process has
received wide attention recently in social network analysis (Zhou, Zha, and Song 2013a), viral diffusion(Yang and
Zha 2013) and criminology (Lewis et al. 2010) etc. It explicitly uses a triggering term to model the excitation effect
from history events and is originally motivated to analyze
the earthquake and its aftershocks(Ogata 1988).
4) Reactive point process (Ertekin, Rudin, and McCormick 2015): it can be regarded as a generalization for the
Hawkes process by adding a self-inhibiting term to account
for the inhibiting effects from history events.
5) Self-correcting process (Isham and Westcott 1979): its
background part increases steadily, while it is decreased by
a constant eโฮฑ < 1 every time a new event appears.
We reformulate these intensity functions in their general
form in Table 1. It tries to separate the spontaneous background component and history event effect explicitly.
Predictive maintenance Predictive maintenance (Mobley 2002) is a sound testbed for our model which refers to
a practice that involves equipment risk prediction to allow
for proactive scheduling of corrective maintenance. Such an
early identification of potential concerns helps deploy limited resources more cost effectively, reduce operations costs
Table 1: Conditional intensity functions of point processes.
Model
Poisson process
Reinforced poisson process
Hawkes process
Reactive point process
Self-correcting process
Background
History event effect
ยต(t)
0
ยต(t)
ยต(t)
0
0
P
ฮณ(t) P
ti <t ฮด(ti < t)
P
P ti <t ฮณ(t, ti )
ti <t ฮณ1 (t, ti ) โ P
ti <t ฮณ2 (t, ti )
exp(ยตt โ ti <t ฮณ(t, ti )
Note:ฮด(t) is Dirac function, ฮณ(t, ti ) is time-decaying kernel and
ยต(t) can be constant or time-varying function.
and maximize equipment uptime (Grall et al. 2002). Predictive maintenance is adopted in a wide variety of applications such as fire inspection (Madaio et al. 2016), data center (Sirbu and Babaoglu 2015) and electrical grid (Ertekin,
Rudin, and McCormick 2015) management. For its practical
importance in different scenarios and relative rich event data
for modeling, we target our model to a real-world dataset of
more than 1,000 automated teller machines (ATMs) from a
global bank headquartered in North America.
Network Structure and End-to-End Learning
Taking a sequence {x}Tt=1 as input, the RNN generates the
hidden states {h}Tt=1 and outputs a sequence (Elman 1990;
Pascanu, Mikolov, and Bengio 2013). Specifically, we implement our RNN with Long Short Term Memory (LSTM)
(Hochreiter and Schmidhuber 1997; Graves 2013) for its
popularity and well-known capability for efficient longrange dependency learning. In fact other RNN variant e.g.
Gated Recurrent Units (GRU) (Chung et al. 2014) can also
be alternative choice. We reiterate the formulation of LSTM:
it
ft
ct
ot
ht
= ฯ(Wi xt + Ui htโ1 + Vi ctโ1 + bi ),
= ฯ(Wf xt + Uf htโ1 + Vf ctโ1 + bf ),
= ft ctโ1 + it tanh(Wc xt + Uc htโ1 + bc ),
= ฯ(Wo xt + Uo htโ1 + Vo ct + bo ),
= ot tanh(ct )
where denotes element-wise multiplication and the recurrent activation ฯ is the Logistic Sigmod function. The above
system can be reduced into an LSTM equation:
(ht , ct ) = LSTM(xt , htโ1 + ctโ1 )
We consider two types of input: i) continuously and evenly
distributed time-series data e.g. temperature; ii) event data
whose occurrence time interval is random. The network is
comprised by two RNNs using evenly spaced time series
{yt }Tt=1 to model the background intensity of events occurrence and event sequence {zi , ti }N
i=1 to capture long-range
event dependency. As a result, we have:
(hyt , cyt ) = LSTMy (yt , hytโ1 + cytโ1 ),
(1)
(hzt , czt )
(2)
et
Ut
ut
st
=
LSTMz (zt , hztโ1
tanh(Wf [hyt , hzt ]
+
cztโ1 ),
=
+ bf ),
= softMax(WU et + bU ),
= softMax(Wu [et , Ut ] + bu )
= Ws et + bs ,
(3)
(4)
(5)
(6)
where U and u denotes the main type and subtype of events
respectively. s is the timestamp associated with each event.
The total loss is the sum of the time prediction loss and the
cross-entropy loss for event type:
N
X
โWUj log(Utj ) โ wuj log(ujt ) โ log f (sjt |hjtโ1 )
(7)
j=1
where N is the number of training samples indexed by j,
and sjt is the timestamp for the coming event, while hjtโ1
is the history information. The underlying rationale for the
third term is that we not only encourage correct classification
of the coming event type, but also reinforce the corresponding timestamp of the event shall be close to the ground truth.
We adopt a Gaussian penalty function with a fixed ฯ 2 = 10:
!
1
โ(sjt โ sฬjt )2
j j
f (st |htโ1 ) = โ
exp
2ฯ 2
2ฯฯ
Figure 2: Our network can be trained end-to-end. Time series and event sequence are fed into two RNNs (LSTM)
which are connected to an embedding mapping layer that
fuses the information from two LSTMs. Then three prediction layers are used to output the predicted main type, subtype of events, and the associated timestamp. Cross-entropy
with the time penalty loss by Eq.7 and square loss are respectively used for event type and timestamp prediction.
total
max
min
mean
std
Training set
Table 2: Statistics of main/sub-type of event count per ATM,
and timestamp interval in days for all ATMs (in brackets).
Ticket
Error
PRT
CNG
IDC
COMM
LMTP
MISC
2226(โ)
28434(โ)
9204(โ)
7767(โ)
4082(โ)
3371(โ)
2525(โ)
1485(โ)
10(137.04)
168(153.90)
88(210.13)
50(200.07)
116(206.61)
47(202.79)
81(207.93)
32(204.41)
0(1.21)
0(0.10)
0(0.10)
0(0.10)
0(0.10)
0(0.10)
0(0.10)
0(0.10)
2.09(31.70)
26.70(6.31)
8.64(12.12)
7.29(15.49)
3.83(23.85)
3.16(22.35)
2.37(22.86)
1.39(24.27)
1.85(25.14)
18.38(9.74)
11.37(21.41)
6.59(23.87)
5.84(30.71)
3.90(29.36)
4.41(34.56)
2.54(34.38)
Testing set
The output sฬjt from the timestamp prediction layer is fed to
the classification loss layer to compute the above penalty
given the actual timestamp sjt for sample i.
Following the importance weighting methodology for
skewed data of model training (Rosenberg 2012), the weight
parameters W, w for both main-type and subtype are set as
the inverse of the sample number ratio in that type against
the total size of samples, in order to weight more on those
classes with fewer training samples. For the loss of independent main-type or subtype prediction as shown in Fig.3(b),
we set the weight parameter w and W to zero respectively.
We adopt RMSprop gradients (Dauphin et al. 2015) which
have been shown to work well on training deep networks to
learn these parameters.
data
Ticket
Error
PRT
CNG
IDC
COMM
LMTP
MISC
1164(โ)
11799(โ)
4089(โ)
3134(โ)
1645(โ)
1366(โ)
939(โ)
626(โ)
15(148.00)
104(193.75)
60(205.48)
66(196.93)
35(205.75)
53(205.17)
20(186.87)
21(190.75)
0(0.13)
1(0.10)
0(0.10)
0(0.10)
0(0.10)
0(0.10)
0(0.10)
0(0.10)
2.52(26.30)
25.59(6.47)
8.86(11.45)
6.79(15.90)
3.57(25.15)
2.96(22.88)
2.04(26.63)
1.36(25.14)
2.41(25.22)
17.71(10.09)
10.77(20.44)
6.91(25.22)
4.29(31.62)
4.08(30.09)
2.76(36.96)
2.59(34.91)
Experiments on Real-world Data
We use failure prediction for predictive ATMs maintenance
as a typical example of event based point process modeling. We have no prior knowledge on the dynamics of the
complex system and the task can involve arbitrarily working schedules and heterogeneous mix of conditions. It takes
much cost or even impractical to devise specialized models.
Problem and real data description
In maintenance support services, when a device fails, the
equipment owner raises a maintenance service ticket and
technician will be assigned to repair the failure. In fact, the
history log and relevant profile information about the equipment can be indicative signals for the coming failures.
The studied dataset is comprised of the event logs involving error reporting and failure tickets, which is originally collected from a large number of ATMs owned by an
anonymous global bank headquartered in North America.
The bank is also a customer of the technical support service
department of a Fortune 500 IT company.
ATM models The training data consists of 1085 ATMs
and testing data has 469 ATMs, in total 1557 Wincor ATMs
that cover 5 ATM machine models: ProCash 2100 RL (980,
430), 1500 RL (19, 5), 2100 FL (53, 21), 1500 FL (26, 10),
type
and 2250XE RL (7, 3). The numbers in the bracket indicate
the number of machines for training and testing.
Event type There are two main types โticketโ and โerrorโ
from Sep. 2014 to Mar. 2015. Statistics is presented in Table
2. Moreover โerrorโ is divided into 6 subtypes regarding in
which component the error occurs: 1) printer (PRT), 2) cash
dispenser module (CNG), 3) internet data center (IDC), 4)
communication part (COMM), 5) printer monitor (LMTP),
6) miscellaneous e.g. hip card module, usb (MISC).
Features The input features for the two RNNs are: 1)
Time series RNN: For each sub-window of length 7 days,
for the time series RNN, we extract features including: i)
the inventory information: ATM models, age, location, etc;
ii) Event statistics, including tickets events from maintenance records, and errors from system log. Their occurrence
frequencies are used as features. The concatenation of the
above two categories of features serves as the features for
each sub-window i.e. time series point. 2) Event sequence
RNN: event type and the time interval between two events.
Model setting We use a single layer LSTM of size 32
with Sigmoid gate activations and tanh activation for hidden
representation. The embedding layer is fully connected and
it uses tanh activation and outputs a 16 dimensional vector.
One-hot or embedding can be used for event type representation. For a large number of types, embedding representation
is compact and efficient. For time series RNN, we set the
length of each sub-window (i.e. the evenly spaced time interval) to be 7 days and the number of sub-window to be 5.
In this way, our observation length is 35 days for time series.
For event-dependency, the length of event sequence can be
arbitrarily long. Here we take it by 7.
We also test degraded versions of our model as follows:
1) Time series RNN: the input is event sequence (the
right half in the yellow part of Fig.2) is removed. Note this
design is in spirit similar to many LSTM models (Jain et al.
2016; Tripathi et al. 2016) used for video analytics, whereby
the frame sequence can be treated as time series as the input
to LSTMs. 2) Event (sequence) RNN: the RNN whose input is time series (the left half in the yellow part of Fig.2) is
removed; 3) Intensity RNN: two RNN are fused as shown
in Fig.2. For the above three methods, the output layer is directly the fine-grained subtype of events with no hierarchical
structure as shown in the top left part of Fig.2) in dark green.
We also term three โhierarchicalโ versions whose two hierarchical prediction layers in Fig.2 are used: 4) Time series
hRNN, 5) Event (sequence) hRNN, 6) Intensity hRNN.
In addition, we compare three major peer methods. For
Logistic model, the input are the concatenation of feature
vectors for all active time series RNN sub-windows (set to 5
in this paper). For RMTPP and Hawkes process, we train the
model on the event sequences with associated information.
In fact, RMTPP will further process the event data into the
similar input information to our event RNN.
1) Logistic model: we use Logistic regression for event
timestamp prediction and use another independent Logistic
classification model for event type prediction.
2) Recurrent Marked Temporal Point Processes
(RMTPP): (Du et al. 2016) uses neural network to model
the event dependency flexibly. The method can only sample
transient time series features when an event happens and use
partially parametric form for the base intensity.
3) Hawkes Process: To enable multi-type event prediction, we use a Multi-dimensional Hawkes process. Similar
to (Zhou, Zha, and Song 2013a), we also add a sparsity regularization term on the mutual infection matrix but the lowrank assumption is removed as we only have 6 subtypes.
Evaluation metrics We use several popular prediction
metrics for performance evaluation. For the coming event
type prediction, we adopt Precision, Recall, F1 Score and
Confusion matrix over 2 main types (โerrorโ, โticketโ) as well
Figure 3: Hierarchical layer and Flat independent layer.
as Confusion matrix over 6 subtypes under โerrorโ. Note all
these metrics are computed for each type, and then are averaged over all types. For event time prediction, we use the
Mean Absolute Error (MAE) which measures the absolute
difference between the predicted time point and the actual
one. These settings are similar to (Du et al. 2016).
To evaluate the type and timestamp prediction jointly, we
devise two more strict metrics. For type prediction, we narrow down to test the samples whose timestamp prediction
error MAE< 3 days and we compute the new F1 score+.
For timestamp, we recompute the new MAE+ only for the
samples whose coming event is correctly predicted.
Platform The code is based on Theano running on a
Linux server with 32G memory, 2 CPUs with 6 cores for
each: Intel(R) Xeon(R) CPU E5-2603 v3 @ 1.60GHz. We
also use 4 GPU:GeForce GTX TITAN X for acculturation.
Results and discussion
All evaluations are performed on the testing dataset distinctive to training set whose statistics are shown in Table 2.
Averaged performance Table 3 shows the averaged performance among various types of events. As shown in Fig.3,
we test two architectures of the event type prediction layer,
i.e. hierarchical predictor (Fig.3(a)) and flat independent
predictors (Fig.3(b)). The main type includes โticketโ and
โerrorโ and the subtype include โticketโ and the other six subtypes under โerrorโ as we describe earlier in the paper.
Confusion matrix The confusion matrix for the six subtypes under โerrorโ event, as well as for the two main types
โticketโ and โerrorโ are shown in Fig.4 by various methods.
We make observations and analysis based on the results:
1) As shown in 3, for main-type, the flat architecture that
directly predicts the main types outperforms the hierarchical
one in different settings of the input RNN as well as varying
evaluation metrics. This can be explained that the loss function focuses on the main-type misclassification only. While
for the subtype prediction, the hierarchical layer performs
better since it fuses the output from the main-type prediction layer and the embedding layer as shown in Fig.3(a).
2) No surprisingly, for both event type and timestamp prediction, our main approach, i.e. intensity RNN that fuses
two RNNs outperforms its counterparts time series RNN and
event sequence RNN by a notable margin. While the event
RNN also often performs better than the time series counterpart. This suggests at least in the studied dataset, history
event effects are important for the future event occurrence.
3) Our main method intensity RNN is almost always superior against other methods except for the main-type pre-
Table 3: Ablation test of our method and peer methods i.e.
multi-dimensional Hawkes process, recurrent Hawkes process and Logistic classification (for type) and regression (for
event timestamp). Numbers are averaged over types.
subtype
precision
Time series RNN
Event sequence RNN
Intensity RNN
Hawkes process
Logistic prediction
RMTPP
0.673
0.671
0.714
0.457
0.883
0.581
0.554
0.570
0.620
0.387
0.385
0.574
0.582
0.623
0.642
โ
โ
โ
0.590
0.614
0.664
โโ
โ
recall
Time series RNN
Event sequence RNN
Intensity RNN
Hawkes process
Logistic prediction
RMTPP
0.853
0.821
0.905
0.493
0.795
0.691
0.522
0.543
0.614
0.394
0.273
0.583
0.738
0.770
0.805
โ
โ
โ
0.608
0.621
0.661
โ
โ
โ
F1 score
Time series RNN
Event sequence RNN
Intensity RNN
Hawkes process
Logistic prediction
RMTPP
0.707
0.703
0.765
0.473
0.832
0.584
0.533
0.555
0.616
0.386
0.269
0.572
0.571
0.651
0.662
โ
โ
โ
0.605
0.610
0.663
โ
โ
โ
MAE (in days)
Time series RNN
Event sequence RNN
Intensity RNN
Hawkes process
Logistic prediction
RMTPP
4.37
4.24
4.13
5.26
4.52
4.28
4.48
4.42
4.20
5.46
4.61
4.32
4.26
4.21
4.02
โ
โ
โ
4.41
4.37
4.13
โ
โ
โ
F1 Score+
hierarchical output
main-type subtype
main-type
Time series RNN
Event sequence RNN
Intensity RNN
Hawkes process
Logistic prediction
RMTPP
0.768
0.705
0.825
0.467
0.846
0.584
0.547
0.597
0.661
0.451
0.286
0.619
0.572
0.639
0.684
โ
โ
โ
0.603
0.646
0.708
โ
โ
โ
MAE+
model
Time series RNN
Event sequence RNN
Intensity RNN
Hawkes process
Logistic prediction
RMTPP
4.21
4.16
4.12
5.42
4.5
4.26
3.78
3.84
3.57
3.93
4.24
3.99
4.05
4.12
4.21
โ
โ
โ
3.97
4.01
4.11
โ
โ
โ
diction task, whereby the Logistic classification model performs better. However for more challenging tasks i.e. subtype prediction and event timestamp prediction, our method
significantly outperforms especially for subtype prediction
task. Interestingly, all point process based models obtain
better results on this task which suggests the point process
models are more promising compared with classical classification models. Indeed, our methodology provides an endto-end learning mechanism without any pre-assumption in
modeling point process. All these empirical results on realworld tasks suggest the efficacy of our approach.
Conclusion
We use Fig.5 to conclude and further position our model in
the development of (implicit and explicite) modeling the intensity function of point process. In fact, Hawkes process
uses a full explicit parametric model and RMTPP misses the
dense time series features to model time-varying base intensity and assumes a partially parametric form for it. We make
a further step by a full implicit mapping model. Our model
(a)
Intensity hRNN
(b)
Time series hRNN
(c)
Event hRNN
(d)
Intensity RNN
(e)
Time series RNN
(f)
Event RNN
(g)
Hawkes process
(j)
i-hRNN
(o)
(k)
t-hRNN
e-RNN
(p)
(h)
Logistic
(l)
e-hRNN
(m)
(q)
Logistic
Hawkes
(i)
i-RNN
(r)
RMTPP
(n)
t-RNN
RMTPP
Figure 4: Confusion matrixes for sub/main type. Three
methods in top and middle row use the hierarchical and flat
structure as in Fig.3 respectively. Zoom in for better view.
Figure 5: The evolving of point process modeling.
(see Fig.2) is simple, general and can be learned end-to-end
with standard backpropagation and opens up new possibilities for borrowing the advances in neural network learning
to the area of point process modeling and applications. The
representative study in this paper has clearly suggests its
high potential to real-world problems, even we have no domain knowledge on the problem at hand. This is in contrast
to existing point process models where an assumption about
the dynamics is often need to be specified beforehand.
References
[Aalen, Borgan, and Gjessing 2008] Aalen, O.; Borgan, O.; and
Gjessing, H. 2008. Survival and event history analysis: a process
point of view. Springer Science & Business Media.
[Bengio et al. 2015] Bengio, S.; Vinyals, O.; Jaitly, N.; and Shazeer,
N. 2015. Scheduled sampling for sequence prediction with recurrent neural networks. In NIPS.
[Chandra and Zhang 2012] Chandra, R., and Zhang, M. 2012.
Cooperative coevolution of elman recurrent neural networks for
chaotic time series prediction. Neurocomputing 86:116โ123.
[Che et al. 2016] Che, Z.; Purushotham, S.; Cho, K.; Sontag, D.;
and Liu, Y. 2016. Recurrent neural networks for multivariate time
series with missing values. In arXiv:1606.01865.
[Chen, Chang, and Chang 2013] Chen, P. A.; Chang, L. C.; and
Chang, F. J. 2013. Reinforced recurrent neural networks for multistep-ahead flood forecasts. Journal of Hydrology 497:71โ79.
[Choi et al. 2016] Choi, E.; Bahadori, M. T.; Schuetz, A.; Stewart,
W. F.; and Sun, J. 2016. Doctor ai: Predicting clinical events via
recurrent neural networks. In arXiv:1511.05942v10.
[Chung et al. 2014] Chung, J.; Gulcehre, C.; Cho, K.; and Bengio,
Y. 2014. Empirical evaluation of gated recurrent neural networks
on sequence modeling. In arXiv:1412.3555.
[Connor, Martin, and Atlas 1994] Connor, J. T.; Martin, R. D.; and
Atlas, L. E. 1994. Recurrent neural networks and robust time series
prediction. IEEE Transactions on Neural Networks 5(2):240โ254.
[Dauphin et al. 2015] Dauphin, Y. N.; de Vries, H.; Chung, J.; and
Bengio, Y. 2015. Rmsprop and equilibrated adaptive learning rates
for non-convex optimization. In arXiv:1502.04390.
[Du et al. 2016] Du, N.; Dai, H.; Trivedi, R.; Upadhyay, U.; GomezRodriguez, M.; and Song, L. 2016. Recurrent marked temporal
point processes: Embedding event history to vectore. In KDD.
[Elman 1990] Elman, J. L. 1990. Finding structure in time. Cognitive Science 14:179โ211.
[Ertekin, Rudin, and McCormick 2015] Ertekin, S.; Rudin, C.; and
McCormick, T. H. 2015. Reactive point processes: A new approach
to predicting power failures in underground electrical systems. The
Annals of Applied Statistics 9(1):122โ144.
[Esteban et al. 2016] Esteban, C.; Staeck, O.; Yang, Y.; and Tresp,
V.
2016.
Predicting clinical events by combining static
and dynamic information using recurrent neural networks. In
arXiv:1602.02685.
[Grall et al. 2002] Grall, A.; Dieulle, L.; Berenguer, C.; and Roussignol, M. 2002. Continuous-time predictive-maintenance scheduling for a deteriorating system. IEEE transactions on Reliability
51(2):141โ150.
[Graves, rahman Mohamed, and Hinton 2014] Graves, A.; rahman
Mohamed, A.; and Hinton, G. 2014. Towards end-to-end speech
recognition with recurrent neural networks. In ICML.
[Graves 2013] Graves, A. 2013. Generating sequences with recurrent neural networks. In arXiv:1308.0850.
[Gregor et al. 2015] Gregor, K.; Danihelka, I.; Graves, A.; Rezende,
D.; and Wierstra, D. 2015. Draw: A recurrent neural network for
image generation. In ICML.
[Han et al. 2004] Han, M.; Xi, J.; Xu, S.; and Yin, F.-L. 2004.
Prediction of chaotic time series based on the recurrent predictor neural network. IEEE Transactions on Signal Processing
52(12):3409โ3416.
[Hawkes 1971] Hawkes, A. G. 1971. Spectra of some self-exciting
and mutually exciting point processes. Biometrika.
[Hochreiter and Schmidhuber 1997] Hochreiter, S., and Schmidhuber, J. 1997. Long short-term memory. Neural computation
9(8):1735โ1780.
[Isham and Westcott 1979] Isham, V., and Westcott, M. 1979. A
self-correcting pint process. Advances in Applied Probability
37:629โ646.
[Jain et al. 2016] Jain, A.; Singh, A.; Koppula, H. S.; Soh, S.; and
Saxena, A. 2016. Recurrent neural networks for driver activity
anticipation via sensory-fusion architecture. In ICRA.
[Kingman 1992] Kingman, J. F. C. 1992. Poisson processes. volume 3. Oxford university press.
[LeCun et al. 1998] LeCun, Y.; Bottou, L.; Bengio, Y.; and Haffner,
P. 1998. Gradient-based learning applied to document recognition.
Proceedings of the IEEE 86(11):2278โ2324.
[Lewis and Mohler 2011] Lewis, E., and Mohler, E. 2011. A nonparametric em algorithm for multiscale hawkes processes. Journal
of Nonparametric Statistics.
[Lewis et al. 2010] Lewis, E.; Mohler, G.; Brantingham, P. J.; and
Bertozzi, A. 2010. Self-exciting point process models of insurgency in iraq. UCLA CAM Reports 10 38.
[Madaio et al. 2016] Madaio, M.; Chen, S.; Haimson, O.; Zhang,
W.; Cheng, X.; and Hinds-Aldrich, M. 2016. Firebird: Predicting
fire risk and prioritizing fire inspections in atlanta. In KDD.
[Mobley 2002] Mobley, R. K. 2002. An introduction to predictive
maintenance. Butterworth-Heinemann.
[Montgomery, Jennings, and Kulahci 2015] Montgomery, D. C.;
Jennings, C. L.; and Kulahci, M. 2015. Introduction to time series analysis and forecasting. John Wiley & Sons.
[Ogata 1988] Ogata, Y. 1988. Statistical models for earthquake occurrences and residual analysis for point processes. J. Amer. Statist.
Assoc. 83(401):9โ27.
[Pascanu, Mikolov, and Bengio 2013] Pascanu, R.; Mikolov, T.;
and Bengio, Y. 2013. On the difficulty of training recurrent neural
networks. In ICML.
[Pemantle 2007] Pemantle, R. 2007. A survey of random processes
with reinforcement. Probability Survey 4(0):1โ79.
[Rosenberg 2012] Rosenberg, A. 2012. Classifying skewed data:
Importance weighting to optimize average recall. In INTERSPEECH, 2242โ2245.
[Russakovsky et al. 2015] Russakovsky, O.; Deng, J.; Su, H.;
Krause, J.; Satheesh, S.; Ma, S.; Huang, Z.; Karpathy, A.; Khosla,
A.; Bernstein, M.; Berg, A. C.; and Fei-Fei, L. 2015. Imagenet
large scale visual recognition challenge. International Journal of
Computer Vision 115(3):211โ252.
[Shen et al. 2014] Shen, H.; Wang, D.; Song, C.; and Barabaฬsi, A.
2014. Modeling and predicting popularity dynamics via reinforced
poisson processes. In AAAI.
[Sirbu and Babaoglu 2015] Sirbu, A., and Babaoglu, O. 2015. A
holistic approach to log data analysis in high-performance computing systems: The case of ibm blue gene/q. Euro-Par 2015: Parallel
Processing Workshopss 631โ643.
[Snyder and Miller 2012] Snyder, D. L., and Miller, M. I. 2012.
Random point processes in time and space. Springer Science &
Business Media.
[Sutskever, Vinyals, and Le. 2014] Sutskever, I.; Vinyals, O.; and
Le., Q. V. 2014. Sequence to sequence learning with neural networks. In NIPS.
[Tripathi et al. 2016] Tripathi, S.; Lipton, Z. C.; Belongie, S.; and
Nguyen, T. 2016. Context matters: Refining object detection in
video with recurrent neural networks. In BMVC.
[Xu et al. 2016] Xu, H.; Wu, W.; Nemati, S.; and Zha, H. 2016.
Patient flow prediction via discriminative learning of mutuallycorrecting processes. IEEE transactions on Knowledge and Data
Engineering.
[Yang and Zha 2013] Yang, S.-h., and Zha, H. 2013. Mixture of
mutually exciting processes for viral diffusion. In ICML.
[Zhou, Zha, and Song 2013a] Zhou, K.; Zha, H.; and Song, L.
2013a. Learning social infectivity in sparse low-rank networks using multi-dimensional hawkes processe. In AISTATS.
[Zhou, Zha, and Song 2013b] Zhou, K.; Zha, H.; and Song, L.
2013b. Learning triggering kernels for multi-dimensional hawkes
processes. In ICML.
| 2cs.AI
|
arXiv:1404.1957v3 [math.PR] 29 Oct 2015
The Annals of Applied Probability
2015, Vol. 25, No. 6, 3511โ3570
DOI: 10.1214/14-AAP1081
c Institute of Mathematical Statistics, 2015
ERGODIC CONTROL OF MULTI-CLASS M/M/N + M QUEUES
IN THE HALFINโWHITT REGIME
By Ari Arapostathisโ,1, Anup Biswasโ,2 and Guodong Pangโ ,3
The University of Texas at Austinโ and Pennsylvania State Universityโ
We study a dynamic scheduling problem for a multi-class queueing network with a large pool of statistically identical servers. The
arrival processes are Poisson, and service times and patience times
are assumed to be exponentially distributed and class dependent. The
optimization criterion is the expected long time average (ergodic) of
a general (nonlinear) running cost function of the queue lengths. We
consider this control problem in the HalfinโWhitt (QED) regime,
that is, the number of servers n and the total offered load r scale
โ
like n โ r + ฯฬ r for some constant ฯฬ. This problem was proposed in
[Ann. Appl. Probab. 14 (2004) 1084โ1134, Section 5.2].
The optimal solution of this control problem can be approximated
by that of the corresponding ergodic diffusion control problem in the
limit. We introduce a broad class of ergodic control problems for controlled diffusions, which includes a large class of queueing models in
the diffusion approximation, and establish a complete characterization of optimality via the study of the associated HJB equation. We
also prove the asymptotic convergence of the values for the multi-class
queueing control problem to the value of the associated ergodic diffusion control problem. The proof relies on an approximation method
by spatial truncation for the ergodic control of diffusion processes,
where the Markov policies follow a fixed priority policy outside a
fixed compact set.
Received April 2014; revised November 2014.
Supported in part by the Office of Naval Research Grant N00014-14-1-0196.
2
Supported in part by an award from the Simons Foundation (# 197982) to The University of Texas at Austin and in part by the Office of Naval Research through the Electric
Ship Research and Development Consortium.
3
Supported in part by the Marcus Endowment Grant at the Harold and Inge Marcus
Department of Industrial and Manufacturing Engineering at Penn State.
AMS 2000 subject classifications. Primary 60K25; secondary 68M20, 90B22, 90B36.
Key words and phrases. Multi-class Markovian queues, reneging/abandonment,
HalfinโWhitt (QED) regime, diffusion scaling, long time-average control, ergodic control,
stable Markov optimal control, spatial truncation, asymptotic optimality.
1
This is an electronic reprint of the original article published by the
Institute of Mathematical Statistics in The Annals of Applied Probability,
2015, Vol. 25, No. 6, 3511โ3570. This reprint differs from the original in
pagination and typographic detail.
1
2
A. ARAPOSTATHIS, A. BISWAS AND G. PANG
CONTENTS
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.1. Contributions and comparisons . . . . . . . . . . . . . . .
1.2. Organization . . . . . . . . . . . . . . . . . . . . . . . . .
1.3. Notation . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2. The controlled system in the HalfinโWhitt regime . . . . . .
2.1. The multi-class Markovian many-server model . . . . . .
2.2. The ergodic control problem in the HalfinโWhitt regime
3. A broad class of ergodic control problems for diffusions . . .
3.1. The controlled diffusion model . . . . . . . . . . . . . . .
3.2. Structural assumptions . . . . . . . . . . . . . . . . . . .
3.3. Piecewise linear controlled diffusions . . . . . . . . . . . .
3.4. Existence of optimal controls . . . . . . . . . . . . . . . .
3.5. The HJB equation . . . . . . . . . . . . . . . . . . . . . .
3.6. Technical proofs . . . . . . . . . . . . . . . . . . . . . . .
4. Approximation via spatial truncations . . . . . . . . . . . . .
5. Asymptotic convergence . . . . . . . . . . . . . . . . . . . . . .
5.1. The lower bound . . . . . . . . . . . . . . . . . . . . . . .
5.2. The upper bound . . . . . . . . . . . . . . . . . . . . . . .
6. Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . . . .
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
2
4
6
6
8
8
10
14
14
17
18
22
26
31
42
48
49
53
61
61
61
1. Introduction. One of the classical problems in queueing theory is to
schedule the customers/jobs in a network in an optimal way. These problems are known as the scheduling problems which arise in a wide variety
of applications, in particular, whenever there are different customer classes
present in the network and competing for the same resources. The optimal
scheduling problem has a long history in the literature. One of the appealing
scheduling rules is the well-known cยต rule. This is a static priority policy
in which it is assumed that each class-i customer has a marginal delay cost
ci and an average service time 1/ยตi , and the classes are prioritized in the
decreasing order of ci ยตi . This static priority rule has proven asymptotically
optimal in many settings [4, 28, 32]. In [11], a single-server Markov modulated queueing network is considered and an averaged cยต-rule is shown
asymptotically optimal for the discounted control problem.
An important aspect of queueing networks is abandonment/reneging, that
is, customers/jobs may choose to leave the system while being in the queue
before their service. Therefore, it is important to include customer abandonment in modeling queueing systems. In [5, 6], Atar et al. considered a
multi-class M/M/N +M queueing network with customer abandonment and
proved that a modified priority policy, referred to as cยต/ฮธ rule, is asymptotically optimal for the long run average cost in the fluid scale. Dai and Tezcan
[13] showed the asymptotic optimality of a static priority policy on a finite
ERGODIC CONTROL IN THE HALFINโWHITT REGIME
3
time interval for a parallel server model under the assumed conditions on
the ordering of the abandonment rates and running costs. Although static
priority policies are easy to implement, it may not be optimal for control
problems of many multi-server queueing systems. For the same multi-class
M/M/N + M queueing network, discounted cost control problems are studied in [3, 7, 22], and asymptotically optimal controls for these problems are
constructed from the minimizer of a HamiltonโJacobiโBellman (HJB) equation associated with the controlled diffusions in the HalfinโWhitt regime.
In this article, we are interested in an ergodic control problem for a
multi-class M/M/N + M queueing network in the HalfinโWhitt regime.
The network consists of a single pool of n statistically identical servers and
a buffer of infinite capacity. There are d customer classes and arrivals of
jobs/customers are d independent Poisson processes with parameters ฮปni ,
i = 1, . . . , d. The service rate for class-i customers is ยตni , i = 1, . . . , d. Customers may renege from the queue if they have not started to receive service
before their patience times. Class-i customers renege from the queue at rates
ฮณin > 0, i = 1, . . . , d. The scheduling policies are work-conserving, that is, no
server stays idle if any of the queues is nonempty. We assume the system
operates in the HalfinโWhitt regime, where the arrival rates and the number
of servers are scaled appropriately in a manner that the traffic intensity of
the system satisfies
!
d
X
โ
ฮปni
โโ ฯฬ โ R.
n 1โ
nยตni nโโ
i=1
In this regime, the system operations achieve both high quality (high server
levels) and high efficiency (high serversโ utilization), and hence it is also
referred to as the Quality-and-Efficiency-Driven (QED) regime; see, for example, [7, 16, 17, 19, 21] on the many-server regimes. We consider an ergodic
cost function given by
Z T
1
n
r(Qฬ (s)) ds ,
lim sup E
T โโ T
0
where the running cost r is a nonnegative, convex function with polynomial
growth and Qฬn = (Qฬn1 , . . . , Qฬnd )T is the diffusion-scaled queue length process.
It is worth mentioning that in addition to the running cost above which is
based on the queue-length, we can add an idle-server cost provided that it
has at most polynomial growth. For such, a running cost structure the same
analysis goes through. The control is the allocation of servers to different
classes of customers at the service completion times. The value function is
defined to be the infimum of the above cost over all admissible controls
(among all work-conserving scheduling policies). In this article, we are interested in the existence and uniqueness of asymptotically optimal stable
4
A. ARAPOSTATHIS, A. BISWAS AND G. PANG
stationary Markov controls for the ergodic control problem, and the asymptotic behavior of the value functions as n tends to infinity. In [7], Section 5.2,
it is stated that analysis of this type of problems is important for modeling
call centers.
1.1. Contributions and comparisons. The usual methodology for studying these problems is to consider the associated continuum model, which
is the controlled diffusion limit in a heavy-traffic regime, and to study the
ergodic control problem for the controlled diffusion. Ergodic control problems governed by controlled diffusions have been well studied in literature
[1, 9] for models that fall in these two categories: (a) the running cost is
near-monotone, which is defined by the requirement that its value outside a
compact set exceeds the optimal average cost, thus penalizing unstable behavior (see Assumption 3.4.2 in [1] for details), or (b) the controlled diffusion
is uniformly stable, that is, every stationary Markov control is stable and the
collection of invariant probability measures corresponding to the stationary
Markov controls is tight. However, the ergodic control problem at hand does
not fall under any of these frameworks. First, the running cost we consider
here is not near-monotone because the total queue length can be 0 when
the total number of customers in the system are O(n). On the other hand,
it is not at all clear that the controlled diffusion is uniformly stable (unless
one imposes nontrivial hypotheses on the parameters), and this remains an
open problem. One of our main contributions in this article is that we solve
the ergodic control problem for a broad class of nondegenerate controlled
diffusions, that in a certain way can be viewed as a mixture of the two categories mentioned above. As we show in Section 3, stability of the diffusion
under any optimal stationary Markov control occurs due to certain interplay
between the drift and the running cost. The model studied in Section 3 is
far more general than the queueing problem described, and thus it is of separate interest for ergodic control. We present a comprehensive study of this
broad class of ergodic control problems that includes existence of a solution
to the ergodic HJB equation, its stochastic representation and verification
of optimality (Theorem 3.4), uniqueness of the solution in a certain class
(Theorem 3.5), and convergence of the vanishing discount method (Theorem 3.6). These results extend the well-known results for near-monotone
running costs. The assumptions in these theorems are verified for the multiclass queueing model and the corresponding characterization of optimality
is obtained (Corollary 3.1), which includes growth estimates for the solution
of the HJB.
We also introduce a new approximation technique, spatial truncation, for
the controlled diffusion processes; see Section 4. It is shown that if we freeze
the Markov controls to a fixed stable Markov control outside a compact
set, then we can still obtain nearly optimal controls in this class of Markov
ERGODIC CONTROL IN THE HALFINโWHITT REGIME
5
controls for large compact sets. We should keep in mind that this property is
not true in general. This method can also be thought of as an approximation
by a class of controlled diffusions that are uniformly stable.
We remark that for a fixed control, the controlled diffusions for the queueing model can be regarded as a special case of the piecewise linear diffusions
considered in [14]. It is shown in [14] that these diffusions are stable under
constant Markov controls. The proof is via a suitable Lyapunov function.
We conjecture that uniform stability holds for the controlled diffusions associated with the queueing model. For the same multi-class Markovian model,
Gamarnik and Stolyar show that the stationary distributions of the queue
lengths are tight under any work-conserving policy [15], Theorem 2. We also
wish to remark here that we allow ฯฬ to be negative, assuming abandonment
rates are strictly positive, while in [15], ฯฬ > 0 and abandonment rates can
be zero.
Another important contribution of this work is the convergence of the
value functions associated with the sequence of multi-class queueing models to the value of the ergodic control problem, say ฬบโ , corresponding to the
controlled diffusion model. It is not obvious that one can have asymptotic optimality from the existence of optimal stable controls for the HJB equations
of controlled diffusions. This fact is relatively straightforward when the cost
under consideration is discounted. In that situation, the tightness of paths
on a finite time horizon is sufficient to prove asymptotic optimality [7]. But
we are in a situation where any finite time behavior of the stochastic process
plays no role in the cost. In particular, we need to establish the convergence
of the controlled steady states. Although uniform stability of stationary distributions for this multi-class queueing model in the case where ฯฬ > 0 and
abandonment rates can be zero is established in [15], it is not obvious that
the stochastic model considered here has the property of uniform stability.
Therefore, we use a different method to establish the asymptotic optimality.
First, we show that the value functions are asymptotically bounded below by
ฬบโ . To study the upper bound, we construct a sequence of Markov scheduling policies that are uniformly stable (see Lemma 5.1). The key idea used
in establishing such stability results is a spatial truncation technique, under which the Markov policies follow a fixed priority policy outside a given
compact set. We believe these techniques can also be used to study ergodic
control problems for other many-server queueing models.
The scheduling policies we consider in this paper allow preemption, that
is, a customer in service can be interrupted for the server to serve a customer
of a different class and her service will be resumed later. In fact, the asymptotic optimality is shown within the class of the work-conserving preemptive
policies. In [7], both preemptive and nonpreemptive policies are studied,
where a nonpreemptive scheduling control policy is constructed from the
HJB equation associated with preemptive policies and thus is shown to be
6
A. ARAPOSTATHIS, A. BISWAS AND G. PANG
asymptotically optimal. However, as far as we know, the optimal nonpreemptive scheduling problem under the ergodic cost remains open.
For a similar line of work in uncontrolled settings, we refer the reader
to [16, 19]. Admission control of the single class M/M/N + M model with
an ergodic cost criterion in the HalfinโWhitt regime is studied in [26]. For
controlled problems and for finite server models, asymptotic optimality is
obtained in [12] in the conventional heavy-traffic regime. The main advantage in [12] is the uniform exponential stability of the stochastic processes,
which is obtained by using properties of the Skorohod reflection map. A
recent work studying ergodic control of a multi-class single-server queueing
network is [25].
To summarize our main contributions in this paper:
โ We introduce a new class of ergodic control problems and a framework to
solve them.
โ We establish an approximation technique by spatial truncation.
โ We provide, to the best of our knowledge, the first treatment of ergodic
control problems at the diffusion scale for many server models.
โ We establish asymptotic optimality results.
1.2. Organization. In Section 1.3, we summarize the notation used in
the paper. In Section 2, we introduce the multi-class many server queueing
model and describe the HalfinโWhitt regime. The ergodic control problem
under the heavy-traffic setting is introduced in Section 2.2, and the main
results on asymptotic convergence are stated as Theorems 2.1 and 2.2. Section 3 introduces a class of controlled diffusions and associated ergodic control problems, which contains the queueing models in the diffusion scale.
The key structural assumptions are in Section 3.2 and these are verified for
a generic class of queueing models in Section 3.3, which are characterized
by piecewise linear controlled diffusions. Section 3.4 concerns the existence
of optimal controls under the general hypotheses, while Section 3.5 contains
a comprehensive study of the HJB equation. Section 3.6 is devoted to the
proofs of the results in Section 3.5. The spatial truncation technique is introduced and studied in Section 4. Finally, in Section 5 we prove the results
of asymptotic optimality.
1.3. Notation. The standard Euclidean norm in Rd is denoted by |ยท|. The
set of nonnegative real numbers is denoted by R+ , N stands for the set of
natural numbers, and I denotes the indicator function. By Zd+ we denote the
set of d-vectors of nonnegative integers. The closure, the boundary and the
complement of a set A โ Rd are denoted by A, โA and Ac , respectively. The
open ball of radius R around 0 is denoted by BR . Given two real numbers
a and b, the minimum (maximum) is denoted by a โง b (a โจ b), respectively.
ERGODIC CONTROL IN THE HALFINโWHITT REGIME
7
Define a+ := a โจ 0 and aโ := โ(a โง 0). The integer part of a real number
a is denoted by โaโ. We use the notation ei , i = 1, . . . , d, to denote the
vector with ith entry equal to 1 and all other entries equal to 0. We also let
e := (1, . . . , 1)T . Given any two vectors x, y โ Rd the inner product is denoted
by x ยท y. By ฮดx we denote the Dirac mass at x. For any function f : Rd โ R
and domain D โ R we define the oscillation of f on D as follows:
osc(f ) := sup{f (x) โ f (y) : x, y โ D}.
D
For a nonnegative function g โ C(Rd ), we let O(g) denote the space of
|f (x)|
< โ. This is a Banach space
functions f โ C(Rd ) satisfying supxโRd 1+g(x)
under the norm
|f (x)|
kf kg := sup
.
xโRd 1 + g(x)
We also let o(g) denote the subspace of O(g) consisting of those functions f
satisfying
lim sup
|x|โโ
|f (x)|
= 0.
1 + g(x)
By a slight abuse of notation, we also denote by O(g) and o(g) a generic
member of these spaces. For two nonnegative functions f and g, we use the
notation f โผ g to indicate that f โ O(g) and g โ O(f ).
We denote by Lploc (Rd ), p โฅ 1, the set of real-valued functions that are
p
d
d
locally p-integrable and by Wk,p
loc (R ) the set of functions in Lloc (R ) whose
p
ith weak derivatives, i = 1, . . . , k, are in Lloc (Rd ). The set of all bounded
k,ฮฑ
continuous functions is denoted by Cb (Rd ). By Cloc
(Rd ) we denote the set of
functions that are k-times continuously differentiable and whose kth derivatives are locally Hoฬlder continuous with exponent ฮฑ. We define Cbk (Rd ), k โฅ 0,
as the set of functions whose ith derivatives, i = 1, . . . , k, are continuous and
bounded in Rd and denote by Cck (Rd ) the subset of Cbk (Rd ) with compact
support. For any path X(ยท), we use the notation โX(t) to denote the jump
at time t. Given any Polish space X , we denote by P(X ) the set of probability measures on X and we endow P(X ) with the Prokhorov metric. For
ฮฝ โ P(X ) and a Borel measurable map f : X โ R, we often use the abbreviated notation
Z
f dฮฝ.
ฮฝ(f ) :=
X
The quadratic variation of a square integrable martingale is denoted by
hยท, ยทi and the optional quadratic variation by [ยท, ยท]. For presentation purposes
we use the time variable as the subscript for the diffusion processes. Also
ฮบ1 , ฮบ2 , . . . and C1 , C2 , . . . are used as generic constants whose values might
vary from place to place.
8
A. ARAPOSTATHIS, A. BISWAS AND G. PANG
Fig. 1.
A schematic model of the system.
2. The controlled system in the HalfinโWhitt regime.
2.1. The multi-class Markovian many-server model. Let (โฆ, F, P) be a
given complete probability space and all the stochastic variables introduced
below are defined on it. The expectation w.r.t. P is denoted by E. We consider a multi-class Markovian many-server queueing system which consists
of d customer classes and n parallel servers capable of serving all customers
(see Figure 1).
The system buffer is assumed to have infinite capacity. Customers of class
i โ {1, . . . , d} arrive according to a Poisson process with rate ฮปni > 0. Customers enter the queue of their respective classes upon arrival if not being
processed. Customers of each class are served in the first-come-first-serve
(FCFS) service discipline. While waiting in queue, customers can abandon
the system. The service times and patience times of customers are classdependent and both are assumed to be exponentially distributed, that is,
class i customers are served at rate ยตni and renege at rate ฮณin . We assume
that customer arrivals, service and abandonment of all classes are mutually
independent.
The HalfinโWhitt regime. We study this queueing model in the Halfinโ
Whitt regime [or the Quality-and-Efficiency-Driven (QED) regime]. Consider a sequence of such systems indexed by n, in which the arrival rates ฮปni
and the number of servers n both increase appropriately. Let rni := ฮปni /ยตni
be the mean offered load of classPi customers. The traffic intensity of the
nth system is given by ฯn = nโ1 di=1 rni . In the HalfinโWhitt regime, the
ERGODIC CONTROL IN THE HALFINโWHITT REGIME
9
parameters are assumed to satisfy the following: as n โ โ,
(2.1)
ฮปni
โ ฮปi > 0,
ยตni โ ยตi > 0,
n
โ
ฮปni โ nฮปi
โ
n(ยตni โ ยตi ) โ ยตฬi ,
โ ฮปฬi ,
n
ฮปi
rni
โ ฯi :=
< 1,
n
ยตi
This implies that
โ
n(1 โ ฯn ) โ ฯฬ :=
d
X
ฮณin โ ฮณi > 0,
ฯi = 1.
i=1
d
X
ฯi ยตฬi โ ฮปฬi
i=1
ยตi
โ R.
The above scaling is common in multi-class multi-server models [7, 22]. Note
that we do not make any assumption on the sign of ฯฬ.
State descriptors. Let Xin = {Xin (t) : t โฅ 0} be the total number of class i
customers in the system, Qni = {Qni (t) : t โฅ 0} the number of class i customers
in the queue and Zin = {Zin (t) : t โฅ 0} the number of class i customers in
service. The following basic relationships hold for these processes: for each
t โฅ 0 and i = 1, . . . , d,
(2.2)
Xin (t) = Qni (t) + Zin (t),
Qni (t) โฅ 0,
Zin (t) โฅ 0 and
e ยท Z n (t) โค n.
We can describe these processes using a collection {Ani , Sin , Rin , i = 1, . . . , d}
of independent rate-1 Poisson processes. Define
Aฬni (t) := Ani (ฮปni t),
Z t
Sฬin (t) := Sin ยตni
Zin (s) ds ,
0
Z t
n
n
n
n
Rฬi (t) := Ri ฮณi
Qi (s) ds .
0
Then the dynamics take the form
(2.3) Xin (t) = Xin (0) + Aฬni (t) โ Sฬin (t) โ Rฬin (t),
t โฅ 0, i = 1, . . . , d.
Scheduling control. Following [7, 22], we only consider work-conserving
policies that are nonanticipative and allow preemption. When a server becomes free and there are no customers waiting in any queue, the server stays
idle, but if there are customers of multiple classes waiting in the queue, the
10
A. ARAPOSTATHIS, A. BISWAS AND G. PANG
server has to make a decision on the customer class to serve. Service preemption is allowed, that is, service of a customer class can be interrupted at
any time to serve some other class of customers and the original service is resumed at a later time. A scheduling control policy determines the processes
Z n , which must satisfy the constraints in (2.2) and the work-conserving
constraint, that is,
e ยท Z n (t) = (e ยท X n (t)) โง n,
t โฅ 0.
Define the action set An (x) as
An (x) := {a โ Zd+ : a โค x and e ยท a = (e ยท x) โง n}.
Thus, we can write Z n (t) โ An (X n (t)) for each t โฅ 0. We also assume that
all controls are nonanticipative. Define the ฯ-fields
Ftn := ฯ{X n (0), Aฬni (t), Sฬin (t), Rฬin (t) : i = 1, . . . , d, 0 โค s โค t} โจ N
and
Gtn := ฯ{ฮดAฬni (t, r), ฮดSฬin (t, r), ฮดRฬin (t, r) : i = 1, . . . , d, r โฅ 0},
where
ฮดAฬni (t, r) := Aฬni (t + r) โ Aฬni (t),
Z t
n
n
n
n
n
ฮดSฬi (t, r) := Si ยตi
Zi (s) ds + ยตi r โ Sฬin (t),
0
ฮดRฬin (t, r) :=
Rin
ฮณin
Z
0
t
Qni (s) ds + ฮณin r
โ Rฬin (t),
and N is the collection of all P-null sets. The filtration {Ftn , t โฅ 0} represents
the information available up to time t while Gtn contains the information
about future increments of the processes.
We say that a working-conserving control policy is admissible if:
(i) Z n (t) is adapted to Ftn ,
(ii) Ftn is independent of Gtn at each time t โฅ 0,
(iii) for each i = 1, . . . , d, and t โฅ 0, the process ฮดSฬin (t, ยท) agrees in law
with Sin (ยตni ยท), and the process ฮดRฬin (t, ยท) agrees in law with Rin (ฮณin ยท).
We denote the set of all admissible control policies (Z n , F n , G n ) by Un .
2.2. The ergodic control problem in the HalfinโWhitt regime. Define the
diffusion-scaled processes
Xฬ n = (Xฬ1n , . . . , Xฬdn )T ,
Qฬn = (Qฬn1 , . . . , Qฬnd )T
and
Zฬ n = (Zฬ1n , . . . , Zฬdn )T ,
ERGODIC CONTROL IN THE HALFINโWHITT REGIME
11
by
(2.4)
1
Xฬin (t) := โ (Xin (t) โ ฯi nt),
n
1
Qฬni (t) := โ Qni (t),
n
1
Zฬin (t) := โ (Zin (t) โ ฯi nt)
n
for t โฅ 0. By (2.3), we can express Xฬin as
Z t
Z t
n
n
n
n
n
n
Xฬi (t) = Xฬi (0) + โi t โ ยตi
Zฬi (s) ds โ ฮณi
Qฬni (s) ds
0
0
(2.5)
n
n
n
+ MฬA,i
(t) โ MฬS,i
(t) โ MฬR,i
(t),
where โn = (โn1 , . . . , โnd )T is defined as
1
โni := โ (ฮปni โ ยตni ฯi n),
n
and
(2.6)
1
n
MฬA,i
(t) := โ (Ani (ฮปni t) โ ฮปni t),
n
Z t
Z t
1
n
n
n
n
n
n
MฬS,i (t) := โ Si ยตi
Zi (s) ds โ ยตi
Zi (s) ds ,
n
0
0
Z t
Z t
1
n
n
n
n
n
n
MฬR,i (t) := โ Ri ฮณi
Qi (s) ds โ ฮณi
Qi (s) ds
n
0
0
are square integrable martingales w.r.t. the filtration {Ftn }.
Note that
โ
1
(ฮปฬi โ ฯi ยตฬi )
.
โni = โ (ฮปni โ ฮปi n) โ ฯi n(ยตni โ ยตi ) โโ โi :=
nโโ
n
ยตi
Define
S := {u โ Rd+ : e ยท u = 1}.
For Z n โ Un we define, for t โฅ 0 and for adapted Uฬ n (t) โ S,
(2.7)
Qฬn (t) := (e ยท Xฬ n (t))+ Uฬ n (t),
Zฬ n (t) := Xฬ n (t) โ (e ยท Xฬ n (t))+ Uฬ n (t).
If Qฬn (t) = 0, we define Uฬ n (t) := ed = (0, . . . , 0, 1)T . Thus, Uฬin represents the
fraction of class-i customers in the queue when the total queue size is positive. As we show later, it is convenient to view Uฬ n (t) as the control. Note
that the controls are nonanticipative and preemption is allowed.
12
A. ARAPOSTATHIS, A. BISWAS AND G. PANG
2.2.1. The cost minimization problem. We next introduce the running
cost function for the control problem. Let r : Rd+ โ R+ be a given function
satisfying
(2.8)
c1 |x|m โค r(x) โค c2 (1 + |x|m )
for some m โฅ 1,
and some positive constants ci , i = 1, 2. We also assume that r is locally Lipschitz. This assumption includes linear and convex running cost functions.
For example, if we let hi be the holding cost rate for class i customers, then
some of the typical running cost functions are the following:
r(x) =
d
X
hi xm
i ,
m โฅ 1.
i=1
These running cost functions evidently satisfy the condition in (2.8).
Given the initial state X n (0) and a work-conserving scheduling policy
n
Z โ Un , we define the diffusion-scaled cost function as
Z T
1
n
n
n
(2.9)
r(Qฬ (s)) ds ,
J(Xฬ (0), Zฬ ) := lim sup E
T โโ T
0
where the running cost function r satisfies (2.8). Note that the running
cost is defined using the scaled version of Z n . Then the associated cost
minimization problem becomes
(2.10)
Vฬ n (Xฬ n (0)) := ninf n J(Xฬ n (0), Zฬ n ).
Z โU
We refer to Vฬ n (Xฬ n (0)) as the diffusion-scaled value function given the
initial state Xฬ n (0) in the nth system.
From (2.7), it is easy to see that by redefining r as r(x, u) = r((e ยท x)+ u)
we can rewrite the control problem as
ห Xฬ n (0), Uฬ n ),
Vฬ n (Xฬ n (0)) = inf J(
where
(2.11)
ห Xฬ n (0), Uฬ n ) := lim sup 1 E
J(
T โโ T
Z
T
0
r(Xฬ n (s), Uฬ n (s)) ds ,
and the infimum is taken over all admissible pairs (Xฬ n , Uฬ n ) satisfying (2.7).
For simplicity, we assume that the initial condition Xฬ n (0) is deterministic
and Xฬ n (0) โ x as n โ โ for some x โ Rd .
ERGODIC CONTROL IN THE HALFINโWHITT REGIME
13
2.2.2. The limiting controlled diffusion process. As in [7, 22], one formally deduces that, provided Xฬ n (0) โ x, there exists a limit X for Xฬ n on
every finite time interval, and the limit process X is a d-dimensional diffusion
process with independent components, that is,
(2.12)
dXt = b(Xt , Ut ) dt + ฮฃ dWt,
with initial condition X0 = x. In (2.12), the drift b(x, u) : Rd ร S โ Rd takes
the form
(2.13)
with
b(x, u) = โ โ R(x โ (e ยท x)+ u) โ (e ยท x)+ ฮu,
โ := (โ1 , . . . , โd )T ,
R := diag(ยต1 , . . . , ยตd ),
ฮ := diag(ฮณ1 , . . . , ฮณd ).
The control Ut lives in S and is nonanticipative, W (t) is a d-dimensional
standard Wiener process independent of the initial condition X0 = x, and
the covariance matrix is given by
ฮฃฮฃT = diag(2ฮป1 , . . . , 2ฮปd ).
A formal derivation of the drift in (2.13) can be obtained from (2.5) and
(2.7). A detailed description of equation (2.12) and related results are given
in Section 3. Let U be the set of all admissible controls for the diffusion
model (for a definition see Section 3).
2.2.3. The ergodic control problem in the diffusion scale. Define rฬ : Rd+ ร
Rd+ โ R+ by
rฬ(x, u) := r((e ยท x)+ u),
where r is the same function as in (2.9). In analogy with (2.11) we define
the ergodic cost associated with the controlled diffusion process X and the
running cost function rฬ(x, u) as
Z T
1 U
J(x, U ) := lim sup Ex
rฬ(Xt , Ut ) dt ,
U โ U.
T โโ T
0
We consider the ergodic control problem
(2.14)
ฬบโ (x) = inf J(x, U ).
U โU
We call ฬบโ (x) the optimal value at the initial state x for the controlled
diffusion process X. It is shown later that ฬบโ (x) is independent of x. A
detailed treatment and related results corresponding to the ergodic control
problem are given in Section 3.
We next state the main results of this section, the proof of which can be
found in Section 5.
14
A. ARAPOSTATHIS, A. BISWAS AND G. PANG
Theorem 2.1. Let Xฬ n (0) โ x โ Rd as n โ โ. Also assume that (2.1)
and (2.8) hold. Then
lim inf Vฬ n (Xฬ n (0)) โฅ ฬบโ (x),
nโโ
where ฬบโ (x) is given by (2.14).
Theorem 2.2. Suppose the assumptions of Theorem 2.1 hold. In addition, assume that r in (2.9) is convex. Then
lim sup Vฬ n (Xฬ n (0)) โค ฬบโ (x).
nโโ
Thus, we conclude that for any convex running cost function r, Theorems 2.1 and 2.2 establish the asymptotic convergence of the ergodic control
problem for the queueing model.
3. A broad class of ergodic control problems for diffusions.
3.1. The controlled diffusion model. The dynamics are modeled by a controlled diffusion process X = {Xt , t โฅ 0} taking values in the d-dimensional
Euclidean space Rd , and governed by the Itoฬ stochastic differential equation
(3.1)
dXt = b(Xt , Ut ) dt + ฯ(Xt ) dWt .
All random processes in (3.1) live in a complete probability space (โฆ, F, P).
The process W is a d-dimensional standard Wiener process independent of
the initial condition X0 . The control process U takes values in a compact,
metrizable set U, and Ut (ฯ) is jointly measurable in (t, ฯ) โ [0, โ) ร โฆ.
Moreover, it is nonanticipative: for s < t, Wt โ Ws is independent of
Fs := the completion of ฯ{X0 , Ur , Wr , r โค s} relative to (F, P).
Such a process U is called an admissible control, and we let U denote the set
of all admissible controls.
We impose the following standard assumptions on the drift b and the
diffusion matrix ฯ to guarantee existence and uniqueness of solutions to
equation (3.1).
(A1) Local Lipschitz continuity: The functions
b = [b1 , . . . , bd ]T : Rd ร U โ Rd
and ฯ = [ฯ ij ] : Rd โ Rdรd
are locally Lipschitz in x with a Lipschitz constant CR > 0 depending on
R > 0. In other words, for all x, y โ BR and u โ U,
|b(x, u) โ b(y, u)| + kฯ(x) โ ฯ(y)k โค CR |x โ y|.
We also assume that b is continuous in (x, u).
ERGODIC CONTROL IN THE HALFINโWHITT REGIME
15
(A2) Affine growth condition: b and ฯ satisfy a global growth condition
of the form
|b(x, u)|2 + kฯ(x)k2 โค C1 (1 + |x|2 )
โ(x, u) โ Rd ร U,
where kฯk2 := trace(ฯฯ T ).
(A3) Local nondegeneracy: For each R > 0, it holds that
d
X
i,j=1
โ1 2
|ฮพ|
aij (x)ฮพi ฮพj โฅ CR
โx โ BR ,
for all ฮพ = (ฮพ1 , . . . , ฮพd )T โ Rd , where a := ฯฯ T .
In integral form, (3.1) is written as
Z t
Z t
(3.2)
ฯ(Xs ) dWs .
b(Xs , Us ) ds +
Xt = X0 +
0
0
The third term on the right-hand side of (3.2) is an Itoฬ stochastic integral.
We say that a process X = {Xt (ฯ)} is a solution of (3.1), if it is Ft -adapted,
continuous in t, defined for all ฯ โ โฆ and t โ [0, โ), and satisfies (3.2) for
all t โ [0, โ) a.s. It is well known that under (A1)โ(A3), for any admissible
control there exists a unique solution of (3.1) [1], Theorem 2.2.4.
We define the family of operators Lu : C 2 (Rd ) โ C(Rd ), where u โ U plays
the role of a parameter, by
(3.3)
Lu f (x) := 12 aij (x)โij f (x) + bi (x, u)โi f (x),
u โ U.
We refer to Lu as the controlled extended generator of the diffusion. In
โ
(3.3) and elsewhere in this paper, we have adopted the notation โi := โx
i
2
and โij := โxโi โxj . We also use the standard summation rule that repeated
subscripts and superscripts are summed from 1 through d. In other words,
the right-hand side of (3.3) stands for
d
d
X
1 X ij
โf
โ2f
bi (x, u)
a (x)
(x) +
(x).
2
โxi โxj
โxi
i=1
i,j=1
Of fundamental importance in the study of functionals of X is Itoฬโs formula. For f โ C 2 (Rd ) and with Lu as defined in (3.3), it holds that
Z t
LUs f (Xs ) ds + Mt ,
(3.4)
a.s.,
f (Xt ) = f (X0 ) +
0
where
Mt :=
Z
0
t
hโf (Xs ), ฯ(Xs ) dWs i
16
A. ARAPOSTATHIS, A. BISWAS AND G. PANG
is a local martingale. Krylovโs extension of Itoฬโs formula [27], page 122,
d
extends (3.4) to functions f in the local Sobolev space W2,p
loc (R ), p โฅ d.
Recall that a control is called Markov if Ut = v(t, Xt ) for a measurable map
v : R+ ร Rd โ U, and it is called stationary Markov if v does not depend on
t, that is, v : Rd โ U. Correspondingly, (3.1) is said to have a strong solution
if given a Wiener process (Wt , Ft ) on a complete probability space (โฆ, F, P),
there exists a process X on (โฆ, F, P), with X0 = x0 โ Rd , which is continuous,
Ft -adapted, and satisfies (3.2) for all t a.s. A strong solution is called unique,
if any two such solutions X and X โฒ agree P-a.s., when viewed as elements of
C([0, โ), Rd ). It is well known that under assumptions (A1)โ(A3), for any
Markov control v, (3.1) has a unique strong solution [20].
Let USM denote the set of stationary Markov controls. Under v โ USM , the
process X is strong Markov, and we denote its transition function by Pvt (x, ยท).
It also follows from the work of [8, 31] that under v โ USM , the transition
probabilities of X have densities which are locally Hoฬlder continuous. Thus,
Lv defined by
Lv f (x) := 12 aij (x)โij f (x) + bi (x, v(x))โi f (x),
v โ USM ,
for f โ C 2 (Rd ), is the generator of a strongly-continuous semi-group on
Cb (Rd ), which is strong Feller. We let Pvx denote the probability measure
and Evx the expectation operator on the canonical space of the process under the control v โ USM , conditioned on the process X starting from x โ Rd
at t = 0.
We need the following definition.
Definition 3.1. A function h : Rd ร U โ R is called inf-compact on a
set A โ Rd if the set Aฬ โฉ {x : minuโU h(x, u) โค ฮฒ} is compact (or empty) in
Rd for all ฮฒ โ R. When this property holds for A โก Rd , then we simply say
that h is inf-compact.
Recall that control v โ USM is called stable if the associated diffusion
is positive recurrent. We denote the set of such controls by USSM , and let
ยตv denote the unique invariant probability measure on Rd for the diffusion
under the control v โ USSM . We also let M := {ยตv : v โ USSM }. Recall that
v โ USSM if and only if there exists an inf-compact function V โ C 2 (Rd ), a
bounded domain D โ Rd , and a constant ฮต > 0 satisfying
Lv V(x) โค โฮต
โx โ D c .
We denote by ฯ (A) the first exit time of a process {Xt , t โ R+ } from a set
A โ Rd , defined by
ฯ (A) := inf{t > 0 : Xt โ
/ A}.
ERGODIC CONTROL IN THE HALFINโWHITT REGIME
17
The open ball of radius R in Rd , centered at the origin, is denoted by BR ,
c ).
and we let ฯR := ฯ (BR ), and ฯฬR := ฯ (BR
We assume that the running cost function r(x, u) is nonnegative, continuous and locally Lipschitz in its first argument uniformly in u โ U. Without
loss of generality, we let ฮบR be a Lipschitz constant of r(ยท, u) over BR . In
summary, we assume that
(A4) r : Rd รU โ R+ is continuous and satisfies, for some constant CR > 0
|r(x, u) โ r(y, u)| โค CR |x โ y|
โx, y โ BR , โu โ U,
and all R > 0.
In general, U may not be a convex set. It is therefore often useful to
enlarge the control set to P(U). For any v(du) โ P(U) we can redefine the
drift and the running cost as
Z
Z
(3.5)
bฬ(x, v) := b(x, u)v(du) and rฬ(x, v) := r(x, u)v(du).
U
U
It is easy to see that the drift and running cost defined in (3.5) satisfy all
the aforementioned conditions (A1)โ(A4). In what follows, we assume that
all the controls take values in P(U). These controls are generally referred to
as relaxed controls. We endow the set of relaxed stationary Markov controls
with the following topology: vn โ v in USM if and only if
Z
Z
Z
Z
f (x) g(x, u)v(du|x) dx
f (x) g(x, u)vn (du|x) dx โโ
Rd
nโโ Rd
U
L1 (Rd )
L2 (Rd )
U
(Rd
for all f โ
โฉ
and g โ Cb
ร U). Then USM is a compact
metric space under this topology [1], Section 2.4. We refer to this topology
as the topology of Markov controls. A control is said to be precise if it takes
value in U. It is easy to see that any precise control Ut can also be understood
as a relaxed control by Ut (du) = ฮดUt . Abusing the notation, we denote the
drift and running cost by b and r, respectively, and the action of a relaxed
control on them is understood as in (3.5).
3.2. Structural assumptions. Assumptions 3.1 and 3.2, described below,
are in effect throughout the analysis, unless otherwise stated.
Assumption 3.1.
For some open set K โ Rd , the following hold:
(i) The running cost r is inf-compact on K.
(ii) There exist inf-compact functions V โ C 2 (Rd ) and h โ C(Rd ร U), such
that
(3.6)
Lu V(x) โค 1 โ h(x, u)
โ(x, u) โ Kc ร U,
Lu V(x) โค 1 + r(x, u)
โ(x, u) โ K ร U.
18
A. ARAPOSTATHIS, A. BISWAS AND G. PANG
Without loss of generality, we assume that V and h are nonnegative.
Remark 3.1. In the statement of Assumption 3.1, we refrain from using
any constants in the interest of notational economy. There is no loss of
generality in doing so, since the functions V and h can always be scaled to
eliminate unnecessary constants.
The next assumption is not a structural one, but rather the necessary requirement that the value of the ergodic control problem is finite. Otherwise,
the problem is vacuous. For U โ U, define
Z T
1 U
ฬบU (x) := lim sup Ex
(3.7)
r(Xs , Us ) ds .
T โโ T
0
Assumption 3.2.
x โ Rd .
There exists U โ U such that ฬบU (x) < โ for some
Assumption 3.2 alone does not imply that ฬบv < โ for some v โ USSM .
However, when combined with Assumption 3.1, this is the case as the following lemma asserts.
Lemma 3.1. Let Assumptions 3.1 and 3.2 hold. Then there exists u0 โ
USSM such that ฬบu0 < โ. Moreover, there exists a nonnegative inf-compact
function V0 โ C 2 (Rd ), and a positive constant ฮท such that
(3.8)
Lu0 V0 (x) โค ฮท โ r(x, u0 (x))
โx โ Rd .
Conversely, if (3.8) holds, then Assumption 3.2 holds.
Proof. The first part of the result follows from Theorem 3.1(e) and
(3.23) whereas the converse part follows from Lemma 3.2. These proofs are
stated later in the paper.
Remark 3.2. There is no loss of generality in using only the constant
ฮท in Assumption 3.2, since V0 can always be scaled to achieve this.
We also observe that for K = Rd the problem reduces to an ergodic control problem with near-monotone cost, and for K = โ
we obtain an ergodic
control problem under a uniformly stable controlled diffusion.
3.3. Piecewise linear controlled diffusions. The controlled diffusion process in (2.12) belongs to a large class of controlled diffusion processes, called
piecewise linear controlled diffusions [14]. We describe this class of controlled
diffusions and show that it satisfies the assumptions in Section 3.2.
ERGODIC CONTROL IN THE HALFINโWHITT REGIME
19
Definition 3.2. A square matrix R is said to be an M -matrix if it can
be written as R = sI โ N for some s > 0 and nonnegative matrix N with
property that ฯ(N ) โค s, where ฯ(N ) denotes the spectral radius of N .
Let ฮ = [ฮณ ij ] be a given matrix whose diagonal elements are positive,
= 0 for i = 1, . . . , d โ 1, and the remaining elements are in R. (Note that
for the queueing model, ฮ is a positive diagonal matrix. Our results below
hold for the more general ฮ.) Let โ โ Rd and R be a nonsingular M -matrix.
Define
ฮณ id
(3.9)
b(x, u) := โ โ R(x โ (e ยท x)+ u) โ (e ยท x)+ ฮu,
with u โ S := {u โ Rd+ : e ยท u = 1}. Assume that
eT R โฅ 0T .
We consider the following controlled diffusion in Rd :
(3.10)
dXt = b(Xt , Ut ) dt + ฮฃ dWt,
where ฮฃ is a constant matrix such that ฮฃฮฃT is invertible. It is easy to see
that (3.10) satisfies conditions (A1)โ(A3).
Analysis of these types of diffusion approximations is an established tradition in queueing systems. It is often easy to deal with the limiting object and
it also helps to obtain information on the behavior of the actual queueing
model.
We next introduce the running cost function. Let r : Rd ร S โ [0, โ) be
locally Lipschitz with polynomial growth and
(3.11)
c1 [(e ยท x)+ ]m โค r(x, u) โค c2 (1 + [(e ยท x)+ ]m ),
for some m โฅ 1 and positive constants c1 and c2 that do not depend on u.
Some typical examples of such running costs are
+ m
r(x, u) = [(e ยท x) ]
d
X
i=1
hi um
i
with m โฅ 1,
for some positive vector (h1 , . . . , hd )T .
Remark 3.3. The controlled dynamics in (3.9) and running cost in
(3.11) are clearly more general than the model described in Section 2.2. In
(3.10), X denotes the diffusion approximation for the number customers in
the system in the HalfinโWhitt regime and its ith component X i denotes
the diffusion approximation of the number of class i customers. Therefore,
(e ยท X)+ denotes the total number of customers in the queue. For R and
ฮ diagonal as in (2.13), the diagonal entries of R and ฮ denote the service
20
A. ARAPOSTATHIS, A. BISWAS AND G. PANG
and abandonment rates, respectively, of the customer classes. The ith coordinate of U denotes the fraction of class-i customers waiting in the queue.
Therefore, the vector-valued process Xt โ (e ยท Xt )+ Ut denotes the diffusion
approximation of the numbers of customers in service from different customer classes.
Proposition 3.1. Let b and r be given by (3.9) and (3.11), respectively.
Then (3.10) satisfies Assumptions 3.1 and 3.2, with h(x) = c0 |x|m and
(3.12)
K := {x : ฮด|x| < (e ยท x)+ }
for appropriate positive constants c0 and ฮด.
Proof. We recall that if R is a nonsingular M -matrix, then there exists
a positive definite matrix Q such that QR + RT Q is strictly positive definite
[14]. Therefore, for some positive constant ฮบ0 it holds that
2
ฮบ0 |y|2 โค y T [QR + RT Q]y โค ฮบโ1
0 |y|
โy โ Rd .
The set K in (3.12), where ฮด > 0 is chosen later, is an open convex cone,
and the running cost function r is inf-compact on K. Let V be a nonnegative function in C 2 (Rd ) such that V(x) = [xT Qx]m/2 for |x| โฅ 1, where the
constant m is as in (3.11).
Let |x| โฅ 1 and u โ S. Then
m[xT Qx]m/2โ1 T
x [QR + RT Q]x
2
+ m[xT Qx]m/2โ1 Qx ยท (R โ ฮ)(e ยท x)+ u
m/2โ1 ฮบ0
T
2
+
โค โ ยท โV(x) โ m[x Qx]
|x| โ C|x|(e ยท x)
2
โV(x) ยท b(x, u) = โ ยท โV(x) โ
ฮบ0
, then on Kc โฉ {|x| โฅ 1}
for some positive constant C. If we choose ฮด = 4C
we have the estimate
mฮบ0 T
(3.13)
[x Qx]m/2โ1 |x|2 .
โV(x) ยท b(x, u) โค โ ยท โV(x) โ
4
Note that โ ยท V is globally bounded for m = 1. For any m โ (1, โ), it follows
by (3.13) that
mฮบ0 T
โV(x) ยท b(x, u) โค m(โT Qx)[xT Qx]m/2โ1 โ
[x Qx]m/2โ1 |x|2
4
(3.14)
m/2
T
mฮบ0 (ฮป(Q))m/2 m
m|โ Q|(ฮป(Q))
|x|mโ1 โ
|x|
โค
ฮป(Q)
4ฮป(Q)
for x โ Kc โฉ {|x| โฅ 1}, where ฮป(Q) and ฮป(Q) are the smallest and largest
eigenvalues of Q, respectively. We use Youngโs inequality
|a|m m โ 1 m/(mโ1)
+
|b|
,
a, b โฅ 0,
|ab| โค
m
m
ERGODIC CONTROL IN THE HALFINโWHITT REGIME
21
in (3.14) to obtain the bound
(3.15)
โV(x) ยท b(x, u) โค ฮบ1 โ
mฮบ0
(ฮป(Q))m/2 |x|m
8ฮป(Q)
for some constant ฮบ1 > 0. A similar calculation shows for some constant
ฮบ2 > 0 it holds that
(3.16)
โV(x) ยท b(x, u) โค ฮบ2 (1 + [(e ยท x)+ ]m )
โx โ K โฉ {|x| โฅ 1}.
Also note that we can select ฮบ3 > 0 large enough such that
(3.17)
1
mฮบ0
|trace(ฮฃฮฃT โ2 V(x))| โค ฮบ3 +
(ฮป(Q))m/2 |x|m .
2
16ฮป(Q)
Hence, by (3.13)โ(3.17) there exists ฮบ4 > 0 such that
mฮบ0
(ฮป(Q))m/2 |x|m IKc (x) + ฮบ2 [(e ยท x)+ ]m IK (x)
(3.18) Lu V(x) โค ฮบ4 โ
16ฮป(Q)
for all x โ Rd . It is evident that we can scale V, by multiplying it with a
constant, so that (3.18) takes the form
(3.19) Lu V(x) โค 1 โ c0 |x|m IKc (x) + c1 [(e ยท x)+ ]m IK (x)
โx โ Rd .
By (3.11), the running cost r is inf-compact on K. It then follows from (3.11)
and (3.19) that (3.6) is satisfied with h(x) := c0 |x|m .
We next show that (3.10) satisfies Assumption 3.2. Let
u0 (ยท) โก ed = (0, . . . , 0, 1)T .
Then we can write (3.10) as
(3.20)
dXt = (โ โ R(Xt โ (e ยท Xt )+ u0 ) โ (e ยท x)+ ฮu0 ) dt + ฮฃ dWt.
It is shown in [14] that the solution Xt in (3.20) is positive recurrent and,
therefore, u0 is a stable Markov control. This is done by finding a suitable
Lyapunov function. In particular, in [14], Theorem 3, it is shown that there
exists a positive definite matrix Qฬ such that if we define
(3.21)
ฯ(x) := (e ยท x)2 + ฮบฬ[x โ ed ฯ(e ยท x)]T Qฬ[x โ ed ฯ(e ยท x)],
for some suitably chosen constant ฮบฬ and
๏ฃฑ
๏ฃฒ y,
ฯ(y) = โ 21 ฮดฬ,
๏ฃณ
smooth,
a function ฯ โ C 2 (R), given by
if y โฅ 0,
if y โค โฮดฬ,
if โ ฮดฬ < y < 0,
where ฮดฬ > 0 is a suitable constant and 0 โค ฯโฒ (y) โค 1, then it holds that
(3.22)
Lu0 ฯ(x) โค โฮบฬ1 |x|2 ,
22
A. ARAPOSTATHIS, A. BISWAS AND G. PANG
for |x| large enough and positive constant ฮบฬ1 . We define V0 := eaฯ where a
is to be determined later. Note that |โฯ(x)| โค ฮบฬ2 (1 + |x|) for some constant
ฮบฬ2 > 0. Hence, a straightforward calculation shows that if we choose a small
enough, then for some constant ฮบฬ3 > 0 it holds that
Lu0 V0 (x) โค (โฮบฬ1 a|x|2 + a2 kฮฃk2 ฮบฬ2 (1 + |x|)2 )V0 (x)
โค โฮบฬ3 |x|2 V0 (x),
for all |x| large enough. Since V0 (x) > [(e ยท x)+ ]m , m โฅ 1, for all large enough
|x| we see that V0 satisfies (3.8) with control u0 . Hence, Assumption 3.2
holds by Lemma 3.1.
3.4. Existence of optimal controls.
Definition 3.3.
Recall the definition of ฬบU in (3.7). For ฮฒ > 0, we define
Uฮฒ := {U โ U : ฬบU (x) โค ฮฒ for some x โ Rd }.
We also let UฮฒSM := Uฮฒ โฉ USM , and
ฬบหโ := inf{ฮฒ > 0 : Uฮฒ 6= โ
},
ฬบโ := inf{ฮฒ > 0 : UฮฒSM 6= โ
},
ฬบหโ := inf{ฯ(r) : ฯ โ G},
where
Z
d
G := ฯ โ P(R ร U) :
Rd รU
u
L f (x)ฯ(dx, du) = 0 โf
โ Ccโ (Rd )
,
and Lu f (x) is given by (3.3). It is well known that G is the set of ergodic
occupation measures of the controlled process in (3.1), and that G is a closed
and convex subset of P(Rd ร U) [1], Lemmas 3.2.2 and 3.2.3. We use the
notation ฯv when we want to indicate the ergodic occupation measure associated with the control v โ USSM . In other words,
ฯv (dx, du) := ยตv (dx)v(du|x).
Lemma 3.2. If (3.8) holds for some V0 and u0 , then we have ฯu0 (r) โค ฮท.
Therefore, ฬบหโ < โ.
Proof. Let (Xt , u0 (Xt )) be the solution of (3.1). Recall that ฯR is the
first exit time from BR for R > 0. Then by Itoฬโs formula
Z T โงฯR
u0
u0
Ex [V0 (XT โงฯR )] โ V0 (x) โค ฮทT โ Ex
r(Xs , u0 (Xs )) ds .
0
ERGODIC CONTROL IN THE HALFINโWHITT REGIME
23
Therefore, letting R โ โ and using Fatouโs lemma, we obtain the bound
Z T
u0
Ex
r(Xs , u0 (Xs )) ds โค ฮทT + V0 (x) โ min V0 ,
Rd
0
and thus
1
lim sup Eux0
T โโ T
Z
T
0
r(Xs , u0 (Xs )) ds โค ฮท.
In the analysis, we use a function hฬ โ C(Rd ร U) which, roughly speaking,
is of the same order as r in K ร U and lies between r and a multiple of r + h
on Kc ร U, with K as in Assumption 3.1. The existence of such a function
is guaranteed by Assumption 3.1 as the following lemma shows.
Lemma 3.3.
Define
H := (K ร U) โช {(x, u) โ Rd ร U : r(x, u) > h(x, u)},
where K is the open set in Assumption 3.1. Then there exists an inf-compact
function hฬ โ C(Rd ร U) which is locally Lipschitz in its first argument uniformly w.r.t. its second argument, and satisfies
(3.23) r(x, u) โค hฬ(x, u) โค
k0
(1 + h(x, u)IHc (x, u) + r(x, u)IH (x, u))
2
for all (x, u) โ Rd ร U, and for some positive constant k0 โฅ 2. Moreover,
(3.24)
Lu V(x) โค 1 โ h(x, u)IHc (x, u) + r(x, u)IH (x, u)
for all (x, u) โ Rd ร U, where V is the function in Assumption 3.1.
Proof. If f (x, u) denotes the right-hand side of (3.23), with k0 = 4,
then
f (x, u) โ r(x, u) > h(x, u)IHc (x, u) + r(x, u)IH (x, u)
โฅ h(x, u)IKc (x) + r(x, u)IK (x),
since r(x, u) > h(x, u) on H \ (K ร U). Therefore, by Assumption 3.1, the
set {(x, u) : f (x, u) โ r(x, u) โค n} is bounded in Rd ร U for every n โ N.
Hence, there exists an increasing sequence of open balls Dn , n = 1, 2, . . . ,
centered at 0 in Rd such that f (x, u) โ r(x, u) โฅ n for all (x, u) โ Dnc ร U. Let
g : Rd โ R be any nonnegative smooth function such that n โ 1 โค g(x) โค n
for x โ Dn+1 \ Dn , n = 1, 2, . . . , and g(x) = 0 on D1 . Clearly, hฬ := r + g is
continuous, inf-compact, locally Lipschitz in its first argument, and satisfies
(3.23). That (3.24) holds is clear from (3.6) and the fact that H โ K ร U.
24
A. ARAPOSTATHIS, A. BISWAS AND G. PANG
Remark 3.4. It is clear from the proof of Lemma 3.3 that we could
fix the value of the constant k0 in (3.23), say k0 = 4. However, we keep the
variable k0 because this provides some flexibility in the choice of hฬ, and also
in order to be able to trace it along the different calculations.
Remark 3.5. Note that if h โฅ r and r is inf-compact, then H = K ร U
and hฬ := r satisfies (3.23). Note also, that in view of (3.11) and Proposition 3.1, for the multi-class queueing model we have
r(x, u) โค c2 (1 + [(e ยท x)+ ]m )
c2 dmโ1
(1 + (1 โง c0 )|x|m )
1 โง c0
c2 dmโ1
1
+ m
m c
โค
1 + c0 |x| IK (x) + m [(e ยท x) ] IK (x)
1 โง c0
ฮด
mโ1
1
c2 d
r(x, u)IK (x)
1 + h(x)IKc (x) +
โค
1 โง c0
c1 ฮดm
โค
โค
โค
c2 dmโ1
(1 + h(x)IKc (x) + r(x, u)IK (x))
1 โง c0 โง c1 ฮดm
c2 dmโ1
(1 + h(x)IHc (x, u) + r(x, u)IH (x, u)).
1 โง c0 โง c1 ฮดm
Therefore, hฬ(x, u) := c2 + c2 dmโ1 |x|m satisfies (3.23).
Remark 3.6. We often use the fact that if g โ C(Rd ร U) is bounded
below, then the map P(Rd ร U) โ ฮฝ 7โ ฮฝ(g) is lower semi-continuous. This
easily follows from two facts: (a) g can be expressed as an increasing limit
of bounded continuous functions, and (b) if g is bounded and continuous,
then ฯ 7โ ฯ(g) is continuous.
Theorem 3.1.
Let ฮฒ โ (ห
ฬบโ , โ). Then:
(a) For all U โ Uฮฒ and x โ Rd such that ฬบU (x) โค ฮฒ, then
Z T
1 U
lim sup Ex
(3.25)
hฬ(Xs , Us ) ds โค k0 (1 + ฮฒ).
tโโ T
0
(b) ฬบหโ = ฬบโ = ฬบหโ .
(c) For any ฮฒ โ (ฬบโ , โ), we have UฮฒSM โ USSM .
(d) The set of invariant probability measures Mฮฒ corresponding to controls in UฮฒSM satisfies
Z
hฬ(x, v(x))ยตv (dx) โค k0 (1 + ฮฒ)
โยตv โ Mฮฒ .
Rd
ERGODIC CONTROL IN THE HALFINโWHITT REGIME
25
In particular, UฮฒSM is tight in P(Rd ).
(e) There exists (Vฬ , ฬบห) โ C 2 (Rd ) ร R+ , with Vฬ inf-compact, such that
(3.26)
min[Lu Vฬ (x) + hฬ(x, u)] = ฬบห.
uโU
Proof. Using Itoฬโs formula, it follows by (3.24) that
(3.27)
1 U
(E [V(XT โงฯR )] โ V(x))
T x
Z T โงฯR
1 U
h(Xs , Us )IHc (Xs , Us ) ds
โค 1 โ Ex
T
0
Z T โงฯR
1 U
+ Ex
r(Xs , Us )IH (Xs , Us ) ds .
T
0
Since V is inf-compact, (3.27) together with (3.23) implies that
Z T
1 U
2
lim sup E
hฬ(Xs , Us ) ds
k0 T โโ T x 0
(3.28)
Z T
1 U
โค 2 + 2 lim sup Ex
r(Xs , Us ) ds .
T โโ T
0
Part (a) then follows from (3.28).
Now fix U โ Uฮฒ and x โ Rd such that ฬบU (x) โค ฮฒ. The inequality in (3.25)
U : t โฅ 1}, defined by
implies that the set of mean empirical measures {ฮถx,t
Z t
1 U
U
IAรB (Xs , Us ) ds
ฮถx,t(A ร B) := Ex
t
0
for any Borel sets A โ Rd and B โ U, is tight. It is the case that any limit
point of the mean empirical measures in P(Rd ร U) is an ergodic occupation
measure [1], Lemma 3.4.6. Then in view of Remark 3.6 we obtain
(3.29)
U
ฯ(r) โค lim sup ฮถx,t
(r) โค ฮฒ
tโโ
for some ergodic occupation measure ฯ. Therefore, ฬบหโ โค ฬบหโ . Disintegrating
the measure ฯ as ฯ(dx, du) = v(du|x)ยตv (dx), we obtain the associated control v โ USSM . From ergodic theory [33], we also know that
Z T
1
lim sup Evx
r(Xs , v(Xs )) ds = ฯv (r)
for almost every x.
T โโ T
0
It follows that ฬบโ โค ฬบหโ , and since it is clear that ฬบหโ โค ฬบโ , equality must hold
among the three quantities.
If v โ UฮฒSM , then (3.28) implies that (3.29) holds with U โก v and ฯ โก ฯv .
Therefore, parts (c) and (d) follow.
26
A. ARAPOSTATHIS, A. BISWAS AND G. PANG
Existence of (Vฬ , ฬบห), satisfying (3.26), follows from Assumption 3.2 and
[1], Theorem 3.6.6. The inf-compactness of Vฬ follows from the stochastic
representation of Vฬ in [1], Lemma 3.6.9. This proves (e).
Existence of a stationary Markov control that is optimal is asserted by
the following theorem.
Theorem 3.2. Let G denote the set of ergodic occupation measures corresponding to controls in USSM , and Gฮฒ those corresponding to controls in
UฮฒSM , for ฮฒ > ฬบโ . Then:
(a) The set Gฮฒ is compact in P(Rd ) for any ฮฒ > ฬบโ .
(b) There exists v โ USM such that ฬบv = ฬบโ .
Proof. By Theorem 3.1(d), the set Gฮฒ is tight for any ฮฒ > ฬบโ . Let
{ฯn } โ Gฮฒ , for some ฮฒ > ฬบโ , be any convergent sequence in P(Rd ) such that
ฯn (r) โ ฬบโ as n โ โ and denote its limit by ฯโ . Since G is closed, ฯโ โ G, and
since the map ฯ โ ฯ(r) is lower semi-continuous, it follows that ฯโ (r) โค ฬบโ .
Therefore, Gฮฒ is closed, and hence compact. Since ฯ(r) โฅ ฬบโ for all ฯ โ G,
the equality ฯโ (r) = ฬบโ follows. Also v is obtained by disintegrating ฯโ .
Remark 3.7. The reader might have noticed at this point that Assumption 3.1 may be weakened significantly. What is really required is the
existence of an open set Hฬ โ Rd ร U and inf-compact functions V โ C 2 (Rd )
and h โ C(Rd ร U), satisfying
(H1) inf {u : (x,u)โHฬ} r(x, u) โโ โ.
(H2)
|x|โโ
u
L V(x) โค 1 โ h(x, u)IHฬc (x, u) + r(x, u)IHฬ (x, u)
โ(x, u) โ Rd ร U.
In (H1), we use the convention that the โinfโ of the empty set is +โ. Also
note that (H1) is equivalent to the statement that {(x, u) : r(x, u) โค c} โฉ Hฬ is
bounded in Rd ร U for all c โ R+ . If (H1)โ(H2) are met, we define H := Hฬ โช
{(x, u) โ Rd ร U : r(x, u) > h(x, u)}, and following the proof of Lemma 3.3, we
assert the existence of an inf-compact hฬ โ C(Rd ร U) satisfying (3.23). In fact,
throughout the rest of the paper, Assumption 3.1 is not really invoked. We
only use (3.24), the inf-compact function hฬ satisfying (3.23), and, naturally,
Assumption 3.2.
3.5. The HJB equation. For ฮต > 0, let
rฮต (x, u) := r(x, u) + ฮตhฬ(x, u).
By Theorem 3.1(d), for any ฯ โ Gฮฒ , ฮฒ > ฬบโ , we have the bound
(3.30)
ฯ(rฮต ) โค ฮฒ + ฮตk0 (1 + ฮฒ).
ERGODIC CONTROL IN THE HALFINโWHITT REGIME
27
Therefore, since rฮต is near-monotone, that is,
lim inf min rฮต (x, u) > inf ฯ(rฮต ),
|x|โโ uโU
ฯโG
there exists ฯฮต โ arg minฯโG ฯ(rฮต ). Let ฯโ โ G be as in the proof of Theorem 3.2. The sub-optimality of ฯโ relative to the running cost rฮต and (3.30)
imply that
ฯฮต (r) โค ฯฮต (rฮต )
(3.31)
โค ฯโ (rฮต )
โค ฬบโ + ฮตk0 (1 + ฬบโ )
โฮต > 0.
It follows from (3.31) and Theorem 3.1(d) that {ฯฮต : ฮต โ (0, 1)} is tight. Since
ฯฮต 7โ ฯฮต (r) is lower semi-continuous, if ฯฬ is any limit point of ฯฮต as ฮต ึ 0,
then taking limits in (3.31), we obtain
(3.32)
ฯฬ(r) โค lim sup ฯฮต (r) โค ฬบโ .
ฮตึ0
Since G is closed, ฯฬ โ G, which implies that ฯฬ(r) โฅ ฬบโ . Therefore, equality
must hold in (3.32), or in other words, ฯฬ is an optimal ergodic occupation
measure.
Theorem 3.3. There exists a unique function V ฮต โ C 2 (Rd ) with V ฮต (0) =
0, which is bounded below in Rd , and solves the HJB
(3.33)
min[Lu V ฮต (x) + rฮต (x, u)] = ฬบฮต ,
uโU
where ฬบฮต := inf ฯโG ฯ(rฮต ), or in other words, ฬบฮต is the optimal value of the
ergodic control problem with running cost rฮต . Also a stationary Markov control vฮต is optimal for the ergodic control problem relative to rฮต if and only if
it satisfies
(3.34) Hฮต (x, โV ฮต (x)) = b(x, vฮต (x)) ยท โV ฮต (x) + rฮต (x, vฮต (x))
where
(3.35)
Hฮต (x, p) := min[b(x, u) ยท p + rฮต (x, u)].
uโU
Moreover:
(a) for every R > 0, there exists kR such that
(3.36)
osc V ฮต โค kR ;
BR
a.e. in Rd ,
28
A. ARAPOSTATHIS, A. BISWAS AND G. PANG
(b) if vฮต is a measurable a.e. selector from the minimizer of the Hamiltonian in (3.35), that is, if it satisfies (3.33), then for any ฮด > 0,
Z ฯฬฮด
V ฮต (x) โฅ Evxฮต
(rฮต (Xs , vฮต (Xs )) โ ฬบฮต ) ds + inf V ฮต ;
Bฮด
0
(c) for any stationary control v โ USSM and for any ฮด > 0,
Z ฯฬฮด
ฮต
v
ฮต
V (x) โค Ex
(rฮต (Xs , v(Xs )) โ ฬบฮต ) ds + V (Xฯฬฮด ) ,
0
where ฯฬฮด is hitting time to the ball Bฮด .
Theorem 3.4.
following hold:
Let V ฮต , ฬบฮต , and vฮต , for ฮต > 0, be as in Theorem 3.3. The
(a) The function V ฮต converges to some Vโ โ C 2 (Rd ), uniformly on compact sets, and ฬบฮต โ ฬบโ , as ฮต ึ 0, and Vโ satisfies
min[Lu Vโ (x) + r(x, u)] = ฬบโ .
(3.37)
uโU
Also, any limit point vโ (in the topology of Markov controls) as ฮต ึ 0 of the
set {vฮต } satisfies
Lvโ Vโ (x) + r(x, vโ (x)) = ฬบโ
a.e. in Rd .
(b) A stationary Markov control v is optimal for the ergodic control problem relative to r if and only if it satisfies
a.e. in Rd ,
(3.38) H(x, โVโ (x)) = b(x, v(x)) ยท โVโ (x) + r(x, v(x))
where
H(x, p) := min[b(x, u) ยท p + r(x, u)].
uโU
Moreover, for an optimal v โ USM , we have
Z T
1 v
r(Xs , v(Xs )) ds = ฬบโ
lim Ex
T โโ T
0
โx โ Rd .
(c) The function Vโ has the stochastic representation
Z ฯฬฮด
v
Ex
Vโ (x) = lim S inf
(r(Xs , v(Xs )) โ ฬบโ ) ds
ฮดึ0 vโ
(3.39)
= lim
ฮดึ0
Evฬx
ฮฒ
ฮฒ>0 USM
Z
0
ฯฬฮด
0
(r(Xs , vโ (Xs )) โ ฬบโ ) ds
for any vฬ โ USM that satisfies (3.38).
ERGODIC CONTROL IN THE HALFINโWHITT REGIME
29
(d) If U is a convex set, u 7โ {b(x, u) ยท p + r(x, u)} is strictly convex whenever it is not constant, and u 7โ hฬ(x, u) is strictly convex for all x, then any
measurable minimizer of (3.33) converges pointwise, and thus in USM , to the
minimizer of (3.37).
Theorem 3.4 guarantees the existence of an optimal stable control, which
is made precise by (3.38), for the ergodic diffusion control problem with the
running cost function r. Moreover, under the convexity property in part (d),
the optimal stable control can be obtained as a pointwise limit from the
minimizing selector of (3.33). For instance, if we let
+
r(x, u) = (e ยท x)
d
X
hi um
i ,
m > 1,
i=1
then by choosing h and hฬ + |u|2 as in Proposition 3.1, we see that the
approximate value function V ฮต and approximate control vฮต converge to the
desired optimal value function Vโ and optimal control vโ , respectively.
Concerning the uniqueness of the solution to the HJB equation in (3.37),
recall that in the near-monotone case the existing uniqueness results are as
follows: there exists a unique solution pair (V, ฬบ) of (3.37) with V in the class
of functions C 2 (Rd ) which are bounded below in Rd . Moreover, it satisfies
V (0) = 0 and ฬบ โค ฬบโ . If the restriction ฬบ โค ฬบโ is removed, then in general,
there are multiple solutions. Since in our model r is not near-monotone in
Rd , the function Vโ is not, in general, bounded below. However, as we show
later in Lemma 3.10 the negative part of Vโ grows slower than V, that is,
it holds that Vโโ โ o(V), with o(ยท) as defined in Section 1.3. Therefore, the
second part of the theorem that follows may be viewed as an extension of the
well-known uniqueness results that apply to ergodic control problems with
near-monotone running cost. The third part of the theorem resembles the
hypotheses of uniqueness that apply to problems under a blanket stability
hypothesis.
Theorem 3.5.
(3.40)
Let (Vฬ , ฬบห) be a solution of
min[Lu Vฬ (x) + r(x, u)] = ฬบห,
uโU
such that Vฬ โ โ o(V) and Vฬ (0) = 0. Then the following hold:
(a) Any measurable selector vฬ from the minimizer of the associated Hamiltonian in (3.38) is in USSM and ฬบvฬ < โ.
(b) If ฬบห โค ฬบโ then necessarily ฬบห = ฬบโ and Vฬ = Vโ .
(c) If Vฬ โ O(minuโU hฬ(ยท, u)), then ฬบห = ฬบโ and Vฬ = Vโ .
30
A. ARAPOSTATHIS, A. BISWAS AND G. PANG
Applying these results to the multi-class queueing diffusion model, we
have the following corollary.
Corollary 3.1. For the queueing diffusion model with controlled dynamics given by (3.10), drift given by (3.9), and running cost as in (3.11),
there exists a unique solution V , satisfying V (0) = 0, to the associated HJB
in the class of functions C 2 (Rd ) โฉ O(|x|m ), whose negative part is in o(|x|m ).
This solution agrees with Vโ in Theorem 3.4.
Proof. Existence of a solution V follows by Theorem 3.4. Select V โผ
|x|m as in the proof of Proposition 3.1. That the solution V is in the stated
class then follows by Lemma 3.10 and Corollary 4.1 that appear later in
Sections 3.6 and 4, respectively. With h โผ |x|m as in the proof of Proposition 3.1, it follows that minuโU hฬ(x, u) โ O(|x|m ). Therefore, uniqueness
follows by Theorem 3.5.
We can also obtain the HJB equation in (3.37) via the traditional vanishing discount approach as the following theorem asserts. Similar results
are shown for a one-dimensional degenerate ergodic diffusion control problem in [29] and certain multi-dimensional ergodic diffusion control problems
(allowing degeneracy and spatial periodicity) in [2].
Theorem 3.6.
Let Vโ and ฬบโ be as in Theorem 3.4. For ฮฑ > 0, we define
Z โ
โฮฑt
U
e r(Xt , Ut ) dt .
Vฮฑ (x) := inf Ex
U โU
0
The function Vฮฑ โ Vฮฑ (0) converges, as ฮฑ ึ 0, to Vโ , uniformly on compact
subsets of Rd . Moreover, ฮฑVฮฑ (0) โ ฬบโ , as ฮฑ ึ 0.
The proofs of the Theorems 3.3โ3.6 are given in Section 3.6. The following
result, which follows directly from (3.31), provides a way to find ฮต-optimal
controls.
Proposition 3.2. Let {vฮต } be the minimizing selector from Theorem 3.3
and {ยตvฮต } be the corresponding invariant probability measures. Then almost
surely for all x โ Rd ,
Z
Z T
1 vฮต
lim Ex
r(x, vฮต (x))ยตvฮต (dx)
r(Xs , vฮต (Xs )) ds =
T โโ T
Rd
0
โค ฬบโ + ฮตk0 (1 + ฬบโ ).
ERGODIC CONTROL IN THE HALFINโWHITT REGIME
31
3.6. Technical proofs. Recall that rฮต (x, u) = r(x, u) + ฮตhฬ(x, u), with hฬ as
in Lemma 3.3. We need the following lemma.
For ฮฑ > 0 and ฮต โฅ 0, we define
Z โ
ฮต
U
โฮฑt
Vฮฑ (x) := inf Ex
(3.41)
e rฮต (Xt , Ut ) dt ,
U โU
0
where we set r0 โก r. Clearly, when ฮต = 0, we have Vฮฑ0 โก Vฮฑ .
We quote the following result from [1], Theorem 3.5.6, Remark 3.5.8.
Lemma 3.4. Provided ฮต > 0, then Vฮฑฮต defined above is in C 2 (Rd ) and is
the minimal nonnegative solution of
min[Lu Vฮฑฮต (x) + rฮต (x, u)] = ฮฑVฮฑฮต (x).
uโU
The HJB in Lemma 3.4 is similar to the equation in [7], Theorem 3, which
concerns the characterization of the discounted control problem.
Lemma 3.5. Let u be any precise Markov control and Lu be the corresponding generator. Let ฯ โ C 2 (Rd ) be a nonnegative solution of
Lu ฯ โ ฮฑฯ = g,
d
where g โ Lโ
loc (R ). Let ฮบ : R+ โ R+ be any nondecreasing function such that
kgkLโ (BR ) โค ฮบ(R) for all R > 0. Then for any R > 0 there exists a constant
D(R) which depends on ฮบ(4R), but not on u, or ฯ, such that
osc ฯ โค D(R) 1 + ฮฑ inf ฯ .
BR
B4R
Proof. Define gฬ := ฮฑ(g โ 2ฮบ(4R)) and ฯฬ := 2ฮบ(4R) + ฮฑฯ. Then gฬ โค 0
in B4R and ฯฬ solves
Lu ฯฬ โ ฮฑฯฬ = gฬ
in B4R .
Also
kgฬkLโ (B4R ) โค ฮฑ(2ฮบ(4R) + kgkLโ (B4R ) )
โค 3ฮฑ(2ฮบ(4R) โ kgkLโ (B4R ) )
= 3 inf |gฬ|
B4R
โค 3|B4R |โ1 kgฬkL1 (B4R ) .
Hence by [1], Theorem A.2.13, there exists a positive constant CฬH such that
sup ฯฬ(x) โค CฬH inf ฯฬ(x),
xโB3R
xโB3R
32
A. ARAPOSTATHIS, A. BISWAS AND G. PANG
implying that
ฮฑ sup ฯ(x) โค CฬH 2ฮบ(4R) + inf ฮฑฯ(x) .
(3.42)
xโB3R
xโB3R
We next consider the solution of
Lu ฯ = 0
in B3R ,
ฯ=ฯ
on โB3R .
Then
Lu (ฯ โ ฯ) = ฮฑฯ + g
in B3R .
If ฯ(xฬ) = inf xโB3R ฯ(x), then applying the maximum principle ([1], Theorem A.2.1, [18]) it follows from (3.42) that
sup |ฯ โ ฯ| โค Cฬ(1 + ฮฑฯ(xฬ)).
(3.43)
xโB3R
Again ฯ attains its minimum at the boundary ([1], Theorem A.2.3, [18]).
Therefore, ฯ โ ฯ(xฬ) is a nonnegative function, and hence by the Harnack
inequality, there exists a constant CH > 0 such that
ฯ(x) โ ฯ(xฬ) โค CH (ฯ(xฬ) โ ฯ(xฬ)) โค CH Cฬ(1 + ฮฑฯ(xฬ))
โx โ B2R .
Thus, combining the above display with (3.43) we obtain
osc ฯ โค sup(ฯ โ ฯ) + sup ฯ โ ฯ(xฬ) โค Cฬ(1 + CH )(1 + ฮฑฯ(xฬ)).
B2R
B2R
B2R
This completes the proof.
Lemma 3.6. Let Vฮฑฮต be as in Lemma 3.4. Then for any R > 0, there
exists a constant kR > 0 such that
osc Vฮฑฮต โค kR
for all ฮฑ โ (0, 1] and ฮต โ [0, 1].
BR
Proof. Recall that ยตu0 is the stationary probability distribution for the
process under the control u0 โ USSM in Lemma 3.1. Since u0 is sub-optimal
for the ฮฑ-discounted criterion in (3.41), and Vฮฑฮต is nonnegative, then for any
ball BR , using Fubiniโs theorem, we obtain
Z
ฮต
Vฮฑฮต (x)ยตu0 (dx)
ยตu0 (BR ) inf Vฮฑ โค
BR
Rd
โค
Z
Rd
Eux0
Z
โ
0
โฮฑt
e
rฮต (Xt , u0 (Xt )) dt ยตu0 (dx)
1
ยตu (rฮต )
ฮฑ 0
1
โค (ฮท + ฮตk0 (1 + ฮท)),
ฮฑ
=
ERGODIC CONTROL IN THE HALFINโWHITT REGIME
33
where for the last inequality we used Lemma 3.2 and Theorem 3.1(a).
Therefore, we have the estimate
ฮฑ inf Vฮฑฮต โค
BR
ฮท + ฮตk0 (1 + ฮท)
.
ยตu0 (BR )
The result then follows by Lemma 3.5.
We continue with the proof of Theorem 3.3.
Proof of Theorem 3.3. Consider the function Vฬฮฑฮต := Vฮฑฮต โ Vฮฑฮต (0). In
view of Lemma 3.5 and Lemma 3.6, we see that Vฬฮฑฮต is locally bounded uniformly in ฮฑ โ (0, 1] and ฮต โ (0, 1]. Therefore, by standard elliptic theory, Vฬฮฑฮต
and its first- and second-order partial derivatives are uniformly bounded in
Lp (B), for any p > 1, in any bounded ball B โ Rd , that is, for some constant
CB depending on B and p, kVฬฮฑฮต kW2,p (B) โค CB ([18], Theorem 9.11, page 117).
Therefore, we can extract a subsequence along which Vฬฮฑฮต converges. Then
the result follows from Theorems 3.6.6, Lemma 3.6.9 and Theorem 3.6.10 in
[1]. The proof of (3.36) follows from Lemma 3.5 and Lemma 3.6.
Remark 3.8. In the proof of the following lemma, and elsewhere in the
paper, we use the fact that if U โ USSM is a any set of controls such that
the corresponding set {ยตv : v โ U } โ M of invariant probability measures is
tight then the map v 7โ ฯv from the closure of U to P(Rd ร U) is continuous,
and so is the map v 7โ ยตv . In fact, the latter is continuous under the total
variation norm topology [1], Lemma 3.2.6. We also recall that G and M are
closed and convex subsets of P(Rd ร U) and P(Rd ). Therefore,{ฯv : v โ Uฬ } is
compact in G. Note also that since U is compact, tightness of a set of invariant
probability measures is equivalent to tightness of the corresponding set of
ergodic occupation measures.
Lemma 3.7. If {vฮต : ฮต โ (0, 1]} is a collection of measurable selectors from
the minimizer of (3.33), then the corresponding invariant probability measures {ยตฮต : ฮต โ (0, 1]} are tight. Moreover, if vฮตn โ vโ along some subsequence
ฮตn ึ 0, then the following hold:
(a) ยตฮตn โ ยตvโ as ฮตn ึ 0,
(b) Rvโ is a stable Markov control,
(c) Rd r(x, vโ (x))ยตvโ (dx) = limฮตึ0 ฬบฮต = ฬบโ .
Proof. By (3.25) and (3.31), the set of ergodic occupation measures
corresponding to {vฮต : ฮต โ (0, 1]} is tight. By Remark 3.8, the same applies
to the set {ยตฮต : ฮต โ (0, 1]}, and also part (a) holds. Part (b) follows from
the equivalence of the existence of an invariant probability measure for a
34
A. ARAPOSTATHIS, A. BISWAS AND G. PANG
controlled diffusion and the stability of the associated stationary Markov
control (see [1], Theorem 2.6.10). Part (c) then follows since equality holds
in (3.32).
We continue with the following lemma that asserts the continuity of the
mean hitting time of a ball with respect to the stable Markov controls.
Lemma 3.8. Let {vn : n โ N} โ UฮฒSM , for some ฮฒ > 0, be a collection
of Markov controls such that vn โ vฬ in the topology of Markov controls as
n โ โ. Let ยตn , ยตฬ be the invariant probability measures corresponding to the
controls vn , vฬ, respectively. Then for any ฮด > 0, it holds that
Evxn [ฯฬฮด ] โโ Evฬx [ฯฬฮด ]
โx โ Bฮดc .
nโโ
Proof. Define H(x) := minuโU hฬ(x, u). It is easy to see that H is infcompact and locally Lipschitz. Therefore, by Theorem 3.1(d) we have
sup ยตn (H) โค k0 (1 + ฮฒ),
nโN
and since ยตn โ ยตฬ, we also have ยตฬ(H) โค k0 (1 + ฮฒ). Then by [1], Lemma 3.3.4,
we obtain
Z ฯฬฮด
Z ฯฬฮด
sup Evxn
H(Xs ) ds + Evฬx
(3.44)
H(Xs ) ds < โ.
nโN
0
0
Let R be a positive number greater than |x|. Then by (3.44), there exists a
positive k such that
Z ฯฬฮด
Z ฯฬฮด
1
k
Evx
I{H>R} (Xs ) ds โค Evx
H(Xs )I{H>R} (Xs ) ds โค
R
R
0
0
for v โ {{vn }, vฬ}. From this assertion and (3.44), we see that
Z ฯฬฮด
v
sup Ex
I{H>R} (Xs ) ds โโ 0.
vโ{{vn },vฬ}
Rโโ
0
Therefore, in order to prove the lemma it is enough to show that, for any
R > 0, we have
Z ฯฬฮด
Z ฯฬฮด
vn
vฬ
Ex
I{HโคR} (Xs ) ds โโ Ex
I{HโคR} (Xs ) ds .
0
nโโ
0
But this follows from [1], Lemma 2.6.13(iii).
ERGODIC CONTROL IN THE HALFINโWHITT REGIME
35
Lemma 3.9. Let (V ฮต , ฬบฮต ) be as in Theorem 3.3, and vฮต satisfy (3.35).
There exists a subsequence ฮตn ึ 0, such that V ฮตn converges to some Vโ โ
C 2 (Rd ), uniformly on compact sets, and Vโ satisfies
min[Lu Vโ (x) + r(x, u)] = ฬบโ .
(3.45)
uโU
Also, any limit point vโ (in the topology of Markov controls) of the set {vฮต },
as ฮต ึ 0, satisfies
(3.46)
Lvโ Vโ (x) + r(x, vโ (x)) = ฬบโ
a.e. in Rd .
Moreover, Vโ admits the stochastic representation
Z ฯฬฮด
v
Vโ (x) = S inf
Ex
(r(Xs , v(Xs )) โ ฬบโ ) ds + Vโ (Xฯฬฮด )
vโ
(3.47)
= Evxโ
ฮฒ
ฮฒ>0 USM
Z
0
ฯฬฮด
0
(r(Xs , vโ (Xs )) โ ฬบโ ) ds + Vโ (Xฯฬฮด ) .
It follows that Vโ is the unique limit point of V ฮต as ฮต ึ 0.
Proof. From (3.36), we see that the family {V ฮต : ฮต โ (0, 1]} is uniformly
locally bounded. Hence, applying the theory of elliptic PDE, it follows that
d
{V ฮต : ฮต โ (0, 1]} is uniformly bounded in W2,p
loc (R ) for p > d. Consequently,
1,ฮณ
ฮต
{V : ฮต โ (0, 1]} is uniformly bounded in Cloc for some ฮณ > 0. Therefore, along
some subsequence ฮตn ึ 0, V ฮตn โ Vโ โ W2,p โฉ C 1,ฮณ , as n โ โ, uniformly on
compact sets. Also, limฮตึ0 ฬบฮต = ฬบโ by Lemma 3.6(c). Therefore, passing to
the limit we obtain the HJB equation in (3.45). It is straightforward to verify
that (3.46) holds [1], Lemma 2.4.3.
By Theorem 3.3(c), taking limits as ฮต ึ 0, we obtain
Z ฯฬฮด
Evx
(3.48) Vโ (x) โค S inf
(r(Xs , v(Xs )) โ ฬบโ ) ds + Vโ (Xฯฬฮด ) .
vโ
ฮฒ
ฮฒ>0 USM
0
Also by Theorem 3.3(b) we have the bound
V ฮต (x) โฅ โฬบฮต Evxฮต [ฯฬฮด ] + inf V ฮต .
Bฮด
Using Lemma 3.8 and taking limits as ฮตn ึ 0, we obtain the lower bound
(3.49)
Vโ (x) โฅ โฬบโ Evxโ [ฯฬฮด ] + inf Vโ .
Bฮด
By Lemma 3.7(c) and Theorem 3.1(d), vโ โ USSM , and ฯvโ (hฬ) โค k0 (1 + ฬบโ ).
Define
Z ฯฬฮด
vโ
ฯ(x) := Ex
(3.50)
hฬ(Xs , vโ (Xs )) ds .
0
36
A. ARAPOSTATHIS, A. BISWAS AND G. PANG
For |x| > ฮด, we have
Evxโ [I{ฯR <ฯฬฮด } ฯ(XฯR )] = Evxโ
I{ฯR <ฯฬฮด }
Z
ฯฬฮด
ฯR โงฯฬฮด
hฬ(Xs , vโ (Xs )) ds .
Therefore, by the dominated convergence theorem and the fact that ฯ(x) <
โ we obtain
Evxโ [ฯ(XฯR )I{ฯR <ฯฬฮด } ] โโ 0.
Rึโ
By (3.48) and (3.49), we have |Vโ | โ O(ฯ). Thus (3.49) and (3.50) imply that
lim inf Evxโ [Vโ (XฯR )I{ฯR <ฯฬฮด } ] = 0,
Rึโ
and thus
lim inf Evxโ [Vโ (XฯR โงฯฬฮด )] = Evxโ [Vโ (Xฯฬฮด )].
(3.51)
Rึโ
Applying Itoฬโs formula to (3.46), we obtain
Z ฯฬฮด โงฯR
vโ
(3.52) Vโ (x) = Ex
(r(Xs , vโ (Xs )) โ ฬบโ ) ds + Vโ (Xฯฬฮด โงฯR ) .
0
Taking limits as R โ โ, and using the dominated convergence theorem, we
obtain (3.47) from (3.48).
Recall the definition of o(ยท) from Section 1.3. We need the following
lemma.
Lemma 3.10.
Let Vโ be as in Lemma 3.9. It holds that Vโโ โ o(V).
Proof. Let vโ be as in Lemma 3.9. Applying Itoฬโs formula to (3.24)
with u โก vโ we obtain
Z ฯฬฮด
vโ
Ex
h(Xs , vโ (Xs ))IHc (Xs , vโ (Xs )) ds
(3.53)
0
โค Evxโ
Z
ฯฬฮด
0
r(Xs , vโ (Xs ))IH (Xs , vโ (Xs )) ds + Evxโ [ฯฬฮด ] + V(x).
Therefore, adding the term
Z ฯฬฮด
vโ
Ex
r(Xs , vโ (Xs ))IH (Xs , vโ (Xs )) ds โ (1 + 2ฬบโ )Evxโ [ฯฬฮด ]
0
ERGODIC CONTROL IN THE HALFINโWHITT REGIME
37
to both sides of (3.53) and using the stochastic representation of Vโ we
obtain
Z ฯฬฮด
โ1 vโ
F (x) := 2k0 Ex
hฬ(Xs , vโ (Xs )) ds โ 2(1 + ฬบโ )Evxโ [ฯฬฮด ]
(3.54)
0
โค 2Vโ (x) + V(x) โ 2 inf Vโ .
Bฮด
From the stochastic representation of Vโ we have Vโโ (x) โค ฬบโ Evxโ [ฯฬฮด ]โinf Bฮด Vโ .
For any R > ฮด, we have
Z ฯฬฮด
vโ
c
(3.55) Ex
hฬ
Ex [ฯฬR ]
โx โ BR
.
hฬ(Xs , vโ (Xs )) ds โฅ inf
c
BR รU
0
It is also straightforward to show that lim|x|โโ EExx[ฯฬ[ฯฬRฮด ]] = 1. Therefore, since
hฬ is inf-compact, it follows by (3.54) and (3.55) that the map x 7โ Evxโ [ฯฬฮด ]
is in o(F ), which implies that Vโโ โ o(F ). On the other hand, by (3.54) we
obtain F (x) โค V(x) โ 2 supBฮด Vโ for all x such that Vโ (x) โค 0, which implies
that the restriction of F to the support of Vโโ is in O(V). It follows that
Vโโ โ o(V).
We next prove Theorem 3.4.
Proof of Theorem 3.4. Part (a) is contained in Lemma 3.9.
To prove part (b), let vฬ be any control satisfying (3.38). By Lemma 3.10
the map V + 2Vโ is inf-compact and by Theorem 3.4 and (3.24) it satisfies
Lvฬ (V + 2Vโ )(x) โค 1 + 2ฬบโ โ r(x, vฬ(x)) โ h(x, vฬ(x))IHc (x, vฬ(x))
โค 2 + 2ฬบโ โ 2k0โ1 hฬ(x, vฬ(x))
โx โ Rd .
This implies that vฬ โ USSM . Applying Itoฬโs formula, we obtain
Z T
1 vฬ
lim sup Ex
(3.56)
hฬ(Xs , vฬ(Xs )) ds โค k0 (1 + ฬบโ ).
T โโ T
0
Therefore, ฯvฬ (hฬ) < โ. By (3.24), we have
Z t
vฬ
vฬ
Ex [V(Xt )] โค V(x) + t + Ex
r(Xs , vฬ(Xs )) ds ,
0
and since r โค hฬ, this implies by (3.56) that
1
(3.57)
lim sup Evฬx [V(XT )] โค 1 + k0 (1 + ฬบโ ).
T โโ T
Since Vโโ โ o(V), it follows by (3.57) that
1
lim sup Evฬx [Vโโ (XT )] = 0.
T โโ T
38
A. ARAPOSTATHIS, A. BISWAS AND G. PANG
Therefore, by Itoฬโs formula, we deduce from (3.37) that
Z T
1 vฬ
(3.58)
r(Xs , vฬ(Xs )) ds โค ฬบโ .
lim sup Ex
T โโ T
0
On the other hand, since the only limit point of the mean empirical measures
vฬ , as t โ โ, is ฯ , and ฯ (r) = ฬบ , then in view of Remark 3.6, we obtain
ฮถx,t
vฬ
vฬ
โ
vฬ (r) โฅ ฬบ . This proves that equality holds in (3.58) and that
lim inf tโโ ฮถx,t
โ
the โlim supโ may be replaced with โlim.โ
Conversely, suppose v โ USM is optimal but does not satisfy (3.38). Then
there exists R > 0 and a nontrivial nonnegative f โ Lโ (BR ) such that
fฮต (x) := IBR (x)(Lv V ฮต (x) + rฮต (x, v(x)) โ ฬบฮต )
converges to f , weakly in L1 (BR ), along some subsequence ฮต ึ 0. By applying Itoฬโs formula to (3.33), we obtain
Z T โงฯR
1 v
1 v ฮต
ฮต
(E [V (XT โงฯR )] โ V (x)) + Ex
rฮต (Xs , v(Xs )) ds
T x
T
0
(3.59)
Z T โงฯR
1 v
fฮต (Xs , v(Xs )) ds .
โฅ ฬบฮต + Ex
T
0
Define, for some ฮด > 0,
G(x) := Evx
Z
0
ฯฬฮด
rฮต (Xs , v(Xs )) ds .
Since V is bounded from below, by Theorem 3.3(c) we have V ฮต โ O(G).
Invoking [1], Corollary 3.7.3, we obtain
ฮต
1 v ฮต
Ex [V (XT )] = 0,
T โโ T
lim
and
lim Evx [V ฮต (XT โงฯR )] = Evx [V ฮต (XT )].
Rโโ
Therefore, taking limits in (3.59), first as R ึ โ, and then as T โ โ, we
obtain
(3.60)
ฯv (rฮต ) โฅ ฬบฮต + ฯv (fฮต ).
Taking limits as ฮต ึ 0 in (3.60), since ยตv has a strictly positive density in
BR , we obtain
ฯv (r) โฅ ฬบโ + ฯv (f ) > ฬบโ ,
which is a contradiction. This completes the proof of part (b).
ERGODIC CONTROL IN THE HALFINโWHITT REGIME
39
The first equality (3.39) follows by Lemma 3.9, taking limits as ฮด ึ 0.
To show that the second equality holds for any optimal control, suppose vฬ
satisfies (3.38). By (3.24) we have, for ฮด > 0 and |x| > ฮด,
Z ฯR โงฯฬฮด
(1 + r(Xs , vฬ(Xs ))) ds .
Evฬx [V(XฯR )I{ฯR <ฯฬฮด } ] โค V(x) + sup V โ + Evฬx
Bฮด
0
It follows that (see [1], Lemma 3.3.4)
lim sup Evฬx [V(XฯR )I{ฯR <ฯฬฮด } ] < โ,
Rโโ
and since Vโโ โ o(V) we must have
lim sup Evฬx [Vโโ (XฯR )I{ฯR <ฯฬฮด } ] = 0.
Rโโ
By the first equality in (3.47), we obtain Vโ+ โ O(ฯ), with ฯ as defined in
(3.50) with vโ replaced by vฬ. Thus, in analogy to (3.51), we obtain
lim inf Evฬx [Vโ (XฯR โงฯฬฮด )] = Evฬx [Vโ (Xฯฬฮด )].
Rึโ
The rest follows as in the proof of Lemma 3.9 via (3.52).
We next prove part (d). We assume that U is a convex set and that
c(x, u, p) := {b(x, u) ยท p + r(x, u)}
is strictly convex in u if it is not identically a constant for fixed x and p. We
fix some point uฬ โ U. Define
B := {x โ Rd : c(x, ยท, p) = c(x, uฬ, p) for all p}.
It is easy to see that on B both b and r do not depend on u. It is also easy
to check that B is a closed set. Let (Vโ , vโ ) be the limit of (V ฮต , vฮต ), where
Vโ is the solution to (3.37) and vโ is the corresponding limit of vฮต . We have
already shown that vโ is a stable Markov control. We next show that it
is, in fact, a precise Markov control. By our assumption, vฮต is the unique
minimizing selector in (3.34) and, moreover, vฮต is continuous in x. By the
definition of rฮต it is clear that the restriction of vฮต to B does not depend on
ฮต. Let vฮต (x) = v โฒ (x) on B. Using the strict convexity property of c(x, ยท, โVโ )
it is easy to verify that vฮต converges to the unique minimizer of (3.37) on
B c . In fact, since B c is open, then for any sequence xฮต โ x โ B c it holds that
vฮต (xฮต ) โ vโ (x). This follows from the definition of the minimizer and the
uniform convergence of โV ฮต to โVโ . Therefore, we see that vโ is a precise
Markov control, vโ = v โฒ on B, and vฮต โ vโ pointwise as ฮต โ 0. It is also easy
to check that pointwise convergence implies convergence in the topology of
Markov controls.
We now embark on the proof of Theorem 3.5.
40
A. ARAPOSTATHIS, A. BISWAS AND G. PANG
Proof of Theorem 3.5. The hypothesis that Vฬ โ โ o(V) implies that
the map V + 2Vฬ is inf-compact. Also by (3.24) and (3.40), it satisfies
Lvฬ (V + 2Vฬ )(x) โค 1 + 2ห
ฬบ โ r(x, vฬ(x)) โ h(x, vฬ(x))IHc (x, vฬ(x))
โค 2 + 2ห
ฬบ โ 2k0โ1 hฬ(x, vฬ(x))
โx โ Rd .
R
Therefore, hฬ(x, vฬ(x)) dฯvฬ < โ from which it follows that ฬบvฬ < โ. This
proves part (a).
By (3.24), we have
Z t
vฬ
vฬ
r(Xs , vฬ(Xs )) ds ,
Ex [V(Xt )] โค V(x) + t + Ex
0
and since ฬบvฬ < โ, this implies that
1
lim sup Evฬx [V(XT )] โค 1 + ฬบvฬ .
(3.61)
T โโ T
Since Vฬ โ โ o(V), it follows by (3.61) that
lim sup
T โโ
1 vฬ โ
E [Vฬ (XT )] = 0.
T x
Therefore, by Itoฬโs formula, we deduce from (3.40) that
Z T
1 vฬ
1 vฬ +
E [Vฬ (XT )] + Ex
r(Xs , vฬ(Xs )) ds = ฬบห.
lim sup
T x
T
T โโ
0
This implies that ฬบvฬ โค ฬบห and since by hypothesis ฬบห โค ฬบโ we must have ฬบห = ฬบโ .
Again by (3.24), we have
Z ฯR โงฯฬฮด
vฬ
โ
vฬ
Ex [V(XฯR )I{ฯR <ฯฬฮด } ] โค V(x) + sup V + Ex
(1 + r(Xs , vฬ(Xs ))) ds .
Bฮด
0
It follows by [1], Lemma 3.3.4, that
lim sup Evฬx [V(XฯR )I{ฯR <ฯฬฮด } ] < โ,
Rโโ
and since Vฬ โ โ o(V) we must have
(3.62)
lim sup Evฬx [Vฬ โ (XฯR )I{ฯR <ฯฬฮด } ] = 0.
Rโโ
Using (3.62) and following the steps in the proof of the second equality in
(3.47), we obtain
Z ฯฬฮด
vฬ
Vฬ (x) โฅ Ex
(r(Xs , vฬ(Xs )) โ ฬบโ ) ds + inf Vฬ
Bฮด
0
โฅ Vโ (x) โ sup Vโ + inf Vฬ .
Bฮด
Bฮด
41
ERGODIC CONTROL IN THE HALFINโWHITT REGIME
Taking limits as ฮด ึ 0, we have Vโ โค Vฬ . Since Lvฬ (Vโ โ Vฬ ) โฅ 0 and Vโ (0) =
Vฬ (0), we must have Vฬ = Vโ on Rd , and the proof of part (b) is complete.
R To prove part (c) note that by part (a) we haveR ฬบvฬ < โ. Therefore,
hฬ dฯvฬ โค โ by Theorem 3.1(a), which implies that |Vฬ | dยตvฬ โค โ by the
hypothesis. Therefore, Evฬx (|Vฬ (Xt )|) converges as t โ โ by [23], Proposition 2.6, which of course implies that 1t Evฬx (|Vฬ (Xt )|) tends to 0 as t โ โ.
Similarly, we deduce that 1t Evxโ (|Vฬ (Xt )|) as t โ โ. Applying Itoฬโs formula
to (3.40), with u โก vโ , we obtain ฬบห โค ฬบโ . Another application with u โก vฬ
results in ฬบห = ฬบvฬ . Therefore, ฬบห = ฬบโ . The result then follows by part (b).
We finish this section with the proof of Theorem 3.6.
Proof of Theorem 3.6. We first show that limฮฑึ0 ฮฑVฮฑ (0) = ฬบโ . Let
Vฬ(t, x) := eโฮฑt V(x), and ฯn (t) := ฯn โง t. Applying Itoฬโs formula to (3.24), we
obtain
Z ฯn (t)
U
U
Ex [Vฬ(ฯn (t), Xฯn (t) )] โค V(x) โ Ex
ฮฑVฬ(s, Xs ) ds
0
It follows that
Z
U
Ex
(3.63)
ฯn (t)
โฮฑs
e
0
โค
+ EU
x
Z
+ EU
x
Z
ฯn (t)
โฮฑs
e
0
ฯn (t)
โฮฑs
e
0
(1 โ h(Xs , Us ))IHc (Xs , Us ) ds
(1 + r(Xs , Us ))IH (Xs , Us ) ds .
h(Xs , Us )IHc (Xs , Us ) ds
1
+ V(x) + EU
x
ฮฑ
Z
ฯn (t)
0
eโฮฑs r(Xs , Us )IH (Xs , Us ) ds .
Taking limits first as n ึ โ and then as t ึ โ in (3.63), and evaluating U
at an optimal ฮฑ-discounted control vฮฑโ , relative to r we obtain the estimate,
using also (3.23),
Z โ
2
โ
eโฮฑs hฬ(Xs , vฮฑโ (Xs )) ds โค + V(x) + 2Vฮฑ (x).
(3.64) 2k0โ1 Exvฮฑ
ฮฑ
0
By (3.23) and (3.64), it follows that
Z
โ
ฮต
vฮฑ
Vฮฑ (x) โค Vฮฑ (x) โค Ex
0
โ
โฮฑs
e
rฮต (Xs , vฮฑโ (Xs )) ds
โค Vฮฑ (x) + ฮตk0 (ฮฑโ1 + V(x) + Vฮฑ (x)).
42
A. ARAPOSTATHIS, A. BISWAS AND G. PANG
Multiplying by ฮฑ and taking limits as ฮฑ ึ 0 we obtain
lim sup ฮฑVฮฑ (0) โค ฬบฮต โค (1 + ฮตk0 ) lim sup ฮฑVฮฑ (0) + ฮตk0 .
ฮฑึ0
ฮฑึ0
The same inequalities hold for the โlim inf.โ Therefore, limฮฑึ0 ฮฑVฮฑ (0) = ฬบโ .
Let
Vฬ := lim (Vฮฑ โ Vฮฑ (0)).
ฮฑึ0
(Note that a similar result as Lemma 3.5 holds.) Then Vฬ satisfies
Z ฯฬฮด
[ ฮฒ
v
Vฬ (x) โค lim Ex
(r(Xs , v(Xs )) โ ฬบโ ) ds
โv โ
USM .
ฮดึ0
0
ฮฒ>0
This can be obtained without the near-monotone assumption on the running
cost; see, for example, [1], Lemma 3.6.9 or Lemma 3.7.8. It follows from
(3.39) that Vฬ โค Vโ . On the other hand, since Lvโ (Vฬ โ Vโ ) โฅ 0, and Vฬ (0) =
Vโ (0), we must have Vฬ = Vโ by the strong maximum principle.
4. Approximation via spatial truncations. We introduce an approximation technique which is in turn used to prove the asymptotic convergence
results in Section 5.
Let v0 โ USSM be any control such that ฯv0 (r) < โ. We fix the control v0
on the complement of the ball Bฬl and leave the parameter u free inside. In
other words, for each l โ N we define
b(x, u),
if (x, u) โ Bฬl ร U,
bl (x, u) :=
b(x, v0 (x)),
otherwise,
r(x, u),
if (x, u) โ Bฬl ร U,
rl (x, u) :=
r(x, v0 (x)),
otherwise.
We consider the family of controlled diffusions, parameterized by l โ N, given
by
(4.1)
dXt = bl (Xt , Ut ) dt + ฯ(Xt ) dWt ,
with associated running costs rl (x, u). We denote by USM (l, v0 ) the subset of USM consisting of those controls v which agree with v0 on Bฬlc . Let
ฮท0 := ฯv0 (r). It is well known that there exists a nonnegative solution ฯ0 โ
d
W2,p
loc (R ), for any p > d, to the Poisson equation (see [1], Lemma 3.7.8(ii))
Lv0 ฯ0 (x) = ฮท0 โ hฬ(x, v0 (x))
x โ Rd ,
which is inf-compact, and satisfies, for all ฮด > 0,
Z ฯฬฮด
v0
ฯ0 (x) = Ex
(hฬ(Xs , v0 (Xs )) โ ฮท0 ) ds + ฯ0 (Xฯฬฮด )
0
โx โ Rd .
ERGODIC CONTROL IN THE HALFINโWHITT REGIME
43
We recall the Lyapunov function V from Assumption 3.1. We have the
following theorem.
Theorem 4.1. Let Assumptions 3.1 and 3.2 hold. Then for each l โ N
d
l
there exists a solution V l in W2,p
loc (R ), for any p > d, with V (0) = 0, of the
HJB equation
min[Lul V l (x) + rl (x, u)] = ฬบl ,
(4.2)
uโU
Lul
where
is the elliptic differential operator corresponding to the diffusion
in (4.1). Moreover, the following hold:
(i)
(ii)
2ฯ0 (x)
(iii)
(iv)
ฬบl is nonincreasing in l;
there exists a constant C0 , independent of l, such that V l (x) โค C0 +
for all l โ N;
(V l )โ โ o(V + ฯ0 ) uniformly over l โ N;
the restriction of V l on Bl is in C 2 .
Proof. As earlier, we can show that
Z โ
l
U
โฮฑs
Vฮฑ (x) := inf Ex
e
rl (Xs , Us ) ds
U โU
0
is the minimal nonnegative solution to
(4.3)
min[Lul Vฮฑl (x) + rl (x, u)] = ฮฑVฮฑl (x),
uโU
d
and Vฮฑl โ W2,p
loc (R ), p > d. Moreover, any measurable selector from the minimizer in (4.3) is an optimal control. A similar estimate as in Lemma 3.5 holds
and, therefore, there exists a subsequence {ฮฑn }, along which Vฮฑl n (x) โ Vฮฑl n (0)
d
l
converges to V l in W2,p
loc (R ), p > d, and ฮฑn Vฮฑn (0) โ ฬบl as ฮฑn ึ 0, and
(V l , ฬบl ) satisfies (4.2) (see also [1], Lemma 3.7.8).
To show that ฯvl (r) = ฬบl , v l is a minimizing selector in (4.2), we use the
following argument. Since ฯv0 (r) < โ, we claim that there exists a nonnegative, inf-compact function g โ C(Rd ) such that ฯv0 (g ยท (1 + r)) < โ. Indeed,
this is true since integrability and uniform integrability of a function under
any given measure are equivalent (see also the proof of [1], Lemma 3.7.2).
Since every control in USM (l, v0 ) agrees with v0 on Blc , then for any x0 โ Bฬlc
the map
Z ฯฬl
v
v 7โ Ex0
g(Xs )(1 + r(Xs , v(Xs ))) ds
0
is constant on USM (l, v0 ). By the equivalence of (i) and (iii) in Lemma 3.3.4
of [1], this implies that
sup
vโUSM (l,v0 )
ฯv (g ยท (1 + r)) < โ
โl โ N,
44
A. ARAPOSTATHIS, A. BISWAS AND G. PANG
and thus r is uniformly integrable with respect to the family {ฯv :
v โ USM (l, v0 )} for any l โ N. It then follows by [1], Theorem 3.7.11, that
(4.4)
ฬบl =
inf
vโUSM (l,v0 )
ฯv (r),
l โ N.
This yields part (i). Moreover, in view of Lemmas 3.5 and 3.6, we deduce
that for any ฮด > 0 it holds that supBฮด |V l | โค ฮบฮด , where ฮบฮด is a constant
independent of l โ N. It is also evident by (4.4) that ฬบl is decreasing in l and
ฬบl โค ฮท0 for all l โ N. Fix ฮด such that minuโU hฬ(x, u) โฅ 2ฮท0 on Bฮดc . Since ฯ0 is
nonnegative, we obtain
Z ฯฬฮด
v0
(4.5)
โx โ Rd .
(hฬ(Xs , v0 (Xs )) โ ฮท0 ) ds โค ฯ0 (x)
Ex
0
Using an analogous argument as the one used in the proof of [1], Lemma 3.7.8,
we have
Z ฯฬฮด
l
v
(4.6) V (x) โค Ex
(rl (Xs , v(Xs )) โ ฬบl ) ds + ฮบฮด
โv โ USM (l, v0 ).
0
Thus, by (4.5) and (4.6), and since by the choice of ฮด > 0, it holds that
r โค hฬ โค 2(hฬ โ ฮท0 ) on Bฮดc , we obtain
Z ฯฬฮด
V l (x) โค Evx0
2(hฬ(Xs , v0 (Xs )) โ ฮท0 ) ds + ฮบฮด
0
(4.7)
โค ฮบฮด + 2ฯ0 (x)
โx โ Rd .
This proves part (ii).
Now fix l โ N. Let vฮฑl be a minimizing selector of (4.3). Note then that
l
vฮฑ โ USM (l, v0 ). Therefore, vฮฑl is a stable Markov control. Let vฮฑl n โ v l in
the topology of Markov controls along the same subsequence as above. Then
it is evident that v l โ USM (l, v0 ). Also from Lemma 3.8, we have
vl
l
Exฮฑn [ฯฬฮด ] โโ Evx [ฯฬฮด ]
โx โ Bฮดc , โฮด > 0.
ฮฑn ึ0
Using [1], Lemma 3.7.8, we obtain the lower bound
l
V l (x) โฅ โฬบl Evx [ฯฬฮด ] โ ฮบฮด .
(4.8)
By [1], Theorem 3.7.12(i) (see also (3.7.50) in [1]), it holds that
Z ฯฬฮด
l
vl
l
l
V (x) = Ex
(rl (Xs , v (Xs )) โ ฬบl ) ds + V (Xฯฬฮด )
0
(4.9)
โฅ
l
Evx
Z
0
ฯฬฮด
l
l
rl (Xs , v (Xs )) ds โ ฬบl Evx [ฯฬฮด ] โ ฮบฮด
โx โ Blc .
ERGODIC CONTROL IN THE HALFINโWHITT REGIME
45
By (3.23), we have
2k0โ1 hฬ(x, u)IH (x, u) โค 1 + r(x, u)IH (x, u).
Therefore, using the preceding inequality and (4.9), we obtain
l
(4.10)
V l (x) + (1 + ฬบl )Evx [ฯฬฮด ] + ฮบฮด
Z ฯฬฮด
2 vl
l
l
โฅ Ex
hฬ(Xs , v (Xs ))IH (Xs , v (Xs )) ds .
k0
0
By (3.24), (4.9) and the fact that V is nonnegative, we have
Z ฯฬฮด
2 vl
l
Ex
hฬ(Xs , v l (Xs ))IHc (Xs , v l (Xs )) ds โ V(x) โ Evx [ฯฬฮด ]
k0
0
Z ฯฬฮด
vl
l
l
โค Ex
(4.11)
r(Xs , v (Xs ))IH (Xs , v (Xs )) ds
0
l
l
โค V (x) + ฬบl Evx [ฯฬฮด ] + ฮบฮด .
Combining (4.7), (4.10) and (4.11), we obtain
Z ฯฬฮด
l
l
hฬ(Xs , v l (Xs )) ds โค k0 (1 + ฬบl )Evx [ฯฬฮด ]
Evx
0
+
k0
V(x) + 2k0 (ฯ0 (x) + ฮบฮด )
2
for all l โ N. As earlier, using the inf-compact property of hฬ and the fact
that ฬบl โค ฮท0 is bounded, we can choose ฮด large enough such that
Z ฯฬฮด
vl
vl
l
(4.12) ฮท0 Ex [ฯฬฮด ] โค Ex
hฬ(Xs , v (Xs )) ds โค k0 V(x) + 4k0 (ฯ0 (x) + ฮบฮด )
0
for all l โ N. Since hฬ is inf-compact, part (iii) follows by (4.8) and (4.12).
Part (iv) is clear from regularity theory of elliptic PDE [18], Theorem 9.19,
page 243.
Similar to Theorem 3.3, we can show that oscillations of {V l } are uniformly bounded on compacts. Therefore, if we let l โ โ we obtain a HJB
equation
(4.13)
min[Lu Vฬ (x) + r(x, u)] = ฬบห,
uโU
with Vฬ โ C 2 (Rd ) and limlโโ ฬบl = ฬบห. By Theorem 4.1, we have the bound
(4.14)
Vฬ (x) โค C0 + 2ฯ0 (x),
46
A. ARAPOSTATHIS, A. BISWAS AND G. PANG
for some positive constant C0 . This of course, implies that Vฬ + (x) โค C0 +
2ฯ0 (x). Moreover, it is straightforward to show that for any v โ USSM with
ฬบv < โ, we have
1
lim sup Evx [V(Xt )] < โ.
tโโ t
Therefore, if in addition, we have
1
lim sup Evx [ฯ0 (Xt )] < โ,
tโโ t
then it follows by Theorem 4.1(iii) that
(4.15)
1
lim sup Vฬ โ (Xt ) โโ 0.
tโโ
tโโ t
Theorem 4.2. Suppose that ฯ0 โ O(minuโU hฬ(ยท, u)). Then, under the
assumptions of Theorem 4.1, we have limlโโ ฬบl = ฬบห = ฬบโ , and Vฬ = Vโ . Moreover, Vโ โ O(ฯ0 ).
Proof. Let {vฬl } be any sequence of measurable selectors from the minimizer of (4.2) and {ฯl } the corresponding sequence of ergodic occupation
measures. Since by Theorem 3.1 {ฯl } is tight, then by Remark 3.8 if vฬ is
a limit point of a subsequence {vฬl }, which we also denote by {vฬl }, then
ฯฬ = ฯvฬ is the corresponding limit point of {ฯl }. Therefore, by the lower
semi-continuity of ฯ โ ฯ(r) we have
ฬบห = lim ฯl (r) โฅ ฯฬ(r) = ฬบvฬ .
lโโ
It also holds that
(4.16)
Lvฬ Vฬ (x) + r(x, vฬ(x)) = ฬบห,
a.s.
By (4.15), we have
lim inf
T โโ
1 vฬ
E [Vฬ (XT )] = 0,
T x
and hence applying Itoฬโs rule on (4.16) we obtain ฬบvฬ โค ฬบห. On the other hand,
if vโ is an optimal stationary Markov control, then by the hypothesis ฯ0 โ
O(hฬ), the fact that ฯvโ (hฬ) < โ, (4.14) and [23], Proposition 2.6, we deduce
that Evxโ [Vฬ + (Xt )] converges as t โ โ, which of course together with (4.15)
implies that 1t Evฬx [Vฬ (Xt )] tends to 0 as t โ โ. Therefore, evaluating (4.13) at
vโ and applying Itoฬโs rule we obtain ฬบvโ โฅ ฬบห. Combining the two estimates,
we have ฬบvฬ โค ฬบห โค ฬบโ , and thus equality must hold. Here, we have used the
fact that there exists an optimal Markov control for r by Theorem 3.4.
ERGODIC CONTROL IN THE HALFINโWHITT REGIME
Next, we use the stochastic representation in (4.9)
Z ฯฬฮด
l
vฬl
l
(4.17) V (x) = Ex
(r(Xs , vฬl (Xs )) โ ฬบl ) ds + V (Xฯฬฮด ) ,
0
47
x โ Bฮดc .
ฬบv
Fix any x โ Bฮดc . Since USM0 is compact, it follows that for each ฮด and R with
ฬบv
0 < ฮด < R, the map Fฮด,R (v) : USM0 โ R+ defined by
Z ฯฬฮด โงฯR
v
Fฮด,R (v) := Ex
r(Xs , v(Xs )) ds
0
is continuous. Therefore, the map Fฬฮด := limRึโ Fฮด,R is lower semi-continuous.
It follows that
Z ฯฬฮด
Z ฯฬฮด
vฬ
vฬl
r(Xs , vฬ(Xs )) ds โค lim Ex
(4.18) Ex
r(Xs , vฬl (Xs )) ds .
lโโ
0
0
On the other hand, since hฬ is inf-compact, it follows by (4.12) that ฯฬฮด is
uniformly integrable with respect to the measures {Pvฬxl }. Therefore, as also
shown in Lemma 3.8, we have
lim Evฬxl [ฯฬฮด ] = Evฬx [ฯฬฮด ].
(4.19)
lโโ
Since V l โ Vฬ , uniformly on compact sets, and ฬบl โ ฬบโ , as l โ โ, it follows
by (4.17)โ(4.19) that
Z ฯฬฮด
Vฬ (x) โฅ Evฬx
(r(Xs , vฬ(Xs )) โ ฬบโ ) ds + Vฬ (Xฯฬฮด ) ,
x โ Bฮดc .
0
Therefore, by Theorem 3.4(b), for any ฮด > 0 and x โ Bฮดc we obtain
Z ฯฬฮด
vฬ
Vโ (x) โค Ex
(r(Xs , vฬ(Xs )) โ ฬบโ ) ds + Vโ (Xฯฬฮด )
0
โค Vฬ (x) + Evฬx [V โ (Xฯฬฮด )] โ Evฬx [Vฬ (Xฯฬฮด )],
and taking limits as ฮด ึ 0, using the fact that Vฬ (0) = Vโ (0) = 0, we obtain Vโ โค Vฬ on Rd . Since Lvฬ (Vโ โ Vฬ ) โฅ 0, we must have Vโ = Vฬ . By Theorem 4.1(ii), we have Vโ โ O(ฯ0 ).
Remark 4.1. It can be seen from the proof of Theorem 4.2 that the assumption ฯ0 โ O(hฬ) can be replaced by the weaker hypothesis that
1 vโ
T Ex [ฯ0 (XT )] โ 0 as T โ โ.
It is easy to see that if one replaces rl by
๏ฃฑ
1
๏ฃด
๏ฃฒ r(x, u) + f (u),
for x โ Bฬl ,
l
rl (x, u) =
๏ฃด
๏ฃณ r(x, v0 (x)) + 1 f (v0 (x)),
otherwise,
l
Remark 4.2.
48
A. ARAPOSTATHIS, A. BISWAS AND G. PANG
for some positive valued continuous function f , the same conclusion of Theorem 4.2 holds.
If we consider the controlled dynamics given by (3.20), with running cost
as in (3.11), then there exists a function V โผ |x|m satisfying (3.6). This fact
is proved in Proposition 3.1. There also exists a Lyapunov function V0 โ
O(|x|m ), satisfying the assumption in Theorem 4.2, relative to any control
v0 with ฯv0 (hฬ) < โ, where hฬ is selected as in Remark 3.5. Indeed, in order
to construct V0 we recall the function ฯ in (3.21). Let V0 โ C 2 (Rd ) be any
function such that V0 = ฯ m/2 on the complement of the unit ball centered
at the origin. Observe that for some positive constants ฮบ1 and ฮบ2 it holds
that
ฮบ1 |x|2 โค ฯ(x) โค ฮบ2 |x|2 .
Then a straightforward calculation from (3.22) shows that (3.8) holds with
the above choice of V0 . By the stochastic representation of ฯ0 , it follows that
ฯ0 โ O(V0 ). We have proved the following corollary.
Corollary 4.1. For the queueing diffusion model with controlled dynamics given by (3.20), and running cost given by (3.11), there exists a
solution (up to an additive constant) to the associated HJB in the class of
functions in C 2 (Rd ) whose positive part grows no faster than |x|m and whose
negative part is in o(|x|m ).
We conclude this section with the following remark.
Remark 4.3. Comparing the approximation technique introduced in
this section with that in Section 3, we see that the spatial truncation technique relies on more restrictive assumption on the Lyapunov function V0
and the running cost function (Theorem 4.2). In fact, the growth of hฬ also
restricts the growth of r by (3.23). Therefore, the class of ergodic diffusion
control problems considered in this section is more restrictive. For example,
if the running cost r satisfies (3.11) and hฬ โผ |x|m , then it is not obvious that
one can obtain a Lyapunov function V0 with growth at most of order |x|m .
For instance, if the drift has strictly sub-linear growth, then it is expected
that the Lyapunov function should have growth larger than |x|m . Therefore,
the class of problems considered in Section 3 is larger than those considered
in this section.
5. Asymptotic convergence. In this section, we prove that the value of
the ergodic control problem corresponding to the multi-class M/M/N + M
queueing network asymptotically converges to ฬบโ , the value of the ergodic
control for the controlled diffusion.
ERGODIC CONTROL IN THE HALFINโWHITT REGIME
49
Recall the diffusion-scaled processes Xฬ n , Qฬn and Zฬ n defined in (2.4), and
from (2.5) and (2.6) that
Z t
Z t
n
n
n
n
n
n
Xฬi (t) = Xฬi (0) + โi t โ ยตi
Zฬi (s) ds โ ฮณi
Qฬni (s) ds
(5.1)
0
0
n
n
n
+ MฬA,i
(t) โ MฬS,i
(t) โ MฬR,i
(t),
n (t), Mฬ n (t) and Mฬ n (t), i = 1, . . . , d, as defined in (2.6), are
where MฬA,i
S,i
R,i
square integrable martingales w.r.t. the filtration {Ftn } with quadratic variations
ฮปni
t,
n
Z
ยตni t n
n
hMฬS,i i(t) =
Z (s) ds,
n 0 i
Z
ฮณin t n
n
Q (s) ds.
hMฬR,i i(t) =
n 0 i
n
hMฬA,i
i(t) =
5.1. The lower bound. In this section, we prove Theorem 2.1.
Proof of Theorem 2.1. Recall the definition of Vฬ n in (2.10), and
consider a sequence such that supn Vฬ n (Xฬ n (0)) < โ. Let ฯ โ C 2 (Rd ) be any
function satisfying ฯ(x) := |x|m for |x| โฅ 1. As defined in Section 1.3, โX(t)
denotes the jump of the process X at time t. Applying Itoฬโs formula on ฯ
(see, e.g., [24], Theorem 26.7), we obtain from (5.1) that
Z t
ฮn1 (Xฬ1n (s), Zฬ1n (s))ฯโฒ (Xฬ1n (s)) ds
E[ฯ(Xฬ1n (t))] = E[ฯ(Xฬ1n (0))] + E
0
+E
Z
0
+E
t
ฮn2 (Xฬ1n (s), Zฬ1n (s))ฯโฒโฒ (Xฬ1n (s)) ds
X
sโคt
โฯ(Xฬ1n (s)) โ ฯโฒ (Xฬ1n (sโ)) ยท โXฬ1n (s)
1 โฒโฒ n
n
n
โ ฯ (Xฬ (sโ))โXฬ1 (s)โXฬ1 (s) ,
2
where
ฮn1 (x, z) := โn1 โ ยตn1 z โ ฮณ1n (x โ z),
ยตn1 z + ฮณ1n (x โ z)
ฮปn1
1 n
n
โ
+
ยต ฯ1 +
.
ฮ2 (x, z) :=
2 1
n
n
50
A. ARAPOSTATHIS, A. BISWAS AND G. PANG
Since {โn1 } is a bounded sequence, it is easy to show that for all n there exist
positive constants ฮบi , i = 1, 2, independent of n, such that
ฮn1 (x, z)ฯโฒ (x) โค ฮบ1 (1 + |(e ยท x)+ |m ) โ ฮบ2 |x|m ,
ฮบ2
ฮn2 (x, z)ฯโฒโฒ (x) โค ฮบ1 (1 + |(e ยท x)+ |m ) + |x|m ,
4
provided that x โ z โค (e ยท x)+ and โzn โค 1. We next compute the terms
corresponding to the jumps. For that, first we see that the jump size is of
order โ1n . We can also find a positive constant ฮบ3 such that
sup |ฯโฒโฒ (y)| โค ฮบ3 (1 + |x|mโ2 )
โx โ Rd .
|yโx|โค1
Using Taylorโs approximation, we obtain the inequality
โฯ(Xฬ1n (s)) โ ฯโฒ (Xฬ1n (sโ)) ยท โXฬ1n (s) โค
1
sup
|ฯโฒโฒ (y)|[โ(Xฬ1n (s))]2 .
2 |yโXฬ n (sโ)|โค1
1
Hence, combining the above facts we obtain
X
E
โฯ(Xฬ1n (s)) โ ฯโฒ (Xฬ1n (sโ)) ยท โXฬ1n (s)
sโคt
(5.2)
1 โฒโฒ n
n
n
โ ฯ (Xฬ1 (sโ))โXฬ1 (s)โXฬ1 (s)
2
X
โคE
ฮบ3 (1 + |Xฬ1n (sโ)|mโ2 )(โ(Xฬ1n (s)))2
sโคt
t
ฮปn1
ยตn1 Z1n (s) ฮณ1n Qn1 (s)
= ฮบ3 E
+
+
ds
n
n
n
0
Z t
ฮบ2
โคE
ฮบ4 + |Xฬ1n (s)|m + ฮบ5 ((e ยท Xฬ n (s))+ )m ds ,
4
0
Z
(1 + |Xฬ1n (s)|mโ2 )
for some suitable positive constants ฮบ4 and ฮบ5 , independent of n, where in
the second inequality we use the fact that the optional martingale [Xฬ1n ] is
the sum of the squares of the jumps, and that [Xฬ1n ] โ hXฬ1n i is a martingale.
Therefore, for some positive constants C1 and C2 it holds that
0 โค E[ฯ(Xฬ1n (t))]
(5.3)
โค E[ฯ(Xฬ1n (0))] + C1 t โ
+ C2 E
Z
t
0
ฮบ2
E
2
Z
0
t
|Xฬ1n (s)|m ds
((e ยท Xฬ (s)) ) ds .
n
+ m
ERGODIC CONTROL IN THE HALFINโWHITT REGIME
51
By (2.8), we have
r(Qฬn (s)) โฅ
c1
((e ยท Xฬ n (s))+ )m ,
dm
which, combined with the assumption that supn Vฬ n (Xฬ n (0)) < โ, implies
that
Z T
1
+ m
n
((e ยท Xฬ (s)) ) ds < โ.
sup lim sup E
n
T โโ T
0
In turn, from (5.3) we obtain
sup lim sup
n
T โโ
1
E
T
Z
T
0
|Xฬ1n (s)|m ds < โ.
Repeating the same argument for coordinates i = 2, . . . , d, we obtain
Z T
1
(5.4)
|Xฬ n (s)|m ds < โ.
sup lim sup E
n
T โโ T
0
We introduce the process
๏ฃฑ n
๏ฃฒ Xฬi (t) โ Zฬin (t)
,
n
n
+
Ui (t) :=
๏ฃณ (e ยท Xฬ (t))
ed ,
i = 1, . . . , d,
if (e ยท Xฬ n (t))+ > 0,
otherwise.
Since Z n is work-conserving, it follows that U n takes values in S, and Uin (t)
represents the fraction of class i customers in queue. Define the mean empirical measures
Z T
1
n
n
n
ฮฆT (A ร B) := E
IAรB (Xฬ (s), U (s)) ds
T
0
for Borel sets A โ Rd and B โ S.
From (5.4), we see that the family {ฮฆnT : T > 0, n โฅ 1} is tight. Hence, for
any sequence Tk โ โ, there exists a subsequence, also denoted by Tk , such
that ฮฆnTk โ ฯ n , as k โ โ. It is evident that {ฯ n : n โฅ 1} is tight. Let ฯ n โ ฯ
along some subsequence, with ฯ โ P(Rd ร S). Therefore, it is not hard to
show that
Z
n
n
rฬ(x, u)ฯ(dx, du),
lim Vฬ (Xฬ (0)) โฅ
nโโ
Rd รU
where, as defined earlier, rฬ(x, u) = r((e ยท x)+ u). To complete the proof of the
theorem, we only need to show that ฯ is an ergodic occupation measure
for the diffusion. For that, consider f โ Ccโ (Rd ). Recall that [Xฬin , Xฬjn ] = 0
52
A. ARAPOSTATHIS, A. BISWAS AND G. PANG
for i 6= j [30], Lemmas 9.2 and 9.3. Therefore, using Itoฬโs formula and the
definition of ฮฆnT , we obtain
1
E[f (Xฬ n (T ))]
T
1
= E[f (Xฬ n (0))]
T
!
Z
d
X
(5.5)
Ani (x, u) ยท fxi (x) + Bin (x, u)fxi xi (x) ฮฆnT (dx, du)
+
Rd รU
+
i=1
d
"
X
1 X
fxi (Xฬ n (sโ)) ยท โXฬin (s)
E
โf (Xฬ n (s)) โ
T
sโคT
i=1
#
d
1 X
n
n
n
fxi xj (Xฬ (sโ))โXฬi (s)โXฬj (s) ,
โ
2
i,j=1
where
Ani (x, u) := โni โ ยตni (xi โ (e ยท x)+ ui ) โ ฮณin (e ยท x)+ ui ,
ฮปn ยตn xi + (ฮณin โ ยตni )(e ยท x)+ ui
1 n
โ
ยตi ฯi + i + i
.
Bin (x, u) :=
2
n
n
We first bound the last term in (5.5). Using Taylorโs formula, we see that
n
โf (Xฬ (s)) โ
โ
d
X
i=1
โf (Xฬ n (sโ)) ยท โXฬ n (s)
d
1 X
fxi xj (Xฬ n (sโ))โXฬin (s)โXฬjn (s)
2
i,j=1
=
d
kkf kC 3 X
โ
|โXฬin (s)โXฬjn (s)|
n
i,j=1
for some positive constant k, where we use the fact that the jump size is
โ1 . Hence, using the fact that independent Poisson processes do not have
n
simultaneous jumps w.p.1, using the identity Qฬni = Xฬin โ Zฬin , we obtain
"
d
X
1 X
โf (Xฬ n (sโ)) ยท โXฬ n (s)
E
โf (Xฬ n (s)) โ
T
i=1
sโคT
(5.6)
#
d
1 X
โ
fxi xj (Xฬ n (sโ))โXฬin (s)โXฬjn (s)
2
i,j=1
ERGODIC CONTROL IN THE HALFINโWHITT REGIME
kkf k 3
โค โC E
T n
"Z
T
0
53
d n
X
ฮป
i=1
#
n Z n (s)
n Qn (s)
ยต
ฮณ
i
+ i i
+ i i
ds .
n
n
n
Therefore, first letting T โ โ and using (5.2) and (5.4) we see that the
expectation on the right-hand side of (5.6) is bounded above. Therefore, as
n โ โ, the left-hand side of (5.6) tends to 0. Thus, by (5.5) and the fact
that f is compactly supported, we obtain
Z
Lu f (x)ฯ(dx, du) = 0,
Rd รU
where
Lu f (x) = ฮปi โii f (x) + (โi โ ยตi (xi โ (e ยท x)+ ui ) โ ฮณi (e ยท x)+ ui )โi f (x).
Therefore, ฯ โ G.
5.2. The upper bound. The proof of the upper bound in Theorem 2.2 is
a little more involved than that of the lower bound. Generally, it is very
helpful if one has uniform stability across n โ N (see, e.g., [12]). In [12],
uniform stability is obtained from the reflected dynamics with the Skorohod
mapping. However, here we establish the asymptotic upper bound by using
the technique of spatial truncation that we have introduced in Section 4.
Let vฮด be any precise continuous control in USSM satisfying vฮด (x) = u0 =
(0, . . . , 0, 1) for |x| > K > 1.
First, we construct a work-conserving admissible policy for each n โ N
(see [7]). Define a measurable map ฬ : {z โ Rd+ : e ยท z โ Z} โ Zd+ as follows:
for z = (z1 , . . . , zd ) โ Rd , let
!
d
X
(zi โ โzi โ) .
ฬ(z) := โz1 โ, . . . , โzdโ1 โ, โzd โ +
i=1
Note that |ฬ(z) โ z| โค 2d. Define
uh (x) := ฬ((e ยท x โ n)+ vฮด (xฬn )),
x โ Rd ,
x1 โ ฯ1 n
xd โ ฯd n
n
โ
xฬ :=
,..., โ
,
n
n
n
โ o
An := x โ Rd+ : sup |xi โ ฯi n| โค K n .
i
We define a state-dependent, work-conserving policy as follows:
๏ฃฑ n
X โ uh (X n ),
if X n โ An ,
๏ฃด
๏ฃด
๏ฃฒ i
!
+
iโ1
X
Zin [X n ] :=
(5.7)
n
n
๏ฃด
,
otherwise.
Xj
X โง nโ
๏ฃด
๏ฃณ i
j=1
54
A. ARAPOSTATHIS, A. BISWAS AND G. PANG
Therefore, whenever the state of the system is in Acn , the system works under
the fixed priority policy with the least priority given to class-d jobs. First,
we show that this is a well-defined policy for all large n. It is enough to
show that Xin โ uh (X n ) โฅ 0 for all i when X n โ An . If not, then for some
i, 1 โค i โค d, we must have Xin โ uh (X n ) < 0 and so Xin < (e ยท X n โ n)+ + d.
Since X n โ An , we obtain
โ
โK n + ฯi n โค Xin
< (e ยท X n โ n)+ + d
!+
d
X
n
(Xi โ ฯi n)
=
+d
i=1
โ
โค dK n + d.
But this cannot hold for large n. Hence, this policy is well defined for all
large n. Under the policy defined in (5.7), X n is a Markov process and its
generator given by
Ln f (x) =
d
X
i=1
+
ฮปni (f (x + ei ) โ f (x)) +
d
X
i=1
d
X
i=1
ยตni Zin [x](f (x โ ei ) โ f (x))
ฮณin Qni [x](f (x โ ei ) โ f (x)),
x โ Zd+ ,
where Z n [x] is as above and Qn [x] := x โ Z n [x]. It is easy to see that, for
xโ
/ An ,
! + #+
"
iโ1
X
n
xj
.
Qi [x] = xi โ n โ
j=1
Lemma 5.1. Let X n be the Markov process corresponding to the above
control. Let q be an even positive integer. Then there exists n0 โ N such that
Z T
1
q
n
sup lim sup E
|Xฬ (s)| ds < โ,
nโฅn0 T โโ T
0
where Xฬ n = (Xฬ1n , . . . , Xฬdn )T is the diffusion-scaled process corresponding to
the process X n , as defined in (2.4).
Proof. The proof technique is inspired by [6], Lemma 3.1. Define
fn (x) :=
d
X
i=1
ฮฒi (xi โ ฯi n)q ,
ERGODIC CONTROL IN THE HALFINโWHITT REGIME
55
where ฮฒi , i = 1, . . . , d, are positive constants to be determined later. We first
show that for a suitable choice of ฮฒi , i = 1, . . . , d, there exist constants Ci ,
i = 1, 2, independent of n โฅ n0 , such that
Ln fn (x) โค C1 nq/2 โ C2 fn (x),
(5.8)
x โ Zd+ .
Choose n large enough so that the policy is well defined. We define Yin :=
xi โ ฯi n. Note that
Also,
(a ยฑ 1)q โ aq = ยฑqa ยท aqโ2 + O(aqโ2 ),
ยตni Zin [x] = ยตni xi
Ln fn (x) =
d
X
i=1
โ
โ
โค
(5.9)
i=1
d
X
i=1
i=1
d
X
d
X
i=1
+
ฮฒi ยตni xi [qYin |Yin |qโ2 + O(|Yin |qโ2 )]
ฮฒi (ฮณin โ ยตni )Qni [x][qYin |Yin |qโ2 + O(|Yin |qโ2 )]
ฮฒi (ฮปni + ยตni xi + |ฮณin โ ยตni |Qin [x])O(|Yin |qโ2 )
i=1
โค
Then
a โ R.
ฮฒi ฮปni [qYin |Yin |qโ2 + O(|Yin |qโ2 )]
d
X
d
X
+
โ ยตni Qni [x].
ฮฒi qYin |Yin |qโ2 (ฮปni โ ยตni xi โ (ฮณin โ ยตni )Qni [x])
ฮฒi (ฮปni + (ยตni + |ฮณin โ ยตni |)(Yin + ฯi n))O(|Yin |qโ2 )
d
X
i=1
ฮฒi qYin |Yin |qโ2 (ฮปni โ ยตni xi โ (ฮณin โ ยตni )Qni [x]),
where in the last inequality we use the fact that Qni [x] โค xi for x โ Zd+ . Let
โ
ฮดin := ฮปni โ ยตni ฯi n = O( n).
The last estimate is due to the assumptions in (2.1) concerning the parameters in the HalfinโWhitt regime. Then
(5.10)
d
X
i=1
ฮฒi qYin |Yin |qโ2 (ฮปni โ ยตni xi โ (ฮณin โ ยตni )Qni [x])
= โq
d
X
i=1
ฮฒi ยตni |Yin |q +
d
X
i=1
ฮฒi qYin |Yin |qโ2 (ฮดin โ (ฮณin โ ยตni )Qni [x]).
56
A. ARAPOSTATHIS, A. BISWAS AND G. PANG
If x โ An and n is large, then
Qni [x] = uh (x) = ฬ((e ยท x โ n)+ vฮด (xฬn ))
โ
โค (e ยท x โ n)+ + d โค 2dK n.
Let x โ Acn . We use the fact that for any a, b โ R it holds that a+ โ b+ =
ฮพ[a โ b] for some ฮพ โ [0, 1]. Also,
!+ #+
"
iโ1
X
nฯj
= 0,
i = 1, . . . , d.
nฯi โ n โ
j=1
Thus, we obtain maps ฮพ, ฮพฬ : Rd โ [0, 1]d such that
!+ #+
"
iโ1
X
nฯj
โ Qni [x]
โQni [x] = nฯi โ n โ
j=1
= ฮพi (x)(nฯi โ xi ) โ ฮพหi (x)
iโ1
X
(xj โ nฯj ),
x โ Acn .
j=1
Hence, from (5.10) we obtain
d
X
i=1
ฮฒi qYin |Yin |qโ2 (ฮปni โ ยตni xi โ (ฮณin โ ยตni )Qni [x])
d
d
X
X
โ
ฮฒi ((1 โ ฮพi (x))ยตni + ฮพi (x)ฮณin )|Yin |q
ฮฒi |Yin |qโ1 โ q
โค O( n)q
i=1
i=1
+q
d
X
i=1
ฮฒi Yin |Yin |qโ2
ฮดin
โ (ฮณin
โ ยตni )ฮพฬi (x)
where we used the fact that on An we have
!+ #+
"
iโ1
X
โ
= O( n)
xj
xi โ n โ
j=1
iโ1
X
Yjn
j=1
!
,
โi.
Observe that there exists ฯ > 0, independent of n due to (2.1), such that
(1 โ ฮพi (x))ยตni + ฮพi (x)ฮณin โฅ min(ยตni , ฮณin ) โฅ ฯ
for all n โ N, all x โ Rd , and all i = 1, . . . , d. As a result, we obtain
d
X
i=1
ฮฒi qYin |Yin |qโ2 (ฮปni โ ยตni xi โ (ฮณin โ ยตni )Qni [x])
57
ERGODIC CONTROL IN THE HALFINโWHITT REGIME
d
d
X
X
โ
n qโ1
ฮฒi |Yin |q
ฮฒi |Yi |
โ qฯ
โค O( n)q
(5.11)
i=1
i=1
+q
d
X
i=1
ฮฒi Yin |Yin |qโ2 ฮดin โ (ฮณin โ ยตni )ฮพฬi (x)
iโ1
X
j=1
!
Ynj .
We next estimate the last term on the right-hand side of (5.11). Let ฮบ :=
ฯ
. Using Youngโs inequality, we obtain the estisupn,i |ฮณin โ ยตni |, and ฮต1 := 8ฮบ
mate
q
iโ1
iโ1
X
1 X n
n qโ1
j
n q
Yj .
|Yi |
Yn โค ฮต1 |Yi | + qโ1
ฮต
1
j=1
j=1
Therefore,
q
d
X
i=1
ฮฒi Yin |Yin |qโ2 โ(ฮณin โ ยตni )ฮพฬi (x)
โค qฮบ
d
X
ฮต1 ฮฒi |Yin |q
โค qฮบ
d
X
ฮต1 ฮฒi |Yin |q
i=1
i=1
+
+
iโ1
ฮฒi X
ฮต1qโ1
j=1
ฮฒi
qโ1
ฮต1qโ1
iโ1
X
Yjn
j=1
Yjn
d
!
q!
iโ1
X
|Yjn |q
j=1
!
!
d
iโ1
qฯ X
ฮฒi qโ1 X n q
n q
=
ฮฒi |Yi | + q d
|Yj | .
8
ฮต1
i=1
j=1
We choose ฮฒ1 = 1 and for i โฅ 2, we define ฮฒi by
ฮตq1
ฮฒi := q min ฮฒj .
d jโคiโ1
With this choice of ฮฒi it follows from above that
q
d
X
i=1
ฮฒi Yin |Yin |qโ2
โ(ฮณin
โ ยตni )ฮพฬi (x)
iโ1
X
j=1
Ynj
!
Using the preceding inequality in (5.11), we obtain
(5.12)
d
X
i=1
d
qฯ X
โค
ฮฒi |Yin |q .
4
i=1
ฮฒi qYin |Yin |qโ2 (ฮปni โ ยตni xi โ (ฮณin โ ยตni )Qni [x])
d
d
X
โ
3 X
ฮฒi |Yin |q .
โค O( n)q
ฮฒi |Yin |qโ1 โ qฯ
4
i=1
i=1
58
A. ARAPOSTATHIS, A. BISWAS AND G. PANG
Combining (5.9) and (5.12), we obtain
Ln fn (x) โค
(5.13)
d
X
i=1
d
X
โ
O(n)O(|Yin |qโ2 )
O( n)O(|Yin |qโ1 ) +
i=1
d
3 X
ฮฒi |Yin |q .
โ qฯ
4
i=1
By Youngโs inequality, for any ฮต > 0, we have the bounds
โ
โ
O( n)O(|Yin |qโ1 ) โค ฮต[O(|Yin |qโ1 )]q/(qโ1) + ฮต(1โq) [O( n)]q ,
O(n)O(|Yin |qโ2 ) โค ฮต[O(|Yin |qโ2 )]q/(qโ2) + ฮต(1โq/2) [O(n)]q/2 .
Thus, choosing ฮต properly in (5.13) we obtain (5.8).
We proceed to complete the proof of the lemma by applying (5.8). First,
we observe that E[supsโ[0,T ] |X n (s)|p ] is finite for any p โฅ 1 as this quantity
is dominated by the Poisson arrival process. Therefore, from (5.8) we see
that
Z T
n
n
n
Ln fn (X (s)) ds
E[fn (X (T ))] โ fn (X (0)) = E
0
โค C1 n
q/2
T โ C2 E
Z
T
0
fn (X (s)) ds ,
n
which implies that
#
"Z
d
d
T X
X
ฮฒi (Xฬin (0))q .
C2 E
ฮฒi (Xฬin (s))q ds โค C1 T +
0
i=1
i=1
Hence, the proof follows by dividing both sides by T and letting T โ โ.
Proof of Theorem 2.2. Let r be the given running cost with polynomial growth with exponent m in (2.8). Let q = 2(m + 1). Recall that
rฬ(x, u) = r((e ยท x)+ u) for (x, u) โ Rd ร S. Then rฬ is convex in u and satisfies
(3.11) with the same exponent m. For any ฮด > 0, we choose vฮด โ USSM such
that vฮด is a continuous precise control with invariant probability measure ยตฮด
and
Z
(5.14)
rฬ(x, vฮด (x))ยตฮด (dx) โค ฬบโ + ฮด.
Rd
We also want the control vฮด to have the property that vฮด (x) = (0, . . . , 0, 1)
outside a large ball. To obtain such vฮด , we see that by Theorems 4.1, 4.2 and
ERGODIC CONTROL IN THE HALFINโWHITT REGIME
59
Remark 4.2 we can find vฮดโฒ and a ball Bl for l large, such that vฮดโฒ โ USSM ,
vฮดโฒ (x) = ed for |x| > l, vฮดโฒ is continuous in Bl , and
Z
ฮด
rฬ(x, vฮดโฒ (x))ยตโฒฮด (dx) โ ฬบโ < ,
2
d
R
where ยตโฒฮด is the invariant probability measure corresponding to vฮดโฒ . We note
that vฮดโฒ might not be continuous on โBl . Let {ฯn : n โ N} be a sequence
c
of cut-off functions such that ฯn โ [0, 1], it vanishes on Blโ(1/n)
, and it
n
n
takes the value 1 on Blโ(2/n) . Define the sequence vฮด (x) := ฯ (x)vฮดโฒ (x) +
(1 โ ฯn (x))ed . Then vฮดn โ vฮดโฒ , as n โ โ, and the convergence is uniform
on the complement of any neighborhood of โBl . Also by Proposition 3.1
the corresponding invariant probability measures ยตnฮด are exponentially tight.
Thus,
Z
Z
โฒ
โฒ
rฬ(x, vฮดn (x))ยตnฮด (dx) โโ 0.
rฬ(x, vฮด (x))ยตฮด (dx) โ
Rd
Rd
nโโ
Combining the above two expressions, we can easily find vฮด which satisfies
(5.14). We construct a scheduling policy as in Lemma 5.1. By Lemma 5.1,
we see that for some constant K1 it holds that
Z T
1
q
n
(5.15)
|Xฬ (s)| ds < K1 ,
q = 2(m + 1).
sup lim sup E
nโฅn0 T โโ T
0
Define
vh (x) := ฬ((e ยท x โ n)+ vฮด (xฬn )),
โ
vฬh (xฬn ) := ฬ( n(e ยท xฬn )+ vฮด (xฬn )).
Since vฮด (xฬn ) = (0, . . . , 0, 1) when |xฬn | โฅ K, it follows that
Qn [X n ] = X n โ Z n [X n ] = vh (X n )
P
n
for large n, provided that dโ1
i=1 Xi โค n. Define
( dโ1
)
X
โ
xฬni > ฯd n .
Dn := x :
i=1
Then
1
n
r(Qฬ (t)) = r โ vฬh (Xฬ (t)) + r(Xฬ n (t) โ Zฬ n (t))I{Xฬ n (t)โDn }
n
1
n
โ r โ vฬh (Xฬ (t)) I{Xฬ n (t)โDn } .
n
n
60
A. ARAPOSTATHIS, A. BISWAS AND G. PANG
Define, for each n, the mean empirical measure ฮจnT by
Z T
1
IA (Xฬ n (t)) dt .
ฮจnT (A) := E
T
0
By (5.15), the family {ฮจnT : T > 0, n โฅ 1} is tight. We next show that
Z
Z T
1
n
(5.16) lim lim sup E
r((e ยท x)+ vฮด (x))ยตฮด (dx).
r(Qฬ (t)) dt =
nโโ T โโ T
Rd
0
For each n, select a sequence {Tkn : k โ N} along which the โlim supโ in (5.16)
is attained. By tightness, there exists a limit point ฮจn of ฮจnT n . Since ฮจn has
k
support on a discrete lattice, we have
Z
Z
1
1
n
r โ vฬh (x) ฮจn (dx).
r โ vฬh (x) ฮจT n (dx) โโ
k
kโโ
d
n
n
d
R
R
Therefore,
1
lim sup E
T โโ T
Z
T
0
1
r โ vฬh (x) ฮจn (dx) ยฑ E n ,
r(Qฬ (t)) dt โถ
n
d
R
n
Z
where
E n = lim sup
T โโ
1
E
T
Z
0
T
1
r(Qฬn (t)) + r โ vฬh (Xฬ n (t)) I{Xฬ n (t)โDn } dt .
n
By (5.15), the family {ฮจn : n โฅ 1} is tight. Hence, it has a limit ฮจ. By
definition, we have
1
2d
โ vฬh (x) โ (e ยท x)+ vฮด (x) โค โ .
n
n
Thus, using the continuity property of r and (2.8) it follows that
Z
Z
1
n
r โ vฬh (x) ฮจ (dx) โโ
r((e ยท x)+ vฮด (x))ฮจ(dx),
nโโ
n
d
d
R
R
along some subsequence. Therefore, in order to complete the proof of (5.16)
we need to show that
lim sup E n = 0.
nโโ
Since the policies are work-conserving, we observe that 0 โค Xฬ n โ Zฬ n โค (e ยท
Xฬ n )+ , and therefore for some positive constants ฮบ1 and ฮบ2 , we have
1
n
r โ vฬh (Xฬ (t)) โจ r(Xฬ n (t) โ Zฬ n (t)) โค ฮบ1 + ฮบ2 [(e ยท Xฬ n )+ ]m .
n
ERGODIC CONTROL IN THE HALFINโWHITT REGIME
61
Given ฮต > 0 we can choose n1 so that for all n โฅ n1 ,
Z T
1
+ m
n
โ
โ
[(e ยท Xฬ (s)) ] I{|Xฬ n (s)|>(ฯd / d) n} ds โค ฮต,
lim sup E
T โโ T
0
p
where we use (5.15). We observe that Dn โ {|xฬn | > ฯd d/n}. Thus, (5.16)
holds. In order to complete the proof, we only need to show that ฮจ is the
invariant probability measure corresponding to vฮด . This can be shown using
the convergence of generators as in the proof of Theorem 2.1.
6. Conclusion. We have answered some of the most interesting questions
for the ergodic control problem of the Markovian multi-class many-server
queueing model. This current study has raised some more questions for future research. One of the interesting questions is to consider nonpreemptive
policies and try to establish asymptotic optimality in the class of nonpreemptive admissible polices [7]. It will also be interesting to study a similar
control problem when the system has multiple heterogeneous agent pools
with skill-based routing.
It has been observed that customersโ service requirements and patience
times are nonexponential [10] in some situations. It is therefore important
and interesting to address similar control problems under general assumptions on the service and patience time distributions.
Acknowledgements. We thank the anonymous referee for many helpful
comments that have led to significant improvements in our paper. Ari Arapostathis acknowledges the hospitality the Department of Industrial and
Manufacturing Engineering in Penn State while he was visiting at the early
stages of this work. Guodong Pang acknowledges the hospitality of the Department of Electrical and Computer Engineering at University of Texas at
Austin while he was visiting for this work. Part of this work was done while
Anup Biswas was visiting the Department of Industrial and Manufacturing
Engineering in Penn State. Hospitality of the department is acknowledged.
REFERENCES
[1] Arapostathis, A., Borkar, V. S. and Ghosh, M. K. (2012). Ergodic Control
of Diffusion Processes. Encyclopedia of Mathematics and Its Applications 143.
Cambridge Univ. Press, Cambridge. MR2884272
[2] Arisawa, M. and Lions, P.-L. (1998). On ergodic stochastic control. Comm. Partial
Differential Equations 23 2187โ2217. MR1662180
[3] Atar, R. (2005). Scheduling control for queueing systems with many servers: Asymptotic optimality in heavy traffic. Ann. Appl. Probab. 15 2606โ2650. MR2187306
[4] Atar, R. and Biswas, A. (2014). Control of the multiclass G/G/1 queue in the
moderate deviation regime. Ann. Appl. Probab. 24 2033โ2069. MR3226171
[5] Atar, R., Giat, C. and Shimkin, N. (2010). The cยต/ฮธ rule for many-server queues
with abandonment. Oper. Res. 58 1427โ1439. MR2560545
62
A. ARAPOSTATHIS, A. BISWAS AND G. PANG
[6] Atar, R., Giat, C. and Shimkin, N. (2011). On the asymptotic optimality of the
cยต/ฮธ rule under ergodic cost. Queueing Syst. 67 127โ144. MR2771197
[7] Atar, R., Mandelbaum, A. and Reiman, M. I. (2004). Scheduling a multi class
queue with many exponential servers: Asymptotic optimality in heavy traffic.
Ann. Appl. Probab. 14 1084โ1134. MR2071417
[8] Bogachev, V. I., Krylov, N. V. and Roฬckner, M. (2001). On regularity of transition probabilities and invariant measures of singular diffusions under minimal
conditions. Comm. Partial Differential Equations 26 2037โ2080. MR1876411
[9] Borkar, V. S. (1989). Optimal Control of Diffusion Processes. Pitman Research
Notes in Mathematics Series 203. Longman, Harlow. MR1005532
[10] Brown, L., Gans, N., Mandelbaum, A., Sakov, A., Shen, H., Zeltyn, S. and
Zhao, L. (2005). Statistical analysis of a telephone call center: A queueingscience perspective. J. Amer. Statist. Assoc. 100 36โ50. MR2166068
[11] Budhiraja, A., Ghosh, A. and Liu, X. (2014). Scheduling control for Markovmodulated single-server multiclass queueing systems in heavy traffic. Queueing
Syst. 78 57โ97. MR3238008
[12] Budhiraja, A., Ghosh, A. P. and Lee, C. (2011). Ergodic rate control problem for single class queueing networks. SIAM J. Control Optim. 49 1570โ1606.
MR2817491
[13] Dai, J. G. and Tezcan, T. (2008). Optimal control of parallel server systems with
many servers in heavy traffic. Queueing Syst. 59 95โ134. MR2430811
[14] Dieker, A. B. and Gao, X. (2013). Positive recurrence of piecewise Ornsteinโ
Uhlenbeck processes and common quadratic Lyapunov functions. Ann. Appl.
Probab. 23 1291โ1317. MR3098433
[15] Gamarnik, D. and Stolyar, A. L. (2012). Multiclass multiserver queueing system
in the Halfin-Whitt heavy traffic regime: Asymptotics of the stationary distribution. Queueing Syst. 71 25โ51. MR2925789
[16] Gamarnik, D. and Zeevi, A. (2006). Validity of heavy traffic steady-state approximation in generalized Jackson networks. Ann. Appl. Probab. 16 56โ90.
MR2209336
[17] Garnett, O., Mandelbaum, A. and Reiman, M. I. (2002). Designing a call center
with impatient customers. Manuf. Serv. Oper. Manag. 4 208โ227.
[18] Gilbarg, D. and Trudinger, N. S. (1983). Elliptic Partial Differential Equations of
Second Order, 2nd ed. Grundlehren der Mathematischen Wissenschaften [Fundamental Principles of Mathematical Sciences] 224. Springer, Berlin. MR0737190
[19] Gurvich, I. (2014). Diffusion models and steady-state approximations for exponentially ergodic Markovian queues. Ann. Appl. Probab. 24 2527โ2559. MR3262510
[20] Gyoฬngy, I. and Krylov, N. (1996). Existence of strong solutions for Itoฬโs stochastic equations via approximations. Probab. Theory Related Fields 105 143โ158.
MR1392450
[21] Halfin, S. and Whitt, W. (1981). Heavy-traffic limits for queues with many exponential servers. Oper. Res. 29 567โ588. MR0629195
[22] Harrison, J. M. and Zeevi, A. (2004). Dynamic scheduling of a multiclass queue
in the HalfinโWhitt heavy traffic regime. Oper. Res. 52 243โ257. MR2066399
[23] Ichihara, N. and Sheu, S.-J. (2013). Large time behavior of solutions of Hamiltonโ
JacobiโBellman equations with quadratic nonlinearity in gradients. SIAM J.
Math. Anal. 45 279โ306. MR3032978
[24] Kallenberg, O. (2002). Foundations of Modern Probability, 2nd ed. Springer, New
York. MR1876169
ERGODIC CONTROL IN THE HALFINโWHITT REGIME
63
[25] Kim, J. and Ward, A. R. (2013). Dynamic scheduling of a GI/GI/1 + GI queue
with multiple customer classes. Queueing Syst. 75 339โ384. MR3110643
[26] Kocฬงagฬa, Y. L. and Ward, A. R. (2010). Admission control for a multi-server queue
with abandonment. Queueing Syst. 65 275โ323. MR2652045
[27] Krylov, N. V. (1980). Controlled Diffusion Processes. Applications of Mathematics
14. Springer, New York. Translated from the Russian by A. B. Aries. MR0601776
[28] Mandelbaum, A. and Stolyar, A. L. (2004). Scheduling flexible servers with convex delay costs: Heavy-traffic optimality of the generalized cยต-rule. Oper. Res.
52 836โ855. MR2104141
[29] Ocone, D. and Weerasinghe, A. (2003). Degenerate variance control in the onedimensional stationary case. Electron. J. Probab. 8 no. 24, 27 pp. (electronic).
MR2041825
[30] Pang, G., Talreja, R. and Whitt, W. (2007). Martingale proofs of many-server
heavy-traffic limits for Markovian queues. Probab. Surv. 4 193โ267. MR2368951
[31] Stannat, W. (1999). (Nonsymmetric) Dirichlet operators on L1 : Existence, uniqueness and associated Markov processes. Ann. Scuola Norm. Sup. Pisa Cl. Sci.
(4) 28 99โ140. MR1679079
[32] van Mieghem, J. A. (1995). Dynamic scheduling with convex delay costs: The generalized cยต rule. Ann. Appl. Probab. 5 809โ833. MR1359830
[33] Yosida, K. (1980). Functional Analysis, 6th ed. Grundlehren der Mathematischen Wissenschaften [Fundamental Principles of Mathematical Sciences] 123.
Springer, Berlin. MR0617913
A. Arapostathis
A. Biswas
Department of Electrical
and Computer Engineering
The University of Texas at Austin
1616 Guadalupe St., UTA 7.508
Austin, Texas 78701
USA
E-mail: [email protected]
[email protected]
G. Pang
The Harold and Inge Marcus Department
of Industrial and Manufacturing Engineering
College of Engineering
Pennsylvania State University
University Park, Pennsylvania 16802
USA
E-mail: [email protected]
| 3cs.SY
|
1
Role Playing Learning for Socially Concomitant
Mobile Robot Navigation
arXiv:1705.10092v1 [cs.RO] 29 May 2017
Mingming Li, Rui Jiang, Shuzhi Sam Ge, Fellow, IEEE, and Tong Heng Lee, Member, IEEE
AbstractโIn this paper, we present the Role Playing Learning
(RPL) scheme for a mobile robot to navigate socially with its
human companion in populated environments. Neural networks
(NN) are constructed to parameterize a stochastic policy that
directly maps sensory data collected by the robot to its velocity
outputs, while respecting a set of social norms. An efficient simulative learning environment is built with maps and pedestrians
trajectories collected from a number of real-world crowd data
sets. In each learning iteration, a robot equipped with the NN
policy is created virtually in the learning environment to play
itself as a companied pedestrian and navigate towards a goal in
a socially concomitant manner. Thus, we call this process Role
Playing Learning, which is formulated under a reinforcement
learning (RL) framework. The NN policy is optimized end-toend using Trust Region Policy Optimization (TRPO), with consideration of the imperfectness of robotโs sensor measurements.
Simulative and experimental results are provided to demonstrate
the efficacy and superiority of our method.
l Index TermsโSocially concomitant navigation, mobile robot,
neural network, reinforcement learning
I. I NTRODUCTION
The capability to navigate in densely populated and dynamic
environments is one of the most important features that enable
the deployment of mobile robots in unstructured environment,
such as schools, shopping malls and transportation hubs. The
key difference between the problem of navigating among humans and the traditional path planning and obstacle avoidance
problems is that humans tend to smoothly evade each other
interactively and cooperatively, rather than remaining static
or maintaining an indifferent trajectory dynamics. In other
words, there are social norms that need to be understood and
complied to achieve maximum comfort of all involved pedestrians during navigation. We refer to this as the problem of
social navigation, which aims to model such social norms and
develop a robotic navigation policy that is socially acceptable
to the pedestrians around.
For social navigation, the traditional approaches based on
Dynamic Window Approach (DWA) [1] or potential fields
[2], [3] are usually of limited efficacy as pedestrians are
simply regarded as uncooperative obstacles. An illustrative
example is the freezing robot problem (FRP) [4], [5], where a
mobile robot will be stuck in a narrow corridor when facing
a crowd of people if it lacks the ability to predict the joint
collision avoidance behaviors of human pedestrians. To this
M. Li, R. Jiang, S. S. Ge and T. H. Lee are with the Department of
Electrical and Computer Engineering, and the Social Robotics Lab, Smart
System Institute (SSI), National University of Singapore, Singapore 117576
(e-mail: li [email protected]; rui [email protected]; [email protected];
[email protected]).
end, researches have been done to understand the principles
of humansโ joint collision avoidance strategies and one of
the pioneering works are the social force model (SFM) [6],
[7]. Other joint collision avoidance model such as reciprocal
velocity obstacles (RVO) have been proposed in [8], [9], [10],
with an underlying assumption that all involved agents adopt
the same collision avoidance strategies. These ideas are also
applied to visual tracking of pedestrians [11], [12]. More recently, several attempts are made to learn probabilistic models
of pedestriansโ trajectories during joint collision avoidance,
based on which the robotโs navigation decision is generated
such that it is able to behave naturally and correctly in similar
situations [13], [5], [14], [15].
In this paper, we propose to augment the dimensions of
human-robot interaction in social navigation by further endowing robot with appropriate group behaviors when it is
travelling with a human companion. This capability is highly
desirable for assistive mobile robots [16], [17], [18], which
serve as assistants and companions and are expected to travel
along with theirx human partners in not only home environment but also possibly crowded public areas. In other words,
apart from understanding the collision avoidance behaviors of
pedestrians, the robot also needs to consider the motion of its
companion so as to maintain a sense of affinity when they are
travelling together towards a certain goal. We call this socially
concomitant navigation (SCN) and it is more challenging than
the aforementioned social navigation problem, where the robot
is assumed to travel alone with a simpler pursuit of reaching
a specific goal while being free of collision.
To address the problem of SCN, we develop a new learning
scheme called Role Playing Learning (RPL). Particularly, we
formulate such problem under the framework of Partially
Observable Markov Decision Process (POMDP) and reinforcement learning (RL). A neural network (NN) is used
to parameterize the navigation policy of the robot, which is
optimized to gives proper steering commands for the next
time instance based on the robotโs current and previous observations to its surroundings. To facilitate the RL process,
we create a simulative navigation environment by mirroring
a collections of real world pedestrians data sets and develop
an on-policy optimization method called Partially Observable
Trust Region Policy Optimization (PO-TRPO). In each run in
an optimization iteration, the robot will attempt to play itself
as a companion of a randomly chosen pedestrian by executing
the NN navigation policy. The NN policy is then optimized
using PO-TRPO based on a batch of collected trajectories.
Compared to the existing analytically derived or data-driven
approaches, our RPL scheme has the following advantages:
2
1) RPL scheme is less restrictive. It does not rely on the
assumption that the robot and other agents (pedestrians)
share the same decision-making models [8], [9], [10], [5],
[14] or that the navigation goals of pedestrians are known
[5], [14].
2) The formulation of RPL scheme is more generalizable and flexible. Our formulation contain no manuallydefined feature and domain knowledge (e.g., statistics
of pedestriansโ behaviors). It is not hardware-specific
and can be easily modified to incorporate kinematics
of different mobile robot platforms, sensor specifications
and navigation objectives. In addition, unlike [15], [14],
the learned navigation policy operates without assess to
the global map of the environment. Therefore, it is not
environment-specific and is well generalizable to unmet
real-world scenarios.
3) We explicitly consider the noise and limitation of the
robotโs sensor measurements. Most approaches for social
navigation assume that the robot has full and accurate
knowledge of interested variables, such as positions or
distance of pedestrians and obstacles [8], [9], [10], [14].
On the contrary, our RPL schemes is rooted from the
situation where the robot can only perceive those lie
within its sensorโs Field of View (FoV), with the existence
of measurement noise.
4) As a RL-based approach, RPL is efficient. Although
RPL aims at solving tasks that involve interaction among
robot, humans and physical environment, it does not
require participation of human in both data collection
and learning, which is known to be tedious and timeconsuming. Instead, the learning process is safely automated in a simulative yet realistic environment with no
human intervention.
We evaluate the performance of our approach in both
simulations and real-world experiments, by comparing it with
a baseline planner based on RVO [8] and humans, repectively.
We also show that, with some tricks, the learned navigation
policy can still be effective when the navigation scenario is
reduced to the aforementioned social navigation, which means
the robot is travelling without human companion.
The remainder of this paper is organized as follows. Related
work is first reviewed in Section II. In Section III, the problem
of SCN is formulated as a POMDP and associated definitions
are given. RPL scheme and PO-TRPO algorithm are described
in Section IV. Sections V and VI provide extensive results
of simulation and experiment, followed by some concluding
remarks in Section VII.
II. R ELATED W ORK
The problems of robot navigation in populated and dynamic
environment can be addressed from a number of angles, which
can be largely classified into two groups as in the following
subsections.
A. Interactive Behaviors Models
Many researches have been proposed to describe the interactive navigation behaviors of humans by fitting a computational
model to the observed pedestrians trajectories [19]. In this
way, the robotโs path planner is able to understand pedestriansโ
intention during joint collision avoidance and actively calculate
an optimal route towards its goal.
In the field of robotics, a majority of work in this direction
is done via inverse reinforcement learning (IRL) [20], which
learns a cost function that explains the observed behaviors.
For example, maximum entropy IRL [21] is adopted in a
number works [22], [23], [24], [25], [26] for discrete human
behavior prediction and route planning. However, discrete
representation is less desirable when modeling trajectories,
which are in nature continuous and has higher order dynamics, such as velocities and acceleration. Instead, [15] adopts
Maximum-A-Posteriori Bayesian IRL [27] to learn appropriate
navigation behavior of a specific mobile robot from a set
of demonstration trajectories. Note that, the demonstration
data in [15] is specific to configurations of the robot and its
sensor and has to be collected via human operation, which
could be time-consuming. On the other hand, [13], [14] learns
probabilistic models of composite trajectories of pedestrians
from video data by maximum entropy learning and IRL. To
better capture the characteristics of observed trajectories, they
propose to develop their models based on a set of features
that are hand-crafted according to the domain knowledge
from psychological studies. In addition, those features contain
velocities and accelerations of pedestrians, which, in practice,
are hard to precisely measure. Besides, interacting Gaussian
process (IGP) is derived in [5] to model the joint trajectories
of pedestrian while explicitly considering the effects of observation noise. Nevertheless, the design of IGP also requires
several hand-crafted kernels that are formulated based on the
priori information in a specific application scenario.
Other than researchers in robotics, the community of computer vision also possess great interest in pedestrian modeling.
One of the important topics is trajectory prediction in video
space. In [11], Linear Trajectory Avoidance (LTA) is developed
as a dynamic model for pedestrians in video space for shortterm trajectory prediction and it is integrated into visual
tracking system. Gaussian process is adopted in [28] to learn
the motion pattern of pedestrians. Recently, Social LSTM is
proposed in [29] for human trajectory prediction in crowd
space. Similarly, the feature of social sensitivity is developed
in [30] to analyze trajectories of pedestrians and bicyclists.
While the above methods can effectively predict the navigation
intention of pedestrians in videos, it is still unclear how to
apply these model to navigation of robot in real scenarios.
B. Steering Models
In contrast to learning behavior models of pedestrians, a
more direct perspective is to develop a steering model that outputs the immediate navigation actions given the robotโs current
observation to the environment. One of the pioneering work
in this direction is the social force model (SFM) [6], which
uses energy/potential functions to encode the social status of
pedestrian. Then, the navigation motivation of a pedestrian can
be derived by taking the gradients of these energy functions.
Following this idea, subsequent work [31], [32], [33], [12]
3
propose to infer the optimal parameters of the energy function
by fitting them to video data. However, they are likely to
produce suboptimal results if the demonstration data from
humans are imperfect. In [34], the authors integrate a people
tracker and an iterative Aโ planner, with which the robot
actively follows the pedestrian travelling in a similar direction
to navigate through crowded environment. [35] follow the
same idea and formulate the choice of a pedestrian to follow as
a Multi-Policy Decision Making process. On the other hands,
[36] develops a hierarchical POMDP for predictive navigation
in dynamic environment. The idea is to predict the motion of
pedestrians and generate a environment-specific cost map for
path planning and obstacle avoidance.
Other than navigating in a pedestrian-aware manner, several reactive collision avoidance techniques have also been
developed, such as DWA [1], [37], velocity obstacles [38] and
reciprocal velocity obstacles (RVO) [8], [9], [10]. The common
idea of these methods is to treat pedestrians as moving
obstacles and reactively update the planner every short periods
to achieve collision avoidance. As mentioned in Section I,
these methods are less effective for social navigation as they
lack predictive abilities and are based on some restrictive
assumptions, such as accurate knowledge of moving agentsโ
velocities [37] and that all agents adopt the identical collision
avoidance strategy [8], [9], [10].
Our proposed navigation policy belongs to the steering
models. It takes an observation vector as input and outputs
the navigation action through a stochastic neural networks.
During RPL, our policy is optimized by the PO-TRPO algorithm, which is derived based on the recent advances in
deep reinforcement learning (DRL) [39], [40]. DRL exploits
the massive representation power of deep neural networks
(DNN) [41] to build a complex yet sophisticated decision
model, with which an agent can directly learn from raw signals
instead of carefully crafted feature and tends to act more
intelligently. Recently, there are several attempts in using DNN
and DRL for robot navigation. For example, an end-to-end
motion planner is learned in [42] to map raw sensor data of a
laser range finder onto steering commands of a mobile robot.
In [43], a decentralized multi-agent collision avoidance policy
is learned via DRL, which can be thought as a DRL version of
the original RVO approach [8]. Finally, a target-driven visual
navigation policy for home environment is learned in [44] via
DRL. They create a set 3D virtual home environments for
effective and efficient training of the agent, which shares a
similar idea with our proposed RPL scheme.
III. P ROBLEM F ORMULATION
To formulate the problem of socially concomitant navigation, we gives the following rules of SCN:
1) The robot should reach its goal as fast as possible;
2) The robot should not collide with any of the pedestrians
or its companion, or run into any obstacle;
3) The robot should not run too far away from its companion.
The above rules serve as a generic description of the robotโs
desired performance during navigation. To give concrete definitions, consider the navigation process as an infinite-horizon
discounted POMDP in discrete time, defined by the tuple
(S, A, F, O, p0 , r, ฮณ). S is a finite set of states s reflecting
the navigation status of the robot. A is a finite set of actions
a. In this paper, it is defined as a twosome of the translational
and rotational velocities of a synchro-drive mobile robot, i.e.,
a = [vT , vR ]. F : S ร A โ S is state-transition mapping,
which is characterized by the dynamics of the robot, the other
humans and the environment. Without loss of generality, we
assume deterministic state transition, i.e., si+1 = F (si , ai ),
where si , ai are the state and action taken at time ti . O is the
set of the robotโs observation o to the state s and ฮฒ(o|s) denotes the conditional observation probability distribution. Note
that, in practice, the robotโs observation has only incomplete
access to s or is subject to certain measurement noise, which
implies o 6= s. p0 : S โ R is the initial state distribution, i.e.,
s0 โผ p0 . r : S โ R is a scalar reward given to the robot and
ฮณ โ (0, 1] is the reward discount factor.
Robot motion dynamics: In this paper, synchro-drive
mobile robots are considered, whose motion equation can
be approximated by assuming the robotโs velocities to be
constant within a certain short time period [ti , ti+1 ] [1] with
length โt = ti+1 โ ti . Particularly, let ฯr (ti ) and ฯr (ti ) =
[xr (ti ), yr (ti )] denote the robotโs heading and its positions in
a 2D Cartesian space at time ti , respectively. vT (ti ) โ [0, vฬT ]
and vR (ti ) โ [โvฬR , vฬR ] represent the robotโs translational
and rotational velocities. Define โxr = xr (ti+1 ) โ xr (ti )
and โyr = yr (ti+1 ) โ yr (ti ). When the robot has nonzero
rotational velocity, i.e., vR (ti ) 6= 0, we have
vT (ti )(sin ฯr (ti ) โ sin(ฯr (ti ) + vR (ti )โt))
(1)
vR (ti )
vT (ti )(cos ฯr (ti ) โ cos(ฯr (ti ) + vR (ti )โt))
โyr =
(2)
vR (ti )
โxr = โ
Otherwise, when vR (ti ) = 0,
โxr
=
vT (ti ) cos ฯr (ti )
(3)
โyr
=
vT (ti ) sin ฯr (ti )
(4)
With the above formulations, our goal is optimizing a
stochastic navigation policy Pฮธ : O ร A โ [0, 1] with
parameters ฮธ in order to maximize the expected discounted
reward:
ฮท(Pฮธ ) = Eฯ [
โ
X
ฮณ i r(si , ai )]
(5)
i=0
where ฯ = (s0 , o0 , a0 , s1 , o1 , a1 , ยท ยท ยท ) denotes the whole trajectory and ai โผ Pฮธ (ai |oi ). The specific definitions of the
above ingredients for SCN will be elaborated as follows:
State: Given ฯr and ฯr , define the distance d and direction
ฯ of a point ฯ = [x, y] to the robot as follows:
p
d(ฯ) =
(x โ xr )2 + (y โ yr )2
(6)
y โ yr
) โ ฯr
(7)
ฯ(ฯ) = arctan(
x โ xr
Then, the robotโs distance to the goal located at ฯg =
[xg , yg ] are computed as dg = d(ฯg ) and ฯg = ฯ(ฯg ) denotes
the offset angle between the robotโs current heading ฯr and
its goal. Similarly, we can define the twosomes (djped , ฯjped ),
4
(djcom , ฯjcom ) or (djobs , ฯjobs ) to describe the relative position
of a pedestrians ฯjped , a companion ฯjcom or an obstacle ฯjobs
to the robot. With such definitions, the state s is defined to
incorporate the information related to the robotโs navigation
status as follows:
s = [dg , ฯg , a, pped , pcom , pobs ]
(8)
where a is the current action vector and
n
n
ped
ped
]
, ฯped
pped = [d1ped , ฯ1ped , ยท ยท ยท , dped
(9)
pcom = [dcom , ฯcom ]
(10)
Lโ
Lโ
Rโ
Rโ
L+ L+
R+ R+
pobs = [dF
obs , dobs , ฯobs , dobs , ฯobs , dobs , ฯobs , dobs , ฯobs ](11)
The vector pped includes the distances and directions of nped
closest pedestrians while pcom includes those of the robotโs
companion.
The vector pobs is a compact description to the robotโs
perception of the surrounding environment. Particularly, the
boundaries of the occupied space (obstacles) in the environment are represented as a finite point set Z =
{ฯ1obs , ฯ2obs , ยท ยท ยท , ฯjobs , ยท ยท ยท }. Then, the 9 variables in pobs are
defined based on the following assumption
Assumption 1: An obstacle ฯobs โ Z has no effect on the
robotโs navigation decision if it satisfies d(ฯobs ) > dยฏobs , where
dยฏobs is a predefined finite constant.
By Assumption 1, it is sufficient to consider only obstacles
in Z that are closed enough to the robot, whose distances are
less than dยฏobs . In practice, this limit may correspond to the
robotโs perception range. Let
Zฬ = {ฯ|ฯ โ Z, dฯ โค dยฏobs }
(12)
The components in vector pobs are described as follows:
The distance to the nearest obstacle located at heading of
the robot, i.e.,
dF
obs =
min
ฯโZฬ and |ฯ(ฯ)|โควซฯ
d(ฯ)
(13)
where วซฯ is a small constant.
L
R
R
For dL
obs , ฯobs , dobs , ฯobs , they represent the distance and
direction of the closest and farthest obstacles on the robotโs
R
left (ฯL
obs ) and right side (ฯobs ), respectively, which are defined
mathematically as follows:
โ
ฯL
obs
=
arg min
d(ฯ)
(14)
ฯโZฬ and ฯ(ฯ)>วซฯ
โ
ฯR
obs
=
arg min
d(ฯ)
Fig. 1: Illustration of the state variables in Eq. (8). The blue,
yellow and green circles represent the robot, its companion
(Com.) and the pedestrians (Ped.) respectively. The red dashed
circle with a radii dยฏobs represents the boundary of the set
Zฬ in Eq. 12. The black arrow shows the current heading
of the robot. Considering the robotโs current position as the
origin, the polar coordinates of the pedestrians, the companion,
the closest( and the farthest) obstacles in each direction are
compactly represented as vectors pped , pcom , pobs .
account in order to develop a robust and practical navigation
system. To this end, we define o as the robotโs observation to
the true state s as follows:
o = [dg , ฯg , a, pฬped , pฬcom , pฬobs ]
By Eq. (18), we assume that the robot has accurate information
about the goal position and its current taken action (i.e., the
velocity commands output to the robotโs motor) while its
observations to pped , pcom , pobs may be imperfect. Particularly,
consider the Field of Views (FoVs) for the robotโs pedestrian
and obstacle detectors illustrated as Fig. 2.
Mathematically, let finite point sets Fped and Fobs denote
the current FoVs of pedestrian and obstacle detectors, characโ
+
+
โ
+
terized by threesomes (ฯ+
ped , ฯped , dped ) and (ฯobs , ฯobs , dobs ),
respectively. The robotโs observations to the pedestriansโ relative positions are obtained as
(15)
nped
nped
]
, ฯฬped
pฬped = [dห1ped , ฯฬ1ped , ยท ยท ยท , dหped
ฯโZฬ and ฯ(ฯ)<โวซฯ
+
ฯL
obs
=
arg max
d(ฯ)
(16)
=
arg max
d(ฯ)
dหjped
(17)
ฯโZฬ and ฯ(ฯ)<โวซฯ
Then, the variables in pobs can be simply determined as the
distance and directions of the above points according to Eqs.
(6) and (7). Figure. 1 provides a comprehensive illustration of
the state variables pped , pcom and pobs .
Observation: As discussed in the previous sections, sensors
mounted on the robot are always subject to various kinds of
limitation and measurement noise, which must be taken into
(19)
where
ฯโZฬ and ฯ(ฯ)>วซฯ
+
ฯR
obs
(18)
=
(
djped + dหped , if ฯjped โ Fped
d+
else
ped ,
(20)
ฯjped , if ฯjped โ Fped
ฯ,
if else
(21)
and
ฯฬjped
=
for j = 1, ยท ยท ยท , nped , with dหped being the measurement
noise/error.
5
Fig. 2: Field of Views of the pedestrians (green) and obstacles
(blue) detectors. The arrow (ฯ = 0) points towards the
+
current heading of the robot. The constants ฯ+
ped , ฯobs and
โ
โ
ฯped , ฯobs denote the maximum and minimum offset angles
+
in the corresponding FoVs. Finally, d+
ped and dobs represent
the maximum detection ranges for the pedestrian and obstacle
detectors, respectively. The values of these constants should
be determined according the specific configurations of the
robotโs sensor and the corresponding detection algorithms.
Any pedestrian/obstacle outside the FoVs is not observable
and therefore will be omitted.
sensors, such as range sensors [45], [46], RGB-D [47], Timeof-Flight (ToF) [48] and omnidirectional cameras [49], as long
as the interested positions can be extracted/estimated from the
sensorโs raw measurements.
Remark 3: The mathematical definitions of the variables in
observations pฬped , pฬcom , pฬobs are given for better understanding
and are required only in the simulative RPL process. In
practice, it is clear that these values can be directly measured
via the robotโs onboard sensors without accessing the actual
2-D Cartesian coordinates [x, y] of the considered point sets
(e.g., Z, Fped and Fobs ). For example, consider a robot equipped
with a laser range finder. These distances and offset angles can
be easily obtained from the returned ranges array[50].
Reward function: A scalar reward will be given to the robot
as an award of reaching the goal or a penalty of colliding with
obstacles/pedestrians/companions or losing its companions.
Particularly, at time ti , the process of SCN will be terminated
if any of the following three termination conditions is true.
1) Goal Reaching Condition
dg (ti ) โค 0.8
(29)
2) Collision Conditions
Similarly, define
pฬobs =
หLโ Lโ หRโ Rโ หL+ L+ หR+ R+
[dหF
obs , dobs , ฯฬobs , dobs , ฯฬobs , dobs , ฯฬobs , dobs , ฯฬobs ]
(22)
Compared to the states in (13) to (17), only the obstacles
within Fobs are observable. Thus, dหF
obs is formulated as
dหF
obs =
min
ฯโZฬโฉFobs and |ฯ(ฯ)|โควซฯ
d(ฯ) + dหobs
(23)
where dหobs is the measurement noise/error for obstacle detection. The closest observed obstacles on the robotโs left and
right sides are defined in a similar way as:
โ
ฯฬL
obs
=
arg min
d(ฯ) + dหobs
(24)
ฯโZฬโฉFobs and ฯ(ฯ)>วซฯ
โ
ฯฬR
obs
=
d(ฯ) + dหobs
arg min
(25)
ฯโZฬโฉFobs and ฯ(ฯ)<โวซฯ
+
ฯฬL
obs
=
arg max
d(ฯ) + dหobs
(26)
ฯโZฬโฉFobs and ฯ(ฯ)>วซฯ
+
ฯฬR
obs
=
arg max
d(ฯ) + dหobs
(27)
ฯโZฬโฉFobs and ฯ(ฯ)<โวซฯ
Then, their distance and directions to the robot are calculated
using Eqs. (6) and (7). For observation to the robotโs companions, we rely on the following assumptions.
com
Assumption 2: The companions ฯ1com , ยท ยท ยท , ฯncom
are always
observable to the robot.
Then, pฬcom = [dหcom , ฯcom ], where
dหcom = dcom + dหcom
(28)
Remark 1: By Eqs. (20) and (23) to (28), it is implied
that the observation/measurement noises dหped , dหobs and dหcom are
additive and independent in different observations. A typical
example of such noise is the Additive Gaussian White Noise
(AGWN).
Remark 2: Our general formulations of states (8) and
observations (18) are applicable to various types of onboard
min djped (ti )
โค 0.4
(30)
dcom (ti )
โ
Lโ
F
min(dobs (ti ), dobs (ti ), dR
obs (ti ))
โค 0.4
(31)
โค 0.2
(32)
j
3) Stray Condition
dcom (ti ) โฅ 2
Based on the above three
will be given to the robot as
๏ฃฑ
10000,
๏ฃด
๏ฃด
๏ฃฒ
โ10000,
r=
๏ฃด
๏ฃด
๏ฃณ
โ10|vR |,
(33)
terminal conditions, a reward r
follows:
if (29)
if (30) or (31) or
((32) or (33)
else
(34)
Clearly, a positive reward will be given to the robot if it
reaches its goal and it will receive a large negative reward
if it collides with anything or be stray from its companion.
Otherwise, the robot will receive an intermediate reward
โ10|vR |, which penalizes the robot for its rotational velocity
to encourage a smoother trajectory with less turning behaviors.
IV. ROLE P LAYING L EARNING
In this section, we described the RPL scheme to learn an
effective navigation policy Pฮธ (a|o) for SCN in an efficient
data-driven manner. The core idea is to transform the crowd
trajectories data collected from real-world into a simulative
and dynamic navigation environment, where the robot can
play itself as a virtual pedestrian and iteratively improve
the performance of Pฮธ (a|o) via Partially Observable Trusted
Region Policy Optimization (PO-TRPO).
Consider a set of simulative navigation environment E =
{E1 , ยท ยท ยท , Ej , ยท ยท ยท }. Each environment Ej = (Tj , Mj ) contains
a set of pedestrian trajectories Tj = {ฯk0:Tk } and a binary
map Mj that annotates the 2-D Cartesian coordinates of
6
obstacles/occupied space in the environment. With E, the
abstract process of RPL is described by the following pseudo
codes in Algorithm 1.
Algorithm 1 Role Playing Learning
Initialize navigation policy Pฮธ
for Iter = 0, 1, ยท ยท ยท , MaxIter do
while Number of collected sample time steps โค
Batch size do
Randomly choose an environment Ej from E and then
a trajectory ฯk0:Tk from Tj .
Initialize the robotโs position at ฯk0 and initial velocities
[vT , vR ] = [0, 0]. Set ฯg = ฯkTk . Choose the robotโs
heading such that ฯg = 0.
Choose SCN Mode with probability 0.5
if SCN Mode then
Assign ฯkT0 :Tk as the trajectory of the robotโs companion, where T0 = arg minT โฒ kฯkT โฒ โ ฯkTk k โฅ 0.6
else
Create a synthesized companion that moves along
the robot
end if
Assign all other trajectories in Tj as pedestrians.
while None of the termination conditions in (29) to
(33) is satisfied do
Update the states and observations of the robot
according to Eqs. (8) and (18).
Let the robot execute its policy Pฮธ .
Update the robotโs position according to dynamics
(1) to (4)
Calculate the current reward from Eq. (34)
Update the positions of the companion and pedestrians according to the trajectories in Tj .
end while
end while
Update Pฮธ using PO-TRPO.
end for
Companion Synthesization in non-SCN mode: As described in Algorithm 1, RPL actually incorporates two different navigation scenarios: the SCN proposed in this paper and
the traditional social navigation scenario, where the robot has
no human companion. This helps develop a navigation policy
adaptable to both situations, with no restrictive assumption
on the existence of companion. Particularly, the companion
position vector pcom and its observation pฬcom are synthesized,
with dcom = dหcom = 0.8 for every time step while ฯcom = ฯg .
It is clear that the synthesized pcom is equivalent to the situation
where the companion is travelling non-distractively along the
robot with a constant distance and guarantee that termination
conditions (31) and (33) are always false.
On the other hand, in SCN mode, the companion is assigned
with a truncated trajectory ฯkT0 :Tk such that the initial robotcompanion distance is sufficiently large.
In this paper, we construct a deep policy neural network
to parameterize the navigation policy Pฮธ , whose structure is
shown in Fig. 3. The policy network Pฮธ is to be trained with
the Trust Region Policy Optimization (TRPO) [40] method.
Fig. 3: Structure of the deep policy network Pฮธ . At time ti , the
observation vector oi is input to the feature network, which
is a feedforward multi-layer perceptron (MLP). The output of
the feature network is then fed to a LSTM network [51], a
recurrent network for aggregation of the information collected
through the navigation process. The LSTM networkโs outputs
are assigned as the mean vector ยต โ R2 of the diagonal
Gaussian unit N (ยต, ฮฃ) on the right. The covariance matrix
ฮฃ = ฯ 2 I โ R2ร2 , however, is independent of oi amd it is
designed to be gradually decreasing during training and fixed
during tests and experiments. Finally, the actions ai = [vT , VR ]
are drawn according to N (ยต, ฮฃ).
However, the original TRPO method is derived based on fully
observable MDP, which can not be directly applied to our
problem due to the imperfect observation in our formulation
and practice. Thus, we proposed to extend the original TRPO
algorithm as PO-TRPO, which will be described in the following subsections.
A. Trusted Region Policy Optimization
The TRPO [40] algorithm is an effective on-policy optimization method for large nonlinear policies and tends to give
monotonic improvement during the iterative optimization process. To be specific, a fully observable MDP is considered by
TRPO and therefore the policy to be optimized is formulated
as Pฮพโ (a|s), where ฮพ is the parameter vector of the policy P โ .
Note that, Pฮพโ (a|s) determines the action a directly from the
true state s, which differs from our observation-based policy
Pฮธ (a|o). Let us consider the following standard definitions of
the state-action value function Qฮพ (si , ai ), the value function
Vฮพ (si ) and the advantage function Aฮพ (si , ai ):
Qฮพ (si , ai ) = Esi+1 ,ai+1 ,ยทยทยท [
โ
X
ฮณ l r(si+l )],
(35)
l=0
Vฮพ (si ) = Eai ,si+1 ,ยทยทยท [
โ
X
ฮณ l r(si+l )],
(36)
l=0
Aฮพ (si , ai ) = Qฮพ (si , ai ) โ Vฮพ (si )
(37)
ai โผ Pฮพโ (a|s), si+1 = F (si , ai )
(38)
where
In addition, define ฮฝฮพ as the discounted visitation frequencies
ฮฝฮพ (s) = p(s0 = s) + ฮณp(s1 = s) + ฮณ 2 p(s2 = s) + ยท ยท ยท (39)
where s0 โผ p0 , ai and siโฅ1 are generated according to Pฮพโ and
F . Let ฮพ โ denote the old parameters in last iteration. TRPO
proposes to optimize the parameters ฮพ iteratively regarding the
following objective function:
7
Algorithm 2 PO-TRPO
maximize
subject to
Esโผฮฝฮพโ ,aโผqโ [
Pฮพโ (a|s)
q(a|s) Aฮพ (a|s)]
โ
Esโผฮฝฮพโ [DKL (Pฮพโ (ยท|s) k Pฮพโ (ยท|s))] โค
(40)
โ
วซ
(41)
where q โ (a|s) is the importance sampling distribution and
DKL (Pฮพโโ k Pฮพโ ) is the Kullback-Leibler divergence between
the old and current policies.
Compute the estimated advantages Aฬi for all time steps
using GAE with the estimated value function Vฬฮถ .
Update ฮธ with objective function (49) and constraints (50)
Update ฮถ with objective function (47) and constraints (48)
V. S IMULATION
B. Partially Observable TRPO
As mentioned, our navigation problem is considered as a
POMDP. The policy Pฮธ (ai |oi ) depends on the observation oi
instead of the true state. Therefore, we write the objective
function (40) and the constraint (41) as
maximize
subject to
Esโผฮฝฮธโ ,a,oโผq [
P
o
ฮฒ(o|s)Pฮธ (a|o)
Aฮธโ (a|s)]
q(a,o|s)
Esโผฮฝฮธโ [DKL (Pฮธโ (ยท|o) k Pฮธ (ยท|o))] โค วซ
(42)
(43)
For PO-TRPO, samples are collected by executing the old
policy Pฮธโ (a|o) to generate a set of trajectories, such as
s0 , o0 , a0 , s1 , o1 , a1 , ยท ยท ยท , sT โ1 , oT โ1 , aT โ1 , sT . Therefore,
q(ai , oi |si ) = ฮฒ(oi |si )Pฮธโ (ai |oi )
(44)
where i = 0, ยท ยท ยท , T โ 1.
Next, for a trajectory s0:T , we use the generalized advantage
estimation (GAE) [39] to construct an empirical estimation Aฬ
of the advantage function Aฮธโ (ai |si ) as the following:
Aฬi =
T
โi
X
V
(ฮณฮป)l ฮดi+l
(45)
l=0
where
ฮดiV = ri + ฮณ Vฬฮถ (si+1 ) โ Vฬฮถ (si )
(46)
As a data-driven approach, our deep neural network policy
requires a massive amount of data to learn the socially
concomitant navigation behavior. In this section, we describe
how to construct a simulative environment according to the
proposed RPL scheme. Particularly, the environments, the
deep neural network policy and the PO-TRPO algorithm
(Algorithm 2) are developed under the framework of RLLAB
[53]. We make use of trajectories of interacting pedestrians
collected from five different data sets, which includes the
ETH and Hotel video clips from the ETH Walking Pedestrians
(EWAP) [11], the motion capture (MC) data set from [14], as
well as the Zara and UCY video clips from [32]. Note that,
the Zara and UCY data sets have multiple subsets: Zara01,
Zara02, Zara03, UCY01 and UCY03. Thus, there are totally
8 different RPL environments, i.e., E = {E1 , ยท ยท ยท , E8 }. The
details of these 8 environments are summarized in Tab. I.
TABLE I: Details of the 8 RPL environments
Name
No. Trajectories
Name
No. Trajectories
ETH
365
Zara02
204
Hotel
420
Zara03
137
MC
324
UCY01
413
Zara01
148
UCY03
434
Each trajectory in these environment provides the ID and
a sequences of 2-D Cartesian positions of a pedestrian with
a sampling period โt = 0.1 second. In addition, eight binary
grid maps M1 , ยท ยท ยท , M8 representing the occupied space/static
obstacles are given. However, these maps are kept unknown
to the robot throughout training and evaluation. They are only
used to simulate the robotโs perception to the environment as
the state pobs and observation pฬobs . Without loss of generality,
1ฮถ
we use the ETH data set as the evaluation environment and
Finally, as the conditional observation probability distribuall other data sets in the Tab. I as training environments. In
tion ฮฒ(o|s) is independent of parameters ฮธ and time, we obtain
other words, the learned policyโs performance will be assessed
an estimation of the objective function (42) and the constraints
in an RPL environment that is excluded during training,
(43) by replacing the expectations with sample averages as:
which reflects whether it can properly generalize to uncovered
PK PTk Pฮธ (aki |oki ) k
1
(49) situations.
maximize Jฮธ = PK T
k Aฬi
k=1
i=0 Pฮธโ (ak
i |oi )
k=1 k
As some of the trajectories in these environments are
ฮธโ
subject to
DฬKL
(Pฮธโ , Pฮธ ) โค วซ
(50) of people who were wandering or remained approximately
stationary, they are excluded from the candidates of the robotโs
where
companion but will still be considered as pedestrians when the
Tk
K X
X
1
ฮธโ
k
k
DฬKL (Pฮธโ , Pฮธ ) = PK
DKL (Pฮธโ (ยท|oi ) k Pฮธ (ยท|oi ))] robot is navigating in the same environment.
We use a feed-forward neural network with 2 hidden layers
T
k=1 k k=1 i=0
(51) as the feature network in our NN policy, containing 256 and
which has the same form as the one obtained in [39], except 64 Tanh units, respectively. Its output is then fed to a LSTM
that the policy Pฮธ (a|o) is conditioned on observation o instead. network with 64 units. The variance of of the Gaussian output
Finally, the constrained optimization problem described in unit ฯ is chosen to be linearly decaying from 0.5 to 0.05 in 100
(49) and (50) is solved by conjugate gradient algorithm [52] training iterations, which effectively encourages exploration
algorithm. To summarize, the pseudo code for PO-TRPO during the early stage of learning and ensures convergence
update in Algorithm 1 is given as below:
of the navigation policy. For GAE, a 3 layer feed-forward
and Vฬฮถ (si ) is the estimation of the value function (36) with
parameters ฮถ (and ฮถ โ being the old parameters). By collecting
a set of K trajectories {sk0:Tk , ok0:Tk , ak0:Tk }K
k=1 , Vฬฮถ is obtained
by solving the following constrained regression problem [39]:
PK PTk
PTk โi l k 2
minimize J1ฮถ = k=1 i=0
kVฬฮถ (ski )โ l=0
ฮณ ri+l k (47)
PK PTk kVฮถ (ski )โVฮถโ (ski )k
โค วซ1
(48)
subject to
k=1
i=0
2J โ
8
network with 256,64,16 Tanh units are used, with ฮณ = 0.995
and ฮป = 0.96. The update step size for policy network is
adaptively chosen as วซ = 0.01/ฯ. For GAE update, a fixed
step size วซ1 = 0.1 is used. The update batch size (Batch size
in Algorithm 1) is 50000.
In RPL, we consider at most 3 pedestrians (i.e., np = 3).
Thus, the state pped and observation pฬped will only describe
the 3 closest pedestrians and omit the others. For the situation where less that 3 pedestrians are perceived, dummy
static pedestrians will be created in the remote corner of the
environment so as to maintain the dimensions of pped and pฬped .
Considering a Kobuki Turtlebot 2 with a Hokuyo URG04LX laser range finder [50] mounted on its top, we specify
the sensor limitation of the robot in simulation as follows:
2ฯ
(52)
ฯ+
= ฯ+
ped
obs =
3
2ฯ
ฯโ
= ฯโ
(53)
ped
obs = โ
3
The measurement noises dหped , dหcom and dหobs are modeled
2
2
2
by zero-mean Gaussian N (0, ฯped
), N (0, ฯcom
) and N (0, ฯobs
)
with their variances specified as follows:
ฯped
ฯcom
ฯobs
=
0.01djped
(54)
=
=
0.01djcom
0.01djobs
(55)
(56)
Finally, the maximum translational and rotational velocities
are assigned as 0.7m/s and ฯ3 rad/s, i.e., 0 โค vT โค 0.7 and
|vR | โค ฯ3 and โt = 0.1. An example of our RPL environment
constructed from the ETH data set is illustrated in Fig. 4
(a) Real-world Environment
A. Results
We trained our deep policy network for 1200 iterations with
the data from RPL environments except for the held-out ETH
environment. The curve of average discounted return obtained
from each batch of trajectories is visualized in Fig. 5
Fig. 5: Average discounted return as RPL progresses
We compare the performance of our policy with a planner
based on RVO [8], where the robot, its companion and the
surrounding pedestrians are treated agents. In every time steps,
the positions and velocities of all agents are given to the
planner. Note that, for fair comparison, the agentsโ positions
are subject to noise described in (54) and (55). For observations to obstacles, we assume the planner has full and perfect
knowledge as required in the original RVO algorithm. With
this protocol, we update the robotโs position according to the
plannerโs output and update the positions of the other agents
according to their own trajectories in the RPL environments.
The same termination conditions in Section III are applied
to the robot directed by the RVO-based planner to determine
whether the robot has conducted an successful navigation. For
both of our policy and the RVO-based planner, we conduct 300
trials in the evaluation environment and compute the rates (in
percentages) of different terminal conditions (RG: the robot
reaches the goal successfully; HC/HP/HO: the robot hits a
companion/pedestrian/obstacle; and LC: the robot loses its
companion). The performance statistics of our policy and the
RVO-based planner in SCN scenarios are listed in Tab. II.
(b) Simulative Environment for RPL
Fig. 4: An illustrative example our RPL simulative environment. The black curve represents the trajectory of the robot
navigating toward its goal (the red dot). The yellow curve
denotes the trajectory of the robotโs companion. Besides, there
are a number of blue curves representing the pedestrians
perceived by the robot and the green lines denotes the fences
around the entrance of the university (bottom center). Note
that, all trajectories of pedestrians are not synthesized but
captured from the video. Thus, the robot can be thought as
playing a role as an extra person in an realistic environment.
TABLE II: Rates of different terminal conditions of our policy
and RVO-based planner in SCN scenarios
Terminal Condition
Our policy
RVO
RG
77
29.7
LC
5.7
47
HC
6.7
0.3
HP
9.6
23
HO
1
0
It can bee seen from Tab. II that our policy performs much
better than the RVO-based planner in SCN. The RVO-based
planner has a much lower success rate (29.7%) while its rate of
LC is 47%, suggesting that it frequently losses its companion
in SCN. Clearly, this is due to the fact that RVO is in nature a
collision avoidance algorithm. Thus, it simply takes the robotโs
9
companion as another normal agent and the robot tends to
stay far behind its companion to avoid collision instead of
actively following it. On the contrary, our policy achieves a
much higher success rate (77%). This indicates that it learns to
effectively balance the objectives of SCN so that the robot is
able to reach the prescribed goal while maintaining its distance
to its companion and avoiding collision with other agents in
the environment.
In addition to SCN, the scenarios without companion are
also tested, which, as analyzed in the previous sections,
reduces to the traditional social navigation scenarios. The
comparative results are shown in Tab. III.
TABLE III: Rates of different terminal conditions of our
policy and RVO-based planner in traditional social navigation
scenarios
Terminal Condition
Our policy
RVO
RG
84
80
HP
13.7
18
Fig. 6: The narrow corridor where experiments are performed
HO
2.3
2
For situations without companion, our policy still outperforms the RVO-based planner with higher success rate (84%
to 80%) and lower HP rate (13.7% to 18%).
Finally, it is worth noting that the RVO-based planner
requires velocities of the companion/pedestrians and an accurate global map of the static obstacles. Conversely, our
policy depends only on position measurements that are directly
accessible from the robotโs onboard sensors, which is therefore
much simpler and more practical.
(a) Trajectories of the robot (moving from left to right) and other two
pedestrians (moving from right to left).
VI. E XPERIMENTS
In experiments, we assess the performance of our developed
navigation policy by comparing it with humans in the same
scenarios. Particularly, a robot and a human are to repeat each
specific navigation scenario for 10 times, respectively. Then,
the the following two metrics are calculated:
1) Average minimum distance to the pedestrians (Dฬped ):
the average of the minimum distance between the
robot/compared human to other pedestrians throughout
a trajectory .
2) Average maximum distance to the companion (Dฬcom ):
the average of the maximum distance between the
robot/compared human to its/his companion throughout
a trajectory.
We use the same mobile platform (a synchron-drive Turtlebot 2 with a Kobuki base) and the same laser range finder
(Hokuyo URG-04LX) simulated in last section. For pedestrian
detection and localization, we adopt the ROS-compatible leg
tracker in [54]. We use an ultra wideband (UWB) indoor positioning system to localize the companion and the navigation
goal, which can then be easily mapped to the observations
pฬcom and dg , ฯg based on the odometry of the robot. Finally, a
laptop is placed onboard as the processing unit and the policy
is operated with a period of 0.1 second. The experiments are
conducted in a narrow corridor with width of 1.56 meters
as shown in Fig. 6, which is a typical scenario that requires
pedestrians to navigate cooperatively.
(b) Human control experiment in a similar navigation scenario. The black
trajectory is from left to right and the other two are from right to left.
Fig. 7: Comparison between the robot with our policy and
human control experiment in a social navigation scenario
A. Scenario 1: Traditional Social Navigation
In this subsection, we examine our methodโs performance
in traditional social navigation scenario. Particularly, the robot
is required to pass the corridor with two oncoming pedestrians
and arrive at a goal that is 7 meters ahead. In addition, a control
experiment of 3 humans (one as the compared human and the
other two as pedestrians) is conducted in the same space. The
metric Dฬped is computed. Example trajectories of the robot
and the human control are shown in Fig. 7. In the robotic
experiments, the trajectories of pedestrians are obtained from
the robotโs laser range finder while the robotโs trajectory is
based on its own odometry sensor. On the other hand, all
trajectories in the human control experiments are captured
using the UWB localization system.
From Fig. 7, it is clear that the robot with our policy is
10
able understand humanโs cooperative behavior for collision
avoidance and navigate in an appropriate manner such that
both itself and the other two pedestrians can successfully pass
through the corridor. Specifically, when observing the two
pedestrians (blue and purple) 4 meters ahead. The robot started
to approach the wall on its left side so as to create free space
on the right for the pedestrians to smoothly walk through. By
comparing both figures in Fig. 7, we can see that the robot
is as proactive as human since both black trajectories in Fig.
7(a) and Fig. 7(b) started to make space for the oncoming
pedestrians at the early stage of cooperative avoidance process.
As for the performance metrics, the average minimal distance
to pedestrians for our robot is Dฬped = 0.35m. Although
it is smaller than that of the human control experiments
(Dฬped =0.56m), this value still indicates a safe and decent
navigation behavior of our robot as its radius is only 0.17m.
(a) Trajectories of the robot and its companion (moving from left to right)
and a pedestrian (moving from right to left).
B. Scenario 2: Socially Concomitant Navigation
In this subsection, the scenario of SCN is studied. A human
companion initially standing in front of the robot will start to
walk through the same corridor while another pedestrian is
passing from the other end. As described in the previous sections, the robot with our policy should closely navigate with its
companion and avoid the oncoming pedestrian cooperatively.
An additional metric Dฬcom is used to evaluate the performance
of our policy by comparing with the statistics obtained from
another 10 human control experiments. Example trajectories
are shown in Fig. 8 and the performance metrics Dฬped and
Dฬcom are summarized in Tab. IV.
TABLE IV: Performance metrics of the robot and human
controls in SCN scenarios
Robot
Compared Human
Dฬped (m)
0.49
0.37
Dฬcom (m)
1.05
1
As shown in Fig. 8 and Tab. IV, the robot is able to achieve
both objectives of SCN. On one hand, it is effectively engaged into the joint collision avoidance process. The resulted
behavior is similar to that observed in the last subsection
and the robot even has a slightly larger Dฬped . On the other
hand, the average maximum distance Dฬcom is 1.05m, which
is within the limit (2m) we specified in the learning process
and nearly the same as that of the compared human, showing
that the robot can actively navigate along with its companion
instead of deviating to other areas or lagging itself behind.
This shows that the robot driven by our policy is able to
understand the pace of its companion and achieve a similar
sense of companionship in terms of distance.
In sum, the above results demonstrate the practical efficacy
of our methods for both the traditional social navigation and
the more complicated SCN scenarios. It proves that the policy
learned from our RPL simulative environment is transferable
to uncovered real-world situations.
VII. C ONCLUSIONS
In this paper, the problem of socially concomitant navigation
(SCN) has been investigated and formulated under a POMDP
(b) Human control experiment in a similar SCN. The black (compared human)
and orange (companion) trajectories are from left to right and the blue
(pedestrian) trajectory is from right to left.
Fig. 8: Comparison between the robot with our policy and
human control experiment in a SCN scenario
framework, with explicit considerations of the limitation and
inaccuracy of mobile robotsโ onboard sensors. The Partially
Observable TRPO (PO-TRPO) algorithm has been proposed
for optimization of navigation policies. The Role Playing
Learning (RPL) scheme has been developed to enable efficient
and safe reinforcement learning of navigation policies by
mirroring a large amount of real-world pedestrian trajectories into simulative environments. Comparative simulation
and experiment studies have demonstrated the efficacy and
superiority of our policy in both SCN and traditional social
navigation scenarios.
R EFERENCES
[1] D. F. W. B. S. Thrun, D. Fox, and W. Burgard, โThe dynamic window
approach to collision avoidance,โ IEEE Transactions on Robotics and
Automation, vol. 4, p. 1, 1997.
[2] Y. K. Hwang and N. Ahuja, โA potential field approach to path
planning,โ IEEE Transactions on Robotics and Automation, vol. 8, no. 1,
pp. 23โ32, 1992.
[3] S. S. Ge and Y. J. Cui, โNew potential functions for mobile robot path
planning,โ IEEE Transactions on robotics and automation, vol. 16, no. 5,
pp. 615โ620, 2000.
[4] P. Trautman and A. Krause, โUnfreezing the robot: Navigation in dense,
interacting crowds,โ in Intelligent Robots and Systems (IROS), 2010
IEEE/RSJ International Conference on, 2010, pp. 797โ803.
[5] P. Trautman, J. Ma, R. M. Murray, and A. Krause, โRobot navigation
in dense human crowds: Statistical models and experimental studies
of humanโrobot cooperation,โ The International Journal of Robotics
Research, vol. 34, no. 3, pp. 335โ356, 2015.
[6] D. Helbing and P. Molnar, โSocial force model for pedestrian dynamics,โ
Physical review E, vol. 51, no. 5, p. 4282, 1995.
[7] D. Helbing, I. Farkas, and T. Vicsek, โSimulating dynamical features of
escape panic,โ Nature, vol. 407, no. 6803, pp. 487โ490, 2000.
11
[8] J. Van Den Berg, S. J. Guy, M. Lin, and D. Manocha, โReciprocal nbody collision avoidance,โ in Robotics research, 2011, pp. 3โ19.
[9] J. Van Den Berg, P. Abbeel, and K. Goldberg, โLqg-mp: Optimized
path planning for robots with motion uncertainty and imperfect state
information,โ The International Journal of Robotics Research, vol. 30,
no. 7, pp. 895โ913, 2011.
[10] J. Van den Berg, M. Lin, and D. Manocha, โReciprocal velocity obstacles
for real-time multi-agent navigation,โ in Robotics and Automation, 2008.
ICRA 2008. IEEE International Conference on, 2008, pp. 1928โ1935.
[11] S. Pellegrini, A. Ess, K. Schindler, and L. Van Gool, โYouโll never walk
alone: Modeling social behavior for multi-target tracking,โ in 2009 IEEE
12th International Conference on Computer Vision, 2009, pp. 261โ268.
[12] K. Yamaguchi, A. C. Berg, L. E. Ortiz, and T. L. Berg, โWho are
you with and where are you going?โ in Computer Vision and Pattern
Recognition (CVPR), 2011 IEEE Conference on, 2011, pp. 1345โ1352.
[13] M. Kuderer, H. Kretzschmar, C. Sprunk, and W. Burgard, โFeature-based
prediction of trajectories for socially compliant navigation.โ in Robotics:
science and systems, 2012.
[14] H. Kretzschmar, M. Spies, C. Sprunk, and W. Burgard, โSocially
compliant mobile robot navigation via inverse reinforcement learning,โ
The International Journal of Robotics Research, p. 0278364915619772,
2016.
[15] B. Kim and J. Pineau, โSocially adaptive path planning in human environments using inverse reinforcement learning,โ International Journal
of Social Robotics, vol. 8, no. 1, pp. 51โ66, 2016.
[16] A. Bicchi, A. Fagiolini, and L. Pallottino, โTowards a society of robots,โ
IEEE Robotics & Automation Magazine, vol. 17, no. 4, pp. 26โ36, 2010.
[17] H.-M. Gross, C. Schroeter, S. Mueller, M. Volkhardt, E. Einhorn,
A. Bley, C. Martin, T. Langner, and M. Merten, โProgress in developing
a socially assistive mobile home robot companion for the elderly with
mild cognitive impairment,โ in Intelligent Robots and Systems (IROS),
2011 IEEE/RSJ International Conference on, 2011, pp. 2430โ2437.
[18] H. Wang and X. P. Liu, โAdaptive shared control for a novel mobile
assistive robot,โ IEEE/ASME Transactions on Mechatronics, vol. 19,
no. 6, pp. 1725โ1736, 2014.
[19] B. D. Argall, S. Chernova, M. Veloso, and B. Browning, โA survey of
robot learning from demonstration,โ Robotics and autonomous systems,
vol. 57, no. 5, pp. 469โ483, 2009.
[20] P. Abbeel and A. Y. Ng, โApprenticeship learning via inverse reinforcement learning,โ in Proceedings of the twenty-first international
conference on Machine learning, 2004, p. 1.
[21] B. D. Ziebart, A. L. Maas, J. A. Bagnell, and A. K. Dey, โMaximum
entropy inverse reinforcement learning.โ in AAAI, vol. 8, 2008, pp. 1433โ
1438.
[22] N. D. Ratliff, J. A. Bagnell, and M. A. Zinkevich, โMaximum margin
planning,โ in Proceedings of the 23rd international conference on
Machine learning, 2006, pp. 729โ736.
[23] B. D. Ziebart, N. Ratliff, G. Gallagher, C. Mertz, K. Peterson, J. A.
Bagnell, M. Hebert, A. K. Dey, and S. Srinivasa, โPlanning-based
prediction for pedestrians,โ in Intelligent Robots and Systems, 2009.
IROS 2009. IEEE/RSJ International Conference on, 2009, pp. 3931โ
3936.
[24] P. Henry, C. Vollmer, B. Ferris, and D. Fox, โLearning to navigate
through crowded environments,โ in Robotics and Automation (ICRA),
2010 IEEE International Conference on, 2010, pp. 981โ986.
[25] P. Vernaza and D. Bagnell, โEfficient high dimensional maximum
entropy modeling via symmetric partition functions,โ in Advances in
Neural Information Processing Systems, 2012, pp. 575โ583.
[26] K. M. Kitani, B. D. Ziebart, J. A. Bagnell, and M. Hebert, โActivity
forecasting,โ in European Conference on Computer Vision. Springer,
2012, pp. 201โ214.
[27] J. Choi and K.-E. Kim, โMap inference for bayesian inverse reinforcement learning,โ in Advances in Neural Information Processing Systems,
2011, pp. 1989โ1997.
[28] K. Kim, D. Lee, and I. Essa, โGaussian process regression flow for
analysis of motion trajectories,โ in Computer vision (ICCV), 2011 IEEE
international conference on, 2011, pp. 1164โ1171.
[29] A. Alahi, K. Goel, V. Ramanathan, A. Robicquet, L. Fei-Fei, and
S. Savarese, โSocial lstm: Human trajectory prediction in crowded
spaces,โ in Proceedings of the IEEE Conference on Computer Vision
and Pattern Recognition, 2016, pp. 961โ971.
[30] A. Robicquet, A. Sadeghian, A. Alahi, and S. Savarese, โLearning
social etiquette: Human trajectory understanding in crowded scenes,โ
in European Conference on Computer Vision, 2016, pp. 549โ565.
[31] A. Johansson, D. Helbing, and P. K. Shukla, โSpecification of the social
force pedestrian model by evolutionary adjustment to video tracking
[32]
[33]
[34]
[35]
[36]
[37]
[38]
[39]
[40]
[41]
[42]
[43]
[44]
[45]
[46]
[47]
[48]
[49]
[50]
[51]
[52]
[53]
[54]
data,โ Advances in complex systems, vol. 10, no. supp02, pp. 271โ288,
2007.
A. Lerner, Y. Chrysanthou, and D. Lischinski, โCrowds by example,โ
in Computer Graphics Forum, vol. 26, no. 3. Wiley Online Library,
2007, pp. 655โ664.
D. Helbing and A. Johansson, โPedestrian, crowd and evacuation dynamics,โ in Encyclopedia of Complexity and Systems Science, 2009, pp.
6476โ6495.
J. Muฬller, C. Stachniss, K. Arras, and W. Burgard, โSocially inspired
motion planning for mobile robots in populated environments,โ in Proc.
of International Conference on Cognitive Systems, 2008.
D. Mehta, G. Ferrer, and E. Olson, โAutonomous navigation in dynamic
social environments using multi-policy decision making,โ in Intelligent
Robots and Systems (IROS), 2016 IEEE/RSJ International Conference
on, 2016, pp. 1190โ1197.
A. F. Foka and P. E. Trahanias, โProbabilistic autonomous robot
navigation in dynamic environments with human motion prediction,โ
International Journal of Social Robotics, vol. 2, no. 1, pp. 79โ94, 2010.
M. Seder and I. Petrovic, โDynamic window based approach to mobile
robot motion control in the presence of moving obstacles,โ in Robotics
and Automation, 2007 IEEE International Conference on, 2007, pp.
1986โ1991.
P. Fiorini and Z. Shiller, โMotion planning in dynamic environments using velocity obstacles,โ The International Journal of Robotics Research,
vol. 17, no. 7, pp. 760โ772, 1998.
J. Schulman, P. Moritz, S. Levine, M. Jordan, and P. Abbeel, โHighdimensional continuous control using generalized advantage estimation,โ
arXiv preprint arXiv:1506.02438, 2015.
J. Schulman, S. Levine, P. Moritz, M. I. Jordan, and P. Abbeel, โTrust
region policy optimization,โ CoRR, abs/1502.05477, 2015.
Y. LeCun, Y. Bengio, and G. Hinton, โDeep learning,โ Nature, vol. 521,
no. 7553, pp. 436โ444, 2015.
M. Pfeiffer, M. Schaeuble, J. Nieto, R. Siegwart, and C. Cadena,
โFrom perception to decision: A data-driven approach to end-toend motion planning for autonomous ground robots,โ arXiv preprint
arXiv:1609.07910, 2016.
Y. F. Chen, M. Liu, M. Everett, and J. P. How, โDecentralized noncommunicating multiagent collision avoidance with deep reinforcement
learning,โ arXiv preprint arXiv:1609.07845, 2016.
Y. Zhu, R. Mottaghi, E. Kolve, J. J. Lim, A. Gupta, L. Fei-Fei, and
A. Farhadi, โTarget-driven visual navigation in indoor scenes using deep
reinforcement learning,โ arXiv preprint arXiv:1609.05143, 2016.
D.-G. Choi, Y. Bok, J.-S. Kim, and I. S. Kweon, โExtrinsic calibration of
2-d lidars using two orthogonal planes,โ IEEE Transactions on Robotics,
vol. 32, no. 1, pp. 83โ98, 2016.
L. M. Miller and T. D. Murphey, โOptimal planning for target localization and coverage using range sensing,โ in Automation Science and
Engineering (CASE), 2015 IEEE International Conference on, 2015, pp.
501โ508.
F. Endres, J. Hess, J. Sturm, D. Cremers, and W. Burgard, โ3-d mapping
with an rgb-d camera,โ IEEE Transactions on Robotics, vol. 30, no. 1,
pp. 177โ187, 2014.
S. Foix, G. Alenya, J. Andrade-Cetto, and C. Torras, โObject modeling
using a tof camera under an uncertainty reduction approach,โ in Robotics
and Automation (ICRA), 2010 IEEE International Conference on, 2010,
pp. 1306โ1312.
M. Liu and R. Siegwart, โTopological mapping and scene recognition
with lightweight color descriptors for an omnidirectional camera,โ IEEE
Transactions on Robotics, vol. 30, no. 2, pp. 310โ324, 2014.
L. Kneip, F. Taฬche, G. Caprari, and R. Siegwart, โCharacterization of
the compact hokuyo urg-04lx 2d laser range scanner,โ in Robotics and
Automation, 2009. ICRAโ09. IEEE International Conference on, 2009,
pp. 1447โ1454.
S. Hochreiter and J. Schmidhuber, โLong short-term memory,โ Neural
computation, vol. 9, no. 8, pp. 1735โ1780, 1997.
J. Nocedal and S. J. Wright, โConjugate gradient methods,โ Numerical
optimization, pp. 101โ134, 2006.
Y. Duan, X. Chen, R. Houthooft, J. Schulman, and P. Abbeel, โBenchmarking deep reinforcement learning for continuous control,โ arXiv
preprint arXiv:1604.06778, 2016.
A. Leigh, J. Pineau, N. Olmedo, and H. Zhang, โPerson tracking and
following with 2d laser scanners,โ in Robotics and Automation (ICRA),
2015 IEEE International Conference on, 2015, pp. 726โ733.
| 2cs.AI
|
arXiv:1301.2418v1 [math.AC] 11 Jan 2013
BORNES EFFECTIVES DES FONCTIONS DโAPPROXIMATION DES
SOLUTIONS FORMELLES DโรQUATIONS BINOMIALES
GUILLAUME ROND
Rรฉsumรฉ. The aim of this paper is to give an effective version of the Strong Artin Approximation Theorem for binomial equations. First we give an effective version of the
Greenberg Approximation Theorem for polynomial equations, then using the Weierstrass
Preparation Theorem, we apply this effective result to binomial equations. We prove that
the Artin function of a system of binomial equations is bounded by a doubly exponential
function in general and that it is bounded by an affine function if the the order of the
approximated solutions is bounded.
1. Introduction
Dans [Gr], M. Greenberg a montrรฉ le thรฉorรจme suivant (k est un corps quelconque) :
Thรฉorรจme 1.1. [Gr] Soit I un idรฉal de k[t, X] (X := (X1 , ..., Xn )). Alors il existe une
fonction ฮฒ : N โโ N telle que :
โi โ N, โxj (t) โ k[[t]], 1 โค j โค n tels que f (t, x(t)) โ (t)ฮฒ(i) โf โ I
โxj (t) โ k[[t]], 1 โค j โค n, tels que f (t, x(t)) = 0 โf โ I et xj (t) โ xj (t) โ (t)i โj.
De plus il existe deux constantes a et b telles que โi โ N ฮฒ(i) โค ai + b.
La plus petite fonction ฮฒ vรฉrifiant cette propriรฉtรฉ est appelรฉe fonction dโapproximation de
Greenberg ou fonction de Artin-Greenberg de I. Dans [Ar], M. Artin a gรฉnรฉralisรฉ ce rรฉsultat
au cas oรน t est remplacรฉ par un nombre fini quelconque de variables en montrant lโexistence
dโune fonction dโapproximation dans ce cas. On peut รฉnoncer son thรฉorรจme sous la forme
suivante (dans le cas particulier oรน t est remplacรฉ par deux variables t et z, mais seul ce cas
nous intรฉressera par la suite) :
Thรฉorรจme 1.2. [Ar] Soit I un idรฉal de k[t, z, X] (X := (X1 , ..., Xn )). Alors il existe une
fonction ฮฒ : N โโ N telle que :
โi โ N, โxj (t, z) โ k[[t, z]], 1 โค j โค n, tels que f (t, z, x(t, z)) โ (t, z)ฮฒ(i) โf โ I
โxj (t, z) โ k[[t, z]], 1 โค j โค n tels que f (t, z, x(t, z)) = 0 โf โ I et xj (t, z)โxj (t, z) โ (t, z)i โj.
La plus petite fonction vรฉrifiant cette propriรฉtรฉ est appelรฉe fonction de Artin de I. On peut
remarquer que si I est un idรฉal de k[X] on peut parler de sa fonction de Artin-Greenberg et
de sa fonction de Artin en faisant rรฉfรฉrence ร la fonction de Artin-Greenberg de Ik[t, X] et
ร la fonction de Artin de Ik[t, z, X].
Malheureusement, la preuve donnรฉe par M. Artin (qui utilise essentiellement le thรฉorรจme
des fonctions implicites et le thรฉorรจme de prรฉparation de Weierstrass) nโapporte que trรจs
peu dโinformation sur la nature de la croissance de cette fonction (exceptรฉe que celle-ci est
constructive [La]), et pendant longtemps sโest posรฉe la question de savoir si toute fonction
2000 Mathematics Subject Classification. Primary 13B40 ; Secondary 13P99, 14B12.
1
2
GUILLAUME ROND
de Artin รฉtait bornรฉe par une fonction affine. On peut mentionner quโil existe une maniรจre
diffรฉrente de celle de M. Artin pour montrer lโexistence dโune fonction dโapproximation qui
utilise les ultraproduits [B-D-L-v.D] et qui nโest pas constructive et donc qui nโapporte
aucune information sur ces fonctions dโapproximation. Dans [Ro2] est prรฉsentรฉ un exemple
dโun idรฉal dont la fonction de Artin nโest pas bornรฉe par une fonction affine (cโest le seul
exemple connu jusquโร prรฉsent, lโexemple donnรฉ dans [Ro3] concernant le cas oรน les variables
t et z sont remplacรฉes par trois variables). Dans cet exemple il est montrรฉ que la fonction
de Artin considรฉrรฉe est minorรฉe par une fonction polynomiale de degrรฉ 2. Nรฉanmoins on ne
sait rien de plus sur cette fonction de Artin et on ne connait toujours aucune borne gรฉnรฉrale
sur aucun exemple autre que quelques cas connus oรน la fonction de Artin est majorรฉe par
une fonction affine. Pour mieux comprendre la croissance des fonctions de Artin, il serait
intรฉressant dโavoir des exemples pour lesquels on ait des bornes effectives de leur fonction
de Artin. On peut remarquer que lโexemple citรฉ de [Ro2] a la particularitรฉ dโรชtre un idรฉal
principal engendrรฉ par un binรดme.
Le but de ce travail est justement de donner des bornes gรฉnรฉrales pour la fonction de Artin
dโun idรฉal binomial I. Le principe gรฉnรฉral est le suivant : il est plus facile dโessayer de donner
des bornes sur les fonctions de Artin dโune famille dโidรฉaux que sur un idรฉal en particulier. En
effet, la preuve de M. Artin et ses avatars utilisent toujours une rรฉcurrence sur la hauteur de
I : si I est premier, soit on peut utiliser le thรฉorรจme des fonctions implicites et on construit
la solution approchรฉe cherchรฉe, soit on remplace I par I + (ฮด) oรน ฮด est un mineur de la
matrice jacobienne de I bien choisi et on augmente ainsi la hauteur de I. Cependant, le
nouvel idรฉal obtenu nโest plus premier a priori et lโutilisation du thรฉorรจme des fonctions
implicites nรฉcessitant de travailler avec un idรฉal premier, il faut remplacer I par ses idรฉaux
premiers associรฉs et de borner la fonction de Artin de I par celles de ses idรฉaux premiers
associรฉs. Il se trouve que lโon connait des bornes sur le degrรฉ de gรฉnรฉrateurs de ces idรฉaux
premiers en fonction du degrรฉ des gรฉnรฉrateurs de I. Il est donc assez naturel dโessayer de
trouver une fonction qui majore toutes les fonctions de Artin des idรฉaux engendrรฉ par des
polynรดmes de degrรฉ d fixรฉ. Cette stratรฉgie fonctionne comme lโa montrรฉ M. Artin, i.e. on
peut choisir la mรชme fonction ฮฒ dans le thรฉorรจme 1.2 pour tous les idรฉaux engendrรฉs par des
polynรดmes de degrรฉ infรฉrieur ร une valeur fixรฉe (c.f. [Ar]). Nรฉanmoins, il nโest pas possible
dโavoir plus dโinformations sur cette fonction de Artin "uniforme" que le fait que celle-ci soit
constructible (cf. [La]).
Dans notre travail, nous montrons nรฉanmoins que cette stratรฉgie donne une borne effective
des fonctions de Artin-Greenberg, cโest-ร -dire donne une borne effective sur les coefficients
a et b du thรฉorรจme 1.1 en fonction du degrรฉ d des gรฉnรฉrateurs de I et du nombre n de
variables Xi (c.f. thรฉorรจme 3.1). Celle-ci est assez grande (polynomiale en d, doublement
exponentielle en n) mais a le mรฉrite dโรชtre uniforme. Ensuite, grรขce au lemme 4.1, nous
utilisons le thรฉorรจme de prรฉparation de Weierstrass de maniรจre ร ramener la majoration de
la fonction de Artin dโun idรฉal binomial ร deux majorations (cf. section 4) :
โข La majoration de la fonction de Artin dโun idรฉal binomial dont les solutions approchรฉes
รฉvitent le lieu singulier (et donc dans ce cas cette fonction est majorรฉe par une fonction
affine).
โข La majoration des fonctions de Artin-Greenberg dโune famille dโidรฉaux (JD )DโN engendrรฉs
par des polynรดmes dรฉpendant dโun nombre croissant de variables mais dont le degrรฉ est bornรฉ
par le degrรฉ des gรฉnรฉrateurs de I. Pour cela on utilise donc le thรฉorรจme 3.1.
On en dรฉduit deux choses (sur un corps algรฉbriquement clos de caractรฉristique nulle) : si lโon
borne lโordre des solutions approchรฉes xj (t, z), 1 โค j โค n, alors la fonction de Artin dโun
idรฉal binomial est majorรฉe par une fonction affine, et en gรฉnรฉral la fonction de Artin dโun
BORNES EFFECTIVES DES FONCTIONS DโAPPROXIMATION DES SOLUTIONS FORMELLES DโรQUATIONS BINOMIALES
3
idรฉal binomial est majorรฉe par une fonction doublement exponentielle (c.f. thรฉorรจme 4.2).
Malheureusement on nโa aucune maniรจre de savoir si cette derniรจre borne est raisonnable ou
pas. En effet la famille dโidรฉaux (JD ) nโest pas quelconque, mais semble tout de mรชme assez
difficile ร apprรฉhender : ces idรฉaux ne sont pas rรฉduits en gรฉnรฉral et il est vite impossible de
calculer leur radical ou une dรฉcomposition primaire de ceux-ci du fait du nombre rapidement
important de variables qui entrent en jeu.
2. Rappels sur certaines bornes effectives en algรจbre commutative
Nous allons commencer par rappeler quelques rรฉsultats classiques en algรจbre commutative
effective que nous allons utiliser librement dans la suite.
Thรฉorรจme 2.1. [He][Te] Soit I un idรฉal de k[u], u := (u1 , ..., un ), I = (f1 , ..., fp ) avec
deg (fr ) โค d pour 1 โค r โค p. Soit I = Q1 โฉ ยท ยท ยท โฉ Qs une dรฉcomposition
primaire minimale
โ
โ
โ
(i.e telle
que
Q
,...,
Q
soient
tous
distincts).
On
a
alors
I
=
P
l
s
1 โฉ ยท ยท ยท โฉ Ps avec
โ
Pl := Ql pour 1 โค l โค s. On a alors les rรฉsultats suivants :
โ e
a) Soit e := min{n, p}(n + 2)(d + 1)min{n,p}+1 โค (n + 2)2 (d + 1)n+1 . On a I โ I.
b) On s โค dmin{n,p} .
c) Il existe une fonction ฮป1 (n, d), polynomiale en d et de degrรฉ exponentiel en n, tel que
chaque Pl est engendrรฉ par des polynรดmes de degrรฉ infรฉrieur ou รฉgal ร ฮป1 (n, d).
d) Il existe une fonction ฮป2 (n, d), polynomiale en d et de degrรฉ exponentiel en n, tel que
chaque Ql est engendrรฉ par des polynรดmes de degrรฉ infรฉrieur ou รฉgal ร ฮป1 (n, d).
Proposition 2.2. [S] Soient I1 ,..., Iq , q idรฉaux de k[u1 , ..., un ] engendrรฉs par des polynรดmes
de degrรฉ infรฉrieur ou รฉgal ร d. Alors I := I1 โฉ ยท ยท ยท โฉ Iq est engendrรฉ par des polynรดmes de
nโ1
degrรฉ infรฉrieur ou รฉgal ร n((q โ 1)d)2
+d
Dรฉmonstration. รcrivons Ii = (fi,1 , ..., fi,si ) oรน deg (fi,j ) โค d pour tous entiers i et j. Tout
systรจme de gรฉnerateurs de I, notรฉ g (1) , ..., g (s) correspond ร un systรจme gรฉnรฉrateur, notรฉ
(s)
(1)
{ui,j , ..., ui,j } pour 1 โค i โค q et 1 โค j โค si , du k[u1 , ..., un ]-module dรฉfini par les รฉquations
(f1, 1 U1, 1 + ยท ยท ยท + f1,s1 U1,s1 ) โ (fi,1 Ui, 1 + ยท ยท ยท + fi,si Ui,si ) = 0, 2 โค i โค q
(l)
(l)
et reliรฉ par g (l) = fi,1 ui, 1 + ยท ยท ยท + fi,si ui,si pour 1 โค l โค s. Dโaprรจs la proposition 55 de [S],
(1)
(s)
(l)
nโ1
il existe un tel systรจme {ui,j , ..., ui,j } tel que deg (ui,j ) โค n((q โ 1)d)2
l. On en dรฉduit le rรฉsultat.
pour tous i, j et
3. Borne effective de la fonction de Artin-Greenberg dans le cas
polynomial
Dans cette partie nous allons redรฉmontrer le thรฉorรจme de Greenberg en suivant essentiellement sa preuve mais en faisant attention ร la complexitรฉ de chaque รฉtape. Dans toute cette
partie k dรฉsigne un corps de caractรฉristique nulle.
Thรฉorรจme 3.1. [Gr][Ar] Pour tous n, d, i โ N, il existe ฮฒ : N โโ N tel que pour tout idรฉal
I de k[t, x], avec x = (x1 , ..., xn ), tel que deg (fr ) โค d pour tout r, pour tout i โ N et pour
tout x(t) โ k[[t]]n tel que f (t, x(t)) โ (t)ฮฒ(i) pour tout f โ I, il existe x(t) โ k[[t]]n tel que
f (t, x(t)) = 0 pour tout f โ I et x(t) โ x(t) โ (t)i .
De plus ฮฒ peut รชtre choisie affine, de la forme i 7โโ a(n, d)i + b(n, d) oรน a(n, d) et b(n, d)
sont bornรฉs par une fonction polynomiale en d de degrรฉ exponentiel en n.
4
GUILLAUME ROND
Dรฉfinition 3.2. Nous noterons dans la suite ฮฒ(n, d, i) le plus petit entier ฮฒ(i) qui vรฉrifie
les conclusions du thรฉorรจme 3.1. Nous allons noter ฮฒh (n, d, i) le plus petit entier qui vรฉrifie les conclusions du thรฉorรจme 3.1 pour tout idรฉal I quelconque de hauteur h engendrรฉ par
des polynรดmes de degrรฉ infรฉrieur ou รฉgal ร d, et ฮฒhp (n, d, i) le plus petit entier qui vรฉrifie
les conclusions du thรฉorรจme 3.1 pour tout idรฉal I premier de hauteur h engendrรฉ par des
polynรดmes de degrรฉ infรฉrieur ou รฉgal ร d.
Thรฉorรจme 3.3. Pour tous n, d, dโฒ , i, j โ N, nous avons les relations suivantes :
(1)
p
ฮฒn+1
(n, d, i) โค 2
(2)
ฮฒk (n, d, i) โค (n + 3)2 (d + 1)2n+3 max {ฮฒhp (n, ฮป1 (n + 1, d), i)}
(3)
ฮฒkp (n, d, i) โค (eโฒ + 1)ฮฒk+1 (n, k(d โ 1), i) + 1
n n+2
.
eโฒ := (n + 3)2 1 + ฮป2 (n + 1, d) + (n + 1)((dn+1 โ 2)ฮป2 (n + 1, d))2
h>k
Ce thรฉorรจme implique directement le thรฉorรจme 3.1. Nous allons donner une preuve du
thรจorรจme 3.1 en montrant au fur et ร mesure les inรฉgalitรฉs (1), (2) et (3) du thรฉorรจme 3.3.
โข Si ht(I) = n + 1 et I est premier, alors I est un idรฉal maximal. Supposons quโil existe
x(t) โ k[[t]]x tel que f (t, x(t)) โ (t)2 pour tout f โ I, et notons ฯ : k[t, x] โโ k le
k-homomorphisme dรฉfini par ฯ(h) = h(0, x(0)). Alors I โ Ker(ฯ), mais Ker(ฯ) รฉtant un
idรฉal propre de k[t, x] et I maximal, nous avons I = Ker(ฯ). Donc en particulier t โ I, mais
clairement t โ
/ Ker(ฯโฒ ) ce qui contredit lโexistence de x(t). Donc on peut prendre ici ฮฒ = 2,
le thรฉorรจme 3.1 est alors valable car lโhypothรจse nโest jamais vรฉrifiรฉe, et on a lโรฉgalitรฉ (1).
โข Supposons que ht(I) = k, oรน I = (f1 , ..., fp ), et que le thรฉorรจme 3.1 est vrai pour tout idรฉal
de hauteur
strictement plus grande que k.
โ
Soit I = P1 โฉ ยท ยท ยท โฉ Ps la dรฉcomposition primaire du radical
de I, oรน ht(Pl ) = hl . Notons
Ps
e := (n + 1)(n + 3)(d + 1)n+2 . Alors lโentier ฮฒ โฒ := e. l=1 ฮฒhpl (n, ฮป1 (n + 1, d), i) satisfait
โฒ
les conditions du thรฉorรจme 3.1 pour I. En effet soit x(t) โ k[[t]]n tel que f (t, x(t)) โ (t)ฮฒ
p
ฮฒ (n,ฮป(n+1,d),i)
pour tout f โ I. Donc il existe un entier l tel que g(t, x(t)) โ (t) hl
pour
tout g โ Pl . En effet, dans le cas contraire, pour tout l, il existerait gl โ Pl tel que
ฮฒ p (n,ฮป(n+1,d),i)
gl (t, x(t)) โ
/ (t) hl
. Notons alors g := (g1 ...gs )e . On a g โ I par dรฉfinition de
โฒ
e et des Pl , mais g(t, x(t)) โ
/ (t)ฮฒ ce qui contredit ce qui prรฉcรจde, et donc il existe un entier
l tel que g(t, x(t)) โ (t)ฮฒhl (n,ฮป(n+1,d),i) pour tout g โ Pl . Donc il existe x(t) โ k[[t]]n tel que
g(t, x(t)) = 0 pour tout g โ Pl et tel que x(t) โ x(t) โ (t)i . Comme I โ Pl , on obtient la
conclusion voulue. On a montrรฉ ainsi lโinรฉgalitรฉ (2).
โข Nous supposons donc maintenant que I = (f1 , ..., fp ) est premier de hauteur k. Alors
k[t, x]I est rรฉgulier, et on peut supposer que f1 , ..., fk engendrent Ik[t, x]I . Il existe donc un
1 ,...,fk )
, notรฉ ฮด, tel que ฮด โ
/ I (cf. par exemple
mineur dโordre k de la matrice jacobienne โ(fโ(t,x)
proposition 1 [Wa]). Notons J := (f1 , ..., fp , ฮด). On a alors ht(J) = k + 1. Remarquons que
deg (ฮด) โค k(d โ 1).
Notons alors I โฒ := (f1 , ..., fk ) et soit I โฒ = Q1 โฉ ยท ยท ยท โฉ Qq une dรฉcomposition primaire rรฉduite
BORNES EFFECTIVES DES FONCTIONS DโAPPROXIMATION DES SOLUTIONS FORMELLES DโรQUATIONS BINOMIALES
5
de I โฒ . Nous allons renumรฉroter les Ql de telle sorte que Ql โ I pour 1 โค l โค s et Ql 6โ I
pour l > s. Or Ik[t, x]I = I โฒ k[t, x]I et Q1 k[t, x]I โฉ ยท ยท ยท โฉ Qs k[t, x]I est une dรฉcomposition
primaire rรฉduite de Ik[t, x]I (cf. Theorem 17, chapter 4 [Z-S]), donc s = 1 et I = Q1 . Soit
J โฒ := Q2 โฉ ยท ยท ยท โฉ Qq si q 6= 1 et J โฒ = A si q = 1. On pose alors J = J โฒ si I 6โ J โฒ et J := A si
I โ J โฒ . On a donc I โฒ = I โฉ J et J 6โ I.
Chaque idรฉal Ql est engendrรฉ par des polynรดmes de degrรฉ infรฉrieur ou รฉgal ร ฮป2 (n + 1, d).
Donc J โฒ est engendrรฉ par des polynรดmes
de degrรฉ infรฉrieur ou รฉgal ร (n + 1)((q โ 2)ฮป2 (n +
โ
n
1, d))2 + ฮป2 (n + 1, d). On a ฮด โ I + J (cf. lemma 7 [Wa]). Notons
n n+2
.
eโฒ := (n + 3)2 1 + ฮป2 (n + 1, d) + (n + 1)((dn+1 โ 2)ฮป2 (n + 1, d))2
โฒ
Alors ฮด e โ I + J car q โค dn+1 . Soit
ฮฑ := (e + 1)โฒ ฮฒk+1 (n, k(d โ 1), i) + 1
Soit x(t) โ k[[t]]n tel que f (t, x(t)) โ (t)ฮฑ pour tout f โ I.
Cas 1 : Si ฮด(t, x(t)) โ (t)ฮฒk+1 (n,k(dโ1),i) , comme ฮฑ โฅ ฮฒk+1 (n, k(d โ 1), i), par dรฉfinition
de ฮฒk+1 , il existe x(t) โ k[[t]]n tel que f (t, x(t)) = ฮด(t, x(t)) = 0 pour tout f โ I et
x(t) โ x(t) โ (t)i , et on a la conclusion voulue.
Cas 2 : Supposons maintenant que ฮด(t, x(t)) โ
/ (t)ฮฒk+1 (m,k(dโ1),i) . En dรฉrivant la relation
โฒ
fr (t, x(t)) โ (t)(e +1)ฮฒk+1 (n,k(dโ1),i)+1
par rapport ร t, on obtient
X โfr
โฒ
โfr
โxฮป (t)
(t, x(t))
(t, x(t)) = โ
mod. (t)(e +1)ฮฒk+1 (n,k(dโ1),i) .
โt
โxฮป
โt
ฮป
On en dรฉduit lโexistence dโun mineur dโordre k de la matrice jacobienne de f , encore notรฉ
โ(f1 ,...,fk )
ฮด, qui ne fait intervenir que des dรฉrivรฉes partielles par rapport aux xฮป (i.e. ฮด = โ(x
1 ,...,xk )
quitte ร renommer les variables xฮป ), tel que ฮด(t, x(t)) โ
/ (t)ฮฒk+1 (n,k(dโ1),i) . En particulier
ฮดโ
/ (f1 , ..., fp ).
Par dรฉfinition de ฮฑ et en utilisant le thรฉorรจme des fonctions implicites de Tougeron (c.f.
thรฉorรจme 3.2 [To] ou Lemma 5.11 [Ar]), il existe x(t) โ k[[t]]n tel que fr (t, x(t)) = 0,
โฒ
pour 1 โค r โค k, et x(t) โ x(t) โ (t)e ฮฒk+1 (n,k(dโ1),i) . On a alors ฮด(t, x(t)) โ ฮด(t, x(t)) โ
โฒ
(t)e ฮฒk+1 (n,k(dโ1),i) et eโฒ โฅ 1. Donc
ฮด(t, x(t)) โ
/ (t)ฮฒk+1 (n,k(dโ1),i) .
Pp
โฒ
โฒ
Or ฮด e โ I + J, donc ฮด e = r=1 hr fr + h0 oรน h0 โ J. Comme fr (t, x(t)) โ fr (t, x(t)) โ
โฒ
(t)e ฮฒk+1 (n,k(dโ1),i) et fr (t, x(t)) โ (t)ฮฑ , pour 1 โค r โค p, on voit que
โฒ
fr (t, x(t)) โ (t)e ฮฒk+1 (n,k(dโ1),i) pour 1 โค r โค p
โฒ
(car ฮฑ โฅ eโฒ ฮฒk+1 (n, k(d โ 1), i)). Donc nรฉcessairement h0 (t, x(t)) โ
/ (t)e ฮฒk+1 (n,k(dโ1),i) , dโoรน
โฒ
h0 (t, x(t)) 6= 0. Or h0 fr โ I โฉJ = I = (f1 , ..., fk ) pour 1 โค r โค p. On en dรฉduit fr (t, x(t)) =
0 pour 1 โค r โค p. Comme ฮฒk+1 (n, k(d โ 1), i) โฅ i, on a x(t) โ x(t) โ (t)i ce qui conclut la
dรฉmonstration.
6
GUILLAUME ROND
4. Fonction de Artin dโun idรฉal binomial
Pour รฉtudier la fonction de Artin dโun idรฉal binomial, nous allons mettre les xi (t, z) sous
forme de Weierstrass et nous allons utiliser le lemme suivant :
Lemme 4.1. Soit k un corps quelconque. Soient P = u(x)(a0 (e
x)+a1 (e
x)xn +ยท ยท ยท+adโ1 (e
x)xdโ1
n +
d
eโ1
e
xn ) et Q = v(x)(b0 (e
x) + b1 (e
x)xn + ยท ยท ยท + beโ1 (e
x)xn + xn ) โ k[[x1 , ..., xn ]] deux polynรดmes
de Weierstrass en xn (avec x = (x1 , ..., xn ) et x
e := (x1 , ..., xnโ1 )) tels que P โ Q โ (x)i avec
iโd
i > d. Alors d = e, u(x)โv(x) โ (x)
et aj (e
x)โbj (e
x) โ (e
x)iโd+ord(P )โj pour 0 โค j โค dโ1.
Dรฉmonstration. Tout dโabord comme i > d, on voit que e = d car (P โQ)(0, ..., 0, xn ) โ (xn )i
et le terme constant de u est รฉgal au terme constant de v. De mรชme ord(P ) = ord(Q). Dโautre
part, si P โ Q โ (x)i alors uโ1 P โ uโ1 Q โ (x)i . On peut donc supposer que u = 1.
La division de Weirstrass de xdn par P par rapport ร la variable xn est la suivante :
x)xdโ1
โ ยท ยท ยท โ a0 (e
x)).
xdn = 1.P + R(x) = P + (โadโ1 (e
n
Considรฉrons la division de Weierstrass de xdn par Q par rapport ร la variable xn :
xdn = C(x)Q + Rโฒ (x) = C(x)Q + Ddโ1 (e
x)xdโ1
+ ยท ยท ยท + D0 (e
x).
n
Par unicitรฉ dans le thรฉorรจme de division de Weierstrass, on a C(x) = v โ1 (x) et Dj (e
x) =
โbj (e
x) pour 0 โค j โค d โ 1. Cette division peut se faire de maniรจre algorithmique. En
effet on construit les suites (Ck (x))k et (Rk (x))k par rรฉcurrence de la maniรจre qui suit :
on pose xdn = C0 (x)Q + R0 avec C0 (x) = 1. Puis par induction, pour k โฅ 0, si xdn =
Ck (x)Q+Rk (x), on considรจre le plus petit monรดme de Rk divisible par xdn , notรฉ Mk , et on pose
k
Q. Alors la suite (ord(Rk+1 (x) โ Rk (x)))k est strictement croissante
Rk+1 (x) := Rk (x) โ M
xd
n
et (Rk (x))k converge vers Rโฒ (x) pourP
la topologie (x)-adique. De mรชme la suite (deg (Mk ))k
k
est strictement croisssante et C(x) = k M
xd . En particulier, comme R0 (x)โR(x) = QโP โ
n
(x)i , M0 est un monรดme de degrรฉ supรฉrieur ou รฉgal ร i, et C(x) โ 1 โ (x)iโd . On en dรฉduit
que R(x) โ Rโฒ (x) โ (x)i , donc aj (e
x) โ bj (e
x) โ (x)iโd+ord(P )โj , pour 0 โค j โค d โ 1.
Nous allons maintenant รฉtudier la fonction de Artin dโun idรฉal binomial. Soit k un corps
algรฉbriquement clos et soit I un idรฉal de k[[t, z]][X1 , ..., Xn ] engendrรฉ par f1 ,..., fp avec
fk := ak X ฮฑk + bk X ฮฒk
oรน ak , bk โ k et ฮฑk , ฮฒk โ Nn pour 1 โค k โค p. Considรฉrons xj (t, z) โ k[[t, z]], 1 โค j โค n, tels
que fk (xj (t, z)) โ (t, z)i , 1 โค k โค p. On peut supposer, quitte ร faire un changement linรฉaire
de coordonnรฉes en t et z, que les xj sont rรฉguliรจres en la variable z. On a donc
xj (t, z) = uj (t, z)(xj,0 (t) + xj,1 (t)z + ยท ยท ยท + xj,dj โ1 (t)z dj โ1 + z dj )
oรน dj est lโordre de P
xj (t, z) avec xj,l โ (t)k[[t]], pour 1 โค j โค n et 0 โค l โค dj .
Supposons que i > j ฮฑk,j dj pour tout k. En utilisant le lemme 4.1, on a alors
X
X
ฮฒk,j dj , 1 โค k โค p,
ฮฑk,j dj =
Dk :=
j
j
fk (u1 (t, z), ..., un (t, z)) โ (t, z)iโDk , 1 โค k โค p
et
Pd (xj,l (t)) โ (t)iโd
oรน Pd (Xj,l ) โ k[Xj,l , 1โคjโคn, 0โคlโคdj โ1 ] est le coefficient de z d dans
Y
ฮฒk,j
ฮฑk,j Y
Xj,0 + ยท ยท ยท + Xj,dj โ1 z dj โ1 + z dj
Xj,0 + ยท ยท ยท + Xj,dj โ1 z dj โ1 + z dj
+
j
j
BORNES EFFECTIVES DES FONCTIONS DโAPPROXIMATION DES SOLUTIONS FORMELLES DโรQUATIONS BINOMIALES
7
Notons D := maxk Dk . On obtient alors deux systรจmes dโรฉquations indรฉpendants lโun de
lโautre :
(1)
fk (u1 (t, z), ..., un (t, z)) โ (t, z)iโD , 1 โค k โค p
(2)
Pd (xj,l (t)) โ (t)iโD , 0 โค d โค D โ 1.
On va chercher la fonction dโapproximation de Artin de ces deux systรจmes, le premier ayant
une fonction de Artin bornรฉe par une fonction affine puisque ui (0, 0) 6= 0 pour tout i et que
le lieu singulier dโune variรฉtรฉ torique est inclus dans lโunion des axes de coordonnรฉes, et le
second รฉtant un systรจme ร coefficients dans k[[t]].
Thรฉorรจme 4.2. Soit k un corps algรฉbriquement clos de caractรฉristique nulle. Alors on a
les propriรฉtรฉs suivantes :
i) Pour tout dโฒ โ N et pour tout d := (d1 , ...., dn ) โ Nn , il existe ad,dโฒ , bd,dโฒ vรฉrifiant la
propriรฉtรฉ suivante :
Soit I un idรฉal binomial de k[U1 , ..., Un ] engendrรฉ par des binรดmes f1 , ..., fp de
degrรฉ infรฉrieur ร dโฒ . Soit i โ N et soient x1 (t, z),..., xn (t, z) โ k[[t, z]] tels que
ord(xj (t, z)) = dj et fk (xj (t, z)) โ (t, z)ad,dโฒ i+bd,dโฒ , pour tous k. Alors il existe
xj (t, z) โ k[[t, z]], tels que fk (xj (t, z)) = 0 pour tout k et tels que xj (t, z) โ xj (t, z) โ
(t, z)i pour tout j.
ii) Pour tout dโฒ โ N il existe une fonction doublement exponentielle en i, notรฉe ฮฒdโฒ , telle
que pour tout idรฉal binomial I de k[U1 , ..., Un ] engendrรฉ par des binรดmes de degrรฉ infรฉrieur ร dโฒ , la fonction de Artin de Ik[[t, z]][U ] est bornรฉe par ฮฒdโฒ .
Dรฉmonstration. Nous allons dโabord montrer i) dont on dรฉduira ensuite ii).
Supposons, comme prรฉcรฉdemment, que I est engendrรฉ par les fk := ak X ฮฑk + bk X ฮฒk , oรน
ak , bk โ k et ฮฑk , ฮฒk โ Nn pour 1 โค
โ k โค p.
โ
Lโidรฉal I รฉtant un idรฉal binomial, I est encore
un
idรฉal
binomial
et,
si
I = I1 โฉ ยท ยท ยท โฉ Iq est
โ
I,
alors
les
I
sont
des
idรฉaux
binomiaux [E-S].
une dรฉcomposition primaire
minimale
de
k
โ e
Soit e โ N tel que I โ I. Supposons que fl (u1 (t, z), ..., un (t, z)) โ (t, z)qei , 1 โค l โค
โp
oรน uj,0 := uj (0, 0) 6= 0 pour tout j. Alors g(u1 (t, z), ..., un (t, z)) โ (t, z)qi pour tout g โ I,
et donc il existe un entier k tel que g(u1 (t, z), ..., un (t, z)) โ (t, z)i pour tout g โ Ik .
Comme Ik est un idรฉal premier binomial de k[U ] alors (k[U ]/Ik )(U1 โu1,0 ,...,Un โun,0 ) est rรฉgulier car u1,0 ...un,0 6= 0 (le lieu singulier dโune variรฉtรฉ torique est toujours inclus dans
lโunion des hyperplans de coordonnรฉes). Donc k โโ (k[U ]/Ik )(U1 โu1,0 ,...,Un โun,0 ) est lisse,
donc k[[t, z]] โโ (k[[t, z]][U ]/Ik )(t,z,U1 โu1,0 ,...,Unโun,0 ) est lisse ; ceci implique quโil existe
uj (t, z) โ k[[t, z]], 1 โค j โค n, tels que g(u1 (t, z), ..., un (t, z)) = 0 pour tout g โ Ik et
uj (t, z) โ uj (t, z) โ (t, z)i .
Soit i โโ ai + b la fonction de Artin de lโidรฉal de k[[t]][Xj,l ] engendrรฉ par les Pd (Xj,l ),
0 โค d โค D โ 1. Posons ad := max{qe, a} et bd := b + D. Dโaprรจs les thรฉorรจmes 2.1 et 3.1, on
voit que ad et bd peuvent รชtre bornรฉes par une fonction dรฉpendant uniquement de dโฒ .
Soit i โ N, on a alors ad i + bd > D.
Dโaprรจs ce qui prรฉcรจde, si fk (xj (t, z)) โ (t, z)ad i+bd โk, alors
fk (u1 (t, z), ..., un (t, z)) โ (t, z)qei , 1 โค k โค p
8
GUILLAUME ROND
et Pd (xj,l (t)) โ (t)ai+b , 0 โค d โค D.
Donc il existe uj (t, z) โ k[[t, z]], 1 โค j โค n, tels que g(u1 (t, z), ..., un (t, z)) = 0 pour tout g โ I
et uj (t, z) โ uj (t, z) โ (t, z)i , et il existe xj,l (t) โ k[[t]] tels que Pd (xj,l (t)) = 0, 0 โค d โค D,
et xj,l (t) โ xj,l (t) โ (t)i . On pose alors xj = uj (t, z)(xj, 0 + xj,1 t + ยท ยท ยท + xj,dj โ1 tdj โ1 + tdj ).
On a bien fk (xj (t, z)) = 0, 1 โค k โค p, et xj (t, z)โ xj (t, z) โ (t, z)i , 1 โค j โค n. Ceci prouve i).
On peut remarquer que aPet b sont bornรฉes par une fonction polynomiale en maxk {|ฮฑk |, |ฮฒk |}
de degrรฉ exponentiel en j dj , dโaprรจs le thรฉorรจme 3.1. Donc il existe une constante C telle
P
j dj
. Notons aEd et bEd les plus petites constantes satisfaisant i) pour lโidรฉal
que ad , bd โค C C
engendrรฉ par les fk , k โ E, Poรน E est un sous-ensemble de {1, ..., p}. Lร encore il existe une
C
constante CE telle que CE E
aEd , bEd โค C C
P
j dj
jโE dj
majore aEd et bEd . Donc en posant C := maxE CE on a
pour tout sous-ensemble E de {1, ..., p}.
C ni
Soit xj (t, z) โ k[[t, z]], 1 โค j โค n, tels que fk (xj (t, z)) โ (t, z)C (i+1) , 1 โค k โค p. Si
dj := ord(xj (t, z)) โฅ i, alors on pose xj (t, z) = 0, sinon on pose xj (t, z) = xj (t, z). Alors
fk (xj (t, z)) = 0 ou fk (xj (t, z)) = fk (xj (t, z)) selon lโentier k. On peut donc remplacer
les xj (t, z) par les xj (t, z) et supposer que ord(xj (t, z)) < i pour tout j. On supposer que
P
P
ni
C C (i+1) > D := maxk { j ฮฑk,j dj , j ฮฒk,j dj } en choisissant i assez grand. Comme dj < i,
1 โค j โค n, on a fk (xj (t, z)) โ (t, z)ad i+bd , 1 โค k โค p. On applique alors i), et on a lโexistence
de xj (t, z) โ k[[t, z]] tels que fk (xj (t, z)) = 0, 1 โค k โค p, et xj (t, z) โ xj (t, z) โ (t, z)i ,
1 โค j โค n. Ceci prouve ii).
Exemple 4.3. Dans [Ro2], il est montrรฉ que la fonction de Artin du polynรดme X 2 โ ZY 2
nโest pas bornรฉe par une fonction affine. On voit que la non-linรฉaritรฉ de la fonction de Artin
dans ce cas provient du fait que les fonctions de Artin-Greenberg des systรจmes Pd (Xj,l ) = 0,
0 โค d โค D, sont bornรฉes par des fonctions affines dont les coefficients croissent vite en
fonction de lโordre des xj,l (t).
Exemple 4.4. On peut remarquer que la famille de solutions approchรฉes de lโรฉquation
X 2 โ Y 3 dans [Ro1] sont des solutions dont lโordre est bornรฉ.
Exemple 4.5. Soit f := X 2 โ Y 3 . Si x(t, z), y(t, z) โ k[[t, z]] vรฉrifient ord(x(t, z)) = 3 et
ord(y(t, z)) = 2, on peut รฉcrire
x(t, z) = u(t, z)(x0 (t) + x1 (t)z + x2 (t)z 2 + z 3 )
y(t, z) = v(t, z)(y0 (t) + y1 (t)z + z 2 ).
Si x2 (t, z) โ y 3 (t, z) โ (t, z)i avec i > 6, alors
u2 (t, z) โ v 3 (t, z) โ (t, z)iโ6
et les xj (t) et yj (t) sont solutions du systรจme suivant modulo (t)iโ6 :
๏ฃฑ
2x2 โ 3y1 = 0
๏ฃด
๏ฃด
๏ฃด
2
2
๏ฃด
x
+
2x
๏ฃด
1 โ 3y1 โ 3y0 = 0
2
๏ฃด
๏ฃฒ
3
2x0 + 2x1 x2 โ y1 โ 6y0 y1 = 0
x21 + 2x0 x2 โ 3y0 y12 โ 3y02 = 0
๏ฃด
๏ฃด
๏ฃด
๏ฃด
2x0 x1 โ 3y02 y1 = 0
๏ฃด
๏ฃด
๏ฃณ
x20 โ y03 = 0
On peut vรฉrifier ร lโaide de Macaulay2 [M2] que lโidรฉal de k[x0 , x1 , x2 , y0 , y1 ] dรฉfini par ces
polynรดmes nโest pas rรฉduit. Ceci semble assez gรฉnรฉral. On peut remarquer que les variรฉtรฉs
BORNES EFFECTIVES DES FONCTIONS DโAPPROXIMATION DES SOLUTIONS FORMELLES DโรQUATIONS BINOMIALES
9
algรฉbriques dรฉfinies par Pd (Xj,l ) = 0, 0 โค d โค D, sont trรจs proches des espaces de jets de la
variรฉtรฉ dรฉfinie par I qui ne sont pas rรฉduits en gรฉnรฉral.
Exemple 4.6. On considรจre ici le problรจme suivant : soient p et q deux entiers premiers
entre eux. Si x(t, z) est une sรฉrie formelle telle que xp (t, z) est proche dโune puissance qiรจme, est-ce que x(t, z) est proche dโune puissance q-iรจme ? Y a-t-il une fonction qui mesure le
rapport entre la distance de xp (t, z) ร une puissance q-iรจme et celle de x(t, z) ร une puissance
q-iรจme ? On a la rรฉponse suivante :
Proposition 4.7. Soient p et q premiers entre eux. Il existe une fonction ฮฒ : N โโ N telle
que pour tout x โ k[[t, z]], si il existe u(t, z) โ k[[t, z]] telle que xp (t, z) โ uq (t, z) โ (t, z)ฮฒ(i) ,
alors il existe v(t, z) โ k[[t, z]] telle que x(t, z) โ v q (t, z) โ (t, z)i .
On peut choisir pour ฮฒ une fonction doublement exponentielle en i.
Pour tout d โ N, si on se restreint ร tous les x(t, z) dont lโordre vaut d, alors on peut choisir
pour ฮฒ une fonction affine.
Dรฉmonstration. Soit ฮฒ la fonction de Artin de X p โ Y q . Supposons que xp (t, z) โ uq (t, z) โ
(t, z)ฮฒ(i) . Alors il existe xโฒ (t, z), uโฒ (t, z) โ k[[t, z]] tels que xโฒp (t, z) โ uโฒq (t, z) = 0 et x(t, z) โ
xโฒ t(t, z), u(t, z) โ uโฒ (t, z) โ (t, z)i . Comme p et q sont premiers entre eux et que k[[t, z]] est
factoriel il existe v(t, z) โ k[[t, z]] tel que xโฒ (t, z) = v q (t, z) et uโฒ (t, z) = v p (t, z). On a alors
le rรฉsultat avec le thรฉorรจme 4.2.
Rรฉfรฉrences
[Ar] M. Artin, Algebraic approximation of structures over complete local rings, Publ. Math. IHES, 36, (1969),
23-58.
[B-D-L-v.D] J. Becker, J. Denef, L. Lipshitz, L. van den Dries, Ultraproducts and Approximation in Local
Rings I, Inventiones math., 51, 189-203 (1979).
[E-S] D. Eisenbud, B. Sturmfels, Binomial ideals, Duke Math. J., 84, (1996), no. 1, 1-45.
[Gr] M. J. Greenberg, Rational points in henselian discrete valuation rings, Publ. Math. IHES, 31, (1966),
59-64.
[He] G. Hermann, Die Frage der endlich vielen Schritte in der Theorie der Polynomideale, Math. Ann., 95,
(1926), no. 1, 736-788.
[La] D. Lascar, Caractรจre effectif des thรฉorรจmes dโapproximation dโArtin, C. R. Acad. Sci. Paris Sรฉr. A-B,
287, (1978), no. 14, A907-A910.
[M2] D. R. Grayson, M. E. Stillman, Macaulay 2, a software system for research in algebraic geometry,
Available at ttp ://www.math.uiuc.edu/Macaulay2/
[Ro1] G. Rond, ร propos de la fonction de Artin en dimension N โฅ 2, C. R. Math. Acad. Sci. Paris, 340,
no. 8, (2005), 577-580.
[Ro2] G. Rond, Sur la linรฉaritรฉ de la fonction de Artin, Annales Scientifiques de lโรcole Normale Supรฉrieure,
vol. 38, no. 6, (2005), 979-988.
[Ro3] G. Rond, Lemme dโArtin-Rees, thรฉorรจme dโIzumi et fonction de Artin, Journal of Algebra, vol. 299,
no. 1, (2006), 245-275.
[S] A. Seidenberg, Constructions in Algebra, Trans. A.M.S., 197, (oct 1974) ; 273-313.
[Te] B. Teissier, Rรฉsultats rรฉcents dโalgรจbre commutative effective, Sรฉminaire Bourbaki, Vol. 1989/90, Astรฉrisque, No. 189-190, (1990), Exp. No. 718, 107-131.
[To] J.-C. Tougeron, Idรฉaux de fonctions diffรฉrentiables, Ergebnisse der Mathematik und ihrer Grenzgebiete,
Band 71. Springer-Verlag, Berlin-New York, (1972).
[Wa] J. J. Wavrik, A theorem on solutions of analytic equations with applications to deformations of complex
structures, Math. Ann., 216, (1975), 127-142.
[Z-S] O. Zariski, P. Samuel, Commutative Alegbra I, D. Van Nostrand Company, Inc., Princeton, New Jersey,
1958.
10
GUILLAUME ROND
IML, Campus de Luminy, Case 907, 13288 Marseille Cedex 9, France
E-mail address: [email protected]
| 0math.AC
|
Estimation in the convolution structure density model.
Part II: adaptation over the scale of anisotropic classes.
arXiv:1704.04420v1 [math.ST] 14 Apr 2017
O.V. Lepski
โ
T. Willer
โ
Institut de Matheฬmatique de Marseille
Aix-Marseille Universiteฬ
39, rue F. Joliot-Curie
13453 Marseille, France
e-mail: [email protected]
e-mail: [email protected]
Abstract:
This paper continues the research started in Lepski and Willer (2016). In the framework of
the convolution structure density model on Rd , we address the problem of adaptive minimax
estimation with Lp โloss over the scale of anisotropic Nikolโskii classes. We fully characterize
the behavior of the minimax risk for different relationships between regularity parameters and
norm indexes in the definitions of the functional class and of the risk. In particular, we show
that the boundedness of the function to be estimated leads to an essential improvement of
the asymptotic of the minimax risk. We prove that the selection rule proposed in Part I leads
to the construction of an optimally or nearly optimally (up to logarithmic factor) adaptive
estimator.
AMS 2000 subject classifications: 62G05, 62G20.
Keywords and phrases: deconvolution model, density estimation, oracle inequality, adaptive estimation, kernel estimators, Lp โrisk, anisotropic Nikolโskii class.
1. Introduction
In the present paper we will be interested in the adaptive estimation in the convolution structure
density model. Our considerations here continue the research started in Lepski and Willer (2016).
Thus, we observe i.i.d. vectors Zi โ Rd , i = 1, . . . , n, with a common probability density p
satisfying the following structural assumption
p = (1 โ ฮฑ)f + ฮฑ[f โ g],
f โ Fg (R), ฮฑ โ [0, 1],
(1.1)
where ฮฑ โ [0, 1] and g : Rd โ R are supposed to be known and f : Rd โ R is the function to be
estimated. Recall that for two functions f, g โ L1 Rd
Z
f (x โ z)g(z)ฮฝd (dz), x โ Rd ,
f โ g (x) =
Rd
and for any ฮฑ โ [0, 1], g โ L1 Rd and R > 1,
n
o
Fg (R) = f โ B1,d (R) : (1 โ ฮฑ)f + ฮฑ[f โ g] โ P Rd .
โ
This work has been carried out in the framework of the Labex Archimeฬde (ANR-11-LABX-0033) and of the
A*MIDEX project (ANR-11-IDEX-0001-02), funded by the โInvestissements dโAvenirโ French Government program
managed by the French National Research Agency (ANR).
1
imsart-generic ver. 2014/10/16 file: DSDM-adap-ArXivl.tex date: April 17, 2017
Furthermore P Rd denotes the
set of probability densities on Rd , Bs,d (R) is the ball of radius
R > 0 in Ls Rd := Ls Rd , ฮฝd , 1 โค s โค โ and ฮฝd is the Lebesgue measure on Rd . At last, for any
Pd
R
U โ L1 Rd let Uฬ (t) := Rd U (x)eโi j=1 xj tj ฮฝd (dx), t โ Rd , be the Fourier transform of U .
The convolution structure density model (1.1) will be studied for an arbitrary g โ L1 Rd and
f โ Fg (R). Then, except in the case ฮฑ = 0, the function f is not necessarily a probability density.
We want to estimate f using the observations
Z (n) = (Z1 , . . . , Zn ). By estimator, we mean any
d
(n)
n
Z -measurable map fห : R โ Lp R . The accuracy of an estimator fห is measured by the Lp โrisk
1/p
, p โ [1, โ),
Rn(p) [fห, f ] := Ef kfห โ f kpp
where Ef denotes the expectation with respect to the probability measure Pf of the observations
Z (n) = (Z1 , . . . , Zn ). Also, k ยท kp , p โ [1, โ), is the Lp -norm on Rd . The objective is to construct an
estimator of f with a small Lp โrisk.
1.1. Adaptive estimation
(p)
Let F be a given subset of Lp Rd . For any estimator fหn define its maximal risk by Rn fหn ; F =
(p)
supf โF Rn fหn ; f and its minimax risk on F is given by
ฯn (F) := inf Rn(p) fหn ; F .
fหn
(1.2)
Here, the infimum is taken over all possible estimators. An estimator whose maximal risk is bounded
by ฯn (F)
up to some constant factor is called minimax on F.
Let Fฯ , ฯ โ ฮ be a collection of subsets of Lp Rd , ฮฝd , where ฯ is a nuisance parameter which
may have a very complicated structure.
The problem of adaptive estimation can be formulated as follows: is it possible to construct a
single estimator fหn which would be simultaneously minimax on each class Fฯ , ฯ โ ฮ, i.e.
(p) ห
lim sup ฯโ1
n (Fฯ )Rn fn ; Fฯ < โ, โฯ โ ฮ?
nโโ
We refer to this question as the problem of minimax adaptive estimation over the scale {Fฯ , ฯ โ ฮ}.
If such an estimator exists, we will call it optimally adaptive. Using the modern statistical language
we call the estimator fหn nearly optimally adaptive if
(p) ห
fn ; Fฯ < โ, โฯ โ ฮ.
lim sup ฯโ1
n (Fฯ )Rn
nโโ
ln n
We will be interested in adaptive estimation over the scale
~ L
~ ~r, L,
~ โฉ Fg,โ (R, Q), ฯ = ฮฒ,
~ R, Q ,
Fฯ = N~r,d ฮฒ,
~ L
~ is the anisotropic Nikolskii class, see Definition 1 below. As it was explained in
where N~r,d ฮฒ,
~ L
~ ~r, L
~ , ฮฒ,
~ โ (0, โ)d ร [1, โ]d ร (0, โ)d
Part I, the adaptive estimation over the scale N~r,d ฮฒ,
can be viewed as the adaptation to anisotropy and inhomogeneity of the function to be estimated.
Recall also that
Fg,โ(R, Q) := f โ Fg (R) : (1 โ ฮฑ)f + ฮฑ[f โ g] โ Bโ,d (Q) ,
2
so f โ Fg,โ (R, Q) simply means that the common density of observations p is uniformly bounded
by Q. It is easy to see that if ฮฑ = 1 and kgkโ < โ then Fg,โ (R, Q) = Fg (R) for any Q โฅ Rkgkโ .
Let us briefly discuss another example. Let r > 1 and L < โ be arbitrary but a priory chosen
numbers. Assume that the considered collection of anisotropic Nikolโskii classes obeys the following
~ โ (0, L]d . Suppose also that kgks < โ, where 1/s = 1 โ 1/r.
restrictions: ~r โ [r, โ]d and L
~ L
~ โฉ Fg,โ (R, Q) =
Then, there exists Q0 completely determined by r, L and R such that N~r,d ฮฒ,
~ L
~ โฉ Fg (R) for any Q > Q0 kgks .
N~r,d ฮฒ,
Additionally, we will study the adaptive estimation over the collection
~ L
~ ~r, L,
~ โฉ Fg (R) โฉ Bโ,d (Q), ฯ = ฮฒ,
~ R, Q .
Fฯ = N~r,d ฮฒ,
We will show that the boundedness of the underlying function allows to improve considerably the
accuracy of estimation.
1.2. Historical notes
The minimax adaptive estimation is a very active area of mathematical statistics and the interested
reader can find a very detailed overview as well as several open problems in adaptive estimation in
the recent paper, Lepski (2015). Below we will discuss only the articles whose results are relevant
to our consideration, i.e. the density setting under Lp -loss, from a minimax perspective.
Let us start with the following remark. If one assumes additionally that f, g โ P Rd the
convolution structure density model can be interpreted as follows. The observations Zi โ Rd , i =
1, . . . , n, can be written as a sum of two independent random vectors, that is,
Zi = Xi + วซi Yi ,
i = 1, . . . , n,
(1.3)
where Xi , i = 1, . . . , n, are i.i.d. d-dimensional random vectors with common density f to be
estimated. The noise variables Yi , i = 1, . . . , n, are i.i.d. d-dimensional random vectors with known
common density g. At last ฮตi โ {0, 1}, i = 1, . . . , n, are i.i.d. Bernoulli random variables with
P(ฮต1 = 1) = ฮฑ, where ฮฑ โ [0, 1] is supposed to be known. The sequences {Xi , i = 1, . . . , n},
{Yi , i = 1, . . . , n} and {วซi , i = 1, . . . , n} are supposed to be mutually independent.
The observation scheme (1.3) can be viewed as the generalization of two classical statistical
models. Indeed, the case ฮฑ = 1 corresponds to the standard deconvolution model Zi = Xi +
Yi , i = 1, . . . , n. Another โextremeโ case ฮฑ = 0 correspond to the direct observation scheme
Zi = Xi , i = 1, . . . , n. The โintermediateโ case ฮฑ โ (0, 1), considered for the first time in Hesse
(1995), is understood as partially contaminated observations.
Direct case, ฮฑ = 0 There is a vast literature dealing with minimax and minimax adaptive density
estimation, see for example, Efroimovich (1986), Hasminskii and Ibragimov (1990), Golubev (1992),
Donoho et al. (1996), Devroye and Lugosi (1997), Rigollet (2006), Rigollet and Tsybakov (2007),
Samarov and Tsybakov (2007), Birgeฬ (2008), Gineฬ and Nickl (2009), Akakpo (2012), Gach et al.
(2013), Lepski (2013), among many others. Special attention was paid to the estimation of densities
with unbounded support, see Juditsky and LambertโLacroix (2004), ReynaudโBouret et al. (2011).
The most developed results can be found in Goldenshluger and Lepski (2011), Goldenshluger and Lepski
(2014) and in Section 2 we will compare in detail our results with those obtained in these papers.
3
Intermediate case, ฮฑ โ (0, 1) To the best of our knowledge, adaptive estimation in the case of
partially contaminated observations has not been studied yet. We were able to find only two papers
dealing with minimax estimation. The first one is Hesse (1995) (where the discussed model was introduced in dimension 1) in which the author evaluated the Lโ -risk of the proposed estimator over
a functional class formally corresponding to the Nikolโskii class Nโ,1 (2, 1). In Yuana and Chenb
(2002) the latter result
was developed to the multidimensional setting, i.e. to the minimax es~
timation on Nโ,d 2, 1 . The most intriguing fact is that the accuracy of estimation in partially
contaminated noise is the same as in the direct observation scheme. However none of these articles
studied the optimality of the proposed estimators. We will come back to the aforementioned papers
in Section 1.3.1 in order to compare the assumptions imposed on the noise density g.
Deconvolution case, ฮฑ = 1 First let us remark that the behavior of the Fourier transform of the
function g plays an important role in all the works dealing with deconvolution. Indeed ill-posed
problems correspond to Fourier transforms decaying towards zero. Our results will be established
for โmoderatelyโ ill posed problems, so we detail only results in papers studying that type of
operators. This assumption means that there exist ~ยต = (ยต1 , . . . , ยตd ) โ (0, โ)d and ฮฅ1 > 0, ฮฅ2 > 0
such that the Fourier transform gฬ of g satisfies:
ฮฅ1
d
Y
(1 +
j=1
t2j )โ
ยตj
2
โค gฬ(t) โค ฮฅ2
d
Y
(1 + t2j )โ
j=1
ยตj
2
,
โt = (t1 , . . . , td ) โ Rd .
(1.4)
Some minimax and minimax adaptive results in dimension 1 over different classes of smooth
functions can be found in particular in Stefanski and Carroll (1990), Fan (1991), Fan (1993),
Pensky and Vidakovic (1999), Fan and Koo (2002), Comte and al. (2006), Hall and Meister (2007),
Meister (2009), Lounici and Nickl (2011), Kerkyacharian et al. (2011).
There are very few results in the multidimensional setting. It seems that Masry (1993) was the
first paper where the deconvolution problem was studied for multivariate densities. It is worth
noting that Masry (1993) considered more general weakly dependent observations and this paper
formally does not deal with the minimax setting. However the results obtained in this paper could
be formally compared
with the estimation under Lโ -loss over the isotropic Hoฬlder class of regularity
2, i.e. Nโ,d ~2, 1 which is exactly the same setting as in Yuana and Chenb (2002) in the case of
partially contaminated observations. Let us also remark that there is no lower bound result in Masry
(1993). The most developed results in the deconvolution model were obtained in Comte and Lacour
(2013) and Rebelles (2016) and in Section 2 we will compare in detail our results with those obtained
in these papers.
1.3. Lower bound for the minimax Lp -risk
We have seen that the problem of optimal adaptation over
the collection Fฯ , ฯ โ ฮ is formulated
as the โattainabilityโ of the family of minimax risks ฯn (Fฯ ), ฯ โ ฮ by a single estimator. Although it is not necessary, the following โtwo-stageโ approach is used for the majority of problems
related to the minimax adaptive estimation. The first step consists in finding a lower bound for
ฯn (Fฯ ) for any ฯ โ ฮ while the second one consists in constructing an estimator โattainingโ, at
least asymptotically, this bound. We adopt this strategy in our investigations and below we present
several lower bound results recently obtained in Lepski and Willer (2017).
4
1.3.1. Assumptions on the function g imposed in Lepski and Willer (2017)
Let Jโ denote the set of all subsets of {1, . . . , d}. Set J = Jโ โช โ
and for any J โ J let |J| denote
the cardinality of J while {j1 < ยท ยท ยท < j|J| } denotes its elements.
|J |
For any J โ Jโ define the operator DJ = โtj โยทยทยทโtj and let Dโ
denote the identity operator. For
1
|J |
any I, J โ J define DI,J = DI DJ and note that obviously DI,J = DJ,I .
Assumption 1 (ฮฑ 6= 1). DJ gฬ exists for any J โ Jโ and supJโJโ DJ gฬ
โ
< โ;
Assumption 2 (ฮฑ = 1). DJ gฬ exists for any J โ Jโ and supJโJโ gฬ โ1 DJ gฬ
there exists ~
ยต = (ยต1 , . . . , ยตd ) โ (0, โ)d and ฮฅ > 0 such that
ยตj
Q
|gฬ(t)| โค ฮฅ dj=1 (1 + t2j )โ 2 , โt = (t1 , . . . , td ) โ Rd .
Assumption 3 (ฮฑ = 1). g is a bounded function.
Assumption 4 (ฮฑ = 1). DI,J gฬ exists for any I, J โ J and supI,JโJ DI,J gฬ
Z
Y
g(z)
zj2 dz < โ.
sup
JโJโ
Rd
โ
1
< โ. Moreover,
< โ. Moreover
jโJ
It is worth noting that all the bounds in Lepski and Willer (2017) are obtained under Assumptions 1 and 2. Assumption 3 is used when the estimation of unbounded functions is considered; we
come back to this assumption in Section 2.4.2.
As to Assumption 4, it seems purely technical and does not appear in upper bound results.
We also recall
that the lower bounds in Lepski and Willer (2017) are proved under the condition:
d
gโP R .
1.3.2. Some lower bounds from Lepski and Willer (2017)
~ (ฮฑ) = ~
~ (ฮฑ) = (0, . . . , 0), ฮฑ โ [0, 1), and introduce for any ฮฒ~ โ (0, โ)d , ~r โ [1, โ]d
Set ยต
ยต, ฮฑ = 1, ยต
d
~ โ (0, โ) the following quantities.
and L
d
X 2ยตj (ฮฑ) + 1
1
=
,
ฮฒ(ฮฑ)
ฮฒj
j=1
d
X
2ยตj (ฮฑ) + 1
1
=
,
ฯ(ฮฑ)
ฮฒj rj
j=1
L(ฮฑ) =
d
Y
2ยตj (ฮฑ)+1
ฮฒj
Lj
.
(1.5)
j=1
Define for any 1 โค s โค โ and ฮฑ โ [0, 1]
ฮบฮฑ (s) = ฯ(ฮฑ)(2 + 1/ฮฒ(ฮฑ)) โ s
ฯ (s) = 1 โ 1/ฯ(0) + 1/(sฮฒ(0)).
(1.6)
General case. Remind that z(ฮฑ) = ฯ(ฮฑ)(2 + 1/ฮฒ(ฮฑ))ฮฒ(0)ฯ (โ) + 1, pโ = maxl=1,...,d rl โจ p. Set
ฬบ(ฮฑ) =
๏ฃฑ
๏ฃด
๏ฃด
๏ฃด
๏ฃด
๏ฃด
๏ฃด
๏ฃฒ
๏ฃด
๏ฃด
๏ฃด
๏ฃด
๏ฃด
๏ฃด
๏ฃณ
1โ1/p
1โ1/ฯ(ฮฑ)+1/ฮฒ(ฮฑ) ,
ฮฒ(ฮฑ)
2ฮฒ(ฮฑ)+1 ,
ฯ (p)ฯ(ฮฑ)ฮฒ(0)
,
z(ฮฑ)
โ
ฯ(ฮฑ)(1โp /p)
,
ฮบฮฑ (pโ )
5
ฮบฮฑ (p) > pฯ(ฮฑ);
0 < ฮบฮฑ (p) โค pฯ(ฮฑ);
ฮบฮฑ (p) โค 0, ฯ (pโ ) > 0;
ฮบฮฑ (p) โค 0, ฯ (pโ ) โค 0.
(1.7)
โ
/p)
Here and later we assume 0/0 = 0, which implies in particular that ฯ(ฮฑ)(1โp
= 0 if pโ = p and
ฮบฮฑ (pโ )
ฮบฮฑ (p) = 0. Recall also that ฮบฮฑ (pโ )/pโ = โ1 if pโ = โ. Put at last
๏ฃฑ
L(ฮฑ)nโ1 ,
ฮบฮฑ (p) > 0;
๏ฃด
๏ฃด
๏ฃฒ
L(ฮฑ)nโ1 ln(n),
ฮบฮฑ (p) โค 0, ฯ (pโ ) โค 0;
ฮดn =
๏ฃด
๏ฃด
ฮบฮฑ (p)
๏ฃณ
โ
ฮบฮฑ (p) โค 0, ฯ (pโ ) > 0.
[L(0)] ฯ(ฮฑ)pฯ (p) L(ฮฑ)nโ1 ln(n),
Theorem 1 (Lepski and Willer (2017)). Let L0 > 0 and 1 โค p < โ be fixed.
~ โ [L0 , โ)d , ~ยต โ (0, โ)d , R > 1 and g โ P Rd ,
Then for any ฮฒ~ โ (0, โ)d , ~r โ [1, โ]d , L
~ such that
satisfying Assumptions 1โ4, there exists c > 0 independent of L
lim inf inf
nโโ
sup
fหn f โN
~~
~
r ,d ฮฒ,L โฉFg (R)
ฮด nโฬบ(ฮฑ) R(n)
fหn ; f โฅ c,
p
where the infimum is taken over all possible estimators.
Following the terminology used in Lepski and Willer (2017), we will call the set of parameters
satisfying ฮบฮฑ (p) > pฯ(ฮฑ) the tail zone, satisfying 0 < ฮบฮฑ (p) โค pฯ(ฮฑ) the dense zone and satisfying
ฮบฮฑ (p) โค 0 the sparse zone. In its turn, the latter zone is divided into two sub-domains: the sparse
zone 1 corresponding to ฯ (pโ ) > 0 and the sparse zone 2 corresponding to ฯ (pโ ) โค 0.
Bounded case. Introduce
ฯ(ฮฑ) =
๏ฃฑ
๏ฃด
๏ฃด
๏ฃด
๏ฃด
๏ฃด
๏ฃด
๏ฃฒ
๏ฃด
๏ฃด
๏ฃด
๏ฃด
๏ฃด
๏ฃด
๏ฃณ
1โ1/p
1โ1/ฯ(ฮฑ)+1/ฮฒ(ฮฑ) ,
ฮฒ(ฮฑ)
2ฮฒ(ฮฑ)+1 ,
ฯ (p)ฯ(ฮฑ)ฮฒ(0)
,
z(ฮฑ)
ฯ(ฮฑ)
p ,
ฮบฮฑ (p) > pฯ(ฮฑ);
0 < ฮบฮฑ (p) โค pฯ(ฮฑ);
ฮบฮฑ (p) โค 0, ฯ (โ) > 0;
(1.8)
ฮบฮฑ (p) โค 0, ฯ (โ) โค 0.
Theorem 2 (Lepski and Willer (2017)). Let L0 > 0 and 1 โค p < โ be fixed.
~ โ [L0 , โ)d , Q > 0, ~ยต โ (0, โ)d and g โ P Rd ,
Then for any ฮฒ~ โ (0, โ)d , ~r โ [1, โ]d , L
~ such that
satisfying Assumptions 1 and 2 there exists c > 0 independent of L
โฯ(ฮฑ) (n) ห
sup
lim inf inf
ฮด
R
f
;
f
โฅ c,
n
n
p
nโโ fห
n
~L
~ โฉP Rd โฉBโ,d (Q)
f โN~r,d ฮฒ,
where the infimum is taken over all possible estimators.
1.4. Assumptions on the function g
The selection rule from the family of linear estimators, the Lp -norm oracle inequalities obtained
in Part I and all the adaptive results presented in the paper are established under the following
condition imposed on the function g.
Assumption 5. (1) if ฮฑ 6= 1 then there exists ฮต > 0 such that
1 โ ฮฑ + ฮฑgฬ(t) โฅ ฮต,
โt โ Rd ;
(2) if ฮฑ = 1 then there exists ยต
~ = (ยต1 , . . . , ยตd ) โ (0, โ)d and ฮฅ0 > 0 such that
ยตj
Q
|gฬ(t)| โฅ ฮฅ0 dj=1 (1 + t2j )โ 2 , โt = (t1 , . . . , td ) โ Rd .
6
Comparing this condition with Assumption 2 from Section 1.3.1, we can assert that both are
coherent if ฮฑ = 1. Indeed, in this case, we come the following assumption, which is well-known in
the literature:
ยตj
ยตj
Q
Q
ฮฅ0 dj=1 (1 + t2j )โ 2 โค |gฬ(t)| โค ฮฅ dj=1 (1 + t2j )โ 2 , โt โ Rd .
referred to as a moderately ill-posed statistical problem, cf. (1.4). In particular, the assumption is
checked for the centered multivariate Laplace law.
Note first that Assumption 5 is in some sense weaker than Assumption 1 when ฮฑ โ (0, 1), since
it does not require regularity properties of the function g. Moreover both assumptions are not too
restrictive. They are verified for many distributions, including centered multivariate Laplace and
Gaussian ones. Note also that Assumption 5 always holds with ฮต = 1 โ 2ฮฑ if ฮฑ < 1/2. Additionally,
it holds with ฮต = 1 โ ฮฑ if gฬ is a real positive function. The latter is true, in particular, for any
probability law obtained by an even number of convolutions of a symmetric distribution with itself.
Next, our Assumption 5 is weaker than the conditions imposed in Hesse (1995) and Yuana and Chenb
(2002). In these papers gฬ โ C(2) Rd , gฬ(t) 6= 0 for any t โ Rd and
1 โ ฮฑ + ฮฑgฬ(t) โฅ 1 โ ฮฑ,
โt โ Rd .
2. Adaptive estimation over the scale of anisotropic Nikolโskii classes
We start this section by recalling the definition of the pointwise selection rule proposed in Part I.
2.1. Pointwise selection rule
R
Let K : Rd โ R be a continuous function belonging to L1 Rd such that R K = 1. Set
k
d
e , k โ Z and let Hd = ~h = (h1 , . . . , hd ) : hj โ H, j = 1, . . . , d . Recall that Hisotr
=
Q
d
d
d
~
~
H : h = (h, . . . , h), h โ H . Set V~h = j=1 hj and let for any h โ H
K~h (t) = V~โ1 K t1 /h1 , . . . , td /hd , t โ Rd .
H =
~h โ
h
Later on for any u, v โ Rd the operations and relations u/v, uv, u โจ v,u โง v, u โฅ v, au, a โ R, are
understood in coordinate-wise sense. In particular u โฅ v means that uj โฅ vj for any j = 1, . . . , d.
For any ~h โ (0, โ)d let M ยท, ~h satisfy the operator equation
Z
~
g(t โ y)M t, ~h dt, y โ Rd .
(2.1)
K~h (y) = (1 โ ฮฑ)M y, h + ฮฑ
Rd
Introduce for any ~h โ Hd and x โ Rd
fb~h (x) = nโ1
n
X
i=1
bn x, ~h =
U
where Mโ = (2ฯ)โd ฮตโ1 Kฬ
n
1X
ฯ
b2 x, ~h =
M 2 Zi โ x, ~h ;
n
M Zi โ x, ~h ,
s
i=1
b2 x, ~h
2ฮปn ~h ฯ
4Mโ ฮปn ~h
+
,
Q
n
3n dj=1 hj (hj โง 1)ยตj (ฮฑ)
1
+ ฮฅโ1
0 k1 1ฮฑ=1
1 ฮฑ6=1
7
โจ 1 and
d
X
1 + ยตj (ฮฑ) ln(hj ) .
ฮปn ~h = 4 ln(Mโ ) + 6 ln (n) + (8p + 26)
j=1
Let H be an arbitrary subset of
For any ~h โ H and x โ Rd introduce
h
i
bn x, ~ฮท
bn x, ~h โจ ~ฮท โ 4U
b~ (x) = sup fb~ (x) โ fb~ฮท (x) โ 4U
;
R
hโจ~
ฮท
h
Hd .
+
ฮท โH
~
bnโ x, ~h =
U
sup
ฮท โH: ~
~
ฮทโฅ~h
bn x, ~ฮท ,
U
(2.2)
(2.3)
h
i
b~ (x) + 8U
bnโ x, ~h .
and define ~h(x) = arg inf ~hโH R
h
Our final estimator is fbh(x)
(x),
x โ Rd and we will call (2.2) the pointwise selection rule.
~
Remark 1. Note that the estimator fb~h depends on H and later on we will consider two choices
d
of the parameter set H, namely H = Hd and H = Hisotr
. So, to present our results we will write
b
f~h,H in order to underline the aforementioned dependence. The choice H = Hd will be used when
d
the adaptation is studied over anisotropic Nikolโskii classes while H = Hisotr
will be used when the
considered scale consists of isotropic classes.
2.2. Anisotropic Nikolโskii classes
Let (e1 , . . . , ed ) denote the canonical basis of Rd . For some function G : Rd โ R1 and real number
u โ R define the first order difference operator with step size u in direction of the variable xj by
โu,j G(x) = G(x + uej ) โ G(x),
j = 1, . . . , d.
By induction, the k-th order difference operator with step size u in direction of the variable xj is
defined as
k
X
k
kโ1
l+k k
โu,j G(x) = โu,j โu,j G(x) =
(โ1)
โul,j G(x).
(2.4)
l
l=1
~ =
Definition 1. For given vectors ~r = (r1 , . . . , rd ) โ [1, โ]d ฮฒ~ = (ฮฒ1 , . . . , ฮฒd ) โ (0, โ)d and L
d
d
1
(L1 , . . . , Ld ) โ (0, โ) we say that a function G : R โ R belongs to the anisotropic Nikolskii class
~ L
~ if
N~r,d ฮฒ,
(i) kGkrj โค Lj for all j = 1, . . . , d;
(ii) for every j = 1, . . . , d there exists natural number kj > ฮฒj such that
k
j
โu,j
G
rj
โค Lj |u|ฮฒj ,
โu โ R, โj = 1, . . . , d.
If ฮฒj = ฮฒ โ (0, โ), rj = r โ [1, โ] and Lj = L โ (0, โ) for any j = 1, . . . , d the corresponding
Nikolskii class, denoted furthermore Nr,d (ฮฒ, L), is called isotropic.
8
2.3. Construction of kernel K
First, we recall that all results concerning the Lp risk of the pointwise selection rule, established in
Part I, are proved under the following assumption imposed on the kernel K.
Assumption 6. There exist k1 > 0 and k2 > 0 such that
Z
Kฬ(t)
Rd
d
Y
(1 + t2j )
j=1
ยตj (ฮฑ)
2
dt โค k1 ,
Z
Rd
Kฬ(t)
2
d
Y
(1 + t2j )ยตj (ฮฑ) dt โค k22 .
(2.5)
j=1
use the following specific kernel K in the definition of the estimatorโs family
Next, we will
d
~
b
f~h (ยท), h โ H [see, e.g., Kerkyacharian et al. (2001) or Goldenshluger and Lepski (2014)].
Let โ beR an integer number, and let K : R1 โ R1 be a compactly supported continuous function
satisfying R1 K(y)dy = 1, and K โ C(R1 ). Put
Kโ (y) =
โ
X
โ
i=1
1 y
,
(โ1)i+1 K
i
i
i
(2.6)
and add the following structural condition to Assumption 6.
Q
Assumption 7. K(x) = dj=1 Kโ (xj ), โx โ Rd .
The kernelRK constructed in this way is bounded, compactly supported, belongs to C(Rd )โฉL1 (Rd )
and satisfies Rd K = 1. Some examples of kernels satisfying simultaneously Assumptions 6 and 7
can be found for instance in Comte and Lacour (2013).
2.4. Main results
Introduce the following notations: ฮดn = L(ฮฑ)nโ1 ln(n) and
๏ฃฑ
๏ฃด
[ln(n)]t(H) ,
๏ฃด
๏ฃด
๏ฃด
๏ฃด
(
1
๏ฃด
๏ฃฒ ln p (n) โจ [ln(n)]t(H) ,
d โ 1,
H = Hd ;
t(H) =
bn (H) =
1
d
๏ฃด
0,
H = Hisotr
,
๏ฃด
ln p (n),
๏ฃด
๏ฃด
๏ฃด
๏ฃด
๏ฃณ
1,
ฮบฮฑ (p) > pฯ(ฮฑ);
ฮบฮฑ (p) = pฯ(ฮฑ);
ฮบฮฑ (p) = 0;
otherwise,
2.4.1. Bounded case
The
we address is the adaptive estimation over the collection of the functional classes
first problem
~
~
.
N~r,d ฮฒ, L โฉ Fg (R) โฉ Bโ,d (Q) ฮฒ,~
~ r ,L,R,Q
~
As it was
conjectured in Lepski and Willer (2017), the boundedness of the function belonging to
~ L
~ โฉ Fg (R) is a minimal condition allowing to eliminate the inconsistency zone. The results
N~r,d ฮฒ,
obtained in Theorem 3 below together with those from Theorem 2 confirm this conjecture.
Theorem 3. Let ฮฑ โ [0, 1], โ โ Nโ and g โ L1 Rd , satisfying Assumption 5, be fixed. Let K
satisfy Assumptions 6 and 7.
9
~ โ (0, โ]d , ~r โ (1, โ]d and L
~ โ [L0 , โ)d
1) Then for any p โ (1, โ), Q > 0, R > 0, L0 > 0, ฮฒ
~ such that:
there exists C < โ, independent of L,
โ1 โฯ(ฮฑ) (n)
lim sup
sup
ฮดn
Rp fb~h,H ; f โค C,
bn H d
nโโ
~L
~ โฉFg (R)โฉBโ,d (Q)
f โN~r,d ฮฒ,
where ฯ(ฮฑ) is defined in (1.8).
2) For any p โ (1, โ), Q > 0, R > 0, L0 > 0, ฮฒ โ (0, โ], r โ [1, โ] and L โ [L0 , โ) there exists
C < โ, independent of L, such that:
โ1 โฯ(ฮฑ) (n)
d
lim sup
sup
ฮดn
Rp fb~h,Hd ; f โค C,
bn Hisotr
isotr
nโโ
f โNr,d ฮฒ,L โฉFg (R)โฉBโ,d (Q)
Some remarks are in order. 10 . Our estimation procedure is completely data-driven, i.e. inde~ ~r, L,
~ R, Q, and the assertions of Theorem 3 are completely new if ฮฑ 6= 0. Comparing
pendent of ฮฒ,
the results obtained in Theorems 2 and 3 we can assert that our estimator is optimally-adaptive
if ฮบฮฑ (p) < 0 and nearly optimally adaptive if 0 < ฮบฮฑ (p) < pฯ(ฮฑ). The construction of an estimation procedure which would be optimally-adaptive when ฮบฮฑ (p) โฅ 0 is an open problem, and we
conjecture that the lower bounds for the asymptotics of the minimax risk found in Theorem 2 are
sharp in order. This conjecture in the case ฮฑ = 1 is partially confirmed by the results obtained
in Comte and Lacour (2013) and Rebelles (2016). Since both articles deal with the estimation of
unbounded functions we will discuss them in the next section.
It is worth noting that all the previous statements are true not only for the convolution structure
density model but also, in view of Theorem 2, for the observation scheme (1.3) as well.
20 . We note that the asymptotic of the minimax risk under partially contaminated observations, ฮฑ โ (0, 1), is independent of ฮฑ and coincides with the asymptotic of the risk in the
direct observation model, ฮฑ = 0. For the first time this phenomenon was discovered in Hesse
(1995) and Yuana and Chenb (2002). In the very recent paper Lepski (2017), in the particular case
~r = (p, . . . , p), p โ (1, โ) the optimally adaptive estimator was built. It is easy to check that
independently of the value of ฮฒ~ and ~
ยต, the corresponding set of parameters belongs to the dense
zone. Note however that our estimator is only optimally-adaptive in this zone, but it is applied to a
much more general collection of functional classes. It is worth noting that the estimator procedure,
used in Lepski (2017), has nothing in common with our pointwise selection rule.
30 . As to the direct observation scheme, ฮฑ = 0, our results coincide with those obtained recently
in Goldenshluger and Lepski (2014), when pฯ(0) > ฮบ0 (p). However, for the tail zone pฯ(0) โค ฮบ0 (p),
our bound is slightly better since the bound obtained in the latter paper contains an additional
d
factor ln p (n). It is interesting to note that although both estimator constructions are based upon
local selections from the family of kernel estimators, the selection rules are different.
40 . Let us finally discuss the results corresponding to the tail zone, ฮบฮฑ (p) > pฯ(ฮฑ). First, the
lower bound for the minimax risk is given by [L(ฮฑ)nโ1 ]ฯ(ฮฑ) while the accuracy provided by our
estimator is
dโ1
ln p (n)[L(ฮฑ)nโ1 ln(n)]ฯ(ฮฑ) .
As we mentioned above, the passage from [L(ฮฑ)nโ1 ]ฯ(ฮฑ) to [L(ฮฑ)nโ1 ln(n)]ฯ(ฮฑ) seems to be an
unavoidable payment for the application of a local selection scheme. It is interesting to note that
dโ1
the additional factor ln p (n) disappears in the dimension d = 1. First, note that if ฮฑ = 0 the onedimensional setting was considered in Juditsky and LambertโLacroix (2004) and ReynaudโBouret et al.
10
(2011). The setting of Juditsky and LambertโLacroix (2004) corresponds to r = โ, while ReynaudโBouret et al.
(2011) deal with the case of p = 2 and ฯ (2) > 0. Both settings rule out the sparse zone. The rates
of convergence found in these papers are easily recovered from our results corresponding to the tail
and dense zones.
Next, we remark that the aforementioned factor appears only when anisotropic functional classes
are considered. Indeed, in view of the second assertion of Theorem 3 our estimator is nearly optimally adaptive on the tail zone in the isotropic case. The natural question arising in this context,
dโ1
is whether the ln p (n)-factor is an unavoidable payment for anisotropy of the underlying function
or not?
At last, we note that in the isotropic case our results remain true when the corresponding
Nikolโskii class is defined in L1 -norm on Rd (r = 1). It is worth noting that the analysis of the proof
of the theorem allows us to assert that if rj = 1, j โ J for some J 6= {1, . . . , d} the first statement
remains true up to some logarithmic factor. However the asymptotic of the maximal risk of our
estimator if rj = 1 for any j = 1, . . . , d remains unknown.
50 . We finish our discussion with the following remark. If ฮฑ 6= 1 the assumption f โ Fg,โ (R, Q)
implies in many cases that f is uniformly bounded and, therefore, Theorem 3 is applicable. In
particular it is always the case if the model (1.3) is considered. Indeed f, g โ P Rd in this case,
which implies kf kโ โค (1 โ ฮฑ)โ1 kpkโ โค (1 โ ฮฑ)โ1 Q. Another case is kgkโ < โ and recall that this
assumption was used in the proofs of Theorems 1 and 2, Assumption 3. We obviously have that
kf kโ โค (1 โ ฮฑ)โ1 Q + ฮฑRkgkโ .
More generally kf kโ โค (1โฮฑ)โ1 (Q+ฮฑD) if f โ Fg,โ (R, Q) and kf โgkโ โค D. Since the definition
of the Nikolโskii class implies that kf krโ โค Lโ , where r โ = supj=1,...,d rj and Lโ = supj=1,...,d Lj , the
latter condition can be verified in particular if kgkq < โ, 1/q = 1 โ 1/r โ . All saying above explains
why we study the estimation of unbounded functions only in the case ฮฑ = 1.
2.4.2. Unbounded case, ฮฑ = 1
The
problem
we address now is the adaptive estimation over the collection of functional classes
~ L
~ โฉ Fg,โ (R, Q) ~ ~
.
N~r,d ฮฒ,
ฮฒ,~
r,L,R,Q
As we already mentioned, if additionally kgkโ < 0 then Fg,โ (R, Q) = Fg (R) for any Q โฅ Rkgkโ
and, therefore, in view of Theorem 1 discussed in Section 1.3, there is no consistent estimator if
either p = 1 or ฮบฮฑ (p) โค 0, ฯ (p) โค 0, pโ = p. Analyzing the proof of the latter theorem, we come
to the following assertion.
Conjecture 1. Let ฮฑ = 1 and assume that Assumption 4 is fulfilled. Suppose additionally that
Assumption 2 holds with minj=1,...,d ยตj > 1/p. Then, the assertion of Theorem 1 remains true if
~ L
~ L
~ โฉ Fg (R) by N~r,d ฮฒ,
~ โฉ Fg,โ (R, Q).
one replaces N~r,d ฮฒ,
The latter result is formulated as a conjecture only because we will not prove it in the present
paper. Its proof is postponed to Part III where the adaptive estimation over the collection
~ L
~ โฉ Fg,u (R, Q) โฉ Bq,d (Q) ~ ~
N~r,d ฮฒ,
ฮฒ,~
r,L,R,Q,u,q
introduced in Part I will be studied. For this reason, later on we will only consider the parameters
~ ~r belonging to the set Pp,~ยต defined below.
ฮฒ,
n
o
~ ~r : ฮบฮฑ (p) โค 0, ฯ (p) โค 0, max rj โค p .
Pp,~ยต = (0, โ)d ร [1, โ]d \ ฮฒ,
j=1,...,d
11
For given p > 1 and ~
ยต โ (0, โ)d the latter set consists of the class parameters for which a uniform
consistent estimation is possible.
Theorem 4. Let โ โ Nโ and g โ L1 Rd , satisfying Assumption 5 be fixed and let K satisfy
Assumptions 6 and 7.
~ ~r) โ Pp,~ยต โฉ (0, โ]d ร
1) Then for any p > [minj=1,... ยตj ]โ1 , R, Q > 0, 0 < L0 โค Lโ < โ, ฮฒ,
~ โ [L0 , Lโ ]d there exists C < โ, independent of L,
~ such that:
(1, โ]d and L
lim sup
nโโ
sup
~L
~ โฉFg,โ (R,Q)
f โN~r,d ฮฒ,
bn H d
โ1
ฮดnโฬบ(1) Rp(n) fb~h,Hd ; f โค C,
where ฬบ(ยท) is defined in (1.7).
2) For any p > [minj=1,... ยตj ]โ1 , R, Q > 0, 0 < L0 โค Lโ < โ, (ฮฒ, r) โ Pp,~ยต โฉ (0, โ] ร (1, โ]
and L โ [L0 , Lโ ] there exists C < โ, independent of L, such that:
lim sup
nโโ
sup
f โNr,d ฮฒ,L โฉFg,โ (R,Q)
d
bn Hisotr
โ1
ฮดnโฬบ(1) R(n)
fb~h,Hd
p
isotr
; f โค C.
Some remarks are in order.
10 . Note that kgk1 < โ, kgkโ < โ implies that kgk2 < โ and, therefore the Parseval identity
together with Assumption 5 allows us to assert that
kgkโ < โ
โ
ยตj > 1/2,
โj = 1, . . . , d.
(2.7)
Hence, the condition p > [minj=1,... ยตj ]โ1 is automatically checked if p โฅ 2 and kgkโ < โ.
Also, it is worth noting that considering the adaptation over the collection of isotropic classes,
we do not require that the coordinates of ~ยต would be the same. The latter is true for the second
assertion of Theorem 3 as well. At last, analyzing the proof of the theorem, we can assert that the
second assertion remains true under the slightly weaker assumption p > d(ยต1 + ยท ยท ยท + ยตd )โ1 .
20 . The assertion of Theorem 1 has no analogue in the existing literature except the results
obtained in Comte and Lacour (2013) and Rebelles (2016). Comte and Lacour (2013) deals with
the particular case p = 2, ~r = (2, . . . , 2) while Rebelles (2016) studied the case ~r = (p, . . . , p),
p โ (1, โ). It is easy to check that in both papers whatever the value of ฮฒ~ and ~ยต, the corresponding
set of parameters belongs to the dense zone. Note also that the estimation procedures used in
Comte and Lacour (2013) as well as in Rebelles (2016), if p โฅ 2, (both based on a global version of
the Goldenshluger-Lepski method) are optimally-adaptive. They attain the asymptotic of minimax
risks corresponding to the dense zone found in Theorem 1, while our method is only nearly optimally
adaptive. However, it is well-known that the global selection from the family of standard kernel
estimators leads to correct results only if ~r = (p, . . . , p) when the Lp -risk is considered, see, for
instance Goldenshluger and Lepski (2011). On the other hand, estimation procedures based on a
local selection scheme, which can be applied to the estimation of functions belonging to much more
general functional classes, often do not lead to an optimally adaptive method. Fortunately, the loss
of accuracy inherent to local procedures is logarithmic w.r.t. the number of observations.
30 . Together with Theorems 1 and 2, Theorems 3 and 4 provide the full classification of the
asymptotics of the minimax risks over anisotropic/isotropic Nikolskii classes for the class parameters
belonging to the sparse zone and, up to some logarithmic factor, belonging to the tail and dense
zones as well as the boundaries. We mean that the results of these theorems are valid for any
12
~ โ (0, โ)d . Indeed, for given ฮฒ~ and L
~ one can choose L0 =
fixed ฮฒ~ โ (0, โ)d , ~r โ (1, โ]d and L
minj=1,...d Lj , Lโ = maxj=1,...d Lj and the number โ, used in the kernel construction (2.6), as any
integer strictly larger than maxj=1,...d ฮฒj .
2.4.3. Open problems
Let us briefly discuss some unresolved adaptive estimation problems in the convolution structure
density model.
Construction of an optimally-adaptive estimator As we already mentioned the proposed pointwise selection rule leads to an optimal adaptive estimator only for the class parameters belonging
to the sparse zone (in both bounded and unbounded case). We conjecture that the construction of
an optimally-adaptive estimator for all values of the nuisance parameters via pointwise selection is
impossible, and other methods should be invented. It is worth noting that no optimally-adaptive
estimator is known neither in the density model nor in the density deconvolution even in dimension
1. In dimension larger than 1, one of the intriguing questions is related to the eventual price to pay
dโ1
for anisotropy (ln p (n)-factor) discussed in the remark 40 after Theorem 3.
Adaptive estimation of unbounded functions We were able to study the unbounded case only
if ฮฑ = 1. The estimation of unbounded densities under direct as well as partially contaminated
observations remain open problems. We conjecture that the results obtained in the case ฮฑ = 1
are not true anymore for ฮฑ 6= 1 (neither upper bounds nor lower bound), but correct (or nearly
correct) upper bounds for the asymptotics of the minimax risk can still be deduced from the oracle
inequalities proved in Part I.
In the case ฮฑ = 1 there are at least two interesting problems. First, all our results are valid
under the condition p > [minj=1,... ยตj ]โ1 . How the absence of this assumption may have effects on
the accuracy of estimation is absolutely unclear. Next, let us mention that the lower bound result
proved in Theorem 1 holds only under the consideration of the convolution structure density model.
Could the same bounds be established in the deconvolution model (1.3)?
Adjustment of โlowerโ and โupper boundโ assumptions to each other Comparing the assertions of Theorems 1 and 2 with those of Theorem 3 and 4, we remark that the obtention of the
corresponding lower bounds for the minimax risk requires additional, rather restrictive, assumptions
on the function g. Can they be weakened or even removed?
3. Proof of Theorems 3 and 4
The proofs are based on the application of Theorem 3 from Part I and on some auxiliary assertions
presented below.
In the subsequent proof c, c1 , c2 , C, C1 , C2 . . ., stand for constants that can depend on g, L0 , Lโ ,
~ ~r, d and p, but are independent of L
~ and n. These constants can be different on different
Q, R, ฮฒ,
appearances.
3.1. Important concepts from Part I and proof outline
In this section we recall the definition of some important quantities that appeared in Theorem 3 of
Part I and discuss the facts which should be established to make this theorem applicable.
13
I0 . Theorem 3 (Part I) deals with the minimax result over a class F being an arbitrary subset
of Fg,u (R, D) โฉ Bq,d (D) defined in Section 2.3 of Part I. In Theorem 3 we will consider F =
~ L
~ โฉ Bโ,d (Q) and, therefore, F โ Fg,โ (R, D) โฉ Bโ,d (Q) with D = Q[1 โ ฮฑ + ฮฑkgk1 ]. This
N~r,d ฮฒ,
makes Theorem 3 (Part I) with u = โ applicable
in this case.
~ L
~ ~r and L
~ โฉ Fg,โ (Q). We will show that for any ฮฒ,
~ one
In Theorem 4 we consider F = N~r,d ฮฒ,
~ L
~ โ Bq,d (D) and, therefore, Theorem 3 (Part I) is
can find q > 1 and D > 0 such that N~r,d ฮฒ,
applicable with u = โ. The latter inclusions are mostly based on the embedding of anisotropic
Nikolโskii spaces used in the proof of Proposition 3 and on Lemma 1.
II0 . The application of Theorem 3 (Part I) in the case u = โ requires to compute
J ~h, v = j โ {1, . . . , d} : hj โ Vj (v) , Vj (v) = v โ H : Bj,โ,F (v) โค cv ,
X
sj
โsj
;
v
Bj,sj ,F hj
ฮ~s (v, F, โ) = inf
~hโH(v,2)
ฮ~s v, F = inf
~hโH(v)
X
ยฏ ~h,v)
jโJ(
v
โsj
ยฏ ~h,v)
jโJ(
Bj,sj ,F hj
sj
+v
โ2
Fn2
~h ,
1/2 Qd
P
โ 12
โยตj (ฮฑ)
(nh)
where remind Fn ~h = ln n + dj=1 | ln hj |
and c > 0 is a universal
j=1
j (hj โง 1)
constant completely determined by the kernel Kโ and the dimension d.
In the next section we propose quite sophisticated constructions of vectors h(ยท, s) and ~h(ยท, s),
s โ [1, โ] and show, Propositions 1 and 2, that
~
h(v,
1) โ H(v), v โ [v, 1],
~
h(v,
โ) โ H(v, 2), v โ [v, v],
~h(v, โ) โ H(v, 2).
(3.1)
Here v is defined in (3.15), v, v are defined in (3.16) and v โ {1, v1 , v3 , v, v โง v3 }, where v1 , v3
are defined in (3.18) and v is given in (3.19). In Proposition 3 we prove that for any ~h โ Hd
Bj,r
j ,N~
r,d
and if ฯ (pโ ) > 0 then additionally
B
hj โค C1 Lj hฮฒj ,
j
~L
~
ฮฒ,
hj โค C1 Lj hฮณj ,
j
~~
j,qj ,N~r,d ฮฒ,L
j = 1, . . . , d.
(3.2)
j = 1, . . . , d,
(3.3)
~ At last the definition of
where ~ฮณ and ~q are defined in (3.12) below and C1 is independent of L.
~
h(ยท, s) and h(ยท, s), s โ [1, โ] together with (3.2) allows us to assert, see (3.26), that
~
J h(v,
1), v โ Jโ , J ~
h(v, โ), v โ Jโ , J ~h(v, โ), v โ Jโ , โv > 0,
(3.4)
where Jโ = {j = 1, . . . , d : rj = โ}. Thus, putting
ฮป1 (v) =
X
jโJยฏโ
ฮป2 (v) =
X
jโJยฏโ
r ฮฒ
r
v โrj Lj j hj (v, โ) j j ,
ฮป=
X
jโJยฏโ
q ฮณ
q
vโqj Lj j hj (v, โ) j j ;
d
Y
r ฮฒ
r
(hj (v, 1))โ1โ2ยตj (ฮฑ) ,
v โrj Lj j hj (v, 1) j j + v โ2 (ln n/n)
j=1
14
we obtain in view of (3.1), (3.2) and (3.4) that
~ L
~ , โ โค C1 ฮป1 (v),
ฮ~r v, N~r,d ฮฒ,
~ L
~
ฮ~r v, N~r,d ฮฒ,
โค C1 ฮป2 (v),
โv โ [v, v];
(3.5)
โv โ [v, 1]
(3.6)
To get (3.6) we have used that for all n large enough and all v โ [v, 1]
Q
~
Fn h(v,
1)) โค C2 (ln n/n) dj=1 (hj (v, 1))โ1โ2ยตj (ฮฑ) ,
~ This follows from assertions (4.1) and (4.3) established in the proof
where C2 is independent of L.
of Proposition 1. We deduce from (3.5) and (3.6), the following bound.
i
h
~ L
~ L
~ , โ โง ฮ~r v, N~r,d ฮฒ,
~
(3.7)
ฮ~r v, N~r,d ฮฒ,
โค C1 ฮป2 (v)1[v,v] (v) + ฮป1 (v)1[v,v] (v) .
Moreover, if ฯ (pโ ) > 0 we get in view of (3.1), (3.3) and (3.4)
~ L
~ , โ โค C1 vp ฮป.
vp ฮ~q v, N~r,d ฮฒ,
(3.8)
3.2. Special set of bandwidths
The bandwidthโs construction presented below as well as auxiliary statements from the next section
will be exploited not only for proving Theorems 3 and 4, but also in the consideration forming Part
III of this work. By this reason we formulate them in a bit more general form than what is needed
for our current purposes. Set for any r, s โ [1, โ]
sฯ(ฮฑ)(2+1/ฮฒ(ฮฑ))
โ r,
(s+ฯ(ฮฑ))
โ1
โd
and let
20d
max(2cKโ kKโ kโ , kKโ k1 )
ฮบฮฑ (r, s) =
Recall that c =
that C1 appeared in (3.2))
ฮฑ โ [0, 1].
L > 0 be any number satisfying (recall
L โค 1 โง (C1โ1 c) โง L0 .
(3.9)
Recall that ฮดn = L(ฮฑ)nโ1 ln n and introduce for any v > 0, s โ [1, โ] and j = 1, . . . , d
LLโ1
j
e j (v, s) =
ฮท
ฮฒ1
j
aโ2 ฮดn
ฮณ1 โ2
j a
LLโ1
ฮดn
j
b j (v, s) =
ฮท
sฯ(ฮฑ)
(s+ฯ(ฮฑ))ฮฒj rj
sฯ
(ฮฑ)
(s+ฯ
(ฮฑ))ฮณj qj
1
v ฮฒj
v
1
ฮณj
โ sฯ(ฮฑ)(2+1/ฮฒ(ฮฑ))
(s+ฯ(ฮฑ))ฮฒ r
j j
sฯ
(ฮฑ)(2+1/ฮณ(ฮฑ))
โ (s+ฯ
(ฮฑ))ฮณ q
j j
;
(3.10)
,
(3.11)
where we have put pยฑ = [supjโJยฏโ rj ] โจ p, Jยฏโ is complimentary to Jโ and
(
ฮฒj ฯ (pยฑ )
pยฑ ,
j โ Jยฏโ ,
j โ Jยฏโ ,
ฯ (rj ) ,
qj =
,
ฮณj =
โ,
j โ Jโ ,
ฮฒj ,
j โ Jโ .
d
X 2ยตj (ฮฑ) + 1
1
:=
,
ฮณ(ฮฑ)
ฮณj
j=1
(3.12)
d
X 2ยตj (ฮฑ) + 1
1
:=
.
ฯ
(ฮฑ)
ฮณj qj
j=1
The constant a > 0 will be chosen differently in accordance with some special relationships between
~ ~r, ~
the parameters ฮฒ,
ยต, ฮฑ and p. Determine hj (ยท, s) and hj (ยท, s), j = 1, . . . , d, from the relations
e j (v, s) , v > 0;
hj (v, s) = max h โ H : h โค ฮท
(3.13)
b j (v, s) , v > 0,
hj (v, s) = max h โ H : h โค ฮท
(3.14)
~ s) = h1 (ยท, s), . . . , hd (ยท, s) and ~h(ยท, s) = h1 (ยท, s), . . . , hd (ยท, s) .
and set h(ยท,
15
3.3. Auxiliary statements
All the results formulated below are proved in Section 4. Let
โ ฯ(ฮฑ) ฯ(ฮฑ)(2+1/ฮฒ(ฮฑ))
z(v) = 2 aโ2 ฮดn ฯ(ฮฑ)+u v u+ฯ(ฮฑ) ,
and remark that z(ยท) โก 2 if u = โ. Note also that
z(v) โฅ 2,
โv โฅ aโ2 ฮดn
u โ [1, โ],
1
2+1/ฮฒ(ฮฑ)
= v.
(3.15)
Introduce the following notations: ยต(ฮฑ) = minj=1,...,d ยตj (ฮฑ),
X=
d
X
ยตj (ฮฑ)
1
1
โ
=
,
2ฮฒ(1) 2ฮฒ(0)
ฮฒj
Y =
j=1
d
X
ยตj (ฮฑ)
1
1
โ
=
.
2ฯ(1) 2ฯ(0)
ฮฒj rj
j=1
Recall that z(ฮฑ) = ฯ(ฮฑ)(2 + 1/ฮฒ(ฮฑ))ฮฒ(0)ฯ (โ) + 1 and define
1
v = (aโ2 ฮดn ) 1โ1/ฯ(ฮฑ)+1/ฮฒ(ฮฑ) ,
v = aโ2 ฮดn
ฯ(ฮฑ)ฯ (โ)ฮฒ(0)
z(ฮฑ)+ฯ(ฮฑ)/u
.
(3.16)
Set uโ = [โฯ (โ)ฮฒ(0)]โ1 if ฯ (โ) < 0 and let uโ = โ if ฯ (โ) โฅ 0. Put finally y = uโ โจ pโ .
~ ~r, L0 , Lโ , ~
~ โ [L0 , Lโ ]d . Then,
Proposition 1. Let ฮฒ,
ยต, ฮฑ and p be given. Assume that L
~ such that for all n large enough
1) there exists a > 0 independent of L
~
h(v, 1) โ H(v),
โv โ [v, 1],
~ and u such that for all n large enough
2) there exists a > 0 independent of L
~h(v, u) โ H v, z(v)
if either ฮบฮฑ (pโ , u) < 0, ฯ (โ) โฅ 0 or ฮบฮฑ (pโ , u) < 0, ฯ (pโ ) > 0, Y โฅ [X + 1]yโ1 โ 1/u.
Remark 2. Note that if ฮฑ 6= 1, the condition Y โฅ [X + 1]yโ1 โ 1/u simply means u โค uโ โจ pโ ,
since X = Y = 0. On the other hand if ฮฑ = 1 this condition holds if ฯ (โ) โฅ 0 whatever the values
~ ยต
of ฮฒ,
~ and ~r, since Y > 0. Also, note that
ยต(1) + 1/u โ 1/y โฅ 0
โ
Y โฅ [X + 1]yโ1 โ 1/u.
(3.17)
Indeed, since rj โค pโ โค y for any j = 1, . . . , d we have
Y โ [X + 1]yโ1 + 1/u โฅ ยต(1)[1 โ ฯ (y)] โ 1/y + 1/u โฅ ยต(1) โ 1/y + 1/u
and (3.17) follows. To get the last inequality we have used that ฯ (uโ ) = 0 and that ฯ (ยท) is strictly
decreasing, so ฯ (y) โค 0. In particular we deduce from (3.17) that the condition Y > [X +1]yโ1 โ1/u
is always fulfilled in the case u = uโ .
Recall that v โ 0, n โ โ, is defined in (3.15) and introduce the following quantities.
v1 = aโ2 ฮดn
1
1โu/ฯ(0)+1/ฮฒ(0)
, v2 = aโ2 ฮดn
uฯ(1)
ฮบ1 (pโ ,u)(ฯ(1)+u)
, v3 = aโ2 ฮดn
where ฯ(u) = [1/ฯ(0) โ 1/u][1 + X] โ 1/ฮฒ(0)[Y + 1/u]. Define also
v = v1{ฯ (pโ )>0} + v2 1{ฯ (pโ )โค0}
16
โ Y +1/u
ฯ(u)โจ0
,
(3.18)
(3.19)
Note that v1 โ โ, n โ โ, if โ > u โฅ uโ โจ pโ (it will be proved in Proposition 2 below). However
v1 = 1 if u = โ. As it is shown in the proof of Proposition 1, formulae (4.11), v < v for all n
large enough. Also v2 โ โ, n โ โ, if ฮบ1 (pโ , u) < 0. At last v3 โ โ, n โ โ, since ฯ(0) > ฯ(1).
Moreover v3 = โ if ฯ(u) โค 0. Introduce finally
๏ฃฑ
๏ฃด
[v, 1],
pโ = โ
๏ฃด
๏ฃด
๏ฃด
๏ฃด
๏ฃด
[v, v1 ],
ฮฑ 6= 1, pโ < โ;
๏ฃด
๏ฃด
๏ฃฒ
[v, v3 ],
ฮฑ = 1, pโ < โ, ฮบฮฑ (pโ , u) โฅ 0;
Iu (ฮฑ) =
๏ฃด
๏ฃด
๏ฃด
๏ฃด
ฮฑ = 1, pโ < โ, ฮบฮฑ (pโ , u) < 0, Y โฅ [X + 1]yโ1 โ 1/u;
[v, v],
๏ฃด
๏ฃด
๏ฃด
๏ฃด
๏ฃณ [v, v โง v ], ฮฑ = 1, pโ < โ, ฮบ (pโ , u) < 0, Y < [X + 1]yโ1 โ 1/u,
3
ฮฑ
~ ~r, L0 , Lโ , ~
~ โ [L0 , Lโ ]d , u โ [uโ โจ pโ , โ].
Proposition 2. Let ฮฒ,
ยต, ฮฑ and p be given and let L
~
Then, there exists a > 0 independent of L and u such that for all n large enough
~
h(v,
u) โ H v, z(v) , v โ Iu (ฮฑ).
In the current paper we will use the statements of Proposition 1 and 2 only with u = โ. In this
context we remark that ฮบฮฑ (ยท) โก ฮบฮฑ (ยท, โ).
Proposition 3. Let โ โ Nโ , p > 1 and K satisfying Assumption 7 be fixed. Then for any ฮฒ~ โ (0, โ]d ,
~ โ (0, โ)d one can find C1 > 0 independent of L
~ such that (3.2) holds. If
~r โ [1, โ]d and L
โ
additionally ฯ (p ) > 0 then (3.3) is fulfilled as well. At last, (3.2) and (3.3) remain true if one
replaces the quantity B by Bโ .
The quantities Bj,s,F(ยท) and Bโj,s,F(ยท) are introduced in Part I but the reader can find them in
the proof of the proposition. Let us also present the following auxiliary results which will be useful
in the sequel. Their proofs are postponed to Appendix.
Lemma 1. For any u โ [1, โ]
ฮบฮฑ (pโ , u) โค 0, ฯ (pโ ) > 0,
Y โฅ [X + 1]y
โ1
โ
โ 1/u, ฯ (p ) > 0,
โ
โ
z(ฮฑ) + ฯ(ฮฑ)/u > 0;
(3.20)
z(ฮฑ)/ฯ(ฮฑ) โ 1 + 2/u โฅ 0.
(3.21)
Let Y โ [X + 1]yโ1 > 0 and ฮบ1 (pโ , โ) โฅ 0. Then there exists s > pโ such that
ฯ (s) > 0,
s โฅ (1 + X)/Y.
(3.22)
We finish this section with the following observations which will be useful in the sequel.
If ฮบฮฑ (pโ ) โฅ 0 one has
ฬบ(ฮฑ) =
^ ฮฒ(ฮฑ)
1 โ 1/p
:= r(ฮฑ),
1 โ 1/ฯ(ฮฑ) + 1/ฮฒ(ฮฑ)
2ฮฒ(ฮฑ) + 1
If ฮบฮฑ (pโ ) < 0 one has
ฯ(ฮฑ) = r(ฮฑ)
^ ฯ(ฮฑ)
p
.
ฯ(ฮฑ)(1 โ pโ /p)
1{ฯ (pโ )>0} +
1{ฯ (pโ )โค0} ;
ฬบ(ฮฑ) = r(ฮฑ)
z(ฮฑ)
ฮบฮฑ (pโ )
^ ฯ (p)ฯ(ฮฑ)ฮฒ(0)
ฯ(ฮฑ)
ฯ(ฮฑ) = r(ฮฑ)
1{ฯ (โ)>0} +
1
.
z(ฮฑ)
p {ฯ (โ)โค0}
17
^ ฯ (p)ฯ(ฮฑ)ฮฒ(0)
(3.23)
(3.24)
(3.25)
3.4. Concluding remarks
Let us collect some bounds for several terms appearing in Theorem 3 (Part I) and used in the
proofs of Theorems 3 and 4 simultaneously.
ฮฒ1
j , j โ J . Then, (3.4) follows
10 . First we remark that hj (ยท, 1) โก hj (ยท, โ) โก hj (ยท, โ) โค LLโ1
โ
j
from (3.2) and (3.9) because for any j โ Jโ and v > 0
B
(3.26)
~ ~ hj (v, 1) = B
~ ~ hj (v, โ) = B
~ ~ hj (v, โ) โค cv.
j,โ,N~r,d ฮฒ,L
j,โ,N~r,d ฮฒ,L
j,โ,N~r,d ฮฒ,L
~ s), s โ {1, โ} that
20 . We deduce from the definition of h(ยท,
ฯ(ฮฑ)
ฮป1 (v) โค c1 ฮดnฯ(ฮฑ) v โฯ(ฮฑ)(2+1/ฮฒ(ฮฑ)) , v โ Iโ (ฮฑ),
ฮป2 (v) โค c1 ฮดnฯ(ฮฑ)+1 v
โ ฯ(ฮฑ)(2+1/ฮฒ(ฮฑ))
ฯ(ฮฑ)+1
, v โ [v, 1].
It yields together with (3.7) and the definitions of v and v, choosing v = v,
ฯ(ฮฑ)
Z v
ฯ(ฮฑ)(2+1/ฮฒ(ฮฑ))
pโ
pโ1
~
~
~
~
ฯ(ฮฑ)+1
v
ฮ~r v, N~r,d ฮฒ, L , โ โง ฮ~r v, N~r,d ฮฒ, L dv โค c2 ฮดnฯ(ฮฑ)+1 v
1{ฮบฮฑ (p)>pฯ(ฮฑ)}
v
ฯ(ฮฑ)
pโ ฯ(ฮฑ)(2+1/ฮฒ(ฮฑ))
ฯ(ฮฑ)+1
1{ฮบฮฑ (p)<pฯ(ฮฑ)} + ฮดnฯ(ฮฑ) v pโฯ(ฮฑ)(2+1/ฮฒ(ฮฑ)) 1{ฮบฮฑ (p)>0}
ฯ(ฮฑ)
ฯ(ฮฑ)+1
ฯ(ฮฑ)
ฯ(ฮฑ) pโฯ(ฮฑ)(2+1/ฮฒ(ฮฑ))
1{ฮบฮฑ (p)<0} + ln (n) ฮดn
1{ฮบฮฑ (p)=pฯ(ฮฑ)} + ฮดn 1{ฮบฮฑ (p)=0}
+ฮดn v
+ฮดnฯ(ฮฑ)+1 v
=: An + c2 ฮดnฯ(ฮฑ) v pโฯ(ฮฑ)(2+1/ฮฒ(ฮฑ)) 1{ฮบฮฑ (p)<0} .
(3.27)
After elementary computations and taking into account (3.23), we obtain
An โค c3 bpn (H)ฮดnpฯ(ฮฑ) ,
An โค c3 bpn (H)ฮดnpฬบ(ฮฑ) .
(3.28)
These bounds are not surprising because ฬบ(ฮฑ) = ฯ(ฮฑ) if ฮบฮฑ (p) โฅ 0. At last, if ฯ (pโ ) > 0, we get
from (3.8) thanks to the definition of ~h(ยท, โ) and the presentation proved in (4.6) with u = โ
ฯ(ฮฑ)ฯ (p)ฮฒ(0)
~ L
~ , โ โค c4 ฮดn z(ฮฑ) .
vp ฮ~q v, N~r,d ฮฒ,
pโ1
30 . At last, choosing v = v, we obtain โH (v) โค c6 ฮดn1โ1/ฯ(ฮฑ)+1/ฮฒ(ฮฑ) ln n
(3.23), (3.24) and (3.25):
โH (v) โค c6 bpn (H)ฮดnpฯ(ฮฑ) ,
โH (v) โค c6 bpn (H)ฮดnpฬบ(ฮฑ) .
(3.29)
t(H)
, which yields by
(3.30)
3.5. Proof of Theorem 3
As it has already been mentioned we will apply Theorem 3 (Part I) with u = โ, q = โ, D =
Q[1 โ ฮฑ + ฮฑkgk1 ] โจ Q and v = v.
10 . Consider the cases ฮบฮฑ (pโ ) โฅ 0, or ฮบฮฑ (pโ ) < 0, ฯ (โ) โค 0.
Choose v = 1 and remark that the statements of Propositions 1 and 2 hold for any v โ [v, v].
Indeed, it suffices to note that Iโ (ฮฑ) โ [v, v] := [v, 1], because v1 , v2 , v3 > 1 and v โฅ 1 if
ฯ (โ) < 0 since in this case v > 1 by (3.20). Then we can apply all the bounds obtained above,
and in particular we get from (3.5)
~ L
~ , โ โค C1 ฮป1 (1) โค c5 ฮดnฯ(ฮฑ) โค c5 bpn (H)ฮดnpฯ(ฮฑ) ,
ฮ~r 1, N~r,d ฮฒ,
(3.31)
18
since ฯ(ฮฑ) โฅ pฯ(ฮฑ) in both considered cases in view of the second equality in (3.23) and of (3.25).
Applying the third assertion of Theorem 3 (Part I), we obtain from (3.27), (3.28), (3.31) and (3.30)
1
p
(p) b
p
pฯ(ฮฑ)
sup
โค c7 bn (H)ฮดnฯ(ฮฑ) ,
Rn [f~h(ยท) , f ] โค C (c2 + c3 + c5 + c6 )bn (H)ฮดn
~L
~ โฉFg (R)
f โN~r,d ฮฒ,
and the assertion of Theorem 3 follows in both considered cases.
20 . Consider the case ฮบฮฑ (pโ ) < 0, ฯ (โ) > 0.
Choose v = v and remark that the statements of Propositions 1 and 2 hold hold for any v โ [v, v].
Indeed, ฯ (โ) > 0 implies v < 1 and, therefore, v = v โง v3 = v. We deduce from (3.27), (3.28),
(3.29) and (3.30), applying the first assertion of Theorem 3 (Part I) that
1
ฯ(ฮฑ)ฯ (p)ฮฒ(0)
p
z(ฮฑ)
p
pฯ(ฮฑ)
(p) b
+ (c3 + c6 )bn (H)ฮดn
sup
Rn [f~h(ยท) , f ] โค C c8 ฮดn
โค c9 bn (H)ฮดnฯ(ฮฑ) . (3.32)
~L
~ โฉFg (R)
f โN~r,d ฮฒ,
Here we have also used (3.25). This completes the proof of Theorem 3.
3.6. Proof of Theorem 4
In the following we assume
pโ < โ, since pโ = โ implies by definition of the anisotropic Nikolโskii
~
~
class that N~r,d ฮฒ, L โ Bโ,d (Lโ ). Hence, the results in that case follow from Theorem 3 since
ฬบ(ฮฑ) = ฯ(ฮฑ) when pโ = โ.
Moreover, we remark that the imposed condition p > [minj=1,... ยตj ]โ1 implies Y โฅ [X + 1]yโ1 โ
1/u in view of (3.17) proved in Remark 2. This, first, makes the second assertion of Proposition 1
applicable.
Next, it allows (recall that pโ < โ and ฮฑ = 1) to rewrite Iโ (1) appeared in Proposition 2 as
Iโ (1) = [v, v3 ]1{ฮบ1 (pโ )โฅ0} + [v, v]1{ฮบ1 (pโ )<0} .
10 . Consider the case ฮบฮฑ (pโ ) < 0, ฯ (pโ ) > 0.
~ โ [L0 , Lโ ] we remark that in view of Nikolโskii (1977) [Theorem
Taking into account that L
~ L
~ โ Bpโ ,d (c9 Lโ ), where c9 is independent of L.
~ Thus, Theorem 3 (Part
6.9.1, Section 6.9] N~r,d ฮฒ,
โ
I) is applicable with u = โ, q = p and D = c9 Lโ โจ Q. Choose v = v and remark that the
statements of Propositions 1 and 2 hold since v = v. The assertion of the theorem is obtained
from (3.27), (3.28), (3.29), (3.30), (3.24) and the first assertion of Theorem 3 (Part I) by the same
computations that led to (3.32).
20 . Consider the case ฮบ1 (pโ ) < 0, ฯ (pโ ) โค 0. Recall that pโ > p in this case because it is necessary for the existence of an uniformly
consistent estimator. Since the definition of the anisotropic
~ L
~ โ Bpโ ,d (Lโ ), we assert that the second assertion of Theorem
Nikolโskii class implies that N~r,d ฮฒ,
3 (Part I) is applicable with u = โ, q = pโ and D = Lโ โจ Q. Choose v = v2 and note that v = v2
in the considered case. Thus, we deduce from (3.27), (3.28), (3.30) and (3.24)
sup
~L
~ โฉFg,โ (R,Q)
f โN~r,d ฮฒ,
Rn(p) [fb~h(ยท) , f ]
โคC
ฯ(1)โ
cโฒ2 ฮดn
ฯ(1)ฮบ1 (p,โ)
ฮบ1 (pโ ,โ)
+ (c3 +
c6 )bpn (H)ฮดnpฬบ(ฮฑ)
ฯ(1)(pโpโ )
ฮบ1 (pโ ,โ)
+ ฮดn
1
p
,
and the assertion of the theorem follows in this case.
30 . It remains to study the case ฮบ1 (pโ ) โฅ 0. Let s be an arbitrary number satisfying (3.22) of
Lemma 1. Since ฯ (s) > 0 and s > pโ we can assert in view of Nikolโskii (1977) [Theorem 6.9.1,
~ L
~ โ Bs,d (c9 Lโ ), where c9 is independent of L.
~ Thus, Theorem 3 (Part) is
Section 6.9] N~r,d ฮฒ,
19
applicable with u = โ, q = s and D = c10 Lโ โจ Q. Choosing v = v3 , we deduce from (3.27),
(3.28), (3.30) and from the second assertion of Theorem 3 (Part 2)
sup
~L
~ โฉFg,โ (R,Q)
f โN~r,d ฮฒ,
Rn(p) [fb~h(ยท) , f ]
1
Y (sโp)
p
[1+X]/ฯ(0)โY /ฮฒ(0)
p
pฬบ(ฮฑ)
.
โค C (c3 + c6 )bn (H)ฮดn
+ ฮดn
(3.33)
Since either pโ /ฯ(0) = 1/ฮฒ(0), ฮบ1 (pโ ) > 0 or pโ /ฯ(0) > 1/ฮฒ(0), ฮบ1 (pโ ) โฅ 0 and s > pโ โฅ p we get
Y (s โ p)
[ฯ(0) โ ฯ(1)](s โ p)
=
>0
[1 + X]/ฯ(0) โ Y /ฮฒ(0)
ฮบ1 (pโ , โ) + pโ โ ฯ(0)/ฮฒ(0)
Simple algebra shows that
Y (s โ p)
p
โฅ
[1 + X]/ฯ(0) โ Y /ฮฒ(0)
2 + 1/ฮฒ(1)
โ
sY ฯ(1) โฅ p(X + 1)[2 + 1/ฮฒ(1)]โ1
Using again ฮบ1 (pโ ) โฅ 0 and pโ โฅ p we obtain
sY ฯ(1) 2 + 1/ฮฒ(1) = sฮบ1 (pโ )Y + spโ Y โฅ spY โฅ p(X + 1)
since s satisfies (3.22) of Lemma 1. Thus, we have for all n large enough
Y (sโp)
p
pฬบ(ฮฑ)
ฮดn[1+X]/ฯ(0)โY /ฮฒ(0) โค ฮดn2+1/ฮฒ(1) โค bpn (H)ฮดn
and the assertion of the theorem in the case ฮบ1 (pโ ) โฅ 0 follows from (3.33) and the first equality
in (3.23). Theorem 4 is proved.
4. Proofs of Propositions 1, 2 and 3
The proof of Lemma 2 is postponed to Appendix.
~ ~r, ~
Lemma 2. For any ฮฒ,
ยต, p โฅ 1 and ฮฑ โ [0, 1] the following is true.
โ1
1/ฮณ(ฮฑ) โ 1/ฮฒ(ฮฑ) = ฯ (โ)ฮฒ(0)
1/ฯ(ฮฑ) โ 1/ฯ
(ฮฑ) .
4.1. Proof of Proposition 1
We start the proof with several
remarks which will be useful in the sequel. First, obviously there
~ ~r, ยต
~ such that
exists 0 < T := T ฮฒ,
~ , p < โ independent of L
lim (ln n)โ1 sup
nโโ
sup
sup
d n
X
ฮฑโ{0,1} sโ[1,โ] vโ[v,1โจv] j=1
o
= T.
ln hj (v, 1) + ln hj (v, s)
(4.1)
Next, for any s โ [1, โ] and any v > 0
d
ฯ(ฮฑ) 2sโฯ(ฮฑ)/ฮฒ(ฮฑ)
โ1โ2ยตj (ฮฑ)
ln n Y
โ 1
โ 1
e j (v, s)
= a2 L ฮฒ(ฮฑ) aโ2 ฮดn ฯ(ฮฑ)+s v s+ฯ(ฮฑ) = 2L ฮฒ(ฮฑ) a2 v 2 zโ1 (v).
ฮท
n
(4.2)
j=1
1) Let us proceed to the proof of the first assertion. First we remark that for all n โฅ 3
~
h(v,
1) โ (0, 1]d ,
20
โv โ [v, 1].
(4.3)
Indeed for any v > 0 we have since L โค L0 ,
ฮฒ r
e j j j (v, 1) โค aโ2 ฮดn
ฮท
ฯ(ฮฑ)
1+ฯ(ฮฑ)
v
rj โ ฯ(ฮฑ)(2+1/ฮฒ(ฮฑ))
1+ฯ(ฮฑ)
,
j โ Jยฏโ .
(4.4)
Therefore, for any v โ [v, 1] one has in view of the definition of v
ฮฒ r
e j j j (v, 1) โค aโ2 ฮดn
ฮท
ฯ(ฮฑ)
1+ฯ(ฮฑ)
v
1โ
ฯ(ฮฑ)(2+1/ฮฒ(ฮฑ))
1+ฯ(ฮฑ)
โค aโ2 ฮดn
Note that for any j โ Jโ
e j (v, 1) = LLโ1
ฮท
j v
ฮฒ1
j
ฯ(ฮฑ)
1+ฯ(ฮฑ)
v
1โ
ฯ(ฮฑ)(2+1/ฮฒ(ฮฑ))
1+ฯ(ฮฑ)
= 1,
j โ Jยฏโ .
1
โค v ฮฒj โค 1,
โv โค 1.
e j (ยท, 1) by construction.
and the proof of (4.3) is completed since hj (ยท, 1) โค ฮท
d+2 Pd ยตj (ฮฑ) โ 1
j=1
Set T0 = T + 2 e
L ฮฒ(ฮฑ) and remark that in view of (4.1), (4.2) and (4.3) for all
n large enough and any v โ [v, 1]
~
Gn h(v,
1) โค
โค
1
(T + 2) ln n
T0 L ฮฒ(ฮฑ) ln n
โค
1+ยตj (ฮฑ)
Q
Q
1+ยตj (ฮฑ)
e j (v, 1)
n dj=1 hj (v, 1)
n dj=1 ฮท
1
ฯ(ฮฑ)
2โฯ(ฮฑ)/ฮฒ(ฮฑ)
2
T0 L ฮฒ(ฮฑ) ln n
1+ฯ(ฮฑ) ฮด 1+ฯ(ฮฑ) v
1+ฯ(ฮฑ)
=
T
a
.
n
0
Qd
1+2ยตj (ฮฑ)
e j (v, 1)
n j=1 ฮท
(4.5)
Here we have taken into account that hj (v, s) โฅ eโ1 ฮท j (v, s). Since
ฯ(ฮฑ)
2
T0 a 1+ฯ(ฮฑ) ฮดnฯ(ฮฑ)+1 v
denoting a =
p
2โฯ(ฮฑ)/ฮฒ(ฮฑ)
1+ฯ(ฮฑ)
โค T0 a2 v โ v โฅ v,
a/T0 we assert that
~
1) โค av,
Gn h(v,
โv โ [v, 1].
The first assertion is established.
2) Before proving the second assertion, let us make several remarks.
10 . For any u โ [1, โ] the following is true.
b j (v, u) = LLโ1
ฮท
j v
ฮฒ1
j
b j (v, u) = LLโ1
ฮท
j
, j โ Jโ ,
ฮณ1
j
aโ2 ฮดn
(pยฑ )ฮฒ(0)
ฮณฯ(ฮฑ)ฯ
[z(ฮฑ)+ฯ(ฮฑ)/u]
j
, j โ Jยฏโ .
(4.6)
b j (v, u) since, remind ฮณj = ฮฒj , qj = โ if
The first equality follows directly from the definition of ฮท
j โ Jโ . Thus, let us prove the second equality. We have
ฮณ q
b j j j (v, u) = LLโ1
ฮท
j
pยฑ
aโ2 ฮดn
uฯ
(ฮฑ)
u+ฯ
(ฮฑ)
v
pยฑ โ uฯ
(ฮฑ)(2+1/ฮณ(ฮฑ))
u+ฯ
(ฮฑ)
,
โj โ Jยฏโ .
Here we have used that qj = pยฑ for any j โ Jยฏโ . Using the definition of v we get
ฮณ q
b j j j (v, u)
ฮท
=
p ยฑ
LLโ1
j
โ2
a
ฮดn
Using the definition of z(ฮฑ) we obtain
(โ)ฮฒ(0)
uฯ
(ฮฑ)
+ ฯ(ฮฑ)ฯ
u+ฯ
(ฮฑ)
z(ฮฑ)+ฯ(ฮฑ)/u
21
h
pยฑ โ uฯ
(ฮฑ)(2+1/ฮณ(ฮฑ))
u+ฯ
(ฮฑ)
i
,
โj โ Jยฏโ .
A :=
uฯ
(ฮฑ)
ฯ(ฮฑ)ฯ (โ)ฮฒ(0)
uฯ
(ฮฑ)(2 + 1/ฮณ(ฮฑ))
ฯ(ฮฑ)ฯ (โ)ฮฒ(0)pยฑ
+
pยฑ โ
=
u + ฯ
(ฮฑ) z(ฮฑ) + ฯ(ฮฑ)/u
u + ฯ
(ฮฑ)
z(ฮฑ) + ฯ(ฮฑ)/u
uฯ
(ฮฑ)
1 + ฯ(ฮฑ)/u โ ฯ(ฮฑ)ฯ (โ)ฮฒ(0) 1/ฮณ(ฮฑ) โ 1/ฮฒ(ฮฑ) .
+
(u + ฯ
(ฮฑ))(z(ฮฑ) + ฯ(ฮฑ)/u)
We obtain applying Lemma 2
A=
uฯ
(ฮฑ)ฯ(ฮฑ)[1/s + 1/ฯ
(ฮฑ)]
ฯ(ฮฑ)ฯ (pยฑ )ฮฒ(0)pยฑ
ฯ(ฮฑ)ฯ (โ)ฮฒ(0)pยฑ
+
=
.
z(ฮฑ) + ฯ(ฮฑ)/u
(u + ฯ
(ฮฑ))(z(ฮฑ) + ฯ(ฮฑ)/u)
z(ฮฑ) + ฯ(ฮฑ)/u
The second formula in (4.6) is established.
20 . Next, let us prove that
~h(v, u) โ (0, 1]d ,
โu โ [1, โ].
(4.7)
If Jโ 6= โ
, which is equivalent to pโ = โ, the definition of v implies that v โค 1 for all n large
enough, since ฯ (pโ ) = ฯ (โ) > 0 and in view of (3.20). We deduce from the first equality in (4.6)
b j (v, u) = LLโ1
hj (v, u) โค ฮท
j v
ฮฒ1
1
โค v ฮฒj โค 1,
j
โj โ Jโ .
and (4.7) is proved for any j โ Jโ .
It remains to note that ฯ (pยฑ ) โฅ ฯ (pโ ) since pโ โฅ pยฑ and therefore, if ฯ (pโ ) โฅ 0 we have
b j (v, u) โค 1,
hj (v, u) โค ฮท
โj โ Jยฏโ ,
for all n large enough in view of (3.20) of Lemma 1, the second equality in (4.6) and since LLโ1
j โค 1.
This completes the proof of (4.7).
30 . For any u โ [1, โ] one has
aโ2 ฮดn
d
Y
j=1
โ1โ2ยตj (ฮฑ)
bj
ฮท
aโ2 ฮดn
d
Y
j=1
(v, u) โค T โ1 (ฮฑ) aโ2 ฮดn
โ1
b โ1
ฮท
(0) aโ2 ฮดn
j (v, u) โค T
1โ ฯ(ฮฑ)ฯ (โ)ฮฒ(0)/ฮฒ(ฮฑ)+1
1โ
z(ฮฑ)+ฯ(ฮฑ)/u
;
(4.8)
ฯ(ฮฑ)
z(ฮฑ)+ฯ(ฮฑ)/u
(4.9)
j (ฮฑ) Q
j (ฮฑ)
1+2ยต
1+2ยต
Q
โ1
โ1
ฮฒj
ฮณj
where we have denoted T ฮฑ = inf Lโ[L
.
d
~
jโJโ LLj
jโJยฏโ LLj
0 ,Lโ ]
Indeed, we have in view of (4.6) and the definition of v
d
Y
j=1
1+2ยตj (ฮฑ)
bj
ฮท
d
Y
j=1
where we have put
(v, u) โฅ T โ1 (ฮฑ) aโ2 ฮดn
b j (v, u) โฅ T โ1 (0) aโ2 ฮดn
ฮท
1
ฮฒโ (ฮฑ)
=
P
jโJโ
1+2ยต(ฮฑ)
, ฮณยฑ1(ฮฑ)
ฮฒj
ฮณ
ฯ(ฮฑ)ฯ (pยฑ )ฮฒ(0)
ฯ(ฮฑ)ฯ (โ)ฮฒ(0)
+
ยฑ (ฮฑ)[z(ฮฑ)+ฯ(ฮฑ)/u] ฮฒโ (ฮฑ)[z(ฮฑ)+ฯ(ฮฑ)/u]
ฮณ
=
ฯ(ฮฑ)ฯ (pยฑ )ฮฒ(0)
ฯ(ฮฑ)ฯ (โ)ฮฒ(0)
+
ยฑ (0)[z(ฮฑ)+ฯ(ฮฑ)/u] ฮฒโ (0)[z(ฮฑ)+ฯ(ฮฑ)/u]
P
jโJยฏโ
1+2ยต(ฮฑ)
.
ฮณj
Note that for any ฮฑ โ [0, 1]
X (1 + 2ยต(ฮฑ))ฯ (rj )
ฯ (โ)
ฯ (โ)
1
ฯ (โ)
ฯ (pยฑ )
+
=
=
+
.
+
ฮณยฑ (ฮฑ) ฮฒโ (ฮฑ)
ฮฒj
ฮฒโ (ฮฑ)
ฮฒ(ฮฑ)
ฯ(ฮฑ)ฮฒ(0)
ยฏ
jโJโ
22
,
and (4.8) and (4.9) are established.
40 . Simple algebra shows that for any u โ [1, โ]
aโ2 ฮดn
1โ ฯ(ฮฑ)ฯ (โ)ฮฒ(0)/ฮฒ(ฮฑ)+1
z(ฮฑ)+ฯ(ฮฑ)/u
= 2v2 zโ1 (v),
and we deduce from (4.8) for any u โ [1, โ] (recall that z โก 2 if u = โ)
ฮดn
d
Y
j=1
โ1โ2ยตj (ฮฑ)
bj
ฮท
(v, u) โค 2T โ1 (ฮฑ)a2 v2 zโ1 (v).
(4.10)
Let us also prove that for any u โ [1, โ] and all n large enough
v > v := aโ2 ฮดn
1
2+1/ฮฒ(ฮฑ)
โ
z(v) โฅ 2.
(4.11)
The latter inclusion follows from (3.15). Indeed, if ฯ (โ) โค 0 then v โฅ 1 โฅ v. If ฯ (โ) > 0
1
1 + ฯ(ฮฑ)/u
ฯ(ฮฑ)ฯ (โ)ฮฒ(0)
โ
=โ
<0
z(ฮฑ) + ฯ(ฮฑ)/u 2 + 1/ฮฒ(ฮฑ)
[z(ฮฑ) + ฯ(ฮฑ)/u][2 + 1/ฮฒ(ฮฑ)]
in view of (3.20), so v > v. Note at last that for any u โ [1, โ]
vzโ1 (v) = 2 aโ2 ฮดn
ฯ(ฮฑ)ฯ (u)ฮฒ(0)
z(ฮฑ)+ฯ(ฮฑ)/u
.
(4.12)
50 . Let us proceed to the proof of the second assertion. Let us choose a < aT (ฮฑ)/(4T0 ) < 1. We
have in view of (4.1), (4.8) and (4.10) similarly to (4.5)
Fn2 ~h(v, u) โค Q
d
T0 ฮดn
j=1
โ1
2 2 โ1
2 2 โ1
1+2ยตj (ฮฑ) โค 2T0 T (ฮฑ)a v z (v) โค a v z (v). (4.13)
b j (v, u)
ฮท
Thus to prove the assertion all we need to show is that ~h(v, u) โ H(v), i.e. Gn ~h(v, u) โค av.
Let us distinguish three cases.
50 a. Let ฯ (โ) โฅ 0. We remark that the definition of v in this case yields v โค 1 for all n large
enough and we obtain from (4.10) and (4.11) that
ฮดn
d
Y
j=1
โ1โ2ยตj (ฮฑ)
bj
ฮท
(v, u) โค T โ1 (ฮฑ)a2 v.
(4.14)
Then we have in view of (4.1), (4.7), (4.8) and (4.14) similarly to (4.5)
Gn ~h(v, u) โค Q
d
T0 ฮดn
j=1
โ1
2
1+2ยตj (ฮฑ) โค T0 T (ฮฑ)a v โค av.
b j (v, u)
ฮท
(4.15)
50 b. Let ฯ (โ) < 0, ฯ (pโ ) > 0 and ฮฑ 6= 1. Then by assumption u โค p, and thus ฯ (u) โฅ 0. We
get from (4.10) and (4.12)
ฮดn
d
Y
j=1
โ1โ2ยตj (ฮฑ)
bj
ฮท
(v, uโ ) โค 4T โ1 (ฮฑ)a2 v,
23
(4.16)
so Gn ~h(v, u) โค av follows from (4.15) and (4.13).
50 c. Let ฯ (โ) < 0, ฯ (pโ ) > 0, ฮฑ = 1. We have as previously
G2n ~h(u) โค
(T + 2) ln n
(T + 2) ln n
1+2ยตj (ฮฑ) Qd
n j=1 hj (v, u)
n j=1 hj (v, u)
T (0)aโ2 ฮดn
2 โ1
4 2 โ1
โค 2T0 T (1)T1 a v z (v) Qd
.
b j (v, u)
j=1 ฮท
Qd
(4.17)
Here we have used (4.10) and put T1 = T โ1 (0)Lโ1/ฮฒ(0) . Our goal now is to show that for any
u โ [1, โ] and all n large enough
โ2
T (0)a
ฮดn z
โ1
(v)
d
Y
j=1
b โ1
ฮท
j (v, u) โค 1.
(4.18)
In view of (4.9) and of the definition of z(ยท) in order to establish (4.18) it suffices to show that
z(1)/ฯ(1) โ 1 + 2/u โฅ 0.
Since we assumed ฯ (โ) < 0 and ฯ (pโ ) > 0, then necessarily uโ > pโ since ฯ (uโ ) = 0 and ฯ (ยท)
is strictly decreasing. Hence, the required results follows from (3.21). Thus, (4.18) is proved. Then
choosing a such that T0 (2T โ1 (1)T1 )1/2 a2 โค a, we obtain from (4.17) and (4.18) that for all all n
large enough
Gn ~h(v, u) โค T0 (2T โ1 (ฮฑ)T1 )1/2 a2 v โค av.
The second assertion is proved
4.2. Proof of Proposition 2
We start the proof with several remarks which will be useful in the sequel.
10 . Let us show that for all n large enough
~
h(v, u) โ (0, 1]d ,
โv โ Iu (ฮฑ), โu โฅ uโ โจ pโ .
e j (ยท, u), j = 1, . . . , d,
In view of the definition of ฮท
ฮฒ r
e j j j (v, u) = LLโ1
ฮท
j
rj โ2
a ฮดn
uฯ(ฮฑ)
u+ฯ(ฮฑ)
v
rj โ
uฯ(ฮฑ)(2+1/ฮฒ(ฮฑ))
u+ฯ(ฮฑ)
,
(4.19)
j โ Jยฏโ .
(4.20)
Therefore, for any v โ [v0 , 1] one has, taking into account that L โค L0 ,
ฮฒ r
e j j j (v, u) โค aโ2 ฮดn
ฮท
uฯ(ฮฑ)
u+ฯ(ฮฑ)
v
1โ
uฯ(ฮฑ)(2+1/ฮฒ(ฮฑ))
u+ฯ(ฮฑ)
โค aโ2 ฮดn
uฯ(ฮฑ)
u+ฯ(ฮฑ)
1โ
v0
uฯ(ฮฑ)(2+1/ฮฒ(ฮฑ))
u+ฯ(ฮฑ)
= 1,
j โ Jยฏโ .
It remains to note that v > v0 for all n large enough and, therefore,
e j (v, u) โค 1, j โ Jยฏโ ,
ฮท
โv โ [v, 1] โฉ Iu (ฮฑ).
e j (ยท, u), j = 1, . . . , d,
We also have in view of the definition of ฮท
ฮฒ1
j โค 1,
e j (v, u) = LLโ1
ฮท
v
j
24
j โ Jโ ,
(4.21)
for any v โค 1. This together with (4.21) proves (4.19) in the cases when Iu (ฮฑ) = [v, 1].
Noting that pโ < โ is equivalent to Jโ = โ
, we deduce from (4.20) for any v โฅ 1
ฮฒ r
e j j j (v, u) โค aโ2 ฮดn
ฮท
uฯ(ฮฑ)
u+ฯ(ฮฑ)
v
pโ โ uฯ(ฮฑ)(2+1/ฮฒ(ฮฑ))
u+ฯ(ฮฑ)
Thus, if ฮบฮฑ (pโ , u) โฅ 0 then for any v โฅ 1
ฮฒ r
e j j j (v, u) โค aโ2 ฮดn
ฮท
uฯ(ฮฑ)
u+ฯ(ฮฑ)
โค aโ2 ฮดn
uฯ(ฮฑ)
u+ฯ(ฮฑ)
v โฮบฮฑ (p
โ ,u)
, j = 1, . . . , d.
โ 0, n โ โ, j = 1, . . . , d.
This together with (4.21) yields (4.19) in the case ฮบฮฑ (pโ , u) โฅ 0, pโ < โ, whatever the value of ฮฑ.
Let ฮฑ = 1, pโ < โ, ฮบฮฑ (pโ , u) < 0, ฯ (pโ ) > 0.
Then v = v and we have for any j = 1, . . . , d and v โ [1, v] in view of the definition of v
ฮฒ r
ฮฒ r
e j j j (v, u) โค ฮท
e j j j (v, u) = aโ2 ฮดn
ฮท
ฮบ (pโ ,u)ฯ(1)ฯ (โ)ฮฒ(0)
uฯ(1)
โ 1 z(1)+ฯ(1)/u
u+ฯ(1)
= aโ2 ฮดn
pโ ฯ (pโ )ฯ(1)
z(1)+ฯ(1)/u
โ 0, n โ โ,
in view of (3.20). Hence, (4.19) holds in this case.
Let ฮฑ = 1, ฮบฮฑ (pโ , u) < 0, ฯ (pโ ) โค 0.
Then v = v2 and we have for any v โ [1, v2 ] in view of the definition of v2
ฮฒ r
ฮฒ r
e j j j (v, u) โค ฮท
e j j j (v2 , u) = aโ2 ฮดn
ฮท
uฯ(1)
u+ฯ(1)
โฮบ1 (pโ ,u)
v2
= 1,
j = 1, . . . , d.
and, therefore (4.19) holds in this case.
Let ฮบฮฑ (pโ , u) < 0, ฮฑ 6= 1, u < โ. First we note that ฯ (โ) < 0 and u โฅ uโ โจ pโ imply
1 โ u/ฯ(0) + 1/ฮฒ(0) = 1 โ u + uฯ (u) โค 1 โ u + uฯ uโ โจ pโ โค 1 โ u < 0,
since either ฯ (pโ ) โค 0 or uโ > pโ and ฯ uโ โจ pโ = 0. Thus v1 โ โ, n โ โ and, therefore, for
any v โ [1, v1 ]
uฯ(0)
ฮฒ r
ฮฒ r
โฮบ (pโ ,u)
e j j j (v, u) โค ฮท
e j j j (v1 , u) = aโ2 ฮดn u+ฯ(0) v1 0
, j = 1, . . . , d.
ฮท
Note that 1 โ u/ฯ(0) + 1/ฮฒ(0) = ฮบ0 (pโ , u) 1/u + 1/ฯ(0) โ (u โ pโ ) 1/u + 1/ฯ(0) and, therefore
โ
ฮบ0 (pโ , u)
uฯ(0)
โฅโ
,
1 โ u/ฯ(0) + 1/ฮฒ(0)
u + ฯ(0)
โ uฯ(0)
โฮบ (pโ ,u)
which yields v1 0
โค aโ2 ฮดn u+ฯ(0) .
It remains to note that if ฯ (โ) โฅ 0 then uโ = โ and, therefore u = โ. It implies v1 = 1 and
Iu (ฮฑ) = [v, 1] and this case has been already treated. This completes the proof of (4.19).
~ ~r, ~ยต, p < โ independent of L
~ such that
20 . Remark that there obviously exists 0 < S := S ฮฒ,
โ1
lim (ln n)
nโโ
sup
sup
sup
d
X
ฮฑโ{0,1} uโ[1,โ] vโIu (ฮฑ) j=1
ln hj (v, u) = S.
Hence, in view of (4.19) one has for all n large enough and v โ Iu (ฮฑ)
p
(S + 2) ln n
(S + 2) ln n
~
~
Fn h(v, u) โค โ Q
(4.22)
.
, Gn h(v,
u) โค Q
1+ยตj (ฮฑ)
1
+ยต (ฮฑ)
n dj=1 hj (v, u)
n dj=1 hj (v, u) 2 j
25
Pd
โ 1
e j (v, u) and setting S0 = S + 2 ed+2 j=1 ยตj L ฮฒ(1) we
Taking into account that hj (v, u) โฅ eโ1 ฮท
obtain from (4.2) for any ฮฑ โ [0, 1] and v โ Iu (ฮฑ)
(S + 2)n
โ1
ln (n)
d
Y
j=1
1+2ยตj (ฮฑ)
hj (v, s)
โค 2S0 a2 v 2 zโ1 (v).
(4.23)
From now on we choose a โค a/(2S0 ) < 1. It yields in view of (4.22) and (4.23)
~
Fn2 h(v,
u) โค a2 v 2 zโ1 (v), โv โ Iu (ฮฑ).
(4.24)
30 . Since
(4.24) holds, to finish the proof of Proposition (2) all we need to show is that
Gn ~h(v, u) โค av, โv โ Iu (ฮฑ). Let us distinguish three cases.
30 a. Let pโ = โ or ฮฑ 6= 1, u = โ. First we note that in these cases Iu (ฮฑ) = [v, 1]. Next in view
of the second inequality in (4.22), (4.19), (4.23) and (4.24) we obtain
~
Gn h(v,
u) โค
n
(S + 2) ln n
2 2 โ1
1+2ยตj (ฮฑ) โค a v z (v) โค av, โv โ Iu (ฮฑ).
j=1 hj (v, u)
Qd
(4.25)
To get the last inequality we have used that a < 1, z(ยท) โฅ 2 and v โค 1.
30 b. Let ฮฑ 6= 1, pโ < โ, u < โ. We have in view of the second inequality in (4.22) and (4.23)
h(v, u) โค a2 v 2 zโ1 (v), โv โ Iu (0).
Gn ~
uฯ(0)
uโฯ(0)โฯ(0)/ฮฒ(0)
u+ฯ(0)
, and since
For any u 6= โ, simple algebra shows that vzโ1 (v) = aโ2 ฮดn u+ฯ(0) v
โ
u โฅ u , which implies u โ ฯ(0) โ ฯ(0)/ฮฒ(0) > 0, the result follows from
sup vzโ1 (v) = v1 zโ1 (v1 ) = 1.
vโIu (0)
30 c. Let ฮฑ = 1, pโ < โ. We have in view of the second inequality in (4.22) and (4.23)
G2n ~
h(v, u) โค
n
(S + 2) ln n
(S + 2) ln n
1+2ยตj (ฮฑ) Qd
n j=1 hj (v, u)
j=1 hj (v, u)
Qd
โค S1 a2 a2 v 2 zโ1 (v) Qd
aโ2 ฮดn
e j (v, u)
j=1 ฮท
v โ Iu (1),
,
(4.26)
where we have denoted S1 = S0 Lโ1/ฮฒ(0) .
Our goal now is to show that for all n large enough
โ2
sup a
vโIu (1)
ฮดn z
โ1
(v)
d
Y
j=1
We easily compute for any v > 0
aโ2 ฮดn zโ1 (v)
d
Y
j=1
โ2
โ1
e โ1
ฮท
j (v, u) = z (v) a ฮดn
26
e โ1
ฮท
j (v, u) โค 1.
uฯ(1)
1โ (ฯ(1)+u)ฯ(0)
v
(4.27)
uฯ(1)(2+1/ฮฒ(1))
1
โ ฮฒ(0)
(u+ฯ(1))ฯ(0)
.
(4.28)
Denoting the right hand side of the obtained inequality by P (v) we obviously have
โ2
sup a
ฮดn z
โ1
(v)
vโIu (1)
d
Y
j=1
e โ1
ฮท
v) ,
j (v, u) โค max P (v), P (e
(4.29)
e โ {v3 , v, v โง v3 }. Remarking that z(v) = 2 we easily compute that for any u โ [1, โ]
where v
P (v) = 2โ1 aโ2 ฮดn
2+1/ฮฒ(ฮฑ)โ1/ฮฒ(0
2+1/ฮฒ(ฮฑ)
โ 0, n โ โ.
(4.30)
Moreover we obviously have
P (v) = 2โ1 aโ2 ฮดn
2uฯ(1)(Y +1/u)
ฯ(1)+u
v
2uฯ(1)ฯ(u)
u+ฯ(1)
,
v > 0.
(4.31)
e = v3 .
30 c1. Consider the case ฮบ1 (pโ , u) โฅ 0. Here v
If ฯ(u) โค 0 then v3 = โ and we deduce from (4.31)
sup P (v) = P (v) โ 0, n โ โ,
(4.32)
vโฅv
thanks to (4.30). If ฯ(u) > 0 the definition of v3 implies that
P (v3 ) = 1.
(4.33)
Both last results together with (4.29) and (4.30) prove (4.27) in the case ฮบ1 (pโ , u) โฅ 0.
e = v.
30 c2. Consider the case ฮบ1 (pโ , u) < 0, Y โฅ [X + 1]yโ1 โ 1/u. Here v
โ
โ
โ
If ฯ (p ) > 0 then v = v. Moreover y = u since u = โ if ฯ (โ) โฅ 0 and ฯ (uโ ) = 0 if ฯ (โ) < 0.
Hence in view of (3.21) of Lemma 1
z(1)/ฯ(1) โ 1 + 2/u โฅ 0.
We have in view of the definition of v
Note that,
P (v) = 2โ1 aโ2 ฮดn
uฯ 2 (1)ฯ (โ)ฮฒ(0)ฯ(u)
uฯ(1)(1/ฯ(1)โ1/ฯ(0)+2/u)
+ [u+ฯ(1)][z(ฮฑ)+ฯ(ฮฑ)/u]
ฯ(1)+u
.
(4.34)
uฯ(1)(1/ฯ(1) โ 1/ฯ(0) + 2/u)
uฯ 2 (1)ฯ (โ)ฮฒ(0)ฯ(u)
+
ฯ(1) + u
[u + ฯ(1)][z(1) + ฯ(1)/u]
ฯ(1)ฯ (โ)
ฯ(1)[1 โ 1/u]
ฯ(1)[1/ฯ(0) โ 1/u]
โ
=1โ
> 0.
= 1โ
z(1) + ฯ(1)/u
z(1) + ฯ(1)/u
z(1) + ฯ(1)/u
To get the last inequality we have used that
1โ
ฯ(1)[1 โ 1/u]
>0
z(1) + ฯ(1)/u
โ
z(1)/ฯ(1) โ 1 + 2/u > 0.
Thus, we conclude that P (v) โค 1, which together with (4.30) implies (4.27) in the considered case.
If ฯ (pโ ) < 0 then v = v2 . Moreover y = pโ . We have in view of the definition of v2
P (v2 ) = 2โ1 aโ2 ฮดn
uฯ(1)(1/ฯ(1)โ1/ฯ(0)+2/u)
[uฯ(1)]2 ฯ(u)
+
ฯ(1)+u
ฮบ1 (pโ ,u)[u+ฯ(1)]2
27
.
(4.35)
After routine computations we come to the following equality
[uฯ(1)]2 ฯ(u)
uฯ(1)(1/ฯ(1) โ 1/ฯ(0) + 2/u)
+
ฯ(1) + u
ฮบ1 (pโ , u)[u + ฯ(1)]2
2uฯ(1)pโ Y โ (X + 1)(y)โ1 + 1/u
โฅ 0.
= โ
ฮบ1 (pโ , u)[u + ฯ(1)]
Hence, P (v2 ) โค 1 for all n large enough, which together with (4.30) allows us to assert (4.27) in
the considered case.
e = v โง v3 .
30 c3. Consider the case ฮบ1 (pโ , u) < 0, Y < [X + 1]yโ1 โ 1/u. Here v
If ฯ(u) โค 0 the required result follows from (4.32).
If ฯ(u) > 0 then by (4.31) P (ยท) is strictly increasing and, therefore,
P v โง v3 โค P v3 = 1
in view of (4.33). This completes the proof (4.27).
p
Finally to conclude in the case 30 c, choosing a โค 1/S1 , we deduce from (4.26) and (4.27) that
for all n large enough
โ
Gn ~
h(v, u) โค S1 aav โค av, v โ Iu (1).
4.3. Proof of Proposition 3
In view of Lemma 5 in Lepski (2015), if ฯ (pโ ) > 0 then
~ L
~ โ N~q,d ~ฮณ , c2 L
~ ,
N~r,d ฮฒ,
(4.36)
~ Note also that ฮณj โค ฮฒj for any j = 1, . . . , d.
where c2 is independent on L.
~ ~r or ~ฮณ , ~q and without further mentioning the couple ~ฮณ , ~q is used
10 . Let ~ฯ , ~s be either ฮฒ,
below under the condition ฯ (pโ ) > 0. We obviously have for any ~h โ H
Z
Kโ (u) f x + uhej โ f (x) ฮฝ1 (du)
bh,f,j (x) :=
sup
hโH: hโคh
=
sup
hโH: hโคh
For j = 1, . . . , d we have
Z
R
R
Kโ (u) โuh,j f (x) ฮฝ1 (du) .
Z X
โ
โ
1 u
โhu,j f (x) ฮฝ1 (du)
Kโ (u)โuh,j f (x)ฮฝ1 (du) =
(โ1)i+1 Kโ
i
i
R i=1 i
R
Z
Z
โ
X
โ
= (โ1)โโ1
Kโ (z)
(โ1)i+โ โizh,j f (x) ฮฝ1 (dz) = (โ1)โโ1
Kโ (z) โโzh,j f (x) ฮฝ1 (dz).
i
R
R
Z
i=1
The last equality follows from the definition of the โ-th order difference operator (2.4). Hence, for
any j โ Jโ we have in view of the definition of the Nikolโskii class (remind that ฮณj = ฮฒj , j โ Jโ )
28
kbh,f,j kโ โค
sup
Z
hโH: hโคh R
Kโ (z)
This yields for any h โ H
โโzh,j
f (ยท)
ฮฝ (dz)
โ 1
โค Lj
sup
hโH: hโคh
ฯ
hj j
Z
R
Kโ (z) |z|ฯj ฮฝ1 (dz).
(h) โค c1 Lj hฯj ,
B
(4.37)
~L
~
j,โ,N~r,d ฮฒ,
and the first and the second assertions of the proposition are proved for any j โ Jโ .
Let j โ Jยฏโ . Choosing k from the relation ek = h (recall that h โ H), we have for any x โ Rd
Z
Z
โ
bh,f,j (x) = sup
Kโ (z) โzek ,j f (x) ฮฝ1 (dz) =: lim sup
Kโ (z) โโzek ,j f (x) ฮฝ1 (dz) .
kโคk
lโโโ lโคkโคk
R
R
We have in view of monotone convergence theorem and the triangle inequality
Z
Kโ (z) โโzek ,j f (ยท) ฮฝ1 (dz)
bh,f,j s = lim sup
j
lโโโ lโคkโคk
โค
k
X
k=โโ
Z
R
R
sj
Kโ (z) โโzek ,j f (ยท) ฮฝ1 (dz)
.
sj
By the Minkowski inequality for integrals [see, e.g., (Folland 1999, Section 6.3)], we obtain
bv,f,j
sj
โค
Z
k
X
k=โโ R
|Kโ (z)| โโzek ,j f
sj
ฮฝ1 (dz),
j = 1, . . . , d.
~ L
~ and (4.36), we have for any j = 1, . . . , d,
Taking into account that f โ N~r,d ฮฒ,
bh,f,j
sj
โค
Z
k
X
ekฯj โค c1 Lj hฯj ,
|Kโ (z)| |z| ฮฝ1 (dz) Lj
ฮฒj
R
k=โโ
โh โ Hd .
This proves the first and the second assertions of the proposition for any j โ Jยฏโ .
~ L
~ and recall that
20 . Set F = N~r,d ฮฒ,
Z
X
X
โ
Kโ (u) f x + uhej โ f (x) ฮฝ1 (du)
Bj,sj ,F (h) := sup
โค sup
f โF hโH: hโคh
R
sj
f โF hโH: hโคh
(4.38)
bh,f,j
sj
Hence, the third assertion follows from (4.37) and (4.38).
5. Appendix
5.1. Proof of Lemma 1
Note that
z(ฮฑ) + ฯ(ฮฑ)/s = ฯ(ฮฑ)(2 + 1/ฮฒ(ฮฑ))ฮฒ(0)ฯ (pโ ) + 1 โ ฯ(ฮฑ)(2 + 1/ฮฒ(ฮฑ))(pโ )โ1 + ฯ(ฮฑ)/s
= ฯ(ฮฑ)(2 + 1/ฮฒ(ฮฑ))ฮฒ(0)ฯ (pโ ) โ (pโ )โ1 (1 + ฯ(ฮฑ)/s)ฮบฮฑ (pโ , s),
29
.
and (3.20) follows. On the other hand we have
z(ฮฑ)/ฯ(ฮฑ) โ 1 + 2/u = 2 + 2X ฮฒ(0)ฯ (โ) + 2Y + 2/u
and (3.21) is checked if ฯ (โ) โฅ 0 since X, Y โฅ 0. If ฯ (โ) < 0 and ฯ (pโ ) > 0 then we note first
that necessarily uโ > pโ since ฯ (uโ ) = 0 and ฯ (ยท) is strictly decreasing. Hence y = uโ and
z(ฮฑ)/ฯ(ฮฑ) โ 1 + 2/u = 2 + 2X ฮฒ(0)ฯ (โ) + 2Y + 2/u = 2 Y โ (X + 1)yโ1 + 1/u โฅ 0
and (3.21) is established.
Let us prove (3.22). First we note that (3.22) is obvious if ฯ (โ) โฅ 0 because in this case ฯ (s) > 0
for any s โฅ 1. Thus, from now on we will assume that ฯ (โ) < 0.
Next, if uโ > pโ then (3.22) holds. Indeed, in this case 0 < Y โ [X + 1]yโ1 = Y โ [X + 1](uโ )โ1
implies uโ > (X + 1)/Y . Hence any number from the interval pโ โจ (X + 1)/Y, uโ satisfies (3.22).
At last, note that if pโ โฅ uโ we have
0โค
ฮบฮฑ (pโ , โ)
ฯ(ฮฑ)
= 2 + 2X โ 2pโ Y + 1/ฮฒ(0) โ pโ /ฯ(0)
= 2y (1 + X)yโ1 โ Y + 1/ฮฒ(0) โ pโ /ฯ(0) < 0,
since 1/ฮฒ(0) โค pโ /ฯ(0) in view of rj โค pโ for any j = 1, . . . , d. The obtained contradiction completes
the proof of (3.22).
5.2. Proof of Lemma 2
Indeed,
1/ฮณ(ฮฑ) โ 1/ฮฒ(ฮฑ) = 1/ฮณยฑ (ฮฑ) โ 1/ฮฒยฑ (ฮฑ) =
X 1 + 2ยตj (ฮฑ)
ฯ (rj )/ฯ (pยฑ ) โ 1
ฮฒj
jโJยฑ
โ1 X 1 + 2ยตj (ฮฑ)
โ1
= ฮฒ(0)ฯ (pยฑ )
(1/rj โ 1/pยฑ ) = ฯ (pยฑ )ฮฒ(0)
1/ฯ(ฮฑ) โ 1/(ฮฒยฑ (ฮฑ)pยฑ ) .
ฮฒj
jโJยฑ
Moreover, in view of the latter inequality
1/ฯ(ฮฑ) โ 1/ฯ
(ฮฑ) = 1/ฯ(ฮฑ) โ 1/(pยฑ ฮณยฑ (ฮฑ))
โ1
= 1/ฯ(ฮฑ) โ 1/(pยฑ ฮฒยฑ (ฮฑ)) โ ฯ (pยฑ )ฮฒ(0)pยฑ
1/ฯ(ฮฑ) โ 1/(ฮฒยฑ (ฮฑ)pยฑ )
โ1
= 1 โ ฯ (pยฑ )ฮฒ(0)pยฑ
1/ฯ(ฮฑ) โ 1/(ฮฒยฑ (ฮฑ)pยฑ ) .
โ1
It remains to note that 1 โ ฯ (pยฑ )ฮฒ(0)pยฑ
= ฯ (โ)/ฯ (pยฑ ) and the lemma follows.
References
Akakpo, N. (2012). Adaptation to anisotropy and inhomogeneity via dyadic piecewise polynomial
selection. Math. Methods Statist. 21, 1โ28.
30
Birgeฬ, L. (2008). Model selection for density estimation with L2 โloss. arXiv:0808.1416v2,
http://arxiv.org
Comte, F., Rozenholc, Y. and Taupin, M.-L. (2006). Penalized contrast estimator for adaptive
density deconvolution. Canad. J. Statist., 34, 3, 431โ452.
Comte, F. and Lacour, C. (2013). Anisotropic adaptive kernel deconvolution. Ann. Inst. H.
Poincareฬ Probab. Statist. 49, 2, 569โ609.
Fan, J. (1991). On the optimal rates of convergence for nonparametric deconvolution problems.
Ann. Statist., 19, 3, 1257โ1272.
Fan, J. (1993). Adaptively local one-dimensional subproblems with application to a deconvolution
problem. Ann. Statist., 21, 2, 600โ610.
Fan, J. and Koo, J. (2002). Wavelet deconvolution. IEEE Trans. Inform. Theory, 48, 734โ747.
Devroye, L. and Lugosi, G. (1997). Nonasymptotic universal smoothing factors, kernel complexity and Yatracos classes. Ann. Statist. 25, 2626โ2637.
Donoho, D. L., Johnstone, I. M., Kerkyacharian, G. and Picard, D. (1996). Density
estimation by wavelet thresholding. Ann. Statist. 24, 508โ539.
Efroimovich, S. Yu. (1986). Non-parametric estimation of the density with unknown smoothness.
Theory Probab. Appl. 30, 557โ568.
Folland, G. B. (1999). Real Analysis. Second edition. Wiley, New York.
Gach, D., Nickl, R., and Spokoiny, V. (2013). Spatially adaptive density estimation by localised
Haar projections. Ann. Inst. H.Poincareฬ (Probab-Stat) 49, 900โ914.
Gineฬ E. and Nickl, R. (2009). An exponential inequality for the distribution function of the
kernel density estimator, with application to adaptive estimation. Probab. Theory and Related
Fields 143, 569โ596.
Goldenshluger, A. and Lepski, O.V. (2011). Bandwidth selection in kernel density estimation:
oracle inequalities and adaptive minimax optimality. Ann. Statist. 39, 1608โ1632.
Goldenshluger, A. and Lepski, O.V. (2014). On adaptive minimax density estimation on Rd .
Probab. Theory Related Fields, 159, 479โ543.
Golubev, G.K. (1992). Non-parametric estimation of smooth probability densities. Probl. Inform.
Transm. 1, 52โ62.
de Guzman, M. (1975). Differentiation of Integrals in Rn . With appendices by Antonio Crdoba,
and Robert Fefferman, and two by Roberto Moriyn. Lecture Notes in Mathematics, Vol. 481.
Springer-Verlag, Berlin-New York.
Hall, P. and Meister, A. (2007). A ridge-parameter approach to deconvolution. Ann. Statist.,
35, 4, 1535โ1558.
Hasminskii, R. and Ibragimov, I. (1990). On density estimation in the view of Kolmogorovโs
ideas in approximation theory. Ann. Statist. 18, 999โ1010.
Hesse, C. H. (1995). Deconvolving a density from partially contaminated observations. Journal
of Multivariate Analysis 55, 246โ260.
Juditsky, A. and LambertโLacroix, S. (2004). On minimax density estimation on R. Bernoulli
10, 187โ220.
Kerkyacharian, G., Lepski, O. and Picard, D. (2001). Nonlinear estimation in anisotropic
multiโindex denoising. Probab. Theory Related Fields 121, 137โ170.
Kerkyacharian, G., Thanh, M. and Picard, D. (2011). Localized spherical deconvilution.
Ann. Statist. 39, 2, 1042โ1068.
Lepski, O.V. (2013). Multivariate density estimation under sup-norm loss: oracle approach, adaptation and independence structure. Ann. Statist. 41, 2, 1005โ1034.
31
Lepski, O.V. (2015). Adaptive estimation over anisotropic functional classes via oracle approach.
Ann. Statist. 43, 3, 1178โ1242.
Lepski, O.V., and Willer T. (2017). Lower bounds in the convolution structure density model.
Bernoulli, 23, 2, 884-926.
Lepski, O.V., and Willer T. (2016). Estimation in the convolution structure density model.
Part I: oracle inequalities. Annals of Statist., submitted.
Lepski, O.V. (2017). A new approach to estimator selection. Bernoulli, to appear.
arXiv:1603.03934v1, http://arxiv.org.
Lounici, K. and Nickl, R. (2011). Global uniform risk bounds for wavelet deconvolution estimators. Ann. Statist. 39, 2, 201โ231.
Masry, E. (1993). Strong consistency and rates for deconvolution of multivariate densities of
stationary processes. Stochastic processes and their applications, 47, 1, 53โ74.
Meister, A. (2009). Deconvolution problems in nonparametric statistics, 193, Lecture Notes in
Statistics. Springer-Verlag, Berlin.
Nikolโskii, S. M. (1977). Priblizhenie Funktsii Mnogikh Peremennykh i Teoremy Vlozheniya. (in
Russian). [Approximation of functions of several variables and imbedding theorems.] Second
edition, revised and supplemented. Nauka, Moscow.
Pensky, M. and Vidakovic, B. (1999) Adaptive wavelet estimator for nonparametric density
deconvolution. Ann. Statist., 27, 6, 2033โ2053.
Rebelles, G. (2016) Structural adaptive deconvolution under Lp -losses. Math. Methods Statist.
25, 1, 26-53.
Reynaud-Bouret, P., Rivoirard, V. and Tuleau-Malot, C. (2011). Adaptive density estimation: a curse of support? J. Statist. Plann. Inference 141, 115-139.
Rigollet, P. (2006). Adaptive density estimation using the blockwise Stein method. Bernoulli
12, 351โ370.
Rigollet, P. and Tsybakov, A. B. (2007). Linear and convex aggregation of density estimators.
Math. Methods Statist. 16, 260โ280.
Samarov, A. and Tsybakov, A. (2007). Aggregation of density estimators and dimension reduction. Advances in Statistical Modeling and Inference, 233โ251, Ser. Biostat., 3, World Sci. Publ.,
Hackensack, NJ.
Stefanski, L. A. (1990). Rates of convergence of some estimators in a class of deconvolution
problems. Statist. Probab. Lett., 9, 229โ235.
Stefanski, L. A. and Carroll, R.J.(1990). Deconvoluting kernel density estimators. Statistics,
21, 1696-184.
Yuana, M. and Chenb, J. (2002). Deconvolving multidimensional density from partially contaminated observations. Journal of Statistical Planning and Inference. 104, 147โ160.
32
| 10math.ST
|
D-OPTIMAL DESIGNS WITH ORDERED CATEGORICAL DATA
arXiv:1502.05990v5 [math.ST] 8 Nov 2017
Jie Yang1 , Liping Tong2 and Abhyuday Mandal3
1
University of Illinois at Chicago, 2 Advocate Health Care and 3 University of Georgia
Abstract: Cumulative link models have been widely used for ordered categorical
responses. Uniform allocation of experimental units is commonly used in practice,
but often suffers from a lack of efficiency. We consider D-optimal designs with
ordered categorical responses and cumulative link models. For a predetermined set
of design points, we derive the necessary and sufficient conditions for an allocation
to be locally D-optimal and develop efficient algorithms for obtaining approximate
and exact designs. We prove that the number of support points in a minimally
supported design only depends on the number of predictors, which can be much
less than the number of parameters in the model. We show that a D-optimal
minimally supported allocation in this case is usually not uniform on its support
points. In addition, we provide EW D-optimal designs as a highly efficient surrogate
to Bayesian D-optimal designs. Both of them can be much more robust than
uniform designs.
Key words and phrases: Approximate design, exact design, multinomial response,
cumulative link model, minimally supported design, ordinal data.
1. Introduction
In this paper we determine optimal and efficient designs for factorial
experiments with qualitative factors and ordered categorical responses, or
simply ordinal data. Design of experiment with multinomial response, and
ordered categories in particular, is becoming increasingly popular in a rich
variety of scientific disciplines, especially when human evaluations are involved (Christensen (2015)). Examples include a wine bitterness study
(Randall (1989)), potato pathogen experiments (Omer et al. (2000)), a
radish seedlingโs damping-off study (Krause et al. (2001)), a polysilicon deposition study (Wu (2008)), beef cattle research (Osterstock et al. (2010)),
and a toxicity study (Agresti (2013)).
This research is motivated by an odor removal study conducted by the
textile engineers at the University of Georgia. The scientists studied the
manufacture of bio-plastics containing odorous volatiles, that need to be
removed before commercialization. For that purpose, a 22 factorial experiment was conducted using algae and synthetic plastic resin blends. The
factors were types of algae (x1 : raffinated or solvent extracted algae
(โ), catfish pond algae (+)) and synthetic resins (x2 : polyethylene (โ),
2
JIE YANG, LIPING TONG AND ABHYUDAY MANDAL
polypropylene (+)). The response Y had three ordered categories: serious
odor (j = 1), medium odor (j = 2), and almost no odor (j = 3). Following
traditional factorial design theory, a pilot study with equal numbers (10
in this case) of replicates at each experimental setting was conducted, a
uniform design. The results are summarized in Table 1, where yij represents the number of responses falling into the jth category under the ith
experimental setting. As demonstrated later (Section 4), the best design
identified by our research could improve the efficiency by 25% with only
three experimental settings involved.
Table 1: Pilot Study of Odor Removal Study
Experimental
setting
i
1
2
3
4
Factor
Algae
x1
+
+
โ
โ
level
Resin
x2
+
โ
+
โ
Summarized responses (Y , odor)
Serious Medium
No odor
yi1
yi2
yi3
2
6
2
7
2
1
0
0
10
0
2
8
For such kind of ordinal response Y with J categories and d predictors
x = (x1 , . . . , xd )T , the most popular model in practice was first the proportional odds model (also known as cumulative logit model, see Liu and Agresti
(2005) for a detailed review). McCullagh (1980) extended it to the cumulative link model (also known as ordinal regression model)
g (P (Y โค j | x)) = ฮธj โ ฮฒ T x, j = 1, . . . , J โ 1
(1.1)
where g is a general link function, with the proportional odds model as a
special case when g is the logit link. Examples include the complementary
log-log link for the polysilicon deposition study (see Example 6) and the
cauchit link for the toxicity study (see Example 9). We adopt the cumulative link model (1.1).
When there are only two categories (J = 2), the cumulative link model
(1.1) is essentially a generalized linear model for binary data (McCullagh
and Nelder (1989); Dobson and Barnett (2008)). For optimal designs under generalized linear models, there is a growing body of literature (see
Khuri et al. (2006), Atkinson et al. (2007), Stufken and Yang (2012), and
references therein). In this case, it is known that the minimum number
of experimental settings required by a nondegenerate Fisher information
matrix is d + 1, which equals the number of parameters (Fedorov (1972);
2
D-OPTIMAL DESIGNS WITH ORDERED CATEGORICAL DATA
3
Yang and Mandal (2015)). A design with the least number of experimental
settings, known as a minimally supported design, is of practical significance
with a specified regression model due to the cost of changing settings. It is
also known that the experimental units should be uniformly assigned when
a minimally supported design is adopted for binary response, or under a
univariate generalized linear model (Yang and Mandal (2015)).
When J โฅ 3, the cumulative link model is a special case of the multivariate generalized linear model (McCullagh (1980)). The relevant results
in the optimal design literature are meagre and restricted to the logit link
function (Zocchi and Atkinson (1999); Perevozskaya et al. (2003)). Here we
obtain theoretical results and efficient algorithms for general link functions
and reveal that the optimal designs with J โฅ 3 are quite different from
the cases with J = 2. We prove that the minimum number of experimental settings is still d + 1, but strictly less than the number of parameters
d + J โ 1 (Theorems 3 and 4). This counter-intuitive result is due to the
multinomial-type responses: from a single experimental setup, the summarized responses have J โ 1 degrees of freedom, requiring fewer distinct
experimental settings in a minimally supported design. For the same reason, the allocation of replicates in a minimally supported design is usually
not uniform (Section 5), which differs from the traditional factorial design
theory.
As with generalized linear models, the information matrix under cumulative link models depends on unknown parameters. Different approaches
have been proposed to solve the dependence of optimal designs on unknown parameters, including local optimality (Chernoff (1953)), Bayesian
approach (Chaloner and Verdinelli (1995)), a maximin approach (Pronzato
and Walter (1988); Imhof (2001)), and a sequential procedure (Ford et al.
(1989)). As pointed out by Ford, Torsney, and Wu (1992), locally optimal
designs are not only important when good initial parameters are available
from previous experiments, but can also be a benchmark for designs chosen
to satisfy experimental constraints. We mainly focus on locally optimal
designs. For situations where local values of the parameters are difficult to
obtain, but the experimenter has an idea of the range of parameters with or
without a prior distribution, we recommend EW optimal designs, where the
Fisher information matrix is replaced by its expected values (Atkinson et al.
(2007); Yang, Mandal, and Majumdar (2016)). We compare Bayesian Doptimal designs (Chaloner and Verdinelli (1995)) with EW D-optimal designs for ordinal data. As a surrogate for Bayesian designs, an EW design
is much easier to find and retains high efficiency with respect to Bayesian
criterion (Section 6).
3
4
JIE YANG, LIPING TONG AND ABHYUDAY MANDAL
Among various optimal design criteria, D-optimality, which maximizes
the determinant of Fisher information matrix, is the most frequently used
(Zocchi and Atkinson (1999)) and often performs well according to other
criteria (Atkinson et al. (2007)). We study D-optimal designs.
In the design literature, one type of experiment deals with quantitative
or continuous factors only. Such a design problem includes the identification of a set of design points {xi }i=1,...,m and the corresponding weights
{pi }i=1,...,m (see, for example, Atkinson et al. (2007) and Stufken and Yang
(2012)). Numerical algorithms are typically used for cases with two or
more factors (see, for example, Woods et al. (2006)). Another type of experiment employs qualitative or discrete factors, where the set of design
points {xi }i=1,...,m is predetermined and only the weights {pi }i=1,...,m are to
be optimized (see, for example, Yang and Mandal (2015)). One can pick
grid points of continuous factors and turn the first kind of problem into the
second. Tong, Volkmer, and Yang (2014, Section 5) also bridged the gap
between the two types of problems in a way that results involving discrete
factors can be applied to the cases with continuous factors. We concentrate on the second kind of design problems and assume that {xi }i=1,...,m
are given and fixed.
This paper is organized as follows. In Section 2, we describe the preliminary setup and obtain the Fisher information matrix for the cumulative
link model with a general link, generalizing Perevozskaya et al. (2003). We
also identify a necessary and sufficient condition for the Fisher information
matrix to be positive definite, which determines the minimum number of
experimental settings required. In Sections 3 and 4, we provide theoretical
results and numerical algorithms for searching locally D-optimal approximate or exact designs. In Section 5, we identify analytic D-optimal designs
for special cases to illustrate that a D-optimal minimally supported design
is usually not uniform on its support points. In Section 6, we illustrate by
examples that the EW D-optimal design can be highly efficient with respect
to Bayesian D-optimality. We make concluding remarks in Section 7 and
relegate additional proofs and results to the supplementary materials.
2. Fisher Information Matrix and Its Determinant
Suppose there are m (m โฅ 2) predetermined experimental settings. For
the ith experimental setting with corresponding predictors xi = (xi1 , . . . ,
xid )T โ Rd (d โฅ 1), there are ni experimental units assigned to it. Among
the ni experimental units, the kth one generates a response Vik which belongs to one of J (J โฅ 2) ordered categories. As shown in Example 2, the
dimension d of the predictors can be significantly larger than the number
of factors considered in the experiment, which allows more flexible models.
4
D-OPTIMAL DESIGNS WITH ORDERED CATEGORICAL DATA
5
2.1 General setup
In many applications, Vi1 , . . . , Vini are regarded as i.i.d. discrete random
variables. Let ฯij = P (Vik = j), where i = 1, . . . , m; j = 1, . . . , J; and
k = 1, . . . , ni . Let Yij = #{k | Vik = j} be the number of Vik โs falling into
the jth category. Then (Yi1 , . . . , YiJ ) โผ Multinomial(ni ; ฯi1 , . . . , ฯiJ ) .
Assumption 1. 0 < ฯij < 1, i = 1, . . . , m; j = 1, . . . , J.
Let ฮณij = P (Vik โค j) = ฯi1 + ยท ยท ยท + ฯij , j = 1, . . . , J. Based on
Assumption 1, 0 < ฮณi1 < ฮณi2 < ยท ยท ยท < ฮณi,Jโ1 < ฮณiJ = 1 for each i =
1, . . . , m. Consider independent multinomial observations (Yi1 , . . . , YiJ ), i =
1, . . . , m with corresponding predictors x1 , . . . , xm . Under a cumulative
link model or ordinal regression model (McCullagh (1980); Agresti (2013);
Christensen (2015)), there exists a link function g and parameters of interest
ฮธ1 , . . . , ฮธJโ1 , ฮฒ = (ฮฒ1 , . . . , ฮฒd )T , such that
g(ฮณij ) = ฮธj โ xTi ฮฒ,
j = 1, . . . , J โ 1.
(2.1)
This leads to m(J โ1) equations in d + J โ1 parameters (ฮฒ1 , . . . , ฮฒd , ฮธ1 , . . . ,
ฮธJโ1 ).
Assumption 2. The link g is differentiable and its derivative g โฒ > 0.
Assumption 2 is satisfied for commonly used link functions including logit (log(ฮณ/(1 โ ฮณ)), probit (ฮฆโ1 (ฮณ)), log-log (โ log(โ log(ฮณ))),
complementary log-log (log(โ log(1โฮณ))), and cauchit (tan(ฯ(ฮณโ1/2)))
(McCullagh and Nelder (1989); Christensen (2015)). Some relevant formulas of these link functions are provided in the supplementary materials
(Section S.1). According to Assumption 2, g is strictly increasing, and then
ฮธ1 < ฮธ2 < ยท ยท ยท < ฮธJโ1 .
Example 1. Consider the logit link g(ฮณ) = log(ฮณ/(1 โ ฮณ)) with two predictors and three ordered categories. Model (2.1) consists of 2m equations g(ฮณij ) = ฮธj โ xi1 ฮฒ1 โ xi2 ฮฒ2 , i = 1, . . . , m; j = 1, 2 and parameters
(ฮฒ1 , ฮฒ2 , ฮธ1 , ฮธ2 ). Under Assumptions 1 and 2, ฮธ1 < ฮธ2 .
Example 2. Suppose the model consists of three covariates x1 , x2 , x3 and a
few second-order predictors, g(ฮณij ) = ฮธj โ xi1 ฮฒ1 โ xi2 ฮฒ2 โ xi3 ฮฒ3 โ xi1 xi2 ฮฒ12 โ
x2i1 ฮฒ11 โ x2i2 ฮฒ22 , where i = 1, . . . , m; j = 1, . . . , J โ 1. Then the number of
predictors is d = 6.
Under the cumulative link model (2.1), the log-likelihood function (up
P PJ
to a constant) is l(ฮฒ1 , . . . , ฮฒd , ฮธ1 , . . . , ฮธJโ1 ) = m
j=1 Yij log(ฯij ), where
i=1
5
6
JIE YANG, LIPING TONG AND ABHYUDAY MANDAL
ฯij = ฮณij โ ฮณi,jโ1 with ฮณij = g โ1 (ฮธj โ xTi ฮฒ) for j = 1, . . . , J โ 1 and ฮณi0 = 0,
ฮณiJ = 1.
Perevozskaya et al. (2003) obtained a detailed form of the Fisher information matrix for logit link and one predictor. Our result is for general
link and d predictors; its proof is relegated to the supplementary materials
(Section S.3).
Theorem 1. Under Assumptions 1 and 2, the Fisher information matrix
can be written as
m
X
F=
ni Ai
(2.2)
i=1
where Ai is the (d + J โ 1) ร (d + J โ 1) matrix
Ai1 Ai2
(ei xis xit )s=1,...d;t=1,...,d (โxis cit )s=1,...,d;t=1,...,Jโ1
=
ATi2 Ai3
(โcis xit )s=1,...,Jโ1;t=1,...,d
Ai3
and Ai3 is the (J โ 1) ร (J โ 1) symmetric tri-diagonal matrix with diagonal
entries ui1 , . . . , ui,Jโ1, and off-diagonal entries โbi2 , . . . , โbi,Jโ1 when J โฅ
P
3, where ei = Jj=1 ฯijโ1 (gij โgi,jโ1 )2 > 0 with gij = (g โ1 )โฒ (ฮธj โxTi ฮฒ) > 0 for
โ1
j = 1, . . . , J โ 1 and gi0 = giJ = 0; cit = git [ฯitโ1 (git โ gi,tโ1 ) โ ฯi,t+1
(gi,t+1 โ
โ1
โ1
โ1
2
git )]; uit = git (ฯit + ฯi,t+1 ) > 0; and bit = gi,tโ1 git ฯit > 0. Ai3 contains
only one entry ui1 when J = 2.
As the Fisher information matrix, F is always positive semi-definite,
|F| โฅ 0 (Fedorov (1972)). As a special case, Ai is the Fisher information at
the experimental setting xi (also known as a design point or support point)
and thus is positive semi-definite.
2.2 Determinant of Fisher information matrix
Among different criteria for optimal designs, D-criterion looks for the
allocation maximizing |F|, the determinant of F. Here, a D-optimal design
with m predetermined design points x1 , . . . , xm could either be an
integerPm
valued allocation (n1 , n2 , . . . , nm ) maximizing |F| with fixed n = i=1 ni >
0, known as an exact design; or a real-valuedPallocation (p1 , p2 , . . . , pm )
m
maximizing |nโ1 F| with pi = ni /n โฅ 0 and
i=1 pi = 1, known as an
approximate design.
Theorem 2. The determinant of the Fisher information matrix,
X
cฮฑ1 ,...,ฮฑm ยท nฮฑ1 1 ยท ยท ยท nฮฑmm ,
|F| =
ฮฑ1 +ยทยทยท+ฮฑm =d+Jโ1
6
D-OPTIMAL DESIGNS WITH ORDERED CATEGORICAL DATA
7
is an order-(d + J โ 1) homogeneous polynomial of (n1 , . . . , nm ) and
X
|Aฯ | .
(2.3)
cฮฑ1 ,...,ฮฑm =
ฯ โ(ฮฑ1 ,...,ฮฑm )
The proof of Theorem 2 is relegated to the supplementary materials
(Section S.3). Given a map ฯ : {1, 2, . . . , d + J โ 1} โ {1, . . . , m}, Aฯ in
(2.3) is a (d + J โ 1) ร (d + J โ 1) matrix whose kth row is the same as the
kth row of Aฯ (k) , k = 1, . . . , d + J โ 1. We take ฯ โ (ฮฑ1 , . . . , ฮฑm ) where
ฮฑi = #{j : ฯ (j) = i} for each i = 1, . . . , m.
In order to obtain analytic properties of |F|, we need some lemmas.
The first of them covers Lemma 1 in Perevozskaya et al. (2003) as a special
case:
Lemma 1. Rank(Ai ) = Rank(Ai3 ) = J โ 1. Furthermore, Ai3 is positive
definite and
J
Jโ1
Y
Y
2
ฯitโ1 > 0
|Ai3 | =
gis ยท
s=1
โ1 โฒ
where gis = (g ) (ฮธs โ
xTi ฮฒ)
t=1
> 0 for s = 1, . . . , J โ 1.
Example 3. Suppose d = 2, J = 3, with link function g. According to
Theorem 2, |F| is then an order-4 homogeneous polynomial of (n1 , . . . , nm ).
Based on Lemma S.4 and Lemma S.5 in the supplementary materials (Section S.2), we can remove all the terms of the form n4i , n3i nj , or n2i n2j from
|F|. Therefore,
|F| =
m
X
X
cijk ยท n2i nj nk +
i=1 j<k,j6=i,k6=i
X
cijkl ยท ni nj nk nl
i<j<k<l
for some coefficients cijk and cijkl .
Based on Lemmas S.4 and S.5, in order to keep cฮฑ1 ,...,ฮฑm 6= 0, the largest
possible ฮฑi is J โ 1 and the fewest possible number of positive ฮฑi โs is d + 1.
Theorem 3. |F| > 0 only if m โฅ d + 1.
To determine whether d + 1 experimental settings or support points are
enough to keep the Fisher information matrix positive definite, we study
the leading term of |F| with max1โคiโคm ฮฑi = J โ 1.PFor example, ai0 = J โ 1
m
for some 1 โค i0 โค m. From Lemma S.5 and
i=1 ฮฑi = d + J โ 1, to
have cฮฑ1 ,...,ฮฑm 6= 0, there must exist 1 โค i1 < i2 < ยท ยท ยท < id โค m which are
different from i0 , such that, ฮฑi1 = ยท ยท ยท = ฮฑid = 1. A lemma provides an
explicit formula for such a coefficient cฮฑ1 ,...,ฮฑm :
7
8
JIE YANG, LIPING TONG AND ABHYUDAY MANDAL
Lemma 2. Suppose ฮฑi0 = J โ 1 and ฮฑi1 = ยท ยท ยท = ฮฑid = 1. Then
cฮฑ1 ,...,ฮฑm =
d
Y
eis ยท |Ai0 3 | ยท |X1 [i0 , i1 , . . . , id ]|2
s=1
where X1 = (1 X) is an m ร (d + 1) matrix with 1 = (1, . . . , 1)T , X = (x1 ,
. . . , xm )T , and X1 [i0 , i1 , . . . , id ] is the sub-matrix consisting of the i0 th, i1 th,
. . . , id th rows of X1 .
The proof of Lemma 2 is in the supplementary materials (Section S.3).
To find D-optimal allocations, we write |F| = f (n1 , . . . , nm ) for an order(d + J โ 1) homogeneous polynomial function f . The D-optimal exact
design problem is to find an integer-valued allocation (n1 , . . . , nm ) maximizing f (n1 , . . . , nm ) subject to ni โ {0, 1, . . . , n}, i = 1, . . . , m and
n1 + ยท ยท ยท + nm = n with given positive integer n. Denote pi = ni /n,
i = 1, . . . , m. According to Theorem 1,
f (n1 , . . . , nm ) =
m
X
i=1
ni Ai = n
m
X
pi Ai = nd+Jโ1 f (p1 , . . . , pm )
(2.4)
i=1
Due to (2.4), Theorems 2 and 3 can be directly applied to approximate
design problems too: find a real-valued allocation (p1 , . . . , pm ) maximizing
f (p1 , p2 , . . . , pm ) subject to 0 โค pi โค 1, i = 1, . . . , m and p1 + ยท ยท ยท + pm = 1.
According to Lemma 1, |Ai0 3 | > 0. Thus cฮฑ1 ,...,ฮฑm in Lemma 2 is positive
as long as X1 [i0 , . . . , id ] is of full rank. Theorem 3 implies that a minimally
supported design contains at least d + 1 support points, while the following
theorem states a necessary and sufficient condition for the minimum number
of support points to be exactly d + 1:
Theorem 4. f (p) > 0 for some p = (p1 , . . . , pm )T if and only if the extended design matrix X1 = (1 X) is of full rank d + 1.
The minimal number of experimental settings required can thus be
strictly less than the number of parameters. In the odor removal study,
for example, the main-effects cumulative link model (2.1) involves four
independent parameters โ two ฮฒโs for the covariates (d = 2) and two
ฮธโs for the intercepts (J โ 1 = 2) โ while a minimally supported design
could involve only three experimental settings. For multinomial responses
with J = 3 categories, we get two degrees of freedom from each experimental setting. Here the optimal allocation of experimental units is often not uniform (see Section 4), contrary to the case of binary responses
(Yang, Mandal, and Majumdar (2016); Yang and Mandal (2015)).
8
D-OPTIMAL DESIGNS WITH ORDERED CATEGORICAL DATA
9
3. D-optimal Approximate Design
A (locally) D-optimal approximate design is a real-valued allocation p =
(p1 , . . . , pm )T maximizing f (p) = f (p1 , . . . , pm ) with pre-specified values of parameters. The solution always exists since f is continuous and the set of feasible
Pm
allocations S := {(p1 , . . . , pm )T โ Rm | pi โฅ 0, i = 1, . . . , m;
i=1 pi = 1} is convex and compact. A nontrivial D-optimal approximate design problem requires
an assumption.
Assumption 3. m โฅ d + 1 and Rank(X1 ) = d + 1.
Assumption 3 is adopted throughout. With it, the set of valid allocations
P
S+ := {p = (p1 , . . . , pm )T โ S | f (p) > 0} is nonempty. Since F = m
i=1 ni Ai =
Pm
n i=1 pi Ai is linear in p and ฯ(ยท) = log | ยท | is concave on positive semi-definite
matrices, f (p) = n1โdโJ |F| is log-concave (Silvey (1980)) and thus S+ is also
convex.
Theorem 5. A feasible allocation p = (p1 , . . . , pm )T satisfies f (p) > 0 if and
only if Rank(X1 [{i | pi > 0}]) = d + 1, where X1 [{i | pi > 0}] is the sub-matrix
consisting of the {i | pi > 0}th rows of X1 .
As a direct conclusion of Theorem 5, S+ contains all p whose coordinates are
all strictly positive. A special case is the uniform allocation pu = (1/m, . . . , 1/m)T .
A necessary and sufficient condition for an approximate design to be Doptimal is of the general-equivalence-theorem type (Kiefer (1974); Pukelsheim
(1993); Atkinson et al. (2007); Stufken and Yang (2012); Fedorov and Leonov
(2014); Yang, Mandal, and Majumdar (2016)), which is convenient when searching for numerical solutions. Following Yang, Mandal, and Majumdar (2016), for
a given p = (p1 , . . . , pm )T โ S+ and i โ {1, . . . , m}, we set
1โz
1โz
1โz
1โz
p1 , . . . ,
piโ1 , z,
pi+1 , . . . ,
pm
(3.1)
fi (z) = f
1 โ pi
1 โ pi
1 โ pi
1 โ pi
with 0 โค z โค 1. Here fi (z) is well defined as long as pi < 1.
Theorem 6. Suppose p = (p1 , . . . , pm )T โ S+ and i โ {1, . . . , m}. For 0 โค z โค
1,
Jโ1
X
aj z j (1 โ z)Jโ1โj
(3.2)
fi (z) = (1 โ z)d
j=0
tโ1 )
where a0 = fi (0), (aJโ1 , . . . , a1 = Bโ1
s,t=1,...,Jโ1 , and c =
Jโ1 c, BJโ1 = (s
T
d+Jโ1
โd
Jโ1
(c1 , . . . , cJโ1 ) with cj = (j + 1)
j fi (1/(j + 1)) โ j
fi (0).
)T
Following the lift-one algorithm proposed in Yang, Mandal, and Majumdar
(2016), we have parallel results and an algorithm for our case. For simplicity, we
also call it the lift-one algorithm.
9
10
JIE YANG, LIPING TONG AND ABHYUDAY MANDAL
Theorem 7. Given an allocation p = (pโ1 , . . . , pโm )T โ S+ , p is D-optimal if
and only if for each i = 1, . . . , m, fi (z), 0 โค z โค 1 attains it maximum at z = pโi .
A lift-one algorithm
1โฆ Start with an allocation p0 = (p1 , . . . , pm )T satisfying f (p0 ) > 0.
2โฆ Set up a random order of i going through {1, 2, . . . , m}.
3โฆ For each i, determine fi (z) according to Theorem 6, with J determinants
fi (0), fi (1/2), fi (1/3), . . . , fi (1/J) calculated according to (3.1).
4โฆ Use the quasi-Newton method with gradient defined in (S.13) to find zโ
maximizing fi (z) with 0 โค z โค 1. If fi (zโ ) โค fi (0), let zโ = 0. Take
(i)
pโ = (p1 (1 โ zโ )/(1 โ pi ), . . . , piโ1 (1 โ zโ )/(1 โ pi ), zโ , pi+1 (1 โ zโ )/(1 โ
(i)
pi ), . . . , pm (1 โ zโ )/(1 โ pi ))T , so f (pโ ) = fi (zโ ).
(i)
(i)
5โฆ Replace p0 with pโ , and f (p0 ) with f (pโ ).
(i)
6โฆ Repeat 2โฆ โผ 5โฆ until f (p0 ) = f (pโ ) for each i.
Theorem 8. When the lift-one algorithm converges, the resulting p maximizes
f (p).
Example 4. Odor removal study Here the response was ordinal in nature, serious odor, medium odor, and no odor. We fit the cumulative link
model (2.1) to the data presented in Table 1. The estimated values of the model
parameters are (ฮฒห1 , ฮฒห2 , ฮธห1 , ฮธห2 )T = (โ2.44, 1.09, โ2.67, โ0.21)T . If a follow-up experiment is planned and the estimated parameter values are regarded as the true
values, the D-optimal approximate allocation found by the lift-one algorithm is
po = (0.4449, 0.2871, 0, 0.2680)T . The efficiency of the uniform pu = (1/4, 1/4,
1/4, 1/4)T is (f (pu )/f (po ))1/4 = 79.7%, which is far from satisfactory.
Example 5. Wine bitterness study Christensen (2015, Table 1) aggregated the wine data from Randall (1989). It contains the output of a factorial experiment with two treatment factors each at two levels (Temperature x1 :
cold (โ) or warm (+); Contact x2 : no (โ) or yes (+)) affecting wine bitterness. The response was ordinal with five levels (from โ1โ being least bitter
to โ5โ being most bitter). The original design employed a uniform allocation
pu = (1/4, 1/4, 1/4, 1/4)T . The estimated parameter values under the logit link
are (ฮฒห1 , ฮฒห2 , ฮธห1 , ฮธห2 , ฮธห3 , ฮธห4 )T = (1.25, 0.76, โ3.36, โ0.76, 1.45, 2.99)T . If a follow-up
experiment is planned regarding the estimated values of the parameters as the
true values, then the D-optimal approximate allocation found by the lift-one algorithm is po = (0.2694, 0.2643, 0.2333, 0.2330)T . The efficiency of the original
10
D-OPTIMAL DESIGNS WITH ORDERED CATEGORICAL DATA
11
design pu is 99.9%. Nevertheless, the corresponding efficiency may drop to 80% if
|ฮฒ1 | and |ฮฒ2 | are both larger than 3 (see Figure 1(a)). In that case, the D-optimal
allocations are minimally supported, see Figure 1(b); this is discussed further in
Section 5.
(b)
4
4
(a)
0.8
0.8
p1=0
2
2
0.85
0.95
0.99
0.99
0.99
0.99
0.95
p1>0, p2>0, p3>0, p4>0
โ2
0.9
โ2
0.85
0.95
0
0
0.95
ฮฒ2
0.85
ฮฒ2
p3=0
0.9
0.9
0.9
โ4
โ4
โ4
0.85
0.8
0.8
โ2
0
2
4
p4=0
โ4
ฮฒ1
p2=0
โ2
0
2
4
ฮฒ1
Figure 1: Wine bitterness study with assumed true parameter values (ฮฒ1 , ฮฒ2 , โ3.36,
โ0.76, 1.45, 2.99)T : (a) contour plot of efficiency of the original design; (b) regions for a
D-optimal design to be minimally supported.
In the examples we have studied, the lift-one algorithm often converges
within a few iterations. The Yang, Mandal, and Majumdar (2016) lift-one algorithm is guaranteed to converge and can be applied if the lift-one algorithm
here does not converge in a pre-specified number of iterations.
4. D-optimal Exact Design
In the design literature, different discretization methods have been proposed
to round an approximate design into an exact design for a given n, including
the quota method (Kiefer (1971); Pukelsheim (1993)) and the efficient rounding procedure (Pukelsheim (1993); Pukelsheim and Rieder (1992)), which usually work well for large enough n but with no guarantee for small sample size
(Imhof, Lopez-Fidalgo, and Wong (2001)).
In this section, we provide a direct search for D-optimal exact designs. From
Theorem 5, we have the result as follows:
Corollary 1. |F| > 0 if and only if Rank(X1 [{i | ni > 0}]) = d + 1.
We assume n โฅ d + 1 throughout this section. To maximize f (n) = f (n1 ,
. . . , nm ) = |F|, we adopt the exchange algorithm idea of Fedorov (1972). It is
11
12
JIE YANG, LIPING TONG AND ABHYUDAY MANDAL
used here to adjust ni and nj simultaneously for randomly chosen (i, j), while
keeping ni + nj = c as a constant.
We start with an n = (n1 , . . . , nm )T satisfying f (n) > 0. Following Yang,
Mandal, and Majumdar (2016), for 1 โค i < j โค m, let
fij (z) = f (n1 , . . . , niโ1 , z, ni+1 , . . . , njโ1 , c โ z, nj+1 , . . . , nm )
(4.1)
where c = ni + nj , z = 0, 1, . . . , c, so fij (ni ) = f (n). From Theorem 2, Lemmas S.4 and S.5, we have the result as follows.
Theorem 9. Suppose n = (n1 , . . . , nm )T satisfies f (n) > 0 and ni + nj โฅ J for
given 1 โค i < j โค m. For z = 0, 1, . . . , ni + nj ,
fij (z) =
J
X
cs z s
(4.2)
s=0
where c0 = fij (0), and c1 , . . . , cJ can be obtained using (c1 , . . . , cJ )T = Bโ1
J (d1 ,
T
tโ1
. . . , dJ ) with BJ = (s )st as a J ร J matrix and ds = (fij (s) โ fij (0))/s.
The J ร J matrix BJ in Theorem 9 shares the same form of BJโ1 in
Theorem 6. According to Theorem 9, in other to maximize fij (z) with z =
0, 1, . . . , ni + nj , one can obtain the exact polynomial form of fij (z) by calculating fij (0), fij (1), . . . , fij (J). There is no practical need to find out the exact form
of fij (z) if ni + nj < J since one can simply calculate fij (z) for each z. Following
Yang, Mandal, and Majumdar (2016), an exchange algorithm (see the supplementary materials, Section S.5) based on Theorem 9 could be used to search for
a D-optimal exact allocation.
Example 4 Odor removal study (continued) To conduct a follow-up experiment with n experimental units using the exchange algorithm, we obtain
the D-optimal exact designs across different nโs (Table 2). As expected, the
D-optimal exact allocation (n1 , . . . , n4 )T is consistent with the D-optimal approximate allocation po = (p1 , . . . , p4 )T (last row of Table 2) for large n. The
time costs in seconds (last column of Table 2) are recorded on a PC with 2GHz
CPU and 8GB memory. If we rerun an experiment with n = 40, the D-optimal
exact design is no = (18, 11, 0, 11)T , and the efficiency of the uniform design
nu = (10, 10, 10, 10)T is (f (nu )/f (no ))1/4 = 79.7%.
Example 6. Polysilicon deposition study Wu (2008) considered an experiment for studying the polysilicon deposition process with six 3-level factors,
described in details by Phadke (1989). Due to the inconvenience of counting
the number of surface defects, a major evaluating characteristic, they treated
it as a 5-category ordinal variable: 1 for 0 โผ 3 defects, 2 for 4 โผ 30, 3 for
12
D-OPTIMAL DESIGNS WITH ORDERED CATEGORICAL DATA
13
Table 2: D-optimal Exact Designs and the Approximate Design for the Odor Removal
Study
n
3
10
40
100
1000
po
n1
1
4
18
44
445
0.4449
n2
1
3
11
29
287
0.2871
n3
0
0
0
0
0
0
nโ4 |F|
0.0002911
0.0003133
0.0003177
0.0003180
0.0003181
0.0003181
n4
1
3
11
27
268
0.2680
# iterations
1
3
3
4
5
5
Time(sec.)
< 0.01
0.02
0.02
0.05
0.39
0.03
31 โผ 300, 4 for 301 โผ 1000, and 5 for 1001 and more. The original design, denoted by nu , includes 18 experimental settings based on an L18 orthogonal array.
To apply a cumulative link model, we represent each 3-level factor, say A, with
levels 1, 2, 3, by its linear component A1 taking values โ1, 0, 1 and a quadratic
component A2 taking values 1, โ2, 1 (Wu and Hamada (2009)). Then the fitted model with complementary log-log link chosen by both AIC and BIC criteria (see, for example, Agresti (2013)) involves four cut-points (ฮฑห1 , ฮฑห2 , ฮฑห3 , ฮฑห4 ) =
(โ1.59, โ0.58, 0.41, 1.22), and twelve other coefficients (ฮฒห11 , ฮฒห12 , ฮฒห21 , ฮฒห22 , . . . , ฮฒห62 )
= (1.45, โ0.22, 1.35, 0.02, โ0.12, โ0.34, 0.19, 0.00, 0.22, 0.08, 0.05, 0.17). When
the true parameter values were assumed to be the estimated ones, we used the
exchange algorithm to find a D-optimal 18-run design, denoted by no (see the
supplementary materials, Section S.6, for a list of the 18 experimental settings).
Compared with no , the efficiency of the original design nu is (f (nu )/f (no ))1/16 =
73.1%. In order to check the efficiency of a rounded design, we used the lift-one
algorithm to find that the D-optimal approximate design contains 100 positive
pi โs out of the 729 distinct experimental settings. In this case, both the quota
method and the efficient rounding procedure end with the same rounded design
nr (see Section S.6). Its efficiency is (f (nr )/f (no ))1/16 = 86.1%.
5. Minimally Supported Design
It is of practical significance to have experiment run with the minimal number
of different settings. For example, the 18 experimental settings in the polysilicon
deposition study (Example 6) had to be run in a sequential way and only two
settings were arranged on each day (Phadke (1989)). Less experimental settings
often indicate less time and less cost. Another practical application of a minimally
supported design is that an optimal allocation restricted to those support points
can be obtained more easily or even analytically.
According to Theorem 3, a minimally supported design contains at least d+1
support points. On the other hand, according to Theorem 5 and Corollary 1,
a minimally supported design could contain exactly d + 1 support points if the
extended design matrix X1 = (1 X) is of full rank.
13
14
JIE YANG, LIPING TONG AND ABHYUDAY MANDAL
Example 7. Let J = 2 with a binomial response. There are d + 1 parameters,
ฮธ1 , ฮฒ1 , . . . , ฮฒd . For a general link function g satisfying Assumptions 1 and 2,
2 /[ฯ (1 โ ฯ )],
gi0 = gi2 = 0, gi1 = (gโ1 )โฒ (ฮธ1 โ xTi ฮฒ) > 0, ei = ui1 = ci1 = gi1
i1
i1
i = 1, . . . , m. Then Ai3 in Theorem 1 contains only the entry ui1 , and thus
|Ai3 | = ui1 , or simply ei (Lemma 1 still holds). Assume further that the m ร d
design matrix X satisfies Assumption 3. According to Theorem 2, Lemmas S.4,
S.5, and 2, given p = (p1 , . . . , pm )T ,
X
f (p) = nโ(d+1) |F| =
|X1 [i0 , i1 , . . . , id ]|2 pi0 ei0 pi1 ei1 ยท ยท ยท pid eid
1โคi0 <i1 <ยทยทยท<id โคm
(5.1)
Here (5.1) is essentially the same as Lemma 3.1 in Yang and Mandal (2015).
Then a minimally supported design can contain d + 1 support points and a Doptimal one keeps equal weight 1/(d+1) on all support points (Yang and Mandal
(2015, Theorem 3.2)).
For univariate responses (including binomial ones) under a generalized linear
model, a minimally supported design must keep equal weights on all its support
points in order to keep D-optimality (Yang and Mandal (2015)). However, for
multinomial responses with J โฅ 3, this is usually not the case. In this section,
we use one-predictor (d = 1) and two-predictor (d = 2) cases for illustration.
In order to check if a minimally supported design is D-optimal, we need
a Karush-Kuhn-Tucker-type condition. Since f (p) is log-concave, the KarushKuhn-Tucker conditions (Karush (1939); Kuhn and Tucker (1951)) are also sufficient.
Theorem 10. An allocation p = (pโ1 , . . . , pโm )T satisfying f (p) > 0 is D-optimal
if and only if there exists a ฮป โ R such that โf (p)/โpi = ฮป if pโi > 0 or โค ฮป if
pโi = 0, i = 1, . . . , m.
5.1 Minimally supported designs with one predictor
We start with d = 1 and J โฅ 3. The corresponding parameters here are ฮฒ1
and ฮธ1 , . . . , ฮธJโ1 . Consider designs supported on two points (m = 2, minimally
supported), and invoke Theorem 2, Lemmas S.4 and S.5.
Theorem 11. If d = 1, J โฅ 3, and m = 2, the objective function is
f (p1 , p2 ) = nโ2 |F| =
Jโ1
X
cs pJโs
ps2
1
(5.2)
s=1
T
tโ1 )
where (c1 , . . . , cJโ1 )T = Bโ1
st as a (J โ
Jโ1 (d1 , . . . , dJโ1 ) , with BJโ1 = (s
J
1) ร (J โ 1) matrix and ds = f (1/(s + 1), s/(s + 1)) ยท (s + 1) /s.
14
D-OPTIMAL DESIGNS WITH ORDERED CATEGORICAL DATA
15
Q
QJ
โ1
2 ยท
2
Actually, according to Lemma 2, c1 = e2 Jโ1
g1s
s=1
t=1 ฯ1t (x1 โ x2 ) ,
QJโ1 2 QJ
โ1
cJโ1 = e1 s=1 g2s ยท t=1 ฯ2t (x1 โ x2 )2 , where x1 , x2 are the predictor levels.
Theorem 11 provides a way to find the exact form of f (p1 , p2 ) after calculating
|F| for J โ 1 different allocations. Then the D-optimal problem is to maximize
an order-J polynomial f (z, 1 โ z) for z โ [0, 1]. As a special case, the D-optimal
allocation of J = 3 can be solved explicitly as follows:
Corollary 2. If d = 1, J = 3, and m = 2, the objective function is
f (p1 , p2 ) = p1 p2 (c1 p1 + c2 p2 )
(5.3)
2 g 2 (ฯ ฯ ฯ )โ1 (x โ x )2 > 0, c = e g 2 g 2 (ฯ ฯ ฯ )โ1
where c1 = e2 g11
1
2
2
1 21 22 21 22 23
12 11 12 13
(x1 โ x2 )2 > 0, and x1 , x2 are the two levels of the predictor. The D-optimal
design p = (pโ1 , pโ2 ) is
p
c
c1 โ c2 + c21 โ c1 c2 + c22
โ
p
p1
, pโ2 =
(5.4)
p1 =
2
2
2c1 โ c2 + c1 โ c1 c2 + c2
2c1 โ c2 + c21 โ c1 c2 + c22
Furthermore, pโ1 = pโ2 = 1/2 if and only if c1 = c2 .
Under the setup of Corollary 2, pโ1 = pโ2 = 1/2 if ฮฒ1 = 0. In general pโ1 6= pโ2 ,
and pโ1 > pโ2 if and only if c1 > c2 . The following result provides conditions for
D-optimality of such a minimally supported design. Its proof is relegated to the
supplementary materials (Section S.3).
Corollary 3. Suppose d = 1, J = 3, m โฅ 3, and let x1 , . . . , xm be the m distinct
levels of the predictor. A minimally supported design p = (pโ1 , pโ2 , 0, . . . , 0)T is
D-optimal if and only if
(1) pโ1 , pโ2 are defined as in (5.4),
(2) si3 (pโ1 )2 + (si5 โ 2c1 )pโ1 pโ2 + (si4 โ c2 )(pโ2 )2 โค 0, i = 3, . . . , m,
2 g 2 (ฯ ฯ ฯ )โ1 (x โ x )2 > 0,
where c1 , c2 are as in Corollary 2, si3 = ei g11
1
i
12 11 12 13
โ1
2
2
2
si4 = ei g21 g22 (ฯ21 ฯ22 ฯ23 ) (x2 โxi ) > 0, si5 = e1 (u22 ui1 + u21 ui2 โ2b22 bi2 )(x1 โ
x2 )(x1 โ xi ) + e2 (u12 ui1 + u11 ui2 โ 2b12 bi2 )(x2 โ x1 )(x2 โ xi ) + ei (u12 u21 + u11 u22 โ
2b12 b22 )(xi โ x1 )(xi โ x2 ).
Example 8. Consider d = 1, J = 3, and m = 3 with factor levels {โ1, 0, 1}.
Under the logit link g, the parameters ฮฒ, ฮธ1 , ฮธ2 satisfy g(ฮณ1j ) = ฮธj +ฮฒ, g(ฮณ2j ) = ฮธj ,
g(ฮณ3j ) = ฮธj โ ฮฒ, j = 1, 2. We investigate when a D-optimal design is minimally
supported. According to Theorem 11, a D-optimal deign satisfies p1 = p3 =
1/2 if ฮฒ = 0. Figure 2 shows cases with more general parameter values. In
Figure 2(a), four regions in (ฮธ1 , ฮธ2 )-plane are occupied by minimally supported
15
16
JIE YANG, LIPING TONG AND ABHYUDAY MANDAL
(a) ฮฒ=โ2
(b) ฮธ2=5
4
4
p2=0
p3=0
p1>0, p2>0, p3>0
p1=0
2
2
p3=0
0
ฮธ1
0
ฮธ2
p2=0
โ2
โ2
p2=0
p1=0
p1>0, p2>0, p3>0
โ4
โ4
p1>0, p2>0, p3>0
โ4
โ2
0
2
4
โ4
โ2
0
2
4
ฮฒ
ฮธ1
Figure 2: Regions for a two-point design to be D-optimal with d = 1, J = 3, x โ
{โ1, 0, 1}, and logit link (note that ฮธ1 < ฮธ2 is required)
designs (ฮธ1 < ฮธ2 is required). For example, regions labeled with p2 = 0 indicates
a minimally supported design satisfying p2 = 0 is D-optimal given such a triple
(ฮธ1 , ฮธ2 , ฮฒ = โ2). From Figure 2(b), a design supported on {โ1, 1} (that is,
p2 = 0) is D-optimal if ฮฒ is not far from 0.
Example 9. Toxicity study Agresti (2013, Table 8.7) reported data from a
developmental toxicity study with one factor (concentration of diEGdiME at five
levels: 0, 62.5, 125, 250, 500 mg/kg per day) and a 3-category ordinal response
(status of mouse fetus: nonlive, malformation, or normal). In this case, d = 1,
J = 3, and m = 5. We fit a cumulative link model with cauchit link chosen by
both AIC and BIC criteria. The estimated parameter values are (ฮฒห1 , ฮธห1 , ฮธห2 )T =
(โ0.0176, โ8.80, โ5.34). If (ฮฒห1 , ฮธห1 , ฮธห2 )T is regarded as the true parameter value,
then the D-optimal approximate allocation found by the lift-one algorithm is
po = (0, 0, 0, 0.4285, 0.5715)T , which is minimally supported. Alternatively, for
each pair of indices (i, j), 1 โค i < j โค 5, we obtain the best design (pโi , pโj )
supported only on xi , xj according to Corollary 2, then check whether (pโi , pโj )
is D-optimal using Corollary 3. Here po is the only minimally supported design
that is also D-optimal. With respect to po , the efficiency of the original design
(roughly a uniform one) is 52.6%.
5.2 Minimally supported designs with two predictors
In this section, we consider experiments with two predictors (d = 2) and a
three-category response (J = 3). The parameters are ฮฒ1 , ฮฒ2 , ฮธ1 , ฮธ2 . For cases
with J โฅ 4, similar conclusions could be obtained, but with messier notation.
16
D-OPTIMAL DESIGNS WITH ORDERED CATEGORICAL DATA
17
According to Theorem 3, a minimally supported design needs three support
points, for example, (xi1 , xi2 ), i = 1, 2, 3. Under Assumption 3, the 3 ร 3 matrix
X1 = (1 X) is of full rank. Following Theorem 2, Lemmas S.4, S.5, and 2, the
objective function with (d, J, m) = (2, 3, 3) is
f (p1 , p2 , p3 ) = |X1 |2 e1 e2 e3 ยท p1 p2 p3 (w1 p1 + w2 p2 + w3 p3 )
(5.5)
2 2
โ1 > 0. Since f (p , p , p ) = 0 if p p p = 0, we
where wi = eโ1
1
2
3
1 2 3
i gi1 gi2 (ฯi1 ฯi2 ฯi3 )
need only consider p = (p1 , p2 , p3 )T satisfying 0 < p1 , p2 , p3 < 1.
According to Theorem 10, p maximizes f (p1 , p2 , p3 ) only if
โf
โf
โf
=
=
โp1
โp2
โp3
(5.6)
Following Tong, Volkmer, and Yang (2014), we obtain its analytic solution:
Theorem 12. Without loss of generality, w1 โฅ w2 โฅ w3 > 0 . The allocation
p = (pโ1 , pโ2 , pโ3 )T maximizing f (p1 , p2 , p3 ) in (5.5) exists and is unique. It satisfies
0 < pโ3 โค pโ2 โค pโ1 < 1 and can be obtained analytically as follows.
(i) If w1 โฅ w2 = w3 , then pโ1 =pโ1 /(4w1 + โ1 ), pโ2 = pโ3 = 2w1 /(4w1 + โ1 ),
where โ1 = 2w1 โ 3w2 + 4w12 โ 4w1 w2 + 9w22 . A special case is pโ1
= pโ2 = pโ3 = 1/3 if w1 = w2 = w3 .
(ii) If w1 = w2 > w3 , then pโ1 p
= pโ2 = โ2 /[2(โ2 + 2w1 )], pโ3 = 2w1 /(โ2 + 2w1 ),
where โ2 = 3w1 โ 2w3 + 9w12 โ 4w1 w3 + 4w32 .
(iii) If w1 > w2 > w3 , then pโ1 = y1 /(y1 + y2 + 1), pโ2 = y2 /(y1 + y2 + 1),
pโ3 = 1/(y1 + y2 + 1), where
y1 = โ
b2 21/3 (3b1 โ b22 )
A1/3
+
,
โ
3
3A1/3
3 ร 21/3
y2 =
(w1 โ w3 )y1
(w2 โ w3 ) + (w1 โ w2 )y1
with A = โ27b0 + 9b1 b2 โ 2b32 + 33/2 (27b20 + 4b31 โ 18b0 b1 b2 โ b21 b22 + 4b0 b32 )1/2 ,
bi = ci /c3 , i = 0, 1, 2, and c0 = w3 (w2 โ w3 ) > 0, c1 = 3w1 w2 โ w1 w3 โ
4w2 w3 +2w32 > 0, c2 = 2w12 โ4w1 w2 โw1 w3 +3w2 w3 , c3 = w1 (w2 โw1 ) < 0.
The proof of Theorem 12 is relegated to the supplementary materials (Section S.3).
Corollary 4. Suppose d = 2, J = 3, and m = 3. Then p = (1/3, 1/3, 1/3)T is
D-optimal if and only if w1 = w2 = w3 , where w1 , w2 , w3 are defined as in (5.5).
Example 10. Consider a 22 factorial design problem with a three-category
response and four design points (1, 1), (1, โ1), (โ1, 1), (โ1, โ1), denoted by
17
18
JIE YANG, LIPING TONG AND ABHYUDAY MANDAL
2 2
โ1
(xi1 , xi2 ), i = 1, 2, 3, 4. Take wi = eโ1
i gi1 gi2 (ฯi1 ฯi2 ฯi3 ) , i = 1, 2, 3, 4. There
are five special cases: (i) if ฮฒ1 = ฮฒ2 = 0, then w1 = w2 = w3 = w4 ; (ii) if
ฮฒ1 = 0, ฮฒ2 6= 0, then w1 = w3 , w2 = w4 , but w1 6= w2 ; (iii) if ฮฒ1 6= 0, ฮฒ2 = 0,
then w1 = w2 , w3 = w4 , but w1 6= w3 ; (iv) if ฮฒ1 = ฮฒ2 6= 0, then w2 = w3 , but
w1 , w2 , w4 are distinct; (v) if ฮฒ1 = โฮฒ2 6= 0, then w1 = w4 , but w1 , w2 , w3 are
distinct.
Theorem 12 provides analytic forms of minimally supported designs with
d = 2 and J = 3.
Corollary 5. Suppose d = 2, J = 3, and m โฅ 4. Let (xi1 , xi2 ), i = 1, . . . , m be
m distinct level combinations of the two predictors. With X1 = (1 X) an m ร 3
matrix, a minimally supported design p = (pโ1 , pโ2 , pโ3 , 0, . . . , 0)T is D-optimal if
and only if pโ1 , pโ2 , pโ3 are obtained according to Theorem 12, and
|X1 [1, 2, i]|2 e1 e2 ei pโ1 pโ2 (w1 pโ1 + w2 pโ2 ) + |X1 [1, 3, i]|2 e1 e3 ei pโ1 pโ3 (w1 pโ1 + w3 pโ3 )
+ |X1 [2, 3, i]|2 e2 e3 ei pโ2 pโ3 (w2 pโ2 + w3 pโ3 ) + Di pโ1 pโ2 pโ3
โค |X1 [1, 2, 3]|2 e1 e2 e3 pโ2 pโ3 (2w1 pโ1 + w2 pโ2 + w3 pโ3 ),
for i = 4, . . . , m,
2 2
โ1
where ej = uj1 + uj2 โ 2bj2 , wj = eโ1
j gj1 gj2 (ฯj1 ฯj2 ฯj3 ) , j = 1, . . . , m, Di =
P
{j,k,s,t}โEi ej ek (us1 ut2 + us2 ut1 โ 2bs2 bt2 ) ยท |X1 [j, k, s]| ยท |X1 [j, k, t]| with the sum
over Ei = {(1, 2, 3, i), (1, 3, 2, i), (1, i, 2, 3), (2, 3, 1, i), (2, i, 1, 3), (3, i, 1, 2)}.
Example 11. Consider experiments with d = 2, J = 3, m = 4, and design
points (1, 1), (1, โ1), (โ1, 1), (โ1, โ1). Figure 3 provides the boundary lines
of regions of parameters (ฮฒ1 , ฮฒ2 , ฮธ1 , ฮธ2 ) for which the best three-point design is
D-optimal. In particular, Figure 3(a) shows the region of (ฮฒ1 , ฮฒ2 ) for given ฮธ1 , ฮธ2 .
It clearly indicates that the best three-point design tends to be D-optimal when
the absolute values of ฮฒ1 , ฮฒ2 are large. The region tends to be larger as the
absolute values of ฮธ1 , ฮธ2 increase. On the other hand, Figure 3(b) displays the
region of (ฮธ1 , ฮธ2 ) for given ฮฒ1 , ฮฒ2 . The symmetry of the boundary lines about
ฮธ1 + ฮธ2 = 0 is due to the logit link which is symmetric about 0. An interesting
conclusion based on Corollary 5 is that in this case a three-point design can never
be D-optimal if ฮฒ1 = 0 or ฮฒ2 = 0.
Remark 1. Extra degrees of freedom play an important role against the uniformity of D-optimal allocation in a minimally supported design. For multinomialtype responses with J categories, the total degrees of freedom from m distinct experimental settings is m(J โ 1), while a cumulative link model contains d + J โ 1 parameters. For a minimally supported design, m = d + 1
and m(J โ 1) = d + J โ 1 if and only if J = 2 (see Example 7). Then the objective function f (p) โ pi0 pi1 ยท ยท ยท pid and the D-optimal allocation is pi0 = pi1 =
18
D-OPTIMAL DESIGNS WITH ORDERED CATEGORICAL DATA
(b)
3
10
(a)
ฮธ1=1, ฮธ2=2
ฮธ1=3, ฮธ2=5
ฮธ1=.2, ฮธ2=.5
ฮฒ1=1, ฮฒ2=1
ฮฒ1=1, ฮฒ2=3
ฮฒ1=1, ฮฒ2=.2
0
ฮธ2
0
โ3
โ10
โ2
โ5
โ1
ฮฒ2
1
5
2
19
โ3
โ2
โ1
0
1
2
3
โ10
ฮฒ1
โ5
0
5
10
ฮธ1
Figure 3: Boundary lines for a three-point design to be D-optimal with logit link: Region
of (ฮฒ1 , ฮฒ2 ) for given (ฮธ1 , ฮธ2 ) is outside the boundary lines in Panel (a); Region of (ฮธ1 , ฮธ2 )
(with ฮธ1 < ฮธ2 ) for given (ฮฒ1 , ฮฒ2 ) is between the boundary lines and ฮธ1 = ฮธ2 in Panel (b)
ยท ยท ยท = pid = 1/(d + 1). However, if J โฅ 3, the degrees of freedom is strictly
larger than the number of parameters and there are โextraโ degrees of freedom.
In this case, distinct experimental settings may play different roles in estimating
the parameters values. For example, if d = 1, J = 3, m = 2, the objective function f (p) = p1 p2 (c1 p1 + c2 p2 ) according to Corollary 2; if d = 2, J = 3, m = 3,
f (p) โ p1 p2 p3 (w1 p1 +w2 p2 +w3 p3 ) according to equation (5.5). The D-optimality
of a uniform allocation then depends on c1 = c2 or w1 = w2 = w3 , which is not
true in general.
6. EW D-optimal Design
The previous sections mainly focus on locally D-optimal designs which require assumed parameter values, (ฮฒ1 , . . . , ฮฒd , ฮธ1 , . . . , ฮธJโ1 ). For many applications, the experimenter may have little information about the values of parameters. Then Bayes D-optimality (Chaloner and Verdinelli (1995)) which maximizes E(log |F|) given a prior distribution on parameters provides a reasonable solution. An alternative is EW D-optimality (Yang, Mandal, and Majumdar
(2016); Atkinson et al. (2007)) which essentially maximizes log |E(F)|. According to Yang, Mandal, and Majumdar (2016)โs simulation study across different
models and choices of priors, EW D-optimal designs are much easier to calculate
and still highly efficient compared with Bayes designs.
Based on Theorem 1, an EW D-optimal design that maximizes |E(F)| can
be viewed as a locally D-optimal design with ei , cit , uit and bit replaced by their
expectations. After the replacement, Lemma S.2 still holds. Therefore, almost all
results in the previous sections can be applied directly to EW D-optimal designs.
19
20
JIE YANG, LIPING TONG AND ABHYUDAY MANDAL
The only exception is Lemma 1 which provides the formula for |Ai3 | in terms of
gij and ฯij . In order to find EW D-optimal designs, |Ai3 | needs to be calculated
in terms of uit and bit . For example, |Ai3 | = ui1 if J = 2, |Ai3 | = ui1 ui2 โ b2i2 if
J = 3, and |Ai3 | = ui1 ui2 ui3 โ ui1 b2i3 โ ui3 b2i2 if J = 4. Then the formulas of |Ai3 |
in Lemma 2, c1 , c2 in Corollary 2, si3 , si4 , si5 in Corollary 3, wi in (5.5), and wj
in Corollary 5 need to be written in terms of uit and bit .
According to Lemma S.2, we only need to calculate E(uit ), i = 1, . . . , m; t =
1, . . . , J โ 1 and E(bit ), i = 1, . . . , m; t = 2, . . . , J โ 1 (if J โฅ 3). Then E(cit ) =
P
E(uit ) โ E(bit ) โ E(bi,t+1 ) and E(ei ) = Jโ1
t=1 E(cit ). After that, we can use the
lift-one algorithm in Section 3 or the exchange algorithm in Section 4 to find EW
D-optimal designs.
Example 4 : Odor Removal Study (continued) Instead of assuming
the parameter values (ฮฒ1 , ฮฒ2 , ฮธ1 , ฮธ2 ) = (โ2.44, 1.09, โ2.67, โ0.21), consider true
values of parameters that satisfy ฮฒ1 โ [โ3, โ1], ฮฒ2 โ [0, 2], ฮธ1 โ [โ4, โ2],
and ฮธ2 โ [โ1, 1]. We assume that the four parameters are independently and
uniformly distributed within their intervals. We use R function constrOptim
to maximize ฯ(p) = E(log |F|) and find the Bayes D-optimal allocation pb =
(0.3879, 0.3264, 0.0000, 0.2857)T . The procedure costs 313 seconds computational
time. In order to get the EW D-optimal design, we only need 5.43 seconds in
total to calculate E(uit ), E(bit ), and find pe = (0.3935, 0.3259, 0, 0.2806)T using
the lift-one algorithm. Even in terms of Bayes Optimality (Chaloner and Larntz
(1989); Song and Wong (1998); Abebe et al. (2014)), the relative efficiency of pe
with respect to pb is exp{(ฯ(pe ) โ ฯ(pb ))/4} ร 100% = 99.99%, while the relative
efficiency of the uniform allocation pu = (0.25, 0.25, 0.25, 0.25)T is 87.67%.
In order to check robustness towards misspecified parameter values, we let
ฮธ = (ฮฒ1 , ฮฒ2 , ฮธ1 , ฮธ2 )T run through all 0.1-grid points in [โ3, โ1]ร[0, 2]ร[โ4, โ2]ร
[โ1, 1]. For each ฮธ, we use the lift-one algorithm to find the D-optimal allocation
pฮธ and the corresponding determinant f (pฮธ ) = |F(pฮธ )|, and then calculate the
efficiency (f (p)/f (pฮธ ))1/4 for p = pb , pe , and pu , respectively. Table 3 shows the
summary statistics of the efficiencies. It implies that pb and pe are comparable
and both of them are much better than pu in terms of robustness.
Table 3: Summary of Efficiency in Odor Removal Study
Design
Bayes pb
EW pe
Uniform pu
Min.
0.8464
0.8465
0.7423
1st Quartile
0.9813
0.9802
0.8105
Median
0.9915
0.9917
0.8622
7. Discussion
20
Mean
0.9839
0.9838
0.8674
3rd Quartile
0.9964
0.9967
0.9249
Max.
1.0000
1.0000
0.9950
D-OPTIMAL DESIGNS WITH ORDERED CATEGORICAL DATA
21
In this paper, we use real experiments to illustrate how much improvements
the experimenter could make. Compared with our D-optimal designs, the efficiencies of the original designs are often far from satisfactory: 79.7% in Example 4,
73.1% in Example 6, and 52.6% in Example 9. More interestingly, our D-optimal
designs recommended for Example 4 and Example 9 are both minimally supported. We have two surprising findings that are different from the cases under
univariate generalized linear models (Yang and Mandal, 2015): (1) the minimum
number of experimental settings can be strictly less than the number of parameters, and (2) the allocation of experimental units on the support points of a
minimally supported design is usually not uniform.
Cumulative link models are widely used for modeling ordinal data. Nevertheless, there are other models used for multinomial-type responses, including baseline-category logit model for nominal response, adjacent-categories logit
model for ordinal data, and continuation-ratio logit model for hierarchical response (see Liu and Agresti (2005), Agresti (2013) for a review). The methods
developed in this paper could be extended for those models as well. For further
extensions, our approaches could be used for planning experiments with more
than one categorical response. For example, both the paper feeder experiment
and the PCB experiment analyzed by Joseph and Wu (2004) involved multiple
binomial responses.
Supplementary Materials
The proofs of Theorems 1, 2, 4, 5, and 12, Lemma 2, and Corollaries 3
and 5 are available in the Supplementary Materials. There are also tabularized
formulas for commonly used link functions, additional lemmas for Section 2 and
Section 5.2, maximization of fi (z) in Section 3, exchange algorithm for D-optimal
exact allocation in Section 4, and more results for Example 6.
Acknowledgements
We thank Dr. Suraj Sharma for providing the details of the odor removal
study, and Dr. John Stufken for valuable suggestions on an early version of this
paper. We also thank an associate editor and the reviewers for comments and
suggestions that substantially improved the quality of the manuscript. This
research is in part supported by the LAS Award for Faculty of Science at UIC.
References
Abebe, H. T., Tan, F. E., Van Breukelen, G. J., Serroyen, J., and Berger, M. P. (2014). On the
choice of a prior for Bayesian D-optimal designs for the logistic regression model with a
single predictor. Communications in Statistics - Simulation and Computation, 43, 18111824.
21
22
JIE YANG, LIPING TONG AND ABHYUDAY MANDAL
Agresti, A. (2013). Categorical Data Analysis, Third Edition. Wiley, New Jersey.
Atkinson, A. C., Donev, A. N. and Tobias, R. D. (2007). Optimum Experimental Designs, with
SAS. Oxford University Press, New York.
Chaloner, K. and Larntz, K. (1989). Optimal Bayesian design applied to logistic regression
experiments. Journal of Statistical Planning and Inference, 21, 191-208.
Chaloner, K. and Verdinelli, I. (1995). Bayesian experimental design: a review. Statistical Science, 10, 273-304.
Chernoff, H. (1953). Locally optimal designs for estimating parameters. Annals of Mathematical
Statistics, 24, 586-602.
Christensen,
link
R.
H.
models
โ
B.
(2015).
estimation
Analysis
with
of
the
ordinal
R-package
data
with
ordinal.
cumulative
Available
via
http://cran.r-project.org/web/packages/ordinal/vignettes/clm_intro.pdf
Dobson, A. J. and Barnett, A. (2008). An Introduction to Generalized Linear Models, Third
Edition. Chapman & Hall/CRC, London.
Fedorov, V. V. (1972). Theory of Optimal Experiments. Academic Press, New York.
Fedorov, V. V. and Leonov, S. L. (2014). Optimal Design for Nonlinear Response Models.
Chapman & Hall/CRC, New York.
Ford, I., Titterington, D. M., and Kitsos, C. P. (1989). Recent advances in nonlinear experimental design. Technometrics, 31, 49-60.
Ford, I., Torsney, B., and Wu, C. F. J. (1992). The use of a canonical form in the construction
of locally optimal designs for non-linear problems. Journal of the Royal Statistical Society,
Series B, 54, 569-583.
Imhof, L. A. (2001). Maximin designs for exponential growth models and heteroscedastic polynomial models. Annals of Statistics, 29, 561-576.
Imhof, L., Lopez-Fidalgo, J., and Wong, W.K. (2001). Efficiencies of rounded optimal approximate designs for small samples. Statistica Neerlandica, 55, 301-318.
Joseph, V. R. and Wu, C. F. J. (2004). Failure amplification method: an information maximization approach to categorical response optimization (with discussions). Technometrics,
46, 1-31.
Karush, W. (1939). Minima of functions of several variables with inequalities as side constraints,
M.Sc. Dissertation, Department of Mathematics, University of Chicago.
Kiefer, J. (1971). The role of symmetry and approximation in exact design optimality. In Statistical Decision Theory and Related Topics, S.S. Gupta and J. Yackel (eds), 109-118,
Academic Press, New York.
Kiefer, J. (1974). General equivalence theory for optimum designs (approximate theory). Annals
of Statistics, 2, 849-879.
Khuri, A. I., Mukherjee, B., Sinha, B. K. and Ghosh, M. (2006). Design issues for generalized
linear models: A review. Statistical Science, 21, 376-399.
22
D-OPTIMAL DESIGNS WITH ORDERED CATEGORICAL DATA
23
Krause, M. S., Madden, L. V. and Hoitink, H. A. J. (2001). Effect of potting mix microbial carrying capacity on biological control of Rhizoctonia damping-off of radish and Rhizoctonia
crown and root rot of Poinsettia. Phytopathology, 91, 1116-1123.
Kuhn, H. W. and Tucker, A. W. (1951). Nonlinear programming. Proceedings of 2nd Berkeley
Symposium, Berkeley: University of California Press, 481-492.
Liu, I. and Agresti, A. (2005). The analysis of ordered categorical data: An overview and a
survey of recent developments. Test, 14, 1-73.
McCullagh, P. (1980). Regression models for ordinal data. Journal of the Royal Statistical Society, Series B, 42, 109-142.
McCullagh, P. and Nelder, J. (1989). Generalized Linear Models, Second Edition. Chapman and
Hall/CRC, Boca Raton.
Omer, M. A., Johnson, D. A. and Rowe, R. C. (2000). Recovery of Verticillium dahliae from
North American certified seed potatoes and characterization of strains by vegetative compatibility and aggressiveness. American Journal of Potato Research, 77, 325-331.
Osterstock, J. B., MacDonald, J. C., Boggess, M. M. and Brown, M. S. (2010). Analysis of
ordinal outcomes from carcass data in beef cattle research. Journal of Animal Science, 88,
3384-3389.
Perevozskaya, I., Rosenberger, W. F. and Haines, L. M. (2003). Optimal design for the proportional odds model. The Canadian Journal of Statistics, 31, 225-235.
Phadke, M. S. (1989). Quality Engineering using Robust Design. Prentice-Hall, Englewood Cliffs.
Pronzato, L. and Walter, E. (1988). Robust experiment design via maximin optimization. Mathematical Biosciences, 89, 161-176.
Pukelsheim, F. (1993). Optimal Design of Experiments. John Wiley & Sons, New York.
Pukelsheim, F. and Rieder, S. (1992). Efficient rounding of approximate designs. Biometrika,
79, 763-770.
Randall, J. (1989). The analysis of sensory data by generalised linear model. Biometrical Journal, 31, 781-793.
Silvey, S. D. (1980). Optimal Design. Chapman and Hall, London.
Song, D. and Wong, W. K. (1998). Optimal two-point designs for the Michaelis-Menten model
with heteroscedastic errors. Communications in Statistics - Theory and Methods, 27, 15031516.
Stufken, J. and Yang, M. (2012). Optimal designs for generalized linear models. In: Design
and Analysis of Experiments, Volume 3: Special Designs and Applications, K. Hinkelmann
(ed.). Wiley, New York.
Tong, L., Volkmer, H. W., and Yang, J. (2014). Analytic solutions for D-optimal factorial
designs under generalized linear models. Electronic Journal of Statistics, 8, 1322-1344.
Woods, D. C., Lewis, S. M., Eccleston, J. A. and Russell, K. G. (2006). Designs for generalized
linear models with several variables and model uncertainty. Technometrics, 48, 284-292.
23
24
JIE YANG, LIPING TONG AND ABHYUDAY MANDAL
Wu, F-C. (2008). Simultaneous optimization of robust design with quantitative and ordinal
data. International Journal of Industrial Engineering: Theory, Applications and Practice,
15, 231-238.
Wu, C. F. J. and Hamada, M. (2009). Experiments: Planning, Analysis, and Optimization,
Second Edition. Wiley, New York.
Yang, J. and Mandal, A. (2015). D-optimal factorial designs under generalized linear models.
Communications in Statistics - Simulation and Computation, 44, 2264-2277.
Yang, J., Mandal, A., and Majumdar, D. (2016). Optimal designs for 2k factorial experiments
with binary response. Statistica Sinica, 26, 385-411.
Zocchi S. S. and Atkinson, A. C. (1999). Optimum experimental designs for multinomial logistic
models. Biometrics, 55, 437-444.
University of Illinois at Chicago
E-mail: [email protected]
Phone: (312) 413-3748
Fax: (312) 996-1491
Advocate Health Care
E-mail: [email protected]
University of Georgia
E-mail: [email protected]
24
SUPPLEMENTARY MATERIALS
S1
D-OPTIMAL DESIGNS WITH
ORDERED CATEGORICAL DATA
Jie Yang1 , Liping Tong2 and Abhyuday Mandal3
1 University
of Illinois at Chicago, 2 Advocate Health Care and 3 University of Georgia
Supplementary Materials
S.1
Commonly Used Link Functions for Cumulative Link Models
Link function
logit
probit
log-log
c-log-log
cauchit
g(ฮณ)
ฮณ
log 1โฮณ
ฮฆโ1 (ฮณ)
โ log[โ log(ฮณ)]
log[โ log(1 โ ฮณ)]
tan[ฯ(ฮณ โ 21 )]
g โ1 (ฮท)
(g โ1 )โฒ (ฮท)
eฮท
1+eฮท
eฮท
(1+eฮท )2
ฮฆ(ฮท)
exp{โeโฮท }
1 โ exp{โeฮท }
1
arctan(ฮท) + 21
ฯ
ฯ(ฮท)
exp{โฮท โ eโฮท }
exp{ฮท โ eฮท }
1
ฯ(1+ฮท2 )
where ฮฆโ1 (ยท) is the cumulative distribution function of N(0, 1), ฯ(ยท) is the
probability density function of N(0, 1), and โc-log-logโ stands for complementary log-log.
Example 1 (continued) For logit link g, g โ1 (ฮท) = eฮท /(1+eฮท ) and (g โ1 )โฒ =
g โ1(1 โ g โ1 ). Thus gij = (g โ1)โฒ (ฮธj โ xTi ฮฒ) = ฮณij (1 โ ฮณij ). With J = 3, we
have ฯi1 + ฯi2 + ฯi3 = 1 for i = 1, . . . , m. Then for i = 1, . . . , m, gi1 =
โ1
ฯi1 (ฯi2 + ฯi3 ), gi2 = (ฯi1 + ฯi2 )ฯi3 , bi2 = ฯi1 ฯi3 ฯi2
(ฯi1 + ฯi2 )(ฯi2 + ฯi3 ), ui1 =
โ1
โ1
2
ฯi1 ฯi2 (ฯi1 +ฯi2 )(ฯi2 +ฯi3 ) , ui2 = ฯi3 ฯi2 (ฯi1 +ฯi2 )2 (ฯi2 +ฯi3 ), ci1 = ฯi1 (ฯi1 +
ฯi2 )(ฯi2 +ฯi3 ), ci2 = ฯi3 (ฯi1 +ฯi2 )(ฯi2 +ฯi3 ), ei = (ฯi1 +ฯi2 )(ฯi1 +ฯi3 )(ฯi2 +ฯi3 ).
S.2
Additional Lemmas
For Section 2: Since (Yi1 , . . . , YiJ ), i = 1, . . . , m are m independent random vectors, the log-likelihood function (up to a constant) of the cumulative
link model is
l(ฮฒ1 , . . . , ฮฒd , ฮธ1 , . . . , ฮธJโ1 ) =
m X
J
X
i=1 j=1
S1
Yij log(ฯij )
S2
JIE YANG, LIPING TONG AND ABHYUDAY MANDAL
where ฯij = ฮณij โ ฮณi,jโ1 with ฮณij = g โ1 (ฮธj โ xTi ฮฒ) for j = 1, . . . , J โ 1 and
ฮณi0 = 0, ฮณiJ = 1, i = 1, . . . , m. For s = 1, . . . , d, t = 1, . . . , J โ 1,
m
X
โl
Yi1
=
(โxis ) ยท
ยท (g โ1)โฒ (ฮธ1 โ xTi ฮฒ)
โฮฒs
ฯ
i1
i=1
Yi2 โ1 โฒ
ยท (g ) (ฮธ2 โ xTi ฮฒ) โ (g โ1 )โฒ (ฮธ1 โ xTi ฮฒ)
+
ฯi2
YiJ
โ1 โฒ
T
+ยทยทยท +
โ(g ) (ฮธJโ1 โ xi ฮฒ)
ฯiJ
m
X
โl
Yit Yi,t+1
โ1 โฒ
T
=
(g ) (ฮธt โ xi ฮฒ)
โ
โฮธt
ฯ
ฯi,t+1
it
i=1
Since Yij โs come from multinomial distributions, we know E(Yij ) =
ni ฯij , E(Yij2 ) = ni (ni โ 1)ฯij2 + ni ฯij , and E(Yis Yit ) = ni (ni โ 1)ฯis ฯit when
s 6= t. Then we have the following lemma:
Lemma S.1. Let F = (Fst ) be the (d+J โ1)ร(d+J โ1) Fisher information
matrix.
(i) For 1 โค s โค d, 1 โค t โค d,
X
m
J
X
(gij โ gi,jโ1)2
โl โl
Fst = E
=
ni xis xit
โฮฒs โฮฒt
ฯij
i=1
j=1
where gij = (g โ1 )โฒ (ฮธj โxTi ฮฒ) > 0 for j = 1, . . . , J โ1 and gi0 = giJ = 0.
(ii) For 1 โค s โค d, 1 โค t โค J โ 1,
X
m
git โ gi,tโ1 gi,t+1 โ git
โl โl
=
ni (โxis )git
โ
Fs,d+t = E
โฮฒs โฮธt
ฯ
ฯi,t+1
it
i=1
(iii) For 1 โค s โค J โ 1, 1 โค t โค d,
X
m
gis โ gi,sโ1 gi,s+1 โ gis
โl โl
=
ni (โxit )gis
โ
Fd+s,t = E
โฮธs โฮฒt
ฯis
ฯi,s+1
i=1
(iv) For 1 โค s โค J โ 1, 1 โค t โค J โ 1,
๏ฃฑ P
โ1
โ1
2
๏ฃฒ m
ni gis
(ฯis
+ ฯi,s+1
),
Pi=1
โl โl
m
โ1
Fd+s,d+t = E
=
n g g (โฯi,sโจt ),
๏ฃณ i=1 i is it
โฮธs โฮธt
0,
where s โจ t = max{s, t}.
S2
if s = t
if |s โ t| = 1
if |s โ t| โฅ 2
SUPPLEMENTARY MATERIALS
S3
Perevozskaya et al. (2003) obtained a detailed form of Fisher information matrix for logit link and one predictor. Our expressions here are good
for fairly general link and d predictors. To simplify the notations, we denote
for i = 1, . . . , m,
ei =
J
X
(gij โ gi,jโ1)2
j=1
cit
uit
ฯij
>0
git โ gi,tโ1 gi,t+1 โ git
= git
, t = 1, . . . , J โ 1
โ
ฯit
ฯi,t+1
โ1
= git2 (ฯitโ1 + ฯi,t+1
) > 0, t = 1, . . . , J โ 1
bit =
gi,tโ1 git ฯitโ1
> 0,
t = 2, . . . , J โ 1 (if J โฅ 3)
(S.1)
(S.2)
(S.3)
(S.4)
Note that gij is defined in Lemma S.1 (i). Then we obtain the following
lemma which plays a key role in calculating |F|.
Lemma S.2. cit = uit โ bit โ bi,t+1 , i = 1, . . . , m; t = 1, . . . , J โ 1; ei =
PJโ1
PJโ1
t=1 (uit โ 2bit ), i = 1, . . . , m, where bi1 = biJ = 0 for i =
t=1 cit =
1, . . . , m.
Lemma S.3. Rank((Ai1 Ai2 )) โค 1 where โ=โ is true if and only if xi 6= 0.
Based on Lemmas 1 and S.3, we obtain the two lemmas below on
cฮฑ1 ,...,ฮฑm which significantly simplify the structure of |F| as a polynomial
of (n1 , . . . , nm ).
Lemma S.4. If max1โคiโคm ฮฑi โฅ J, then |Aฯ | = 0 for any ฯ โ (ฮฑ1 , . . . , ฮฑm )
and thus cฮฑ1 ,...,ฮฑm = 0.
Proof of Lemma S.4: Without any loss of generality, we assume ฮฑ1 โฅ
ฮฑ2 โฅ ยท ยท ยท โฅ ฮฑm . Then max1โคiโคm ฮฑi โฅ J implies ฮฑ1 โฅ J. In this case, for
any ฯ โ (ฮฑ1 , . . . , ฮฑm ), ฯ โ1 (1) := {i | ฯ (i) = 1} โ {1, . . . , d + J โ 1} and
|ฯ โ1 (1)| = ฮฑ1 . If |ฯ โ1 (1)โฉ{1, . . . , d}| โฅ 2, then |Aฯ | = 0 due to Lemma S.3;
otherwise {d+1, . . . , d+J โ1} โ ฯ โ1 (1) and thus |Aฯ | = 0 due to Lemma 1.
Thus cฮฑ1 ,...,ฮฑm = 0 according to (2.3) provided in Theorem 2.
Lemma S.5. If #{i : ฮฑi โฅ 1} โค d, then |Aฯ | = 0 for any ฯ โ (ฮฑ1 , . . . , ฮฑm )
and thus cฮฑ1 ,...,ฮฑm = 0.
Proof of Lemma S.5: Without any loss of generality, we assume ฮฑ1 โฅ
ฮฑ2 โฅ ยท ยท ยท โฅ ฮฑm . Then #{i : ฮฑi โฅ 1} โค d indicates ฮฑd+1 = ยท ยท ยท = ฮฑm = 0.
Let ฯ : {1, 2, . . . , d + J โ 1} โ {1, . . . , m} satisfy ฯ โ (ฮฑ1 , . . . , ฮฑm ). Then
the (d + J โ 1) ร (d + J โ 1) matrix Aฯ can be written as
Aฯ 1 Aฯ 2
Aฯ 3 Aฯ 4
S3
S4
JIE YANG, LIPING TONG AND ABHYUDAY MANDAL
=
(eฯ (s) xฯ (s)s xฯ (s)t )s=1,...d;t=1,...,d
(โxฯ (s)s cฯ (s)t )s=1,...,d;t=1,...,Jโ1
(โcฯ (d+s)s xฯ (d+s)t )s=1,...,Jโ1;t=1,...,d
Aฯ 4
where the (J โ1)ร(J โ1) matrix Aฯ 4 is either a single entry uฯ (d+1)1 (if J =
2) or symmetric tri-diagonal with diagonal entries uฯ (d+1)1 , . . . , uฯ (d+Jโ1),Jโ1 ,
upper off-diagonal entries โbฯ (d+1)2 , . . . , โbฯ (d+Jโ2),Jโ1 , and lower off-diagonal
entries โbฯ (d+2)2 , . . . , โbฯ (d+Jโ1),Jโ1 . Note that Aฯ is asymmetric in general.
If #{i : ฮฑi โฅ 1} โค dโ1, then there exists an i0 such that 1 โค i0 โค d and
|ฯ โ1 (i0 ) โฉ {1, . . . , d}| โฅ 2. In this case, |Aฯ | = 0 according to Lemma S.3.
If #{i : ฮฑi โฅ 1} = d, we may assume |ฯ โ1 (i) โฉ {1, . . . , d}| = 1
for i = 1, . . . , d (otherwise |Aฯ | = 0 according to Lemma S.3). Suppose
ฮฑ1 โฅ ฮฑ2 โฅ ยท ยท ยท โฅ ฮฑk โฅ 2 > ฮฑk+1 . Then {d + 1, . . . , d + J โ 1} โ โชki=1 ฯ โ1 (i)
P
and ki=1 (ฮฑi โ 1) = J โ 1. In order to show |Aฯ | = 0, we first replace
(1)
(1)
Aฯ 1 with Aฯ 1 = (eฯ (s) xฯ (s)t )s=1,...d; t=1,...,d and replace Aฯ 2 with Aฯ 2 =
(1)
(โcฯ (s)t )s=1,...,d; t=1,...,Jโ1 . It changes Aฯ into a new matrix Aฯ . Note that
Q
(1)
|Aฯ | = ds=1 xฯ (s)s ยท |Aฯ |. According to Lemma S.2, the sum of the columns
(1)
of Aฯ 2 is (โeฯ (1) , . . . , โeฯ (d) )T , and the elementwise sum of the columns of
Aฯ 4 is (cฯ (d+1)1 , cฯ (d+2)2 , . . . , cฯ (d+Jโ1),Jโ1 )T . Secondly, for t = 1, . . . , d, we
add x1t (โeฯ (1) , . . . , โeฯ (d) , cฯ (d+1)1 , . . . , cฯ (d+Jโ1),Jโ1 )T to the tth column of
(1)
(2)
(1)
(2)
Aฯ . We denote the resulting matrix by Aฯ . Note that |Aฯ | = |Aฯ |. We
(2)
(2)
consider the sub-matrix Aฯ d which consists of the first d columns of Aฯ .
(2)
For s โ ฯ โ1 (1), the sth row of Aฯ d is simply 0. For i = 2, . . . , k, the jth row
(2)
of Aฯ d is proportional to (xi1 โ x11 , xi2 โ x12 , . . . , xid โ x1d ) if j โ ฯ โ1 (i).
P
(2)
Therefore, Rank(Aฯ d ) โค (d + J โ 1) โ ฮฑ1 โ ki=2 (ฮฑi โ 1) = d โ 1, which
(1)
(2)
leads to |Aฯ | = 0 and thus |Aฯ | = 0, |Aฯ | = 0. According to (2.3) in
Theorem 2, cฮฑ1 ,...,ฮฑm = 0.
Lemma S.6. F = F(p) is always positive semi-definite. It is positive
definite if and only if p โ S+ . Furthermore, log f (p) is concave on S.
For Section 5.2: The procedure seeking for analytic solutions here follows
Tong, Volkmer, and Yang (2014). As a direct conclusion of the KarushKuhn-Tucker conditions (see also Theorem 10), a necessary condition for
(p1 , p2 , p3 ) to maximize f (p1 , p2 , p3 ) in (5.5) is (5.6), which are equivalent
to โf /โp1 = โf /โp3 and โf /โp2 = โf /โp3 . In terms of pi , wi โs, they are
(p3 โ p1 )(p1 w1 + p2 w2 + p3 w3 ) = (w3 โ w1 )p1 p3
(p3 โ p2 )(p1 w1 + p2 w2 + p3 w3 ) = (w3 โ w2 )p2 p3
S4
(S.5)
(S.6)
SUPPLEMENTARY MATERIALS
S5
Denote y1 = p1 /p3 > 0 and y2 = p2 /p3 > 0. Since p1 + p2 + p3 = 1, it
implies p3 = 1/(y1 + y2 + 1), p1 = y1 /(y1 + y2 + 1), and p2 = y2 /(y1 + y2 + 1).
In terms of y1 , y2 , (S.5) and (S.6) are equivalent to
(1 โ y1 )(y1 w1 + y2 w2 + w3 ) = (w3 โ w1 )y1
(1 โ y2 )(y1 w1 + y2 w2 + w3 ) = (w3 โ w2 )y2
(S.7)
(S.8)
Lemma S.7. Suppose 0 < w3 < w2 < w1 . If (p1 , p2 , p3 ) maximizes
f (p1 , p2 , p3 ) in (5.5) under the constrains p1 , p2 , p3 โฅ 0 and p1 + p2 + p3 = 1,
then 0 < p3 โค p2 โค p1 < 1.
The proof of the lemma above is straightforward, because otherwise one
could exchange pi , pj to strictly improve f (p1 , p2 , p3 ) . Now we are ready to
get solutions to equations (S.7) and (S.8) case by case.
(i) w1 = w3 . In that case, (S.7) implies y1 = 1. After plugging it into
(S.8), the only positive
p solution is
y2 = (โ3w1 + 2w2 + 9w12 โ 4w1 w2 + 4w22 )/(2w2) .
(ii) w2 = w3 . In that case, (S.8) implies y2 = 1. After plugging it into
(S.7), the only positive
p solution is
y1 = (2w1 โ 3w2 + 4w12 โ 4w1 w2 + 9w22 )/(2w1 ) .
(iii) w1 = w2 but w1 6= w3 . The ratio of (S.7) and (S.8) leads to y1 = y2 .
After plugging
it into (S.7), the only positive solution is y1 = (3w1 โ
p
2
2w3 + 9w1 โ 4w1 w3 + 4w32)/(4w1 ) .
(iv) w1 , w2 , w3 are distinct. Without any loss of generality, we assume 0 <
w3 < w2 < w1 , because otherwise the previous elimination procedure
in the order of p3 , p2 , p1 could be easily changed accordingly. Based on
Lemma S.7, if (p1 , p2 , p3 ) maximizes f4 , then 0 < p3 โค p2 โค p1 < 1 and
thus y1 โฅ y2 โฅ 1. The ratio of (S.7) and (S.8) leads to (1 โ y1 )/(1 โ
y2 ) = (w3 โ w1 )/(w3 โ w2 ) ยท y1 /y2 , which implies
y2 =
(w1 โ w3 )y1
.
(w2 โ w3 ) + (w1 โ w2 )y1
(S.9)
Note that (w2 โ w3 ) + (w1 โ w2 )y1 โฅ w1 โ w3 > 0. After plugging (S.9)
into (S.7), we get
c0 + c1 y1 + c2 y12 + c3 y13 = 0
(S.10)
where c0 = w3 (w2 โ w3 ) > 0, c1 = 3w1 w2 โ w1 w3 โ 4w2 w3 + 2w32 > 0,
c2 = 2w12 โ 4w1 w2 โ w1 w3 + 3w2 w3 , c3 = w1 (w2 โ w1 ) < 0.
S5
S6
JIE YANG, LIPING TONG AND ABHYUDAY MANDAL
Lemma S.8. Suppose 0 < w3 < w2 < w1 . Then equation (S.10) has one
and only one solution y1โ โฅ 1. Furthermore, y1โ > 1.
Proof of Lemma S.8: In order to locate the roots of equation (S.10),
we let f1 (y1 ) = c0 + c1 y1 + c2 y12 + c3 y13 . Then f1 (1) = c0 + c1 + c2 + c3 =
(w1 โ w3 )2 > 0.
On the other hand, the first derivative of f1 is f1โฒ (y1 ) = a0 +a1 y1 +a2 y12 ,
where a0 = 3w1 w2 โ w1 w3 โ 4w2 w3 + 2w32 = w1 (w2 โ w3 ) + 2(w1 โ w2 )w2 +
2(w2 โ w3 )2 > 0, a1 = 2(2w12 โ 4w1 w2 โ w1 w3 + 3w2 w3 ), and a2 = 3w1 (w2 โ
w1 ) < 0. Therefore, a21 โ 4a0 a2 > a21 โฅ 0 and f1โฒ (y1 ) = a2 (y1 โ y11 )(y1 โ y12 ),
where
p
p
โa1 + a21 โ 4a0 a2
โa1 โ a21 โ 4a0 a2
y11 =
< 0, y12 =
> y11
2a2
2a2
It can be verified that y12 < 1 if and only if w1 < 2(w2 + w3 ). There are
two cases: Case (i): If y12 < 1, then f1โฒ (y1 ) < 0 for all y1 > 1. That is,
f1 (y1 ) strictly decreases after y1 = 1. Since f1 (1) > 0 and f1 (โ) = โโ,
then there is one and only one solution in (1, โ); Case (ii): If y12 โฅ 1, then
f1โฒ (y1 ) โฅ 0 for y1 โ [1, y12 ] and f1โฒ (y1 ) < 0 for y1 โ (y12 , โ). That is, f1 (y1 )
increases in [1, y12 ] and then strictly decreases in (y12 , โ). Again, due to
f1 (1) > 0 and f1 (โ) = โโ, there is one and only one solution in (1, โ).
In either case, the conclusion is justified.
S.3
Additional Proofs
Proof of Theorem 1 It is a direct conclusion of Lemmas S.1 and S.2.
Examples of Ai3 in Theorem 1 include (ui1 ),
๏ฃถ
๏ฃซ
๏ฃซ
๏ฃถ
u
โb
0
0
i1
i2
ui1 โbi2
0
๏ฃฌ โbi2
ui1 โbi2
ui2 โbi3
0 ๏ฃท
๏ฃท
๏ฃญ
ui2 โbi3 ๏ฃธ , ๏ฃฌ
, โbi2
๏ฃญ
โbi2
ui2
0 โbi3
ui3 โbi4 ๏ฃธ
0 โbi3
ui3
0
0 โbi4
ui4
for J = 2, 3, 4, or 5 respectively.
Proof of Theorem 2 To study the structure of |F| as a polynomial
(i)
function of (n1 , . . . , nm ), we denote the (k, l)th entry of Ai by akl . Given a
row map ฯ : {1, 2, . . . , d + J โ 1}
โ {1, . . . , m}, we define a (d + J โ 1) ร
(ฯ (k))
whose kth row is given by the kth row of
(d + J โ 1) matrix Aฯ = akl
S6
SUPPLEMENTARY MATERIALS
S7
A
Pฯm(k) . For a power index (ฮฑ1 , . . . , ฮฑm ) with ฮฑi โ {0, 1, . . . , d + J โ 1} and
i=1 ฮฑi = d + J โ 1, we denote
ฯ โ (ฮฑ1 , . . . , ฮฑm )
if ฮฑi = #{j : ฯ (j) = i} for each i = 1, . . . , m. In terms of the construction
of Aฯ , it says that ฮฑi rows of Aฯ are from the matrix Ai .
According to the Leibniz formula for the determinant,
|F| =
m
X
X
ni Ai =
i=1
(โ1)
sgn(ฯ)
ฯโSd+J โ1
d+Jโ1
m
Y X
k=1
(i)
ni ak,ฯ(k)
i=1
where ฯ is a permutation of {1, 2, . . . , d + J โ 1}, and sgn(ฯ) is the sign or
signature of ฯ. Therefore,
cฮฑ1 ,...,ฮฑm =
X
(โ1)
sgn(ฯ)
ฯโSd+J โ1
=
X
=
d+Jโ1
Y
ak,ฯ(k)
d+Jโ1
Y
ak,ฯ(k)
(ฯ (k))
ฯ โ(ฮฑ1 ,...,ฮฑm ) k=1
X
ฯ โ(ฮฑ1 ,...,ฮฑm ) ฯโSd+J โ1
X
X
(โ1)
sgn(ฯ)
(ฯ (k))
k=1
|Aฯ |
ฯ โ(ฮฑ1 ,...,ฮฑm )
Proof of Lemma 2 To simplify the notations, we let is = s + 1, s =
0, . . . , d. That is, ฮฑ1 = J โ 1, ฮฑ2 = ยท ยท ยท = ฮฑd+1 = 1. There are only two
types of ฯ โ (ฮฑ1 , . . . , ฮฑm ), such that, |Aฯ | may not be 0.
ฯ of type I: There exist 1 โค k โค d, 2 โค l โค d + 1, and 1 โค q โค J โ 1,
such that, ฯ (k) = 1 and ฯ (d + q) = l. Following a similar procedure as in
the proof of Lemma S.5, we obtain
|Aฯ | =
d+1
Y
d
ei ยท |A13 | ยท (โ1) |X1 [1, 2, . . . , d + 1]| ยท (โ1)
sgn(ฯ )
d
Y
xฯ (s)s ยท
s=1
i=2
clq
el
ฯ of type II: ฯ (d + 1) = ยท ยท ยท = ฯ (d + J โ 1) = 1 and {ฯ (1), . . . , ฯ (d)} =
{2, . . . , d + 1}. It can be verified that
|Aฯ | =
d+1
Y
d
ei ยท |A13 | ยท (โ1) |X1 [1, 2, . . . , d + 1]| ยท (โ1)
sgn(ฯ )
d
Y
s=1
i=2
S7
xฯ (s)s
S8
JIE YANG, LIPING TONG AND ABHYUDAY MANDAL
According to Theorem 2,
X
X
|Aฯ | +
|Aฯ |
cฮฑ1 ,...,ฮฑm =
ฯ of type I
ฯ of type II
๏ฃซ
d X
d+1
d+1
X
Y
ei ยท |A13 | ยท (โ1)d |X1 [1, 2, . . . , d + 1]| ยท ๏ฃญ
=
i=2
k=1 l=2 ฯ โSd+1 :ฯ (k)=1,ฯ (d+1)=l
(โ1)sgn(ฯ )
d
Y
s=1
=
xฯ (s)s
Jโ1
X
clq
q=1
el
X
+
=
(โ1)sgn(ฯ )
d
Y
s=1
ฯ โSd+1 :ฯ (d+1)=1
๏ฃถ
xฯ (s)s ๏ฃธ
d
Y
d+1
Y
ei ยท |A13 | ยท (โ1) |X1 [1, 2, . . . , d + 1]| ยท
d+1
Y
ei ยท |A13 | ยท (โ1)d |X1 [1, 2, . . . , d + 1]| ยท (โ1)d |X1 [1, 2, . . . , d + 1]|
d
i=2
=
X
i=2
d+1
Y
X
ฯ โSd+1
(โ1)
sgn(ฯ )
xฯ (s)s
s=1
ei ยท |A13 | ยท |X1 [1, 2, . . . , d + 1]|2
i=2
where Sd+1 is the set of permutations of {1, . . . , d + 1}. The general case
with i0 , i1 , . . . , id can be obtained similarly.
Proof of Theorem 4 Suppose Rank(X1 ) = d + 1. Then there exist
i0 , . . . , id โ {1, . . . , m}, such that, |X1 [i0 , i1 , . . . , id ]| =
6 0. According to
Lemma S.4, f (p) can be regarded as an order-(J โ 1) polynomial of pi0 .
Let pi0 = x โ (0, 1) and pi = (1โx)/(mโ1) for i 6= i0 . Based on Lemma 2,
f (p) can be written as
d
d+1
1โx
1โx
Jโ2
Jโ1
+ aJโ2 x
fi0 (x) = aJโ1 x
mโ1
mโ1
d+Jโ2
d+Jโ1
1โx
1โx
+ ยท ยท ยท + a1 x
+ a0
, where
mโ1
mโ1
d
Y
X
eiโฒs |X1 [i0 , iโฒ1 , . . . , iโฒd ]|2 > 0
aJโ1 = |Ai0 3 |
{iโฒ1 ,...,iโฒd }โ{1,...,m}\{i0 } s=1
Therefore, limxโ1โ (1 โ x)โd x1โJ fi0 (x) = (m โ 1)โd aJโ1 > 0. That is,
f (p) > 0 for pi0 = x close enough to 1 and pi = (1 โ x)/(m โ 1) for i 6= i0 .
S8
SUPPLEMENTARY MATERIALS
S9
In order to justify that the condition Rank(X1 ) = d+1 is also necessary,
we only need to show that f (p) โก 0 if Rank(X1 ) โค d. Actually, for any
(1)
ฯ : {1, . . . , d + J โ 1} โ {1, . . . , m}, we construct Aฯ as in the proof
Qd
(1)
of Lemma S.5. Then |Aฯ | = s=1 xฯ (s)s ยท |Aฯ |. Similar as in the proof
of Lemma S.5, for t = 1, . . . , d, we add xฯ (1)t (โeฯ (1) , . . . , โeฯ (d) , cฯ (d+1)1 ,
(1)
. . . , cฯ (d+Jโ1),Jโ1 )T to the tth column of Aฯ . We denote the resulting
(3)
(1)
(3)
matrix by Aฯ . Note that |Aฯ | = |Aฯ |. We consider the sub-matrix
(3)
(3)
Aฯ d which consists of the first d columns of Aฯ . For s โ ฯ โ1 (ฯ (1)),
(3)
(3)
the sth row of Aฯ d is simply 0. For s = 2, . . . , k, the sth row of Aฯ d is
eฯ (s) (xฯ (s)1 โ xฯ (1)1 , . . . , xฯ (s)d โ xฯ (1)d ). For s = 1, . . . , J โ 1, the (d + s)th
(3)
row of Aฯ d is โcฯ (d+s)s (xฯ (d+s)1 โ xฯ (1)1 , . . . , xฯ (d+s)d โ xฯ (1)d ). We claim
(3)
(3)
that Rank(Aฯ d ) โค d โ 1. Otherwise, if Rank(Aฯ d ) = d, then there exist
i1 , . . . , id โ {2, . . . , d + J โ 1}, such that, the sub-matrix consisting of the
(3)
i1 th, . . . , id th rows of Aฯ d is nonsingular. Then the sub-matrix consisting
of the ฯ (1)th, ฯ (i1 )th, . . . , ฯ (id )th rows of X1 is nonsingular, which implies
(3)
Rank(X1 ) = d + 1. The contradiction implies Rank(Aฯ d ) โค d โ 1. Then
(3)
|Aฯ | = 0 and thus |Aฯ | = 0 for each ฯ . Based on Theorem 2, |F| โก 0 and
thus f (p) โก 0.
Proof of Theorem 5 Combining Theorem 1 and Theorem 4, it is straightforward that f (p) = 0 if Rank( X1 [{i | pi > 0}]) โค d. We only need to
show that f (p) > 0 if Rank(X1 [{i | pi > 0}]) = d + 1. Due to Theorem 1,
we only need to verify the case pi > 0, i = 1, . . . , m, because otherwise we
may simply remove all support points with pi = 0.
Suppose pi > 0, i = 1, . . . , m and Rank(X1 ) = d + 1. Then there exist
i0 , . . . , id โ {1, . . . , m}, such that, |X1 [i0 , . . . , id ]| =
6 0. According to the
proof of Theorem 4, for each i โ {i0 , . . . , id }, there exists an วซi โ (0, 1),
such that, f (p) > 0 as long as pi = x โ (1 โ วซi , 1) and pj = (1 โ x)/(m โ 1)
for j 6= i. On the other hand, for each i โ
/ {i0 , . . . , id }, if we denote the
jth row of X1 by ฮฑj , j = 1, . . . , m, then ฮฑi = a0 ฮฑi0 + ยท ยท ยท + ad ฮฑid for some
real numbers a0 , . . . , ad . Since ฮฑi 6= 0, then at least one ai 6= 0. Without
any loss of generality, we assume a0 6= 0. Then it can be verified that
|X1 [i, i1 , . . . , id ]| =
6 0 too. Following the proof of Theorem 4 again, for such
an i โ
/ {i0 , . . . , id }, there also exists an วซi โ (0, 1), such that, f (p) > 0
as long as pi = x โ (1 โ วซi , 1) and pj = (1 โ x)/(m โ 1) for j 6= i. Let
วซโ = min{mini วซi , (m โ 1) mini pi , 1 โ 1/m}/2. For i = 1, . . . , m, denote
ฮดi = (ฮดi1 , . . . , ฮดim )T โ S with ฮดii = 1 โ วซโ and ฮดij = วซโ /(m โ 1) for j 6= i. It
can be verified that p = a1 ฮด1 + ยท ยท ยท + am ฮดm with ai = (pi โ วซโ /(m โ 1))/(1 โ
S9
S10
JIE YANG, LIPING TONG AND ABHYUDAY MANDAL
mวซ
P โ /(m โ 1)). By the choice of วซโ , f (ฮดi ) > 0, ai > 0, i = 1, . . . , m, and
i ai = 1. Then f (p) > 0 according to Lemma S.6.
Proof of Corollary 3 In order to check when a minimally supported
design supported only on {x1 , x2 } is D-optimal, we add one more support
point, that is, x3 . According to Theorem 2, Lemmas S.4, S.5, and 2, the
objective function for a D-optimal approximate design on {x1 , x2 , x3 } is
f (p1 , p2 , p3 ) = p1 p2 (c210 p1 + c120 p2 ) + p1 p3 (c201 p1 + c102 p3 ) + p2 p3 (c021 p2 +
c012 p3 ) + c111 p1 p2 p3 , where
c210
c120
c201
c102
c021
c012
c111
=
=
=
=
=
=
=
2 2
e2 g11
g12 (ฯ11 ฯ12 ฯ13 )โ1 (x1 โ x2 )2 > 0
2 2
e1 g21
g22 (ฯ21 ฯ22 ฯ23 )โ1 (x1 โ x2 )2 > 0
2 2
e3 g11
g12 (ฯ11 ฯ12 ฯ13 )โ1 (x1 โ x3 )2 > 0
2 2
e1 g31
g32 (ฯ31 ฯ32 ฯ33 )โ1 (x1 โ x3 )2 > 0
2 2
e3 g21
g22 (ฯ21 ฯ22 ฯ23 )โ1 (x2 โ x3 )2 > 0
2 2
e2 g31
g32 (ฯ31 ฯ32 ฯ33 )โ1 (x2 โ x3 )2 > 0
e1 (u22 u31 + u21 u32 โ 2b22 b32 )(x1 โ x2 )(x1 โ x3 ) +
e2 (u12 u31 + u11 u32 โ 2b12 b32 )(x2 โ x1 )(x2 โ x3 ) +
e3 (u12 u21 + u11 u22 โ 2b12 b22 )(x3 โ x1 )(x3 โ x2 )
Based on Theorem 10, the design p = (pโ1 , pโ2 , 0)T is D-optimal if and only
if
โf (p)/โf (p1 ) = โf (p)/โf (p2 ) โฅ โf (p)/โf (p3 )
Similar conclusions could be justified for x4 , . . . , xm if m โฅ 4.
Proof of Theorem 12 According to the solutions provided by the software Mathematica, the largest root of equation (S.10) after simplification
is
b2 21/3 (3b1 โ b22 )
A1/3
y1 = โ โ
+
(S.11)
3
3A1/3
3 ร 21/3
where A = โ27b0 + 9b1 b2 โ 2b32 + 33/2 (27b20 + 4b31 โ 18b0 b1 b2 โ b21 b22 + 4b0 b32 )1/2 ,
and bi = ci /c3 , i = 0, 1, 2. Note that the calculation of A and thus y1 should
be regarded as operations among complex numbers since the expression
under square root could be negative. Nevertheless, y1 at the end would be
a real number. Thus we are able to provide the analytic solution maximizing
f (p1 , p2 , p3 ).
Proof of Corollary 5 In order to check when a minimally supported
design is D-optimal, we first add the four design points, that is, we consider
S10
SUPPLEMENTARY MATERIALS
S11
four design points (xi1 , xi2 ), i = 1, 2, 3, 4 and check when the D-optimal
design could be constructed on the first three design points. Let X1 be
defined as in Lemma 2. In this case, X1 is a 4 ร 3 matrix. Following
Theorem 2, Lemmas S.4, S.5, and 2, the objective function for a minimally
supported design at (d, J, m) = (2, 3, 4) is
f (p1 , p2 , p3 , p4 ) =
+
+
+
+
c1111 p1 p2 p3 p4
|X1 [1, 2, 3]|2e1 e2 e3 ยท p1 p2 p3 (w1 p1 + w2 p2 + w3 p3 )
|X1 [1, 2, 4]|2e1 e2 e4 ยท p1 p2 p4 (w1 p1 + w2 p2 + w4 p4 )
|X1 [1, 3, 4]|2e1 e3 e4 ยท p1 p3 p4 (w1 p1 + w3 p3 + w4 p4 )
|X1 [2, 3, 4]|2e2 e3 e4 ยท p2 p3 p4 (w2 p2 + w3 p3 + w4 p4 )
2 2
โ1
where ei = ui1 + ui2 โ 2bi2 , wi = eโ1
i gi1 gi2 (ฯi1 ฯi2 ฯi3 ) , i = 1, 2, 3, 4, and
X
ei ej (uk1 ul2 + uk2ul1 โ 2bk2 bl2 ) ยท |X1[i, j, k]| ยท |X1[i, j, l]| (S.12)
c1111 =
1โคi<jโค4
with {i, j, k, l} = {1, 2, 3, 4} given 1 โค i < j โค 4.
According to Theorem 10, a minimally supported design p = (pโ1 , pโ2 , pโ3 ,
0)T in this case is D-optimal if and only if โf /โp1 = โf /โp2 = โf /โp3 โฅ
โf /โp4 at p. Then โf /โp1 = โf /โp2 = โf /โp3 at p is equivalent to (1) of
Corollary 5, and โf /โp4 โค โf /โp1 at p leads to (2) of Corollary 5 since the
forms of โf /โpi at p, i = 1, 2, 3 will not change if more than four design
points (i.e., m > 4) are added into consideration. Note that
|X1 [1, 2, 3]|2e1 e2 e3 pโ2 pโ3 (2w1pโ1 + w2 pโ2 + w3 pโ3 ) in (2) of Corollary 5 is equal
to โf /โp1 at p. It could be replaced with |X1 [1, 2, 3]|2e1 e2 e3 pโ1 pโ3 (w1 pโ1 +
2w2 pโ2 +w3 pโ3 ) (i.e., โf /โp2 ), or |X1 [1, 2, 3]|2e1 e2 e3 pโ1 pโ2 (w1 pโ1 +w2pโ2 +2w3pโ3 )
(i.e., โf /โp3 ), since these three are all equal.
S.4
Maximization of fi (z) in Section 3
According to Theorem 6, fi (z) is an order-(d + J โ 1) polynomial of z.
In other to determine its coefficients a0 , a1 , . . . , aJโ1 as in (3.2), we need
to calculate fi (0), fi (1/2), fi (1/3), . . . , fi (1/J), which are J determinants
defined in (3.1).
Note that Bโ1
Jโ1 is a matrix determined by J โ 1 only. For example,
โ1
B1 = 1 for J = 2,
๏ฃซ
๏ฃถ
3 โ3
1
2 โ1
4 โ 32 ๏ฃธ ,
B2โ1 =
, B3โ1 = ๏ฃญ โ 52
โ1
1
1
1
โ1
2
2
S11
S12
JIE YANG, LIPING TONG AND ABHYUDAY MANDAL
๏ฃซ
๏ฃถ
4 โ1
19
๏ฃท
โ7 11
2
6 ๏ฃท
7
โ4
โ1 ๏ฃธ
2
1
1
1
โ2
2
6
4 โ6
๏ฃฌ โ 13
3
B4โ1 = ๏ฃฌ
3
๏ฃญ
2
1
โ6
for J = 3, 4, or 5 respectively.
Once a0 , . . . , aJโ1 in (3.2) are determined, the maximization of fi (z)
on z โ [0, 1] is numerically straightforward since it is a polynomial and its
derivative fiโฒ (z) is given by
(1โz)d
Jโ1
X
jaj z jโ1 (1โz)Jโ1โj โ(1โz)dโ1
Jโ1
X
(d+J โ1โj)aj z j (1โz)Jโ1โj
j=0
j=1
(S.13)
S.5
Exchange algorithm for D-optimal exact allocation in Section 4
Exchange algorithm for D-optimal allocation (n1 , . . . , nm )T given n > 0:
1โฆ Start with an initial design n = (n1 , . . . , nm )T such that f (n) > 0.
2โฆ Set up a random order of (i, j) going through all pairs {(1, 2), (1, 3),
. . . , (1, m), (2, 3), . . . , (m โ 1, m)}.
3โฆ For each (i, j), let c = ni + nj . If c = 0, let nโij = n. Otherwise, there
are two cases. Case one: 0 < c โค J, we calculate fij (z) as defined in
(4.1) for z = 0, 1, . . . , c directly and find z โ which maximizes fij (z).
Case two: c > J, we first calculate fij (z) for z = 0, 1, . . . , J; secondly determine c0 , c1 , . . . , cJ in (4.2) according to Theorem 9; thirdly
calculate fij (z) for z = J + 1, . . . , c based on (4.2); fourthly find z โ
maximizing fij (z) for z = 0, . . . , c. For both cases, we define
nโij = (n1 , . . . , niโ1 , z โ , ni+1 , . . . , njโ1, c โ z โ , nj+1 , . . . , nm )T
Note that f (nโij ) = fij (z โ ) โฅ f (n) > 0. If f (nโij ) > f (n), replace n
with nโij , and f (n) with f (nโij ).
4โฆ Repeat 2โฆ โผ 3โฆ until convergence, that is, f (nโij ) = f (n) in step 3โฆ for
any (i, j).
S12
SUPPLEMENTARY MATERIALS
S.6
S13
More on Example 6: Polysilicon Deposition Study
Table S.1 shows the list of experimental settings for the polysilicon deposition study. The factors are decomposition temperature(A), decomposition
pressure(B), nitrogen flow (C), silane flow(D), setting time(E),
cleaning method(F ). Column 1 provides original indices of experimental
settings out of 729 distinct ones. For each experimental setting labelled โ1โ
in a design, 9 responses are collected (Phadke (1989)) and assumed to be
independent.
Table S.1: Polysilicon Deposition Study: Experimental Settings for the Original,
Rounded Approximate, and D-optimal Exact Designs
Index
1
76
89
98
111
116
122
130
167
181
199
201
243
258
286
290
291
294
299
301
313
331
336
339
350
365
376
384
394
399
407
421
461
464
495
501
505
521
522
536
557
558
569
588
625
631
641
671
679
A
1
1
1
1
1
1
1
1
1
1
1
1
1
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
B
1
1
2
2
2
2
2
2
3
3
3
3
3
1
1
1
1
1
1
1
1
2
2
2
2
2
2
2
2
2
3
3
3
3
1
1
1
1
1
1
1
1
2
2
2
2
2
3
3
C
1
3
1
1
2
2
2
2
1
1
2
2
3
1
2
2
2
2
3
3
3
1
1
1
1
2
2
3
3
3
1
1
3
3
1
1
1
2
2
2
3
3
1
1
3
3
3
1
2
D
1
3
1
2
1
1
2
3
1
3
2
2
3
2
2
3
3
3
1
1
2
1
2
2
3
2
3
1
2
3
1
2
1
1
1
2
3
1
1
3
2
2
1
3
1
2
3
3
1
E
1
2
3
3
1
3
2
2
2
1
1
1
3
2
3
1
1
2
1
2
3
3
1
2
3
2
3
2
3
1
1
3
1
2
3
2
1
3
3
2
3
3
1
1
2
1
1
2
2
F
1
1
2
2
3
2
2
1
2
1
1
3
3
3
1
2
3
3
2
1
1
1
3
3
2
2
1
3
1
3
2
1
2
2
3
3
1
2
3
2
2
3
2
3
1
1
2
2
1
Original
1
1
1
0
0
0
1
0
0
0
0
1
1
1
0
1
0
0
0
0
0
0
0
0
0
0
1
1
0
0
0
1
1
0
0
0
0
0
1
0
1
0
0
1
0
1
0
1
1
Rounded
0
0
0
0
0
1
0
0
0
1
1
0
0
0
1
0
1
0
0
1
0
1
1
1
1
0
0
0
1
1
0
0
1
1
1
0
0
0
0
1
0
1
1
0
0
0
0
0
0
D-optimal
0
0
0
1
1
0
0
1
1
0
1
0
1
0
0
0
0
1
1
0
1
1
1
0
0
1
0
0
0
0
1
0
0
0
0
1
1
1
0
0
0
0
0
0
1
0
1
0
0
Table S.2 shows the model matrix for the D-optimal design no found
for the polysilicon deposition study. In this table, each 3-level factor is
represented by its linear component and quadratic component. Thus there
are level combinations of 12 predictors.
S13
S14
JIE YANG, LIPING TONG AND ABHYUDAY MANDAL
Table S.2: Polysilicon Deposition Study: Model Matrix for the D-optimal Design
Index
98
111
130
167
199
243
294
299
313
331
336
365
407
501
505
521
625
641
A1
โ1
โ1
โ1
โ1
โ1
โ1
0
0
0
0
0
0
0
1
1
1
1
1
A2
1
1
1
1
1
1
โ2
โ2
โ2
โ2
โ2
โ2
โ2
1
1
1
1
1
B1
0
0
0
1
1
1
โ1
โ1
โ1
0
0
0
1
โ1
โ1
โ1
0
0
B2
โ2
โ2
โ2
1
1
1
1
1
1
โ2
โ2
โ2
1
1
1
1
โ2
โ2
C1
โ1
0
0
โ1
0
1
0
1
1
โ1
โ1
0
โ1
โ1
โ1
0
1
1
C2
1
โ2
โ2
1
โ2
1
โ2
1
1
1
1
โ2
1
1
1
โ2
1
1
S14
D1
0
โ1
1
โ1
0
1
1
โ1
0
โ1
0
0
โ1
0
1
โ1
โ1
1
D2
โ2
1
1
1
โ2
1
1
1
โ2
1
โ2
โ2
1
โ2
1
1
1
1
E1
1
โ1
0
0
โ1
1
0
โ1
1
1
โ1
0
โ1
0
โ1
1
0
โ1
E2
1
1
โ2
โ2
1
1
โ2
1
1
1
1
โ2
1
โ2
1
1
โ2
1
F1
0
1
โ1
0
โ1
1
1
0
โ1
โ1
1
0
0
1
โ1
0
โ1
0
F2
โ2
1
1
โ2
1
1
1
โ2
1
1
1
โ2
โ2
1
1
โ2
1
โ2
| 10math.ST
|
Contextual Bandits with Stochastic Experts
Rajat Sen1 , Karthikeyan Shanmugam2 , and Sanjay Shakkottai1
1
arXiv:1802.08737v1 [stat.ML] 23 Feb 2018
2
The University of Texas at Austin
IBM Research, Thomas J. Watson Center
February 27, 2018
Abstract
We consider the problem of contextual bandits with stochastic experts, which is a variation of the
traditional stochastic contextual bandit with experts problem. In our problem setting, we assume access
to a class of stochastic experts, where each expert is a conditional distribution over the arms given a
context. We propose upper-confidence bound (UCB) algorithms for this problem, which employ two
different importance sampling based estimators for the mean reward for each expert. Both these estimators leverage information leakage among the experts, thus using samples collected under all the experts
to estimate the mean reward of any given expert. This leads to instance dependent regret bounds of
ยต)M log T /โ), where ฮป(ยต
ยต) is a term that depends on the mean rewards of the experts, โ is the
O (ฮป(ยต
smallest gap between the mean reward of the optimal expert and the rest, and M quantifies the inforยต) is typically O(log N ).
mation leakage among the experts. We show that under some assumptions ฮป(ยต
We implement our algorithm with stochastic experts generated from cost-sensitive classification oracles
and show superior empirical performance on real-world datasets, when compared to other state of the
art contextual bandit algorithms.
1
Introduction
Modern machine learning applications like recommendation engines [24, 11, 25], computational advertising [28, 10], A/B testing in medicine [29, 30] are inherently online. In these settings the task is to take
sequential decisions that are not only profitable but also enable the system to learn better in future. For
instance in a computational advertising system, the task is to sequentially place advertisements on usersโ
webpages with the dual objective of learning the preferences of the users and increasing the click-through
rate on the fly. A key attribute of these systems is the well-known exploration (searching the space of possible decisions for better learning) and exploitation (taking decisions that are more profitable) trade-off. A
principled method to capture this trade-off is the study of multi-armed bandit problems [12].
K-armed stochastic bandit problems have been studied for several decades. These are formulated as a
sequential process, where at each time step any one of the K-arms can be selected. Upon selection of the
k-th arm, the arm returns a stochastic reward with an expected reward of ยตk . Starting from the work of
[21], a major focus has been on regret, which is the difference in the total reward that is accumulated from
the genie optimal policy (one that always selects the arm with the maximum expected reward) from that of
the chosen online policy. The current state-of-art algorithms achieve a regret of O((K/โ) log T ) [12, 7, 4, 5],
which is order-wise optimal [21]. Here, โ corresponds to the gap in expected reward between the best arm
and the next best one.
Additional side information can be incorporated in this setting through the framework of contextual bandits.
In the stochastic setting, it is assumed that at each time-step nature draws (x, r1 , ..., rK ) from a fixed but
unknown distribution. Here, x โ X represents the context vector, while r1 , ..., rK are the rewards of the
K-arms [22]. The context x is revealed to the policy-designer, after which she decides to choose an arm
a โ {1, 2, ..., K}. Then, the reward ra is revealed to the policy-designer. In the computational advertising
example, the context can be thought of as the browsing history, age, gender etc. of an user arriving in
1
the system, while r1 , ..., rK are generated according to the probability of the user clicking on each of the
K advertisements. The task here is to learn a good mapping from the space of contexts X to the space of
arms [K] = {1, 2, ..., K} such that when the decisions are taken according to that mapping, the mean reward
observed is high.
A popular model in the stochastic contextual bandits literature is the experts setting [3, 18, 22]. The task is to
compete against the best expert in a class of experts ฮ = {ฯ1 , ..., ฯN}, where
each expert ฯ โ ฮ is a function
mapping X โ [K]. The mean reward of an expert ฯ is defined as E rฯ(X) , where X is the random variable
denoting the context and the expectation is taken over the unknown distribution over (x, r1 , ..., rK ). The best
expert is naturally defined as the expert with the highest mean reward. The expected difference in rewards of
a genie policy that always chooses the best expert and the online algorithm employed by the policy-designer
is defined as the regret. This problem has been well-studied in the literature, where a popular approach
is to reduce the contextual bandit problem to supervised learning techniques through argmin-oracles
[8].
p
KT polylog(N ) at time
This leads to powerful algorithms with instance-independent regret bounds of O
T [3, 18].
In practice the class of experts are generated online by training cost-sensitive classification oracles [3, 18].
Once trained, the resulting classifiers/oracles can provide reliable confidence scores given a new context,
especially if they are well-calibrated [17]. These confidence scores effectively are a K-dimensional probability
vector, where the k th entry is the probability of the classifier/oracle choosing the k th arm as the best,
given a context. Motivated by this observation, we propose a variation of the traditional experts setting,
which we term contextual bandits with stochastic experts. We assume access to a class of stochastic experts
ฮ = {ฯ1 , ..., ฯN }, which are not deterministic. Instead, each expert ฯ โ ฮ , is a conditional probability
distribution over the arms given a context. For an expert ฯ โ ฮ the conditional distribution is denoted
by ฯV |X (v|x) where V โ [K] is the random variable denoting the arm chosen and X is the context. An
additional benefit is that this setting allows us to derive regret bounds in terms of closeness of these soft
experts quantified by divergence measures, rather than in terms of the total number of arms K.
As before, the task is to compete against the expert in the class with the highest mean reward. The expected
reward of a stochastic expert ฯ is defined as EX,V โผฯ(V |X) [rV ], i.e the mean reward observed when the arm
is drawn from the conditional distribution ฯ(V |X). We propose upper-confidence (UCB) style algorithms
for the contextual bandits with stochastic experts problem, that employ two importance sampling based
estimators for the mean rewards under various experts. We prove instance-dependent regret guarantees for
our algorithms. The main contributions of this paper are listed in the next section.
1.1
Main Contributions
The contributions of this paper are three-fold:
(i) (Importance Sampling based Estimators): The key components in our approach are two importance
sampling based estimators for the mean rewards under all the experts. Both these estimators are based on
the observation that samples collected under one expert can be reweighted by likelihood/importance ratios
and averaged to provide an estimate for the mean reward under another expert. This sharing of information
is termed as information leakage and has been utilized before under various settings [23, 27, 10]. The first
estimator that we use is an adaptive variant of the well-known clipping technique, which was proposed
in [27]. The estimator is presented in Eq. (3). However, we carefully adapt the clipping threshold in an
online manner, in order to achieve regret guarantees.
We also propose an importance sampling variant of the classical median of means estimator (see [26, 13]).
This estimator is also designed to utilize the samples collected under all experts together to estimate the
mean reward under any given expert. We define the estimator in Eq. (6). To the best of our knowledge,
importance sampling has not been used in conjunction with the median of means technique in the literature
before. We provide novel confidence guarantees for this estimator which depends on chi-square divergences
between the conditional distributions under the various experts. This may be of independent interest.
2
(ii) (Instance Dependent Regret Bounds): We propose the contextual bandits with stochastic experts
problem. We design two UCB based algorithms for this problem, based on the two importance sampling
based estimators mentioned above. We show that utilizing the information leakage between the experts leads
to regret guarantees that scale sub-linearly in N , the number of experts. The information leakage between
any two experts in the first estimator is governed by a pairwise log-divergence measure (Def. 2). For the
second estimator, chi-square divergences (Def. 3) characterize the leakage.
ยต
We show that the regret of our UCB algorithm based on these two estimators scales as 1 : O ฮป(ยตโ)M log T .
Here, M is related to the largest pairwise divergence values under the two divergence measures used. โ
ยต) is a parameter that
is the gap between the mean rewards of the optimal expert and the second best. ฮป(ยต
only depends on the gaps between mean rewards of the optimum experts and various sub-optimal ones. It
is a normalized sum of difference in squares of the gaps of adjacent sub-optimal experts ordered by their
gaps. Under the assumption that the suboptimal gaps (except that of the second best arm) are uniformly
ยต) is O(log N ) in expectation. We
distributed in a bounded interval, we can show that the parameter ฮป(ยต
define this parameter explicitly in Section 6.
For the clipped estimator we show that M = M 2 log2 (1/โ) where M is the largest pairwise log-divergence
associated with the clipped estimator. For the median of means estimator, M = ฯ 2 where ฯ 2 is the largest
pairwise chi-squared divergence.
Naively treating each expert as an arm would lead to a regret scaling of O(N log T /โ). However,
this ignores
p
information leakage. Existing instance-independent bounds for contextual bandits scale as KT poly log(N ) [3].
Our problem dependent bounds have a near optimal dependence on โ and does not depend on K, the numbers of arms. However, it depends on the divergence measure associated with the information leakage in
the problem (M or ฯ parameters). Besides our analysis, we empirically show that this divergence based
approach rivals or performs better than very efficient heuristics for contextual bandits (like bagging etc.) on
real-world data sets.
(iii) (Empirical Validation): We empirically validate our algorithm on three real world data-sets [20, 19, 1]
against other state of the art contextual bandit algorithms [22, 3] implemented in Vowpal Wabbit [2]. In
our implementation, we use online training of cost-sensitive classification oracles [8] to generate the class of
stochastic experts. We show that our algorithms have better regret performance on these data-sets compared
to the other algorithms.
2
Related Work
Contextual bandits has been studied in the literature for several decades, starting with the simple setting of
discrete contexts [12], to linear contextual bandits [16] and finally the general experts setting [18, 3, 22, 6, 9].
In this work, we focus on the experts setting. Contextual bandits with expertsโwas first studied in the
adversarial setting, where there are algorithms with the optimal regret scaling O( KT log N ) [6].
In this paper, we are more interested in the stochastic version of the problem, where the context and the
rewards of the arms are generated from an unknown but fixed distribution. The first strategies to be
explored in this setting
and epsilon-greedy [22] style strategies that achieve a
โ were explore-then-commit
regret scaling of O K log N T 2/3 in the instance-independent case. Following this there have been several
p
efforts to design adaptive algorithms that achieve a O( KT polylog(N )) instance-independent regret scaling.
Notable among these are [18, 3]. These algorithms map the contextual bandit problem to supervised learning
and assume access to cost-sensitive classification oracles. These algorithms have been heavily optimized in
Vowpal Wabbit [2].
We study the contextual bandits with stochastic experts problem, where the experts are not deterministic functions mapping contexts to arms, but are conditional distributions over the arms given a context.
1 Tighter
regret bounds are derived in Theorems 1 and 2. Here, we only mention the Corollaries of our approach, that are
easy to state.
3
We show that we can achieve instance-dependent regret guarantees for this problem, that can scale as
O ((M log N/โ) log T ) under some assumptions. Here, โ is the gap between the mean reward of the best
expert and the second best and M is a divergence term between the experts. Our algorithms are based on
importance sampling based estimators which leverage information leakage among stochastic experts. We use
an adaptive clipped importance sampling estimator for the mean rewards of the experts, that was introduced
in [27]. In [27], the estimator was studied in a best-arm/pure explore setting, while we study a cumulative
regret problem where we need to adjust the parameters of the estimator in an online manner. In addition,
we introduce an importance sampling based median of means style estimator in this paper, that can leverage
the information leakage among experts.
3
Problem Setting and Definitions
The general stochastic contextual bandit problem with K arms is defined as a sequential process for T
discrete time-steps [22], where T is the time-horizon of interest. At each time t โ {1, 2, ยท ยท ยท , T } nature draws
a vector (xt , r1 (t), ..., rK (t)) from an unknown but fixed probability distribution. Here, ri (t) โ [0, 1] is the
reward of arm i. The context vector xt โ X is revealed to the policy-designer, whose task is then to choose
an arm out the K possibilities. Only the reward rv(t) (t) of the chosen arm v(t), is then revealed to the
policy-designer. We will use rv(t) in place of rv(t) (t) for notational convenience.
โก(V |X)
X
V
Y
Figure 1: Bayesian Network denoting the joint distribution of the random variables at a given time-step, under our
contextual bandit setting. X denotes the context, V denotes the chosen arm, while Y denotes the reward from the
chosen arm that also depends on the context observed. The distribution of the reward given the chosen arm and the
context, and the marginal of the context remain fixed over all time slots. However, the conditional distribution of
the chosen arm given the context is dependent on the stochastic expert at that time-step.
Stochastic Experts:
We consider a class of stochastic experts ฮ = {ฯ1 , ยท ยท ยท , ฯN }, where each ฯi is
a conditional probability distribution ฯV |X (v|x) where V โ [K] is the random variable denoting the arm
chosen and X is the context. We will use the shorthand ฯi (V |X) to denote the conditional distribution
corresponding to expert i, for notational convenience. The observation model at each time step t is as
follows: (i) A context xt is observed. (ii) The policy-designer chooses a stochastic expert ฯk(t) โ ฮ . An
arm v(t) is drawn from the probability distribution ฯk(t) (V |xt ), by the policy-designer. (iv) The stochastic
reward yt = rv(t) is revealed.
The joint distribution of the random variables X, V, Y denoting the context, arm chosen and reward observed
respectively at time t, can be modeled by the Bayesian Network shown in Fig. 1. The joint distribution
factorizes as follows, p(x, v, y) = p(y|v, x)p(v|x)p(x) (1), where p(y|v, x) (the reward distribution given
the arm and the context), and p(x) (marginal distribution of the context) is determined by the natureโs
distribution and are fixed for all time-steps t = 1, 2, ..., T . On the other hand p(v|x) (distribution of the arm
4
chosen given the context) depends on the expert selected at each round. At time t, p(v|x) = ฯk(t) (v|x) that
is the conditional distribution encoded by the stochastic expert chosen at time t. Now we are at a position
to define the objective of the problem.
Regret: The objective in our contextual bandit problem is to perform as well as the best expert in the
class of experts. We will define pk (x, v, y) , p(y|v, x)ฯk (v|x)p(x) as the distribution of the corresponding
random variables when the expert chosen is ฯk โ ฮ . The expected reward of expert k is now denoted by,
ยตk = Epk (x,v,y) [Y ], where Ep(.) denotes expectation with respect to distribution p(.). The best expert is
given by k โ = arg maxkโ[N ] ยตk . The objective is to minimize the regret till time T , which is defined as
PT
R(T ) = t=1 ยตโ โ ยตk(t) , where ยตโ = ยตkโ . Note that this is analogous to the regret definition for the
deterministic expert setting [22]. Let us define โk , ยตโ โ ยตk as the optimality gap in terms of expected
reward, for expert k. Let ยต , {ยต1 , ..., ยตN }. Now we will define some divergence metrics that will be important
in describing our algorithms and theoretical guarantees.
3.1
Divergence Metrics
In this section we will define some f -divergence metrics that will be important in analyzing our estimators.
Similar divergence metrics were defined in [27] to analyze the clipped estimator in (3) in the context of a best
arm identification problem. In addition to the divergence metric in [27], we will also define the chi-square
divergence metric which will be useful in analyzing the median of means based estimator (6). First, we define
conditional f -divergence.
Definition 1. Let f (ยท) be a non-negative convex function such that f (1) = 0. For two joint distributions
pX,Y (x, y) and qX,Y (x, y) (and the associated conditionals), the conditional f -divergence Df (pX|Y kqX|Y ) is
given by:
i
h
pX|Y (X|Y )
.
Df (pX|Y kqX|Y ) = EqX,Y f qX|Y
(X|Y )
Recall that ฯi is a conditional distribution of V given X. Thus, Df (ฯi kฯj ) is the conditional f -divergence
between the conditional distributions ฯi and ฯj . Note that in this definition the marginal distribution of
X is the marginal of X given by natureโs inherent distribution over the contexts. In this work we will be
concerned with two specific f -divergence metrics that are defined as follows.
Definition 2. (Mij measure) [27] Consider the function f1 (x) = x exp(x โ 1) โ 1. We define the following
log-divergence measure: Mij = 1 + log(1 + Df1 (ฯi kฯj )), โi, j โ [N ].
The Mij -measures will be crucial in analyzing one of our estimators (clipped estimator) defined in Section 5.
Definition 3. (ฯij measure) Df2 (ฯi kฯj ) is known as the chi-square divergence between the respective con2
ditional distributions, where f2 (x) = x2 โ 1. Let ฯij
= 1 + Df2 (ฯi kฯj ).
The ฯij -measures are important in analyzing our second estimator (median of means) defined in Section 5.
4
A Meta-Algorithm
In this section, we propose a general upper-confidence bound (UCB) style strategy that utilizes the structure
of the problem to converge to the best expert much faster than a naive UCB strategy that treats each expert
as an arm of the bandit problem. One of the key observations in this framework is that rewards collected
under one expert can give us valuable information about the mean under another expert, owing to the
Bayesian Network factorization of the joint distribution of X, V and Y . We propose two estimators for the
mean rewards of different experts, that leverage this information leakage among experts, through importance
sampling. These estimators are defined in Section 5. We propose a meta-algorithm (Algorithm 1) that is
designed to use these estimators and the corresponding confidence intervals, to control regret.
5
Algorithm 1 D-UCB: Divergence based UCB for contextual bandits with stochastic experts
1:
2:
3:
4:
5:
6:
7:
For time step t = 1, observe context x1 and choose a random expert ฯ โ ฮ . Play an arm drawn from
the conditional distribution ฯ(V |x1 ).
for t = 2, ..., T do
Observe context xt
Let k(t) = arg maxk Uk (t โ 1) , ยตฬk (t โ 1) + sk (t โ 1).
Select an arm v(t) from the distribution
ฯk(t) (V |xt ).
Observe the reward Y (t).
end for
Here, ยตฬk (t) denotes an estimate for the mean reward for expert k at time t, while sk (t) denotes the upper
confidence bound for the corresponding estimator at time t. We propose two estimators that utilize all the
samples observed under various experts to provide an estimate for the mean reward under expert k.
The first estimator denoted by ยตฬck (t) (Section 5, Eq. (3)) is a clipped importance sampling estimator inspired
by [27]. If this estimator is used, then sk (t) is set as in Equation. (4).
The second estimator denoted by ยตฬm
k (t) (Section 5, Eq. (6)) is a median of means based importance sampling
estimator. If this estimator is used, then sk (t) is set as in Equation. (7).
5
Estimators and Confidence Bounds
In this section we define two estimators for estimating the mean rewards under a given expert. Both
these estimators can effectively leverage the information leakage between samples collected under various
experts, through importance sampling. One key observation that enables us in doing so is the following
equation,
ฯk (V |X)
.
(2)
ยตk = Epj (x,v,y) Y
ฯj (V |X)
This has been termed as information leakage and has been leveraged before in the literature [27, 23, 10] in
best-arm identification settings. Recall that the subscript pj (x, v, y) denotes that the expectation is taken
under the joint distribution in (1), where p(v|x) = ฯj (v|x) i.e. under the distribution imposed by expert ฯj .
However, even under this distribution we can technically estimate the mean reward under expert ฯk . The
above equation is the motivation behind our estimators. Now, we will introduce our first estimator.
Clipped Estimator: This estimator was introduced in [27] in the context of a pure exploration problem.
Here, we analyze this estimator in a cumulative regret setting, where the parameters of the estimator need
to be adjusted differently. Let ni (t) denote the number of times expert i has been invoked by Algorithm 1
till time t, for all i โ [N ]. We define the fraction ฮฝi (t) , ni (t)/t. We will also define Ti (t) as the subset of
time-steps among {1, .., t}, in which the expert i was selected. Let ยตฬck (t) be the estimate of the mean reward
of expert k from samples collected till time t. The estimator is given by,
ยตฬck (t) =
N
1 X X
1
ฯk (Vj (s)|Xj (s))
ฯk (Vj (s)|Xj (s))
Yj (s)
ร1
โค 2 log(2/(t))Mkj .
Zk (t) j=1
Mkj
ฯj (Vj (s)|Xj (s))
ฯj (Vj (s)|Xj (s))
(3)
sโTj (t)
Here, Aj (s) is the value of the random
variable A at time s drawn using expert j, where A can be the
P
r.vโs X,Y or V . We set Zk (t) = j nj (t)/Mkj . (t) is an adjustable term which controls the bias-variance
trade-off for the estimator.
6
Intuition: The clipped estimator is a weighted average of the samples collected under different experts,
where each sample is scaled by the importance ratio as suggested by (2). We also clip the importance ratios
which are larger than a clipper level. This clipping introduces bias but decreases variance. The clipper level
is carefully chosen to trade-off bias and variance. The clipper level values and the weights are dependent on
the divergence terms Mkj โs. When the divergence Mkj is large, it means that the samples from expert j is
not valuable for estimating the mean for expert k. Therefore, a weight of 1/Mkj is applied. Similarly, the
clipper level is set at 2 log(2/(t))Mkj to restrict the aditive bias to (t).
The upper confidence term in Algorithm 1 for the estimator ยตฬck (t) is chosen as,
sck (t) =
at time t, where ฮฒ(t) is such that,
ฮฒ(t)
log(2/ฮฒ(t))
โ
=
3
ฮฒ(t)
2
c1 t log t
Zk (t) .
(4)
We set c1 = 16 in our analysis.
The upper confidence bound is derived using Lemma 1.
Lemma 1. Consider the estimator in Eq. (3). We have the following confidence bound at time t,
2 !
Zk (t)
ฮด2 t
c
.
P (ยตk โ ฮด โ (t)/2 โค ยตฬk (t) โค ยตk + ฮด) โฅ 1 โ 2 exp โ
8(log(2/(t)))2
t
The lemma is implied by Theorem 4 in [27]. We include the proof in Section A in the appendix. The lemma
shows that the clipped estimator can pool samples from all experts, in order to estimate the mean under
expert k. The variance of the estimator depends on Zk (t), which depends on the log-divergences and number
of times each expert has been invoked.
Median of Means Estimator: Now we will introduce our second estimator which is based on the wellknown median of means technique of estimation. Median of means estimators are popular for statistical
estimation when the underlying distributions are heavy-tailed [13]. The estimator for the mean under
the k th expert at time t is obtained through the following steps: (i) We divide the total samples into
l(t) = bc2 log(1/ฮด(t))c groups, such that the fraction of samples from each expert is preserved. We choose
c2 = 8 for our analysis. Let us index the groups as r = 1, 2..., l(t). This means that there are at least
bni (t)/l(t)c samples from expert i in each group. (ii) We calculate the empirical mean of expert k from the
samples in each group through importance sampling. (iii) The median of these means is our estimator.
(r)
Now we will setup some notation.
P Let Tj โ {1, 2, ..., t} be the indices of the samples from expert j that
lie in group r. Let
W
(r,
t)
=
k
i ni (r, t)/ฯki , where ni (r, t) is the number of samples from expert i in group
P
r. Let n(r, t) = i ni (r, t). Then the mean of expert k estimated from group r is given by,
(r)
ยตฬk (t) =
N
X
X 1
1
ฯk (Vj (s)|X(s))
Yj (s)
.
Wk (r, t) j=1
ฯ
ฯ
kj
j (Vj (s)|Xj (s))
(r)
(5)
sโTj
The median of means estimator for expert k is then given by,
(1)
(l(t))
ยตฬm
(t) .
k (t) , median ยตฬk (t), ยท ยท ยท , ยตฬk
(6)
Intuition: The mean of every group is a weighted average of samples from each expert, rescaled by the
importance ratios. This is similar to the clipped estimator in Eq. (3). However, here the importance ratios
are not clipped at a particular level. In this estimator, the bias-variance trade-off is controlled by taking the
median of means from l(t) groups. The number of groups l(t) needs to be carefully set in-order to control
the bias-variance trade-off.
The upper confidence bound used in conjunction with this estimator at time t is given by,
7
sm
k (t)
1
=
Wk (t)
r
c3 log(1/ฮด(t))
t
(7)
where Wk (t) = minrโ[l(t)] Wk (r, t)/n(r, t) and ฮด(t) is set as 1/t2 in our algorithm. This choice is inspired by
the following lemma.
Lemma 2. Let ฮด(t) โ (0, 1). Then the estimator in (6) has the following confidence bound,
!
r
c3 log(1/ฮด(t))
1
m
โฅ 1 โ ฮด(t).
(8)
P |ยตฬk (t) โ ยตk | โค
Wk (t)
t
We provide the proof of this lemma in Section B in the appendix. The constant c3 is 64.
6
Theoretical Results
In this section, we provide instance dependent regret guarantees for Algorithm 1 for the two estimators
proposed - a) The clipped estimator (3) and b) The median of means estimator (6). Let โ = mink6=kโ โk
be the gap in the expected reward between the optimum expert and the second best. We define a parameter
ยต), later in the section, that depends only on the gaps of the expected rewards of various experts from the
ฮป(ยต
optimal one.
ยต)M 2 log2 (6/โ) log T /โ). SimiFor the Algorithm 1 that uses the clipped estimator, regret scales as O(ฮป(ยต
ยต)ฯ 2 log T /โ). Here M is the maxlarly, for the case of the median of means estimator, regret scales as O(ฮป(ยต
2
imum log-divergence and ฯ is the maximum chi-square divergence between two experts, respectively.
When the gaps between the optimum expert and sub-optimal ones are distributed uniformly at random in
ยต) parameter is at most O(log N ) in expectation. In contrast, if the
[ฮด2 , 1] (ฮด2 > 0), we show that the ฮป(ยต
experts were
used
as
separate
arms,
a
naive application of UCB-1 [5] bounds would yield a regret scaling of
log
T
.
This
can
be
prohibitively
large when the number of experts are large.
O N
โ
For ease of exposition of our results, let us re-index the experts using indices {(1), (2), ..., (N )} such that
0 = โ(1) โค โ(2) โค ... โค โ(N ) . The regret guarantees for our clipped estimator are provided under the
following assumption.
Assumption 1. Assume the log-divergence terms (2) are bounded for all i, j โ [N ]. Let M = maxi,j Mij .
Now we are at a position to present one of our main theorems that provides regret guarantees for Algorithm 1
using the estimator (3).
Theorem 1. Suppose Assumption 1 holds. Then the regret of Algorithm 1 at time T using estimator (3),
is bounded as follows:
! N โ1
N
X C1 M 2 log2 (6/โ(k) ) log T
C1 M 2 log2 (6/โ(N ) ) log T
ฮณ(โ(k) )
ฯ2 X
R(T ) โค
+
โ(i) +
1โ
โ(N )
3 i=2
โ(k)
ฮณ(โ(k+1) )
k=2
Here, C1 is an universal constant and ฮณ(x) =
2
x
.
log2 (6/x)
We defer the proof of Theorem 1 to Appendix A. We now present Theorem 2 that provides regret guarantees
for Algorithm 1 using the estimator (6). The theorem holds under the following assumption.
Assumption 2. Assume the chi-square terms (3) are bounded for all i, j โ [N ]. Let ฯ = maxi,j ฯij .
Theorem 2. Suppose Assumption 2 holds. Then the regret of Algorithm 1 at time T using estimator (6),
is bounded as follows:
!
!
N
โ1
N
X
โ2(k)
C2 ฯ 2 log T
C2 ฯ 2 log T
ฯ2 X
R(T ) โค
+
1โ 2
+
โ(i)
โ(N )
โ(k)
โ(k+1)
3 i=2
k=2
Here, C2 is an universal constant.
8
0.6
1.0
1.0
0.8
0.9
Average Loss
0.8
Average Loss
Average Loss
1.0
0.6
0.4
0.7
0.2
0.4
0
500
1000
1500
Time-Steps: T
(a)
0.8
0
2500
5000
7500
Time-Steps: T
10000
0.6
0
(b)
5000
10000
15000
Time-Steps: T
(c)
20000
(d)
Figure 2: In all these plots, the progressive validation loss [3] till time T has been plotted as a function of time T .
(a) Performance of the algorithms on the Drug Consumption dataset [19]. (b) Performance of the algorithms on the
Stream Analytics dataset [1]. (c) Performance of the algorithms on the Letters dataset [20]. (d) Legend.
.
The proof of Theorem 2 has been deferred to Appendix B. Now, we will delve deeper into the instance
dependent terms in Theorems 1 and 2.
of Theorem 1 and 2 imply the following corollary.
The proofs
PN โ1
โ2(k)
ยต) , 1 + k=2 1 โ โ2
Corollary 1. Let ฮป(ยต
. We have the following regret bounds:
(k+1)
(i) For Algorithm 1 with estimator (3), R(T ) โค O
M 2 log2 (6/โ(2) ) log T
โ(2)
(ii) Similarly for Algorithm 1 with estimator (6), R(T ) โค O
ฯ 2 log T
โ(2)
ยต), โ1
min ฮป(ยต
.
(2)
ยต), โ1
min ฮป(ยต
.
(2)
Corollary 1 leads us to our next result. In Corollary 2 we show that when the โ gaps are uniformly
ยต) is O(log N ), in expectation.
distributed, then the ฮป(ยต
Corollary 2. Consider a generative model where โ(3) โค ... โค โ(N ) are the order statistics of N โ 2 random
variables drawn i.i.d uniform over the interval [โ(2) , 1]. Let pโ denote the measure over these โโs. Then
we have the following:
2
M log N log2 (1/โ(2) ) log T
(i) For Algorithm 1 with estimator (3), Epโ [R(T )] = O
.
โ(2)
2
log T
(ii) For Algorithm 1 with estimator (6), Epโ [R(T )] = O ฯ logโN
.
(2)
Remark 1. Note that our guarantees do not have any term containing K - the number of arms. This
dependence is implicitly captured in the divergence terms among the experts. In fact when the number
of arms K is very large, we expect our divergence based algorithms to perform comparatively better than
other algorithms, whose guarantees explicitly depend on K. This phenomenon is observed in practice in
ยต)
our empirical validation on real world data-sets in Section 7. We also show empirically, that the term ฮป(ยต
grows very slowly with the number of experts on real-world data-sets. This empirical result is included in
Appendix D.
7
Empirical Results
In this section, we will empirically test our algorithms on three real-world multi-class classification datasets,
against other state of the art algorithms for contextual bandits with experts. Any multi-class classification
dataset can be converted into a contextual bandit scenario, where the features are the contexts. At each
time-step, the feature (context) of a sample point is revealed, following which the contextual bandit algorithm
chooses one of the K classes, and the reward observed is 1 if its the correct class otherwise it is 0. This is
bandit feedback as the correct class is never revealed, if not chosen. This method has been widely used to
benchmark contextual bandit algorithms [9, 3], and is in fact implemented in Vowpal Wabbit [2].
9
Our algorithm is run in batches. At the starting of each batch, we add experts trained on prior data
through cost-sensitive classification oracles [8] and also update the divergence terms between experts, which
are estimated from data observed so far. During each batch, Algorithm 1 is deployed with the current
set of experts. The pseudo-code for this procedure is provided in Algorithm 2. We use XgBoost [15] and
Algorithm 2 Batched D-UCB with cost-sensitive classification experts
1:
2:
3:
4:
5:
6:
7:
8:
Let ฮ = {ฯ1 }, which is an expert that chooses arms randomly. For time steps t = 1 to 3K, choose an
arm sampled from expert ฯ1 . t = 3K + 1.
Add experts to ฮ trained on observed data and update divergences.
while t <= T do
โ
for s = t to t + O( t) do
Deploy Algorithm 1 with experts in ฮ .
end for
โ
Let t = t + O( t). Add experts to ฮ trained on observed data and update divergences.
end while
Logistic Regression in scikit-learn [14] with calibration, as the base classifiers for our cost-sensitive oracles.
Bootstrapping is used to generate different experts. At the starting of each batch 4 new experts are added.
The constants are set as c1 = 1, c2 = 4 and c3 = 2 in practice. All the settings are held fixed over all three
data-sets, without any parameter tuning. We provide more details in Appendix D. In the appendix we also
show that the gap dependent term in our theoretical bounds grows much slower compared to UCB-1 bounds
(Fig. 3), as the number of experts increase in the stream analytics dataset [1]. An implementation of our
algorithm can be found here 2 .
We compare against Vopal Wabbit implementations of the following algorithms: (i) -greedy [22] - parameter set at โโepsilon 0.06โ. (ii) First (Greedily selects best expert) - parameter set at โโfirst 100โ. (iii)
Online Cover [3] - parameter set at โโcover 5โ (iv) Bagging (Simulates Thompson Sampling through bagged
classifiers) - parameter set at โโbag 7โ.
Drug Consumption Data: This dataset [19] is a part of UCI repository. It has data from 1885 respondents
with 32 dimensional continuous features (contexts) and their history of drug use. There are 19 drugs under
study (19 arms). For each entry, if the bandit algorithm selects the drug most recently used, the reward
observed is 1, o.w. 0 reward is observed. The performance of the algorithms are shown in Fig. 2a. We
see that D-UCB (Algorithm 2) with median of moments clearly performs the best in terms of average loss,
followed by D-UCB with the clipped estimator. D-UCB with median of moments converges to an average
loss of 0.4 within 1885 samples.
Stream Analytics Data: This dataset [1] has been collected using the stream analytics client. It has
10000 samples with 100 dimensional mixed features (contexts). There are 10 classes (10 arms). For each
entry, if the bandit algorithm selects the correct class, the reward observed is 1, o.w. 0 reward is observed.
The performance of the algorithms are shown in Fig. 2b. In this data-set bagging performs the best closely
followed by the two versions of D-UCB (Algorithm 2). Bagging is a strong competitor empirically, however
this algorithm lacks theoretical guarantees. Bagging converges to an average loss of 8%, while D-UCB with
median of moments converges to an average loss of 10%.
Letters Data: This dataset [20] is a part of the UCI repository. It has 20000 samples of hand-written
English letters, each with 17 hand-crafted visual features (contexts). There are 26 classes (26 arms) corresponding to 26 letters. For each entry, if the bandit algorithm selects the correct letter, the reward observed
is 1, o.w. 0 reward is observed. The performance of the algorithms are shown in Fig. 2c. Both versions of
D-UCB significantly outperform the others. The median of moments based version converges to an average
loss of 0.62, while the clipped version converges to an average loss of 0.68.
2 https://github.com/rajatsen91/CB
StochasticExperts
10
Conclusion
We study the problem of contextual bandits with stochastic experts. We propose two UCB style algorithms,
that use two different importance sampling estimators, which can leverage information leakage between the
stochastic experts. We provide instance-dependent regret guarantees for our UCB based algorithms. Our
algorithms show strong empirical performance on real-world datasets. We believe that this paper introduces
an interesting problem setting for studying contextual bandits, and opens up opportunities for future research
that may include better regret bounds for the problem and an instance-dependent lower-bound.
Acknowledgment
This work is partially supported by NSF SaTC 1704778, ARO W911NF-17-1-0359, and the US DoT supported D-STOP Tier 1 University Transportation Center.
References
[1] Stream analytics dataset. http://bit.ly/2HD8bNH. Accessed: 2018-2-10.
[2] Vowpal wabbit. https://github.com/JohnLangford/vowpal_wabbit. Accessed: 2017-10-10.
[3] Alekh Agarwal, Daniel Hsu, Satyen Kale, John Langford, Lihong Li, and Robert Schapire. Taming the
monster: A fast and simple algorithm for contextual bandits. In International Conference on Machine
Learning, pages 1638โ1646, 2014.
[4] Shipra Agrawal and Navin Goyal. Analysis of thompson sampling for the multi-armed bandit problem.
In Conference on Learning Theory, pages 39โ1, 2012.
[5] Peter Auer. Using confidence bounds for exploitation-exploration trade-offs. Journal of Machine Learning Research, 3(Nov):397โ422, 2002.
[6] Peter Auer, Nicolo Cesa-Bianchi, Yoav Freund, and Robert E Schapire. The nonstochastic multiarmed
bandit problem. SIAM journal on computing, 32(1):48โ77, 2002.
[7] Peter Auer and Ronald Ortner. Ucb revisited: Improved regret bounds for the stochastic multi-armed
bandit problem. Periodica Mathematica Hungarica, 61(1-2):55โ65, 2010.
[8] Alina Beygelzimer and John Langford. The offset tree for learning with partial labels. In Proceedings
of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, pages
129โ138. ACM, 2009.
[9] Alina Beygelzimer, John Langford, Lihong Li, Lev Reyzin, and Robert Schapire. Contextual bandit algorithms with supervised learning guarantees. In Proceedings of the Fourteenth International Conference
on Artificial Intelligence and Statistics, pages 19โ26, 2011.
[10] Leฬon Bottou, Jonas Peters, Joaquin Quinฬonero-Candela, Denis X Charles, D Max Chickering, Elon Portugaly, Dipankar Ray, Patrice Simard, and Ed Snelson. Counterfactual reasoning and learning systems:
The example of computational advertising. The Journal of Machine Learning Research, 14(1):3207โ
3260, 2013.
[11] Djallel Bouneffouf, Amel Bouzeghoub, and Alda Lopes Gancฬงarski. A contextual-bandit algorithm for
mobile context-aware recommender system. In International Conference on Neural Information Processing, pages 324โ331. Springer, 2012.
[12] Seฬbastien Bubeck, Nicolo Cesa-Bianchi, et al. Regret analysis of stochastic and nonstochastic multiarmed bandit problems. Foundations and Trends R in Machine Learning, 5(1):1โ122, 2012.
[13] Seฬbastien Bubeck, Nicolo Cesa-Bianchi, and Gaฬbor Lugosi. Bandits with heavy tail. IEEE Transactions
on Information Theory, 59(11):7711โ7717, 2013.
11
[14] Lars Buitinck, Gilles Louppe, Mathieu Blondel, Fabian Pedregosa, Andreas Mueller, Olivier Grisel,
Vlad Niculae, Peter Prettenhofer, Alexandre Gramfort, Jaques Grobler, et al. Api design for machine
learning software: experiences from the scikit-learn project. arXiv preprint arXiv:1309.0238, 2013.
[15] Tianqi Chen and Carlos Guestrin. Xgboost: A scalable tree boosting system. In Proceedings of the
22nd acm sigkdd international conference on knowledge discovery and data mining, pages 785โ794.
ACM, 2016.
[16] Wei Chu, Lihong Li, Lev Reyzin, and Robert E Schapire. Contextual bandits with linear payoff functions.
In International Conference on Artificial Intelligence and Statistics, pages 208โ214, 2011.
[17] Ira Cohen and Moises Goldszmidt. Properties and benefits of calibrated classifiers. In PKDD, volume
3202, pages 125โ136. Springer, 2004.
[18] Miroslav Dudik, Daniel Hsu, Satyen Kale, Nikos Karampatziakis, John Langford, Lev Reyzin, and Tong
Zhang. Efficient optimal learning for contextual bandits. arXiv preprint arXiv:1106.2369, 2011.
[19] Elaine Fehrman, Awaz K Muhammad, Evgeny M Mirkes, Vincent Egan, and Alexander N Gorban.
The five factor model of personality and evaluation of drug consumption risk. In Data Science, pages
231โ242. Springer, 2017.
[20] Peter W Frey and David J Slate. Letter recognition using holland-style adaptive classifiers. Machine
learning, 6(2):161โ182, 1991.
[21] Tze Leung Lai and Herbert Robbins. Asymptotically efficient adaptive allocation rules. Advances in
applied mathematics, 6(1):4โ22, 1985.
[22] John Langford and Tong Zhang. The epoch-greedy algorithm for multi-armed bandits with side information. In Advances in neural information processing systems, pages 817โ824, 2008.
[23] Finnian Lattimore, Tor Lattimore, and Mark D Reid. Causal bandits: Learning good interventions via
causal inference. In Advances in Neural Information Processing Systems, pages 1181โ1189, 2016.
[24] Lei Li, Dingding Wang, Tao Li, Daniel Knox, and Balaji Padmanabhan. Scene: a scalable two-stage
personalized news recommendation system. In Proceedings of the 34th international ACM SIGIR conference on Research and development in Information Retrieval, pages 125โ134. ACM, 2011.
[25] Lihong Li, Wei Chu, John Langford, and Robert E Schapire. A contextual-bandit approach to personalized news article recommendation. In Proceedings of the 19th international conference on World wide
web, pages 661โ670. ACM, 2010.
[26] Gaฬbor Lugosi and Shahar Mendelson. Sub-gaussian estimators of the mean of a random vector. arXiv
preprint arXiv:1702.00482, 2017.
[27] Rajat Sen, Karthikeyan Shanmugam, Alexandros G. Dimakis, and Sanjay Shakkottai. Identifying best
interventions through online importance sampling. In Proceedings of the 34th International Conference on Machine Learning, volume 70 of Proceedings of Machine Learning Research, pages 3057โ3066,
International Convention Centre, Sydney, Australia, 2017. PMLR.
[28] Liang Tang, Romer Rosales, Ajit Singh, and Deepak Agarwal. Automatic ad format selection via contextual bandits. In Proceedings of the 22nd ACM international conference on Conference on information
& knowledge management, pages 1587โ1594. ACM, 2013.
[29] Cem Tekin, Onur Atan, and Mihaela Van Der Schaar. Discover the expert: Context-adaptive expert
selection for medical diagnosis. IEEE Transactions on Emerging Topics in Computing, 3(2):220โ234,
2015.
[30] Cem Tekin, Jinsung Yoon, and Mihaela van der Schaar. Adaptive ensemble learning with confidence
bounds for personalized diagnosis. In AAAI Workshop: Expanding the Boundaries of Health Informatics
Using AI, 2016.
12
A
Clipped Estimator
As mentioned in Section 5, the motivating equation guiding the design of our estimators is Eq. (2). This
equation tells us that even when the statistics of the samples observed are governed by the distribution of
(X, V, Y ) under expert j, we can infer the mean of expert k. Such observations were made in [23, 27] in
the context of best arm identification problems. Suppose we observe t samples under expert ฯj . Guided
by Eq. (2), one might come up with the following naive importance sampled estimator for the mean under
expert k (ยตk ):
t
ยตฬk =
ฯk (Vj (s)|Xj (s))
1X
Yj (s)
.
t s=1
ฯj (Vj (s)|Xj (s))
However, it is not possible to derive good confidence interval for the above estimator because even though
the reward variable Y is bounded, the reweighing term ฯk (Vj (s)|Xj (s))/ฯj (Vj (s)|Xj (s)) can be unbounded
and in some case heavy-tailed. The key idea is to come up with robust estimators that have good variance
properties. One approach of controlling the variance of such estimators is to clip that the samples that are
too large. This leads to the following clipped estimator [27]:
t
ยตฬk =
ฯk (Vj (s)|Xj (s))
1X
Yj (s)
ร1
t s=1
ฯj (Vj (s)|Xj (s))
ฯk (Vj (s)|Xj (s))
โค ฮทkj .
ฯj (Vj (s)|Xj (s))
(9)
The clipping makes the estimator biased, however it helps in controlling the variance. The clipper level ฮทkj
which depends on the relationship between ฯk and ฯj needs to be set carefully to control the bias-variance
trade-off. In [27], it has been shown that if the log-divergence measure Mkj (defined in (2)) is bounded, then
a good choice is ฮทkj = 2 log(2/)Mkj , if we want an additive bias of at most (t)/2 (Theorem 3 in [27]).
This idea can be generalized to estimating the mean of expert k, while observing samples from all the other
experts. This leads to the clipped estimator in Eq. (3). Lemma 1 provides confidence guarantees for this
estimator. The proof of this lemma follows from Theorem 4 in [27], but we include it here for completeness.
In what follows, we will abbreviate Epj (.) [.] as Ej [.]. In this section let ยตฬk (t) = ยตฬck (t).
Proof of Lemma 1. Note that from Lemma 3 in [27] it follows that:
Ej [ยตฬk (t)] โค ยตk โค Ej [ยตฬk (t)] +
(t)
.
2
(10)
For the sake of analysis, let us consider the rescaled version ยตฬk (t) = (Zk (t)/t)ยตฬk (t) which can be written as:
N
ฯk (Vj (s)|Xj (s))
ฯk (Vj (s)|Xj (s))
1XX 1
Yj (s)
ร1
โค 2 log(2/(t))Mkj .
ยตฬk (t) =
t j=0
Mkj
ฯj (Vj (s)|Xj (s))
ฯj (Vj (s)|Xj (s))
(11)
sโTj
Since Yj (s) โค 1, we have every random variable in the sum in (11) bounded by 2 log(2/(t))
Let, ยตฬk = E[ยตฬk (t)]. Therefore by Chernoff bound, we have the following chain:
ฮด2 t
P (|ยตฬk (t) โ ยตฬk | โค ฮด) โค 2 exp โ
8(log(2/(t)))2
t
t
t
ฮด2 t
=โ P |ยตฬk (t)
โ ยตฬk
|โคฮด
โค 2 exp โ
Zk (t)
Zk (t)
Zk (t)
8(log(2/(t)))2
2
t
ฮด t
=โ P |ยตฬk (t) โ ยตฬk | โค ฮด
โค 2 exp โ
Zk (t)
8(log(2/(t)))2
2 !
ฮด2 t
Zk (t)
=โ P (|ยตฬk (t) โ ยตฬk | โค ฮด) โค 2 exp โ
8(log(2/(t)))2
t
13
(12)
Now we can combine Equations (12) and (10) to obtain:
ฮด2 t
P (ยตk โ ฮด โ (t)/2 โค ยตฬk (t) โค ยตk + ฮด) โฅ 1 โ 2 exp โ
8(log(2/(t)))2
Zk (t)
t
2 !
Now, we will prove Theorem 1. Note that we will re-index the experts such that 0 = โ(1) โค โ(2) โค ... โค โ(N ) .
Note that throughout this proof Uk (t), ยตฬk (t) and sk (t) in Algorithm 1 are defined as in Equations (3) and (4)
respectively. Before we proceed let us prove some key lemmas.
First we prove that with high enough probability the upper confidence bound estimate for the optimal expert
k โ is greater than the true mean ยตโ .
Lemma 3. We have the following confidence bound at time t,
1
.
t2
P (Ukโ (t) โค ยตโ ) โฅ 1 โ
Proof. We have the following chain,
1
3ฮฒ(t)
P (Ukโ (t) โฅ ยตโ ) = P (ยตฬkโ (t) โฅ ยตโ โ skโ (t)) = P ยตฬkโ (t) โฅ ยตโ โ
โฅ 1 โ 2.
2
t
The last inequality is obtained by setting ฮด = ฮฒ(t) and (t) = ฮฒ(t) in Lemma 1.
Next we prove that for a large enough time t, the UCB estimate of the k th expert is less than that of
ยตโ .
2
2
k ) log T
Lemma 4. We have the following confidence bound at time t > 144M log โ(6/โ
,
2
k
P (Uk (t) < ยตโ ) โฅ 1 โ
1
.
t2
Proof. We have the following chain,
3ฮฒ(t)
P (Uk (t) > ยตโ ) = P ยตฬk (t) > ยตโ โ
2
(i)
โk
โค P ยตฬk (t) > ยตโ โ
2
(ii)
โk
โค P ยตฬk (t) > ยตk +
2
(iii)
โค
1
.
t2
2
2
k ) log T
Here, (i) follows from the fact that Zkt(t) โฅ 1/M , t > 144M log โ(6/โ
and the definition of ฮฒ(t). (ii) is
2
k
by definition of โk . Finally the concentration bound in (iii) follows from Lemma 1.
Note that Lemmas 3 and 4 together imply,
P (k(t) = k) โค
for k 6= k โ and t >
144M 2 log2 (6/โk ) log T
โ2k
.
14
2
t2
(13)
Proof of Theorem 1. Let Tk =
144M 2 log2 (6/โ(k) ) log T
โ2(k)
for k = 2, .., N . The regret of the algorithm can be
bounded as,
R(T ) โค โ(N ) TN +
โค โ(N ) TN +
โค
=
N
โ3
X
k=0
k=0
โ(N โkโ1) P (1{k(t) โ {(1), ..., (N โ k โ 1)}) +
k=0 t=TN โk
๏ฃซ
TN โkโ1
๏ฃญโ(N โkโ1) (TN โkโ1 โ TN โk ) +
144M 2 log2 (6/โ(N ) ) log T
ฯ2
+
โ(N )
3
X
N
X
!
โ(i) P (1{k(t) = (i)})
i=N โk
๏ฃถ
N
X
2โ(i)
๏ฃธ
t2
t=TN โk i=N โk
!
N
ฮณ(โ(N โkโ1) )
ฯ2 X
1โ
+ โ(N ) TN +
โ(i)
ฮณ(โ(N โk) )
3 i=2
! N โ1
N
X
X 144M 2 log2 (6/โ(k) ) log T
ฮณ(โ(k) )
โ(i) +
1โ
.
โ(k)
ฮณ(โ(k+1) )
i=2
144M 2 log2 (6/โ(N โkโ1) ) log T
โ(N โkโ1)
Here, ฮณ(x) =
B
N
โ3
X
N
โ3 TNX
โkโ1
X
(14)
k=2
2
x
.
log2 (6/x)
Median of Means Estimator
The median of means estimator is popular for estimating statistics under heavy-tailed distribution [13, 26].
We shall see that the median of means based estimator in Eq. (6) has good variance properties, when the
chi-square divergence (Assumption 2) are bounded. Before proving Lemma 2, we will be establishing some
intermediate results.
Lemma 5. Consider the quantity ยตฬrk (t) in Eq. (5). The variance of this quantity is upper bounded as follows:
Var[ยตฬrk (t)] โค
1
1
ฯ2
.
โค
2
m Wk (t)
m
where m = bt/l(t)c.
Proof. We have the following chain,
Var[ยตฬrk (t)]
N
X
X 1
1
ฯk (Vj (s)|X(s))
=
2 Var Yj (s) ร ฯ (V (s)|X (s))
Wk (r, t)2 j=1
ฯkj
j
j
j
(r)
sโTj
โค
1
Wk (r, t)2
N
X
X
j=1 sโT (r)
1
2 Var
ฯkj
ฯk (Vj (s)|X(s))
ฯj (Vj (s)|Xj (s))
j
m
=
Wk (r, t)2
1
=
m PN
1
nj (r,t)
j=1 n(r,t).ฯkj
โค
2
1
1
.
m Wk (t)2
(15)
Now, we can apply Chebyshev to conclude that for all r โ [l(t)],
15
P
|ยตฬrk (t)
1
โ ยตk | โค
Wk (t)
r
4
m
!
โฅ
3
.
4
(16)
Now we will prove Lemma 2.
Proof of Lemma 2. In light of Eq. (16), the probability that the median is not within distance
ยตk is bounded as,
r !
4
1
m
P |ยตฬk (t) โ ยตk | >
Wk (t) m
1
Wk (t)
q
4
m
of
โค P (Bin(l(t), 1/4) > l(t)/2) โค ฮด(t).
This concludes the proof.
Note that we will re-index the experts such that 0 = โ(1) โค โ(2) โค ... โค โ(N ) . Note that throughout this
proof Uk (t), ยตฬk (t) and sk (t) in Algorithm 1 are defined as in Equations (6) and (7) respectively. Before we
proceed let us prove some key lemmas. Now we prove lemmas analogous to Lemmas 4 and 3.
Lemma 6. We have the following confidence bound at time t,
P (Ukโ (t) โค ยตโ ) โฅ 1 โ
1
.
t2
The proof follows directly from Lemma 2.
Lemma 7. We have the following confidence bound at time t >
P (Uk (t) < ยตโ ) โฅ 1 โ
256ฯ 2 log T
โ2k
,
1
.
t2
Proof. We have the following chain,
1
P (Uk (t) > ยต ) = P ยตฬk (t) > ยต โ
Wk (t)
(i)
โk
โ
โค P ยตฬk (t) > ยต โ
2
(ii)
โk
โค P ยตฬk (t) > ยตk +
2
โ
โ
(iii)
โค
r
64 log t
t
!
1
.
t2
Here, (i) follows from the fact that Wk1(t) โค ฯ and t >
concentration bound in (iii) follows from Lemma 2.
256ฯ 2 log T
โ2k
. (ii) is by definition of โk . Finally the
Note that Lemma 7 and 6 together imply that,
P (k(t) = k) โค
for k 6= k โ and t >
256ฯ 2 log T
โ2k
.
16
2
t2
(17)
Proof of Theorem 2. Let Tk =
R(T ) โค โ(N ) TN +
N
โ3 TNX
โkโ1
X
k=0 t=TN โk
256ฯ 2 log T
โ2(k)
for k = 2, .., N . The regret of the algorithm can be bounded as,
P (1{k(t) โ {(1), ..., (N โ k โ 1)}) ร โ(N โkโ1) +
!
N
X
โ(i) P (1{k(t) = (i)})
i=N โk
๏ฃถ
N
X
2โ(i)
๏ฃธ
๏ฃญโ(N โkโ1) (TN โkโ1 โ TN โk ) +
โค โ(N ) TN +
t2
t=TN โk i=N โk
k=0
!
!
N
N
โ3
X
โ2(N โkโ1)
ฯ2 X
512ฯ 2 log T
+ โ(N ) TN +
โค
1โ
โ(i)
โ(N โkโ1)
โ2(N โk)
3 i=2
k=0
!
! N โ1
N
X 512ฯ 2 log T
โ2(k)
512ฯ 2 log T
ฯ2 X
=
.
+
โ(i) +
1โ 2
โ(N )
3 i=2
โ(k)
โ(k+1)
N
โ3
X
๏ฃซ
TN โkโ1
X
(18)
k=2
C
Instance Dependent Terms
In this section we devote our attention to the instance dependent terms in Theorems 1 and 2. We will first
prove Corollary 1.
Proof of Corollary 1. We will prove the two statements about the two estimators separately,
(i) Going back to Lemma 4 in the proof of Theorem 1, we get that,
P(Uk (t) < ยตโ ) โฅ 1 โ
when t >
144M 2 log2 (6/โ(2) ) log T
โ2k
1
t2
. This simply follows from the fact that โ(2) is the smallest gap. Therefore,
the chain leading to Eq. (14) follows with the new definition of Tk =
144M 2 log2 (6/โ(2) ) log T
โ2(k)
. Hence, the regret
of Algorithm 1 under estimator (3) is bounded as follows:
144M 2 log2 (6/โ(2) ) log T
R(T ) โค
โ(2)
=
1+
N
โ1
X
k=2
ยต)M 2 log2 (6/โ(2) ) log T
144ฮป(ยต
ฯ2
+
โ(2)
3
N
X
1โ
โ2(k)
!!
โ2(k+1)
!
โ(i)
.
ฯ2
+
3
N
X
!
โ(i)
i=2
(19)
i=2
We can analyze the same terms in an alternate manner. From Eq. (14) in the proof of Theorem 1, it follows
that the regret of Algorithm 1 under the clipped estimator is bounded by,
!
ฯ2 X
R(T ) โค โ(N ) T2 +
โ(i) .
3
i
Using the definition of T2 in (14) we obtain:
R(T ) โค
144M 2 log2 (6/โ(2) ) log T
1
ร
.
โ(2)
โ(2)
Combining the above equation with (19) we get the desired result.
17
(ii) Theorem 2 immediately implies that
ยต)ฯ 2 log T
ฯ2
256ฮป(ยต
+
R(T ) โค
โ(2)
3
N
X
!
โ(i)
,
i=2
for the median of means estimator.
We can alternately analyze the regret as follows. From Eq. (18) in the proof of Theorem 2, it follows that
the regret of Algorithm 1 under the median of means estimator is bounded by,
!
ฯ2 X
R(T ) โค โ(N ) T2 +
โ(i) .
3
i
Using the definition of T2 in (18) we obtain:
R(T ) โค
256ฯ 2 log T
1
ร
.
โ(2)
โ(2)
Combining the equations above we get the desired result.
Now we will work under the assumption that the gaps in the means of the experts are generated according
to the generative model in Corollary 2.
ยต)] = O(log N ).
Proof of Corollary 2. In light of Corollary 1, we just need to prove that Epโ [ฮป(ยต
Now, we will assume that {โ(i) } for i = 3, ..., N , are order statistics of N โ 2 i.i.d uniform r.vs over the
interval [โ(2) , 1].
Note that by Jensenโs we have the following:
" 2 #
โ(k)
โ(k) 2
1โE
.
โค1โE
โ2(k+1)
โ(k+1)
(20)
Let X = โ(k) and Y = โ(k+1) for k โฅ 3. The joint pdf of X, Y is given by,
(N โ 2)!
f (x, y) =
(k โ 1)!(N โ 3 โ k)!
x โ โ(2)
1 โ โ(2)
kโ1
y โ โ(2) N โ3โk
1
ร 1โ
.
1 โ โ(2)
(1 โ โ(2) )2
Therefore, we have the following chain:
Z 1
Z y
x โ โ(2) kโ1
y โ โ(2) N โ3โk
X
x
(N โ 2)!
1
=
ร
1โ
dxdy
2
Y
y
(k
โ
1)!(N
โ
3
โ
k)!
1
โ
โ
1
โ
โ
(1
โ
โ
(2)
(2)
(2) )
y=โ(2) x=โ(2)
Z 1 Z b
(1 โ โ(2) )a + โ(2)
(N โ 2)!
kโ1
N โ3โk
=
ร (a)
(1 โ b)
dadb
(1
โ
โ
)b
+
โ
(k
โ
1)!(N
โ
3
โ
k)!
(2)
(2)
b=0 a=0
Z 1 Z b
a
(N โ 2)!
kโ1
N โ3โk
ร (a)
(1 โ b)
dadb
โฅ
b=0 a=0 b (k โ 1)!(N โ 3 โ k)!
k
=
.
k+1
E
18
Combining this with Eq (20) yields,
Epโ
"N โ1
X
k=2
1โ
โ2(k)
!#
โ2(k+1)
N
โ1
X
k2
โค1+
1โ
(k + 1)2
k=3
N
โ1
X
2k + 1
=1+
(k + 1)2
k=3
โค1+
N
โ1
X
k=3
2
k+1
(21)
โค 1 + 2 log N.
D
More on Empirical Results
Instance Dependent Term
In this section we provide more details about our empirical results under the following sub-headings.
D-UCB Term
UCB1 Term
200
150
100
50
0
25
50
75
100
Number of Experts: N
Figure 3: We plot the instance-dependent terms from D-UCB bounds (the term in Theorem 2 involving the gaps (22))
and that of UCB-1 bounds (23) as the number of experts grows in the stream analytics dataset. It can be observed
that the instance dependent term from D-UCB grows at a much slower pace with the number of experts, and in fact
stops increasing after a certain point.
Training of Stochastic Experts: In Algorithm 2, new experts are added before starting a new batch.
These stochastic experts are classifying functions trained using cost-sensitive classification oracles on data
observed so far, which uses the ideas in [8]. The key idea is to reduce the cost-sensitive classification problem
into importance weighted classification, which can be solved using binary classifiers by providing weights to
each samples. Suppose a context x is observed and Algorithm 2 chooses an expert ฯi and draws an arm a
from the conditional distribution ฯi (V |x). Suppose the reward observed is r(a). Then the training sample
(x, a) with a sample weight of r(a)/ฯi (a|x) is added to the dataset for training the next batch of experts.
It has been shown that this importance weighing yields good classification experts. These classifiers can
provide confidence scores for arms, given a context and hence can serve as stochastic experts. 4 different
experts are added at the beginning of each batch, out of which three are trained by XgBoost as baseclassifier while one is trained by logistic regression. Diversity is maintained among the experts added by
training them on bootstrapped versions of the data observed so far, and also through selecting different
hyper-parameters. Note that the parameter selection scheme is not tuned per dataset, but is held fixed for
all three datasets.
19
Estimating Divergence Parameters: Both our divergence metrics Mij โs and ฯij โs can be estimated
from data observed so far, during a run of Algorithm 2. These divergences do not depend on the arm chosen,
but only on the context distribution and the conditional distributions encoded by the expert. Therefore,
they can be easily estimated from data observed. Suppose, n contexts have been observed so far {x1 , ..., xn }.
We are interested in estimating ฯij that isPthe chi-square divergence between ฯi and ฯj . An estimator for
n
this would be the empirical mean (1/n) ร k=1 Df2 (ฯi (.|xk )kฯj (.|xk )). Note that the distribution over the
arms ฯj (.|xk ) is nothing but the confidence scores observed through evaluation of the classifying oracle ฯj on
the features/context xi . In order to be robust, we use the median of means estimator instead of the simple
empirical mean for estimating the divergences.
Empirical Analysis of Instance Dependent terms: In this section we empirically validate that our
instance dependent terms in Theorem 1 and 2 are indeed much smaller compared to corresponding terms in
the UCB-1 [5] regret bounds, even in real problem where our generative assumptions do not hold. In order
to showcase this, we plot the instance-dependent term in Theorem 2 which is given by,
!
N
โ1
X
โ2(k)
1
1
1โ 2
+
(22)
โ(k)
โ(k+1)
โ(N )
k=2
along with the corresponding term in UCB-1 bounds given by,
N
X
k=2
1
,
โ(k)
(23)
as the number of stochastic experts grow in the stream dataset experiments in Section 7. The true means of
the experts have been estimated in hindsight over the whole dataset. The plot is shown in Fig. 3. It can be
observed that the term in the bounds of D-UCB grows at a much slower pace, and in fact stops increasing
with the number of experts after a certain point.
20
| 2cs.AI
|
TRANSACTIONS OF THE
AMERICAN MATHEMATICAL SOCIETY
Volume 00, Number 0, Pages 000โ000
S 0002-9947(XX)0000-0
arXiv:1601.08231v5 [math.RA] 22 Jan 2018
GENERALIZED NIL-COXETER ALGEBRAS
OVER DISCRETE COMPLEX REFLECTION GROUPS
APOORVA KHARE
Abstract. We define and study generalized nil-Coxeter algebras associated
to Coxeter groups. Motivated by a question of Coxeter (1957), we construct the first examples of such finite-dimensional algebras that are not the
โusualโ nil-Coxeter algebras: a novel 2-parameter type A family that we call
N CA (n, d). We explore several combinatorial properties of N CA (n, d), including its Coxeter word basis, length function, and HilbertโPoincareฬ series,
and show that the corresponding generalized Coxeter group is not a flat deformation of N CA (n, d). These algebras yield symmetric semigroup module
categories that are necessarily not monoidal; we write down their Tannakaโ
Krein duality.
Further motivated by the BroueฬโMalleโRouquier (BMR) freeness conjecture [J. reine angew. math. 1998], we define generalized nil-Coxeter algebras N CW over all discrete real or complex reflection groups W , finite or
infinite. We provide a complete classification of all such algebras that are
finite-dimensional. Remarkably, these turn out to be either the usual nilCoxeter algebras, or the algebras N CA (n, d). This proves as a special case โ
and strengthens โ the lack of equidimensional nil-Coxeter analogues for finite
complex reflection groups. In particular, generic Hecke algebras are not flat
deformations of N CW for W complex.
Contents
1. Introduction and main results
2971
2. Background and motivation
2977
3. Proof of Theorem A: Tannakian formalism for semigroup categories 2979
4. Proof of Theorem B: Distinguished basis of words
2980
5. Proof of Theorem C, primitive elements, and categorification
2987
6. Proof of Theorem D: Finite-dimensional generalized nil-Coxeter algebras2990
Acknowledgments
2996
References
2996
1. Introduction and main results
Throughout this paper, k will denote a fixed unital commutative ground ring.
In this paper we define and study generalized nil-Coxeter algebras associated
to Coxeter groups, and more generally to all discrete complex reflection groups,
2010 Mathematics Subject Classification. 20F55 (Primary), 20F05, 20C08 (Secondary).
Key words and phrases. Complex reflection group, generalized Coxeter group, generalized nilCoxeter algebra, length function.
c XXXX American Mathematical Society
2971
2972
APOORVA KHARE
finite or infinite. These are algebras that map onto the associated graded algebras
of (generic) Hecke algebras over complex reflection groups and of IwahoriโHecke
algebras over Coxeter groups. As we discuss, working with these algebras allows
for a broader class than the corresponding reflection groups.
We begin with real groups. Coxeter groups and their associated Hecke algebras
play an important role in representation theory, combinatorics, and mathematical
physics. Each such group is defined by a Coxeter matrix, i.e. a symmetric โintegerโ
matrix M := (mij )i,jโI with I finite and mii = 2 6 mij 6 โ โi 6= j. The Artin
>0
monoid BM
associated to M is generated by {Ti : i โ I} modulo the braid relations
Ti Tj Ti ยท ยท ยท = Tj Ti Tj ยท ยท ยท for all i 6= j with mij < โ, with precisely mij factors on
either side. The Artin group (or generalized braid group) BM is the group generated
by these relations; typically we use {si : i โ I} to denote its generators. There are
three well-studied algebras associated to the matrix M : the group algebra kW (M )
of the Coxeter group, the 0-Hecke algebra [Ca, No], and the nil-Coxeter algebra
N C(M ) [FS] (also called the nilCoxeter algebra, nil Coxeter algebra, and nil Hecke
ring in the literature). These are all free k-modules, with a โCoxeter word basisโ
{Tw : w โ W (M )} and length function `(Tw ) := `(w) in W (M ); in each of them
the Ti satisfy a quadratic relation.
In a sense, the usual nil-Coxeter algebras N C(M ) are better-behaved than all
other generic Hecke algebras (in which Ti2 = ai Ti + bi for scalars ai , bi , see [Hum,
Chapter 7]): the words Tw have unique lengths and form a monoid together with
0. Said differently, the algebras N C(M ) are the only generic Hecke algebras that
are graded with Ti homogeneous of positive degree. Indeed, if deg Ti = 1 โi, then
Q
d
โ1
and di are
N C(M ) has HilbertโPoincareฬ polynomial iโI [di ]q , where [d]q := qqโ1
the exponents of W (M ).
We now introduce the main objects of interest in the present work: generalized
Coxeter matrices and their associated nil-Coxeter algebras (which are always Z>0 graded).
Definition 1.1. Define a generalized Coxeter matrix to be a symmetric โintegerโ
matrix M := (mij )i,jโI with I finite, 2 6 mij 6 โ โi 6= j, and mii < โ โi. Now
fix such a matrix M .
(1) Given an integer vector d = (di )iโI with di > 2 โi, define M (d) to be the
matrix replacing the diagonal in M by d.
(2) The generalized Coxeter group W (M ) is the quotient of the braid group
ii
BM2 by the order relations sm
= 1 โi, where M2 is the Coxeter matrix
i
M ((2, . . . , 2)). We remark that we used the familiar Artin group BM2 associated to the Coxeter group W (M2 ); we could just as well have written BM ,
since the diagonals of the matrices M2 and M play no role in BM2 = BM .
(3) The braid diagram, or Coxeter graph of M (or of W (M )) has vertices indexed by I, and for each pair i 6= j of vertices, mij โ 2 edges between
them.
(4) Define the corresponding generalized nil-Coxeter algebra as follows (with
M2 as above):
(1.2)
>0
kBM
khTi , i โ Ii
2
N C(M ) :=
=
,
(Ti Tj Ti ยท ยท ยท = Tj Ti Tj ยท ยท ยท, Timii = 0, โi 6= j โ I)
(Timii = 0 โi)
| {z } | {z }
mij times
mij times
GENERALIZED NIL-COXETER ALGEBRAS OVER COMPLEX REFLECTION GROUPS2973
where we omit the braid relation Ti Tj Ti ยท ยท ยท = Tj Ti Tj ยท ยท ยท if mij = โ.
(5) Given d = (di )iโI as above, define WM (d) := W (M (d)) and N CM (d) :=
N C(M (d)).
We are interested in the family of (generalized) nil-Coxeter algebras for multiple
reasons: category theory, real reflection groups, complex reflection groups, and
deformation theory. We elaborate on these motivations in this section and the
next.
1.1. TannakaโKrein duality for semigroup categories. In [Kho], the representation categories Rep N C(An ) were used to categorify the Weyl algebra. For
now we highlight two properties of generalized nil-Coxeter algebras N C(M ) which
also have categorical content: (i) for no choice of coproduct on N C(M ) can it
be a bialgebra (shown below); and (ii) every algebra N C(M ) is equipped with a
cocommutative coproduct โ : Ti 7โ Ti โ Ti for all i โ I.
Viewed through the prism of representation categories, the coproduct in (ii)
equips Rep N C(M ) with the structure of a symmetric semigroup category [ES,
ยง13,14]. Note by (i) that the simple module k does not serve as a unit object, whence
Rep N C(M ) is necessarily not monoidal. It is natural to apply the Tannakian
formalism to such categories with โtensorโ structure. We record the answer which,
while not surprising once formulated, we were unable to find in the literature.
Definition 1.3. A semigroup-tensor category is a semigroup category (C, โ) which
is also additive and such that โ is bi-additive.
Theorem A. Let A be an associative unital algebra over a field k, C := Rep A,
and F : C โ Veck the forgetful functor.
(1) Any semigroup-tensor structure on C together with a tensor structure on F
equips A with a coproduct โ : A โ A โ A that is an algebra map.
(2) If the semigroup-tensor structure on C is braided (respectively, symmetric),
then (A, โ) is a quasi-triangular (respectively, triangular) algebra with coproduct. This simply means there exists an invertible element R โ A โ A
satisfying the โhexagon relationsโ
(1 โ โ)R = R13 R12 ,
and such that โ
1 โ 1.
op
= RโR
โ1
(โ โ 1)R = R13 R23 ,
. Triangularity means further that RR21 =
Notice that generalized nil-Coxeter algebras are indeed examples of such triangular algebras, with a (cocommutative) coproduct but no counit. Such algebras are
interesting in the theory of PBW deformations of smash product algebras; see Section 2. We also show below how to obtain an โhonestโ symmetric tensor category
from each algebra N C(M ), via a central extension.
As noted above, Theorem A is in a sense โexpectedโ, and serves to act more as
motivation. That the algebras N C(M ) provide concrete examples of symmetric,
nonmonoidal semigroup-tensor categories is novel. The main results below now
focus on the algebras N C(M ) themselves.
1.2. Real reflection groups and novel family of finite-dimensional nilCoxeter algebras. Our next result constructs a novel family of generalized nilCoxeter algebras of type A, which are finite-dimensional. Classifying the finitedimensional objects in Coxeter-type settings in algebra and combinatorics has been
2974
APOORVA KHARE
a subject of tremendous classical and modern interest, including Weyl, Coxeter,
and complex reflection groups, their nil-Coxeter and associated Hecke algebras;
but also finite type quivers, Kleinian singularities, the McKayโSlodowy correspondence, simple Lie algebras, etc. A very recent setting involves the classification
of finite-dimensional Nichols algebras. Some of the prominent ingredients in the
study of these algebras are common to the present work. See [GHV, HV1, HV2]
for more details. Another famous recent classification is that of finite-dimensional
pointed Hopf algebras [AnSc], which turn out to arise from generalized small quantum groups. With these motivations, our goal is to similarly classify all generalized
nil-Coxeter algebras, and our next result presents the first novel family of such
examples.
We remark that in equation (1.2), in generalizing the โorder relationsโ from
Ti2 = 0 to Timii = 0 we were also motivated by another such setting: the classical
work of Coxeter [Cox3], which investigated generalized Coxeter matrices M for
which the group W (M ) is finite. Specifically, Coxeter considered the (type A)
Artin braid group BAnโ1 , and instead of quotienting by the relations s2i = 1 to
obtain the symmetric group Sn , he worked with spi = 1 โi โ I. Coxeter was
interested in computing for which (n, p) is the quotient group WAnโ1 ((p, . . . , p)) a
finite group, and what is its order. He showed (see also [As]) that WAnโ1 ((p, . . . , p))
is finite if and only if n1 + p1 > 21 , in which case the size of the quotient group is
1โn
1
1
1
ยท n!/nnโ1 . Coxeterโs result was extended by Koster in his thesis
+
โ
n
p
2
[Ko] to completely classify the โgeneralized Coxeter groupsโ W (M ) that are finite.
These turn out to be precisely the finite Coxeter groups and the Shephard groups.
Parallel to the above classical works, we wish to understand for which matrices
M is the algebra N C(M ) finitely generated as a k-module. If W (M ) is a Coxeter
group, then dim N C(M ) = |W (M )|. Few other answers are known. For instance,
Marin [Mar] has shown that the algebra N CA2 ((m, n)) is not finitely generated
when m, n > 3. However, apart from the usual nil-Coxeter algebras, to our knowledge no other finitely generated algebras N C(M ) were known to date.
In the following result, following Coxeterโs construction in type A above, we
exhibit the first such finite-dimensional family of algebras N C(M ).
Theorem B. Given integers n > 1 and d > 2, define the k-algebra
(1.4)
N CA (n, d) := N CAn ((2, . . . , 2, d)).
In other words, N CA (n, d) is generated by T1 , . . . , Tn , with relations:
(1.5)
(1.6)
(1.7)
โ 0 < i < n;
Ti Ti+1 Ti = Ti+1 Ti Ti+1 ,
Ti Tj = Tj Ti ,
T12
= ยทยทยท =
2
Tnโ1
=
Tnd
โ |i โ j| > 1;
= 0.
Then N CA (n, d) is a free k-module, with k-basis of n!(1 + n(d โ 1)) generators
{Tw : w โ Sn } t {Tw Tnk Tnโ1 Tnโ2 ยท ยท ยท Tm+1 Tm : w โ Sn , k โ [1, dโ1], m โ [1, n]}.
In particular, for all l โ [1, n โ 1], the subalgebra Rl generated by T1 , . . . , Tl is
isomorphic to the usual nil-Coxeter algebra N CAl ((2, . . . , 2)).
GENERALIZED NIL-COXETER ALGEBRAS OVER COMPLEX REFLECTION GROUPS2975
Remark 1.8. We adopt the following notation in the sequel without further reference: let
(1.9)
wโฆ โ Sn+1 , wโฆ0 โ Sn , wโฆ00 โ Snโ1 denote the respective longest elements,
where the symmetric group Sl+1 corresponds to the k-basis of the algebra Rl for
l = n โ 2, n โ 1, n.
The algebras N CA (n, d) have not been studied previously for d > 2, and we begin
to explore their properties. When d = 2, N CA (n, d) specializes to the usual nilCoxeter algebra of type An . In this vein, we present three properties of N CA (n, d)
akin to the usual nil-Coxeter algebras.
Theorem C. Fix integers n > 1 and d > 2.
(1) The algebra N CA (n, d) has a length function that restricts to the usual
length function `Anโ1 on Rnโ1 ' N CAnโ1 ((2, . . . , 2)) (from Theorem B),
and
(1.10)
`(Tw Tnk Tnโ1 ยท ยท ยท Tm ) = `Anโ1 (w) + k + n โ m,
for all w โ Sn , k โ [1, d โ 1], and m โ [1, n].
(2) There is a unique longest word Twโฆ0 Tndโ1 Tnโ1 ยท ยท ยท T1 of length
ln,d := `Anโ1 (wโฆ0 ) + d + n โ 2.
(3) If k is a field, then N CA (n, d) is local, with unique maximal ideal m generated by T1 , . . . , Tn . For all k, the ideal m is nilpotent with m1+ln,d = 0.
We also study the algebra N CA (n, d) in connection to Khovanovโs categorification of the Weyl algebra. See Proposition 5.6 below.
1.3. Complex reflection groups and BMR freeness conjecture. Determining the finite-dimensionality of the algebras N C(M ) is strongly motivated by the
study of complex reflection groups and their Hecke algebras. Recall that such groups
were enumerated by ShephardโTodd [ST]; see also [Coh, LT]. Subsequently, Popov
[Pop1] classified the infinite discrete groups generated by affine unitary reflections;
in the sequel we will term these infinite complex reflection groups. For more on
these groups, see e.g. [BS, Hug1, Hug2, Mal, ORS, ReS] and the references therein.
For complex reflection groups, an important program is the study of generic
Hecke algebras over them, as well as the associated BMR freeness conjecture of
Broueฬ, Malle, and Rouquier [BMR1, BMR2] (see also the recent publications [Et,
Lo, Mar, MP] and the thesis [Ch]). This conjecture connects the dimension of a
generic Hecke algebra to the order of the underlying reflection group. Here we will
study this connection for the corresponding nil-Coxeter algebras, which we define
as follows given [Be, BMR2].
Definition 1.11. Suppose W is a discrete (finite or infinite) complex reflection
group, together with a finite generating set of complex reflections {si : i โ I}, the
ii
order relations sm
= 1 โi, a set of braid relations {Rj : j โ J} โ each involving
i
words with at least two distinct reflections si โ and for the infinite non-Coxeter
complex reflection groups W listed in [Mal, Tables I, II], one more order relation
R0m0 = 1. Now define I0 := I t {0} for these infinite non-Coxeter complex reflection
2976
APOORVA KHARE
groups W , and I0 := I otherwise. Given an integer vector d โ NI0 with di > 2 โi,
define the corresponding generalized nil-Coxeter algebra to be
(1.12)
N CW (d) :=
({Rj0 , j
โ
khTi , i โ Ii
,
= 0 โi โ I, (R00 )d0 = 0)
J}, Tidi
where the braid relations Rj are replaced by the corresponding relations Rj0 in the
alphabet {Ti : i โ I}, and similarly for R00 if R0m0 = 1 in W . There is also the notion
of the corresponding braid diagram as in [BMR2, Tables 1โ4] and [Mal, Tables I,
II]; this is no longer always a Coxeter graph.
Note by [Pop1, ยง1.6] that in the above definition, one has to work with a specific
presentation for complex reflection groups, as there is no canonical (minimal) set
of generating reflections. See [Ba] for related work.
There is no known finite-dimensional generalized nil-Coxeter algebra associated
to a finite complex reflection group. Indeed, Marin mentions in [Mar] that a key
difference between real and complex reflection groups W is the lack of nil-Coxeter
algebras of dimension precisely |W | for the latter. This was verified in some cases
for complex reflection groups in loc. cit. Our final result shows this assertion โ and
in fact a stronger statement โ for all discrete finite and infinite, real and complex
reflection groups. Even stronger (a priori ): we provide a complete classification
of finite-dimensional generalized nil-Coxeter algebras for all such groups. Notice
by [Pop1, Theorem 1.4] that it suffices to consider only the groups whose braid
diagram is connected.
Theorem D. Suppose W is any irreducible discrete real or complex reflection
group. In other words, W is a real reflection group with connected braid diagram,
or a complex reflection group with connected braid diagram and presentation given
as in [BMR2, Tables 1โ4], [Mal, Tables I, II], or [Pop1, Table 2]. Also fix an integer
vector d with di > 2 โi (including possibly for the additional order relation as in
[Mal]). Then the following are equivalent:
(1) The generalized nil-Coxeter algebra N CW (d) is finitely generated as a kmodule.
(2) Either W is a finite Coxeter group and di = 2 โi, or W is of type An and
d = (2, . . . , 2, d) or (d, 2, . . . , 2) for some d > 2.
(3) The ideal m generated by {Ti : i โ I} is nilpotent.
If these assertions hold, there exists a length function and a unique longest element
in N CW (d), say of length l; now m1+l = 0.
In other words, the only finite-dimensional examples (when k is a field) are the
usual nil-Coxeter algebras, and the algebras N CA (n, d). Note also that all of the
above results are characteristic-free.
A key tool in proving both Theorems B and D is a diagrammatic calculus, which
is akin to crystal theory from combinatorics and quantum groups.
1.4. Further questions and Organization of the paper. To our knowledge,
the algebras N CA (n, d) for d > 2 are a novel construction โ and in light of Theorem D, the only finite-dimensional generalized nil-Coxeter algebras other than the
โusualโ ones. In particular, a further exploration of their properties is warranted.
We conclude this section by discussing some further directions.
GENERALIZED NIL-COXETER ALGEBRAS OVER COMPLEX REFLECTION GROUPS2977
(1) Nil-Coxeter algebras are related to flag varieties [BGG, KK], categorification [Kho, KL], and symmetric function theory [BSS]. Also recall, the
divided difference operator representation of the usual type A nil-Coxeter
algebra N CA (n, 2) is used to define Schubert polynomials [FS, LS], and the
polynomials the Ti simultaneously annihilate are precisely the symmetric
polynomials. It will be interesting to determine if N CA (n, d), d > 2 has a
similar โnaturalโ representation as operators on a polynomial ring; and if
so, to consider the polynomials one obtains analogously. (See [Mar] for a
related calculation.) We observe here that for d > 2, the algebra N CA (n, d)
does not โcome fromโ a finite reflection group, as it is of larger dimension
than the corresponding generalized Coxeter group, by equation (2.1) below.
(2) Given both the connection to Coxeter groups as well as the crystal methods
used below, it will be interesting to explore if the algebras N CA (n, d) are
connected to crystals over some Lie (super)algebra.
(3) Our proof of Theorem D below involves a case-by-case argument, running
over all discrete complex reflection groups. A type-free proof of this result
would be desirable.
The paper is organized as follows. In Section 2 we elaborate on our motivations
and make additional remarks. In the following four sections we prove, in turn, the
four main theorems above.
2. Background and motivation
In this section we elaborate on some of the aforementioned motivations for studying generalized nil-Coxeter algebras and their finite-dimensionality. First, these algebras are interesting from a categorical perspective, as their module categories are
symmetric semigroup-tensor categories (see Definition 1.3) but are not monoidal.
We will discuss in the next section a TannakaโKrein duality for such categories, as
well as a central extension to a symmetric tensor category.
The second motivation comes from real reflection groups: we provide a novel
family of finite-dimensional algebras N CA (n, d) of type A (akin to the work of
Coxeter [Cox3] and Koster [Ko]). In this context, it is remarkable (by Theorem D)
that the algebras N CA (n, d) and the usual nil-Coxeter algebras N CW ((2, . . . , 2))
are the only finite-dimensional examples.
As Theorem C shows, the algebras N CA (n, d) for d > 2 are similar to their
โusualโ nil-Coxeter analogues for d = 2. Note however that these algebras also
differ in key aspects. See Theorem 5.2 and Proposition 5.3, which show in particular
that for N CA (n, d) with d > 2, there are multiple โmaximalโ words, i.e., words
killed by left- and right-multiplication by every generator Ti . A more fundamental
difference arises out of considerations of flat deformations, which we make precise
in the remarks around equation (2.1) below.
Our third motivation comes from complex reflection groups and is of much recent interest: the BMR freeness conjecture, which discusses the equality of dimensions of generic Hecke algebras and (the group algebra of) the underlying finite
complex reflection group. In this paper we study the associated graded algebra,
i.e. where all deformation parameters are set to zero. As shown by Marin [Mar]
in some of the cases, non-Coxeter reflection groups do not come equipped with
finite-dimensional nil-Coxeter analogues. We make this precise in a strong way in
2978
APOORVA KHARE
Theorem D above, for all complex reflection groups W . In particular, Theorem
D shows that generic Hecke algebras are not flat deformations of their underlying (associated graded) nil-Coxeter analogues for complex W . This is a property
shared by the algebras N CA (n, d) for d > 2 (but not by IwahoriโHecke algebras of
Coxeter groups W = W (M ), which are flat deformations of N C(M )). Indeed, if
Mn,d denotes the generalized Coxeter matrix corresponding to N CA (n, d), then we
claim that:
(2.1)
(
(n + 1)!,
if d > 2 is even,
dim N CA (n, d) = n!(1 + n(d โ 1)) > |W (Mn,d )| =
1,
if d > 2 is odd.
To see (2.1), if mij is odd for any generalized Coxeter matrix M = M (d), then
si , sj are conjugate in W (M ), whence sgi = sgj = 1 in W (M ) for g = gcd(di , dj ). On
the other hand, N CM (d) surjects onto the nil-Coxeter algebra N CM ((2, . . . , 2)) if
di > 2 โi. Now if di , dj > 2 are coprime, say, then si generates the trivial subgroup
of W (M ), while Ti does not vanish in N C(M ).
The generic Hecke algebras discussed above fit in a broader framework of deformation theory, which provides a fourth motivation behind this paper (in addition
to the question of flatness discussed above). The theory of flat/PBW deformations of associative algebras is an area of sustained activity, and subsumes Drinfeld
Hecke/orbifold algebras [Dr], graded affine Hecke algebras [Lu], symplectic reflection algebras and rational Cherednik algebras [EG], infinitesimal and other Hecke
algebras, and other programs in the literature. We also highlight the program of
Shepler and Witherspoon; see [SW1, SW2] and the references therein. In all of
these settings, a bialgebra A (usually a Hopf algebra) acts on a vector space V and
hence on a quotient SV of its tensor algebra, and one characterizes the deformations of this smash-product algebra A n SV which are flat, also termed the โPBW
deformationsโ.
In this regard, the significance of the generalized nil-Coxeter algebras N C(M )
is manifold. First, the above bialgebra settings were extended in recent work [Kha]
to the framework of โcocommutative algebrasโ A, which also include the algebras N CW (d). Moreover, we characterized the PBW deformations of A n Sym(V ),
thereby extending in loc. cit. the PBW theorems in the previously mentioned works.
The significance of our framework incorporating A = N CW (d) along with the previously studied algebras, is that the full Hopf/bialgebra structure of A โ specifically,
the antipode or even counit โ is not required in order to characterize the flat deformations of A n Sym(V ).
Coming to finite-dimensionality, it was shown in the program of Shepler and
Witherspoon (see e.g. [SW2]), and then in [Kha], that when the algebra A with
coproduct is finite-dimensional over a field k, it is possible to characterize the graded
k[t]-deformations of A n Sym(V ), whose fiber at t = 1 has the PBW property.
For A = N CW (d), this deformation-theoretic consideration directly motivates our
classification result in Theorem D.
We conclude with a third connection to the aforementioned active program on
PBW deformations. We studied in [Kha] the case when (A, m, โ) is local with
โ(m) โ m โ m. In this setting, if m is a nilpotent two-sided ideal, then one
obtains a lot of information about the deformations of A n Sym(V ), including
understanding the PBW deformations, as well as their center, abelianization, and
GENERALIZED NIL-COXETER ALGEBRAS OVER COMPLEX REFLECTION GROUPS2979
modules, especially the simple modules. Now if A = N CW (d) then m is generated
by the Ti ; this explains the interest above in understanding when m is nilpotent.
Theorem D shows that this condition is in fact equivalent to the generalized nilCoxeter algebra being finite-dimensional.
3. Proof of Theorem A: Tannakian formalism for semigroup
categories
The remainder of this paper is devoted to proving the four main theorems in the
opening section. We begin by studying the representation category of N C(M ) for a
generalized Coxeter matrix M . The first assertion is that this category can never be
a monoidal category in characteristic zero, and it follows from the following result.
Proposition 3.1. Suppose k is a field of characteristic zero and M is a generalized
Coxeter matrix. Then N C(M ) is not a bialgebra.
The result fails to hold in positive characteristic. Indeed, for any prime p > 2
the algebra (Z/pZ)[T ]/(T p ) is a bialgebra, with coproduct โ(T ) := 1 โ T + T โ 1
and counit ฮต(T ) := 0.
Proof. Note there is a unique possible counit, ฮต : Ti 7โ 0 โi โ I. Now suppose
โ : N C(M ) โ N C(M ) โ N C(M ) is such that
(id โฮต) โฆ โ = id = (ฮต โ id) โฆ โ
on N C(M ). Setting m := ker ฮต to be the ideal generated by {Ti : i โ I}, it follows
that
(3.2)
โ(Ti ) โ 1 โ Ti + Ti โ 1 + m โ m.
Note that m โ m constitutes the terms of higher โtotal degreeโ in โ(Ti ), in the
Z>0 -grading on N C(M ). Now if โ is multiplicative, then raising (3.2) to the mii th
power yields:
mX
ii โ1
mii
0 = โ(Ti )mii =
Tik โ Timii โk + higher degree terms.
k
k=1
This is impossible as long as the image of Ti in N C(M ) is nonzero; assuming
this, it follows โ cannot be multiplicative, hence not a coproduct on N C(M ).
Finally, N C(M ) surjects onto the usual nil-Coxeter algebra N C(M2 ) with M2 =
M ((2, . . . , 2)). As N C(M2 ) has a Coxeter word basis indexed by W (M ), it follows
that Ti is indeed nonzero in N C(M ).
As a consequence of Proposition 3.1 and the Tannakian formalism in [ES, Theorem 18.3], for any generalized Coxeter matrix M the module category Rep N C(M )
is necessarily not a tensor category. That said, the map โ : Ti 7โ Ti โ Ti is a
coproduct on N C(M ), i.e. a coassociative algebra map. The cocommutativity of
โ implies Rep N C(M ) is a symmetric semigroup category. We now outline how
to show the first theorem above, which seeks to understand TannakaโKrein duality
for such categories (possibly without unit objects).
Proof of Theorem A. The proof of part (1) follows that of [ES, Theorem 18.3]; one
now ignores the last statement in that proof. The additional data required in the
two braided versions in part (2) can be deduced from the proof of [ES, Proposition
14.2].
2980
APOORVA KHARE
We conclude this section by passing from Rep N C(M ) to an โhonestโ tensor
category โ say with k a field. Alternately, via the Tannakian formalism in [ES,
g
Theorem 18.3], we produce a bialgebra N
C(M ) that surjects onto N C(M ). Namely,
g
N C(M ) is generated by {Ti : i โ I} and an additional generator Tโ , subject to
the braid relations on the former set, as well as
2
:= Tโ , โi โ I.
Timii = Ti Tโ = Tโ Ti = Tโ
g
Note that N
C(M ) is no longer Z>0 -graded; but it is a central extension:
g
0 โ kTโ โ N
C(M ) โ N C(M ) โ 0.
Now asking for all Ti and Tโ to be grouplike yields a unique bialgebra structure
g
on N
C(M ):
e : Ti 7โ Ti โ Ti ,
โ
Tโ 7โ Tโ โ Tโ ,
ฮตe : Ti , Tโ 7โ 1,
g
and hence a monoidal category structure on Rep N C(M ), as claimed.
4. Proof of Theorem B: Distinguished basis of words
We now prove our main theorems on the algebras N C(M ) โ specifically, the
family N CA (n, d) โ beginning with Theorem B. Note that if d = 2 then the algebra
N CA (n, d) is the usual nil-Coxeter algebra, while if n = 1 then the algebra is
k[T1 ]/(T1d ). Theorems B and C are easily verified for these cases, e.g. using [Hum,
Chapter 7]. Thus, we assume throughout their proofs below that n > 2 and d > 3.
We begin by showing the k-rank of N CA (n, d) is at most n!(1 + n(d โ 1)). Notice
that N CA (n, d) is spanned by words in the Ti . We now claim that a word in the
Ti is either zero in N CA (n, d), or equal by the braid relations to a word in which
all occurrences of Tn are successive, in a monomial Tnk for some 1 6 k 6 d โ 1.
To show the claim, consider a word T := ยท ยท ยท Tna Tw Tnb ยท ยท ยท , where a, b > 0 and
Tw = Ti1 ยท ยท ยท Tik is a word in T1 , . . . , Tnโ1 . Rewrite T using the braid relations if
required, so that w โ Sn has minimal length, say k. We may assume k > 0, else we
would be done. Now using the braid relations Ti Tn = Tn Ti for i 6 n โ 2, further
assume that i1 = ik = n โ 1 (otherwise the factors may be โmoved pastโ the Tn
using the braid relations). Similarly, i2 = ikโ1 = n โ 2, and so on. Thus, if Tw 6= 0,
then assume by the minimality of `(w) that
Tw = Tnโ1 Tnโ2 ยท ยท ยท Tm+1 Tm Tm+1 ยท ยท ยท Tnโ2 Tnโ1 ,
for some 1 6 m 6 n โ 1.
We next claim that the following relation holds in the Artin braid group Bn ,
hence in N CAn (d) for any d:
(4.1)
Tnโ1 ยท ยท ยท Tm ยท ยท ยท Tnโ1 = Tm Tm+1 ยท ยท ยท Tnโ2 Tnโ1 Tnโ2 ยท ยท ยท Tm+1 Tm .
This is shown by descending induction on m 6 n โ 1. Hence,
(4.2)
Tna ยท (Tnโ1 ยท ยท ยท Tm ยท ยท ยท Tnโ1 ) ยท Tnb
= Tna ยท (Tm ยท ยท ยท Tnโ2 Tnโ1 Tnโ2 ยท ยท ยท Tm ) ยท Tnb
= (Tm ยท ยท ยท Tnโ2 )Tnaโ1 (Tn Tnโ1 Tn )Tnbโ1 (Tnโ2 ยท ยท ยท Tm )
= (Tm ยท ยท ยท Tnโ2 )Tnaโ1 (Tnโ1 Tn Tnโ1 )Tnbโ1 (Tnโ2 ยท ยท ยท Tm ).
If max(a, b) = 1 then the claim follows; if a > 1 then the last expression contains
2
the substring (Tn Tnโ1 Tn )Tnโ1 = Tnโ1 Tn Tnโ1
= 0; and similarly if b > 1. This
shows the claim.
GENERALIZED NIL-COXETER ALGEBRAS OVER COMPLEX REFLECTION GROUPS2981
We now prove the upper bound on the k-rank. Notice that T1 , . . . , Tnโ1 generate
a subalgebra Rnโ1 โ N CA (n, d) in which the nil-Coxeter relations for WAnโ1 = Sn
are satisfied. Hence the map : N CAnโ1 ((2, . . . , 2)) Rnโ1 := hT1 , . . . , Tnโ1 i is an
algebra map.
Now notice by equation (4.2) that every nonzero word in N CA (n, d) \ Rnโ1 is
of the form T = Tw Tnk Tw0 , where 1 6 k 6 d โ 1, w, w0 โ WAnโ1 , and hence
Tw , Tw0 โ Rnโ1 . By a similar reasoning as above, assuming w0 of minimal length in
Snโ1 , we may rewrite T such that Tw0 = Tnโ1 ยท ยท ยท Tm for some 1 6 m 6 n. Carrying
out this operation yields Tw00 Tnk Tnโ1 ยท ยท ยท Tm for some reduced word w00 โ WAnโ1
(i.e., such that Tw00 is nonzero in N CAnโ1 ((2, . . . , 2))). Thus,
N CA (n, d) = Rnโ1 +
dโ1 X
n
X
k=1 m=1
Rnโ1 ยท Tnk ยท (Tnโ1 ยท ยท ยท Tm ).
As Rnโ1 has at most n! generators, it follows that N CA (n, d) has at most (1 +
n(d โ 1)) ยท n! generators, which shows the desired upper bound on its k-rank.
The hard part of the proof involves showing that the words Tw Tnk Tnโ1 ยท ยท ยท Tm
form a k-basis of N CA (n, d). We will require the following technical lemma on the
symmetric group and its nil-Coxeter algebra. A proof is included for completeness.
Lemma 4.3. Suppose W = WAnโ1 = Sn is the symmetric group, with simple
reflections s1 , . . . , snโ1 labelled as usual. Then every element w of WAnโ1 \WAnโ2 =
Sn \ Snโ1 can be written in reduced form as w = w0 snโ1 ยท ยท ยท sm0 , where w0 โ Snโ1 =
WAnโ2 and m0 โ [1, n โ 1] are unique. Given such an element w โ Sn , we have in
the usual nil-Coxeter algebra N CAn ((2, . . . , 2)):
(
Tw0 Tnโ1 ยท ยท ยท Tmโ1 ยท Tn ยท ยท ยท Tm0 ,
if m0 < m,
(4.4)
Tn ยท Tw ยท Tn ยท ยท ยท Tm =
0
otherwise.
Note that equation (4.4) can be thought of as a statement on lengths in the symmetric group.
Proof. We first claim that w โ WAnโ1 \ WAnโ2 has a reduced expression in which
snโ1 occurs exactly once. The proof is by induction on n: clearly the claim is true
for n = 2. Now given the claim for n โ 2 > 2, consider any reduced expression
for w that contains a sub-word snโ1 w00 snโ1 , where w โ WAnโ2 . By the induction
hypothesis, w00 = w0 snโ2 ยท ยท ยท sm for some w0 โ WAnโ3 and m โ [1, n โ 1]. Hence if
m 6 n โ 2, then
w = ยท ยท ยท snโ1 (w0 snโ2 snโ3 ยท ยท ยท sm ) snโ1 = ยท ยท ยท w0 (snโ1 snโ2 snโ1 )(snโ3 ยท ยท ยท sm ) ยท ยท ยท ,
and by the braid relations, this equals a reduced expression for w โ WAnโ1 , with
one less occurrence of snโ1 . A similar analysis works if m = n โ 1. Repeatedly
carrying out this procedure proves the claim.
We can now prove the uniqueness of w0 , m0 as in the lemma. By the previous
paragraph, write w โ WAnโ1 \ WAnโ2 as w = w1 snโ1 w2 , with w1 , w2 โ WAnโ2 and
w2 of smallest possible length, say w2 = si1 ยท ยท ยท sik for i1 , . . . , ik 6 n โ 2. Using the
braid relations, clearly i1 = nโ2, hence i2 = nโ3 (by minimality of k). Choose the
smallest l > 3 such that il 6= n โ 1 โ l. We now produce a contradiction assuming
that such an integer l exists. If il < n โ 1 โ l, then we may move sil past the
preceding terms, contradicting the minimality of k. Clearly il 6= n โ l, else w2 was
2982
APOORVA KHARE
not reduced. Thus il > n โ 1 โ l, whence w2 is of the form snโ2 ยท ยท ยท sil sil โ1 sil ยท ยท ยท .
Now verify in WAnโ1 that
w = w1 snโ1 snโ2 ยท ยท ยท sil +1 sil sil โ1 sil ยท ยท ยท = w1 snโ1 ยท ยท ยท sil +1 sil โ1 sil sil โ1 ยท ยท ยท
= w1 sil โ1 ยท snโ1 ยท snโ2 ยท ยท ยท sil +1 sil sil โ1 ยท ยท ยท ,
which contradicts the minimality of k. Thus such an integer l cannot exist, which
proves that w = w1 snโ1 ยท ยท ยท sm0 for some m0 โ [1, n โ 1].
We next claim that the integer m0 is unique for w โ WAn \ WAnโ1 . We first
make the sub-claim that if w โ WAnโ1 is reduced, then so is wsn snโ1 ยท ยท ยท sm . To
see why, first recall [Hum, Lemma 1.6, Corollary 1.7], which together imply that if
wฮฑ > 0 for any finite Coxeter group W , any w โ W , and any simple root ฮฑ > 0, then
`(wsฮฑ ) = `(w)+1. Now the sub-claim follows by applying this result successively to
(wsn ยท ยท ยท sj+1 , ฮฑj ) for j = n, nโ1, ยท ยท ยท , m. Next, define Cm := WAnโ1 ยทsn snโ1 ยท ยท ยท sm ,
with Cn+1 := WAnโ1 . It follows by the sub-claim above that |Cm | = |WAnโ1 | = n!
for all m. Hence,
(n + 1)! = |WAn | 6
n+1
X
m=1
|Cm | 6
n+1
X
n! = (n + 1)!.
m=1
Fn+1
This shows that WAn = m=1 Cm , which proves the uniqueness of m in the above
claim. Now write w1 in reduced form to obtain that w0 = wsm0 ยท ยท ยท snโ1 is also
unique.
It remains to show equation (4.4) in N CAn ((2, . . . , 2)). Using the above analysis,
write Tw = Tw0 Tnโ1 ยท ยท ยท Tm0 ; since Tn commutes with Tw0 , we may assume w0 = 1.
First suppose m0 > m. Then it suffices to prove that (Tn ยท ยท ยท Tm0 )2 = 0 for all
1 6 m0 6 n. Without loss of generality we may work in the subalgebra generated
by Tm0 , . . . , Tn , and hence suppose m0 = 1. We now prove by induction that
(Tn ยท ยท ยท T1 )2 = 0. This is clear if n = 1, 2, and for n > 2,
(Tn ยท ยท ยท T1 )2 = Tn Tnโ1 Tn ยท Tnโ2 ยท ยท ยท T1 ยท Tnโ1 ยท ยท ยท T1 = Tnโ1 Tn ยท (Tnโ1 ยท ยท ยท T1 )2 = 0.
Next suppose m0 < m; once again we may suppose m0 = 1. We prove the result
by induction on n, the base case of n = 2 (and m = 2) being easy. Thus, for
1 < m 6 n, we compute:
Tn ยท ยท ยท T1 ยท Tn ยท ยท ยท Tm = Tn Tnโ1 Tn ยท Tnโ2 ยท ยท ยท T1 ยท Tnโ1 ยท ยท ยท Tm
= Tnโ1 Tn ยท (Tnโ1 ยท ยท ยท T1 ) ยท (Tnโ1 ยท ยท ยท Tm )
= Tnโ1 Tn ยท (Tnโ2 ยท ยท ยท Tmโ1 ) ยท (Tnโ1 ยท ยท ยท T1 )
= Tnโ1 Tnโ2 ยท ยท ยท Tmโ1 ยท Tn Tnโ1 ยท ยท ยท T1 .
Remark 4.5. Notice that equation (4.4) holds in any algebra containing elements
T1 , . . . , Tn that satisfy the braid relations and T12 = 0. In particular, (4.4) holds in
N CA (n, d) for n > 1.
Returning to the proof of Theorem B, we now introduce a diagrammatic calculus
akin to crystal theory. We first write out the n = 2 case, in order to provide intuition
for the case of general n. Let M be a free k-module, with basis given by the nodes
in the graph in Figure 1 below.
In the figure, the node 122 1 should be thought of as T1 T22 T1 (applied to the unit
1N CA (2,d) , i.e., to the generating basis vector corresponding to โ
), and similarly
for the other nodes. The arrows denote the action of T1 and T2 ; all remaining
GENERALIZED NIL-COXETER ALGEBRAS OVER COMPLEX REFLECTION GROUPS2983
1
0
12d 1
122 1
ยทยทยท
1
1
0
2
ยทยทยท
2
22 1
2
2
2
2
2
1
2d 1
โ
1
21
12
1
22
2
ยทยทยท
2
1
122
2d
0
1
ยทยทยท
0
12d
2
wโฆ
Figure 1. Regular representation for N CA (2, d), with d0 = d โ 1
generator actions on nodes yield zero. Now one verifies by inspection that the
defining relations in N CA (2, d) are satisfied by this action on M . Therefore M is
an N CA (2, d)-module of k-rank 4d โ 2 = 2!(1 + 2(d โ 1)). Since M is generated by
the basis vector corresponding to the node โ
, we have a surjection : N CA (2, d) M
that sends T1 , T2k , T1 T2k , T2k T1 , T1 T2k T1 to the corresponding basis vectors in the free
k-module M . Now the result for n = 2 follows by the upper bound on the k-rank,
proved above.
The strategy is similar for general n, but uses the following more detailed notation. For each w โ Sl with l 6 n, let Tw denote the corresponding (welldefined) word in the alphabet {T1 , . . . , Tlโ1 }, and let Rlโ1 denote the subalgebra
of N CA (n, d) generated by these letters. Now define a free k-module M of k-rank
n!(1 + n(d โ 1)), with basis elements the set of words
(4.6)
B := {B(w, k, m) : w โ Sn , k โ [1, d โ 1], m โ [1, n]} t {B(w) : w โ Sn }.
We observe here that the basis vectors B(w, k, m), B(w) are to be thought of as
corresponding respectively to the words
(4.7)
Tw Tnk Tnโ1 ยท ยท ยท Tm , Tw ,
w โ Sn , k โ [1, d โ 1], m โ [1, n].
Definition 4.8. An expression for a word in N CA (n, d) of the form (4.7) will be
said to be in standard form.
We now define an N CA (n, d)-module structure on M , via defining a directed
graph structure on B (or more precisely, on B t {0}) that we now describe. The
following figure (Figure 2 below) may help in visualizing the structure. The figure
should be thought of as analogous to the central hexagon and either of the two
โarmsโ in Figure 1.
We begin by explaining the figure. Each node (wkm) (or (w)) corresponds
to the basis vector B(w, k, m) (or B(w)). Notice that the vectors {B(w, 1, m)} t
{B(w)} are in bijection with the Coxeter word basis of the usual nil-Coxeter algebra
N CAn ((2, . . . , 2)). Let V1 denote their span, of k-rank (n + 1)!. Now given 1 6
m 6 n and 1 6 k 6 d โ 1 =: d0 , define Vk,m to be the span
L of the basis elements
{B(w, k, m) : w โ Sn }, of k-rank n!. Then M = V1 โ k>1,m Vk,m . Note as a
special case that in Figure 1, the central hexagon spans V1 , the nodes 2k 1, 12k 1
span Vk,1 , and 2k , 12k span Vk,2 . We now define the N CA (n, d)-action:
2984
APOORVA KHARE
n
11m
w0 1m
V1
12m
n
w0 2m
n
n
ยทยทยท
n
1d0 m
ยทยทยท
V2,m
w0 d0 m
n
Vd0 ,m
Figure 2. Regular representation for N CA (n, d), with d0 = d โ 1
โข Let V1,n+1 denote the k-span of {B(w) : w โ Sn }. Then for 1 6 m 6 n + 1,
each V1,m has a distinguished basis in bijection with Sn ; the same holds
for each Vk,m with k โ [2, d โ 1] and m โ [1, n]. Now equip all of the
above spaces Vk,m with the corresponding module structure over the usual
nil-Coxeter algebra of type Anโ1 . Such a structure is uniquely determined,
if given w = si1 ยท ยท ยท sil โ Sn with all ij < n, we set Tw ยท B(1, k, m) :=
B(w, k, m) and Tw ยท B(1) := B(w).
โข We next define the action of Tn on M . Via Lemma 4.3, write w โ Sn as
w0 snโ1 ยท ยท ยท sm0 with w0 , m0 unique. Now using the previous paragraph, it
follows that B(w, k, m) = Tw0 Tnโ1 ยท ยท ยท Tm0 ยท B(1, k, m). Correspondingly, if
w โ Snโ1 (i.e., m0 = n), define
Tn ยท B(w, k, m) := 1(k 6 d โ 2)B(w, k + 1, m),
Tn ยท B(w) := B(w, 1, n).
0
โข On the other hand, suppose m 6 n โ 1. If k > 2, then define Tn ยท
B(w, k, m) := 0. Otherwise define Tn ยท B(w) := B(w0 , 1, m0 ) with w0 , m0 as
in Lemma 4.3, and (see Equation 4.4):
(
B(w0 snโ1 ยท ยท ยท smโ1 , 1, m0 ),
if m0 < m,
(4.9)
Tn ยท B(w, 1, m) :=
0
otherwise.
It remains to show that the above graph structure indeed defines an N CA (n, d)module structure on M ; then a similar argument as above (in the n = 2 case)
completes the proof. In the following argument, we will occasionally use Lemma
4.3 (as well as Remark 4.5) without reference. First notice that the algebra relations
involving only T1 , . . . , Tnโ1 are clearly satisfied on M as it is a Rnโ1 -free module
by construction. To verify that the relations involving Tn hold on M , notice (e.g.
via Figure 2) that the k-basis B of M can be partitioned into three subsets:
B1 := {B(w, k, m) : k > 1, m โ [1, n], w โ Snโ1 } t {B(w) : w โ Snโ1 },
(4.10) B2 := {B(w, k, m) : k > 2, m โ [1, n], w โ Sn \ Snโ1 },
B3 := {B(w, 1, m) : m โ [1, n], w โ Sn \ Snโ1 } t {B(w) : w โ Sn \ Snโ1 }.
Recall by the opening remarks in Section 4 that n > 2 and d > 3. We first show
that the relation Tnd = 0 holds as an equality of linear operators on each vector
b โ B, and hence on the k-module M . We separately consider the cases b โ Bi for
i = 1, 2, 3, as in (4.10).
GENERALIZED NIL-COXETER ALGEBRAS OVER COMPLEX REFLECTION GROUPS2985
(1) If b = B(w, k, m) โ B1 , then b lies in the โtop rowsโ of Figure 2. It is easily
verified that Tndโkโ1 ยท B(w, k, m) = B(w, d โ 1, m), and this is killed by Tn ,
as desired. The same reasoning shows that Tnd kills b = B(w) for w โ Snโ1 .
(2) Let b = B(w, k, m) โ B2 . Then the relation holds on b since Tn ยท B(w, k, m)
= 0. (These correspond to vectors in Vk,m for k > 2, which do not lie in
the โtop rowsโ in Figure 2.)
(3) Finally, let b โ B3 ; thus w โ Sn \ Snโ1 , and we write w = w0 snโ1 ยท ยท ยท sm0
by Lemma 4.3. It follows from Remark 4.5 that Tn2 ยท B(w, 1, m) = 0 and
Tnd ยท B(w) = Tndโ1 ยท B(w0 , 1, m0 ) = 0.
We next show that the relation Ti Tn = Tn Ti holds on B for all i 6 n โ 2. We
consider the same three cases as in (4.10).
(1) Fix w โ Snโ1 . If b = B(w, k, m) with k > 1, then verify using the aforementioned action that both Ti Tn ยท B(w, k, m) and Tn Ti ยท B(w, k, m) equal
B(si w, k + 1, m) if `(si w) > `(w) and k 6 d โ 2, and 0 otherwise. Similarly,
Ti Tn ยท B(w) = 1(`(si w) > `(w))B(si w, 1, n) = Tn Ti ยท B(w).
(2) Let b = B(w, k, m) with w โ Sn \Snโ1 and k > 2. Then Ti Tn ยทB(w, k, m) =
0. To compute Tn Ti ยท B(w, k, m), since i 6 n โ 2, it follows that si w โ Sn \
Snโ1 . If Ti Tw = 0 then we are done since B(w, k, m) = Tw ยทB(1, k, m). Else
note that si w โ Sn \ Snโ1 , whence Tn Ti ยท B(w, k, m) = Tn ยท B(si w, k, m) = 0
from above.
(3) Finally, let w โ Sn \ Snโ1 and write w = w0 snโ1 ยท ยท ยท sm0 by Lemma 4.3.
First suppose b = B(w, 1, m). If `(si w) < `(w), then it is not hard to show
that both Ti Tn ยท B(w, 1, m) and Tn Ti ยท B(w, 1, m) vanish. Otherwise both
terms are equal to B(si w0 snโ1 ยท ยท ยท smโ1 , 1, m0 ). A similar analysis shows
that if `(si w) < `(w), then Ti Tn ยท B(w) = Tn Ti ยท B(w) = 0, otherwise
Ti Tn ยท B(w) = Tn Ti ยท B(w) = B(si w0 , 1, m0 ).
Next, we show that the braid relation Tnโ1 Tn Tnโ1 = Tn Tnโ1 Tn holds on B.
This is the most involved computation to carry out. We consider the same three
cases as above.
(1) Fix w โ Snโ1 . If b = B(w, k, m) with k > 2, then it is easily verified that
both sides of the braid relation kill B(w, k, m). If instead k = 1, then
Tn Tnโ1 Tn ยท B(w, 1, m) = Tn Tnโ1 ยท B(w, 2, m) = 0.
To compute the other side, first notice B(w, 1, m) = Tn ยท B(wsnโ1 ยท ยท ยท sm ).
Hence,
Tn Tnโ1 ยท B(w, 1, m) = Tn Tnโ1 Tn ยท B(wsnโ1 ยท ยท ยท sm ).
Now if the braid relation holds on B(w) for all w โ Sn , then
Tnโ1 Tn Tnโ1 ยท B(w, 1, m) = Tnโ1 ยท Tn Tnโ1 Tn ยท B(wsnโ1 ยท ยท ยท sm )
2
= Tnโ1 Tnโ1 Tn Tnโ1 ยท B(wsnโ1 ยท ยท ยท sm ) โ Tnโ1
ยท M = 0,
where the last equality follows from the definition of M as an Rnโ1 -module.
It thus suffices for this case to verify that the braid relation holds on B(w)
for w โ Sn . This is done by considering the following four sub-cases.
(a) If w โ Snโ2 commutes with snโ1 , sn , then both Tn Tnโ1 Tn ยท B(w) and
Tnโ1 Tn Tnโ1 ยท B(w) are easily seen to equal B(snโ1 w, 1, n โ 1).
2986
APOORVA KHARE
(b) Suppose w = w0 snโ2 ยท ยท ยท sm0 โ Snโ1 \ Snโ2 , with w0 โ Snโ2 and
m0 โ [1, nโ2]. Then using Remark 4.5 and the Rnโ1 -module structure
of M , we compute:
Tn Tnโ1 Tn ยท B(w) = Tn Tnโ1 ยท B(w, 1, n) = Tn ยท B(w0 snโ1 ยท ยท ยท sm0 , 1, n)
= B(w0 snโ1 , 1, m0 ),
Tnโ1 Tn Tnโ1 ยท B(w) = Tnโ1 Tn ยท B(w0 snโ1 ยท ยท ยท sm0 ) = Tnโ1 ยท B(w0 , 1, m0 )
= B(snโ1 w0 , 1, m0 ),
whence we are done since snโ1 commutes with w0 โ Snโ2 .
(c) In the last two sub-cases, w = w0 snโ1 ยท ยท ยท sm0 โ Sn \ Snโ1 with m0 โ
[1, n โ 1]. As in the previous two sub-cases, first suppose w0 โ Snโ2 .
Similar to the above computations, one verifies that both Tn Tnโ1 Tn ยท
B(w) and Tnโ1 Tn Tnโ1 ยท B(w) vanish.
(d) Finally, suppose w = w00 snโ2 ยท ยท ยท sm ยท snโ1 ยท ยท ยท sm0 with m โ [1, n โ
2], m0 โ [1, n โ 1], and w00 โ Snโ2 . Then one verifies that
Tn Tnโ1 Tn ยท B(w) = 1(m < m0 )B(w00 snโ2 ยท ยท ยท sm0 โ1 , 1, m) = Tnโ1 Tn Tnโ1 ยท B(w).
(2) Next suppose b โ B2 is of the form B(w, k, m) with k > 2 and w =
w0 snโ1 ยท ยท ยท sm0 โ Sn \ Snโ1 . Then Tn ยท B(w, k, m) = 0 by definition, so
Tn Tnโ1 Tn ยท B(w, k, m) = 0. To show that Tnโ1 Tn Tnโ1 kills B(w, k, m),
we consider two sub-cases. If w0 โ Snโ2 , then Tnโ1 ยท B(w, k, m) = 0 and
we are done. Otherwise suppose w0 = w00 snโ2 ยท ยท ยท sm00 โ Snโ1 \ Snโ2 , with
m00 โ [1, n โ 2]. Now compute using Remark 4.5 and the relations verified
above:
Tnโ1 Tn Tnโ1 ยท B(w, k, m)
= Tnโ1 Tn ยท B(w00 snโ1 ยท ยท ยท sm00 snโ1 ยท ยท ยท sm0 , k, m)
= 1(m00 < m0 )Tnโ1 Tn ยท B(w00 snโ2 ยท ยท ยท sm0 โ1 snโ1 ยท ยท ยท sm00 , k, m)
= 1(m00 < m0 )Tnโ1 ยท 0 = 0,
where the penultimate equality uses that k = 2.
(3) Finally, suppose b โ B3 . By the analysis in the first case above, we
only need to consider b = B(w, 1, m) with w = w0 snโ1 ยท ยท ยท sm0 โ Sn \
Snโ1 . It is now not hard to show that both Tn Tnโ1 Tn ยท B(w, 1, m) and
Tnโ1 Tn Tnโ1 ยท B(w, 1, m) vanish if w0 โ Snโ2 . On the other hand, if
w0 = w00 snโ2 ยท ยท ยท sm00 โ Snโ1 \ Snโ2 , then repeated use of Remark 4.5
(and equation (4.4)) shows that
Tnโ1 Tn Tnโ1 ยท B(w, 1, m)
= Tnโ1 Tn Tnโ1 ยท B(w00 ยท snโ2 ยท ยท ยท sm00 ยท snโ1 ยท ยท ยท sm0 , 1, m)
= 1(m00 < m0 )Tnโ1 Tn ยท B(w00 ยท snโ2 ยท ยท ยท sm0 โ1 ยท snโ1 ยท ยท ยท sm00 , 1, m)
= 1(m00 < m0 )1(m00 < m)Tnโ1 ยท B(w00 ยท snโ2 ยท ยท ยท sm0 โ1 ยท snโ1 ยท ยท ยท smโ1 , 1, m00 )
= 1(m00 < m0 )1(m00 < m)1(m0 < m)B(w00 snโ2 ยท ยท ยท smโ2 snโ1 ยท ยท ยท sm0 โ1 , 1, m)
= 1(m00 < m0 < m)B(w00 snโ2 ยท ยท ยท smโ2 snโ1 ยท ยท ยท sm0 โ1 , 1, m).
GENERALIZED NIL-COXETER ALGEBRAS OVER COMPLEX REFLECTION GROUPS2987
Notice this calculation shows the โbraid-likeโ action of Tn , Tnโ1 on strings
of the type
Tnโ2 ยท ยท ยท Tm00 ,
Similarly, one shows that
Tnโ1 ยท ยท ยท Tm0 ,
Tn ยท ยท ยท Tm .
Tn Tnโ1 Tn ยท B(w, 1, m) = 1(m00 < m0 < m)B(w00 snโ2 ยท ยท ยท smโ2 snโ1 ยท ยท ยท sm0 โ1 , 1, m),
which verifies that the last braid relation holds in the last case.
Thus the algebra relations hold on all of M , making it an N CA (n, d)-module
generated by B(1), as claimed. In particular, N CA (n, d) ' M as k-modules, by the
analysis in the first part of this proof. This completes the proof of all but the last
assertion in Theorem B. Finally, the nil-Coxeter algebra N CAl ((2, . . . , 2)) surjects
onto Rl , and Rl ' Rl ยท B(โ
) โ V1 is free of k-rank (l + 1)! from above. Hence
Rl ' N CAl ((2, . . . , 2)), as desired.
5. Proof of Theorem C, primitive elements, and categorification
In this section we continue our study of the algebras N CA (n, d), starting with
Theorem C.
Proof of Theorem C. We retain the notation of Theorem B. Via the k-module
isomorphism M ' N CA (n, d), we identify the basis element B(w, k, m) with
Tw Tnk Tnโ1 ยท ยท ยท Tm and B(w) with Tw , where w โ Sn , k โ [1, d โ 1], and m โ [1, n].
Let ` : B โ Z>0 be as in equation (1.10).
We now claim that if T = Ti1 ยท ยท ยท Til is any nonzero word in N CA (n, d), then l
is precisely the length of T when expressed (uniquely) in standard form (4.7). The
proof is by induction on l. For l = 1, Ti is already in standard form (and nonzero).
Now given a word T = Ti T 0 of length l + 1 (so T 0 has length l and satisfies the
claim), write T 0 via the induction hypothesis as a word in standard form of length
l. Now the proof of Theorem B shows that applying any Ti to this standard form
for T 0 either yields zero or has length precisely l + 1. This proves the claim.
The above analysis shows (1) and (2). Now suppose k is a field. Then the algebra
N CA (n, d) has a maximal ideal m = h{Ti : i โ I}i; in fact, m has k-corank 1 by the
proof of Theorem B. Moreover, m is local because any element of A \ m is invertible.
(In particular, one understands representations of the algebra N CA (n, d), e.g. by
[Kha, ยง6.1].)
The aforementioned claim also proves that ml+1 = 0, where l := `Anโ1 (wโฆ0 ) +
d + n โ 2. This is because any nonzero word can be expressed in standard form
without changing the length.
As an immediate consequence, we have:
Corollary 5.1. If k is a field and T1 , . . . , Tn all have graded degree 1, the Hilbertโ
Poincareฬ series of N CA (n, d) is the polynomial
n
Y
qn โ 1
, [n]q ! :=
[j]q .
[n]q ! (1 + [n]q [d โ 1]q ),
where [n]q :=
qโ1
j=1
The proof also uses the standard result that the HilbertโPoincareฬ series of the
usual nil-Coxeter algebra N CA (n, 2) is [n]q ! (see e.g. [Hum, ยง3.12, 3.15]).
Next, we discuss a property that was explored in [Kho] for the usual nil-Coxeter
algebras N CA (n, 2): these algebras are always Frobenius. We now study when the
2988
APOORVA KHARE
algebras N CA (n, d) are also Frobenius for d > 3. As the following result shows,
this only happens in the degenerate case of n = 1, i.e., k[T1 ]/(T1d ).
Theorem 5.2. Suppose k is a field. Given n > 1 and d > 2, the algebra N CA (n, d)
is Frobenius if and only if n = 1 or d = 2.
One checks via equation (2.1) that these conditions are further equivalent to (the
group algebra of) the โgeneralized Coxeter groupโ W (Mn,d ) being a flat deformation of N CA (n, d).
The proof of Theorem 5.2 crucially uses the knowledge of โmaximalโ, i.e., primitive words in the algebra N CA (n, d). Formally, given a generalized Coxeter matrix
M , say that an element x โ N C(M ) is left (respectively, right) primitive if mx = 0
(respectively, xm = 0), cf. Theorem C(3). Now x is primitive if it is both left- and
right-primitive. Denote these sets of elements respectively by
PrimL (N C(M )),
PrimR (N C(M )),
Prim(N C(M )).
Proposition 5.3. Every generalized nil-Coxeter algebra N C(M ) is equipped with
an anti-involution ฮธ that fixes each generator Ti . Now ฮธ is an isomorphism :
PrimL (N C(M )) โโ PrimR (N C(M )). Moreover, the following hold.
(1) If W (M ) is a finite Coxeter group with unique longest word wโฆ , then
PrimL (N C(M )) = PrimR (N C(M )) = Prim(N C(M )) = kTwโฆ .
(2) If N C(M ) = N CA (1, d), then
PrimL (N C(M )) = PrimR (N C(M )) = Prim(N C(M )) = k ยท T1dโ1 .
(3) If N C(M ) = N CA (n, d) with n > 2 and d > 3, then:
(a) PrimL (N C(M )) is spanned by Twโฆ := Twโฆ0 Tn Tnโ1 ยท ยท ยท T1 and the n(d โ
2) words
{Twโฆ0 Tnk Tnโ1 ยท ยท ยท Tm : k โ [2, d โ 1], m โ [1, n]}.
(b) Prim(N C(M )) is spanned by the d โ 1 words Twโฆ0 Tnk Tnโ1 ยท ยท ยท T1 , where
1 6 k 6 d โ 1.
In all cases, the map ฮธ fixes both Prim(N C(M )) as well as the lengths of all nonzero
words.
Proof. The first two statements are obvious since ฮธ preserves the defining relations
in kh{Ti : i โ I}i. The assertion in (1) is standard โ see e.g. [Hum, Chapter 7] โ
and (2) is easily verified.
We next classify the left-primitive elements as in (3)(a). Suppose for some k > 2
and 1 6 m 6 n that T = Twโฆ0 Tnk Tnโ1 ยท ยท ยท Tm . Then clearly Ti T = 0 for all i < n,
and Tn T = 0 since k > 2, as discussed in the proof of Theorem B. Similarly, if
T = Twโฆ then Ti T = 0 for i < n, and we also computed in the proof of Theorem B
that Twโฆ = T1 ยท ยท ยท Tnโ1 Tn Twโฆ0 . Hence,
Tn Twโฆ = T1 ยท ยท ยท Tnโ2 (Tn Tnโ1 Tn )Twโฆ0 = T1 ยท ยท ยท Tnโ1 Tn (Tnโ1 Twโฆ0 ) = 0.
To complete the proof of (3)(a), it suffices to show that no nonzero linear combination of the remaining words of the form Tw Tnk Tnโ1 ยท ยท ยท Tm is left-primitive. Suppose
first that there is a word w โ WAnโ1 such that the coefficient of Tw is nonzero. In
that case, choose such an element w of smallest length, and left-multiply the linear
combination by Tndโ1 Twโฆ0 wโ1 . As discussed in the proof of Theorem B, this kills all
terms Tw0 Tnk Tw00 with w0 , w00 โ WAnโ1 and k > 1. Moreover, by [Hum, Chapter 7],
GENERALIZED NIL-COXETER ALGEBRAS OVER COMPLEX REFLECTION GROUPS2989
left-multiplication by Twโฆ0 wโ1 also kills all terms of the same length that are not Tw .
Thus we are left with Tndโ1 Twโฆ0 wโ1 Tw = Tndโ1 Twโฆ0 6= 0, so the linear combination
was not left-primitive.
The other case is that all words in the linear combination are of the form
Tw Tnk Tnโ1 ยท ยท ยท Tm with k > 1. Once again, choose w โ WAnโ1 of smallest length for
which the corresponding word has nonzero coefficient, and left-multiply by Twโฆ0 wโ1 .
This yields a nonzero linear combination by the analysis in Theorem B, which
proves the assertion about left-primitivity.
We next identify the primitive elements in N C(M ) = N CA (n, d). The first claim
is that Tk := Twโฆ0 Tnk Tnโ1 ยท ยท ยท T1 is fixed by ฮธ. Indeed, we compute using the braid
relations in type A that ฮธ fixes Twโฆ0 โ Rnโ1 and Twโฆ00 โ Rnโ2 . Hence,
(5.4) ฮธ(Tk ) = T1 ยท ยท ยท Tnโ1 Tnk Twโฆ00 Tnโ1 ยท ยท ยท T1 = T1 ยท ยท ยท Tnโ1 Twโฆ00 Tnk Tnโ1 ยท ยท ยท T1 = Tk .
Using this we claim that Tk is right-primitive. Indeed, if i < n, then
Tk Ti = T1 ยท ยท ยท Tnโ1 Tnk Twโฆ0 Ti = 0,
while for i = n, we compute:
Tk Tn = Twโฆ0 Tnk Tnโ1 Tn ยท Tnโ2 ยท ยท ยท T1 = Tnkโ1 Twโฆ0 Tnโ1 ยท Tn Tnโ1 Tnโ2 ยท ยท ยท T1 = 0.
We now claim that no linear combination of the remaining left-primitive elements
listed in (3)(a) is right-primitive. Indeed, let m0 denote the minimum of the mvalues in words with nonzero coefficients; then m0 > 1 by the above analysis. Now
right-multiply by Tm0 โ1 ยท ยท ยท T1 . This kills all elements with m-value > m0 + 1, since
Tm0 โ1 commutes with Tn Tnโ1 ยท ยท ยท Tm , hence can be taken past them to multiply
against Twโฆ0 and be killed. The terms with m-value equal to m0 are not killed, by
the analysis in Theorem B. It follows that such a linear combination is not rightprimitive, which completes the classification of the primitive elements in (3)(b).
Next, that Prim(N C(M )) is fixed by ฮธ was shown in equation (5.4). Moreover, if
N C(M ) equals N CA (n, d) or kW (M ) with W (M ) finite, then it is equipped with a
suitable length function `. Now ฮธ preserves the length because the algebra relations
are `-homogeneous and preserved by ฮธ.
Remark 5.5. In light of Proposition 5.3, it is natural to ask how to write rightprimitive words in standard form. More generally, given w = w0 snโ1 ยท ยท ยท sm0 for
unique w0 โ Snโ1 and m0 โ [1, n] (via Lemma 4.3), we have: Tm ยท ยท ยท Tnโ1 Tnk Tw =
e = sm ยท ยท ยท snโ1 w0 .
Twe Tnk Tnโ1 ยท ยท ยท Tm0 , where w
With Proposition 5.3 in hand, we turn to the Frobenius property of N CA (n, d).
The following proof reveals that N CA (n, d) is Frobenius if and only if Prim(N C(M ))
is one-dimensional.
Proof of Theorem 5.2. For finite Coxeter groups W (M ), the corresponding nilCoxeter algebras N C(M ) are indeed Frobenius; see e.g. [Kho, ยง2.2]. It is also
easy to verify that N CA (1, d) = k[T1 ]/(T1d ) is Frobenius, by using the symmetric bilinear form uniquely specified by: ฯ(T1i , T1j ) = 1(i + j = d โ 1). Thus,
it remains to show that for n > 2 and d > 3, the algebra N CA (n, d) is not
Frobenius. Indeed, if N CA (n, d) is Frobenius with nondegenerate invariant bilinear form ฯ, then for each nonzero primitive p there exists a vector ap such
that 0 6= ฯ(p, ap ) = ฯ(pap , 1). It follows that we may take ap = 1 for all p.
Now the linear functional ฯ(โ, 1) : Prim(N CA (n, d)) โ k is nonsingular, whence
dimk Prim(N CA (n, d)) = 1. Thus n = 1 or d = 2 by Proposition 5.3.
2990
APOORVA KHARE
We conclude this section by discussing the connection of N CA (n, d) to the categorification by Khovanov [Kho] of the Weyl algebra Wn := Zhx, โi/(โx = 1 + xโ).
Namely, the usual type A nil-Coxeter algebra An := N CA (n, 2) is a bimodule over
Anโ1 , and this structure was studied in loc. cit., leading to the construction of
tensor functors categorifying the operators x, โ.
We now explain how the algebra N CA (n, d) fits into this framework.
Proposition 5.6. For all n > 1 and d > 2, we have an isomorphism of Anโ1 bimodules:
dโ1
M
N CA (n, d) ' Anโ1 โ
Anโ1 โAnโ2 Anโ1 .
k=1
When d = 2, this result was shown in [Kho, Proposition 5]. For general d > 2,
using the notation of [Kho], this result implies in the category of Anโ1 -bimodules
that the algebra N CA (n, d) corresponds to 1 + (d โ 1)xโ (including the previously
known case of d = 2). In particular, Proposition 5.6 strengthens Theorems B
and C, which explained a left Anโ1 -module structure on N CA (n, d) (namely, that
N CA (n, d) is free of rank 1 + n(d โ 1)).
Proof of Proposition 5.6. From the proof of Theorem B, the algebra N CA (n, d)
โผ
has a โregular representationโ ฯ : M โโ N CA (n, d), sending B(w) 7โ Tw and
k
B(w, k, m) 7โ Tw Tn Tnโ1 ยท ยท ยท Tm for w โ Sn , k โ [1, d โ 1], and m โ [1, n]. Also
recall
the subspaces Vk,m defined in the discussion following equation (4.7): Vk,m =
L
wโSn kB(w, k, m).
Ln
By Theorem B, Mk := m=1 ฯ(Vk,m ) is a free left Anโ1 -module of rank one.
It is also a free right Anโ1 -module of rank one, using the anti-involution ฮธ from
Proposition 5.3 and Remark 5.5. In fact, the uniqueness of the standard form (4.7)
shown in the proof of Theorem B, implies that for all 1 6 k 6 d โ 1, the map
ฯk : Anโ1 โAnโ2 Anโ1 โ Mk ,
a โ a0 7โ aTnk a0 ,
is an isomorphism of Anโ1 -bimodules. Now the result follows from (the proof of)
Theorem B.
Remark 5.7. Notice that the proof of Proposition 5.6 also categorifies Corollary 5.1.
6. Proof of Theorem D: Finite-dimensional generalized nil-Coxeter
algebras
We now prove Theorem D, which classifies the generalized nil-Coxeter algebras
of finite k-rank. The bulk of the proof involves showing (1) =โ (2). We again
employ the diagrammatic calculus used to show Theorem B, now applied to the
five diagrams in Figure 3 below.
We begin by assuming that W = W (M ) is a generalized Coxeter group, and
classify the algebras N C(M ) that have finite k-rank. Following this classification,
we address the remaining finite complex reflection groups W (and all d), followed by
the infinite discrete complex reflection groups with their Coxeter-type presentations.
Case 1. Suppose mii = 2 for all i โ I. In this case W (M ) is a Coxeter group, so by
e.g. [Hum, Chapter 7], N C(M ) has a k-basis in bijection with W (M ), which must
therefore be finite.
GENERALIZED NIL-COXETER ALGEBRAS OVER COMPLEX REFLECTION GROUPS2991
ฮฑ
B1
ฮฒ1
B2
ยทยทยท
Bm 0
ฮฒm0
Bm
ฮณ
A +
C
ฮฑ
ฮฑ
A
ฮณ
B10
B
+
ฮฒ1
ยทยทยท
0
Bm
0
ฮฒm 0
0
Bm
Fig. 3.2 (m0 = m โ 1)
ฮณ
ฮฑ
B20
ฮณ
D
C
Fig. 3.1
ฮฑ
B1
ฮฒ1
B2
ยทยทยท
Bm 0
ฮฒm 0
D
C
ฮด
ฮฑ
B10
s
t
ฮฒ1
B
+
ฮด
ฮณ
A +
A
Bm
B20
ยทยทยท
0
Bm
0
ฮฒm 0
ฮณ
0
Bm
Fig. 3.4 (m0 = m โ 1)
u
C
Fig. 3.3
ฮฑ
B1
ฮฒ1
B2
ยทยทยท
Bm 0
ฮฒm0
Bm
ฮณ
A +
ฮฑ
B10
ฮฒ1
B20
ยทยทยท
0
Bm
0
ฮฒm0
0
Bm
Fig. 3.5 (m0 = m โ 1)
Figure 3. Modules for the infinite-dimensional generalized nilCoxeter algebras
Case 2. Suppose mฮฑฮฑ , mฮณฮณ > 3 for some ฮฑ, ฮณ โ I with mฮฑฮณ > 3. In this case we
appeal to Figure 3.1 and work as in the proof of [Mar, Proposition 3.2]. Thus, fix
a free k-module M with basis given by the countable set {Ar , Br , Cr , Dr : r > 1},
and define an N C(M )-action via Figure 3.1. Namely, Ti kills all basis vectors for
all i โ I, with the following exceptions:
Tฮฑ (Ar ) := Br ,
Tฮณ (Br ) := Cr ,
Tฮณ (Cr ) := Dr ,
Tฮฑ (Dr ) := Ar+1 ,
โr > 1.
2992
APOORVA KHARE
(The โ+โ at the head of an arrow refers precisely to the index increasing by 1.) It is
easy to verify that the defining relations of N C(M ) hold in Endk (M ), as they hold
on each Ar , Br , Cr , Dr . Therefore M is a module over N C(M ) that is generated
by A1 , but is not finitely generated as a k-module. As N C(M ) M , N C(M ) is
also not a finitely generated k-module.
This approach is used in the remainder of the proof, to obtain a k-basis and the
N C(M )-action on it, from the diagrams in Figure 3. Thus we only mention the
figure corresponding to each of the cases below.
Case 3. Figure 3.1 is actually a special case of Figure 3.2, and was included to
demonstrate a simpler case. Now suppose more generally that there are two nodes
ฮฑ, ฮณ โ I such that mฮฑฮฑ , mฮณฮณ > 3. Since the Coxeter graph is connected, there exist
nodes ฮฒ1 , . . . , ฮฒmโ1 for some m > 1 (in the figure we write m0 := m โ 1), such that
ฮฑ
โโ
ฮฒ1
โโ
ยทยทยท
โโ
ฮฒmโ1
โโ
ฮณ
is a path (so each successive pair of nodes is connected by at least a single edge).
Now appeal to Figure 3.2, i.e., define an N C(M )-module structure on the free
k-module
0
0
M := spank {Ar , B1r , . . . , Bmr , Cr , B1r
, . . . , Bmr
: r > 1},
where each Ti kills all basis vectors above, except for the actions obtained from
Figure 3.2. Once again, M is generated by A1 , so proceed as above to show that
N C(M ) is not finitely generated.
Case 4. The previous cases reduce the situation to a unique vertex ฮฑ in the Coxeter
graph of M for which mฮฑฮฑ > 3. The next two steps show that ฮฑ is adjacent to a
unique node ฮณ, and that mฮฑฮณ = 3. First suppose ฮฑ is adjacent to ฮณ with mฮฑฮณ > 4.
Now appeal to Figure 3.3, setting (s, t, u)
(ฮฑ, ฮฑ, ฮณ), and define an N C(M )module structure on M := spank {Ar , Br , Cr : r > 1}. Then proceed as above.
Case 5. Next suppose ฮฑ is adjacent in the Coxeter graph to two nodes ฮณ, ฮด. By the
previous case, mฮฑฮณ = mฮฑฮด = 3. Now appeal to Figure 3.4 with m = 1, to define
0
an N C(M )-module structure on M := spank {Ar , B1r , B1r
, Cr , Dr : r > 1}, and
proceed as in the previous cases.
We now observe that if N C(M ) is finitely generated, then so is N CM ((2, . . . , 2)),
which corresponds to the Coxeter group WM ((2, . . . , 2)). Hence the Coxeter graph
of M is of finite type. These graphs were classified by Coxeter [Cox1, Cox2]. We
now rule out all cases other than type A, in which case the above analysis shows
that d = (2, . . . , 2, d) or (d, 2, . . . , 2).
Case 6. First notice that dihedral types (i.e., types G2 , H2 , I) are already ruled out
by the above cases. The same cases also rule out one possibility in types B, C, H,
where we may now set n > 3. For the remaining cases of types B, C, H, assume
that the Coxeter graph is labelled
ฮฑ
โโ
ฮฒ1
โโ
ยทยทยท
โโ
ฮฒmโ1
โโ
ฮณ,
with mฮฑฮฑ > 3, mฮณฮณ = 2, mฮฒmโ1 ฮณ > 4. In this case we construct the N C(M )-module
M by appealing to Figure 3.5; now proceed as above.
Case 7. The next case is of type Dn , with n > 4. Notice that ฮฑ is an extremal
(i.e., pendant) vertex by the above analysis. First assume ฮฑ is the extremal node
GENERALIZED NIL-COXETER ALGEBRAS OVER COMPLEX REFLECTION GROUPS2993
on the โlong armโ of the Coxeter graph. Now appeal to Figure 3.4 with m = n โ 2,
to construct an N C(M )-module M .
The other sub-case is when ฮฑ is one of the other two extremal nodes in the
Dn -graph. Define the quotient algebra N C 0 (M ) whose Coxeter graph is of type D4
(i.e., where we kill the n โ 4 generators Ti in the long arm that are the furthest
away from ฮฑ). Now repeat the construction in the previous paragraph, using Figure
3.4 with m = 2. It is easy to verify that the space M is a module for N C 0 (M ),
hence for the algebra N CD4 ((2, 2, 2, mฮฑฮฑ )). This allows us to proceed as in the
previous sub-case and show that N C 0 (M ) is not finitely generated, whence neither
is N C(M ).
Case 8. If the Coxeter graph is of type E, then we may reduce to the Dn -case by
the analysis in the previous case. Hence it follows using Figure 3.4 that N C(M ) is
not finitely generated.
Case 9. If the Coxeter graph is of type F4 , then we may reduce to the Bn -case
by the analysis in Case 7. It now follows from Case 6 that N C(M ) is not finitely
generated.
This completes the classification for generalized Coxeter groups W (M ). We
now appeal to the classification and presentation of all finite complex reflection
groups, whose Coxeter graph is connected. These groups and their presentations
are listed in [BMR2, Tables 1โ4]. In what follows, we adopt the following notation:
if W = Gm for 4 6 m 6 37, then the corresponding generalized nil-Coxeter algebras
will be denoted by N Cm (d). Similarly if W = G(de, e, r), then we work with
N C(de,e,r) (d). In what follows, we will often claim that N CW (d) is not finitely
generated (over k), omitting the phrase โunless it is the usual nil-Coxeter algebra
over a finite Coxeter groupโ.
Case 10 (Exceptional types with finite Coxeter graph). If W = Gm for m =
4, 8, 16, 25, 32, then its Coxeter graph is of type A. This case has been addressed
above; thus the only possibility that N CW (d) has finite rank is that it equals
N CAn ((2, . . . , 2, d)) for d > 2, as desired.
Next if W = Gm for m = 5, 10, 18, 26, then its Coxeter graph is of type B, which
was also addressed above and never yields an algebra of finite k-rank. Now suppose
W = G29 . Then s, t, u form a sub-diagram of type B3 , whence the quotient algebra
0
N C29
generated by Ts , Tt , Tu is not finitely generated, by arguments as in Case 7
above. It follows that N C29 (d) is also not finitely generated.
The next case is if W = Gm for m = 6, 9, 14, 17, 20, 21. In this case the Coxeter
graph is of dihedral type, which was also addressed above.
Case 11 (All other exceptional types). For the remaining exceptional values of
m โ [4, 37], with W not a finite Coxeter group, we will appeal to Figure 3.3. There
are three cases: first, suppose m = 31. In this case, set (s, t, u)
(s, u, t) in Figure
3.3 and define an N Cm (d)-module M that is k-free with basis {Ar , Br , Cr : r > 1}.
Now proceed as above.
Next if m = 33, 34, then set (s, t, u)
(w, t, u) in Figure 3.3 to define an
N Cm (d)-module M , and proceed as above.
Finally, fix any other m, i.e., m = 7, 11, 12, 13, 15, 19, 22, 24, 27. In this case, use
Figure 3.3 to define an N Cm (d)-module M , and proceed as above.
2994
APOORVA KHARE
Case 12 (The infinite families). It remains to consider the six infinite families
enumerated in [BMR2], which make up the family G(de, e, r). Three of the families
consist of finite Coxeter groups of types A, B, I, which were considered above. We
now consider the other three families.
(a) Suppose W = G(de, e, r) with e > 3. Then by [BMR2, Table 1], consider
0
the quotient algebra N C(de,e,r)
of N C(de,e,r) (d) which is generated by s, t :=
0
0
t2 , u := t2 , by killing all other generators Ti . The generators of N C(de,e,r)
now
satisfy the relations
Tsds = Ttdt = Tudu = 0,
Ts Tt Tu = Tt Tu Ts ,
T T T T ยท ยท ยท = T T Tu Ts ยท ยท ยท .
}
| u s {zt u } | s t {z
(e+1) times
(e+1) times
0
Thus, use Figure 3.3 to define an N C(de,e,r)
-module structure on M , and proceed as above to show that N C(de,e,r) (d) is not finitely generated.
(b) Suppose W = G(2d, 2, r) with d > 2; see [BMR2, Table 2]. Apply a similar
argument as in the previous sub-case, using the same generators and the same
figure.
(c) Suppose W = G(e, e, r) with e > 2 and r > 2. If e = 2, then G(2, 2, r) is a
finite Coxeter group, hence was addressed above. Next, if r > 3 then killing Ts
reduces to (a quotient of) the Dn -case, which was once again addressed above.
Finally, suppose r = 3 6 e. Setting s := t3 , t := t02 , u := t2 , the generators of
N C(e,e,3) satisfy
Tsds = Ttdt = Tudu = 0,
2
2
(Ts Tt Tu ) = (Tt Tu Ts ) ,
Ts Tt Ts = Tt Ts Tt ,
Ts Tu Ts = Tu Ts Tu ,
T T Tu Tt ยท ยท ยท = Tt Tu Tt Tu ยท ยท ยท .
| u t {z
} |
{z
}
e times
e times
Once again, use Figure 3.3 to define an N C(e,e,3) -module structure on M , and
proceed as above.
This completes the proof of (1) =โ (2) for finite complex reflection groups.
Next, by e.g. [Hum, Chapter 7], for no infinite Coxeter group W is N CW ((2, . . . , 2))
a finitely generated k-module, whence the same result holds for N CW (d) when all
di > 2. We now use the classification of the (remaining) infinite complex reflection
groups W associated to a connected braid diagram. These groups were described
in [Pop1] and subsequently in [Mal]. Thus, there exists a complex affine space E
with group of translations V ; choosing a basepoint v0 โ E, we can identify the
semidirect product GL(V ) n V with the group A(E) of affine transformations of
E. Moreover, W โ A(E). Define Lin(W ) to be the image of W in the factor group
GL(V ), and Tran(W ) to be the subset of W in V , i.e.,
(6.1)
Tran(W ) := W โฉ V,
Lin(W ) := W/ Tran(W ).
It remains to consider three cases for irreducible infinite complex reflection groups
W.
Case 13. The group W is noncrystallographic, i.e., E/W is not compact. Then by
[Pop1, Theorem 2.2], there exists a real form ER โ E whose complexification is E,
i.e., ER โR C = E. Moreover, by the same theorem, restricting the elements of W
to ER yields an affine Weyl group WR . Hence if N CW (d) is a finitely generated
k-module, then so is N CWR ((2, . . . , 2)), which is impossible.
GENERALIZED NIL-COXETER ALGEBRAS OVER COMPLEX REFLECTION GROUPS2995
Case 14. The group W is a genuine crystallographic group, i.e., E/W is compact
and Lin(W ) is not the complexification of a real reflection group. Such groups were
studied by Malle in [Mal], and Coxeter-type presentations for these groups were
provided in Tables I, II in loc. cit. Specifically, Malle showed that these groups are
quotients of a free monoid by a set of braid relations and order relations, together
with one additional order relation R0m0 = 1. We now show that for none of these
groups W is the algebra N CW (d) (defined in Definition 1.11) a finitely generated
k-module. To do so, we proceed as above, by specifying the sub-figure in Figure 3
that corresponds to each of these groups. There are three sub-cases:
(1) Suppose W is the group [G(3, 1, 1)] in [Mal, Table I], or [Km ] in [Mal,
Table II] for m = 4, 8, 25, 32. For these groups we appeal to Figure 3.1 and
proceed as in Case 2 above.
(2) For W = [K33 ], [K34 ], notice that it suffices to show the claim that given
f3 Coxeter graph (i.e., a 4-cycle) with nodes labelled ฮฑ1 , . . . , ฮฑ4 in
the A
clockwise fashion, the corresponding algebra N CA
f3 (d) is not a finitely generated k-module. For this we construct a module M , using Figure 4 below
with n = 4. Now proceeding as above shows the claim, and hence the result
for [K33 ], [K34 ].
Bn
ฮฑn
B1
+
ฮฑ1
..
.
ยทยทยท
B2
Figure 4. Module M for N CAfn (d)
(3) For the remaining cases in [Mal, Tables I, II], we appeal to Figure 3.3 as in
Case 11 above, with three suitably chosen generators in each case.
Case 15. Finally, we consider the remaining โnongenuine, crystallographicโ cases
as in [Pop1, Table 2]. Thus, E/W is compact and Lin(W ) is the complexification of
a real reflection group. In these cases, verify by inspection from [Pop1, Table 2] that
the cocycle c is always trivial. Thus W = Lin(W )nTran(W ), with W 0 := Lin(W ) a
finite Weyl group, and Tran(W ) a lattice of rank 2|I 0 |, where I 0 indexes the simple
reflections in the Weyl group W 0 .
We now claim that the corresponding family of generalized nil-Coxeter algebras
N CW (d) are not finitely generated as k-modules. To show the claim requires
a presentation of W in terms of generating reflections. The following recipe for
such a presentation was communicated to us by Popov [Pop2]. Notice from e.g.
[Pop1, Table 2] that Tran(W ) is a direct sum of two Lin(W )-stable lattices ฮ1
and ฮ2 = ฮฑฮ1 (with ฮฑ 6โ R), each of rank |I 0 |. Thus, ฮ1 โผ
= ฮ2 as ZW 0 -modules,
0
with W = Lin(W ) a finite real reflection group as above. Moreover, for j =
1, 2, the semidirect product Sj := W 0 n ฮj is a real crystallographic reflection
group whose fundamental domain is a simplex; this yields a presentation of Sj via
|I 0 | + 1 generating reflections in the codimension-one faces of this simplex. One now
combines these presentations for S1 , S2 to obtain a system of |I 0 | + 2 generators for
2996
APOORVA KHARE
W ; see in this context the remarks following [Mal, Theorem 3.1]. In this setting, it
follows by [Pop1, Theorem 4.5] that each Sj is isomorphic, as a real reflection group,
f0 over W 0 , since the Coxeter type of Sj is determined
to the affine Weyl group W
by the Coxeter types of W 0 and ฮj . Thus W is in some sense a โdouble affine Weyl
groupโ. (For simply-laced W 0 , it is also easy to verify by inspection from [Pop1,
Table 2] that ฮj is isomorphic as a ZW 0 -module to the root lattice for W 0 , whence
f0 for j = 1, 2.)
Sj โผ
=W
Equipped with this presentation of W from [Pop2], we analyze N CW (d) as
follows. Fix a ZW 0 -module isomorphism ฯ : ฮ1 โ ฮ2 , and choose affine reflections
s0j โ Sj , corresponding to ยต1 and ยต2 = ฯ(ยต1 ) respectively, which together with
f0 . Then W W
f0 upon
the simple reflections {si : i โ I 0 } โ W generate Sj โผ
=W
quotienting by the relation: s01 = s02 . Using the presentation of N CW (d) via the
corresponding |I 0 | + 2 generators {Ti : i โ I 0 } t {T01 , T02 },
N CW (d) N CW ((2, . . . , 2)) N CW ((2, . . . , 2))/(T01 โT02 ) โผ
= N C f0 ((2, . . . , 2)),
W
and this last term is an affine Weyl nil-Coxeter algebra, hence is not finitely generated as a k-module. Therefore neither is N CW (d), as desired.
This shows that (1) =โ (2); the converse follows by [Hum, Chapter 7] and
Theorem B.
We now show that (2) and (3) are equivalent. Note from the above case-bycase analysis that if N CW (d) is not finitely generated, then either it surjects onto
an affine Weyl nil-Coxeter algebra N CW
f0 ((2, . . . , 2)), or one can define a module
M as above, and for each r > 1 there exists a word Twr โ N CW (d), expressed
using O(r) generators, which sends the k-basis vector A1 โ M to Ar . It follows in
both cases that m is not nilpotent. Next, if W = W (M ) is a finite Coxeter group,
then it is well-known (see e.g. [Hum, Chapter 7]) that m is nilpotent. Finally, if
N C(M ) = N CA (n, d), then m is nilpotent by Theorem C. This shows (2) โโ (3).
The final statement on the length function ` and the longest element also follows
from [Hum, Chapter 7] and Theorem C.
Remark 6.2. If M is a generalized Coxeter matrix with some mij = โ, then we
can similarly work with M the k-span of {ar , br : r > 1}, where
Ti : ar 7โ br , br 7โ 0,
Tj : br 7โ ar+1 , ar 7โ 0,
and all other Tk kill M . It follows that N C(M ) once again has infinite k-rank.
Acknowledgments
The author is grateful to Ivan Marin, Vladimir Popov, and Victor Reiner for
informative and stimulating correspondences; and to James Humphreys for carefully
going through an earlier draft and providing valuable feedback. The author also
thanks Daniel Bump, Gunter Malle, Eric Rowell, Travis Scrimshaw, and Bruce
Westbury for useful references and discussions. The author is partially supported
by a Young Investigator Award from the Infosys Foundation.
References
[AnSc]
[As]
Nicolaฬs Andruskiewitsch and Hans-Juฬrgen Schneider, On the classification of finitedimensional pointed Hopf algebras, Annals of Mathematics 171(1):375โ417, 2010.
Joachim Assion, A proof of a theorem of Coxeter, C. R. Math. Rep. Acad. Sci. Canada
1(1):41โ44, 1978/79.
GENERALIZED NIL-COXETER ALGEBRAS OVER COMPLEX REFLECTION GROUPS2997
[Ba]
Tathagata Basak, On Coxeter diagrams of complex reflection groups, Transactions of the
American Mathematical Society 364(9):4909โ4936, 2012.
[BSS]
Chris Berg, Franco Saliola, and Luis Serrano, Pieri operators on the affine nilCoxeter
algebra, Transactions of the American Mathematical Society 366(1):531โ546, 2014.
[BGG] Joseph N. Bernstein, Israel M. Gelfand, and Sergei I. Gelfand, Schubert cells and cohomology of the spaces G/P , Russian Mathematical Surveys 28(2):1โ26, 1973.
[BS]
Joseph N. Bernstein and Ossip Schwarzman, Complex crystallographic Coxeter groups
and affine root systems, Journal of Nonlinear Mathematical Physics 13(2):163โ182, 2006.
[Be]
David Bessis, Zariski theorems and diagrams for braid groups, Inventiones mathematicae
145(3):487โ507, 2001.
[BMR1] Michel Broueฬ, Gunter Malle, and Raphaeฬl Rouquier, On complex reflection groups and
their associated braid groups, Representations of groups (Banff, 1994), CMS Conference
Proceedings 16:1โ13, American Mathematical Society, Providence, 1995.
[BMR2] Michel Broueฬ, Gunter Malle, and Raphaeฬl Rouquier, Complex reflection groups, braid
groups, Hecke algebras, Journal fuฬr die reine und angewandte Mathematik 500:127โ190,
1998.
[Ca]
Roger W. Carter, Representation theory of the 0-Hecke algebra, Journal of Algebra
104(1):89โ103, 1986.
[Ch]
Eirini Chavli, The BroueฬโMalleโRouquier conjecture for the exceptional groups of rank
2, Ph.D. thesis, 2016.
[Coh]
Arjeh M. Cohen, Finite complex reflection groups, Annales scientifiques de lโEฬcole Normale Supeฬrieure, Seฬr. 4, 9(3):379โ436, 1976.
[Cox1] Harold S.M. Coxeter, Discrete groups generated by reflections, Annals of Mathematics
35(3):588โ621, 1934.
[Cox2] Harold S.M. Coxeter, The complete enumeration of finite groups of the form Ri2 =
(Ri Rj )kij = 1, Journal of the London Mathematical Society s1-10(1):21โ25, 1935.
[Cox3] Harold S.M. Coxeter, Factor groups of the braid group, Proceedings of the 4th Canadian
Mathematical Congress (Banff, 1957), University of Toronto Press, 95โ122, 1959.
[Dr]
Vladimir G. Drinfeld, Degenerate affine Hecke algebras and Yangians, Functional Analysis and its Applications 20(1):58โ60, 1986.
[Et]
Pavel Etingof, Proof of the BroueฬโMalleโRouquier conjecture in characteristic zero (after
I. Losev and I. MarinโG. Pfeiffer), Arnold Mathematical Journal 3(3):445โ449, 2017.
[EG]
Pavel Etingof and Victor Ginzburg, Symplectic reflection algebras, Calogero-Moser space,
and deformed Harish-Chandra homomorphism, Inventiones mathematicae 147(2):243โ
348, 2002.
[ES]
Pavel Etingof and Olivier Schiffmann, Lectures on Quantum Groups, Lectures in Mathematical Physics, International Press, Somerville, MA, 1998.
[FS]
Sergey Fomin and Richard Stanley, Schubert polynomials and the nil-Coxeter algebra,
Advances in Mathematics 103(2):196โ207, 1994.
[GHV] Matฤฑฬas Granฬa, Istvaฬn Heckenberger, and Leandro Vendramin, Nichols algebras of group
type with many quadratic relations, Advances in Mathematics 227(5):1956โ1989, 2011.
[HV1] Istvaฬn Heckenberger and Leandro Vendramin, A classification of Nichols algebras of
semi-simple Yetter-Drinfeld modules over non-abelian groups, Journal of the European
Mathematical Society 19(2):299โ356, 2017.
[HV2] Istvaฬn Heckenberger and Leandro Vendramin, The classification of Nichols algebras over
groups with finite root system of rank two, Journal of the European Mathematical Society
19(7):1977โ2017, 2017.
[Hug1] Mervyn C. Hughes, Complex reflection groups, Communications in Algebra 18(12):3999โ
4029, 1990.
[Hug2] Mervyn C. Hughes, Extended root graphs for complex reflection groups, Communications
in Algebra 27(1):119โ148, 1999.
[Hum] James E. Humphreys, Reflection groups and Coxeter groups, Cambridge studies in
advanced mathematics no. 29, Cambridge University Press, Cambridge-New YorkMelbourne, 1990.
[Kha]
Apoorva Khare, Generalized nil-Coxeter algebras, cocommutative algebras, and the PBW
property, AMS Contemporary Mathematics 688:139โ168, 2017.
[Kho]
Mikhail Khovanov, NilCoxeter algebras categorify the Weyl algebra, Communications in
Algebra 29(11):5033โ5052, 2001.
2998
[KL]
[KK]
[Ko]
[LS]
[LT]
[Lo]
[Lu]
[Mal]
[Mar]
[MP]
[No]
[ORS]
[Pop1]
[Pop2]
[ReS]
[ST]
[SW1]
[SW2]
APOORVA KHARE
Mikhail Khovanov and Aaron D. Lauda, A diagrammatic approach to categorification of
quantum groups I, Representation Theory 13:309โ347, 2009.
Bertram Kostant and Shrawan Kumar, The nil Hecke ring and cohomology of G/P for
a Kac-Moody group G, Advances in Mathematics 62(3):187โ237, 1986.
David W. Koster, Complex reflection groups, Ph.D. thesis, University of Wisconsin, 1975.
Alain Lascoux and Marcel-Paul Schuฬtzenberger, Fonctorialiteฬ des polynoฬmes de Schubert,
Invariant Theory (R. Fossum, W. Haboush, M. Hochster and V. Lakshmibai, Eds.),
Contemporary Mathematics Volume 88, pages 585โ598, American Mathematical Society,
Providence, 1989.
Gustav I. Lehrer and Donld E. Taylor, Unitary reflection groups, Australian Mathematical Society Lecture Series Volume 20, Cambridge University Press, Cambridge, 2009.
Ivan Losev, Finite-dimensional quotients of Hecke algebras, Algebra & Number Theory
9(2):493โ502, 2015.
George Lusztig, Affine Hecke algebras and their graded version, Journal of the American
Mathematical Society 2:599โ635, 1989.
Gunter Malle, Presentations for crystallographic complex reflection groups, Transformation Groups 1(3):259โ277, 1996.
Ivan Marin, The freeness conjecture for Hecke algebras of complex reflection groups, and
the case of the Hessian group G26 , Journal of Pure and Applied Algebra 218(4):704โ720,
2014.
Ivan Marin and Goฬtz Pfeiffer, The BMR freeness conjecture for the 2-reflection groups,
Mathematics of Computation, published online, 2016.
P.N. Norton, 0-Hecke algebras, Journal of the Australian Mathematical Society A,
27(3):337โ357, 1979.
Peter Orlik, Victor Reiner, and Anne V. Shepler, The sign representation for Shephard
groups, Mathematische Annalen 322(3):477โ492, 2002.
Vladimir L. Popov, Discrete complex reflection groups, Communications of the Mathematical Institute, vol. 15, Rijksuniversiteit Utrecht, 89 pp., 1982.
Vladimir L. Popov, personal communication, Feb. 2016.
Victor Reiner and Anne V. Shepler, Invariant derivations and differential forms for
reflection groups, preprint, arXiv:1612.01031.
Geoffrey C. Shephard and John A. Todd, Finite unitary reflection groups, Canadian
Journal of Mathematics 6:274โ304, 1954.
Anne V. Shepler and Sarah Witherspoon, A PoincareฬโBirkhoffโWitt theorem for quadratic algebras with group actions, Transactions of the American Mathematical Society
366(12):6483โ6506, 2014.
Anne V. Shepler and Sarah Witherspoon, PoincareฬโBirkhoffโWitt Theorems, Commutative Algebra and Noncommutative Algebraic Geometry, Volume I: Expository Articles
(D. Eisenbud, S.B. Iyengar, A.K. Singh, J.T. Stafford, and M. Van den Bergh, Eds.),
Mathematical Sciences Research Institute Proceedings Volume 67, pages 259โ290, Cambridge University Press, Cambridge, 2015.
Department of Mathematics, Indian Institute of Science, Bangalore โ 560012, India
E-mail address: [email protected]
| 4math.GR
|
Feudal Reinforcement Learning for Dialogue Management in Large
Domains
Inฬigo Casanueva1 , Paweล Budzianowski1 , Pei-Hao Su2 ,
Stefan Ultes1 , Lina Rojas-Barahona1 , Bo-Hsiang Tseng1 and Milica Gasฬicฬ1
1
Department of Engineering, University of Cambridge, UK
2
PolyAI Limited, London, UK
[email protected]
arXiv:1803.03232v1 [cs.CL] 8 Mar 2018
Abstract
Reinforcement learning (RL) is a promising
approach to solve dialogue policy optimisation. Traditional RL algorithms, however, fail
to scale to large domains due to the curse
of dimensionality. We propose a novel Dialogue Management architecture, based on Feudal RL, which decomposes the decision into
two steps; a first step where a master policy
selects a subset of primitive actions, and a second step where a primitive action is chosen
from the selected subset. The structural information included in the domain ontology is
used to abstract the dialogue state space, taking the decisions at each step using different
parts of the abstracted state. This, combined
with an information sharing mechanism between slots, increases the scalability to large
domains. We show that an implementation
of this approach, based on Deep-Q Networks,
significantly outperforms previous state of the
art in several dialogue domains and environments, without the need of any additional reward signal.
1
Introduction
Task-oriented Spoken Dialogue Systems (SDS),
in the form of personal assistants, have recently
gained much attention in both academia and industry. One of the most important modules of a
SDS is the Dialogue Manager (DM) (or policy),
the module in charge of deciding the next action in
each dialogue turn. Reinforcement Learning (RL)
(Sutton and Barto, 1999) has been studied for several years as a promising approach to model dialogue management (Levin et al., 1998; Henderson
et al., 2008; Pietquin et al., 2011; Young et al.,
2013; Casanueva et al., 2015; Su et al., 2016).
However, as the dialogue state space increases, the
number of possible trajectories needed to be explored grows exponentially, making traditional RL
methods not scalable to large domains.
Hierarchical RL (HRL), in the form of temporal abstraction, has been proposed in order to mitigate this problem (Cuayaฬhuitl et al., 2010, 2016;
Budzianowski et al., 2017; Peng et al., 2017).
However, proposed HRL methods require that the
task is defined in a hierarchical structure, which is
usually handcrafted. In addition, they usually require additional rewards for each subtask. Space
abstraction, instead, has been successfully applied
to dialogue tasks such as Dialogue State Tracking (DST) (Henderson et al., 2014b), and policy transfer between domains (Gasฬicฬ et al., 2013,
2015; Wang et al., 2015). For DST, a set of binary classifiers can be defined for each slot, with
shared parameters, learning a general way to track
slots. The policy transfer method presented in
(Wang et al., 2015), named Domain Independent
Parametrisation (DIP), transforms the belief state
into a slot-dependent fixed size representation using a handcrafted feature function. This idea could
also be applied to large domains, since it can be
used to learn a general way to act in any slot.
In slot-filling dialogues, a HRL method that relies on space abstraction, such as Feudal RL (FRL)
(Dayan and Hinton, 1993), should allow RL scale
to domains with a large number of slots. FRL divides a task spatially rather than temporally, decomposing the decisions in several steps and using
different abstraction levels in each sub-decision.
This framework is especially useful in RL tasks
with large discrete action spaces, making it very
attractive for large domain dialogue management.
In this paper, we introduce a Feudal Dialogue
Policy which decomposes the decision in each turn
into two steps. In a first step, the policy decides if
it takes a slot independent or slot dependent action. Then, the state of each slot sub-policy is abstracted to account for features related to that slot,
and a primitive action is chosen from the previously selected subset. Our model does not require
any modification of the reward function and the
hierarchical architecture is fully specified by the
structured database representation of the system
(i.e. the ontology), requiring no additional design.
2
Main belief state (๐)
๐1 (๐)
๐* (๐)
๐,10
Qฯ (b, a) = E{R|bt = b, at = a}
(1)
PT โ1 (ฯ โt)
rฯ and ฮณ is a discount
where R =
ฯ =t ฮณ
factor, with 0 โค ฮณ โค 1.
The objective of RL is to find an optimal policy ฯ โ , i.e. a policy that maximizes the expected
return in each belief state. In Value-based algorithms, the optimal policy can be found by greedily taking the action which maximises Qฯ (b, a).
In slot-filling SDSs the belief state space B is
defined by the ontology, a structured representation of a database of entities that the user can retrieve by talking to the system. Each entity has
a set of properties, refereed to as slots S, where
each of the slots can take a value from the set Vs .
The belief state b is then defined as the concatenation of the probability distribution of each slot,
plus a set of general features (e.g. the communication function used by the user, the database
search method...) (Henderson et al., 2014a). The
set A is defined as a set of summary actions, where
the actions can be either slot dependent (e.g. request(food), confirm(area)...) or slot independent1
(e.g. hello(), inform()...).
The belief space B is defined by the ontology, therefore belief states of different domains
will have different shapes. In order to transfer
knowledge between domains, Domain Independent Parametrization (DIP) (Wang et al., 2015)
proposes to abstract the belief state b into a fixed
1
We include the summary actions dependent on all the
slots, such as inform(), in this group.
-
๐*
Argmax
over master
actions
๐,* - โฆ ๐,* (
)
Argmax over slot
independent primitives
๐,10
/
๐")
๐2
"
โฆ
๐"#
๐"(
"
โฆ ๐") (๐)
๐"#
๐"(
๐1
๐*
Background
Dialogue management can be cast as a continuous MDP (Young et al., 2013) composed of a continuous multivariate belief state space B, a finite
set of actions A and a reward function R(bt , at ).
At a given time t, the agent observes the belief
state bt โ B, executes an action at โ A and receives a reward rt โ R drawn from R(bt , at ). The
action taken, a, is decided by the policy, defined
as the function ฯ(b) = a. For any policy ฯ and
b โ B, the Q-value function can be defined as the
expected (discounted) return R, starting from state
b, taking action a, and then following policy ฯ until the end of the dialogue at time step T :
๐"( (๐) ๐"# (๐)
๐1
"
๐")
"
"
"
๐,(/ โฆ ๐,(/ ๐,#/ โฆ ๐,#/ โฆ ๐,)/ โฆ ๐,)/
(
)
(
)
(
)
Argmax over slots and slot
dependent primitives
Figure 1: Feudal dialogue architecture used in this
work. The sub-policies surrounded by the dashed line
have shared parameters. The simple lines show the data
flow and the double lines the sub-policy decisions.
size representation. As each action is either slot independent or dependent on a slot s, a feature function ฯdip (b, s) can be defined, where s โ Sโชsi and
si stands for slot independent actions. Therefore,
in order to compute the policy, Q(b, a) can be approximated as Q(ฯdip (b, s), a), where s is the slot
associated to action a.
Wang et al. (2015) presents a handcrafted feature function ฯdip (b, s). It includes the slot independent features of the belief state, a summarised
representation of the joint belief state, and a summarised representation of the belief state of the
slot s. Section 4 gives a more detailed description
of the ฯdip (b, s) function used in this work.
3
Feudal dialogue management
FRL decomposes the policy decision ฯ(b) = a in
each turn into several sub-decisions, using different abstracted parts of the belief state in each subdecision. The objective of a task oriented SDS
is to fulfill the users goal, but as the goal is not
observable for the SDS, the SDS needs to gather
enough information to correctly fulfill it. Therefore, in each turn, the DM can decompose its decision in two steps: first, decide between taking
an action in order to gather information about the
user goal (information gathering actions) or taking an action to fulfill the user goal or a part of it
(information providing actions) and second, select
a (primitive) action to execute from the previously
selected subset. In a slot-filling dialogue, the set of
information gathering actions can be defined as the
set of slot dependent actions, while the set of information providing actions can be defined as the
remaining actions.
The architecture of the feudal policy proposed
by this work is represented schematically in Figure
1. The (primitive) actions are divided between two
subsets; slot independent actions Ai (e.g. hello(),
inform()); and slot dependent actions Ad (e.g. request(), confirm())2 . In addition, a set of master
m
m
actions Am = (am
i , ad ) is defined, where ai corresponds to taking an action from Ai and am
d to
taking an action from Ad . Then, a feature function
ฯs (b) = bs is defined for each slot s โ S, as well
as a slot independent feature function ฯi (b) = bi
and a master feature function ฯm (b) = bm . These
feature functions can be handcrafted (e.g. the DIP
feature function introduced in section 2) or any
function approximator can be used (e.g. neural
networks trained jointly with the policy).
Finally, a master policy ฯm (bm ) = am , a slot
independent policy ฯi (bi ) = ai and a set of slot
specific policies ฯs (bs ) = ad , one for each s โ S,
are defined, where am โ Am , ai โ Ai and
ad โ Ad . Contrary to other feudal policies, the
slot specific sub-policies have shared parameters,
in order to generalise between slots (following the
idea used by Henderson et al. (2014b) for DST).
The differences between the slots (size, value distribution...) are accounted by the feature function
ฯs (b). Therefore ฯm (bm ) is defined as:
ฯm (bm ) = argmax Qm (bm , am )
(2)
am โAm
If ฯm (bm ) = am
i , the sub-policy run is ฯi :
ฯi (bi ) = argmax Qi (bi , ai )
(3)
ai โAi
Else, if ฯm (bm ) = am
d , ฯd is selected. This policy
runs each slot specific policy, ฯs , for all s โ S,
choosing the action-slot pair that maximises the Q
function over all the slot sub-policies.
ฯd (bs |โs โ S) = argmax Qs (bs , ad )
(4)
ad โAd ,sโS
Then, the summary action a is constructed by joining ad and s (e.g. if ad =request() and s=food,
then the summary action will be request(food)). A
pseudo-code of the Feudal Dialogue Policy algorithm is given in Appendix A.
Domain
Cambridge Restaurants
San Francisco Restaurants
Laptops
SER
Masks
User
Env. 1
0%
on
Std.
Code
CR
SFR
LAP
Env. 2
0%
off
Std.
# constraint slots
3
6
11
Env. 3
15%
on
Std.
Env. 4
15%
off
Std.
# requests
9
11
21
# values
268
636
257
Env. 5
15%
on
Unf.
Env. 6
30%
on
Std.
Table 1: Sumarised description of the domains and
environments used in the experiments. Refer to
(Casanueva et al., 2017) for a detailed description.
4
Experimental setup
The models used in the experiments have been implemented using the PyDial toolkit (Ultes et al.,
2017)3 and evaluated on the PyDial benchmarking environment (Casanueva et al., 2017). This
environment presents a set of tasks which span
different size domains, different Semantic Error
Rates (SER), and different configurations of action masks and user model parameters (Standard
(Std.) or Unfriendly (Unf.)). Table 1 shows a summarised description of the tasks. The models developed in this paper are compared to the state-ofthe-art RL algorithms and to the handcrafted policy presented in the benchmarks.
4.1
DIP-DQN baseline
An implementation of DIP based on Deep-Q
Networks (DQN) (Mnih et al., 2013) is implemented as an additional baseline (Papangelis and
Stylianou, 2017). This policy, named DIP-DQN,
uses the same hyperparameters as the DQN implementation released in the PyDial benchmarks.
A DIP feature function based in the description in
(Wang et al., 2015) is used, ฯdip (b, s) = ฯ0 (b) โ
ฯj (b) โ ฯd (b, s), where:
โข ฯ0 (b) accounts for general features of the belief
state, such as the database search method.
โข ฯj (b) accounts for features of the joint belief
state, such as the entropy of the joint belief.
โข ฯd (b, s) accounts for features of the marginal
distribution of slot s, such as the entropy of s.
Appendix B shows a detailed description of the
DIP features used in this work.
4.2
Feudal DQN policy
A Feudal policy based on the architecture described in sec. 3 is implemented, named FDQN.
Each sub-policy is constructed by a DQN policy
2
Note that the actions of this set are composed just by the
communication function of the slot dependent actions, thus
reducing the number of actions compared to A.
3
The implementation of the models can be obtained in
www.pydial.org
Env. 1
Env. 2
Env. 3
Env. 4
Env. 5
Env. 6
Task
CR
SFR
LAP
CR
SFR
LAP
CR
SFR
LAP
CR
SFR
LAP
CR
SFR
LAP
CR
SFR
LAP
Feudal-DQN
Suc.
Rew.
89.3% 11.7
71.1%
7.1
65.5%
5.7
97.8% 13.1
95.4% 12.4
94.1% 12.0
92.6% 11.7
90.0%
9.7
89.6%
9.4
91.4% 11.2
90.3% 10.2
88.7%
9.8
96.3% 11.5
88.9%
7.9
78.8%
5.2
90.6% 10.4
83.0%
7.1
78.5%
6.0
DIP-DQN
Suc.
Rew.
48.8%
-2.8
25.8%
-7.4
26.6%
-8.8
85.5%
9.6
85.7%
8.4
89.5%
9.7
86.1%
8.9
59.3%
0.2
71.5%
3.1
82.6%
8.7
86.1%
9.2
74.8%
6.0
74.4%
2.9
75.5%
3.2
64.4%
-0.4
83.4%
8.1
71.9%
3.9
66.5%
2.7
Bnch.
Rew.
13.5
11.7
10.5
12.2
9.6
7.3
11.9
8.6
6.7
10.7
7.7
5.5
10.5
4.5
4.1
10.0
3.9
3.6
Hdc.
Rew.
14.0
12.4
11.7
14.0
12.4
11.7
11.0
9.0
8.7
11.0
9.0
8.7
9.3
6.0
5.3
9.7
6.4
5.5
Table 2: Success rate and reward for Feudal-DQN and
DIP-DQN in the 18 benchmarking tasks, compared
with the reward of the best performing algorithm in
each task (Bnch.) and the handcrafted policy (Hdc.)
presented in (Casanueva et al., 2017).
(Su et al., 2017). These policies have the same
hyperparameters as the baseline DQN implementation, except for the two hidden layer sizes, which
are reduced to 130 and 50 respectively. As feature
functions, subsets of the DIP features are used:
ฯm (b) = ฯi (b) = ฯ0 (b) โ ฯj (b)
ฯs (b) = ฯ0 (b) โ ฯj (b) โ ฯd (b, s) โs โ S
The original set of summary actions of the benchmarking environment, A, has a size of 5 + 3 โ |S|,
where |S| is the number of slots. This set is divided in two subsets4 : Ai of size 6 and Ad of size
4. Each sub-policy (including ฯm ) is trained with
the same sparse reward signal used in the baselines, getting a reward of 20 if the dialogue is successful or 0 otherwise, minus the dialogue length.
5
Results
The results in the 18 tasks of the benchmarking
environment after 4000 training dialogues are presented in Table 2. The same evaluation procedure of the benchmarks is used, presenting the
mean over 10 different random seeds and testing
every seed for 500 dialogues. The FDQN policy
substantially outperforms every other other policy in all the environments except Env. 1. The
Figure 2: Learning curves for Feudal-DQN and DIPDQN in Env. 4, compared to the two best performing
algorithms in (Casanueva et al., 2017) (DQN and GPSarsa). The shaded area depicts the mean ยฑ the standard deviation over ten random seeds.
performance increase is more considerable in the
two largest domains (SFR and LAP), with gains
up to 5 points in accumulated reward in the most
challenging environments (e.g. Env. 4 LAP),
compared to the best benchmarked RL policies
(Bnch.). In addition, FDQN consistently outperforms the handcrafted policy (Hdc.) in environments 2 to 6, which traditional RL methods could
not achieve. In Env. 1, however, the results for
FDQN and DIP-DQN are rather low, specially for
DIP-DQN. Surprisingly, the results in Env. 2,
which only differs from Env. 1 in the absence of
action masks (thus, in principle, is a more complex environment), outperform every other algorithm. Analysing the dialogues individually, we
could observe that, in this environment, both policies are prone to โoverfitโ to an action 5 . The performance of FDQN and DIP-DQN in Env. 4 is also
better than in Env. 3, while the difference between
these environments also lies in the masks. This
suggests that an specific action mask design can
be helpful for some algorithms, but can harm the
performance of others. This is especially severe
in the DIP-DQN case, which shows good performance in some challenging environments, but it is
more unstable and prone to overfit than FDQN.
However, the main purpose of action masks is
to reduce the number of dialogues needed to train
a policy. Observing the learning curves shown
in Figure 2, the FDQN model can learn a nearoptimal policy in large domains in about 1500 dialogues, even if no additional reward is used, making the action masks unnecessary.
4
An additional pass() action is added to each subset,
which is taken whenever the other sub-policy is executed.
This simplifies the training algorithm.
5
The model overestimates the value of an incorrect action,
continuously repeating it until the user runs out of patience.
6
Conclusions and future work
We have presented a novel dialogue management
architecture, based on Feudal RL, which substantially outperforms the previous state of the art in
several dialogue environments. By defining a set
of slot dependent policies with shared parameters,
the model is able to learn a general way to act in
slots, increasing its scalability to large domains.
Unlike other HRL methods applied to dialogue,
no additional reward signals are needed and the hierarchical structure can be derived from a flat ontology, substantially reducing the design effort.
A promising approach would be to substitute
the handcrafted feature functions used in this work
by neural feature extractors trained jointly with
the policy. This would avoid the need to design
the feature functions and could be potentially extended to other modules of the SDS, making textto-action learning tractable. In addition, a single model can be potentially used in different domains (Papangelis and Stylianou, 2017), and different feudal architectures could make larger action spaces tractable (e.g. adding a third subpolicy to deal with actions dependent on 2 slots).
Acknowledgments
This research was funded by the EPSRC grant
EP/M018946/1 Open Domain Statistical Spoken
Dialogue Systems
References
Paweล Budzianowski, Stefan Ultes, Pei-Hao Su, Nikola
Mrksฬicฬ, Tsung-Hsien Wen, Inigo Casanueva, Lina
M. Rojas Barahona, and Milica Gasฬicฬ. 2017. Subdomain modelling for dialogue management with hierarchical reinforcement learning. In Proc of SIGDIAL.
Inฬigo Casanueva, Paweล Budzianowski, Pei-Hao Su,
Nikola Mrksฬicฬ, Tsung-Hsien Wen, Stefan Ultes,
Lina Rojas-Barahona, Steve Young, and Milica
Gasฬicฬ. 2017. A benchmarking environment for reinforcement learning based task oriented dialogue
management. arXiv preprint arXiv:1711.11023 .
Inigo Casanueva, Thomas Hain, Heidi Christensen, Ricard Marxer, and Phil Green. 2015. Knowledge
transfer between speakers for personalised dialogue
management. In Proceedings of the 16th Annual
Meeting of the Special Interest Group on Discourse
and Dialogue. pages 12โ21.
Heriberto Cuayaฬhuitl, Steve Renals, Oliver Lemon, and
Hiroshi Shimodaira. 2010. Evaluation of a hierar-
chical reinforcement learning spoken dialogue system. Computer Speech & Language 24(2):395โ429.
Heriberto Cuayaฬhuitl, Seunghak Yu, Ashley
Williamson, and Jacob Carse. 2016. Deep reinforcement learning for multi-domain dialogue
systems. NIPS Workkshop .
Peter Dayan and Geoffrey E Hinton. 1993. Feudal reinforcement learning. In Advances in neural information processing systems. pages 271โ278.
Milica Gasฬicฬ, Catherine Breslin, Matthew Henderson,
Dongho Kim, Martin Szummer, Blaise Thomson,
Pirros Tsiakoulis, and Steve Young. 2013. Pomdpbased dialogue manager adaptation to extended domains. In Proceedings of the SIGDIAL Conference.
Milica Gasฬicฬ, Nikola Mrksฬicฬ, Pei-hao Su, David
Vandyke, Tsung-Hsien Wen, and Steve Young.
2015. Policy committee for adaptation in multidomain spoken dialogue systems. In Automatic
Speech Recognition and Understanding (ASRU),
2015 IEEE Workshop on. IEEE, pages 806โ812.
James Henderson, Oliver Lemon, and Kallirroi
Georgila. 2008. Hybrid reinforcement/supervised
learning of dialogue policies from fixed data sets.
Computational Linguistics 34(4):487โ511.
M. Henderson, B. Thomson, and J. Williams. 2014a.
The Second Dialog State Tracking Challenge. In
Proc of SIGdial.
M. Henderson, B. Thomson, and S. J. Young. 2014b.
Word-based Dialog State Tracking with Recurrent
Neural Networks. In Proc of SIGdial.
Esther Levin, Roberto Pieraccini, and Wieland Eckert.
1998. Using markov decision process for learning
dialogue strategies. In Acoustics, Speech and Signal
Processing, 1998. Proceedings of the 1998 IEEE International Conference on. IEEE, volume 1, pages
201โ204.
Volodymyr Mnih, Koray Kavukcuoglu, David Silver, Alex Graves, Ioannis Antonoglou, Daan Wierstra, and Martin Riedmiller. 2013. Playing atari
with deep reinforcement learning. arXiv preprint
arXiv:1312.5602 .
Alexandros Papangelis and Yannis Stylianou. 2017.
Single-model multi-domain dialogue management
with deep learning. In International Workshop for
Spoken Dialogue Systems.
B. Peng, X. Li, L. Li, J. Gao, A. Celikyilmaz, S. Lee,
and K.-F. Wong. 2017. Composite Task-Completion
Dialogue System via Hierarchical Deep Reinforcement Learning. ArXiv e-prints .
Olivier Pietquin, Matthieu Geist, Senthilkumar Chandramohan, and Herveฬ Frezza-Buet. 2011. Sampleefficient batch reinforcement learning for dialogue
management optimization. ACM Transactions on
Speech and Language Processing (TSLP) 7(3):7.
Pei-Hao Su, Pawel Budzianowski, Stefan Ultes, Milica Gasic, and Steve Young. 2017. Sample-efficient
actor-critic reinforcement learning with supervised
data for dialogue management. Proceedings of SigDial .
Pei-Hao Su, Milica Gasic, Nikola Mrksic, Lina RojasBarahona, Stefan Ultes, David Vandyke, TsungHsien Wen, and Steve Young. 2016. Continuously learning neural dialogue management. arXiv
preprint arXiv:1606.02689 .
Richard S. Sutton and Andrew G. Barto. 1999. Reinforcement Learning: An Introduction. MIT Press.
Stefan Ultes, Lina M. Rojas-Barahona, Pei-Hao Su,
David Vandyke, Dongho Kim, Inฬigo Casanueva,
Paweล Budzianowski, Nikola Mrksฬicฬ, Tsung-Hsien
Wen, Milica Gasฬicฬ, and Steve J. Young. 2017. Pydial: A multi-domain statistical dialogue system
toolkit. In ACL Demo. Association of Computational Linguistics.
B
DIP features
This section gives a detailed description of the DIP
feature functions ฯdip (b, s) = ฯ0 (b) โ ฯj (b) โ
ฯd (b, s) used in this work. The differences with
the features used in (Wang et al., 2015) and (Papangelis and Stylianou, 2017) are the following:
โข No priority or importance features are used.
โข No Potential contribution to DB search features are used.
โข The joint belief features ฯj (b) are extended
to account for large-domain aspects.
Feature
function
Feature
description
Feature
size
ฯ0 (b)
last user dialogue act (bin) *
DB search method (bin) *
# of requested slots (bin)
offer happened *
last action was Inform no venue *
normalised # of slots (1/# of slots)
normalised avg. slot length (1/avg. # of values)
7
6
5
1
1
1
1
ฯj (b)
prob. of the top 3 values of bj
prob. of *NONE* value of bj
entropy of bj
diff. between top and 2nd value probs. (bin)
# of slots with top value not *NONE* (bin)
3
1
1
5
5
ฯd (b, s)
prob. of the top 3 values of s
prob. of *NONE* value of s
diff. between top and 2nd value probs. (bin)
entropy of s
# of values of s with prob. > 0 (bin)
normalised slot length (1/# of values)
slot length (bin)
entropy of the distr. of values of s in the DB
3
1
5
1
5
1
10
1
Zhuoran Wang, Tsung-Hsien Wen, Pei-Hao Su,
and Yannis Stylianou. 2015. Learning domainindependent dialogue policies via ontology parameterisation. In SIGDIAL Conference. pages 412โ416.
Steve Young, Milica Gasฬicฬ, Blaise Thomson, and Jason D Williams. 2013. Pomdp-based statistical spoken dialog systems: A review. Proceedings of the
IEEE 101(5):1160โ1179.
A
Feudal Dialogue Policy algorithm
Algorithm 1 Feudal Dialogue Policy
1: for each dialogue turn do
2:
observe b
3:
bm = ฯm (b)
4:
am = argmax Qm (bm , am )
total
am โAm
5:
6:
7:
if am == am
i then
bi = ฯi (b)
a = argmax Qi (bi , ai )
. drop to ฯi
ai โAi
8:
9:
10:
else am == am
. drop to ฯd
d then
bs = ฯs (b) โs โ S
slot, act = argmax Qs (bs , ad )
sโS,ad โAd
a = join(slot, act)
end if
13:
execute a
14: end for
11:
12:
64
Table 3: List of features composing the DIP features.
the tag (bin) denotes that a binary encoding is used for
this feature. Some of the joint features ฯj (b) are extracted from the joint belief bj , computed as the Cartesian product of the beliefs of the individual slots. *
denotes that these features exist in the original belief
state b.
| 2cs.AI
|
IDENTIFICATION OF MULTI-OBJECT DYNAMICAL SYSTEMS:
CONSISTENCY AND FISHER INFORMATION
arXiv:1707.04371v1 [math.ST] 14 Jul 2017
JEREMIE HOUSSINEAUโ , SUMEETPAL S. SINGHโ , AND AJAY JASRAโก
Abstract. Learning the model parameters of a multi-object dynamical system from partial and
perturbed observations is a challenging task. Despite recent numerical advancements in learning these
parameters, theoretical guarantees are extremely scarce. In this article, we study the identifiability
of these parameters and the consistency of the corresponding maximum likelihood estimate (MLE)
under assumptions on the different components of the underlying multi-object system. In order to
understand the impact of the various sources of observation noise on the ability to learn the model
parameters, we study the asymptotic variance of the MLE through the associated Fisher information
matrix. For example, we show that specific aspects of the multi-target tracking (MTT) problem such
as detection failures and unknown data association lead to a loss of information which is quantified
in special cases of interest.
Key words. Identifiability, Consistency, Fisher Information
AMS subject classifications. 62F12, 62B10
1. Introduction. A multi-object dynamical system is comprised of an unknown
and randomly varying number of objects, each of which is a partially observed Markov
process. Multi-target tracking refers to the problem of estimating the state of each of
these objects from noisy observations that are also corrupted by detection failures and
false detections (a.k.a. false alarms). This type of problem arises in many different
fields such as Systems Biology [2], Robotics [12], Computer Vision [14] or Surveillance
[16]. Different formulations of multi-target tracking exist, including extensions of the
single-target approach to multiple targets [1] as well as formulations based on simple
point processes [10].
One of the main challenges in multi-target tracking is the uncertainty in the data
association, which refers to the problem of finding the right pairing between targets
and recorded observations over time, a task further confounded by the corruption
of these observations with false positives and detection failures. Inferentially, multitarget tracking is notoriously difficult to solve as it involves an exponentially growing
numbers of possible configurations for the data association. Over the past decade there
has been significant advancements towards more practical solutions to this inference
problem. Some of these include solutions based on sequential Monte Carlo (SMC)
[19], hierarchical SMC [15] or Gaussian mixtures [18].
In this article, both the MTT observation model and the motion model of the
constituent individual targets are assumed unknown and are instead parameterised
and to be inferred from the data. Although multi-target tracking has been an active
research field for decades, questions concerning the identifiability and the consistency
of the corresponding model parameter estimates have not received the appropriate
attention. In this paper we aim to address this gap and shed some light on this issue.
Building on results from the literature on Markov processes (e.g. see [9, 6]), we prove
both identifiability and the consistency of the MLE of the MTT model parameters
in Theorem 3. Specifically, as each constituent target of the MTT model is a partially observed Markov process, in Theorem 2 we show that identifiability transfers
โ DSAP,
National University of Singapore. Email: [email protected]
of Engineering, University of Cambridge and The Alan Turing Institute.
Email: [email protected]
โก DSAP, National University of Singapore. Email: [email protected]
โ Department
1
2
J. HOUSSINEAU, S.S. SINGH AND A. JASRA
from single to multiple targets under appropriate assumptions. The practical implications of results regarding identifiability include the understanding of the behaviour
of Markov chain Monte Carlo (MCMC) techniques in multi-target tracking [13, 8],
which is conditioned by the likelihood ratio between the correct parameter value and
all the other possible values. The consistency of the maximum likelihood estimator
raises the question of its asymptotic normality and the corresponding variance, which
in turns motivates the study of the Fisher information matrix for this class of problems. It is demonstrated in Theorem 4 that there is a strict loss of information in
the presence of data association uncertainty or detection failures. We characterise the
Fisher information more precisely in specific illustrated cases, e.g. we show that when
increasing the number of targets there is no gain in the Fisher information for the
model parameters which are common to all targets if large uncertainties on the origin
of the corresponding observations persist (see subsection 5.3). The Fisher information
matrix is useful in applications such as sensor management [7] which aims at optimising the position of the sensor or at finding the best ratio between probability of false
alarm and probability of detection.
The proof of identifiability of the MTT model as well as our approach for studying
the asymptotic variance of the MLE for the MTT model parameters are original and,
to the best of our knowledge, the first of their kind. Consistency of the data association
problem in MTT has been studied in [17] in the context of the estimation of multiple
splitting and merging targets observed without noise over a fixed time interval during
which n observations of the multiple targets are made at discrete times. The result in
[17] is limited to the case where the number n of observation tends to infinity which
effectively amounts to saying that targets are observed infinitely many times over a
fixed interval which is a scenario not typically encountered in practice. In any case,
our theoretical results and proof techniques are entirely different as they pertain to the
MTT model parameters and not the data association. Point-process-based theoretical
studies of MTT have also been conducted in [4, 5] for the stability of specific inference
methods.
The structure of the article is as follows: after introducing the required notations
and background concepts in section 2 and section 3, the consistency of the maximum
likelihood estimator is established along with its asymptotic normality for a large
class of multi-object systems in section 4. Finally, in order to better understand the
effect of the various parameters on the asymptotic variance, the Fisher information
matrix is computed for important special cases of multi-object systems in section 5.
The article concludes in section 6.
2. Notations. All random variables will be defined on the same probability
space (โฆ, F, P) and the expectation of a random variable X w.r.t. the probability
measure P is denoted E[X]. Probability densities will be denoted by lower-case letters while probability measures will be denoted by capital letter. Similarly, random
variables will be denoted with capital letters whereas their realisations will be in
lower-case.
The time is indexed by the set N of positive integers and for every time t โ N, a
.
finite sequence yt of Mt โ N0 = N โช {0} observation points in the observation space
Y is made available. This space can be assumed to be a subset of the Euclidean
space Rd with d > 0. The sequences of observations of the form (y1 , . . . , yn ) will be
denoted y1:n . In the standard formulation of multi-target tracking, no more than one
observation is associated with a given object at a given time step and, conversely,
observations are originated from one object only.
IDENTIFICATION OF MULTI-OBJECT DYNAMICAL SYSTEMS
3
Objectsโ states are modelled as elements of a set X which is assumed to be a
0
subset of the Euclidean space Rd with d0 > 0; usually satisfying d0 โฅ d. They are
propagated independently according to a Markov kernel density fฮธ from the state
space X to itself, which depends on a parameter ฮธ from a compact set ฮ. Densities
on X are defined w.r.t. a reference measure ยต. The true value of the parameter ฮธ is
denoted ฮธโ . The random variable Xt describing the state at time t only depends on
the state xtโ1 at time t โ 1 as follows
Xt โผ fฮธ (ยท | xtโ1 ).
This transition does not depend on time so that the associated Markov chain is said
to be homogeneous. The observation process at time t given the state xt is modelled
by
Yt โผ gฮธ (ยท | xt )
where gฮธ is a likelihood function from X to Y, also parametrised by ฮธ, so that the
observation Yt at time t is independent from the states and observations at other times.
The process (Xt , Yt )tโฅ1 is usually referred to as a hidden Markov model (HMM). Its
law under the parameter ฮธ โ ฮ is denoted Pฬฮธ when initialised with its stationary
distribution assuming it exists, and Pฮธ (ยท | x0 ) when initialised at x0 โ X.
3. Background. The definition of specific properties of Markov chains that will
be used in the following sections is given here for completeness. Let (Xt )tโฅ0 be a
X-valued Markov chain with transition density f and let P (ยท | x) be the probability
measure on (XN0 , X โN0 ), where X โN0 is the cylinder ฯ-algebra on XN0 , characterising
the chain when initialised at point x โ X. Also, let ฯA be the return time to a set
A โ X defined as ฯA = inf{t โฅ 1 : Xt โ A}.
Consider the following concepts: A set A โ X is said to be accessible if ฯA < โ
has positive probability under P (ยท | x) for all x โ X. The Markov chain (Xt )tโฅ0 is
said to be
R phi-irreducible if there exists a density ฯ on X such that for any subset
A โ X, A ฯ(x)dx > 0 implies that A is accessible. A set A โ X is said to be Harris
recurrent if the event ฯA < โ happens almost surely under P (ยท | x) for all x โ X.
A phi-irreducible Markov chain is said to be Harris recurrent if any accessible set is
Harris recurrent. A density q is called invariant if for all x โ X it holds that
Z
q(x) = f (x | x0 )q(x0 )dx0 .
A phi-irreducible Markov chain is called positive if it admits an invariant probability
density. More details about these notions expressed in a measure-theoretic formulation
can be found in [11]. These concepts will be useful when considering the long-time
behaviour of the Markov chains involved in multi-target tracking problems.
4. Consistency of the maximum likelihood estimator.
4.1. The multi-target tracking model. Throughout this section, the true
number of objects in the considered system will be assumed to be fixed and will be
โ
denoted by K โ โ N. We consider a Markov chain (Xt )tโฅ0 in XK with components
independently evolving via the Markov transition fฮธ S
from X to X. Observations at
.
time t are gathered into a vector yt in the space Yร = kโฅ0 Yk where Y0 is a notation
for the set containing the empty sequence only. The observation yt is a superposition
of
4
J. HOUSSINEAU, S.S. SINGH AND A. JASRA
1. the independent observation of components of Xt via the likelihood gฮธ from X
to Y followed by a Bernoulli thinning with parameter pD corresponding to detection
failure, and
2. false alarms, or clutter, generated independently of the object-originated observations and assumed to come from an i.i.d. process whose cardinality at each time
is Poisson with parameter ฮป and common distribution Pฯ which depends on the parameter ฯ in a compact set ฮจ and which true value is denoted ฯ โ .
The number of objects K โ is not assumed to be known so that it will also be considered
as a parameter of the model. The parameter for the multi-target model is then
.
.
defined as ฮธ = [ฮธ, K, pD , ฮป, ฯ]t โ ฮ = ฮ ร S T ร (0, 1) ร S C ร ฮจ where t is the vector
T
C
transposition and where S and S are compact subsets of N and (0, โ) respectively,
with โTโ and โCโ standing for target and clutter respectively. The true parameter ฮธ โ
is assumed to be an interior point of ฮ. Special parameter sets that are not subsets
of ฮ can also be introduced by fixing one or several parameters to special values, for
.
.
.
instance ฮฮป=0 = ฮ ร S T ร (0, 1), ฮpD =1 = ฮ ร S T ร S C ร ฮจ or ฮฮป=0,pD =1 = ฮ ร S T
correspond respectively to cases where the parameters ฮป, pD or both have known
values that are outside of their domain of definition in ฮ. Alternatively, if the value
of a parameter is known but inside of its domain of definition, e.g. it is known that
K = 1, then the corresponding hyperplane will be expressed as ฮ|K=1 . Although the
Poisson distribution is not defined for the parameter ฮป = 0, this parameter value is
simply assumed to represent the case where there is no false alarm.
The Markov transition fฮธ associated with the K-target process (Xt )t can simply
be expressed as
fฮธ (x | x0 ) =
K
Y
fฮธ (xi | x0i ),
i=1
0
K
for any x, x โ X , the likelihood however takes a more sophisticated form so that
additional notations are required. Let Sym(k) be the symmetric group over k letters
and uk be the uniform distribution over Sym(k), also let qฮธ be a distribution on
{0, 1}K characterised by
. |d|
qฮธ (d) = pD (1 โ pD )Kโ|d| ,
for any d โ {0, 1}K . The variable d is such that di = 1 if and only if target i is detected
for any i โ {1, . . . , K}. The K-target likelihood gฮธ (yt | xt ) of the observations yt โ Yร
at time t given the state x โ XK is characterised by
X
.
(1) gฮธ (yt | x) =
Poฮป (Mt โ |d|)
dโ{0,1}K
|d|โคMt
ร
X
Mt
Y
ฯโSym(Mt ) i=|d|+1
|d|
pฯ yt,ฯ(i)
Y
gฮธ yt,ฯ(i) | xr(i)
uMt (ฯ)qฮธ (d) ,
i=1
where Poฮป denotes the Poisson distribution with parameter ฮป, where |d| is the 1-norm
of d, i.e. the number of detected targets and where r(i) is the ith detected target that
is the integer verifying |d1:r(i) | = i. This choice of the likelihood gฮธ corresponds to
a marginalisation over the observation-to-track data association. Note that |d| โค K
for any d โ {0, 1}K so that gฮธ (y | x) = 0 for any x โ XK if ฮป = 0 and if the number
IDENTIFICATION OF MULTI-OBJECT DYNAMICAL SYSTEMS
5
of observations in y, denoted #y, is strictly greater than K. The law of the joint
Markov chain (Xt , Yt )t under the parameter ฮธ โ ฮ is denoted Pฬฮธ when initialised by
the stationary distribution and Pฮธ (ยท | x0 ) when assumed to start at the state x0 โ XK .
The corresponding densities are written accordingly with lower-case letters.
The objective is to study the ratio pฮธ (y1:n | x0 )/pฮธโ (y1:n | x00 ) for any x0 โ XK
โ
and any x00 โ XK . The assumptions that are considered for this purpose are detailed
in the next section.
4.2. Assumptions and transferability. In order to bring a better understanding of multi-object systems as a combination of single-object systems corrupted by
clutter, assumptions are primarily made on individuals systems. The properties of
multi-object systems will be deduced from these whenever this is possible.
A.1 The constants
(2)
ฯโ = inf
inf
ฮธโฮ (x,x0 )โX2
fฮธ (x | x0 )
and
ฯ+ = sup
sup
fฮธ (x | x0 )
ฮธโฮ (x,x0 )โX2
satisfy ฯโ > 0 and ฯ+ < โ.
The condition on ฯโ in Assumption A.1 ensures that any point of the state space can
be reached from any other point in a single time step (otherwise fฮธ (x | x0 ) = 0 would
hold for at least one pair (x, x0 ) โ X2 ) while the condition on ฯ+ ensures the transition
is sufficiently regular when compared to the reference measure ยต, i.e. the transition
should be diffuse (in the sense that there should be no concentration of probability
mass on a single point of the state space). Under Assumption A.1 it also holds that
K
K
ฯโ
โค fฮธ (x | x0 ) โค ฯ+
(3)
for any x, x0 โ XK , so that fฮธ straightforwardly satisfies the same type of conditions
as fฮธ , since S T is compact and hence K is finite.
Let ฮ ฮธ be the transition kernel of the joint Markov chain (Xt , Yt )t on X ร Y
defined as ฮ ฮธ (x, y | x0 , y 0 ) = gฮธ (y | x)fฮธ (x | x0 ). The property (3) is sufficient to ensure
that the joint kernel defined as
ฮ ฮธ (x, y | x0 , y 0 ) = gฮธ (y | x)fฮธ (x | x0 ),
for any x, x0 โ XK and any y, y 0 โ Yร is positive Harris-recurrent and aperiodic.
In the next assumption, the expectations Eฬฮธโ [ยท], Eฯโ [ยท] and Eฬฮธโ [ยท] are taken with
respect to Pฬฮธโ , Pฯโ and Pฬฮธโ respectively, also Bikp denotes the binomial distribution
with success probability p and k trials.
A.2 The constant
.
(4)
bฬT
sup
gฮธ (y | x)
+ =
(ฮธ,x,y)โฮรXรY
satisfies bฬT
+ < โ, the target- and clutter-related functions
Z
Z
T
bT
:
y
โ
7
inf
g
(y
|
x)dx
and
b
:
y
โ
7
sup
gฮธ (y | x)dx,
ฮธ
โ
+
ฮธโฮ
bC
โ
ฮธโฮ
: y 7โ inf pฯ (y)
ฯ
and
bC
+
: y 7โ sup pฯ (y),
ฯ
satisfy
(6a)
bT
โ (y) > 0
and
bT
+ (y) < โ
(6b)
bC
โ (y) > 0
and
bC
+ (y) < โ
6
J. HOUSSINEAU, S.S. SINGH AND A. JASRA
for any y โ Y as well as
(7)
Eฬฮธโ [| log bT
โ (Y )|] < โ
and
Eฯโ [| log bC
โ (Y )|] < โ,
and it holds that
(8)
Eฬฮธโ
log inf BiK
pD โ Poฮป (#Y )
ฮธโฮ
< โ.
Assumption A.2 ensures that all points of the observation space Y can be reached
from at least some states in X via (6a) although gฮธ (y | x) = 0 might hold for some
(x, y) โ X ร Y. Equation (7) will ensure boundedness in the calculations related to
identifiability. The upper bound (4) of the likelihood function is also assumed to be
finite so that no concentration of probability mass is allowed at any point of X ร Y. It
is demonstrated in the following lemma that the upper and lower bounds considered
in Assumption A.2 for a single target and for the clutter common distribution are
sufficient to guarantee the same type of result for multiple targets. The proof is in
Appendix B.
Lemma 1 (Transfer of boundedness). Under Assumption A.2, it holds that the
constant
.
bฬ+ = sup
sup
gฮธ (y | x)
ฮธโฮ
(x,y)โXK รYร
is finite and that the functions
Z
bโ : y 7โ inf
gฮธ (y|x)dx
ฮธโฮ
Z
and
b+ : y 7โ sup
gฮธ (y|x)dx,
ฮธโฮ
verify bโ (y) > 0 and b+ (y) < โ for any y โ Yร as well as Eฬฮธโ [| log bโ (Y )|] < โ.
An important result that follows from the assumptions introduced so far is the
uniform forgetting of the conditional Markov chain: it can be proved under Assumptions A.1 and A.2 that for any k, l โ N0 such that k โค l and any parameter ฮธ โ ฮ,
it holds that
Z Z
Z
pฬฮธ (xt | xk , yk+1:l )p(xk )dxk โ pฬฮธ (xt | xk , yk+1:l )p0 (xk )dxk dxt โค ฯtโk
ฮธ ,
for all t โฅ k, all probability densities p, p0 on XK and all sequences of observations
.
yk+1:l , where ฯฮธ = 1 โ (ฯโ /ฯ+ )K . The K-target forgetting rate ฯฮธ will generally be
smaller than the single-target rate 1โฯโ /ฯ+ , although mixing is still guaranteed since
K is finite and hence ฯฮธ โ [0, 1). It is also possible to conclude about the pointwise
convergence of the log-likelihood function to the function ` defined on ฮ as follows
` : ฮธ 7โ Eฬฮธโ `Yโโ:0 (ฮธ) ,
where `yโโ:0 is defined on ฮ for any realisation yโโ:0 of the observation process as
`yโโ:0 : ฮธ 7โ lim log pฬฮธ (y0 | yโm:โ1 , xโmโ1 ),
mโโ
and this limit does not depend on xโmโ1 . Indeed, under Assumptions A.1 and A.2,
it holds for all K โ S T and all x0 โ XK that
(9)
1
log pฮธ (Y1:n | x0 ) = `(ฮธ),
nโโ n
lim
Pฬฮธโ -a.s.
IDENTIFICATION OF MULTI-OBJECT DYNAMICAL SYSTEMS
7
This result shows that for any realisation y1:โ of the observation process, the empirical average nโ1 log pฮธ (y1:n | x0 ) will converge to `(ฮธ) irrespectively of the assumed
initial state x0 . A continuity assumption is required in order to turn the pointwise
convergence result of (9) into a uniform convergence result.
A.3 For all x, x0 โ X and all y โ Y, the mappings ฮธ 7โ fฮธ (x | x0 ), ฮธ 7โ gฮธ (y | x)
and ฯ 7โ pฯ (y) are continuous.
It follows directly from Assumption A.3 that for all K โ S T , all x, x0 โ XK and
all y โ Yร , the mappings ฮธ 7โ fฮธ (x | x0 ) and ฮธ 7โ gฮธ (y | x) are continuous on the
hyperplane of ฮ made of parameters with a number of targets equal to K, since these
mappings are sums and products of continuous functions. Although the continuity
for the multi-target Markov kernel and likelihood function is limited to hyperplanes,
the result of [6, Lemma 4] can be extended to: for all ฮธ โ ฮ
0
lim Eฬฮธโ
sup `Yโโ:0 (ฮธ ) โ `Yโโ:0 (ฮธ) = 0,
ฮดโ0
|ฮธ 0 โฮธ|โคฮด
where | ยท | is the 1-norm on ฮ, since ฮธ 0 and ฮธ will be in the same hyperplane for ฮด
small enough. The addition of the continuity assumption enables the derivation of
the following result regarding the uniform convergence of the log-likelihood function:
Under Assumptions A.1 to A.3, it holds that
(10)
lim sup sup
nโโ ฮธโฮ x โXK
0
1
log pฮธ (Y1:n | x0 ) โ `(ฮธ) = 0,
n
Pฬฮธโ -a.s.
Since the conditional log-likelihood function log pฮธ (y1:n | x0 ) is continuous and
uniformly bounded, it follows from (10) that ` is also continuous on the hyperplanes
of ฮ of constant target number.
The following identifiability assumption is considered in order to show the consistency of the maximum likelihood estimator
A.4 Pฬฮธ = Pฬฮธโ if and only if ฮธ = ฮธโ and Pฯ = Pฯโ if and only if ฯ = ฯ โ
Assumption A.4 is fundamental since there would be no chance to discriminate
the true value ฮธโ among all the other possible ฮธ โ ฮ \ {ฮธโ } if some of these parameters
did yield the same law for the observations. For instance, if the colour of the target
is considered as a parameter but if the likelihood of the observations does not depend
on this characteristics of the target, e.g. if the observations come from a radar, then
any ฮธ obtained by changing the colour in ฮธโ would induce a law Pฬฮธ that is equal to
Pฬฮธโ and Assumption A.4 would not be verified. It is shown in the next theorem that
identifiability of the multi-target problem can be deduced from the identifiability of
the single-target one under important special cases. The proof is in Appendix C.
Theorem 2 (Transfer of identifiability). Under Assumption A.4 it holds that
a) if the true parameter ฮธ โ is in ฮฮป=0 , then it holds that Pฬฮธ = Pฬฮธโ if and only
if ฮธ = ฮธ โ for any ฮธ โ ฮฮป=0 ,
b) if the true parameter ฮธ โ is in the subset ฮ|K=1 of ฮ made of parameters of
the form (ฮธ, K, pD , ฮป, ฯ) with K = 1, then it holds that Pฬฮธ = Pฬฮธโ if and only
if ฮธ = ฮธ โ for any ฮธ โ ฮ|K=1 .
It is more challenging to prove that identifiability transfers to the whole parameter
set ฮ and this property is assumed to hold rather than demonstrated.
A.5 Pฬฮธ = Pฬฮธโ if and only if ฮธ = ฮธ โ .
Assumption A.5 is not a stringent condition since Theorem 2 shows that the
single-target identifiability is sufficient to ensure multi-target identifiability in some
8
J. HOUSSINEAU, S.S. SINGH AND A. JASRA
important special cases. Moreover, if there exists a ฮธ 6= ฮธ โ such that Pฬฮธ = Pฬฮธโ then
ฮธ has to satisfy very specific equations including
โ
K
โ Poฮปโ .
BiK
pD โ Poฮป = Bipโ
D
Assumption A.5 would not hold for pโD = 0 since identifiability w.r.t. ฮธโ and K โ
would clearly be lost in this case because of the absence of observations from the
targets. The same remark can be made about K โ = 0 for the identifiability w.r.t. ฮธโ
since there is obviously no way to learn about the dynamics and observation of the
targets if none of them is present.
The different assumptions considered here are combined in the next section in
order to prove the consistency of the maximum likelihood estimator.
4.3. Consistency and asymptotic normality. As a consequence of (9) and
by the dominated convergence theorem it holds that for any ฮธ โ ฮ, any infinite
โ
observation sequence y1:โ and any initial states x0 โ XK and x00 โ XK
(11a)
lim
nโโ
(11b)
pฮธ (y1:n | x0 )
1
log
= `(ฮธ) โ `(ฮธ โ )
n
pฮธโ (y1:n | x00 )
pฬฮธ (Y0 | Yโm:โ1 )
Yโm:โ1 โค 0,
= lim Eฬฮธโ Eฬฮธโ log
mโโ
pฬฮธโ (Y0 | Yโm:โ1 )
where the inequality holds since the conditional expectations are Kullback-Leibler
divergences. Yet, it could happen that some ฮธ โ ฮ would verify pฬฮธ (Y0 | yโm:โ1 ) =
pฬฮธโ (Y0 | yโm:โ1 ) Pฬฮธโ -almost surely for all m โ N0 and for all yโm:โ1 , which would
compromise identifiability. However, Assumption A.5 is equivalent to ฮธ = ฮธ โ if and
only if
pฬฮธ (Y1:n )
Eฬฮธโ log
= 0,
โn โฅ 1.
pฬฮธโ (Y1:n )
The objective is to show that this, in turn, is equivalent to ฮธ = ฮธ โ if and only if
`(ฮธ) โ `(ฮธ โ ) = 0 since this is the term that appears in (11). Following the same line
of arguments as [6, Proposition 3], we find that under Assumptions A.1 to A.3 and
A.5, it holds that `(ฮธ) = `(ฮธ โ ) if and only if ฮธ = ฮธ โ , from which we conclude that
the considered approach allows for studying the identifiability of ฮธ โ . Applying the
strict Jensen inequality to the conditional expectation in the r.h.s. of (11), it indeed
follows that
lim
nโโ
pฮธ (y1:n | x0 )
1
< 0,
log
n
pฮธโ (y1:n | x00 )
for any ฮธ 6= ฮธ โ , which implies that the likelihood of the observation sequence y1:n
under the parameter ฮธ decreases exponentially fast when compared to the likelihood
under ฮธ โ , irrespectively of the assumed initial states x0 and x00 . Denoting ฮธฬn,x0
the argument of the maximum of log pฮธ (y1:n | x0 ), the consistency of the maximum
likelihood estimator can be expressed as in Theorem 3 below. This theorem also states
the asymptotic normality of the estimator which makes use of the Fisher information.
The latter involves differentiation with respect to the parameter ฮธ, however since the
number of target K is a natural number, differentiations has to be performed for a
IDENTIFICATION OF MULTI-OBJECT DYNAMICAL SYSTEMS
9
fixed K. This is what is understood by default when writing โฮธ . Under assumptions,
the Fisher information matrix can be expressed as
h
i
1
Eฬฮธโ โฮธ log pฬฮธโ (Y1:n ) ยท โฮธ log pฬฮธโ (Y1:n )t ,
nโโ n
I(ฮธ โ ) = lim
where ยทt is the matrix transposition.
Theorem 3. Under Assumptions A.1 to A.3 and A.5, it holds that
lim ฮธฬn,x0 = ฮธ โ
nโโ
for any x0 โ XK with K โ N. Considering additionally Assumptions A.6 to A.8
(see Appendix A) and assuming that I(ฮธ โ ) is positive definite, it holds that
โ
n(ฮธฬn,x0 โ ฮธ โ ) โ N 0, I(ฮธ โ )โ1 ,
for any x0 โ XK and any K โ N, where โ denotes the convergence in distribution
as n tends to infinity and where N (0, V ) is the normal distribution with mean 0 and
variance V .
The proof of Theorem 3 follows from Lemma 1 combined with [6, Theorems 1
and 4]. It can be demonstrated that the result of Theorem 3 also holds for the special
parameter sets ฮฮป=0 , ฮpD =1 and ฮฮป=0,pD =1 . These special-parameter sets will be
used to understand the behaviour of the Fisher information matrix in simple cases in
the next section.
5. Analysis of the Fisher information. Theorem 3 guarantees the convergence of the maximum likelihood estimator under certain conditions and proves the
asymptotic normality of the estimator, the variance of the latter being the inverse of
the Fisher information matrix. It is therefore of interest to understand how the Fisher
information behaves in different multi-target configurations.
This section is structured as follows: an equivalent observation model for which
the Fisher information matrix is easier to study is introduced in subsection 5.1 and
yields a characterisation of the configurations in which the information loss induced
by data association uncertainty and detection failures is strictly positive. Qualitative
estimates of the information loss are then obtained when isolating the different sources
of loss from subsection 5.2 to subsection 5.4. Each of these qualitative estimates are
confirmed by numerical results on simulated data obtained by direct Monte Carlo
integration of the original expression of the Fisher information, so as to confirm the
validity of the derived alternative expressions.
Henceforth, if A and B are two square matrices of the same dimensions then
A โฅ B is understood as A โ B โฅ 0, i.e. A โ B is positive semi-definite, and A > B
stand for A โ B > 0, i.e. A โ B is positive definite.
Example 1. Assuming that ฮธ โ is in ฮpD =1 and that the data association is
known, the joint probability of the observations becomes
pฬฮธโ (y1:n ) =
n
Y
Poฮปโ (Mt โ K โ )
Mt
Y
pฯโ yt,i
i=K โ +1
t=1
Z
ร
โ
ฯฮธรK
(x0 )
โ
n Y
Kโ h
i
Y
gฮธโ (yt,i | xt,i )fฮธโ (xt,i | xtโ1,i ) dx0:n .
t=1 i=1
10
J. HOUSSINEAU, S.S. SINGH AND A. JASRA
The score is then found to be
โ
โฮธ log pฬฮธโ (y1:n ) =
K
X
i=1
โฮธ log pฬฮธโ (y1:n,i )+
n
X
Mt โ K โ
t=1
ฮปโ
โ1+
Mt
X
โฮธ log pฯโ (yt,i )
i=K โ +1
so that, because of the independence between the targets and clutter,
I(ฮธ โ ) = K โ I(ฮธ โ ) +
1
+ ฮปโ I C (ฮธ โ ),
ฮปโ
with I(ฮธ โ ) and I C (ฮธ โ ) the Fisher information for the distribution of one target and
one clutter point respectively, where the gradient is taken w.r.t. ฮธ, that is
h
i
1
I(ฮธ โ ) = lim Eฬฮธโ โฮธ log pฬฮธโ (Y1:n ) ยท โฮธ log pฬฮธโ (Y1:n )t
nโโ n
h
i
C โ
I (ฮธ ) = Eฯโ โฮธ log pฯโ (Y ) ยท โฮธ log pฯโ (Y )t .
In spite of its simplicity, Example 1 yields important remarks: unsurprisingly, if
there is no missing information and no data association uncertainty, the information
increases with the number of targets. Similarly, if the Fisher information of the
clutter distribution pฯโ increases, then the overall information increases too. The
interpretation for the Poisson parameter ฮปโ is less straightforward, the main objective
is however to study the Fisher information w.r.t. the targets rather than the false
alarms so that it is of interest to compute the score without differentiating with
respect to ฯ or ฮป.
Although the Fisher information becomes more difficult to compute when pโD โ
(0, 1), some conclusions can be drawn by focusing on the cardinality. Since the parameter ฮธ does not affect the cardinality, only the term
E[โpD log qฮธโ (D) ยท โpD log qฮธโ (D)t ] = K โ /(pโD (1 โ pโD ))
remains when computing the Fisher information matrix, with D the random variable
โ
induced by Y on {0, 1}K . This term is minimal when pโD = 0.5 and increases when
pโD goes toward 0 or 1. This is not sufficient to conclude since the fact that information
is lost when detection failures happen is not taken into account in the cardinality and
the information is the same for, e.g. pโD equal to 0.99 or 0.01. Indeed, it is equally
easy to estimate pโD when an observation is always or never received. For this reason,
it is useful to consider the information w.r.t. ฮธโ only.
The objective will therefore be to characterise how the Fisher information
h
i
1
(13)
I(ฮธโ ) = lim Eฬฮธโ โฮธ log pฬฮธโ (Y1:n ) ยท โฮธ log pฬฮธโ (Y1:n )t ,
nโโ n
of a multi-object dynamical system behaves when compared to the information of the
unperturbed system that excludes false alarms, detection failures and for which data
association is known. We refer to the difference between (13) and the latter as the
information loss. Since the Fisher information of the unperturbed system is a quantity that depends on the number of objects in the system, the aim is to express the
information loss as a function of the single-object Fisher information matrix I(ฮธโ ).
The Fisher information matrix of the unperturbed multi-object system is clearly equal
to K โ I(ฮธโ ) because of the independence between the targetsโ observation in the absence of data association uncertainty. In order to compute I(ฮธโ ), we have to take the
IDENTIFICATION OF MULTI-OBJECT DYNAMICAL SYSTEMS
11
logarithm of the probability density function
โ
pฬฮธโ (y1:n , x0:n ) = ฯฮธรK
(x0 )
โ
n
Y
gฮธโ (yt | xt )fฮธโ (xt | xtโ1 ) .
t=1
However, the presence of a sum in the term gฮธโ (yt | xt ) prevents from further analysing
the Fisher information in a general setting. To avoid directly dealing with these
sums, an equivalent observation model which depends explicitly on the assignment is
introduced in the next section. This observation model is an important contribution
since it allows us to understand the behaviour of the Fisher information for multitarget tracking.
5.1. Alternative observation model. Let dH be the Hamming metric on the
symmetric group Sym(k) characterised by letting dH (ฯ, ฯ 0 ) be the number of points
moved by ฯ 0 โฆ ฯ โ1 for any given ฯ, ฯ 0 โ Sym(k). For instance, if k = 5 and if ฯ and
ฯ 0 are given in Cauchyโs two-line notation as
1 2 3 4 5
1 2 3 4 5
ฯ=
and
ฯ0 =
1 5 2 4 3
1 3 5 4 2
then dH (ฯ, ฯ 0 ) = 3 since ฯ 0 โฆ ฯ โ1 (i) 6= i if and only if i is in the set {2, 3, 5}. Let
โ be the vector concatenation operator such that if y = [y1 , . . . , yn ]t โ Yn and
0 t
] โ Ym then
y 0 = [y10 , . . . , ym
.
0 t
y โ y 0 = [y1 , . . . , yn , y10 , . . . , ym
] โ Yn+m .
โ
Let Rd be the matrix of size |d| ร K โ such that (Rd )i,j = ฮดj,r(i) for any d โ {0, 1}K ,
i.e. Rd has as many lines as there are detected targets and can be seen as a mask
matrix that removes the observations of non-detected ones. Let Sฯ be the permutation
matrix corresponding to ฯ โ Sym(k) for any k โฅ 1, i.e. the matrix defined as
๏ฃฎ
๏ฃน
eฯ(1)
. ๏ฃฏ
๏ฃบ
Sฯ = ๏ฃฐ ... ๏ฃป ,
eฯ(K โ )
with ei the row vector with 1 at the ith position and 0 elsewhere. The observation
model with known data association is written as
(14)
Yt = h(Xt ) + ฮท
with h and ฮท the multi-target observation function and the observation noise respectively, where ฮท is i.i.d. across its K โ components. The false alarms are defined as a
random variable Yฬ in Yร , independent of Yt , such that Yฬi โผ pฯ and Yฬi is independent
of Yฬj for any 1 โค i, j โค #Yฬ . The observation model of interest can then be defined
for given integers ฮฑ > 0 and 0 โค ฮฒ โค K โ as
(15)
Ytฮฑ,ฮฒ = Sฯ (RD Yt ) โ Yฬ ,
โ
.
where D is a random element of Bฮฒ = {d0 โ {0, 1}K : |1 โ d0 | โค ฮฒ} having as
a distribution the restriction qฮธฮฒ of qฮธ to Bฮฒ and where ฯ is a random permutation
ฮฑ
drawn from the uniform law uฮฑ
k with k = #Yฬ + |d| on the set Ak defined by
.
Aฮฑ
k = {ฯ โ Sym(k) : dH (id, ฯ) โค ฮฑ}
12
J. HOUSSINEAU, S.S. SINGH AND A. JASRA
with id denoting the identity function. Henceforth, the letter ฯ will be used for a
random permutation and ฯ for a realisation. The case ฮฑ = 0 is not considered to
avoid redundancy: it holds that A0k = A1k = {id} for any k โฅ 1 since permutations
that are different from the identity move at least two points. The case of Example 1
is recovered by considering ฮฑ = 1 and ฮฒ = 0, i.e. ฯ = id and D = 1 almost surely,
whereas the full data-association problem corresponds to the choice ฮฑ = โ and
ฮฒ = โ. The cardinality of Aฮฑ
k is found to be
Nkฮฑ =
ฮฑ
X
k
i=0
i
!i,
with !i the subfactorial of i which is equal to the number of derangements of i letters,
where a derangement refers to a permutation that moves all the elements of its domain.
The subfactorial !i is defined via the same recurrence relation as the factorial i!, i.e.
as !i = (i โ 1)(!(i โ 1)+!(i โ 2)), but with the initialisation !0 = 1 and !1 = 0. The
expression of Nkฮฑ can be justified as follows: the number of permutations moving a
number of points less or equal to ฮฑ is also the number of permutations moving exactly
i points, i.e. the number of derangements of i points, multiplied by the number of ways
of picking i points among k, for all 0 โค i โค ฮฑ. It holds that Nkk = k! since
n
X
n
!n = n! โ
!(n โ i).
i
i=1
The alternative observation model (15) brings insight about the Fisher information
matrix I ฮฑ,ฮฒ (ฮธโ ) corresponding to the observation model (15), when compared to the
unperturbed case. The corresponding information loss is defined as
ฮฑ,ฮฒ โ .
Iloss
(ฮธ ) = K โ I(ฮธโ ) โ I ฮฑ,ฮฒ (ฮธโ ).
ฮฑ,ฮฒ โ
In some cases, the relative information loss Iloss
(ฮธ )/(K โ I(ฮธโ )) will be used instead.
The next theorem is the central result of this section, its proof can be found in
Appendix D.
Theorem 4. Under Assumptions A.1, A.2 and A.6 to A.8, the information
ฮฑ,ฮฒ โ
ฮฑ,ฮฒ โ
loss Iloss
(ฮธ ) verifies Iloss
(ฮธ ) โฅ 0 for any ฮฑ โฅ 1 and any ฮฒ โฅ 0, the inequality being
strict if either ฮฑ > 1 or ฮฒ > 0 and if I(ฮธโ ) 6= 0.
Notice that the condition ฮฑ > 1 would not be sufficient to make the inequality in
Theorem 4 strict if ฮปโ were equal to 0 since data association might have no influence
in some specific configurations, e.g. when the individual likelihood does not depend
on the objectsโ state. Theorem 4 does not provide a quantitative characterisation of
the information loss. Doing so is challenging in the general case, yet, the behaviour of
the information loss can be analysed for special cases, and such will be the objective
in the remainder of this section.
One of the advantages with the modified observation model (15) is that the Fisher
identity can be utilised as an alternative way of computing the score function based
on the unobserved random variables in this model:
(16)
ฮฑ,ฮฒ
ฮฑ,ฮฒ
โฮธ log pฬฮธ (y1:n ) = Eฬฮธ โฮธ log pฬฮธ (Y1:n
, ฯ1:n , D1:n , X0:n ) | Y1:n
= y1:n ,
13
IDENTIFICATION OF MULTI-OBJECT DYNAMICAL SYSTEMS
where
ฯฮธรK (x0 )
pฬฮธ (y1:n , ฯ1:n , d1:n , x0:n ) =
n
Y
Poฮป (Mt โ |dt |)
t=1
ร
|d|
Mt
Y
pฯ (yt,ฯt (i) )
i=|dt |+1
Y
i=1
gฮธ (yt,ฯt (i) | xt,r(i) )
K
Y
.
ฮฒ
fฮธ (xt,i | xtโ1,i )uฮฑ
Mt (ฯt )qฮธ (dt )
i=1
The simplification of the expression of โฮธ log pฬฮธ (y1:n ) is only notational. The random
ฮฑ,ฮฒ
= y1:n in (16), so
variables ฯ1:n , D1:n and X0:n are conditioned on the event Y1:n
that their respective distributions are now the conditional distributions given the
observations, which are more complex than their priors. Yet, the Fisher identity
enabled to move the sums and integrals outside of the logarithm, hence making easier
the analysis of the Fisher information matrix.
5.2. Single static target with false alarm. Consider the case of one almostsurely detected static target with state x โ X which observation is corrupted by false
alarms and unknown data association. The corresponding ฮธ โ is in the hyperplane
ฮpD =1 |K=1 of the special parameter set ฮpD =1 composed of parameters for which
K = 1. It is sufficient to study one time step since the observations at different times
become independent in this case and it holds that
h
i
1
I(ฮธโ ) = lim Eฬฮธโ โฮธ log pฬฮธโ (Y1:n ) ยท โฮธ log pฬฮธโ (Y1:n )t
nโโ n
h
i
= Eฬฮธโ โฮธ log pฬฮธโ (Y1 ) ยท โฮธ log pฬฮธโ (Y1 )t .
Making use of the Fisher identity (16), the Fisher information matrix I โ,0 (ฮธโ ) can
be expressed as
I โ,0 (ฮธโ ) = Eฮธโ
X
M
ci (Y )cj (Y )โฮธ log gฮธโ (Yi | x) ยท โฮธ log gฮธโ (Yj | x)t ,
i,j=1
where M = #Y and where
ci (y) =
gฮธโ (yi | x)/pฯโ (yi )
.
uM (ฯ | y) = PM
โ
โ
j=1 gฮธ (yj | x)/pฯ (yj )
ฯโSym(M )
X
ฯ(1)=i
Identifying the parameter ฮธโ is most challenging when the distribution of the false
alarm is equal to the one of the target-originated observation at ฮธโ , i.e. pฯโ = gฮธโ (ยท | x),
since all the observations will look alike for ฮธ close to ฮธโ .
In this case it holds that ci (Y ) = 1/M for any 1 โค i โค M so that
m
X Poฮปโ (m โ 1) X
Eฮธโ โฮธ log gฮธโ (Yi | x) ยท โฮธ log gฮธโ (Yi | x)t | m
2
m
i=1
mโฅ1
h 1 i
=E
I(ฮธโ )
N +1
I โ,0 (ฮธโ ) =
where the expectation is taken w.r.t. the random variable N โผ Poฮปโ . It follows that
the relative information loss is equal to E[N/(N + 1)] so that it is strictly increasing
14
J. HOUSSINEAU, S.S. SINGH AND A. JASRA
1
0.9
0.8
relative loss
0.7
0.6
0.5
0.4
E[N/(N+1)]
Gaussian
U([-5,5])
U([-10,10])
U([-25,25])
U([-50,50])
U([-100,100])
0.3
0.2
0.1
0
0
0.5
1
1.5
2
2.5
3
3.5
4
4.5
5
log(6+1)
Fig. 1: Information loss as a function of the Poisson parameter ฮป in log-scale, calculated with 5 ร 105 samples (Gaussian: worst-case scenario; U ([โa, a]): uniform
distribution over [โa, a]).
with ฮปโ and tends to 1 when ฮปโ tends to infinity. This result is supported by the
experiments displayed in Figure 1 where the observation of one static target in X = R
at x = 0 is corrupted by false alarms. The observation model is assumed to be
linear and Gaussian with variance ฮธ such that ฮธโ = 1. Cases where the false alarm is
uniform over the subset [โa, a] with a โ {5, 10, 25, 50, 100} are also considered. The
scenario where the false alarm is distributed in the same way as the target-originated
observation at ฮธโ , i.e. pฯโ = gฮธโ (ยท | x), is also confirmed to be the worst-case scenario.
In the next two sections, the focus will be on understanding the role played
specifically by unknown data association and detection failures.
5.3. Unknown data association. In order to set the focus on data association,
it is assumed that ฮธ โ belongs to the special parameter set ฮฮป=0,pD =1 . In these
conditions, the joint probability of the observations and states becomes
โ
(19) pฬฮธโ (y1:n , x0:n ) = ฯฮธรK
(x0 )
โ
ร
n
Y
Y
Kโ
X
t=1 ฯโSym(K โ )
gฮธโ (yt,ฯ(i) | xt,i )fฮธโ (xt,i | xtโ1,i ) uK โ (ฯ) .
i=1
The sum in the previous expression makes it difficult to directly compute the Fisher
information matrix. Some insight about it can however be obtained by considering
static objects as in the following example.
Example 2. Let x1 , . . . , xK โ be the known position of K โ static objects. The
joint distribution of the observations is then found to be
pฮธโ (y1:n ) =
n
Y
X
t=1 ฯโSym(K โ )
Y
Kโ
gฮธโ (yt,ฯ(i) | xi )uK โ (ฯ) .
i=1
In this simplified setting, we can assume that gฮธโ has finite support so that the objectsโ
QK โ
state can be chosen far enough from each other for i=1 gฮธโ (Yt,ฯ(i) | xi ) = 0 to hold
P-a.s. whenever ฯ 6= id. In this case, and as expected, there is no loss of information
IDENTIFICATION OF MULTI-OBJECT DYNAMICAL SYSTEMS
15
when compared to the case with known data association. A less intuitive result can be
found when all the objectsโ state are equal to a given x โ X. In this situation, it holds
that all permutations are equally probable so that
โ
pฮธโ (y1:n ) =
n Y
K
Y
gฮธโ (yt,i | x),
t=1 i=1
and once again, there is no loss of information. These two cases correspond to extreme
configurations where the uncertainty on the data association is either resolvable or
irrelevant.
The Fisher identity can be used to provide an expression of the Fisher information
for static objects as follows. For any fixed x1 , . . . , xK โ , the Fisher information for
ฮฑ = โ (fully unknown association) and ฮฒ = 0 can be deduced from
โฮธ log pฮธ (y) = Eฮธ โฮธ log pฮธ (Y , ฯ) | Y = y
X
=
K
X
โฮธ log gฮธ (yฯ(i) | xi )uK (ฯ|y).
ฯโSym(K) i=1
The Fisher information matrix I ฮฑ,ฮฒ (ฮธโ ) with ฮฑ = โ, ฮฒ = 0 and without false alarm
is found to be
I โ,0 (ฮธโ ) = Eฮธโ โฮธ log pฮธโ (Y โ,0 ) ยท โฮธ log pฮธโ (Y โ,0 )t
โ
X
=
K
X
Eฮธโ uK โ (ฯ|Y )uK โ (ฯ 0 |Y ) Scoi (Yฯ(i) ) ยท Scoj (Yฯ0 (j) )t
ฯ,ฯ 0 โSym(K โ ) i,j=1
โ
=
K
X
Eฮธโ ci,k (Y )cj,l (Y ) Scoi (Yk ) ยท Scoj (Yl )t
i,j,k,l=1
with Scoi (y) = โฮธ log gฮธโ (y | xi ) for any y โ Y and with
X
ci,k (y) =
uK โ (ฯ|y)
ฯโSym(K โ )
ฯ(i)=k
โ
= gฮธโ (yk | xi )
X
Y
gฮธโ (yฯ(j) | xj )
ฯโSym(K โ ) j6=i
ฯ(i)=k
X
K
Y
โ1
gฮธโ (yฯ(j) | xj )
ฯโSym(K โ ) j=1
โ
for any y โ YK and any i, k โ {1, . . . , K โ }. The term ci,k (y) is the conditional
probability for the object with state xi to have generated observation k given all
observations y.
In order to obtain a quantitative characterisation of the information loss, a special
likelihood has to be introduced. We consider an observation model of the same form as
the one displayed in Figure 2, i.e. such that Y is compact and there exists a collection
โ
of disjoint subsets {Bi }K
i=1 of Y such that gฮธ (ยท | xi ) uniformly distributes a probability
mass > 0 outside of Bi . An example of such a distribution is given in Figure 2 for
two objects. Then, for K objects,
(23)
I โ,0 (ฮธโ ) =
K
X
i,j,k,l=1
k,l โ
Ei,j
(ฮธ )
J. HOUSSINEAU, S.S. SINGH AND A. JASRA
probability density
16
0.4
g3 (.|x 1 )
g (.|x )
3
0.3
2
0.2
0.1
0
-10
-8
-6
-4
-2
0
2
4
6
8
10
y
Fig. 2: Example of likelihood with two objects at states x1 and x2 .
k,l โ .
with Ei,j
(ฮธ ) = Eฮธโ ci,k (Y )cj,l (Y ) Scoi (Yk ) ยท Scoj (Yl )t for any i, j, k, l โ {1, . . . , K}.
The objective is now to understand the behaviour of I โ,0 (ฮธโ ) when K is large. The
order of the term ci,k (y) is in O(1) when i = k and in O(K โ1 ) when i 6= k. The order
of the summand in (23) can then be determined for the different values of i, j, k, l.
For instance:
โข If i 6= k 6= l 6= j then
Z
โฮธ gฮธโ (yk | xi ) ยท โฮธ gฮธโ (yl | xj )t
2
k,l โ
c
(y)c
(y)
dy,
(24)
Ei,j (ฮธ ) =
i,k
j,l
k,l
|Y \ Bk |2 Ci,j
gฮธโ (yk | xi )gฮธโ (yl | xj )
k,l .
where Ci,j
= {y โ YK : yk โ Bi , yl โ Bj }, because gฮธโ (y | xk ) = /|Y \ Bk | for
all y โ
/ Bk and because Bi โฉ Bk = โ
since i 6= k. When K increases, Y needs to
be augmented at least linearly to ensure that the family {Bi }K
i=1 is disjoint and (24)
shows inverse proportionality with |Y|2 , so that it is of order O(K โ4 ) at most. There
are O(K 4 ) terms of this form in the sum in the r.h.s. of (23) so that the sum of these
terms is of order O(1) at most.
k,l โ
โข If k = l and i 6= j then Ei,j
(ฮธ ) = 0 since in this case it holds that Scoi (yk ) ยท
Scoj (yk )t = 0 for any y โ YK which follows from the facts that Scoi (y) 6= 0 when
y โ Bi only and that Bi โฉ Bj = โ
.
โข If i = j = k = l then
Z
โฮธ gฮธโ (yi | xi ) ยท โฮธ gฮธโ (yi | xi )t
k,l โ
dy,
Ei,j
(ฮธ ) = 1Bi (yi )ci,i (y)2
gฮธโ (yi | xi )
which does not depend on K or |Y| and is therefore of order O(1).
Following the same principles for the other values of i, j, k, l, we find that I โ,0 (ฮธโ )
is of order O(K). Since the information in the idealised observation model, i.e. when
data association is known, is equal to KI(ฮธโ ), it follows that the relative loss is
constant. In other words, for a large number of targets, adding more targets increases
the information at the same rate as in the idealised model.
Validation via simulations. The special likelihood is taken of the form
(
.
N (y; xk + m, 1) if y โ Bk = (xk + m โ r, xk + m + r)
gฮธ (y | xk ) =
/|Y \ Bk |
otherwise,
R
with = 0.1 and with r characterised by Bk N (y; xk , 1)dy = 1 โ via Bk . In this
case, the displacement m is considered as the parameter ฮธ and the true value is ฮธโ = 0.
The relative information loss associated with this likelihood is displayed in Figure 3a
under two different configurations. The first one (Constant observation space in the
17
IDENTIFICATION OF MULTI-OBJECT DYNAMICAL SYSTEMS
0.2
5
0.18
4.5
0.16
4
3.5
0.12
,
relative loss
0.14
3
0.1
2.5
Constant observation space
Adaptive observation space
0.08
2
0.06
1.5
0.04
1
0.02
2
2.5
3
3.5
4
4.5
5
5.5
6
6.5
0
7
0.5
1
1.5
2
2.5
3
3.5
=
Number of targets
(a) For a varying number of objects for the (b) For varying association uncertainty ฮฑ and
special likelihood (105 MC runs).
spatial separation ฯ (104 MC runs).
1
0.7
experimental
1-p
0.9
D
0.6
0.8
0.7
relative loss
relative loss
0.5
0.4
0.3
0.6
0.5
0.4
0.3
0.2
0.2
0.1
0.1
0
0
1
2
3
4
5
6
number of targets
7
8
9
10
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
pD
(c) For a varying number of objects with sep- (d) For a varying probability of detection pD ,
aration ฯ = 1 and ฮฑ = โ (104 MC runs).
compared to 1 โ pD .
Fig. 3: Information loss with association uncertainty (3a-3c) or detection failures (3d).
figure) corresponds to the case where the observation space is large enough to meet
the requirements associated with (23); the relative loss can be seen to increase linearly
with the number of targets. The second case (Adaptive observation space in the figure)
corresponds to the case where the observation space has to be augmented to fit new
targets and shows a constant relative information loss. This last result is consistent
with the conclusion above that the information loss is of the same order as the number
of targets when the observation space has to be augmented.
Further simulations. Five static objects on X = R at positions xi = ฯ (i โ 3)
with i โ {1, . . . , 5} are observed via a linear Gaussian model with variance equal to
1. The objective is to understand how the Fisher information matrix I ฮฑ,0 (ฮธโ ) evolves
with ฮฑ and with the position of the objects. It is assumed that ฮธ parametrises the
variance of the Gaussian observation model only, so that I ฮฑ,0 (ฮธโ ) is a scalar. The
relative information loss is displayed in Figure 3b and confirms the intuition that the
information loss increases with ฮฑ, except in the case ฮฑ = 1 where there is no loss by
18
J. HOUSSINEAU, S.S. SINGH AND A. JASRA
definition since A1k = {id} for any k โฅ 1 so that the data association is known in this
case. Also, the loss is increased when the individual likelihoods overlap while being
increasingly different and then decreases when the overlap becomes negligible. The
maximum is reached when ฯ = 1, that is when the distance |xi โ xiโ1 | between two
consecutive objects is 1 for any i โ {2, . . . , 5}. The fact that there is no loss when
ฯ = 0 follows from the irrelevance of data association uncertainty when all objects are
at the same position, as explained in Example 2. To better understand the behaviour
w.r.t. the number of targets, Figure 3c displays the relative information loss for 1 to
10 targets in the case of full data association uncertainty with ฯ = 1.
The results for the two sets of simulations are consistent and show the same
trend: the relative information loss increases with the number of targets but tend to
stabilise. To sum up, there is no loss for 1 target by construction, the loss is linear
in the number of targets when there are sufficiently many, and it increases the fastest
during the transition between these two modes.
5.4. Detection failures. In this section, the case of detection failures is analysed when assuming that there are no false alarms, that is when ฮธ โ is in the specialparameter set ฮฮป=0 . To establish our main result in this section (Theorem 5), we
will use the concept of missing information (see for instance [3] in the context of
Approximate Bayesian Computation).
ฮฑ,ฮฒ โ
Theorem 5. Assuming ฮธ โ โ ฮฮป=0 , the information loss Iloss
(ฮธ ) for known data
association with unconstrained detection failures, i.e for ฮฑ = 1, ฮฒ = โ, is found to be
1,โ โ .
Iloss
(ฮธ ) = (1 โ pโD )K โ I(ฮธโ ).
The proof can be found in Appendix E. It follows from Theorem 5 that in the
considered configuration the Fisher information matrix I 1,โ (ฮธโ ) can be made arbitrary close to 0 by making pโD tend to 0. Also, there is no loss at all when pโD = 1,
as expected. In order to verify the result of Theorem 5 in practice, a single-object
scenario with detection failures and without false alarms is considered. The object
starts at time t = 0 from the position x0 = 0 and evolves in X = R according to a
random walk with standard deviation 0.1 until time n = 50. The observation is linear
and Gaussian with variance equal to 1. The integral over the state space in the expression of the score is computed by Monte Carlo simulation with 103 samples while the
expectation in the Fisher information utilises 104 samples. The relative information
loss is displayed in Figure 3d and confirms the coefficient 1 โ pD found analytically in
Theorem 5. The next example shows how the Fisher information evolves in general
when adding new objects without involving them in data association uncertainty.
Example 3. The Fisher information I ฮฑ,ฮฒ (ฮธโ , K) of a K-object problem can be
related to the information I ฮฑ,ฮฒ (ฮธโ , K + N ) where the N new objects are not perturbed
by data-association uncertainties, i.e. when the random variable ฯ in the observation
.
model (15) verifies ฯ|D = id almost surely with D = {|d1:K+1 |, . . . , |d1:N |}. It then
follows from Theorem 5 that
I ฮฑ,ฮฒ (ฮธโ , K + N ) = I ฮฑ,ฮฒ (ฮธโ , K) + pโD N I(ฮธโ )
for any ฮฑ > 0 and any ฮฒ โฅ 0. This example gives an upper bound for the increase
of the Fisher information when the number of objects is increased, since it depicts
the case where there is no data association uncertainty for these objects. This would
correspond in practice to a case where the added objects are in an area where there is
IDENTIFICATION OF MULTI-OBJECT DYNAMICAL SYSTEMS
19
no false alarm and where these objects are โfarโ from the existing objects as well as
โfarโ from each other, where โfarโ depends on the likelihood.
6. Conclusion. The first important result in this article is the proof of consistency of the maximum likelihood estimator for multi-target tracking under weak
conditions, where weak means that these conditions are as often as possible applying
to the single-target dynamics and observation. Asymptotic normality holds under
additional assumptions and the second part of the article brings understanding to
the asymptotic variance of the maximum likelihood estimate by analysing the Fisher
information matrix corresponding to multi-target tracking. Qualitative results are
obtained in the general case, that is, the Fisher information decreases with data
association uncertainty, detection failures and in the presence of false alarms. Quantitative results are also derived in important special cases: a) one static target with
false alarm and unknown data association, b) multiple static targets with unknown
data association under a particular observation model, and c) multiple targets with
detection failures.
Future works include the study of identifiability of specific observation-to-track
associations, instead of marginalising over all possibilities as considered in this article.
Such an approach involves additional challenges since the parameters to be learned
increase in dimensionality with time, so that it is not a special case of the results
presented here.
Acknowledgement. All authors were supported by the Singapore ministry of
education tier 1 grant number R-155-000-182-114.
Appendix A. Assumptions for Theorem 3.
The following assumptions
are required for the proof of the asymptotic normality of the maximum
P likelihood
estimator in multi-target tracking. The norm k ยท k is defined as kM k = i,j |Mi,j | for
any matrix M .
A.6 For all K โ S T , all x, x0 โ XK and all y โ Yร , the mappings ฮธ 7โ fฮธ (x | x0 )
and ฮธ 7โ gฮธ (y | x) are twice continuously differentiable on the hyperplane of ฮ made
of parameters with a number of target equal to K.
A.7 It holds that
sup
sup
kโฮธ log fฮธ (x | x0 )k < โ and
ฮธโฮ x,x0 โXK
sup
sup
ฮธโฮ x,x0 โXK
kโ2ฮธ log fฮธ (x | x0 )k < โ
and that
h
i
Eฬฮธโ sup sup kโฮธ log gฮธ (Y | x)k < โ
ฮธโฮ xโXK
h
i
Eฬฮธโ sup sup kโ2ฮธ log gฮธ (Y | x)k < โ.
ฮธโฮ xโXK
S
A.8 For all y โ Yร , there exists an integrable function hy : kโฅ0 Xk โ R+
such that supฮธโฮ gฮธ (y | x) โค hy (x). For all ฮธ โ ฮ and for all x โ XK , there exist
integrable functions h1x , h2x : Yร โ R+ such that
kโฮธ gฮธ (y | x)k โค h1x (y)
and
kโ2ฮธ gฮธ (y | x)k โค h2x (y).
Appendix B. Proof of Lemma 1.
It follows from Assumption A.2 that
the supremum bC
+ of the clutter density p(ฮป,ฯ) characterised for any k โ N0 and any
20
J. HOUSSINEAU, S.S. SINGH AND A. JASRA
y โ Yk by p(ฮป,ฯ) (y) = Poฮป (k)
sup
ฮปโS C
X
Qk
i=1
pฯ (yi ) verifies bC
+ < โ since
sup
p(ฮป,ฯ) (y)
= sup
k โฮป
X (ฮปbC
+) e
ฮปโS C kโฅ0
k
kโฅ0 (ฯ,y)โฮจรY
k!
C
= sup eฮป(b+ โ1) < โ,
ฮปโS C
and since all the terms in the sum are positive. It then holds that
bฬ+ โค
sup
(pD ,K,y)โ(0,1)รS T รYร
โค
sup
(pD ,K)โ(0,1)รS T
bC
+
Kโง#y
X
i=0
K
i
Kโi
(pD bT
+ ) (1 โ pD )
i
T K
bC
+ (1 โ pD + pD b+ ) < โ,
which concludes the first part of the proof. For any k โ N0 and any y โ Yk
Z
X
gฮธ (y | x)dx โฅ
k
Y
T
bโ (yi ) โง bC
โ (yi ) Poฮป (k โ |d|)qฮธ (d)
dโ{0,1}K i=1
|d|โคk
=
Kโงk
k
XY
T
K
bโ (yi ) โง bC
โ (yi ) Poฮป (k โ d)BipD (d)
d=0 i=1
= BiK
pD โ Poฮป (k)
k
Y
T
bโ (yi ) โง bC
โ (yi )
i=1
โฅ inf
ฮธโฮ
BiK
pD
k
Y
T
โ Poฮป (k)
bโ (yi ) โง bC
โ (yi ) .
i=1
It also holds that inf ฮธโฮ BiK
pD โ Poฮป (k) > 0 for any k โ N0 since the support of
Poฮป is N0 for any ฮป โ S C which guarantees that the convolution has also N0 as a
support so that the infimum is strictly greater than zero. It follows that bโ (y) > 0
and, considering (8), that Eฬฮธโ [| log bโ (Y )|] < โ. Similarly, for any k โ N0 and any
y โ Yk
b+ (y) โค sup BiK
pD โ Poฮป (k)
ฮธโฮ
k
Y
T
b+ (yi ) โจ bC
+ (yi ) ,
i=1
which is finite when k is finite. In the infinite case, noticing that Poฮป (k โ K)pK
D is
the leading term in the convolution, we find that
h
i k
T
C
lim sup b+ (y) โค sup lim KpK
D Poฮป (k โ K) sup b+ (y) โจ b+ (y)
kโโ yโYk
ฮธโฮ kโโ
yโY
โฮป
ikโK
e
C
sup bT
(y)
โจ
b
(y)
<โ
+
+
kโโ (k โ K)! yโY
โค sup cฮธ lim
ฮธโฮ
h
where cฮธ is a finite constant, which concludes the proof of the lemma.
Appendix C. Proof of Theorem 2. The two cases of Theorem 2 are proved
separately as follows:
IDENTIFICATION OF MULTI-OBJECT DYNAMICAL SYSTEMS
21
a) When ฮธ โ ฮฮป=0 , the joint probability of the observations when the system is
initialised with its stationary distribution is characterised by
Z
Pฬฮธ (B) =
1B (y1:n )
n
Y
K
n
Y
Y
gฮธ (yt | xt )
ฯฮธ (x0,i )
fฮธ (xt,i | xtโ1,i ) dy1:n dx0:n ,
t=1
t=1
i=1
for any measurable subset B = B1 ร ยท ยท ยท ร Bn of (Yร )n with
.
gฮธ (y | x) =
X
dโ{0,1}K
|d|=m
X
m
Y
gฮธ yฯ(i) | xr(i) um (ฯ)qฮธ (d) .
ฯโSym(m) i=1
for any m โ N0 and any (x, y) โ XK ร Ym . Assuming that Bt is a measurable subset
of YK of the form At ร ยท ยท ยท ร At for any 1 โค t โค n, then the sum over d collapses to
a single term where all targets are detected and all the terms in the sum over ฯ are
equal, so that
.
wฮธ1 = Pฬฮธ (B)
Z Y
n h
K
i
Y
Kn
= pD
ฯฮธ (x0 )
1At (yt,i )gฮธ yt,i | xt,i fฮธ (xt,i | xtโ1,i ) dy1:n dx0:n .
i=1
t=1
A second case that can be considered is when Bt represents the configuration where
there are m โค K observations without considering their locations for all 1 โค t โค n,
i.e. Bt = Y ร ยท ยท ยท ร Y, in which case it holds that
n
.
wฮธ2,m = Pฬฮธ (B) = BiK
pD (m)
If (K, pD ) 6= (K โ , pโD ) then we can show that wฮธ2,K = wฮธ2,K
and wฮธ2,Kโ1 = wฮธ2,Kโ1
โ
โ
cannot hold at the same time for any ฮธ โ ฮฮป=0 . Alternatively, if (K, pD ) = (K โ , pโD )
then wฮธ1 6= wฮธ1 โ follows easily from the identifiability of ฮธโ . These two cases considered
together show that the distributions associated to ฮธ and ฮธ โ differ in some subset of
the multi-target observation space so that Pฬฮธ 6= Pฬฮธโ .
b) When ฮธ โ ฮ|K=1 , the multi-target likelihood becomes
gฮธ (y | x) = (1 โ pD )Poฮป (m)
m
Y
i=1
pฯโ (yi ) +
m
Y
pD X
gฮธโ yi | x Poฮป (m โ 1)
pฯโ (yj ),
m i=1
1โคjโคm
j6=i
for any m โ N0 and any (x, y) โ X ร Ym . Marginalising over the location of the observations at each time step and considering the case where there are m observations,
i.e. Bt = Y ร ยท ยท ยท ร Y, gives
.
wฮธm = Pฬฮธ (B) = (1 โ pD )Poฮป (m) + pD Poฮป (m โ 1),
mโฅ1
.
and wฮธ0 = (1 โ pD )eโฮป . Assuming that ฮธ 6= ฮธ โ and considering that (pD , ฮป) 6= (pโD , ฮปโ )
it follows that wฮธ0 = wฮธ0 โ , wฮธ1 = wฮธ1 โ and wฮธ2 = wฮธ2 โ cannot all hold at the same time,
which concludes the proof.
Appendix D. Proof of Theorem 4.
22
J. HOUSSINEAU, S.S. SINGH AND A. JASRA
Lemma 6. For given integers m and K, let Pฮธ be a family of probability measures
on YmK indexed by ฮธ โ ฮ and let pฮธ denote the corresponding probability density w.r.t.
a common reference measure, for all ฮธ, on YmK . Assume that pฮธ (y1 , . . . , ym ) > 0
for any ฮธ and (y1 , . . . , ym ).
For any integers ฮฑ โฅ 1 and ฮฒ โฅ 0, let the random vectors (Y10 , . . . , Ym0 ) be conฮฑ,ฮฒ
ฮฑ,ฮฒ
ditionally independent given (Y1 , . . . , Ym ), with law PYฮฑ,ฮฒ
0
|Y1:m = PY 0 |Y1 . . . PY 0 |Ym
1:m
1
m
is defined as in (15) via a process of thinning, augmentation with
and each PYฮฑ,ฮฒ
0
i |Yi
clutter with density pฯ on Y and random permutation. Assume pฯ > 0.
1. Consider any ฮธ and (ฮฑ, ฮฒ) such that ฮฑ > 1 or ฮฒ > 0. If f (Y1 , . . . , Ym ) =
E[f (Y1 , . . . , Ym )|Y10 , . . . , Ym0 ] then f (Y1 , . . . , Ym ) is constant almost surely.
2. Let the probability measure of (Y10 , . . . , Ym0 ) be Pฮธฮฑ,ฮฒ and its corresponding
ฮฑ,ฮฒ
probability density be pฮฑ,ฮฒ
are differฮธ . Assume that the densities pฮธ and pฮธ
entiable w.r.t. ฮธ then
(32) E[โฮธ log pฮธ (Y1 , . . . , Ym ) ยท โฮธ log pฮธ (Y1 , . . . , Ym )t ]
ฮฑ,ฮฒ
0
0
0
0 t
โฅ E[โฮธ log pฮฑ,ฮฒ
ฮธ (Y1 , . . . , Ym ) ยท โฮธ log pฮธ (Y1 , . . . , Ym ) ],
with the inequality being strict if and only if ฮฑ > 1 or ฮฒ > 0 and if the l.h.s.
is strictly greater than 0.
Proof of Part 1 of Lemma 6. When ฮฑ = 1 and ฮฒ > 0, which corresponds to no
random permutation (or no observation association uncertainty) but only random
thinning, the result follows from Lemma 11 and Remark 4. When ฮฑ > 1 and ฮฒ = 0,
which corresponds to no random thinning but only random permutation, the result
follows from Corollary 9. When ฮฑ โฅ 1 and ฮฒ > 0, i.e. both random thinning and
random permutation are present, the result of Lemma 11 based on YD , i.e. for (ฮฑ =
1, ฮฒ > 0), can be extended to the random variable YD0 = Sฯ (YD โ Yฬ ) as follows:
1. By noticing that ฯ(YD0 ) โ ฯ(ฯ, YD , Yฬ ) (i.e. the ฯ-algebra generated by YD0 is
.
coarser than the one generated by YฬD = (ฯ, YD , Yฬ )). Indeed, for any C = B1 ร B2 ร
ยท ยท ยท โ B(Yร ) with all but finitely many Bi equal to Y, it holds that
[
YD0โ1 (C) =
YฬDโ1 ({ฯ} ร Bฯ(1) ร Bฯ(2) ร . . . ) โ ฯ(YฬD )
ฯ
where the inclusion follows by countable union. The family of subsets of the same
form as C is a generating family of B(Yร ) from which the result follows. The result
extends straightforwardly to any collection of m thinned observation vectors being
independently perturbed by false alarm and permutation since the corresponding ฯalgebra is generated by the set of rectangles of the form C1 รยท ยท ยทรCm with Ci โ B(Yร ).
2. As a consequence of 1, the fact that f (Y ) = E[f (Y ) | YD0 ] a.s. implies that
E[f (Y ) | YฬD ] = E E[f (Y ) | YD0 ] | YฬD = E[f (Y ) | YD0 ] a.s.,
so that, since Yฬ , ฯ and YD are independent, it holds that
f (Y ) = E[f (Y ) | YฬD ] = E[f (Y ) | YD ] a.s.,
which under the assumption of Lemma 11 implies that f (Y ) is constant almost surely.
As in 1, the same result holds for collection of m observation vectors.
IDENTIFICATION OF MULTI-OBJECT DYNAMICAL SYSTEMS
23
Proof of Part 2 of Lemma 6. Let Y be the K measurements of K targets, Yฬ be
the clutter, ฯ the random permutation, D the K dimensional vector of deletions. Let
Y 0 = Sฯ ((RD Y ) โ Yฬ ). The missing target generated observations are Ym = RD0 Y
where D 0 = 1 โ D.
Let pY 0 ,ฯ,D,Ym (y 0 , ฯ, d, ym ) denote the joint pdf/pmf of (Y 0 , Ym , D, ฯ) that depends implicitly on ฮธ. Using the change of variable formula, noting that (Y , Yฬ ) =
F (Y 0 , Ym , D, ฯ) where the mapping F is a permutation of (Y 0 , Ym ) and hence the
Jacobian of the transformation has determinant 1, it follows that
pY 0 ,Ym ,D,ฯ (y 0 , ym , d, ฯ) = pY ,Yฬ ,D,ฯ (F (y 0 , ym , d, ฯ), d, ฯ)
for y 0 = Sฯ ((Rd y) โ yฬ), ym = Rd0 y where d0 = 1 โ d.
โฮธ log pY ,Yฬ ,D,ฯ (y, yฬ, d, ฯ) = โฮธ log pY (y), we deduce that
Since it holds that
โฮธ log pY 0 ,Ym ,D,ฯ (y 0 , ym , d, ฯ) = โฮธ log pY (FT (y 0 , ym , d, ฯ))
where FT (y 0 , ym , d, ฯ) is the projection of F (y 0 , ym , d, ฯ) on the coordinates describing Y . Now it follows that, almost surely,
โฮธ log pY 0 ,Ym ,D,ฯ (Y 0 , Ym , D, ฯ) = โฮธ log pY (Y ).
Let pY 0 denote the density of Y 0 . Then
โฮธ log pY 0 (Y 0 ) = EPฮธ [โฮธ log pY (Y ) | Y 0 ].
(33)
0
Applying (33) to the joint random variables Y1:m and Y1:m
defined in the lemma, it
follows that
0
0
โฮธ log pฮฑ,ฮฒ
ฮธ (Y1:m ) = EPฮธ โฮธ log pฮธ (Y1:m ) | Y1:m .
Let v โ Rdฮ , then Jensenโs inequality applied to the function x 7โ x2 and to the
random variable v t โฮธ log pฮธ (Y1:m ) yields
2
2
0
0
EPฮธ v t โฮธ log pฮธ (Y1:m ) | Y1:m
โค EPฮธ v t โฮธ log pฮธ (Y1:m ) | Y1:m
almost surely, so that
ฮฑ,ฮฒ
t
v t EP ฮฑ,ฮฒ [โฮธ log pฮฑ,ฮฒ
ฮธ (Y1:m ) ยท โฮธ log pฮธ (Y1:m ) ]v
ฮธ
2
0
= EP ฮฑ,ฮฒ EPฮธ v t โฮธ log pฮธ (Y1:m ) | Y1:m
ฮธ
t
โค v EPฮธ [โฮธ log pฮธ (Y1:m ) ยท โฮธ log pฮธ (Y1:m )t ]v
which proves (32). Since Jensenโs inequality has been applied to a strictly convex
function, the case of equality:
ฮฑ,ฮฒ
t
v t EP ฮฑ,ฮฒ [โฮธ log pฮฑ,ฮฒ
ฮธ (Y1:m ) ยท โฮธ log pฮธ (Y1:m ) ]v
ฮธ
= v t EPฮธ [โฮธ log pฮธ (Y1:m ) ยท โฮธ log pฮธ (Y1:m )t ]v,
0
holds if and only if, for all v โ Rdฮ , v t โฮธ log pฮธ (Y1:m ) = E[v t โฮธ log pฮธ (Y1:m ) | Y1:m
]
0
0
is ฯ(Y1:m )-measurable. Part 1 of the lemma shows that โฮธ log pฮธ (Y1:m ) is ฯ(Y1:m )measurable if and only if it is constant a.s.. Given that EPฮธ [โฮธ log pฮธ (Y1:m )] = 0 it
follows that the function itself is equal to 0 since it is constant, hence proving the
lemma.
24
J. HOUSSINEAU, S.S. SINGH AND A. JASRA
The observation model (15) does not imply the equality of the gradients of
log pฮธ (Y 0 , Y ) and log pฮธ (Y ) w.r.t. ฮธ since Pฮธ (dY 0 | Y ) depends on pD , ฮป and ฯ
which are parameters included in ฮธ. The interest is however in the information loss
w.r.t. ฮธ so that the result of Lemma 6 is satisfying.
Proof of Theorem 4. The considered perturbed observation model has the same
ฮฑ,ฮฒ
properties as the one studied in [3], i.e. that โฮธ log pฮฑ,ฮฒ
) = โฮธ log pฮธ (Y )
ฮธ (Y , Y
holds almost surely. The result of [3, Lemma 3] and [3, Remark 9] can therefore be
used directly in the context of interest to give
h
i
(m)
ฮฑ,ฮฒ โ
โ
Iloss
(ฮธ ) = Eฬฮธโ I
ฮฑ,ฮฒ (ฮธ ) ,
Yโโ:โ1 ,Ym:โ
ฮฑ,ฮฒ
where, for any Yโโ:โ1 , any Ym:โ
and any integer m โฅ 1,
I
(m)
โ
ฮฑ,ฮฒ (ฮธ )
Yโ:โ1 ,Ym:โ
=
h
1
ฮฑ,ฮฒ
Eฬฮธโ โฮธ log pฮธโ Y0:mโ1 | Yโโ:โ1 , Ym:โ
ยท
m
i
ฮฑ,ฮฒ t
ฮฑ,ฮฒ
โฮธ log pฮธโ Y0:mโ1 | Yโโ:โ1 , Ym:โ
Yโโ:โ1 , Ym:โ
h
1
ฮฑ,ฮฒ
โ Eฬฮธโ โฮธ log pฮธโ Y0:mโ1 | Yโโ:โ1 , Ym:โ
ยท
m
i
ฮฑ,ฮฒ t
ฮฑ,ฮฒ
โฮธ log pฮธโ Y0:mโ1 | Yโโ:โ1 , Ym:โ
Yโโ:โ1 , Ym:โ
.
The objective is to prove that
(36)
h
(m)
Eฬฮธโ I
ฮฑ,ฮฒ
Yโโ:โ1 ,Ym:โ
i
(ฮธโ ) = 0
for all m โฅ 1 implies that I(ฮธโ ) = 0. From Lemma 6 applied to the involved conฮฑ,ฮฒ
) = 0 almost surely
ditional laws, (36) implies that โฮธ log pฮธโ (Y0:mโ1 | Yโโ:โ1 , Ym:โ
ฮฑ,ฮฒ
for almost all Yโโ:โ1 and almost all Ym:โ . Following the same principle as in [3,
Lemma 4], it follows that if (36) holds for all m โฅ 1 then โฮธ log pฮธโ (Y0 | Yโโ:โ1 ) = 0
almost surely, which in turn implies that I(ฮธโ ) = 0.
D.1. Supporting results for the proof of Part 1 of Lemma 6.
D.1.1. Supporting results for the proof of Lemma 6 for permutation
uncertainty but no deletion, i.e. (ฮฑ > 1, ฮฒ = 0).
Lemma 7 (Randomly permuting a random vector.). Let Y = (Y1 , . . . , Yn ) and
Yฬ = (Yn+1 , . . . , Yn+m ). Let ฯ denote the randomised permutation which is independent of (Y , Yฬ ) and let Z = (Yฯ(1) , . . . , Yฯ(m+n) ). Assume ฯ permits, at the least, the
exchange of any two indices, i.e.
P(ฯ(i) = j, ฯ(j) = i, {ฯ(k) = k : k 6= i, j}) > 0
for all i, j. Furthermore, P(ฯ = (1, . . . , n)) > 0. Assume the law of (Y , Yฬ ) satisfies
ฮฝ n+m PY ,Yฬ ฮฝ n+m where ฮฝ is some probability measure and ฮฝ n+m the product
probability measure on Yn+m .
If f (Y ) = E[f (Y )|Z], then f (Y ) is a constant almost surely.
Proof of Lemma 7. The proof is completed for the case m = 1 and easily generalised to m > 1. Likewise, to present the arguments we employ in the clearest way,
we consider the case (n = 2, m = 1). (The case n + m = 2 sheds too little light to
make the generalisation apparent.)
IDENTIFICATION OF MULTI-OBJECT DYNAMICAL SYSTEMS
25
Let g(Z) = E[f (Y )|Z]. For any ฯ such that P(ฯ = ฯ) > 0,
E[|f (Y ) โ g(Yฯ(1) , . . . , Yฯ(n+1) )|I[ฯ=ฯ] ] = 0.
Since ฯ is independent of (Y , Yฬ ), we have
E[|f (Y ) โ g(Yฯ(1) , . . . , Yฯ(n+1) )|] = 0
and thus g(Yฯ(1) , . . . , Yฯ(n+1) ) = g(Yฯ0 (1) , . . . , Yฯ0 (n+1) ) almost surely for any other ฯ 0
such that P(ฯ = ฯ 0 ) > 0.
Now consider the case (n = 3, m = 1). The preceding statements imply, PY ,Y
almost everywhere,
(37)
g(Y1 , Y2 , Y3 ) = f (Y1 , Y2 )
(38)
g(Y1 , Y2 , Y3 ) = g(Y3 , Y2 , Y1 )
(39)
g(Y1 , Y2 , Y3 ) = g(Y1 , Y3 , Y2 ).
Indeed these also hold ฮฝ 3 almost every. (Due to the assumption of mutual absolutely
continuity, statements holds PY ,Y almost everywhere if and only if they hold ฮฝ 3
almost every.) We will show that the further implication
(40)
f (Y1 , Y2 ) = f (Y3 , Y2 ) = f (Y1 , Y3 )
holds ฮฝ 3 almost everywhere may be derived. Once this is done, to complete the proof,
we will further manipulate (40) under the assumption that the random variables Yi
are independently and identically distributed with respect to measure ฮฝ to show that
f = c, for some constant c, ฮฝ 3 almost everywhere.
From the first equality of (40),
f (Y1 , Y2 ) = Eฮฝ 3 (f (Y3 , Y2 )|Y1 , Y2 ) = Eฮฝ 3 (f (Y3 , Y2 )|Y2 ) = h(Y2 )
for some function h. That is f (Y1 , Y2 ) collapses to a function of variable Y2 only,
which is denoted by h(Y2 ). Using the second equality of (40), h(Y2 ) = f (Y1 , Y3 ) and
thus it must be that h is a constant as Yi are independent.
We now verify (37)-(38) implies f (Y1 , Y2 ) = f (Y3 , Y2 ) of (40). We have
Eฮฝ 3 [|f (Y1 , Y2 ) โ g(Y3 , Y2 , Y1 )|] = 0
and a change of variable gives Eฮฝ 3 [|f (Y3 , Y2 )โg(Y1 , Y2 , Y3 )|] = 0. The same procedure
applied to (37)-(39) shows the second equality of (40).
Corollary 8 extends Lemma 7 to the situation when Yฬ therein follows the law of
a clutter process as defined in Section 5.1 (see 15.)
Corollary 8. Let (Yฬ1 , Yฬ2 , . . .) be an infinite sequence of independent Y-valued
random variables with Yฬi โผ Pฯ . Let Y = (Y1 , . . . , YK ) be a vector of Y-valued random
variables which is independent of (Yฬ1 , Yฬ2 , . . .). Let Mฬ โ N0 be non-negative random
variable independent of (Y , Yฬ1:โ ). Let Z = Sฯ (Y โ Yฬ ) where Yฬ = Yฬ1:Mฬ and Sฯ is
the random permutation matrix defined as in (15) of Section 5.1. Assume (Pฯ )K
PY (Pฯ )K . If f (Y ) = E[f (Y )|Z], then f (Y ) is a constant almost surely.
Proof. Let g(Z) = E[f (Y )|Z] then E[|f (Y ) โ g(Z)||Mฬ = m] = 0 for all m such
that P(Mฬ = m) > 0. Since Mฬ is independent of (Y , Yฬ1:โ ) and the random permutation matrix is itself independent of (Y , Yฬ1:โ ) given Mฬ = m, the law of (Y , Z)
26
J. HOUSSINEAU, S.S. SINGH AND A. JASRA
conditioned on Mฬ = m satisfies the assumptions of Lemma 7. Thus, by Lemma 7,
E[|f (Y ) โ g(Z)||Mฬ = m] = 0 implies f (Y ) = cm almost surely for some constant cm .
(It is clear that cm is independent of m.)
The next results extends Corollary 8 to the setting where a sequence of vectors
(Y1 , . . . , Ym ), with Yi โ YK , is observed indirectly through the sequence of vectors
(Z1 , . . . , Zm ) where each Zi is generated as in Corollary 8 by augmenting Yi with
clutter and then randomly permuting it.
Corollary 9. Let (Y1 , . . . , Ym ) be a sequence of random vectors with Yi โ YK .
Let (Z1 , . . . , Zm ) be conditionally independent given (Y1 , . . . , Ym ), i.e. PZ1:m |Y1:m =
PZ1 |Y1 . . . PZm |Ym and each PZi |Yi is defined as in Corollary 8. Assume
(41)
(Pฯ )K+m PY1:m (Pฯ )K+m
If f (Y1:m ) = E[f (Y1:m )|Z1:m ], then f (Y1:m ) is a constant almost surely. In particular,
(41) holds if both (Y1 , . . . , Ym ) and Pฯ have positively valued probability densities, i.e.
p(y1 , . . . , ym ) > 0 and pฯ (y) > 0, w.r.t. the dominating measures ฮฝ K+m and ฮฝ for
some measure ฮฝ on Y.
Proof. Due to the conditional independence assumption, E[f (Y1:m )|Z1 , Y2:m ] =
E[f (Y1:m )|Z1 , Y2:m , Z2:m ] and since f (Y1:m ) = E[f (Y1:m )|Z1:m ], we have f (Y1:m ) =
E[f (Y1:m )|Z1 , Y2:m ] or
f (Y1 , y2:m ) = E[f (Y1:m )|Z1 , y2:m ]
PY1 ,Z1 |y2:m โ a.s.
for PY2:m almost all y2:m . Invoking Corollary 8 we thus have f (Y1 , Y2:m ) = g1 (Y2:m )
a.s. for some function g1 . Proceeding in this way we can similarly show
f (Y1:iโ1 , Yi , Yi+1:m ) = gi (Y1:iโ1 , Yi+1:m )
for i = 1, . . . , m. We can now invoke assumption (41) to show that f (Y1:m ) must be a
constant almost surely in a manner similar to the proof of Lemma 7; details omitted.
The final statement of the corollary is straightforward.
D.1.2. Supporting results for the proof of Lemma 6 for deletion but
no permutation uncertainty, i.e. (ฮฑ = 1, ฮฒ > 0). The following result is an
intermediate result intended to convey the main idea of the analysis while the actual
full blown version is contained in Lemma 11 below.
Lemma 10. Let Y = (Y1 , Y2 ), D โ {1, 2}, Y and D are independent and 0 <
P(D = 1) < 1. Assume for any measurable set C that P(Y1 โ C|Y2 โ C) < 1 whenever
0 < P(Y1 โ C) < 1. Then f (Y ) = E[f (Y )|YD ] implies f (Y ) = c almost surely for
some constant c.
Remark 1. The random variables (Y1 , Y2 ) can always be relabelled if the assumption is met by P(Y2 โ ยท|Y1 โ ยท). The assumption is to be interpreted to mean that if Y1
is not concentrated in C then the event Y2 โ C does not imply Y1 โ C. This assures
some independence between the random variables.
Remark 2. The assumption is satisfied without the need of densities. For example the assumption is satisfied when Y1 and Y2 are independent. If Y = (Y1 , Y2 )
has a density, then the assumption is satisfied if p(y1 , y2 ) > 0. Indeed in this case
P(Y1 โ C c , Y2 โ C) > 0 for all C โ Y.
IDENTIFICATION OF MULTI-OBJECT DYNAMICAL SYSTEMS
27
Proof of Lemma 10. The conditional expectation can always be expressed as follows: there exists a function g such that E[f (Y )|YD ] = g(YD ) or g(YD ) is a version
of the conditional expectation. Thus we have
0 = E[|f (Y ) โ g(YD )|]
= P(D = 1)E[|f (Y ) โ g(Y1 )|] + P(D = 2)E[|f (Y ) โ g(Y2 )|]
which follows from the independence of D and Y . Since 0 < P(D = 1) < 1, both
expectation terms must be zero and hence g(Y1 ) = g(Y2 ) almost surely:
E[|g(Y1 ) โ g(Y2 )|] โค E[|f (Y ) โ g(Y1 )|] + E[|f (Y ) โ g(Y2 )|] = 0.
For any measurable set B, let A = g โ1 (B). Since g(Y1 ) = g(Y2 ) almost surely, we
have P(g(Y1 ) โ B) = P(g(Y1 ) โ B, g(Y2 ) โ B) = P(g(Y2 ) โ B) or that
(42)
P(Y1 โ A) = P(Y1 โ A, Y2 โ A) = P(Y2 โ A).
We can now show that g(Y1 ) = c, for some constant c, almost surely. (Assuming the
converse is true we will arrive at a contradiction.) If g(Y1 ) = c does not hold almost
surely then there exist a set B such that 0 < P(g(Y1 ) โ B) < 1 and let A = g โ1 (B)
and thus 0 < P(Y1 โ A) < 1. But (42) implies P(Y1 โ A|Y2 โ A) = 1 which violates
the assumption.
Lemma 11 (Multiple deletions for K > 2.). Let Y = (Y1 , . . . , YK ) be a random
vector, D โ {1, . . . , K} and YD denote the thinned version where components not in
D have been removed. Assume 0 < P(D = ฯ) < 1 for all subsets ฯ โ {1, . . . , K} such
that |ฯ| = K โ 1. Furthermore, assume the following:
โข For each i, j โ {1, . . . , K}, i 6= j, let Z โ Y1:K\{i,j} . If P((Yi , Z) โ A) < 1
and IA (Yi , Z) 6= E[IA (Yi , Z)|Z] then P((Yi , Z) โ A|(Yj , Z) โ A) < 1. (Here
f 6= g means P(f 6= g) > 0.)
Then f (Y ) = E[f (Y )|YD ] implies f (Y ) = c almost surely for some constant c.
Remark 3. The assumption of Lemma 11 is more easily understood as follows:
for each i, j โ {1, . . . , K}, i 6= j, let Z โ Y1:K\{1,j} . If P(Yi โ A|Z โ B) < 1 then
P(Yi โ A|Z โ B, Yj โ A) < 1
Unfortunately stating the assumption via (measurable) rectangle sets is not sufficient as the product sigma algebra is much richer than just measurable rectangles.
In fact, if the set A of IA (Yi , Z) in the assumption of Lemma 11 is the measurable
rectangle IA (Yi )IB (Z) then the assumption reduces to that in this remark.
Remark 4. The main assumption of Lemma 11 is satisfied if ฮฝ1 ร ยท ยท ยท ร ฮฝK
PY ฮฝ1 ร ยท ยท ยท ร ฮฝK where ฮฝi are probability measures, i.e. PY and ฮฝ1 ร ยท ยท ยท ร ฮฝK are
mutually absolutely continuous. (The proof of this fact uses Lemma 12 and the fact
that trace of a set is measurable; this is omitted.)
Proof of Remark 3. The condition IA (Yi , Z) 6= E[IA (Yi , Z)|Z] translates to
IA (Yi )IB (Z) 6= E[IA (Yi )IB (Z)|Z]
and from Lemma 12 this implies that for all measurable sets C in the range of Z
E[IA (Yi )IB (Z)] 6= E[IC (Z)].
Taking C = B this then implies P(Yi โ A, Z โ B) < P(Z โ B) and so
P(Yi โ A|Z โ B) < 1.
28
J. HOUSSINEAU, S.S. SINGH AND A. JASRA
Clearly the probability P((Yi , Z) โ A|(Yj , Z) โ A) of the assumption of Lemma 11
for the rectangle is P(Yi โ A|Yj โ A, Z โ B).
Proof of Lemma 11. The random variable YD belongs to Yร , that is to the disk
0
joint union โชK
k=0 Y with Y โก โ
. Thus we can write
0 = E[|f (Y ) โ g(YD )|] =
K
X
X
E[|f (Y ) โ gi (Yฯ )|I[D=ฯ] ]
i=0 ฯ:|ฯ|=i
=
K
X
X
E[|f (Y ) โ gi (Yฯ )|]P(D = ฯ)
i=0 ฯ:|ฯ|=i
where g0 is a constant, gi : Yi โ R are measurable functions and independence of
D and Y has been invoked. If P(D = โ
) > 0 then it is trivial since this implies
E[|f (Y ) โ g0 |] = 0. So assume P(D = โ
) = 0.
Having assumed 0 < P(D = ฯ) < 1 for all subsets ฯ โ {1, . . . , K} such that
|ฯ| = K โ 1, we focus on these terms only:
X
E[|f (Y ) โ gKโ1 (Yฯ )|]P(D = ฯ)
ฯ:|ฯ|=Kโ1
which also implies
(43)
gKโ1 (Yฯ ) = gKโ1 (Yฯ0 )
or IA (Yฯ ) = IA (Yฯ0 )
almost surely
โ1
for all ฯ, ฯ 0 and A = gKโ1
(B) for a measurable set B in R. For example, when
ฯ = (1, 3, . . . , K), ฯ = (2, 3, . . . , K) and Z = (Y3 , . . . , YK ), we get
P((Y1 , Z) โ A) = P((Y1 , Z) โ A, (Y2 , Z) โ A) = P((Y2 , Z) โ A).
Henceforth we refer to gKโ1 simply as g. We need to show that g(Yฯ ) = c, for
some constant c, almost surely. If this is not the case then there exists subsets of
variables Yi โ Yฯ , Z โ Yฯ and Yi โ
/ Z (recall ฯ โ {1, . . . , K} with |ฯ| = K โ 1) such
that
(44)
g(Yฯ ) = E[g(Yฯ )|Yi , Z]
a.s. and
g(Yฯ ) 6= E[g(Yฯ )|Z]
a.s.
The interpretation is that g(Yฯ ) can potentially be a function of the reduced set of
variables (Yi , Z) (as asserted by the first equality) but it must genuinely be a function
of at least the variable Yi .
For clarity and simplicity assume i = 1 and Z = (Y3 , . . . , YK ). Consider the
terms in the sum due to ฯ = (1, 3, . . . , K) and ฯ = (2, 3, . . . , K). By Lemma 13
below, there exists a measurable set A = g โ1 (B) such that 0 < P(A) < 1 and
IA (Y1 , Z) 6= E[IA (Y1 , Z)|Z]. But (43) implies P((Y1 , Z) โ A|(Y2 , Z) โ A) = 1 which
violates the main assumption of the lemma.
The following two lemmas concerns the random variables declared in the statement of Lemma 11
Lemma 12. IA (Yi , Z) = E[IA (Yi , Z)|Z] a.s. if and only if there exits a set C in
ฯ(Z) such that IA (Yi , Z) = IC almost surely.
IDENTIFICATION OF MULTI-OBJECT DYNAMICAL SYSTEMS
29
Proof. Let F denote E[IA (Yi , Z)|Z] and let C = {ฯ : F (ฯ) = 1}. Clearly C โ
ฯ(Z) and we show IA (Yi , Z) = IC almost surely.
The set IA (Yi , Z) 6= F has measure zero and is comprised of the disjoint sets
{ฯ : IA (Yi , Z) = 1, F 6= 1}, {ฯ : IA (Yi , Z) = 0, F = 1} and {ฯ : IA (Yi , Z) = 0, F 6=
0, F 6= 1}. Thus the result follows since IC and IA (Yi , Z) differ precisely on the first
two sets. (The reverse implication is obvious.)
Lemma 13. If g(Yi , Z) 6= E[g(Yi , Z)|Z] then there exists a measurable function
IA (Yi , Z) such that 0 < P((Yi , Z) โ A) < 1 and IA (Yi , Z) 6= E[IA (Yi , Z)|Z].
Proof. The proof is complete once we show that g(Yi , Z) 6= E[g(Yi , Z)|Z] implies
there exists a set A0 โ ฯ(g) such that IA0 6= E[IA0 |Z], which in turn implies 0 <
P(A0 ) < 1. (Here we write ฯ(g), rather than ฯ(g(Yi , Z)), for the smallest ฯ-algebra
with respect to which the random variable g(Yi , Z) is measurable.) Note that for every
A0 โ ฯ(g) there exists a measurable set B in R such that A0 = {ฯ : (Yi (ฯ), Z(ฯ)) โ
g โ1 (B)}.
Assume that IA0 = E[IA0 |Z] almost surely for all A0 โ ฯ(g). Then by Lemma 12,
for each A0 โ ฯ(g) there is a set C in ฯ(Z) such that IA0 = IC almost surely. This
will violate g(Yi , Z) 6= E[g(Yi , Z)|Z] if g(Yi , Z) = IA0 and hence also if g was a simple
function; if we replace each indicator function (measurable set) of the simple function
with its almost sure counterpart from ฯ(Z) then it becomes ฯ(Z) measurable. In
the general case, the result may be established since g may be approximated by a
sequence of simple functions {gn } tending to g and each simple function gn itself has
a ฯ(Z) measurable version, say g n , and g n = gn . Thus
E[gn |Z] = E[g
n |Z] = gn .
Letting g = E[g(Yi , Z)|Z], we see that E[|g โ g|] = lim E |gn โ E[gn |Z]| = 0.
Appendix E. Proof of Theorem 5. The case where K โ = 1 is first considered
so that the number of observations Mt at time t can only be equal to zero or one.
The joint probability of the observations and states becomes
pฬฮธ (y1:n , x0:n ) = ฯฮธ (x0 )
n
Y
(1 โ pD )1โMt (pD gฮธ (yt | xt ))Mt fฮธ (xt | xtโ1 ) ,
t=1
where yt is the empty sequence when Mt = 0. The size of yt at any time t can be
made explicit in this expression for the sake of clarity as follows
pฬฮธ (y1:n , x0:n , m1:n ) = ฯฮธ (x0 )
n
Y
(1 โ pD )1โmt (pD gฮธ (yt | xt ))mt fฮธ (xt | xtโ1 ) .
t=1
Yt
Let
be a noisy version of the original observation Yt for any t โฅ 1 so that the
HMM (Xt , Yt )t is equal in law to the HMM (Xt , Yt + Zt )t where (Zt )t is an i.i.d.
sequence of random variables which common law is the uniform distribution over the
ball of radius 1 and centre 0. A switching process (st )t is also introduced as follows:
st = 1 when the target is detected and st = 0 otherwise. In order to study the
Fisher information more easily, we introduce an alternative observation model where
a detection failure at time t is replaced by an observation Yt from the target. The
law of this observation model is
n
Y
st
pฬฮธ (yฬ1:n , x0:n , s1:n ) = ฯฮธ (x0 )
pD (1 โ pD )1โst gฮธ (yฬt | xt )fฮธ (xt | xtโ1 )
= ฯฮธ (x0 )
t=1
n h
Y
t=1
i
[pD gฮธ (yt | xt )]st [(1 โ pD )gฮธ (yt | xt )]1โst fฮธ (xt | xtโ1 )
30
J. HOUSSINEAU, S.S. SINGH AND A. JASRA
where yฬt = yt if st = 1 and yฬt = yt if st = 0. The quantity of interest is
pฬฮธ (yฬ0 , s0 | yโโ:โ1 , y1:โ
)=
),
[pD gฮธ (y0 | x0 )]s0 [(1 โ pD )gฮธ (y0 | x0 )]1โs0 pฬฮธ (x0 | yโโ:โ1 , y1:โ
which we compare with the full-detection case
pฬฮธ (y0 | yโโ:โ1 , y1:โ
) = gฮธ (y0 | x0 )pฬฮธ (x0 | yโโ:โ1 , y1:โ
).
To justify the equivalence of the two observation model for the considered purpose, we can verify that the score โฮธ log pฬฮธ (y0 , m0 | yโโ:โ1 ) is equal to the score
โฮธ log pฬฮธ (yฬ0 , s0 | yโโ:โ1 , y1:โ
) when โ โ. With the required modifications and
after [3, Theorem 5], it follows that the loss of information Iloss
(ฮธโ ) when replacing
the original observations by the -perturbed ones can be expressed as
h
i
Iloss
(ฮธโ ) = Eฬฮธโ โฮธ log pฬฮธโ (Y0 | Yโโ:โ1 , Y1:โ
) ยท โฮธ log pฬฮธโ (Y0 | Yโโ:โ1 , Y1:โ
)t
h
i
โ pD Eฬฮธโ โฮธ log pฬฮธโ (Y0 | Yโโ:โ1 , Y1:โ
) ยท โฮธ log pฬฮธโ (Y0 | Yโโ:โ1 , Y1:โ
)t
h
i
โ (1 โ pD )Eฬฮธโ โฮธ log pฬฮธโ (Y0 | Yโโ:โ1 , Y1:โ
) ยท โฮธ log pฬฮธโ (Y0 | Yโโ:โ1 , Y1:โ
)t .
Considering the limit โ โ, it follows that
.
Iloss (ฮธโ ) = lim Iloss
(ฮธโ )
โโ
h
i
= (1 โ pD )Eฬฮธโ โฮธ log pฬฮธโ (Y0 | Yโโ:โ1 ) ยท โฮธ log pฬฮธโ (Y0 | Yโโ:โ1 )t .
In the multi-target case, it simply holds that the information loss is equal to (1 โ
pโD )K โ I(ฮธโ ) since targetsโ detection are independent when the data association is
known, which terminates the proof of the proposition.
REFERENCES
[1] S. S. Blackman, Multiple-target tracking with radar applications, Artech House, 1986.
[2] N. Chenouard et al., Objective comparison of particle tracking methods, Nature methods, 11
(2014).
[3] T. A. Dean, S. S. Singh, A. Jasra, and G. W. Peters, Parameter estimation for hidden
Markov models with intractable likelihoods, Scandinavian Journal of Statistics, 41 (2014).
[4] P. Del Moral, Mean field simulation for Monte Carlo integration, 2013.
[5] P. Del Moral and J. Houssineau, Particle association measures and multiple target tracking,
in Theoretical Aspects of Spatial-Temporal Modeling, Springer, 2015, pp. 1โ30.
[6] R. Douc, E. Moulines, and T. Ryden, Asymptotic properties of the maximum likelihood
estimator in autoregressive models with Markov regime, The Annals of Statistics, 32 (2004).
[7] A. Doucet, B.-N. Vo, C. Andrieu, and M. Davy, Particle filtering for multi-target tracking
and sensor management, in Proceedings of the Fifth International Conference on Information Fusion, vol. 1, IEEE, 2002, pp. 474โ481.
[8] L. Jiang, S. S. Singh, and S. Yฤฑldฤฑrฤฑm, Bayesian tracking and parameter learning for nonlinear multiple target tracking models, IEEE Transactions on Signal Processing, 63 (2015).
[9] B. G. Leroux, Maximum-likelihood estimation for hidden Markov models, Stochastic processes
and their applications, 40 (1992).
[10] R. P. S. Mahler, Multitarget Bayes filtering via first-order multitarget moments, IEEE Transactions on Aerospace and Electronic Systems, 39 (2003).
[11] S. P. Meyn and R. L. Tweedie, Markov chains and stochastic stability, Springer Science &
Business Media, 2012.
IDENTIFICATION OF MULTI-OBJECT DYNAMICAL SYSTEMS
31
[12] J. Mullane, B.-N. Vo, M. D. Adams, and B.-T. Vo, A random-finite-set approach to
Bayesian SLAM, IEEE Transactions on Robotics, 27 (2011).
[13] S. Oh, S. Russell, and S. Sastry, Markov chain Monte Carlo data association for multi-target
tracking, IEEE Transactions on Automatic Control, 54 (2009).
[14] K. Okuma, A. Taleghani, N. De Freitas, J. J. Little, and D. G. Lowe, A boosted particle
filter: Multitarget detection and tracking, in European Conference on Computer Vision,
Springer, 2004, pp. 28โ39.
[15] M. Pace and P. Del Moral, Mean-field PHD filters based on generalized Feynman-Kac flow,
Journal of selected topics in signal processing, special issue on multi-target tracking, (2013).
[16] Y. Pailhas, J. Houssineau, Y. Petillot, and D. E. Clark, Tracking with MIMO sonar
systems: applications to harbour surveillance, IET Radar, Sonar & Navigation, (2016).
[17] C. B. Storlie, J. Hannig, T. C. Lee, et al., Statistical consistency of the data association
problem in multiple target tracking, Electronic Journal of Statistics, 5 (2011).
[18] B.-N. Vo and W.-K. Ma, The Gaussian mixture probability hypothesis density filter, IEEE
Transactions on Signal Processing, 54 (2006).
[19] B.-N. Vo, S. Singh, and A. Doucet, Sequential Monte Carlo methods for multitarget filtering with random finite sets, IEEE Transactions on Aerospace and Electronic Systems, 41
(2005).
| 10math.ST
|
1
Advanced Quantizer Designs for FDD-based
FD-MIMO Systems Using Uniform Planar Arrays
arXiv:1703.10739v3 [cs.IT] 3 Nov 2017
Jiho Song, Member, IEEE, Junil Choi, Member, IEEE, Taeyoung Kim, Member, IEEE, and
David J. Love, Fellow, IEEE
UPA structure is known as full-dimension (FD) MIMO because
of its ability to exploit both vertical and horizontal domain
beamforming [5]โ[10].
To fully exploit FD-MIMO, accurate channel state information (CSI) for both domains is critical. Channel estimation
techniques relying upon time division duplexing (TDD) can
leverage channel reciprocity if the transmit and receive arrays
are calibrated [11], [12]. Most current cellular systems, however,
exploit frequency division duplexing (FDD) where the receiver
should estimate, quantize, and feed back the downlink CSI to
the transmitter. The high dimensionality of a massive MIMO
channel could cause large overheads for downlink channel
training and quantization processes [13]โ[19]. We focus on
CSI quantization for FD-MIMO in this paper and refer to
[18]โ[20] and the references therein for the massive MIMO
downlink training problem.
The majority of CSI quantization codebooks have been designed under the assumption of spatially uncorrelated Rayleigh
fading channels, which are uniformly distributed on the unit
hypersphere when normalized. To quantize these channels,
the codewords in a codebook should cover the unit sphere
Index TermsโMassive MIMO, full-dimension MIMO, uniform as uniformly as possible [21]โ[23]. For spatially correlated
channels, the codebooks have been carefully shaped based on
planar arrays, Kronecker product codebooks.
the prior knowledge of channel statistics [24]โ[28].
Although most previous codebooks have been designed based
I. I NTRODUCTION
on analytical channel models, it is difficult to represent the
ASSIVE multiple-input multiple-output (MIMO) sys- properties of true three-dimensional (3D) channels for FDtems are a strong candidate to fulfill the throughput MIMO. The 3D spatial channel model (SCM) in [4], [29],
requirements for fifth generation (5G) cellular networks [2]. which is an extension of the 2D SCM [30], has been extensively
To maximize the number of antennas in a limited area, two- used to mimic the measured channel variations for 3GPP
dimensional antenna arrays, e.g., uniform planar arrays (UPAs) standardization. Although the 3D SCM is a stochastic channel
and cylindrical arrays, that host antennas in both vertical and model, it provides limited insights into practical CSI quantizer
horizontal domains are being prominently considered in practice designs. Therefore, it is necessary to develop a simple channel
[3], [4]. Among various 2D array solutions, UPAs are of great model that accurately represents the properties of the 3D-SCM
interest to simplify signal processing for three-dimensional channel with UPA antennas.
In this paper, we define a simple 3D channel model using the
(3D) channels for FD-MIMO. Massive MIMO employing a
sum of a finite number of scaled array response vectors. Based
J. Song and D. J. Love are with the School of Electrical and Computer on this simplified channel model, we develop CSI quantizers
Engineering, Purdue University, West Lafayette, IN 47907 (e-mail: {jihosong, for UPA scenarios. We first carry out performance analysis of
djlove}@purdue.edu).
J. Choi is with the Department of Electrical Engineering, POSTECH, Pohang, Kronecker product (KP) CSI quantizers [1], [9]. Our analytical
Gyeongbuk 37673, Korea (e-mail:[email protected]).
studies on the KP CSI quantizers provide design guidelines on
T. Kim, is with Samsung Electronics Co., Ltd., Suwon, Korea
how to develop a quantizer for a narrowband, single frequency
(email:[email protected]).
Parts of this paper were presented at the Globecom, Washington, DC USA, tone CSI using limited feedback resources. In the proposed
December 4-8, 2016 [1].
quantizer, we concentrate on detecting/quantizing dominant
This work was supported in part by Communications Research Team (CRT), radio paths in true channels. To maximize quantization quality,
Samsung Electronics Co. Ltd., and the ICT R&D program of MSIP/IITP
[2017(B0717-17-0002), Development of Integer-Forcing MIMO Transceivers we also develop a codebook for combiners that cophases and
for 5G & Beyond Mobile Communication Systems].
scales the quantized beams. Both vertical and horizontal doAbstractโMassive multiple-input multiple-output (MIMO) systems, which utilize a large number of antennas at the base
station, are expected to enhance network throughput by enabling
improved multiuser MIMO techniques. To deploy many antennas
in reasonable form factors, base stations are expected to employ
antenna arrays in both horizontal and vertical dimensions, which
is known as full-dimension (FD) MIMO. The most popular
two-dimensional array is the uniform planar array (UPA),
where antennas are placed in a grid pattern. To exploit the
full benefit of massive MIMO in frequency division duplexing
(FDD), the downlink channel state information (CSI) should be
estimated, quantized, and fed back from the receiver to the
transmitter. However, it is difficult to accurately quantize the
channel in a computationally efficient manner due to the high
dimensionality of the massive MIMO channel. In this paper, we
develop both narrowband and wideband CSI quantizers for FDMIMO taking the properties of realistic channels and the UPA
into consideration. To improve quantization quality, we focus
on not only quantizing dominant radio paths in the channel,
but also combining the quantized beams. We also develop a
hierarchical beam search approach, which scans both vertical
and horizontal domains jointly with moderate computational
complexity. Numerical simulations verify that the performance
of the proposed quantizers is better than that of previous CSI
quantization techniques.
M
2
mains are searched during beam quantization, which involves a
heavy computational complexity. We thus develop a hierarchical
beam search approach to reduce the complexity.
We also develop a wideband quantizer for broadband
communication by evolving the dual codebook structure in LTEAdvanced [31], [32]. In the dual codebook structure, a first layer
quantizer is used to search correlated CSI between multiple
frequency tones. Unless dominant paths are gathered in a single
cluster, the LTE-Advanced codebook is not effective because
only adjacent radio paths are selected and quantized using the
same resolution codebook. We thus concentrate on detecting
adjacent and/or sperate paths within each wideband resource
block (RB) based on the proposed hierarchical beam search
approach. In addition, a second layer quantizer is designed
to refine the beam direction of the quantized wideband CSI
according to the channel vectors in a narrowband RB. When
comparing our approach to the LTE-Advanced codebook, the
refined beams are cophased and scaled in our approach, while
the LTE-Advanced codebook only cophase adjacent beams
without considering beam refinement.
In Section II, we describe FD-MIMO systems employing
UPAs and discuss a simple channel model that mimics true 3D
SCM channels. In Section III, we review previously reported
KP codebooks. In Section IV, we develop a narrowband CSI
quantizer that takes multiple radio paths into account and
conduct performance analysis to develop a design guideline
for CSI quantizers. In Section V, we also propose a wideband
CSI quantizer assuming a multi-carrier framework. In Section
VI, we present simulation results, and the conclusion follows
in Section VII.
Throughout this paper, C denotes the field of complex numbers, N denotes the semiring of natural numbers, CN (ยต, ฯ 2 )
denotes the complex normal distribution with mean ยต and
variance ฯ 2 , [a, b] is the closed interval between a and b,
U(a, b) denotes the uniform distribution in the closed interval
[a, b], d e is the ceiling function, ฮ(n) denotes the complete
gamma function, Ea [ยท] is the expectation of independent random
variable a, k ยท kp is the p-norm,
is the Hadamard product,
โ is the Kronecker product, 0a is the a ร 1 all zeros vector,
IN is the N ร N identity matrix, 1a,b is the a ร b all ones
matrix, Aa,b , vn {A}, and eign {A} denote (a, b)th entry, the
n-th dominant eigenvector, and the principal eigenvalue of the
matrix A. Also, aH , aโ , (a)` , a[a:b] denote the conjugate
transpose, element-wise complex conjugate, `-th entry, and
subvector including entries between [a, b] of the column vector
a, respectively.
antenna structure [3]. Assuming a multi-carrier framework, an
input-output expression is defined as
โ
y[w] = ฯh[w]H f [w]s[w] + n[w],
(1)
where y[w] is the received baseband symbol, ฯ is the signalto-noise ratio (SNR), h[w] โ CM is the block fading MISO
channel, f [w] โ CM is the unit-norm transmit beamformer,
s[w] โ C is the data symbol with the power constraint
E[|s[w]|2 ] โค 1, and n[w] โผ CN (0, 1) is the additive white
Gaussian noise. Note that w โ {1, ยท ยท ยท , W } denotes the
frequency tone in the multi-carrier framework.
To facilitate quantizer designs, we mimic the 3D-SCM and
define a simplified channel model with a few radio paths
according to
P
. X โj2ฯ
h[w] =
e
wโ W2โ1 4tp
ฮฑp dM (ฯpv , ฯph , w),
(2)
p=1
while the true 3D-SCM is used to present numerical results in
Section VI. In (2), P is the number of dominant paths, 4 is
the subcarrier spacing, tp is the excess tap delay of the p-th
radio path, ฮฑp is the channel gain of the p-th radio path, and
dM (ฯpv , ฯph , w) is the p-th radio path at given angles (ฯpv , ฯph ).
In the UPA scenario, a radio path for the w-th frequency tone
is represented as
.
dM (ฯ v , ฯ h , w) = dMv (ฯ v , w) โ dMh (ฯ h , w)
(3)
where the array response vector dMa (ฯa , w) is defined as
2ฯda
2ฯda a
a T
1
.
dMa (ฯ a , w) = โ
1, ej ฮป[w] ฯ , ยท ยท ยท , ej ฮป[w] (Ma โ1)ฯ
,
Ma
(4)
for a โ {v, h}. In (4), ฯ v = sin ฯv and ฯ h = sin ฯh cos ฯv
[33]. Note that da is the antennas spacing, ฯa is the angle
for the array vector, and ฮป[w] is the wavelength for the w-th
frequency tone CSI
.
ฮป[w] =
1+
4
fc
ฮปc
wโ
W +1
2
(5)
where fc is the center frequency satisfying c = fc ฮปc with
the speed of light c. Without loss of generality, a narrowband
representation of channels is defined by plugging2 w = W2+1
into (2)
h=
P
X
dM (ฯpv , ฯph )ฮฑp
(6)
p=1
II. S YSTEM M ODEL
We consider multiple-input single-output (MISO) systems1
.
employing M = Mv Mh transmit antennas at the base station
and a single receive antenna at the user, where Mv is the
number of rows and Mh is the number of columns of the UPA
1 Although we mainly discuss MISO channel quantization to simplify
presentation, the proposed channel quantizer can be easily extended to multipleinput multiple-output (MIMO) systems. The extension of the MISO channel
quantizer will be discussed in Section IV-C.
= Da
.
where D = dM (ฯ1v , ฯ1h ), ยท ยท ยท , dM (ฯpv , ฯph ) โ CM รP is the
.
set of radio paths and a = [ฮฑ1 , ยท ยท ยท , ฮฑP ]T โ CP is the set of
complex channel gains. In the narrowband assumption, w is
dropped for simplicity. We assume that the beam directions are
uniformly distributed in both vertical and horizontal domains
such as ฯpv , ฯph โผ U(โ1, 1) and are independent of channel
gains ฮฑp โผ CN (0, 1).
2 We
consider the
W +1
-th
2
subcarrier to ignore beam squinting effects [34].
3
In the limited feedback beamforming approach, each user
chooses a transmit beamformer among codewords in the
.
codebook F = {f1 , ยท ยท ยท , f2BT } such that
vectors, the channel vector h in (6) is decomposed into both
vertical and horizontal domains based on the singular value
decomposition [9] yielding
f = arg max |hH fฬ |2 ,
rank (Hฬ)
h=
X
(uk โ vkโ )ฯk ,
(8)
k=1
where BT denotes the total feedback overhead. Based on the
assumption that both transmitter and receiver know the prede- where the reshaped channel is given in a matrix form
T
fined codebook, the BT -bit index of the selected beamformer
.
Hฬ = h[1:Mh ] , ยท ยท ยท , h[(Mv โ1)Mh +1:Mv Mh ] โ CMv รMh .
is fed back to the transmitter over the feedback link.
The majority of channel quantization codebooks have been In (8), ฯk denotes the k-th dominant singular value, uk โ CMv
designed for spatially correlated and uncorrelated Rayleigh denotes the k-th dominant left singular vector, and vk โ CMh
fading channels [21]โ[28]. These analytical channel models rely denotes the k-th dominant right singular vector of Hฬ. The final
upon rich scattering environments so that each radio path has a codeword is then obtained as f = cv โ (ch )โ , where
limited effect on channel characterization. Thus, most previous
v 2
cv = arg max |uH
ch = arg max |v1H cฬh |2 .
1 cฬ | ,
beamformer codebooks focus on covering the unit hypersphere
v
v
cฬ โAB /2
cฬh โAh
BT /2
T
as uniformly as possible without considering each radio path
individually. However, the analytical channel models are much
Despite the advantage of a KP codebook, it has some issues.
different than realistic channel models that assume only a Even with a line-of-sight (LOS) channel, a dominant radio path
few dominant scatterers. Therefore, this line-packing codebook may not be accurately quantized by searching each domain
design approach may not be effective when the number of separately. Also, it is not always effective to quantize only
antennas is large. To accurately quantize high-dimensional a single radio path because even u1 โ v1โ may consist of
massive MIMO channels, it is important to tailor the codebook multiple paths. Although the quantizer in [9] considers adding
to the realistic channels consisting of a limited number of radio two beams in u1 โ v1โ , the performance improvement is limited
paths.
because the beams are not combined properly.
fฬ โF
III. K RONECKER P RODUCT C ODEBOOK R EVIEW - S INGLE
B EAM C ASE
IV. P ROPOSED NARROWBAND Q UANTIZER - M ULTIPLE
B EAMS C ASE
It is critical in FDD massive MIMO systems to quantize
and feedback information about the high-dimensional channels
to the transmitter [13]โ[19]. Thus, CSI quantization codebooks
have been developed to tailor the feedback link with limited
overhead to the massive MIMO channels [15]โ[17]. Among
various CSI quantization techniques, KP codebooks are of
great interest to quantize the channels in a computationally
efficient manner by considering the 2D antenna structure [9],
[10]. Based on the channel model in (6), KP codebooks are
designed to quantize a radio path with UPA structure [6]โ[8].
Most KP codebooks are based on the assumption that the
covariance matrix of the channels is approximated by the KP
of covariance matrices of vertical and horizontal domains such
that [35]
.
Rh = Eh hhH
Prior work has verified that most 3D SCM channel realizations are well modeled with only a few resolvable 2D radio
paths [1], [9]. Thus, we assume that the channel vector on a
single frequency tone can be represented by a combination of
a set of multiple radio paths and its corresponding channel
gain vector [1]. In (6), the array response vectors in D and
the channel gain vector a contain different types of channel
information. Thus, we focus on quantizing D and a using
different codebooks in this paper.
In our narrowband quantizer, we aim to find
' Rv โ Rh .
Thus, a KP codebook is of the form
F = f โ CM : f = cv โ (ch )โ , cv โ AvBT /2 , ch โ AhBT /2 ,
to quantizes a single dominant path with the discrete Fourier
transform (DFT) codebook
AaB = aMa (1/Q), ยท ยท ยท , aMa (Q/Q)
(7)
consisting of the Q = 2B codewords
iT
2q
2q
1 h
.
1, ejฯ( Q โ1) , ยท ยท ยท , ejฯ(Ma โ1)( Q โ1) .
aMa (q/Q) = โ
Ma
Most previous KP codebooks quantize the first dominant
vector in each domain separately [6]โ[9]. To find singular
h
Cz
'
(9)
khk2
kCzk2
.
by constructing a set of N beams C = [c1 , ยท ยท ยท , cN ] โ CM รN
.
and a unit-norm weight vector z = [z1 , ยท ยท ยท , zN ]T โ CN . The
radio paths constituting the channels are represented by the
Kronecker product of array response vectors as in (3). Thus,
each 2D beam in C can be defined by a combination of
quantized array response vectors in vertical and horizontal
domains such that
.
cn = cvn โ chn , n = 1, ยท ยท ยท , N.
We assume that Bn -bit is reserved to quantize the n-th array
response vector can in the domain a and Bc -bit is reserved to
quantize the weight vector z.
To construct C and z under the condition
of a limited
PN
feedback overhead of BT = Bc + n=1 2Bn -bits, the
following questions should be properly addressed.
1) Beam quantization: How should the radio paths in the
channel be chosen and quantized?
4
Algorithm 1 Beam quantization
Initialization
1: Create an initial empty matrix C0
Beam quantization
2: for 1 โค n โค N
3: Given DFT codebooks (cฬv , cฬh ) โ AvBn ร AhBn
4: Construct beam set Cn|cฬv ,cฬh = [Cnโ1 , cฬv โ cฬh ]
be defined to effectively quantize and combine the limited
5: Quantize radio path cn = cvn โ chn , where
number of radio paths?
(cvn , chn ) = arg maxcฬv ,cฬh โAvB รAhB
In the following subsections, we address our channel quantin
n
โ1 H
eig1 (CH
Cn|cฬv ,cฬh hhH Cn|cฬv ,cฬh
zation procedure across two separate quantization phases and
n|cฬv ,cฬh Cn|cฬv ,cฬh )
6: Update beam set Cn = [Cnโ1 , cvn โ chn ] โ CM รn
evaluate quantization loss at each phase.
7: end for
Remark 1: The quantized channel vector can be viewed as
Final update
a representation of the channel using an analog beamsteering
8: Quantized radio paths C = [c1 , ยท ยท ยท , cN ] โ CM รN
matrix C, which is realized by a set of radio frequency phase
9: Unquantized
vector
shifters, and a baseband beamformer z. Therefore, the proposed
Hweight
โ1 H
zฬ
=
v
(C
C)
C
hhH C โ CN
1
approach follows the hybrid beamforming architecture in [36].
2) Beam combining: How should the quantized beams be
cophased and scaled?
3) Feedback resource allocation: For a given total feedback
overhead BT , how should the feedback-bit allocation scenario
.
rN = [B1 , ยท ยท ยท , BN , Bc ]T โ NN +1
(10)
A. Phase I: Beam Quantization
In the beam quantization phase, we aim to construct a
selected set of quantized 2D beams C. It is well known that
the DFT codebook is an effective solution to quantize array
response vectors so that we quantize the n-th array response
vector can with the DFT codebook AaBn .
In our beam quantization approach, we select and quantize
the 2D DFT beams sequentially. In the n-th update, the
quantized DFT vectors and the unquantized weight vector3 are
obtained by solving the maximization problem
(cvn , chn , zฬn ) =
arg max
h
n
(cฬv ,cฬh ,zฬ)โAv
Bn รABn รC
hH Cn|cฬv ,cฬh zฬ
Cn|cฬv ,cฬh zฬ
2
2
2
,
(11)
.
where Cn|cฬv ,cฬh = [c1 , ยท ยท ยท , cnโ1 , cฬv โ cฬh ] โ CM รn , and
{c1 , ยท ยท ยท , cnโ1 } includes previously selected DFT beams.
In (11), we do not quantize the weight vector zฬn โ Cn in
each update because it is not practical to construct a codebook
for weight vectors that constantly change its dimension. The
problem of choosing the n-th DFT beam is then simplified to
2!
hH Cn|cฬv ,cฬh zฬ
v
h
(cn , cn ) =
arg max
max
2
zฬโCn
h
Cn|cฬv ,cฬh zฬ 2
cฬv ,cฬh โAv
Bn รABn
(a)
โ1
=
arg max
eig1 (CH
n|cฬv ,cฬh Cn|cฬv ,cฬh )
h
cฬv ,cฬh โAv
Bn รABn
H
CH
n|cฬv ,cฬh hh Cn|cฬv ,cฬh , (12)
where (a) is derived from the unquantized weight vector, which
is computed based on the generalized Rayleigh quotient [37],
such that
zฬn|cฬv ,cฬh = arg max
=
H
zฬH (CH
n|cฬv ,cฬh hh Cn|cฬv ,cฬh )zฬ
zฬH (CH
C v h )zฬ
zฬโCn
n|cฬv ,cฬh n|cฬ ,cฬ
H
โ1 H
v1 (Cn|cฬv ,cฬh Cn|cฬv ,cฬh ) Cn|cฬv ,cฬh hhH Cn|cฬv ,cฬh
.
3 The bar on the top of weight vectors denotes the unquantized weight
vectors.
The beam quantization approach gives a set of N quantized
beams
C = [c1 , ยท ยท ยท , cN ] โ CM รN
(13)
and the unquantized weight vector
zฬ = v1 (CH C)โ1 CH hhH C โ CN .
(14)
A separate beam quantization should be performed to compute
each codeword candidate based on Algorithm 1. In the
following Section IV-E, a practical beam search technique
will be proposed to quantize a single dominant beam with
moderate computational complexity as well as compute multiple codeword candidates in a hierarchical fashion.
We also evaluate quantization loss due to the beam quantization as a function of the number of beams N and the feedback
overhead Bn for DFT codebooks. Assuming the unquantized
weight vector zฬ, the beamforming gain between the channel
vector h and the set of DFT beams C
.
Gbq = Eh |hH Czฬ|2 /kCzฬk22
|hH Czฬ|2
(15)
= Eh max
2
zฬโCN kCzฬk2
is averaged over channel realizations h in Lemma 1. Before
presenting the lemma, we make the following assumption.
Assumption 1: Assuming a channel vector h has already
been decomposed into a set of radio paths D and channel gains
a as in (6), the column vectors for each domain a โ {h, v}
.
in C are separately selected as can = aMa (qn /2Bn ) โ AaBn ,
where
qn =
arg max
qโ{1,ยทยทยท ,2Bn }
2
a
Bn
dH
) .
Ma (ฯn )aMa (q/2
(16)
Considering half-wavelength antenna spacing da = ฮป2 , the
beamforming gain between the n-th array response vector and
.
a a 2
the selected DFT vector ฮ2na = E |dH
is derived
Ma (ฯn )cn |
in Appendix A as
M
a โ1
X
2(Ma โ q) sin ฯq/2Bn
1
2
ฮna = 2 Ma +
.
Ma
ฯq/2Bn
q=1
5
Eh [(cv1 โ ch1 )H hhH (cv1 โ ch1 )]
๏ฃฏ
..
R=๏ฃฐ
.
Eh [(cvN โ chN )H hhH (cv1 โ ch1 )]
๏ฃฎ
ยทยทยท
..
.
ยทยทยท
Lemma 1: A lower bound of the beamforming gain Gbq in
(15) is approximated as
N X
P
X
P
M ฮ2nv ฮ2nh โ 1
Gbq '
N+
.
M +N โ1
qP
n=1 q=n
Please check Appendix B for the proof.
B. Phase II: Beam Combining
In the beam combining phase, we aim to compute a weight
vector z, which is used to combine beams in C. To quantize
weight vector
H
z = arg max
zฬโZBc
2
|h Czฬ|
,
kCzฬk22
(17)
we design the codebook including U = 2Bc unit-norm
.
combiners ZBc = {z1 , ยท ยท ยท , zU }. To study a codebook design
framework, we model the effective channel vector based on
the Kronecker correlation model as
1
CH h ' R 2 w โ CN ,
(18)
.
where the covariance matrix R = Eh CH hhH C โ CN รN
in (19) is analytically computed in Appendix C and random
variables w = [w1 , ยท ยท ยท , wN ]T โ W denotes the weight vector
that is subject to the equal gain subset
โ
.
W = w โ CN : wn = ejฯn / N , ฯn โผ U(0, 2ฯ) .
In our codebook design approach, we pick a set of codewords
{z1 ยท ยท ยท zU } that maximize
where the inequality in (a) is based on kCzu k22 โค kCk22 kzu k22
and kzu k22 = 1, and (b) is approximated by plugging the
Kronecker correlation model in (18) into the maximizer.
Based on the correlated Grassmannian beamforming algorithm in [24], codewords are then obtained by setting
Note that I โ N denotes the phase quantization level.
We also evaluate the quantization loss due to the beam
combining as a function of the number of codewords U = 2Bc
in the codebook ZBc that quantizes the baseband combiner
zฬ in (14). To analyze quantization performance of ZBc , the
normalized beamforming gain between the normalized effective
channel and the selected unit-norm combiner z
.
Gbc = EhH C |hH Cz|2 /khH Ck22
2
|eH
u Rw|
' Ew
max
(20)
uโ{1,ยทยทยท ,U } (wH Rw)(eH
u Reu )
is averaged over the effective channel CH h. Because it is
not easy to compute in a closed form, we only derive the
normalized beamforming gain in the special case of N = 2
based on the following assumption.
Assumption 2: For simple analysis, we assume that the
.
combiner is selected as z = zuฬ , where
.
uฬ = arg max cos2 ฮธu .
uโ{1,ยทยทยท ,U }
.
Note that ฮธu = arccos |wH eu |.
Lemma 2: In the special case of N = 2, the normalized
beamforming gain Gbc in (20) is approximated as
1
U
ฯ
Gbc '
1 + sin
.
2
ฯ
U
Please check Appendix D for the proof.
C. MIMO Channel Quantizer
In our MIMO channel quantization approach, DFT beams
are chosen to maximize the sum of the channel gains of each
receive antenna. The DFT vectors are quantized by solving the
rewritten problem
โ1
(cvn , chn ) =
arg max
eig1 (CH
n|cฬv ,cฬh Cn|cฬv ,cฬh )
h
cฬv ,cฬh โAv
Bn รABn
H
CH
n|cฬv ,cฬh HMIMO HMIMO Cn|cฬv ,cฬh .
1
zu = R 2 eu /kR 2 eu k2
and picking a set of equal gain vectors {e1 ยท ยท ยท eU } maximizing
q
2
%min = min
1 โ |eH
a eb | ,
1โคa<bโคU
where equal gain vectors eu โ EN are restricted to
โ
.
EN = e โ CN : (e)n = ej2ฯฯn / N , ฯn โ 1/I ยท ยท ยท I/I
(19)
Before investigating feedback allocation solutions, we extend
the proposed quantizer to MIMO channel scenarios. Assuming
a MIMO system employing V receive antennas at each user,
the channel matrix is defined as
HMIMO = h1 , ยท ยท ยท , hV โ CM รV .
|hH Czu |2
1โคuโคU kCzu k2
2
(a)
|hH Czu |2
โฅ min
1โคuโคU
kCk22
1 H
2
(b)
w H R 2 zu
' min
,
1โคuโคU
kCk22
ฯmin = min
1
๏ฃน
Eh [(cv1 โ ch1 )H hhH (cvN โ chN )]
๏ฃบ
..
๏ฃป.
.
v
h H
H v
h
Eh [(cN โ cN ) hh (cN โ cN )
.
After constructing a selected set of DFT beams, we next
compute T orthogonal weight vectors to compute a precoding
matrix for spatial multiplexing. For a given set of beams C,
we compute the beamformer for the t-th layer transmission
ft = Czฬt /kCzฬt k2 โ CM , where the unquantized weight vector
N
zฬt = vt (CH C)โ1 CH HMIMO HH
MIMO C โ C
6
3.5
3
2.5
Beamforming gain G(M,P,N,rN)
N
Beamforming gain G(M,P,N,r )
3
2
1.5
r ={8,0}
1
1
r2={4,3,2}
r ={4,3,2}
0.5
2
r2={3,3,4}
2.5
2
1.5
r2={5,4,2}
1
r2={4,4,4}
6x6
8x8
r2={6,3,2}
r3={5,2,2,2}
0.5
r3={3,2,2,2}
0
4x4
r1={10,0}
r3={4,3,2,2}
r3={3,3,3,2}
10x10 12x12 14x14 16x16 18x18 20x20
0
4x4
6x6
8x8
10x10 12x12 14x14 16x16 18x18 20x20
Mv ร Mh
(a) BT = 16-bits
Mv ร Mh
(b) BT = 20-bits
Fig. 1. Cross correlation G(M, P, N, rN ) over different feedback-bit allocation scenarios with P โ {3, 4, 5}.
is computed based on the generalized Rayleigh quotient [37]. where M is the number of antennas, P is the number of beams
The precoding matrix is then constructed as
in h, N is the number of dominant beams to be quantized,
and rN is the feedback-bit allocation scenario in (10).
M รT
F = f1 , ยท ยท ยท , fT โ C
,
In the proposed quantizer, the feedback scenario are chosen
where T โค V denotes the maximum transmission rank.4
as
N, rN =
arg max
EP G(M, P, Nฬ , rฬNฬ )
(23)
D. Feedback Resource Allocation
In our KP codebook procedure, quantizing more beams
with a high resolution codebook increases the beamforming
gain at the cost of increased feedback overhead. To effectively
allocate limited feedback overhead resources, we must derive
the beamforming gain between the randomly generated channel
vectors h and the selected codeword Cz/kCzk2 using
H
|h Cz|2
.
G = Eh
,
(21)
kCzk22
as a function of the feedback-bit allocation scenario5 rN in (10).
However, inter-dependencies across both quantization phases
in Section IV-A and Section IV-B make it hard to compute the
beamforming gain in a closed form. To simplify analysis, we
make the following assumption.
Assumption 3: Assuming the quantization phases in Section
IV-A and Section IV-B work independently, the channel
quantization quality in the proposed KP codebook procedure
is evaluated by the combination of the quantization losses in
both phases.
Based on Assumption 3 that both quantization phases are
independent of each other, the beamforming gain in the
proposed quantizer is defined by the mixture of Gbq and Gbc
such as,
.
G(M, P, N, rN ) = Gbq Gbc
(22)
2
2
P
P
M
ฮ
ฮ
โ1
N
P
nv nh
Gbc P N + n=1 q=n
q
=
,
M +N โ1
4 Note that designing a beam combining codebook and a feedback resource
allocation algorithm that support multi layer MIMO transmission are interesting
topics for future research.
5 In r , B for n โ {1, ยท ยท ยท , N } denotes the size in bits of the DFT
n
N
codebooks Aa
Bn in the domain a, and Bc denotes the size in bits of the
codebook for combiners ZBc .
(Nฬ ,rฬNฬ )โN รNNฬ +1
by evaluating all possible scenarios rฬNฬ = [Bฬ1 , ยท ยท ยท , BฬNฬ , Bฬc ]T
.
that considers Nฬ beams in N = {1, 2, 3}. Note that the
possible feedback scenarios are subject to the total feedback
PNฬ
overhead BT = Bฬc + n=1 2Bฬn -bits. In (23), the expectation
is taken over the number of dominant paths P since P varies
depending on the channel environments. By assuming P is
equally probable from 3 to 5, we plot the arithmetic mean of
G(M, P, Nฬ , rNฬ ) in Fig. 1 with different numbers of antennas
and feedback bits.
As shown in the figure, quantizing one or two beams
give the best performance under practical UPA scenarios and
feedback overheads. Therefore, we construct the codebook
F1 for quantizing a single 2D DFT beam and the codebook
F2 combining two quantized 2D DFT beams based on the
predefined feedback-bit allocation scenarios6
r1 = [B1 + Bฬ1 , 0] โ N2 ,
r2 = [B1 , B2 , Bc ] โ N3 ,
(24)
respectively. The final codebook is then defined such that
.
F = F1 โช F 2 .
Remark 2: In most of channel realizations, the inter-user
interference due to the remained paths is negligible because
most of channel gains are contained in the first and second
dominant beams [1], [9]. Based on the codebook subset
restriction algorithm in [?], [?], severe inter-user interference
could be mitigated by reporting the remained paths having a
considerable amount of channel gains.
6 The total feedback overhead for feedback scenarios are B = 2B + 2Bฬ 1
1
T
bits and BT = 2B1 + 2B2 + Bc -bits, where 2Bฬ1 = 2B2 + Bc .
7
Normalized cross correlation
0.8
(a) Wideband resource blocks
(b) Narrowband resource blocks
0.7
0.6
0.5
ฮณc
1
0.4
4x4
Fig. 2. An overview of wideband model having multiple tones.
ฮณh
6x6
8x8
10 x 10 12 x 12 14 x 14 16 x 16
M v x Mh
E. Beam Search Approach
It is necessary to search both vertical and horizontal
domains jointly to scan for the dominant beams in a channel
vector. However, this joint approach increases a computational
complexity. For example, it is required to carry out 22(B1 +Bฬ1 )
vector computations to scan a single 2D DFT beam under
the feedback-bit allocation scenario r1 in (24). To reduce the
heavy computational complexity that comes with detecting the
single dominant beam, we propose a multi-round beam search
technique as follows.
Round 1: For the channel vector h, the first dominant beam
is chosen using DFT codebooks AvB1 and AhB1 in (7), which
have low-resolution DFT vectors. The DFT beam is given by
c1 = cv1 โ ch1 ,
(cv1 , ch1 )
=
(25)
H
h
2
|h (cฬ โ cฬ )| .
arg max
h
(cฬv ,cฬh )โAv
B รAB
1
v
1
Later, the selected 2D DFT beam in (25) will be a baseline
that guides the generation of two codeword candidates.
Round 2: In this round, 2Bฬ1 -bits are assigned for constructing the two codeword candidates.
1) To support channel realizations having a single dominant
beam, a codeword is computed based on the feedback-bit
allocation scenario r1 in (24) by scanning beam directions near
c1 from Round 1. The first codeword is given by
f1 =
dฬM (ฮธ1v , ฮธ1h )
2) To support channel realizations having multiple dominant
beams, a codeword is computed based on the feedback-bit
allocation scenario r2 in (24) by choosing an additional DFT
beam to combine with c1 . The second codeword is given by
f2 =
(cv2 , ch2 , z) =
[c1 , cv2 โ ch2 ]z
,
k[c1 , cv2 โ ch2 ]zk2
arg max
h
(cฬv ,cฬh ,zฬ)โAv
B รAB รZBc
2
hH [c1 , cฬv โ cฬh ]zฬ
k[c1 , cฬv โ cฬh ]zฬk2
2
2
using B2 -bits size DFT codebooks AvB2 and AhB2 and Bc -bits
size codebook ZBc , which is developed to combine the two
2D DFT beams as explained in the Section IV-B.
Considering our CSI quantization technique, the second
codebook is then defined such that
v
cฬ1 โ cฬh1 , cฬv2 โ cฬh2 zฬ
.
M
F2 = f2 โ C : f2 = v
cฬ1 โ cฬh1 , cฬv2 โ cฬh2 zฬ 2
over cฬv1 โ AvB1 , cฬh1 โ AhB1 , cฬv2 โ AvB2 , cฬh2 โ AhB2 , and
zฬ โ ZBc .
Round 3: Using the two codeword candidates f1 โ F1 and
f2 โ F2 , the final codeword is selected with an additional bit
2
f = arg max hH fฬ .
c1 ,
(ฮธ1v , ฮธ1h ) = arg max hH dฬM (ฮธฬv , ฮธฬh )
Fig. 3. Normalized beamforming gains between subcarrier channel vectors.
(B = 5, dv = 0.8ฮป, dh = 0.5ฮป, w โ {1, ยท ยท ยท , 150})
(27)
fฬ โ{f1 ,f2 }
c1
2
Bฬ
ฮธฬ v ,ฮธฬ h โTB 1
1
. โ
where dฬM (ฮธv , ฮธh ) = M dM (ฮธv , ฮธh ) is defined to shift the
beam directions7 and the Bฬ1 -bit size codebook
โBฬ1
1 โ 2โBฬ1
Bฬ1
โ(B1 +Bฬ1 ) 1 โ 2
T B1 = โ
:2
:
(26)
2B1 +1
2B1 +1
is designed for refining beam directions of any DFT beams.
In our CSI quantization approach, the first codebook is then
defined such that
.
F1 = f1 โ CM : f1 = (cฬv1 โ cฬh1 ) dฬM (ฮธฬv , ฮธฬh )
V. P ROPOSED W IDEBAND Q UANTIZER
We develop a wideband quantizer that takes multiple
frequency tones into account. Before developing practical
quantizers, we overview a broadband system model adopted in
3GPP LTE-Advanced. As shown in Fig. 2(a), W total frequency
tones are divided into L wideband RBs where each wideband
RB includes W
L channels. Each wideband RB is written in a
matrix form as
W
H` = h[1 + (` โ 1)W /L], ยท ยท ยท , h[`W/L] โ CM ร L .
over cฬv1 โ AvB1 , cฬh1 โ AhB1 , and ฮธฬv , ฮธฬh โ TBBฬ11 .
As depicted in Fig. 2(b), each wideband RB is divided into R
narrowband RBs
H` = H`,1 , ยท ยท ยท , H`,R ,
7
โ The Hadamard product formulation satisfies the following formulation
M dM (ฮธ1 , ฮธ3 ) dM (ฮธ2 , ฮธ4 ) = dM (ฮธ1 + ฮธ2 , ฮธ3 + ฮธ4 ).
where H`,r โ CM ร LR denotes the narrowband RB that is
written in a matrix form.
W
8
3.5
3.6
Numerical (N=2, P=5)
Numerical (N=2, P=4)
Numerical (N=2, P=3)
Analytical (N=2, P=5)
Analytical (N=2, P=4)
Analytical (N=2, P=3)
3.2
Beamforming gain
Beamforming gain
3
Numerical (N=2, P=5)
Numerical (N=2, P=4)
Numerical (N=2, P=3)
Analytical (N=2, P=5)
Analytical (N=2, P=4)
Analytical (N=2, P=3)
3.4
2.5
2
3
2.8
2.6
2.4
2.2
1.5
2
1.8
1
8x8
10 x 10
12 x 12
14 x 14
16 x 16
18 x 18
20 x 20
1.6
8x8
10 x 10
12 x 12
Mv ร Mh
14 x 14
16 x 16
18 x 18
20 x 20
Mv ร Mh
(a) B1 = 4, B2 = 4, Bc = 2 (BT = 18)
(b) B1 = 5, B2 = 4, Bc = 2 (BT = 20)
Fig. 4. Beamforming gain comparison between the numerical results G in (21) and the analytical results G(M, P, N, rN ) in (22).
Next, the correlation between the channel vectors is studied
numerically based on the cross correlations over w1 6= w2
2
h[w1 ]H h[w2 ]
.
ฮณh = Eh[w]
,
kh[w1 ]k22 kh[w2 ]k22
2
.
ฮณc1 = Eh[w] c1 [w1 ]H c1 [w2 ] ,
codeword quantizes channel vectors H`,r in the r = dR( wL
W โ
e-th
wideband
RB
` โ 1)e-th narrowband RB of the ` = d wL
W
by refining the beam direction of c1|` according to
f1|`,r = dฬM (ฮธ1v , ฮธ1h )
(ฮธ1v , ฮธ1h )
= arg max
B
ฮธฬ v ,ฮธฬ h โTB N1
W1
c1|` ,
v h
HH
`,r dฬM (ฮธฬ , ฮธฬ )
c1|`
2
2
where h[w] denotes 3D-SCM channel vectors and c1 [w]
with BN1 -bit codebooks in (26).
denotes the dominant 2D DFT beam that is chosen from the
Round 2: The second codeword is computed to support the
v
h
DFT codebooks AB and AB in (7) for subcarrier w. As shown
channel scenario having two dominant beams. The proposed
in Fig. 3, it is verified that the dominant 2D DFT beams in
quantizer only refines the direction of c1|` as well as combines
the different subcarriersโ channel vectors are highly correlated.
with the second 2D DFT beam c2|` . The second codeword is
Based on empirical studies, the wideband quantizer is designed
in such a way that the correlated information, i.e., the dominant
dฬM (ฮธ2v , ฮธ2h ) c1|` , c2|` z
f2|`,r =
,
2D DFT beam, is shared between neighboring subcarriers.
dฬM (ฮธ2v , ฮธ2h ) c1|` , c2|` z 2
Level 1 (Wideband resource block): We choose two 2D
2
v h
HH
c1|` , c2|` zฬ
DFT beams that are close to the channel vectors in each
`,r dฬM (ฮธฬ , ฮธฬ )
v h
(ฮธ2 , ฮธ2 , z2 ) = arg max
wideband RB. For supporting the `-th wideband RB, the first
dฬM (ฮธฬv , ฮธฬh ) c1|` , c2|` zฬ 2 2
ฮธฬ v ,ฮธฬ h ,zฬ
2D DFT beam is chosen as
over ฮธฬv , ฮธฬh โ TBBN2 in (26) and zฬ โ ZBc . Out of 2BN1 -bits
c1|` = cv1 โ ch1 ,
(28) allocated for eachW1narrowband RB, 2B bits are assigned for
N2
v
h 2
refining
the
first
2D
DFT
beam
and
B
c bits are assigned for
(cv1 , ch1 ) =
arg max
HH
(cฬ
โ
cฬ
)
`
2
h
(cฬv ,cฬh )โAv
combining the two 2D DFT beams.
BW1 รABW1
Round 3: Among the two codeword candidates, the final
with BW1 -bit DFT codebooks. Next, the second 2D DFT beam
codeword is selected with an additional bit according to
is chosen using BW2 -bit DFT codebooks as
2
f`,r = arg max
HH
(30)
`,r fฬ 2 .
c2|` = cv2 โ ch2 ,
(29)
fฬ โ{f1|`,r ,f2|`,r }
(cv2 , ch2 ) = arg max max
cฬv ,cฬh
zฬโZBc
v
h
HH
` [c1|` , cฬ โ cฬ ]zฬ
k[c1|` , cฬv โ cฬh ]zฬk2
2
VI. S IMULATION R ESULTS
2
over (cฬv , cฬh ) โ AvBW2 ร AhBW2 .
Level 2 (Narrowband resource block): Within the `-th
wideband RB, the set of 2D DFT beams c1|` and c2|` will be
a baseline that guide the quantization of channel vectors in
each narrowband RB. To construct each set of two codeword
candidates, 2BN1 -bits are allocated for each narrowband RB.
Round 1: The first codeword is computed to support the
channel scenario having a single dominant beam. The first
We verify the performance of our CSI quantizers. Before
evaluating the proposed quantizers, we pause to validate the
accuracy of the approximated beamforming gain in (22). The
beamforming gain between the simplified channel h and the
quantized channel Cz/kCzk2 is computed as in (21). For
numerical simulations, 10, 000 channels in (6) are generated
by assuming a fixed number of the ray-like beams P โ {3, 4, 5}.
In Fig. 4, it is shown that the approximated formula in (22)
gives a tight lower bound on the numerical results in (21).
9
0.8
0.9
Prop. N-i (BN=21)
Prop. N-ii (B N=19)
0.8
Prop. N-iii (B N=17)
0.75
Enh. KP-i (BN=22)
Enh. KP-ii (B N=20)
0.7
KP (BN=22)
0.65
0.6
0.55
0.5
Prop. N-ii (B N=19)
0.7
Prop. N-iii (B N=17)
0.65
Enh. KP-i (BN=22)
0.6
Enh. KP-ii (B N=20)
KP (BN=22)
0.55
0.5
0.45
0.4
0.35
0.45
4x4
Prop. N-i (BN=21)
0.75
Normalized beamforming gain GN
Normalized beamforming gain GN
0.85
0.3
6x6
8x8
10 x 10 12 x 12
M v x Mh
14 x 14
16 x 16
4x4
6x6
(a) dv = 0.8ฮป, dh = 0.5ฮป
8x8
10 x 10 12 x 12
M v x Mh
14 x 14
16 x 16
(b) dv = 1.6ฮป, dh = 1.0ฮป
Fig. 5. Normalized beamforming gain of narrowband quantizers.
TABLE I
3D-SCM SIMULATION PARAMETERS .
Tx antennas
Rx antennas
Scenario
Carrier frequency fc
Subcarrier spacing 4
Vertical antenna spacing dv
Horizontal antenna spacing dh
4 ร 4 to 20 ร 20 Co-polarized UPA
1 Co-polarized UPA
UMi NLOS
2 GHz
15 KHz
0.8ฮปc , 1.6ฮปc
0.5ฮปc , 1.0ฮปc
We now evaluate the narrowband quantizers using simulations. Numerical results are obtained through Monte Carlo
simulations with 10, 000 channel realizations. For generating
3D-SCM channels, we use the parameters in Table I. We
evaluate the normalized beamforming gain of narrowband
quantizer
H 2
|f h|
.
GN = Eh
,
khk22
where f is the final codeword8 that is chosen in (27). We
compare the beamforming gains of the proposed quantizer
with that of the KP codebooks in [6], [7] and the enhanced
KP codebook in [9]. Note that the feedback-bit allocation9
of each quantizer is listed in Table II and the computational
complexity10 VN and feedback overhead11 BN are summarized
in Table III.
In Figs. 5(a) and 5(b), the normalized beamforming gains of
the three quantizers are plotted with different antenna spacing
8 The perfect CSI beamformer gives the normalized beamforming gain of
one.
9 The feedback-bit allocation scenarios for the proposed narrowband quantizers are predefined in (24).
10 We count the number of vector computations to evaluate the complexity.
11 The feedback overhead (per each frequency tone CSI) is assessed by the
combination of the overheads for both the first and second rounds in Section
IV-E.
TABLE II
F EEDBACK CONFIGURATIONS OF NARROWBAND QUANTIZER
Prop. N-i
Prop. N-ii
Prop. N-iii
Enh. KP-i
Enh. KP-ii
KP codebook
1st round
B1 = 5
B1 = 5
B1 = 4
B1 + B2
B1 + B2
B1 = 11
2nd
Bฬ1
Bฬ1
Bฬ1
B1
B1
round
= 5, B2
= 4, B2
= 4, B2
= 5, B2
= 5, B2
= 4, Bc = 2
= 3, Bc = 2
= 3, Bc = 2
=5
=4
BN
21
19
17
22
20
22
VN
3,072
1,536
768
2,176
1,120
4,096
TABLE III
F EEDBACK OVERHEADS AND COMPLEXITY COMPARISONS
Prop. quantizer
Enhanced KP
KP codebook
Feedback overhead BN
2(B1 + B2 ) + Bc + 1
2(B1 + B2 + 1)
2B1
Vector computations VN
22B1 + 22B2 +Bc +1
2 2B1 +B2 + 2B1 + 2B2
2B1 +1
scenarios. The proposed quantizer searches both vertical and
horizontal domains jointly, while other KP codebooks search
beams lying in each domain independently and integrate the
results later. The 2D DFT beams, which are quantized in the
proposed quantizer, are aligned by cophasing and scaling each
beam. On the contrary, the quantized beams in the enhanced KP
codebook [9] are simply added up together without considering
phase alignment. For these reasons, the proposed quantizer
generates higher beamforming gains than those of other KP
codebooks.
We next evaluate the normalized beamforming gain of the
wideband quantizer according to
H
2
.
GW = Eh[w] f`,r
h[w]/kh[w]k2 ,
where f`,r is the chosen codeword in (30). In Figs. 6(a) and
6(b), the normalized beamforming gains of wideband quantizer
are compared with those of the narrowband quantizers. In the
legend, the first alphabet denotes the type of quantizer, the
10
0.7
0.6
W-I-1 (BW =136)
W-II-2 (BW =65)
0.6
N-ii-1 (BN =152)
N-ii-2 (BN =19)
0.55
W-I-2 (BW =83)
0.55
W-II-1 (BW =120)
0.5
0.45
Normalized beamforming gain G W
0.65
Normalized beamforming gain G W
W-I-1 (BW =136)
W-I-2 (BW =83)
W-II-1 (BW =120)
W-II-2 (BW =65)
0.5
N-ii-1 (BN =152)
N-ii-2 (BN =19)
0.45
0.4
0.35
0.3
0.4
8x8
10 x 10
12 x 12
14 x 14
M v x Mh
16 x 16
18 x 18
20 x 20
0.25
8x8
10 x 10
(a) dv = 0.8ฮป, dh = 0.5ฮป
12 x 12
14 x 14
M v x Mh
16 x 16
18 x 18
20 x 20
(b) dv = 1.6ฮป, dh = 1.0ฮป
Fig. 6. Normalized beamforming gain comparison between the narrowband and wideband quantizers.
TABLE IV
F EEDBACK OVERHEADS FOR EACH WIDEBAND AND NARROWBAND RB
W-I
W-II
Level 1: Wideband RB
BW1 = 5, BW2 = 5
BW1 = 5, BW2 = 5
Level 2: Narrowband RB
BN1 = 3, BN2 = 2, Bc = 2
BN1 = 2, BN2 = 1, Bc = 2
TABLE V
W IDEBAND CONFIGURATIONS FOR NARROWBAND AND WIDEBAND
QUANTIZERS
N-1
N-2
Narrowband quantizer
1 codeword / 75 tones
1 codeword / 600 tones
W-1
W-2
Wideband quantizer
L = 4, R = 2
L = 1, R = 9
second alphabet denotes the feedback-bit allocation scenario
in Table IV, and the final digit represents the wideband
configuration12 in Table V. The total feedback overhead of the
proposed wideband quantizer is defined as
BW = 2(BW1 + BW2 )L + (2BN1 + 1)RL.
Numerical results verify that wideband quantizers outperforms
narrowband quantizers because it exploits correlation between
frequency tone CSIs. The wideband quantizers also reduce
feedback overhead because they can maintain quantization
performance with less overhead compared to narrowband
quantizers.
VII. C ONCLUSION
In this paper, advanced CSI quantizers based on the KP
codebook structure are proposed for FD-MIMO systems using
UPAs. In the proposed quantizer designs, we focused on
detecting and quantizing a limited number of dominant 2D
beams in 3D channel vectors by exploiting DFT codebooks.
12 In
the LTE setup of scheme W-3, the first 8 narrowband RBs have 72
tone CSIs and the ninth narrowband RB has 24 tone CSIs.
The codebook for combiners was designed to cophase and scale
the quantized 2D DFT beams. Furthermore, we analytically
derived a design guideline for practical quantizers, which is
based on FD-MIMO systems with predefined feedback-bit
allocation scenarios.
We then developed CSI quantizers by taking the predefined
feedback scenarios into account. First, a narrowband quantizer
was proposed to quantize and/or combine one or two dominant
2D DFT beams. To detect and quantize beams properly, we
also developed a multi-round beam search approach that
scans both vertical and horizontal domains jointly under the
moderate computational complexity. To reduce total feedback
overhead, we also proposed a wideband quantizer that utilizes
the correlated information between multiple frequency tones.
Numerical simulations verified that the proposed narrowband
quantizer gives better quantization performance than previous
CSI quantization techniques, and the proposed wideband
quantizer further improves the quantization performance with
less feedback overhead compared to the narrowband quantizer
in wideband settings.
A PPENDIX A
C ORRELATION BETWEEN ARRAY RESPONSE VECTOR AND
DFT CODEWORD
We discuss the correlation between the array response vector
in the domain a and the selected DFT codeword to quantify
the quantization performance of DFT codebooks by evaluating
.
a a 2
ฮ2na = E dH
Ma (ฯn )cn
h
i
2
a
=E
max
dH
Ma (ฯn )aMa (q/Qn )
qโ{1,ยทยทยท ,Qn }
=
1
E
max
Ma2
qโ{1,ยทยทยท ,Qn }
M
a โ1
X
m=0
a
eโjฯm(ฯn โ2q/Qn +1)
2
11
(a)
=
MX
2
a โ1
a
1
โjฯm(ฯn
โ2qn /Qn +1)
e
,
E
Ma2
m=0
where (a) is rewritten with the index of selected codeword
qn = arg min
q={1,ยทยทยท ,Qn }
ฯna
โ 2q/Qn + 1 .
To complete the lower bound in (31), we first compute the
expectation of two-norm squared of the effective channel vector
h
i
2
E khH Ck22 = E hH [cv1 โ ch1 , ยท ยท ยท , cvN โ chN ] 2
N
h
i
X
2
=
E hH (cvn โ chn )
n=1
N X
P
X
M ฮ2nv ฮ2nh โ 1
(a) 1
The expectation over ฯna โผ U(โ1, 1) is rewritten by defining
=
PN +
, (32)
.
M
q
the new random variable as ฯ = ฯna โ 2qn /Qn + 1, which
n=1 q=n
follows U(โ1/Qn , 1/Qn ) because |ฯna โ2qn /Qn +1| โค 1/Qn .
where (a) is derived by using the correlation between
The correlation formula13 is then computed over ฯ, as
the
channel vector and the n-th selected DFT codeword
MX
MX
E |hH (cvn โ chn )|2 that will be discussed in Appendix E.
2
a โ1
a โ1 M
a โ1
X
1
1
= 2E
eโjฯmฯ
eโjฯ(mโ`)ฯ
E
We next consider the set of N DFT vectors C in (13). The
2
Ma
M
a
m=0
`=0 m=0
expectation of two-norm squared of C is approximated as
1
M
a โ1 M
a โ1 Z
X
X
Qn 2 cos ฯ(m โ `)ฯ
1
2
H
H
= 2 Ma +
dฯ
E kCk2 = E max xฬ (C C)xฬ
1
Ma
2/Qn
xฬโCN
`=0 m>` โ Qn
M
' max xฬH E CH C xฬ
(33)
a โ1 M
a โ1
X
X
2 sin ฯ(m โ `)/Qn
N
1
xฬโC
= 2 Ma +
Ma
ฯ(m โ `)/Qn
subject to kxฬk22 = 1. Note that E CH C is computed as
`=0 m>`
๏ฃฎ v H v
๏ฃน
M
a โ1
X
2(Ma โ q) sin ฯq/Qn
1
(c1 ) c1 โ (ch1 )H ch1 ยท ยท ยท (cv1 )H cvn โ (ch1 )H chn
= 2 Ma +
.
๏ฃฏ
๏ฃบ
..
..
..
Ma
ฯq/Qn
E๏ฃฐ
๏ฃป
q=1
.
.
.
(cvn )H cv1 โ (chn )H ch1 ยท ยท ยท (cvn )H cvn โ (chn )H chn
๏ฃน
๏ฃฎ
1
ยท ยท ยท Mv1Mh
A PPENDIX B
๏ฃบ
๏ฃฏ
..
..
..
L OWER BOUND OF NORMALIZED BEAMFORMING GAIN
(34)
=๏ฃฐ
๏ฃป
.
.
.
1
ยทยทยท
1
Remark 3: To simplify analysis, we consider the first order
Mv Mh
Taylor expansion of the bivariate variables, which is derived where ca = a (q /Q ) with Q = 2Bn is chosen as in
Ma n
n
n
n
as in [38],
(16). Because we assume that beam directions are uniformly
distributed ฯna โผ U(โ1, 1), can can be chosen as one of
E[A]
E[A]
โ E[B]
A
E[A] โ E[B]
Qn = 2Bn codewords in the DFT codebook AaBn with equal
'
+
(A โ E[A]) +
(B โ E[B]).
B
E[B]
โA
โB
probabilities. For this reason, we can obtain E (cac )H cad in
(34) by computing its arithmetic mean of the beamforming
Expectation of the bivariate variables is then approximated as
gain between two different codewords (c 6= d) as
A
E[A]
E[A]
Qc Qd
1 X X H
E
.
'E
=
E (cac )H cad =
a (qc /Qc )aMa (qd /Qd )
B
E[B]
E[B]
Qc Qd q =1 q =1 Ma
c
d
" Q Q
#
Qc X
Qd
The beamforming gain Gbq in Lemma 1 is lower bounded
M
c
d
a โ1 X
X
X
X
j2ฯmqd
โj2ฯmqc
1
as
=
1+
e Qd e Qc
Ma Qc Qd q =1 q =1
q
=1
m=1
q
=1
c
c
d
d
"
|hH Czฬ|2
#
M
a โ1
Gbq = E max
X
1
1 โ ej2ฯm
1 โ eโj2ฯm
2
2
zฬโCN kCzฬk2
=
Q +
j2ฯm
j2ฯm
Ma Q2
(a)
1 โ e โ Qc
1 โ e Qd
maxzฬโCN |hH Czฬ|2
m=1
โฅ E
1
kCk2
.
(35)
=
H 2 2
M
a
kh Ck2
(b)
=E
Based on E CH C , the expectation of two-norm squared
kCk22
H 2
of C in (33) is approximated as
(c) E kh Ck2
'
,
(31)
E kCk22
E kCk22 ' eig1 E CH C
eig1 {1N,N } M โ 1
=
+
where the inequality in (a) is based on kCzฬk22 โค kCk22 kzฬk22
.
M
M
and kzฬk22 = 1, (b) holds when zฬ = CH h/kCH hk2 , and (c)
(a) M + N โ 1
=
,
(36)
is derived based on Remark 3.
M
where (a) is derived because eig1 {1N,N } = N , which holds
13 Assuming Q > M /2, the correlation formula is always positive, i.e.,
a
a
ฮ2na > 0, because |ฯ| < 2/Ma .
when xฬ = โ1N [1, ยท ยท ยท , 1]T โ CN .
12
E[(cvc
โ
chc )H hhH (cvd
โ
chd )]
=
X
P
โ X
P
v v
H
h h
ฮฑpโ (dH
Mv (ฯp )cc )(dMv (ฯp )cc )
p=1
v v
H
h h
ฮฑqโ (dH
Mv (ฯq )cd )(dMv (ฯq )cd )
q=1
P
X
h H
v v
h
H
h h
=
E |ฮฑp |2 E (cvc )H dMv (ฯpv )dH
Mv (ฯp )cd E (cc ) dMv (ฯp )dMv (ฯp )cd .
(37)
p=1
Finally, the lower bound of Gbq in (31) is approximated by
plugging the derived formulas in (32) and (36) into (31) as
Gbq
N X
P
X
P
M ฮ2nv ฮ2nh โ 1
'
N+
.
M +N โ1
qP
n=1 q=n
A PPENDIX C
Case 4: p 6= c, p 6= d, c 6= d.
a a
E (cac )H dMa (ฯpa )dH
Ma (ฯp )cd
MX
M
a โ1
a โ1
X
2q
2qc
a
1
โjฯm(ฯpa โ Q d +1)
d
= 2E
ejฯ`(ฯp โ Qc +1)
e
Ma
m=0
=
1
Ma2
`=0
M
a โ1 M
a โ1
X
X
`=0
C OVARIANCE MATRIX OF EFFECTIVE CHANNEL VECTOR
is
Each entry of R in (19)
rewritten in (37). Note that
a a
E (cac )H dMa (ฯpa )dH
(ฯ
)c
p
Ma
d in (37) is computed depending
on the different cases as follows:
Case 1: p = c = d.
a a
2
E (cac )H dMa (ฯpa )dH
Ma (ฯp )cd = ฮac ,
ejฯ(`โm)
m=0
h
iZ
mq
c
j2ฯ( Q d โ `q
Qc )
d
E e
1
โ1
=
1
Ma2
M
a โ1
X
a
ejฯ(`โm)ฯp a
dฯp
2
h
i
q
qc
j2ฯm( Qd โ Q
)
c
d
E e
m=0
1
,
=
Ma2
(a)
where (a) is derived by computing the arithmetic mean.
where ฮ2ac is derived in Appendix A.
Case 2: p =
6 c, c = d.
i
h
2
a a
H
a
E (cac )H dMa (ฯpa )dH
(ฯ
)c
=
E
d
(ฯ
)a
(q
/Q
)
M
c
c
Ma
p d
Ma
p
a
(a)
=
1
,
Ma
where qc is chosen as in (16). Note that (a) is derived by
computing the arithmetic mean.
Case 3: p = c, c 6= d.
H
a a
a a
E (cac )H dMa (ฯpa )dH
Ma (ฯp )cd = ฮac E dMa (ฯc )cd
(a) ฮac
=
,
Ma
where (a) is derived because
H
a
a a
E dH
Ma (ฯc )cd = E dMa (ฯc )aMa (qd /Qd )
Ma โ1 h
i
2q
1 X
โjฯm(ฯca โ Q d +1)
d
E e
=
Ma m=0
M
a โ1 Z 1
X
eโjฯmฯ
(b) 1
=
dฯ
Ma m=0 โ1
2
=
1
.
Ma
Note that (b) is derived because ฯ, ฯca โผ U(โ1, 1) with the
.
d
definition of ฯ = ฯca โ 2q
Qd + 1 for any qd โ {1, ยท ยท ยท , Qd } in
(16).
A PPENDIX D
Q UANTIZATION PERFORMANCE OF ZBc
The normalized beamforming gain between the effective
channel vector and the selected combiner is lower bounded as
2
|eH
bc
uฬ Rw|
G =E
(wH Rw)(eH
uฬ Reuฬ )
H
|euฬ R(euฬ cos ฮธuฬ + kuฬ sin ฮธuฬ )|2
(a)
= E
(wH Rw)(eH
uฬ Reuฬ )
"
#
2
|eH
eH
jโ eH
Rk
2
uฬ Reuฬ
uฬ Rkuฬ |
uฬ
1+ H
tan ฮธuฬ e uฬ
cos ฮธuฬ
=E
wH Rw
|euฬ Reuฬ |
H
(b)
euฬ Reuฬ cos2 ฮธuฬ
'E
wH Rw
H
(c) E[e Reuฬ cos2 ฮธuฬ ]
uฬ
'
(38)
E[wH Rw]
.
In (38), (a) is based on w = euฬ cos ฮธuฬ + kuฬ sin ฮธuฬ with euฬ โฅ
H
kuฬ , (b) is approximated because |eH
uฬ Rkuฬ | |euฬ Reuฬ | and
tan ฮธuฬ 1, and (c) is approximated based on Remark 3 in
Appendix B.
Although Gbc is simplified in (38), it is still difficult to solve
in most cases. In the special case of N = 2, the equal gain
vectors can be defined as
. ejฮฝ
w = โ [1, ejฯ
]T ,
2
2ฯu
. 1
eu = โ [1, ej U ]T
2
13
using ฮฝ, ฯ
โผ U(โฯ, ฯ), and the beamforming gain in (38) is
then derived such as
H
2
E[eH
uฬ Reuฬ cos ฮธuฬ ] (a) E[euฬ Reuฬ (1 + cos ฮฝฬ)]
=
H
E[w Rw]
2E[wH Rw]
H
PU
(b)
`=1 E euฬ Reuฬ (1 + cos ฮฝฬ) | uฬ = `
=
2U E[wH Rw]
PU U R Uฯ H
ฯ e` Re` (1 + cos ฯ )dฯ
`=1 2ฯ โ U
=
2U E[wH Rw]
PU
1
H
e Re`
U
ฯ
1 + sin
= U `=1H `
2E[w Rw]
ฯ
U
U
ฯ
(c) 1
=
1 + sin
.
2
ฯ
U
.
Note that (a) is derived based on the definition ฯ
ฬ = ฯ
โ 2ฯUuฬ that
ฯ ฯ
2ฯ uฬ
ฯ
follows U(โ U , U ) because |ฯ
โ U | โค U , ฯ
โผ U(โฯ, ฯ), and
uฬ = arg min |ฯ
โ 2ฯu
U | based on Assumption 2. In addition,
uโ{1,ยทยทยท ,U }
(b) is derived by computing its arithmetic mean because uฬ is
equally probable from 1 to U , and (c) is derived because
E[wH Rw] = (R1,1 + R2,2 )/2 + |R1,2 |E[cos(ฯ
+ โ R1,2 )]
= (R1,1 + R2,2 )/2,
and the arithmetic mean of eH
` Re` is derived as
U
X
eH Re`
`
`=1
U
U
R1,1 + R2,2 X |R1,2 | cos 2ฯ`
U + โ R1,2
=
+
2
U
`=1
= (R1,1 + R2,2 )/2.
A PPENDIX E
C ORRELATION BETWEEN CHANNEL VECTOR AND DFT
CODEWORD
We derive a correlation between the channel in (6) and the
n-th selected 2D DFT beam
h
i
2
E hH (cvn โ chn )
X
P
H
2
โ
H
v v
h h
=E
ฮฑp dMv (ฯp )cn dMh (ฯp )cn
p=1
P
i
h H
(a) X
2
v v 2
=
E |ฮฑp |2 E dH
E dMh (ฯph )chn
Mv (ฯp )cn
p=1
P
X
2 2
E |ฮฑp |2
(b)
2
= E |ฮฑn | ฮnv ฮnh +
M v Mh
p6=n
2 2
P โ E |ฮฑn |2
2
= E |ฮฑn | ฮnv ฮnh +
,
M
(b) is derived because
h
i
h
i
2
a a 2
a
E dH
= E dH
Ma (ฯp )cn
Ma (ฯp )aMa (qn /Qn )
MX
M
a โ1
a โ1
X
2qn
a
1
n +1)
jฯ`(ฯpa โ 2q
โjฯm(ฯ
โ
+1)
p
Q
Q
n
n
e
e
= 2E
Ma
m=0
`=0
a
Z
Ma โ1 M
a โ1
X
1 ejฯ(`โm)ฯp a
2qn
1 X
E ejฯ(mโ`)( Qn โ1)
= 2
dฯp
Ma
2
โ1
m=0
=
1
Ma2
`=0
M
a โ1 M
a โ1
X
X
m=0 m=`
1
=
.
Ma
To complete the formula in (39), we compute the power
of the n-th largest channel gain E[|ฮฑn |2 ]. Without loss of
generality, we assume that the magnitude of channel gains are in
descending order, i.e., |ฮฑ1 |2 โฅ ยท ยท ยท โฅ |ฮฑP |2 . The channel gain
.
A = |ฮฑp |2 follows ฯ22 that is characterized by the cumulative
distribution function (cdf) of
FA (a) = 1 โ eโa
because ฮฑp โผ CN (0, 1). We now consider the k-th order
statistic (k-th smallest order statistic) of P i.i.d exponentially
.
distributed random variables Ak = |ฮฑP โk+1 |2 . Then, we refer
to [39] for defining the pdf of Ak , yielding
P โ1
fAk (a) = P
(1 โ eโa )kโ1 eโa(P โk+1)
kโ1
kโ1
P โ1 X kโ1
(a)
= P
(โ1)q eโa(q+P โk+1) ,
k โ 1 q=0
q
where (a) is derived based on the binomial expansion formula.
Then, the expectation of k-th order statistic is defined as
q Z โ
X P ! kโ1
kโ1
q (โ1)
E Ak =
aeโa(q+(P โk+1)) da
(P
โ
k)!(k
โ
1)!
0
q=0
P
X
P !(โ1)qโ(P โk+1) (q โ 1) ยท ยท ยท (q โ (P โ k))
=
(P โ q)!q!
q(P โ k)!
q=P โk+1
P
P
qโ(P โk+1)
qโ1qโ2
q โ (P โ k)
(a) X q (โ1)
=
ยทยทยท
q
1
2
P โk
q=1
" P
# P โk
P
P
q+1
X 1 X
(b) X P
q (โ1)
=
(โ1)q
+
q
` q=1
q
q=1
`=1
"
#
P โk
P
P
X
P
1
(c) X 1 X P
q
0
(โ1) โ
(โ1) +
=
` q=0 q
0
q
q=1
`=1
(d)
= โ
P
โk
X
`=1
(39)
.
a a 2
where ฮ2na = E dH
is derived in Appendix A.
Ma (ฯn )cn
Note that (a) is derived because E[ฮฑpโ ฮฑq ] = 0 when p 6= q and
sin(ฯ(` โ m))
2qn
E ejฯ(mโ`)( Qn โ1)
ฯ(` โ m)
=
P
1 X1
+
` q=1 q
P
X
q=P โk+1
1
.
q
PP
Notice that (a) is derived because
q=b f (q)(q โ b) =
PP
q=b+1 f (q)(q โ b) + f (b)(b โ b) for any function f (ยท), (b)
14
(Pq )(โ1)q+1
PP
=
PP
(Pq )(โ1)qโ1
, (c)
q=1
q
q
Pn 1
(nk)(โ1)k+1
is derived based on
= k=1 k , and (d) is
k
Pn k=1
derived based on k=0 (โ1)k nk = 0. We now compute the
n-th largest channel gain as
is derived because
q=1
Pn
P
X
1
E |ฮฑn |2 = E AP โn+1 =
.
q
q=n
Finally, the correlation coefficient is rewritten by plugging
|ฮฑn |2 into (39).
P
X
1
M ฮ2nv ฮ2nh โ 1
2
E hH (cvn โ chn ) =
P+
.
M
q
q=n
R EFERENCES
[1] J. Song, J. Choi, K. Lee, T. Kim, J. Y. Seol, and D. J. Love, โAdvanced
quantizer designs for FD-MIMO systems using uniform planar arrays,โ
in Proceedings of IEEE Global Telecommunications Conference, Dec.
2016.
[2] T. L. Marzetta, โNoncooperative cellular wireless with unlimited numbers
of base station antennas,โ IEEE Transactions on Wireless Communications, vol. 9, no. 11, pp. 3590โ3600, Nov. 2010.
[3] R. C. Hansen, Phased array antennas, 2nd ed. Hoboken: WileyInterscience, 2009.
[4] Y. H. Nam, B. L. Ng, K. Sayana, Y. Li, J. Zhang, Y. Kim, and J. Lee,
โFull-dimension MIMO for next generation cellular technology,โ IEEE
Communications Magazine, vol. 51, no. 6, pp. 172โ179, Jun. 2013.
[5] R1-150381, Discussions on FD-MIMO codebook enhancements, 3GPP
TSG RAN WG1 #80 Std., Feb. 2015.
[6] R1-150057, Codebook enhancements for EBF/FD-MIMO, 3GPP TSG
RAN WG1 #80 Std., Feb. 2015.
[7] R1-150560, Codebook for 2D antenna arrays, 3GPP TSG RAN WG1
#80 Std., Feb. 2015.
[8] J. Li, X. Su, J. Zeng, Y. Zhao, S. Yu, L. Xiao, and X. Xu, โCodebook design for uniform rectangular arrays of massive antennas,โ in Proceedings
of IEEE Vehicular Technology Conference, Jun. 2013.
[9] J. Choi, K. Lee, D. J. Love, T. Kim, and R. W. Heath, โAdvanced
limited feedback designs for FD-MIMO using uniform planar arrays,โ
in Proceedings of IEEE Global Telecommunications Conference, Dec.
2015.
[10] J. Choi, T. Kim, D. J. Love, and J. Y. Seol, โExploiting the preferred
domain of FDD massive MIMO systems with uniform planar arrays,โ in
Proceedings of IEEE International Conference on Communications, Jun.
2015.
[11] H. Q. Ngo, E. G. Larsson, and T. L. Marzetta, โMassive MU-MIMO
downlink TDD systems with linear precoding and downlink pilots,โ in
Proceedings of Allerton Conference on Communication, Control, and
Computing, Oct. 2013.
[12] R. Rogalin, O. Y. Bursalioglu, H. Papadopoulos, G. Caire, A. F. Molisch,
A. Michaloliakos, V. Balan, and K. Psounis, โScalable synchronization
and reciprocity calibration for distributed multiuser MIMO,โ IEEE
Transactions on Wireless Communications, vol. 13, no. 4, pp. 1815โ
1831, Mar. 2014.
[13] B. Hassibi and B. M. Hochwald, โHow much training is needed in
multiple-antenna wireless links?โ IEEE Transactions on Information
Theory, vol. 49, no. 4, pp. 951โ963, Apr. 2003.
[14] C. K. Au-Yeung and D. J. Love, โOn the performance of random vector
quantization limited feedback beamforming in a MISO system,โ IEEE
Transactions on Wireless Communications, vol. 6, no. 2, pp. 458โ462,
Feb. 2007.
[15] C. K. Au-Yeung, D. J. Love, and S. Sanayei, โTrellis coded line
packing: large dimensional beamforming vector quantization and feedback
transmission,โ IEEE Transactions on Wireless Communications, vol. 10,
no. 8, pp. 1844โ1853, Apr. 2011.
[16] J. Choi, A. Chance, D. J. Love, and U. Madhow, โNoncoherent trellis
coded quantization: a practical limited feedback technique for massive
MIMO systems,โ IEEE Transactions on Communications, vol. 61, no. 12,
pp. 5016โ5029, Dec. 2013.
[17] J. Choi, D. J. Love, and T. Kim, โTrellis-extended codebooks and
successive phase adjustment: a path from LTE-advanced to FDD massive
MIMO systems,โ IEEE Transactions on Wireless Communications,
vol. 14, no. 4, pp. 2007โ2016, Apr. 2015.
[18] J. Choi, D. J. Love, and P. Bidigare, โDownlink training techniques for
FDD massive MIMO systems: open-loop and closed-loop training with
memory,โ IEEE Journal of Selected Topics in Signal Processing, vol. 8,
no. 5, pp. 802โ814, Dec. 2014.
[19] S. Noh, M. D. Zoltowski, Y. Sung, and D. J. Love, โPilot beam pattern
design for channel estimation in massive MIMO systems,โ IEEE Journal
of Selected Topics in Signal Processing, vol. 8, no. 5, pp. 787โ801, Oct.
2014.
[20] Y. Han, J. Lee, and D. J. Love, โCompressed sensing-aided downlink
channel training for FDD massive MIMO systems,โ to appear in IEEE
Transactions on Communications, 2017.
[21] K. K. Mukkavilli, A. Sabharwal, E. Erkip, and B. Aazhang, โOn
beamforming with finite rate feedback in multiple-antenna systems,โ
IEEE Transactions on Information Theory, vol. 49, no. 10, pp. 2562โ
2579, Jan. 2003.
[22] D. J. Love, R. W. Heath, and T. Strohmer, โGrassmannian beamforming
for multiple-input multiple-output wireless systems,โ IEEE Transactions
on Information Theory, vol. 49, no. 10, pp. 2735โ2747, Oct. 2003.
[23] D. J. Love, R. W. Heath, V. K. Lau, D. Gesbert, B. D. Rao, and M. Andrews, โAn overview of limited feedback in wireless communication
systems,โ IEEE Journal on Selected Areas in Communications, vol. 26,
no. 8, pp. 1341โ1365, Oct. 2008.
[24] D. J. Love and R. W. Heath, โGrassmannian beamforming on correlated
MIMO channels,โ in Proceedings of IEEE Global Telecommunications
Conference, Nov. 2004.
[25] โโ, โLimited feedback diversity techniques for correlated channels,โ
IEEE Transactions on Vehicular Technology, vol. 55, no. 2, pp. 718โ722,
Mar. 2006.
[26] P. Xia and B. G. Georgios, โDesign and analysis of transmit-beamforming
based on limited-rate feedback,โ IEEE Transactions on Signal Processing,
vol. 54, no. 5, pp. 1853โ1863, May 2006.
[27] V. Raghavan, A. M. Sayeed, and V. V. Veeravalli, โLimited feedback
precoder design for spatially correlated MIMO channels,โ in Proceedings
of Conference on Information Sciences and Systems, Mar. 2007.
[28] V. Raghavan, J. Choi, and D. J. Love, โDesign guidelines for limited
feedback in the spatially correlated broadcast channel,โ IEEE Transactions
on Communications, vol. 63, no. 7, pp. 2524โ2540, Jul. 2015.
[29] Study on 3D channel model for LTE, 3GPP TR 36.873 V12.0.0 Std.,
Sep. 2014.
[30] Spatial channel model for mutiple input multiple output simulations,
3GPP TR 25.996 V6.1.0 Std., Sep. 2003.
[31] R1-103378, Performance evaluations of Rel.10 feedback framework,
3GPP TSG RAN WG1 #61 Std., May 2010.
[32] R1-105011, Way forward on 8Tx codebook for Rel.10 DL MIMO, 3GPP
TSG RAN WG1 #61 Std., Aug. 2010.
[33] Y. Han, S. Jin, X. Li, Y. Huang, L. Jiang, and G. Wang, โDesign of
double codebook based on 3D dual-polarized channel for multiuser
MIMO system,โ EURASIP Journal on Advances in Signal Processing,
vol. 2014, no. 1, pp. 1โ13, Jul. 2014.
[34] R. J. Mailloux, Phased array antenna handbook, 2nd ed. Artech House,
2005.
[35] D. Ying, F. W. Vook, T. Thomas, D. J. Love, and A. Ghosh, โKronecker
product correlation model and limited feedback codebook design in a
3D channel model,โ in Proceedings of IEEE International Conference
on Communications, Jun. 2014.
[36] O. E. Ayach, S. Rajagopal, S. Abu-Surra, Z. Pi, and R. W. Heath,
โSpatially sparse precoding in millimeter wave MIMO systems,โ IEEE
Transactions on Wireless Communications, vol. 13, no. 3, pp. 1499โ1513,
Mar. 2014.
[37] M. Borga, โLearning multidimensional signal processing,โ Ph.D. dissertation, Linkoฬping University, Linkoฬping, Sweden, 1998, SE-581 83.
[38] A. Stuart and K. Ord, Kendallโs advanced theory of statistics: distribution
theory, 6th ed. London: Arnold, 1998.
[39] H. David, Order statistics, 2nd ed. New York: John Wiley and Sons,
1980.
| 7cs.IT
|
Fast Distributed Algorithms for Testing Graph Properties
Keren Censor-Hillelโ
Eldar Fischerโ
Gregory Schwartzmanโ
Yadu Vasudevโ
arXiv:1602.03718v3 [cs.DC] 2 May 2016
May 3, 2016
Abstract
We initiate a thorough study of distributed property testing โ producing algorithms for the
approximation problems of property testing in the CONGEST model. In particular, for the
so-called dense graph testing model we emulate sequential tests for nearly all graph properties
having 1-sided tests, while in the general and sparse models we obtain faster tests for trianglefreeness, cycle-freeness and bipartiteness, respectively. In addition, we show a logarithmic lower
bound for testing bipartiteness and cycle-freeness, which holds even in the stronger LOCAL
model.
In most cases, aided by parallelism, the distributed algorithms have a much shorter running
time as compared to their counterparts from the sequential querying model of traditional property testing. The simplest property testing algorithms allow a relatively smooth transitioning
to the distributed model. For the more complex tasks we develop new machinery that may be
of independent interest.
โ
Technion โ Israel Institute of Technology, Department of Computer Science. [email protected],
[email protected], [email protected], [email protected]. Supported in part by the Israel
Science Foundation (grant 1696/14).
1
Introduction
The performance of many distributed algorithms naturally depends on properties of the underlying
network graph. Therefore, an inherent goal is to check whether the graph, or some given subgraph,
has certain properties. However, in some cases this is known to be hard, such as in the CONGEST
model [31]. In this model, computation proceeds in synchronous rounds, in each of which every
vertex can send an O(log n)-bit message to each of its neighbors. Lower bounds for the number of
โ
rounds of type โฆฬ( n + D) are known for verifying many global graph properties, where n is the
number of vertices in the network and D is its diameter (see, e.g. Das-Sarma et al. [36])1 .
To overcome such difficulties, we adopt the relaxation used in graph property testing, as first
defined in [18, 20], to the distributed setting. That is, rather than aiming for an exact answer to
the question of whether the graph G satisfies a certain property P , we settle for distinguishing the
case of satisfying P from the case of being วซ-far from it, for an appropriate measure of being far.
Apart from its theoretical interest, this relaxation is motivated by the common scenario of
having distributed algorithms for some tasks that perform better given a certain property of the
network topology, or given that the graph almost satisfies that property. For example, Hirvonen et
al. [24] show an algorithm for finding a large cut in triangle-free graphs (with additional constraints),
and for finding an (1 โ วซ)-approximation if at most an วซ fraction of all edges are part of a triangle.
Similarly, Pettie and Su [32] provide fast algorithms for coloring triangle-free graphs.
We construct fast distributed algorithms for testing various graph properties. An important
byproduct of this study is a toolbox that we believe will be useful in other settings as well.
1.1
Our contributions
We provide a rigorous study of property testing methods in the realm of distributed computing
under the CONGEST model. We construct 1-sided error distributed วซ-tests, in which if the graph
satisfies the property then all vertices output accept, and if it is วซ-far from satisfying the property
then at least one vertex outputs reject with probability at least 2/3. Using the standard amplification method of invoking such a test O(log n) times and having a vertex output reject if there
is at least one invocation in which it should output reject, gives rejection with higher probability
at the price of a multiplicative O(log n) factor for the number of rounds.
The definition of a graph being วซ-far from satisfying a property is roughly one of the following
(see Section 2 for precise definitions): (1) Changing any วซn2 entries in the adjacency matrix does
not give a graph that satisfies the property (dense model), or (2) changing any วซ ยท max{n, m} entries
in the adjacency matrix does not give a graph that satisfies the property, where m is the number of
edges (general model). A particular case here is when the degrees are bounded by some constant
d, and any resulting graph must comply with this restriction as well (sparse model).
In a sequential วซ-test, access to the input is provided by queries, whose type depends on the
model. In the dense model these are asking whether two vertices v, u are neighbors, and in the
general and sparse models these can be either asking what the degree of a vertex v is, or asking
what the i-th neighbor of v is (the ordering of neighbors is arbitrary). While a sequential วซ-test
can touch only a small handful of vertices with its queries, in a distributed test the lack of ability
to communicate over large distances is offset by having all n vertices operating in parallel.
Our first contribution is a general scheme for a near-complete emulation in the distributed
1
Here โฆฬ hides factors that are polylogarithmic in n.
1
context of วซ-tests originating from the dense graph model (Section 3). This makes use of the
fact that in the dense model all (sequential) testing algorithms can be made non-adaptive, which
roughly means that queries do not depend on responses to previous queries (see Section 2 for
definition). In fact, such tests can be made to have a very simple structure, allowing the vertices in
the distributed model to โband togetherโ for an emulation of the test. There is only one additional
technical condition (which we define below), since in the distributed model we cannot handle
properties whose counter-examples can be โsplitโ to disjoint graphs. For example, the distributed
model cannot hope to handle the property of the graph having no disjoint union of two triangles,
a property for which there exists a test in the dense model.
Theorem 3.4 Any วซ-test in the dense graph model for a non-disjointed property that makes q
queries can be converted to a distributed วซ-test that takes O(q 2 ) communication rounds.
We next move away from the dense graph model to the sparse and general models, that are
sometimes considered to be more realistic. In the general model, there exists no test for the
property of containing no triangle that makes a number of queries independent of the number of
graph vertices [2]. Here the distributed model can do better, because the reason for this deficiency
is addressed by having all vertices operate concurrently. In Section 4 we adapt the interim lemmas
used in the best testing algorithm constructed in [2], and construct a distributed algorithm whose
number of rounds is independent of n.
Theorem 4.1 Algorithm 2 is a distributed วซ-test in the general graph model for the property of
containing no triangles, that requires O(วซโ2 ) rounds.
The sparse and general models inherently require adaptive property testing algorithms, since
there is no other way to trace a path from a given vertex forward, or follow its neighborhood. Testing
triangle freeness sequentially uses adaptivity only to a small degree. However, other problems in the
sparse and general models, such as the one we explore next, have a high degree of adaptivity built
into their sequential algorithms, and we need to take special care for emulating it in the distributed
setting.
In the sparse model (degrees bounded by a constant d), we adapt ideas from the bipartiteness
testing algorithm of [19], in which we search for odd-length cycles. Here again the performance of
a distributed algorithm surpasses that of the test (a number of rounds polylogarithmic in n vs. a
โ
number of queries which is โฆ( n) โ a lower bound that is given in [20]). The following is proved
in Section 5.
Theorem 5.2 Algorithm 4 is a distributed วซ-test in the bounded degree graph model for the property of being bipartite, that requires O(poly(วซโ1 log(nวซโ1 ))) rounds.
In the course of proving Theorem 5.2 we develop a method that we consider to be of independent
interest2 . The algorithm works by performing 2n random walks concurrently (two starting from
each vertex). The parallel execution of random walks despite the congestion restriction is achieved
by making sure that the walks have a uniform stationary distribution, and then showing that
congestion is โclose to averageโ, which for the uniform stationary distribution is constant.
In Section 6 we show a fast test for cycle-freeness. This makes use of a combinatorial lemma
that we prove, about cycles that remain in the graph after removing edges independently with
probability วซ/2. The following summarizes our result for testing cycle-freeness.
2
This technique was recently independently and concurrently devised in [17] for a different use.
2
Theorem 6.3 Algorithm 6 is a distributed วซ-test in the general graph model for the property of
being cycle-free, that requires O(log n/วซ) rounds.
We also prove lower bounds for testing bipartiteness and cycle-freeness (matching the upper
bound for the latter). Roughly speaking, these are obtained by using the probabilistic method
with alterations to construct graphs which are far from being bipartite or cycle-free, but all of their
cycles are of length that is at least logarithmic. This technique bears some similarity to the classic
result by Erdรถs [13], which showed the existence of graphs with large girth and large chromatic
number. The following are given in Section 7.
Theorem 7.1 Any distributed 1/100-test for the property of being bipartite requires โฆ(log n)
rounds of communication.
Theorem 7.3 Any distributed 1/100-test for the property of being cycle-free requires โฆ(log n)
rounds of communication.
Roadmap: The paper is organized as follows. The remainder of this section consists of related
work and historical background on property testing. Section 2 contains formal definitions and some
mathematical tools. The emulation of sequential tests for the dense model is given in Section 3. In
Section 4 we give our distributed test for triangle-freeness. In Section 5 we provide a distributed test
for bipartiteness, along with our new method of executing many random walks, and in Section 6 we
give our test for cycle-freeness. Section 7 gives our logarithmic lower bounds for testing bipartiteness
and cycle-freeness. We conclude with a short discussion in Section 8.
1.2
Related work
The only previous work that directly relates to our distributed setting is due to Brakerski and
Patt-Shamir [8]. They show a tolerant property testing algorithm for finding large (linear in size)
near-cliques in the graph. An วซ-near clique is a set of vertices for which all but an วซ-fraction of the
pairs of vertices have an edge between them. The algorithm is tolerant, in the sense that it finds
a linear near-clique if there exists a linear วซ3 -near clique. That is, the testing algorithm considers
two thresholds of being close to having the property (in this case โ containing a linear size clique).
We are unaware of any other work on property testing in this distributed setting.
Testing in a different distributed setting was considered in Arfaoui et al. [5]. They study testing
for cycle-freeness, in a setting where each vertex may collect information of its entire neighborhood
up to some distance, and send a short string of bits to a central authority who then has to decide
whether the graph is cycle-free or not.
Related to having information being sent to, or received by, a central authority, is the concept
of proof-labelling schemes, introduced by Korman et al. [27] (for extensions see, e.g., Baruch et
al. [6]). In this setting, each vertex is given some external label, and by exchanging labels the
vertices need to decide whether a given property of the graph holds. This is different from our
setting in which no information other than vertex IDs is available. Another setting that is related
to proof-labelling schemes, but differs from our model, is the prover-verifier model of Foerster et
al. [15].
Sequential property testing has the goal of computing without processing the entire input. The
wider family of local computation algorithms (LCA) is known to have connections with distributed
computing, as shown by Parnas and Ron [30] and later used by others. A recent study by Gรถรถs et
3
al. [23] proves that under some conditions, the fact that a centralized algorithm can query distant
vertices does not help with speeding up computation. However, they consider the LOCAL model,
and their results apply to certain properties that are not influenced by distances.
Finding induced subgraphs is a crucial task and has been studied in several different distributed
models (see, e.g., [9, 11, 12, 26]). Notice that for finding subgraphs, having many instances of the
desired subgraph can help speedup the computation, as in [11]. This is in contrast to algorithms
that perform faster if there are no or only few instances, as explained above, which is why we test
for, e.g., the property of being triangle-free, rather for the property of containing triangles. (Notice
that these are not the same, and in fact every graph with 3/วซ or more vertices is วซ-close to having
a triangle.)
Parallelizing many random walks was addressed in [1], where the question of graph covering
via random walks is discussed. It is shown there that for certain families of graphs there is a
substantial speedup in the time it takes for k walks starting from the same vertex to cover the
graph, as compared to a single walk. No edge congestion constraints are taken into account.
โ
In [37], it is shown how to perform,โ
under congestion, a single random walk of length L in Oฬ( LD)
rounds, and k random walks in Oฬ( kLD + k) rounds, where D is the diameter of the graph. Our
method has no dependence on the diameter, allowing us to perform a multitude of short walks
much faster.
1.3
Historical overview
The first papers to consider the question of property testing were [7] and [35]. The original motivations for defining property testing were its connection to some Computerized Learning models, and
the ability to leverage some properties to construct Probabilistically Checkable Proofs (PCPs โ this
is related to property testing through the areas of Locally Testable Codes and Locally Decodable
Codes, LTCs and LDCs). Other motivations since then have entered the fray, and foremost among
them are sublinear-time algorithms, and other big-data considerations. Since virtually no property
can be decidable without reading the entire input, property testing introduces a notion of the allowable approximation to the original problem. In general, the algorithm has to distinguish inputs
satisfying the property, from inputs that are วซ-far from it. For more information on the general
scheme of โclassicalโ property testing, consult the surveys [14, 21, 33].
The older of the graph testing models discussed here is the dense model, as defined in the
seminal work of Goldreich, Goldwasser and Ron [18]. The dense graph model has historically kickstarted combinatorial property testing in earnest, but it has some shortcomings. Its main one is
the distance function, which makes sense only if we consider graphs having many edges (hence
the name โdense modelโ) โ any graph with o(n2 ) edges is indistinguishable in this model from an
empty graph.
The stricter and at times more plausible distance
function is one which is relative to the actual
n
number of edges, rather than the maximum 2 . The general model was defined in [2], while the
sparse model was defined already in [20]. The main difference between the sparse and the general
graph models is that in the former there is also a guaranteed upper bound d on the degrees of the
vertices, which is given to the algorithm in advance (the query complexity may then depend on d,
either explicitly, or more commonly implicitly by considering d to be a constant).
4
2
Preliminaries
2.1
Additional background on property testing
While the introduction provided rough descriptions of the different property testing models, here
we provide more formal definitions. The dense model for property testing is defined as follows.
Definition 2.1 (dense graph model [18]). The dense graph model considers as objects graphs that
are given by their adjacency matrix. Hence it is defined by the following features.
โข Distance: Two graphs with n vertices each are considered to be วซ-close if one can be obtained
from the other by deleting and inserting at most วซn2 edges (this is, up to a constant factor,
the same as the normalized Hamming distance).
โข Querying scheme: A single query of the algorithm consists of asking whether two vertices
u, v โ V form a graph edge in E or not.
โข Allowable properties: All properties have to be invariant under permutations of the input
that pertain to graph isomorphisms (a prerequisite for them being graph properties).
The number of vertices n is given to the algorithm in advance.
As discussed earlier, the sparse and general models for property testing relate the distance
function to the actual number of edges in the graph. They are formally defined as follows.
Definition 2.2 (sparse [20] and general [2] graph models). These two models consider as objects
graphs given by their adjacency lists. They are defined by the following features.
โข Distance: Two graphs with n vertices and m edges (e.g. as defined by the denser of the two)
are considered to be วซ-close if one can be obtained from the other by deleting and inserting at
most วซ max{n, m} edges3 .
โข Querying scheme: A single query consists of either asking what is the degree of a vertex v,
or asking what is the iโth neighbor of v (the ordering of neighbors is arbitrary).
โข Allowable properties: All properties have to be invariant under graph isomorphisms (which
here translate to a relabeling that affects both the vertex order and the neighbor ids obtained
in neighbor queries), and reordering of the individual neighbor lists (as these orderings are
considered arbitrary).
In this paper, we mainly refer to the distance functions of these models, and less so to the
querying scheme, since the latter will be replaced by the processing scheme provided by the distributed computation model. Note that most property testing models get one bit in response to a
query, e.g., โyes/noโ in response to โis uv an edgeโ in the dense graph model. However, the sparse
and general models may receive log n bits of information for one query, e.g., an id of a neighbor of
a vertex. Also, the degree of a vertex, which can be given as an answer to a query in the general
model, takes log n bits. Since the distributed CONGEST model allows passing a vertex id or a
vertex degree along an edge in O(1) rounds, we can equally relate to all three graph models.
Another important point is the difference between 1-sided and 2-sided testing algorithms, and
the difference between non-adaptive and adaptive algorithms.
3
Sometimes in the sparse graph model the allowed number of changes is วซdn, as relates to the maximum possible
number of edges; when d is held constant the difference is not essential.
5
Definition 2.3 (types of algorithms). A property testing algorithm is said to have 1-sided error if
there is no possibility of error on accepting satisfying inputs. That is, an input that satisfies the
property will be accepted with probability 1, while an input วซ-far from the property will be rejected
with a probability that is high enough (traditionally this means a probability of at least 2/3). A
2-sided error algorithm is also allowed to reject satisfying inputs, as long as the probability for a
correct answer is high enough (traditionally at least 2/3).
A property testing algorithm is said to be non-adaptive if it decides all its queries in advance
(i.e. based only on its internal coin tosses and before receiving the results of any query), while only
its accept/reject output may depend on the actual input. An adaptive algorithm may make each
query in turn based on the results of its previous queries (and, as before, possible internal coin
tosses).
In the following we address both adaptive and non-adaptive algorithms. However, we restrict
ourselves to 1-sided error algorithms, since the notion of 2-sided error is not a good match for our
distributed computation model.
2.2
Mathematical background
An important role in our analyses is played by the Multiplicative Chernoff Bound (see, e.g., [29]),
hence we state it here for completeness.
Fact 2.4. Suppose that X1 , ..., Xn are independent random variables taking values in {0, 1}. Let
X denote their sum and let ยต = E[X] denote its expected value. Then, for any ฮด > 0,
eโฮด
)ยต ,
(1 โ ฮด)(1โฮด)
eฮด
P r[X > (1 + ฮด)ยต] < (
)ยต .
(1 + ฮด)(1+ฮด)
P r[X < (1 โ ฮด)ยต] < (
Some convenient variations of the bounds above are:
P r[X โฅ (1 + ฮด)ยต] < eโฮดยต/3 ,
โฮด2 ยต/3
P r[X โฅ (1 + ฮด)ยต] < e
,
ฮด โ (0, 1)
P r[X โค (1 โ ฮด)ยต] < e
,
ฮด โ (0, 1).
โฮด2 ยต/2
3
ฮดโฅ1
Distributed emulation of sequential tests in the dense model
We begin by showing that under a certain assumption of being non-disjointed, which we define
below, a property P that has a sequential test in the dense model that requires q queries can be
tested in the distributed setting within O(q 2 ) rounds. We prove this by constructing an emulation
that translates sequential tests to distributed ones. For this we first introduce a definition of a
witness graph and then adapt [22, Theorem 2.2], restricted to 1-sided error tests, to our terminology.
Definition 3.1. Let P be a property of graphs with n vertices. Let Gโฒ be a graph with k < n
vertices. We say that Gโฒ is a witness against P , if it is not an induced subgraph of any graph that
satisfies P .
6
Notice that if Gโฒ has an induced subgraph H that is a witness against P , then by the above
definition Gโฒ is also a witness against P .
The work of [22] transforms tests of graphs in the dense model to a canonical form where the
query scheme is based on vertex selection. This is useful in particular for the distributed model,
where the computational work is essentially based in the vertices. We require the following special
case for 1-sided error tests.
Lemma 3.2 ( [22, Theorem 2.2]). Let P be a property of graphs with n vertices. If there exists
a 1-sided error วซ-test for P with query complexity q(n, วซ), then there exists a 1-sided error วซ-test
for P that uniformly selects a set of q โฒ = 2q(n, วซ) vertices, and accepts if and only if the induced
subgraph is not a witness against P .
Our emulation leverages Lemma 3.2 under an assumption on the property P , which we define
as follows.
Definition 3.3. We say that P is a non-disjointed property if for every graph G that does not satisfy
P and an induced subgraph Gโฒ of G such that Gโฒ is a witness against P , Gโฒ has some connected
component which is also a witness against P . We call such components witness components.
We are now ready to formally state our main theorem for this section.
Theorem 3.4. Any วซ-test in the dense graph model for a non-disjointed property that makes q
queries can be converted to a distributed วซ-test that takes O(q 2 ) communication rounds.
The following lemma essentially says that not satisfying a non-disjointed property cannot rely
on subgraphs that are not connected, which is exactly what we need to forbid in a distributed
setting.
Lemma 3.5. The property P is a non-disjointed property if and only if all minimal witnesses that
are induced subgraphs of G are connected.
Here minimal refers to the standard terminology, which means that no proper induced subgraph
is a witness against P .
Proof. First, if P is non-disjointed and G does not satisfy P , then for every subgraph Gโฒ of G that
is a witness against P , Gโฒ has a witness component. If Gโฒ is minimal then it must be connected,
since otherwise it contains a connected component which is a witness against P , which contradicts
the minimality of G.
For the other direction, if all the minimal witnesses that are induced subgraphs of G are connected, then every induced subgraph Gโฒ that is a witness against P is either minimal, in which
case it is connected, or is not minimal, in which case there is a subgraph H of Gโฒ which is connected and a minimal witness against P . The connected component C of Gโฒ which contains H
is a witness against P (otherwise H is not a witness against P ), and hence it follows that P is
non-disjointed.
Next, we give the distributed test (Algorithm 1). The test has an outer loop in which each vertex
picks itself with probability 5q/n, collects its neighborhood of a certain size of edges between picked
vertices in an inner loop, and rejects if it identifies a witness against P . The outer loop repeats
two times because not only does the sequential test have an error probability, but also with some
7
small probability we may randomly pick too many or not enough vertices in order to emulate it.
Repeating the main loop twice reduces the error probability back to below 1/3. In the inner loop,
each vertex collects its neighborhood of picked vertices and checks if its connected component is
a witness against P . To limit communications this is done only for components of picked vertices
that are sufficiently small: if a vertex detects that it is part of a component with too many edges
then it accepts and does not participate until the next iteration of the outer loop.
Algorithm 1: Emulation algorithm with input q for property P
Variables: Uv edges known to v, Uvโฒ edges to update and send (temporary variables)
1 perform 2 times
2
reset the state for all vertices
3
for each vertex v simultaneously
4
Vertex v picks itself with probability 5q/n
5
if v is picked then
6
Notify all neighbors that v is picked
7
Set Uvโฒ = {(v, u) โ E| u is picked} and Uv = โ
8
perform 10q times
# At each iteration Uv is a subgraph of vโs connected component
9
Uvโฒ = Uvโฒ \Uv # only need recently discovered edges
10
Uv = Uv โช Uvโฒ # add them to Uv
11
if |Uv | โค 100q 2 then # donโt operate if there are too many edges
12
Send Uvโฒ to all picked neighbours of v # propagate known edges
13
14
15
16
17
18
19
Wait until the time bound for all other vertices to finish this iteration
Set Uvโฒ to the union of edge sets received from neighbors
if Uv โช Uvโฒ is a witness against P then
Vertex v outputs reject (ending all operations)
else
Wait until the time bound for all other vertices to finish this iteration of the
outermost loop
Every vertex v that did not reject outputs accept
To analyze the algorithm, we begin by proving that there is a constant probability for the
number of picked vertices to be sufficient and not too large.
Lemma 3.6. The probability that the number of vertices picked by the algorithm is between q and
10q is more than 2/3 .
Proof. For every v โ V , we denote by Xv the indicator variable for the event that vertex v is picked.
P
Note that these are all independent random variables. Using the notation X = vโV Xv gives that
E[X] = 5q, because each vertex is picked with probability 5q/n. Using the Chernoff Bound from
Fact 2.4 with ฮด = 4/5 and ยต = 5q, we can bound the probability of having too few picked vertices:
P r[X < q] = P r[X < (1 โ ฮด)ยต] < (
1
5
eโ4/5
)5q = ( 4 )q < .
e
10
(1 โ (4/5))(1โ(4/5))
8
For bounding the probability that there are too many picked vertices, we use the other direction of
the Chernoff Bound with ฮด = 1 and ยต = 5q, giving:
P r[X > 10q] = P r[X > (1 + ฮด)ยต] < (
e5 q
2
e 5q
)
=
(
) < .
22
210
10
Thus, with probability at least 2/3 it holds that q โค X โค 10q.
Now, we can use the guarantees of the sequential test to obtain the guarantees of our algorithm.
Lemma 3.7. Let P be a non-disjointed graph property. If G satisfies P then all vertices output
accept in Algorithm 1. If G is วซ-far from satisfying P , then with probability at least 2/3 there
exists a vertex that outputs reject.
Proof. First, assume that G satisfies P . Vertex v outputs reject only if it is part of a witness
against P , which is, by definition, a component that cannot be extended to some H that satisfies
P . However, every component is an induced subgraph of G itself, which does satisfy P , and thus
every component can be extended to G. This implies that no vertex v outputs reject.
Now, assume that G is วซ-far from satisfying P . Since the sequential test rejects with probability
at least 2/3, the probability that a sample of at least q vertices induces a graph that cannot be
extended to a graph that satisfies P is at least 2/3 . Because P is non-disjointed, the induced
subgraph must have a connected witness against P . We note that a sample of more than q vertices
does not reduce the rejection probability. Hence, if we denote by A the event that the subgraph
induced by the picked vertices has a connected witness against P , then P r[A] โฅ 2/3, conditioned
on that at least q vertices were picked.
However, a sample that is too large may cause a vertex to output accept because it cannot
collect its neighborhood. We denote by B the event that the number of vertices sampled is between
q and 10q, and by Lemma 3.6 its probability is at least 2/3. We bound P r[A โฉ B] using Bayesโ
Theorem, obtaining P r[A โฉ B] = P r[A|B]P r[B] โฅ (2/3)2 . Since the outer loop consists of 2
independent iterations, this gives a probability of at least 1 โ (1 โ 4/9)2 โฅ 2/3 for having a vertex
that outputs reject.
We now address the round complexity. Each vertex only sends and receives information from
its q-neighborhood about edges between the chosen vertices. If too many vertices are chosen we
detect this and accept. Otherwise we only communicate the chosen vertices and their edges, which
requires O(q 2 ) communication rounds using standard pipelining 4 . Together with Lemma 3.7, this
proves Theorem 3.4.
3.1
Applications: k-colorability and perfect graphs
Next, we provide some examples of usage of Theorem 3.4. A result by Alon and Shapira [4] states
that all graph properties closed under induced subgraphs are testable in a number of queries that
depends only on วซโ1 . We note that, except for certain specific properties for which there are ad-hoc
proofs, the dependence is usually a tower function in วซโ1 or worse (asymptotically larger).
From this, together with Lemma 3.2 and Theorem 3.4, we deduce that if P is a non-disjointed
property closed under induced subgraphs, then it is testable, for every fixed วซ, in a constant number
of communication rounds.
4
Pipelining means that each vertex has a buffer for each edge, which holds the information (edges between chosen
vertices, in our case) it needs to send over that edge. The vertex sends the pieces of information one after the other.
9
Example โ k-colorability: The property of being k-colorable is testable in a distributed manner
by our algorithm. All minimal graphs that are witnesses against P (not k-colorable) are connected,
and therefore according to Lemma 3.5 it is a non-disjointed property. It is closed under induced
subgraphs, and by [3] there exists a 1-sided error วซ-test for k-colorability that uniformly picks
O(k log(k)/วซ2 ) vertices, and its number of queries is the square of this expression (note that the
polynomial dependency was already known by [18]). Our emulation implies a distributed 1-sided
error วซ-test for k-colorability that requires O(poly(kวซโ1 )) rounds.
Example โ perfect graphs: A graph G is said to be perfect if for every induced subgraph Gโฒ of
G, the chromatic number of Gโฒ equals the size of the largest clique in Gโฒ . Another characterization
of a perfect graph is via forbidden subgraphs: a graph is perfect if and only if it does not have
odd holes (induced cycles of odd length at least 5) or odd anti-holes (the complement graph of
an odd hole) [10]. Both odd holes and odd anti-holes are connected graphs. Since these are all
minimal witnesses against the property, according to Lemma 3.5 it is a non-disjointed property.
Using the result of Alon-Shapira [4] we know that the property of a graph being perfect is testable.
Our emulation implies a distributed 1-sided error วซ-test for being a perfect graph that requires a
number of rounds that depends only on วซ.
4
Distributed test for triangle-freeness
In this section we show a distributed วซ-test for triangle-freeness. Notice that since triangle-freeness
is a non-disjointed property, Theorem 3.4 gives a distributed วซ-test for triangle-freeness under the
dense model with a number of rounds that is O(q 2 ), where q is the number of queries required for a
sequential วซ-test for triangle-freeness. However, for triangle-freeness, the known number of queries
is a tower function in log(1/วซ) [16].
Here we leverage the inherent parallelism that we can obtain when checking the neighbors of
a vertex, and show a test for triangle-freeness that requires only O(วซโ2 ) rounds (Algorithm 2).
Importantly, our algorithm works not only for the dense graph model, but for the general graph
model (where distances are relative to the actual number of edges), which subsumes it. In the
sequential setting, a test for triangle-freeness in the general model requires a number of queries
that is some constant power of n by [2]. Our proof actually follows the groundwork laid in [2] for
the general graph model โ their algorithm picks a vertex and checks two of its neighbors for being
connected, while we perform the check for all vertices in parallel.
Theorem 4.1. Algorithm 2 is a distributed วซ-test in the general graph model for the property of
containing no triangles, that requires O(วซโ2 ) rounds.
Our line of proof follows that of [2], by distinguishing
edges that connect two high-degree vertices
โ
โ1
from those that do not. Formally, let b = 2 วซ m, where m is the number of edges in the graph,
and denote B = {v โ V | deg(v) โฅ b}. We say that an edge e = (u, v) is light if v 6โ B or u 6โ B, and
otherwise, we say that it is heavy. That is, the set of heavy edges is H = {(u, v) โ E | u โ B, v โ B}.
We begin with the following simple claim about the number of heavy edges.
Claim 4.2. The number of heavy edges, |H|, is at most วซm/2.
Proof. The number of heavy edges is |H| โค |B|(|B| โ 1)/2 < |B|2 /2. Since |B|b โค 2m, we get that
โ
โ2m
= วซm. This gives that |H| โค 21 |B|2 โค วซm/2.
|B| โค 2m
โ1
b =
2 วซ
m
10
Algorithm 2: Triangle freeness test
1
2
3
4
5
6
7
8
9
10
11
12
for each vertex v simultaneously
perform 32วซโ2 times
Pick w1 , w2 โ N (v), w1 6= w2 uniformly at random
Send w2 to w1 # Ask w1 if it is a neighbor of w2
foreach wu sent by u โ N (v) do # Asked by u if v is a neighbor of w
if wu โ N (v) then
Send โyesโ to u
else
Send โnoโ to u
if received โyesโ from w1 then
reject (ending all operations)
accept (for vertices that did not reject)
Next, we fix an iteration i of the algorithm. Every vertex v chooses two neighbors w1 , w2 . Let
A = {(v, w1 ) โ E | v โ V \ B}, where w1 is the first of the two vertices chosen by the low-degree
vertex v. Let T = {e โ E | e is a light edge in a triangle}, and let AT = T โฉ A. We say that an
edge (v, w1 ) โ AT is matched if (v, w2 ) is in the same triangle as (v, w1 ). If (v, w1 ) โ AT is matched
then {v, w1 , w2 } is a triangle that is detected by v.
We begin with the following lemma that states that if G is วซ-far from being triangle-free, then
in any iteration i we can bound the expected number of matched edges from below by วซ2 /8. Let Y
be the number of matched edges.
Lemma 4.3. The expected number of matched edges by a single iteration of the algorithm, E[Y ],
is greater than วซ2 /8.
Proof. For every e โ AT , let Ye be a random variable indicating whether e is matched. Then
P
Y = eโAT Ye , giving the following bound:
E[Y |AT ] = E[
X
eโAT
Ye |AT ] =
X
eโAT
P r[e is matched] โฅ |AT |/b,
(1)
where the last inequality follows because a light edge in AT is chosen by a vertex with degree at
most b, hence the third triangle vertex gets picked with probability at least 1/b.
Next, we argue that E[|AT |] โฅ |T |/b. To see why, for every edge e, let Xe be a random variable
P
indicating whether e โ A. Let X = eโT Xe = |AT |. Then,
E[|AT |] = E[X] = E[
X
eโT
Xe ] =
X
eโT
E[Xe ] =
X
eโT
P r[e โ A] โฅ |T |/b,
(2)
where the last inequality follows because a light edge has at least one endpoint with degree at most
b. Hence, this edge gets picked by it with probability at least 1/b.
It remains to bound |T | from below, for which we claim that |T | โฅ วซm/2. To prove this, first
notice that, since G is วซ-far from being triangle free, it has at least วซm triangle edges, since otherwise
11
we can just remove all of them and make the graph triangle free with less than วซm edge changes.
By Claim 4.2, the number of heavy edges satisfies |H| โค วซ/2m. Subtracting this from the number
of triangle edges gives that at least วซm/2 edges are light triangle edges, i.e.,
|T | โฅ วซm/2.
(3)
Finally, by Inequalities (1), (2) and (3), using iterated expectation we get:
E[Y ] = EAT [E[Y |AT ]] โฅ E[
|T |
วซm 1
|AT |
]โฅ 2 โฅ
= วซ2 /8.
b
b
2 4วซโ1 m
We can now prove the correctness of our algorithm, as follows.
Lemma 4.4. If G is triangle-free then all vertices output accept in Algorithm 2. If G is วซ-far
from being triangle-free, then with probability at least 2/3 there exists a vertex that outputs reject.
Proof. If G is triangle free then in each iteration v receives โnoโ from w1 and after all iterations it
returns accept.
Assume that G is วซ-far from being triangle-free. Let Zi,v be an indicator variable for the event
that vertex v detects a triangle at iteration i. First, we note that the indicators are independent, since a vertex detecting a triangle does not affect the chance of another vertex detecting
a triangle (note that the graph is fixed), and the iterations are done independently. Now, let
P โ2 P
number of detections over all iterations.
Z = 32วซ
i=1
vโV Zi,v , and notice that Z is the total
P
Lemma 4.3 implies that for a fixed i, it holds that E[ vโV Zi,v ] = E[Y ] โฅ วซ2 /8, which sums to:
๏ฃฎ
โ2
32วซ
X
E[Z] = E ๏ฃฐ
X
i=1 vโV
๏ฃน
Zi,v ๏ฃป =
โ2
32วซ
X
i=1
E
"
X
v
#
Zi,v โฅ
โ2
32วซ
X
วซ2 /8 = 4.
i=1
Using the Chernoff Bound from Fact 2.4 with ฮด = 3/4 and ยต โฅ 4 gives
P r[Z < 1] โค P r[Z < (1 โ ฮด)ยต] < (
eโ3/4
)4 = 4/e3 < 2/3,
(1 โ (3/4))(1โ(3/4))
and hence with probability at least 2/3 at least one triangle is detected and the associated vertex
outputs reject, which completes the proof.
In every iteration, each vertex initiates only two messages of size O(log n) bits, one sent to w1
and one sent back by w1 . Since there are O(วซโ2 ) iterations, this implies that the number of rounds
is O(วซโ2 ) as well. This, together with Lemma 4.4, completes the proof of Theorem 4.1.
5
Distributed bipartiteness test for bounded degree graphs
In this section we show a distributed วซ-test for being bipartite for graphs with degrees bounded by
d. Our test builds upon the sequential test of [19] and, as in the case of triangle freeness, takes
advantage of the ability to parallelize queries. While the number of queries of the sequential test is
12
โ
โฆ( n) [20], the number of rounds in the distributed test is only polylogarithmic in n and polynomial
in วซโ1 . As in [19], we assume that d is a constant, and omit it from our expressions (it is implicit
in the O notation for L below).
Let us first outline the algorithm of [19], since our distributed test borrows from its framework
and our analysis is in part derived from it. The sequential test basically tries to detect odd cycles.
It consists of T iterations, in each of which a vertex s is selected uniformly at random and K
random walks of length L are performed starting from the source s. If, in any iteration with a
chosen source s, there is a vertex v which is reached by an even prefix of a random walk and an odd
prefix of a random walk (possibly the same walk), then the algorithm rejects, as this indicates the
existence of an odd cycle. Otherwise, the algorithm accepts. To obtain an วซ-test the parameters
โ
are chosen to be T = O(วซโ1 ), K = O(วซโ4 n log1/2 (nวซโ1 )), and L = O(วซโ8 log6 n).
The main approach of our distributed test is similar, except that a key ingredient is that we
can afford to perform much fewer random walks from every vertex, namely O(poly(วซโ1 log nวซโ1 )).
This is because we can run random walks in parallel originating from all vertices at once. However,
a crucial challenge that we need to address is that several random walks may collide on an edge,
violating its congestion bound. To address this issue, our central observation is that lazy random
walks (chosen to have a uniform stationary distribution) provide for a very low probability of having
too many of these collisions at once. The main part of the analysis is in showing that with high
probability there will never be too many walks concurrently in the same vertex, so we can comply
with the congestion bound. We begin by formally defining the lazy random walks that we use.
Definition 5.1. A lazy random walk over a graph G with degree bound d is a random walk, that
is, a (memory-less) sequence of random variables Y1 , Y2 , . . . taking values from the vertex set V ,
where the transition probability P r[Yk = v|Ykโ1 = u] is 1/2d if uv is an edge of G, 1 โ deg(u)/2d
if u = v, and 0 in all other cases.
The stationary distribution for the lazy random walk of Definition 5.1 is uniform [34, Section
8]. Next, we describe a procedure to handle one iteration of moving the random walks (Algorithm 3), followed by our distributed test for bipartiteness using lazy random walks from every
vertex concurrently (Algorithm 4).
It is quite immediate that Algorithm 3 takes O(ฮพ) communication rounds.
Our main result here is that Algorithm 4 is indeed a distributed วซ-test for bipartiteness.
Theorem 5.2. Algorithm 4 is a distributed วซ-test in the bounded degree graph model for the property
of being bipartite, that requires O(poly(วซโ1 log(nวซโ1 ))) rounds.
The number of communication rounds is immediate from the algorithm โ it is dominated by the
L calls to Algorithm 3, making a total of O(ฮพL) rounds, which is indeed O(poly(วซโ1 log(nวซโ1 ))).
To prove the rest of Theorem 5.2 we need some notation, and a lemma from [19] that bounds from
below the probabilities for detecting odd cycles if G is วซ-far from being bipartite.
Given a source s, if there is a vertex v which is reached by an even prefix of a random walk
wi from s and an odd prefix of a random walk wj from s, we say that walks wi and wj detect a
violation. Let ps (k, โ) be the probability that, out of k random walks of length โ starting from
s, there are two that detect a violation. Using this notation, ps (K, L) is the probability that the
sequential algorithm outlined in the beginning rejects in an iteration in which s is chosen. Since
we are only interested in walks of length L, we denote ps (k) = ps (k, L). A good vertex is a vertex
for which this probability is bounded as follows.
13
Algorithm 3: Move random walks once with input ฮพ
Variables: Wv walks residing in v (multiset), Hv history of walks through v
Input: ฮพ, the maximum congestion per vertex allowed
# each walk is characterized by (i, u) where i is the number of actual moves
and u is the origin vertex
1 for each vertex v simultaneously
2
if |Wv | โค ฮพ then # give up if exceeded the maximum allowed
3
for every (i, u) in Wv do
4
draw next destination w (according to the lazy walk scheme)
5
if w 6= v then # walk exits v
6
send (i + 1, u) to w
7
remove (i, u) from Wv
8
9
wait until the maximum time for all other vertices to process up to ฮพ walks
add the walks received by v to Wv and Hv # walks entering v
Algorithm 4: Distributed bipartiteness test
Variables: Wv walks residing in v (multiset), Hv history of walks through v
1 perform ฮท = O(วซโ9 log(nวซโ1 )) times
2
for each vertex v simultaneously
3
initialize Hv and Wv with two copies of the walk (0, v)
4
5
6
7
8
9
perform L = O(วซโ8 log6 n) times
move walks using Algorithm 3 with input ฮพ = ฮณ + 2 = 3(2 ln n + ln L) + 2
for each vertex v simultaneously
if Hv contains (i, u) and (j, u) for some u, even i and odd j then
reject (ending all operations) # odd cycle found
accept (for vertices that did not reject)
Definition 5.3. A vertex s is called good if ps (K) โฅ 1/10.
In [19] it was proved that being far from bipartite implies having many good vertices.
Lemma 5.4 ( [19]). If G is วซ-far from being bipartite then at least an วซ/16-fraction of the vertices
are good.
In contrast to [19], we do not perform K random walks from every vertex in each iteration, but
rather only 2. Hence, what we need for our analysis is a bound on ps (2). To this end, we use K as
a parameter, and express ps (2) in terms of K and ps (K).
Lemma 5.5. For every vertex s, ps (2) โฅ 2ps (K)/K(K โ 1).
Proof. Fix a source vertex s. For every i, j โ [K], let qi,j be the probability of walks wi , wj from s
detecting a violation. Because different walks are independent, we conclude that for every i 6= j it
14
holds that qi,j = ps (2). Let Ai,j be the event of walks wi , wj detecting a violation. We have
ps (K) = P r[โชi,j Ai,j ] โค
X
i,j
P r[Ai,j ] = ps (2)K(K โ 1)/2,
which implies that ps (2) โฅ 2ps (K)/K(K โ 1).
Using this relationship between ps (2) and K and ps (K), we prove that our algorithm is an
วซ-test. First we prove this for the random walks themselves, ignoring the possibility that Algorithm
3 will skip moving random walks due to its condition in Line 2.
Lemma 5.6. If G is วซ-far from being bipartite, and we perform ฮท iterations of starting 2 random
walks of length L from every vertex, then the probability that no violation is detected is bounded by
1/4.
Proof. Assume that G is วซ-far from being bipartite. By Lemma 5.4, at least nวซ/16 vertices are
P
good, which means that for each of these vertices s, ps (K) โฅ 1/10. This implies that sโV ps (K) โฅ
nวซ/160. Now, let Xi,s be a random variable indicating whether there are two random walks starting
P
P
at s that detect a violation. Let X = ฮทi=0 sโV Xi,s . We prove that P r[X < 1] < 1/4. First, we
P
bound E[ sโV Xi,s ] for some fixed i:
E[X] = E
" ฮท
XX
i=0 sโV
=
ฮท X
X
i=0 sโV
=
=
#
Xi,s =
ps (2) โฅ
ฮท X
X
E[Xi,s ]
i=0 sโV
ฮท X
X
i=0 sโV
ฮท X
X
2ps (K)
K(K โ 1)
ฮท
X nวซ
2
2
ps (K) โฅ
K(K โ 1) i=0 sโV
K(K โ 1) i=0 160
ฮทnวซ
ฮทnวซ
โฅ
.
80K(K โ 1)
80K 2
For ฮท = 320K 2 /nวซ = O(วซโ9 log(nวซโ1 )) it holds that E[X] โฅ 4. Using the Chernoff Bound of
Fact 2.4 with ฮด = 3/4 and ยต โฅ 4 gives:
P r[X < 1] โค P r[X < (1 โ ฮด)ยต] < (
eโ3/4
4
)4 = 3 < 1/4,
(1โ(3/4))
e
(1 โ (3/4))
which completes the proof.
As explained earlier, the main hurdle on the road to prove Theorem 5.2 is in proving that the
allowed congestion will not be exceeded. We prove the following general claim about the probability
for k lazy random walks of length โ from each vertex to exceed a maximum congestion factor of ฮพ
walks allowed in each vertex at the beginning of each iteration. Here, an iteration is a sequence of
rounds in which all walks are advanced by one step (whether or not they actually switch vertices).
Lemma 5.7. With probability at least 1 โ 1/n, running k lazy random walks of length โ originating
from every vertex will not exceed the maximum congestion factor of ฮพ = ฮณ + k = 3(2 ln n + ln โ) + k
walks allowed in each vertex at the beginning of each iteration, if ฮณ > k.
15
We show below that plugging k = 2, โ = L and ฮณ = 3(2 ln n + ln L) in Lemma 5.7, together
with Lemma 5.6, gives the correctness of Algorithm 4.
To prove Lemma 5.7, we argue that it is unlikely for any vertex to have more than k + ฮณ walks
in any iteration. Given that this is indeed the case in every iteration, the lemma follows by a union
bound. We denote by Xv,i the random variable whose value is the number of random walks at
vertex v at the beginning of the i-th iteration. That is, it is equal to the size of the set Wv in the
description of the algorithm.
Lemma 5.8. For every vertex v โ V and every iteration i it holds that E[Xv,i ] = k.
Proof. Let us first define random variables for our walks. Enumerating our kn walks (k from each
of the n vertices) arbitrarily, let Y1r , Y2r , . . . denote the sequence corresponding to the rโth walk,
that is, Yir is the vertex where the rโth walk is stationed at the beginning of the iโth iteration. In
particular, Xv,i = |{r : Yir = v}|.
Now let us define new random variables Zit in the following manner: First, we choose uniformly
ฯ(t)
for all 1 โค i โค โ and 1 โค t โค kn.
at random a permutation ฯ : [rk] โ [rk]. Then we set Zit = Yi
t
t
The main thing to note is that for any fixed t, Z1 , Z2 , . . . is a random walk (as it is equal to one of
the random walks Y1r , Y2r , . . .). But also, for every t, Z1t is uniformly distributed over the vertex set
of G, because we started with exactly k random walks from every vertex. Additionally, since the
uniform distribution is stationary for our lazy walks, this means that the unconditional distribution
of each Zit is also uniform.
ฯ(t)
= v}| = |{t :
Now, since ฯ is a permutation, it holds that Xv,i = |{r : Yir = v}| = |{t : Yi
P
kn
t
t
Zi = v}|. The expectation (by linearity of expectation) is thus E[Xv,i ] = t=1 P r[Zi = v] = k.
We can now prove Lemma 5.7.
Proof of Lemma 5.7. We first claim that for every iteration i โ [โ] and every vertex v โ V , with
probability at least 1 โ 1/โn it holds that Xv,i โค k + ฮณ. To show this, first fix some v โ V . Let Zj,i
be the indicator variable for the event of walk wj residing at vertex v at the beginning of iteration i,
P
where j โ [kn]. Then Xv,i = kn
j=1 Zj,i , and the variables Zj,i , where j โ [kn], are all independent.
We use the Chernoff Bound of Fact 2.4 with ฮด = ฮณ/k โฅ 1 and ยต = k as proven in Lemma 5.8,
obtaining:
P r[Xv,i > k + ฮณ] = P r[Xv,i > (ฮณ/k + 1)k] < eโฮดยต/3 = eโฮณ/3 = eโ(2 ln n+ln โ) = 1/โn2 .
Applying the union bound over all vertices v โ V and all iterations i โ [โ], we obtain that with
probability at least 1 โ 1/n it holds that Xv,i โค k + ฮณ for all v and i.
Lemma 5.9. If G is bipartite then all vertices output accept in Algorithm 4. If G is วซ-far from
being bipartite, then with probability at least 2/3 there exists a vertex that outputs reject.
Proof. If G is bipartite then all vertices output accept in Algorithm 4, because there are no odd
cycles and thus no violation detecting walks.
If G is วซ-far from bipartite, we use Lemma 5.6, in conjunction with Lemma 5.7 with parameters
k = 2, โ = L and ฮณ = 3(2 ln n + ln L) as used by Algorithm 4. By a union bound the probability to
accept G will be bounded by 1/4 + 1/n < 1/3 (assuming n > 12), providing for the required bound
on the rejection probability.
Lemma 5.9, with the communication complexity analysis of Algorithm 4, gives Theorem 5.2.
16
6
Distributed test for cycle-freeness
In this section, we give a distributed algorithm to test if a graph G with m edges is cycle-free or if
at least วซm edges have to be removed to make it so. Intuitively, in order to search for cycles, one
can run a breadth-first search (BFS) and have a vertex output reject if two different paths reach
it. The downside of this exact solution is that its running time depends on the diameter of the
graph. To overcome this, a basic approach would be to run a BFS from each vertex of the graph,
but for shorter distances. However, running multiple BFSs simultaneously is expensive, due to the
congestion on the edges. Instead, we use a simple prioritization rule that drops BFS constructions
with lower priority, which makes sure that one BFS remains alive.5
Instead, our technique consists of three parts. First, we make the graph G sparser, by removing
each of its edges independently with probability วซ/2. We denote the sampled graph by Gโฒ and prove
that if G is far from being cycle-free then so is Gโฒ , and in particular, Gโฒ contains a cycle.
Then, we run a partial BFS over Gโฒ from each vertex, while prioritizing by ids: each vertex
keeps only the BFS that originates in the vertex with the largest id and drops the rest of the BFSs.
The length of this procedure is according to a threshold T = 20 log n/วซ. This gives detection of a
cycle that is contained in a component of Gโฒ with a low diameter of up to T , if such a cycle exists,
since a surviving BFS covers the component. Such a cycle is also a cycle in G. If no such cycle
exists in Gโฒ , then Gโฒ has a some component with diameter larger than T . For large components,
we take each surviving BFS that reached some vertex v at a certain distance โ, and from v we run
a new partial BFS in the original graph G. These BFSs are again prioritized, this time according
to the distance โ. Our main tool here is proving a claim that says that with high probability, if
there is a shortest path in Gโฒ of length T /2 between two vertices, then there is a cycle in G between
them of length at most T . This allows our BFSs on G to find such a cycle.
We start with the following combinatorial lemma that shows the above claim.
Lemma 6.1. Given a graph G, let Gโฒ be obtained by deleting each edge in G with probability วซ/2,
independently of other edges. Then, with probability at least 1 โ 1/n3 , every vertex v โ Gโฒ that has
a vertex w โ Gโฒ at a distance 10 log n/วซ, has a closed path passing through it in G, that contains a
simple cycle, of length at most 20 log n/วซ.
Proof. First, we show that for every pair u, v of vertices in G that are at a distance of โ = 10 log n/วซ,
one of the shortest paths between u and v is removed in the graph Gโฒ with high probability. For a
pair of vertices u and v at a distance โ in G, the probability that a shortest path is not removed
is (1 โ วซ/2)โ , which is at most 1/n5 . Therefore, by a union bound over all pairs of vertices, with
probability at least 1 โ 1/n3 , at least one edge is removed from at least one shortest path between
every pair of vertices that are at a distance of 10 log n/วซ. Conditioned on this, we prove the lemma.
Now, suppose that v and w are two vertices in Gโฒ at a distance of 10 log n/วซ. Let P โฒ be this
shortest path in Gโฒ . Suppose P is the shortest path between v and w in G. If |P | < 10 log n/วซ,
then this path is no longer present in Gโฒ (and thus distinct from P โฒ ) and P โช P โฒ is a closed path in
G, passing through v that has a simple cycle of length at most 20 log n/วซ. If |P | = 10 log n/วซ, then
there are at least two shortest paths between v and w in G of length 10 log n/วซ, the one in Gโฒ and
5
A more involved analysis of multiple prioritized BFS executions was used in [25], allowing all BFS executions to
fully finish in a short time without too much delay due to congestion. Since we require a much weaker guarantee, we
can avoid the strong full-fledged prioritization algorithm of [25] and settle for a simple rule that keeps one BFS tree
alive. Also, the multiple BFS construction of [28] does not fit our demands as it may not reach all desired vertices
within the required distance, in case there are many vertices that are closer.
17
one that was removed, which we choose for P . Therefore, P โช P โฒ is a closed path passing through
v of length at most 20 log n/วซ, and hence contains a simple cycle of length at most 20 log n/วซ in
it.
Next, we prove that indeed there is a high probability that Gโฒ contains a cycle if G is far from
being cycle-free.
Claim 6.2. If G is วซ-far from being cycle-free, then with probability at least 1 โ eโวซ
วซ/4-far from being cycle-free.
2 m/32
, Gโฒ is
Proof. The graph Gโฒ is obtained from G by deleting each edge with probability วซ/2 independently
of other edges. The expected number of edges that are deleted is วซm/2. Therefore, by the Chernoff
Bound from Fact 2.4, the probability that at least 3วซm/4 edges are deleted is at most exp(โวซ2 m/32),
and the claim follows.
We now describe a multiple-BFS algorithm that takes as input a length t and a priority condition
P over vertices, and starts performing a BFS from each vertex of the graph. This is done for t
steps, in each of which a vertex keeps only the BFS with the highest priority while dropping the
rest. Each vertex also maintains a list Lv of BFSs that have passed through it. The list Lv is a
list of 3-tuples (idu , โ, idp ), where idu is the id of the root of the BFS, โ is the depth of v in this
BFS tree and idp is the id of the parent of v in the BFS tree. Initially, each vertex v sets Lv to
include a BFS starting from itself, and then continues this BFS by sending the tuple (idv , 1, idv ) to
all its neighbors, where idv is the identifier of the vertex v. In an intermediate step, each vertex v
may receive a BFS tuple from each of its neighbors. The vertex v then adds these BFS tuples to
the list Lv and chooses one among Lv according to the priority condition P, proceeding with the
respective BFS and discontinuing the rest. Even when a BFS is discontinued, the information that
the BFS reached v is stored in the list Lv .
Algorithm 5 gives a formal description of the breadth-first search that we use in the testing
algorithm for cycle-freeness.
Algorithm 5: BFS with a priority condition
Input: Length L, Priority condition P
Variables: Lv list of BFS tuples passing through v
1 for each vertex v simultaneously
2
Initialize Lv to {(idv , 0, idv )}.
3
Send (idv , 1, idv ) to all neighbors of v.
4
5
6
7
8
9
perform L times times
for each vertex v simultaneously
if v receives (idu1 , โ1 , idp1 ), . . . , (idur , โr , idpr ) from its neighbors then
Add (idu1 , โ1 , idp1 ), . . . , (idur , โr , idpr ) to Lv .
Select (iduj , โj , idpj ) from Lv according to P over idui
Send (iduj , โj + 1, idv ) to all neighbors of v except pj .
We now give more informal details of the test for cycle-freeness. By Lemma 6.1, we know that if
there is a vertex v in Gโฒ that has a vertex w at a distance of T /2 = 10 log n/วซ, then there is a closed
18
path in G starting from v that contains a cycle of length 20 log n/วซ. In the first part, each vertex
gets its name as its vertex id, and performs a BFS on the graph Gโฒ in the hope of finding a cycle.
The BFS is performed using Algorithm 5, where the priority condition in the intermediate steps is
selecting the BFS with the lowest origin id. If the cycle is present in a component of diameter at
most 20 log n/วซ in Gโฒ , then it is discovered during this BFS. To check if there is a cycle, one needs
to find if there are appropriate tuples (idu , โ, idp ) and (idu , โโฒ , idpโฒ ) in Lv , for some vertex v.
If no cycle is discovered in this step, then we change the ids of the vertices in the following
way: The id of each vertex v is now a tuple (โ, v) where โ is the largest depth at which v occurs
in a BFS tree among all the breadth-first searches that reached v. We perform a BFS in G using
Algorithm 5, where the priority condition is to pick the BFS whose root has the lexicographically
highest id. If there is some vertex with โ โฅ 10 log n/วซ, then the highest priority vertex is such a
vertex, and by Lemma 6.1, the BFS starting from that vertex will detect a cycle in G.
Algorithm 6 gives a formal description of the tester for cycle-freeness.
Algorithm 6: Cycle-freeness test
Variables: Lv list of BFS tuples passing through v, vertex identifier idv
# Construct Gโฒ by deleting edges with probability วซ/2.
1 for each vertex v simultaneously
2
For each neighbor u < v, mark the edge e = (u, v) โ G with probability วซ/2 for deletion.
3
Send each marked edge e = (u, v) to its corresponding u.
4
Set idv = v.
5
6
7
8
9
10
11
12
13
14
15
16
17
for each vertex v simultaneously
Delete all edges incident on v that have been marked for deletion.
# Search for cycles in small diameter components.
use Algorithm 5 to
perform BFS on Gโฒ for 20 log n/วซ steps, with the priority condition being choosing the
BFS with the lowest root id.
for each vertex v simultaneously
If Lv contains two tuples (idu , โ, idp ) and (idu , โโฒ , idpโฒ ), output reject.
Set idv = (โj , v) where โj is the highest among all tuples (idui , โi , idpi ) in Lv .
use Algorithm 5 to
perform BFS on G for 10 log n/วซ steps, with the priority condition being choosing the
BFS with the lexicographically highest root id.
for each vertex v โ G simultaneously
If Lv contains two tuples (idu , โj , idp ) and (idu , โโฒ , idpโฒ ), output reject.
for each vertex v โ G simultaneously
output accept, if v did not output reject yet.
We now prove the correctness of the algorithm.
Theorem 6.3. Algorithm 6 is a distributed วซ-test in the general graph model for the property of
being cycle-free, that requires O(log n/วซ) rounds.
Proof. Notice that a vertex in Algorithm 6 outputs reject only when it detects a cycle. Therefore,
if G is cycle-free, then every vertex outputs accept with probability 1.
19
Suppose that G is วซ-far from being cycle-free. Notice that, with probability at least 1 โ 1/n3 ,
the assertion of Lemma 6.1 holds. Furthermore, from Claim 6.2, we know that Gโฒ is วซ/4-far from
2
being cycle-free, with probability 1 โ eโวซ m/32 , and hence contains at least one cycle. This cycle
could be in a component of diameter less than 20 log n/วซ or it could be in a component of diameter
at least 20 log n/วซ in Gโฒ . We analyse the two cases separately.
Suppose there is a cycle in a component C of Gโฒ of diameter at most 20 log n/วซ. Let u be the
vertex with the smallest id in C. In Algorithm 6, the BFS starting at u is always propagated at
any intermediate vertex due to the priority condition. Furthermore, since the diameter of C is at
most 20 log n/วซ, this BFS reaches all vertices of C. Hence, this BFS detects the cycle and at least
one vertex in C outputs reject.
On the other hand, if the cycle is present in a component in G of diameter at least 20 log n/วซ,
then after Step 11 of the algorithm, each vertex v gets the length of the longest path from the
origin, among all the BFSs that reached v, as the first component of its id. The vertex v that gets
the lexicographically highest id in the component has a vertex w that is at least 10 log n/วซ away in
Gโฒ , since the radius of the component is at least half the diameter. Therefore, by Lemma 6.1, it
is part of a cycle of length at most 20 log n/วซ in G. Hence, the vertex with the highest priority in
the BFS on G is a vertex u that has a vertex at a distance of at least 10 log n/วซ in Gโฒ , and there is
a walk through u that contain a simple cycle of length at most 20 log n/วซ. At least one vertex on
this simple cycle will output reject when Algorithm 6 is run on G.
The number of rounds is O(log n/วซ) since Algorithm 6 performs two breadth-first searches in
the graph with this number of rounds.
7
Lower bounds for testing bipartiteness and cycle-freeness
In this section, we prove that any distributed algorithm for วซ-testing bipartiteness or cycle-freeness
in bounded-degree graphs requires โฆ(log n) rounds of communication6 . We construct boundeddegree graphs that are วซ-far from being bipartite, such that all cycles are of length โฆ(log n). We
argue that any distributed algorithm that runs in O(log n) rounds does not detect a witness for nonbipartiteness. We also show that the same construction proves that every distributed algorithm
for วซ-testing cycle-freeness requires โฆ(log n) rounds of communication. Formally, we prove the
following theorem.
Theorem 7.1. Any distributed 1/100-test for the property of being bipartite requires โฆ(log n) rounds
of communication.
To prove Theorem 7.1, we show the existence of a graph Gโฒ that is far from being bipartite, but
all of its cycles are at least of logarithmic length. Since in T rounds of a distributed algorithm, the
output of every vertex cannot depend on vertices that are at distance greater than T from it, no
vertex can detect a cycle in Gโฒ in less than O(log n) rounds, which proves Theorem 7.1. To prove
the existence of Gโฒ we use the probabilistic method with alterations, and prove the following.
Lemma 7.2. Let G be a random graph on n vertices where each edge is present with probability
1000/n. Let Gโฒ be obtained by removing all edges incident with vertices of degree greater than
2000, and one edge from each cycle of length at most log n/ log 1000. Then with probability at least
1/2 โ eโ100 โ eโn , Gโฒ is 1/100-far from being bipartite.
6
Our lower bound applies even to the less restricted LOCAL model of communication, which does not limit the
size of the messages.
20
Since a graph that is วซ-far from being bipartite is also วซ-far from being cycle-free, we immediately
obtain the same lower bound for testing cycle-freeness, as follows.
Theorem 7.3. Any distributed 1/100-test for the property of being cycle-free requires โฆ(log n)
rounds of communication.
The rest of this section is devoted to proving Lemma 7.2. We need to show three properties of
(a) that it is far from being bipartite, (b) that it does not have small cycles, and (c) that its
maximum degree is bounded. We begin with the following definition, which is similar in spirit to
being far from satisfying a property and which will assist us in our proof.
Gโฒ :
Definition 7.4. A graph G is k-removed from being bipartite if at least k edges have to be removed
from G to make it bipartite.
Note that a graph G with maximum degree d, is ฮต-far from being bipartite if it is ฮตdn-removed
from being bipartite.
Let G be a random graph on n vertices where for each pair of vertices, an edge is present with
probability 1000/n. The expected number of edges in the graph is 500(n โ 1). Since the edges
are sampled independently with probability 1000/n, by the Chernoff Bound from Fact 2.4, with
probability at least 1 โ eโ10n the graph has at least 400n edges. We now show that G is far from
being bipartite, with high probability.
Lemma 7.5 (far from being bipartite). With probability at least 1 โ eโ199n , G is 20n-far from
being bipartite.
Proof. Fix a bipartition (L, R) of the vertex set of G such that |L| โฅ n/2. For each pair of
vertices u, v โ L, let Xu,v be a random variable which is 1 if the edge (u, v) is present in G and 0
P
otherwise. Its expected value is E[Xu,v ] = 1000/n. The random variable X = u,vโL Xu,v counts
the number of edges within L. By the linearity of expectation, E[X] โฅ n/2
2 1000/n โฅ 30n. Since
the random variables Xu,v are independent, by the Chernoff Bound from Fact 2.4, we have that
Pr[X < 20n] โค exp(โ200n). Therefore, with probability at least 1 โ exp(โ200n), there are at least
20n edges within L. The total number of such bipartitions of G is at most 2nโ1 . Taking a union
bound over all such bipartitions, the probability that at least one of the bipartitions contains less
than 20n edges within its L side is at most exp(โ199n), and the lemma follows.
The expected degree of a vertex v in G is 1000(1โ 1/n). Therefore, by the Chernoff Bound from
Fact 2.4, the probability that the degree of v is greater than 2000 is at most exp(โ300(1 โ 1/n)).
We now show that, with sufficiently high probability, the number of edges that are incident with
high degree vertices is small. We can remove all such edges to obtain a bounded-degree graph that
is still far from being bipartite.
Lemma 7.6 (mostly bounded degrees). With probability at least 1 โ eโ100 , there are at most
n edges that are incident with vertices of degree greater than 2000 in G.
Proof. For a pair u, v of vertices, the probability that there is an edge between them and that one
of u or v is of degree greater than 2000 is Pr[(u, v) โ E] ยท Pr[u or v has degree โฅ 2000|(u, v) โ E].
This is at most (1000/n) ยท 2 ยท exp(โ300(1 โ 1/n)). Therefore, the expected number of edges that
are incident with a vertex of degree greater than 2000 is at most 1000n ยท exp(โ300(1 โ 1/n)). By
Markovโs inequality, the probability that there are at least n edges that are incident with vertices
of degree greater than 2000 is at most 1000 ยท exp(โ300(1 โ 1/n)). This completes the proof of the
lemma.
21
We now bound the number of cycles of length at most O(log n) in the graph G.
Lemma 7.7 (few small cycles). With probability at least 1/2, there are at most 2n cycles of
length at most log n/ log 1000 in G.
Proof. For any k fixed vertices, the probability that there is a cycle among the k vertices is at
most k!(1000/n)k . Therefore the expected number of cycles in G of length at most k is at most
1000k . For k = log n/ log 1000, this means that the expected number of cycles in G of length at
most log n/ log 1000 is n. Therefore, with probability at least 1/2 there are at most 2n cycles of
length at most log n/ log 1000 in G.
We are now ready to prove Lemma 7.2, completing our lower bounds. Intuitively, since G does
not contain many high degree vertices and many small cycles, removing them to obtain Gโฒ only
changes the distance from being bipartite by a small term.
Proof. With probability 1 โ eโn , there are at least 400n edges in G and by Lemma 7.5 G is 20nremoved from being bipartite. By Lemma 7.6, with probability at least 1 โ eโ100 , there are at most
n edges incident with vertices of degree greater than 2000 and by Lemma 7.7 with probability at
least 1/2 there are at most 2n cycles of length at most log n/ log 1000. Hence, with probability at
least 1/2 โ eโ100 โ eโn , Gโฒ is a graph with degree at most 2000 that is 17n-removed from being
bipartite. Therefore, Gโฒ is 1/100-far from being bipartite.
8
Discussion
This paper initiates a thorough study of distributed property testing. It provides an emulation
technique for the dense graph model and constructs fast distributed algorithms for testing trianglefreeness, cycle-freeness and bipartiteness. We also present lower bounds for both bipartiteness and
triangle freeness.
This work raises many important open questions, the immediate of which is to devise fast
distributed testing algorithms for additional problems. One example is testing freeness of other
small subgraphs. More ambitious goals are to handle dynamic graphs, and to find more general
connections between testability in the sequential model and the distributed model. Finally, there
is fertile ground for obtaining additional lower bounds in this setting, in order to fully understand
the complexity of distributed property testing.
References
[1] Noga Alon, Chen Avin, Michal Kouckรฝ, Gady Kozma, Zvi Lotker, and Mark R. Tuttle. Many
random walks are faster than one. Combinatorics, Probability & Computing, 20(4):481โ502,
2011.
[2] Noga Alon, Tali Kaufman, Michael Krivelevich, and Dana Ron. Testing triangle-freeness in
general graphs. SIAM J. Discrete Math., 22(2):786โ819, 2008.
[3] Noga Alon and Michael Krivelevich. Testing k-colorability. SIAM J. Discrete Math., 15(2):211โ
227, 2002.
22
[4] Noga Alon and Asaf Shapira. A characterization of the (natural) graph properties testable
with one-sided error. SIAM J. Comput., 37(6):1703โ1727, 2008.
[5] Heger Arfaoui, Pierre Fraigniaud, David Ilcinkas, and Fabien Mathieu. Distributedly testing
cycle-freeness. In Graph-Theoretic Concepts in Computer Science - 40th International Workshop, WG 2014, Nouan-le-Fuzelier, France, June 25-27, 2014. Revised Selected Papers, pages
15โ28, 2014.
[6] Mor Baruch, Pierre Fraigniaud, and Boaz Patt-Shamir. Randomized proof-labeling schemes.
In Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing, PODC
2015, Donostia-San Sebastiรกn, Spain, July 21 - 23, 2015, pages 315โ324, 2015.
[7] Manuel Blum, Michael Luby, and Ronitt Rubinfeld. Self-testing/correcting with applications
to numerical problems. J. Comput. Syst. Sci., 47(3):549โ595, 1993.
[8] Zvika Brakerski and Boaz Patt-Shamir. Distributed discovery of large near-cliques. Distributed
Computing, 24(2):79โ89, 2011.
[9] Keren Censor-Hillel, Petteri Kaski, Janne H. Korhonen, Christoph Lenzen, Ami Paz, and
Jukka Suomela. Algebraic methods in the congested clique. In Proceedings of the 2015 ACM
Symposium on Principles of Distributed Computing, PODC 2015, Donostia-San Sebastiรกn,
Spain, July 21 - 23, 2015, pages 143โ152, 2015.
[10] Maria Chudnovsky, Neil Robertson, Paul Seymour, and Robin Thomas. The strong perfect
graph theorem. ANNALS OF MATHEMATICS, 164:51โ229, 2006.
[11] Danny Dolev, Christoph Lenzen, and Shir Peled. "tri, tri again": Finding triangles and small
subgraphs in a distributed setting - (extended abstract). In Distributed Computing - 26th
International Symposium, DISC 2012, Salvador, Brazil, October 16-18, 2012. Proceedings,
pages 195โ209, 2012.
[12] Andrew Drucker, Fabian Kuhn, and Rotem Oshman. The communication complexity of distributed task allocation. In ACM Symposium on Principles of Distributed Computing, PODC
โ12, Funchal, Madeira, Portugal, July 16-18, 2012, pages 67โ76, 2012.
[13] Paul Erdรถs. Graph theory and probability. canad. J. Math, 11:34G38, 1959.
[14] Eldar Fischer. The art of uninformed decisions: A primer to property testing. Current Trends
in Theoretical Computer Science: The Challenge of the New Century, I:229โ264, 2004.
[15] Klaus-Tycho Foerster, Thomas Luedi, Jochen Seidel, and Roger Wattenhofer. Local checkability, no strings attached. In Proceedings of the 17th International Conference on Distributed
Computing and Networking, ICDCN 2016, Singapore, January 4-7, 2016., 2016.
[16] Jacob Fox. A new proof of the graph removal lemma. CoRR, abs/1006.1300, 2010.
[17] Mohsen Ghaffari, Fabian Kuhn, and Hsin-Hao Su. Manuscript. 2016.
[18] Oded Goldreich, Shafi Goldwasser, and Dana Ron. Property testing and its connection to
learning and approximation. J. ACM, 45(4):653โ750, 1998.
23
[19] Oded Goldreich and Dana Ron. A sublinear bipartiteness tester for bounded degree graphs.
Combinatorica, 19(3):335โ373, 1999.
[20] Oded Goldreich and Dana Ron. Property testing in bounded degree graphs. Algorithmica,
32(2):302โ343, 2002.
[21] Oded Goldreich and Dana Ron. Algorithmic aspects of property testing in the dense graphs
model. In Property Testing - Current Research and Surveys [outgrow of a workshop at the
Institute for Computer Science (ITCS) at Tsinghua University, January 2010], pages 295โ
305, 2010.
[22] Oded Goldreich and Luca Trevisan. Three theorems regarding testing graph properties. Random Struct. Algorithms, 23(1):23โ57, 2003.
[23] Mika Gรถรถs, Juho Hirvonen, Reut Levi, Moti Medina, and Jukka Suomela. Non-local probes
do not help with graph problems. CoRR, abs/1512.05411, 2015.
[24] Juho Hirvonen, Joel Rybicki, Stefan Schmid, and Jukka Suomela. Large cuts with local
algorithms on triangle-free graphs. CoRR, abs/1402.2543, 2014.
[25] Stephan Holzer and Roger Wattenhofer. Optimal distributed all pairs shortest paths and applications. In Proceedings of the 2012 ACM Symposium on Principles of Distributed Computing,
PODC โ12, pages 355โ364, New York, NY, USA, 2012. ACM.
[26] Jarkko Kari, Martรญn Matamala, Ivan Rapaport, and Ville Salo. Solving the induced subgraph
problem in the randomized multiparty simultaneous messages model. In Structural Information and Communication Complexity - 22nd International Colloquium, SIROCCO 2015,
Montserrat, Spain, July 14-16, 2015, Post-Proceedings, pages 370โ384, 2015.
[27] Amos Korman, Shay Kutten, and David Peleg. Proof labeling schemes. Distributed Computing,
22(4):215โ233, 2010.
[28] Christoph Lenzen and David Peleg. Efficient distributed source detection with limited bandwidth. In ACM Symposium on Principles of Distributed Computing, PODC โ13, Montreal,
QC, Canada, July 22-24, 2013, pages 375โ382, 2013.
[29] Michael Mitzenmacher and Eli Upfal. Probability and computing - randomized algorithms and
probabilistic analysis. Cambridge University Press, 2005.
[30] Michal Parnas and Dana Ron. Approximating the minimum vertex cover in sublinear time
and a connection to distributed algorithms. Theor. Comput. Sci., 381(1-3):183โ196, 2007.
[31] David Peleg. Distributed Computing: A Locality-Sensitive Approach. Society for Industrial
and Applied Mathematics, 2000.
[32] Seth Pettie and Hsin-Hao Su. Distributed coloring algorithms for triangle-free graphs. Inf.
Comput., 243:263โ280, 2015.
[33] Dana Ron. Property testing: A learning theory perspective. Foundations and Trends in
Machine Learning, 1(3):307โ402, 2008.
24
[34] Dana Ron. Algorithmic and analysis techniques in property testing. Foundations and Trends
in Theoretical Computer Science, 5(2):73โ205, 2009.
[35] Ronitt Rubinfeld and Madhu Sudan. Robust characterizations of polynomials with applications
to program testing. SIAM J. Comput., 25(2):252โ271, 1996.
[36] Atish Das Sarma, Stephan Holzer, Liah Kor, Amos Korman, Danupon Nanongkai, Gopal
Pandurangan, David Peleg, and Roger Wattenhofer. Distributed verification and hardness of
distributed approximation. SIAM J. Comput., 41(5):1235โ1265, 2012.
[37] Atish Das Sarma, Danupon Nanongkai, Gopal Pandurangan, and Prasad Tetali. Distributed
random walks. J. ACM, 60(1):2, 2013.
25
| 8cs.DS
|
arXiv:1802.07995v2 [math.PR] 23 Feb 2018
Multidimensional multiscale scanning in
Exponential Families: Limit theory and
statistical consequences
Claudia Koฬnig
[email protected]
Institute for Mathematical Stochastics, University of Goฬttingen
Axel Munk
[email protected]
Institute for Mathematical Stochastics, University of Goฬttingen
and
Felix Bernstein Institute for Mathematical Statistics in the Bioscience,
University of Goฬttingen
and
Max Planck Institute for Biophysical Chemistry, Goฬttingen, Germany
Frank Werner1
[email protected]
Institute for Mathematical Stochastics, University of Goฬttingen
and
Max Planck Institute for Biophysical Chemistry, Goฬttingen, Germany
In this paper we consider the problem of finding anomalies in a d-dimensional field
of independent random variables tYi uiPt1,...,nud , each distributed according to a onedimensional natural exponential family F โ tFฮธ uฮธPฮ . Given some baseline parameter
ฮธ0 P ฮ, the field is scanned using local likelihood ratio tests to detect from a (large)
d
given system of regions R those regions R ฤ t1, ..., nu with ฮธi โฐ ฮธ0 for some i P R. We
provide a unified methodology which controls the overall family wise error (FWER) to
make a wrong detection at a given error rate.
Fundamental to our method is a Gaussian approximation of the asymptotic distribution of the underlying multiscale scanning test statistic with explicit rate of convergence. From this, we obtain a weak limit theorem which can be seen as a generalized
weak invariance principle to non identically distributed data and is of independent interest. Furthermore, we give an asymptotic expansion of the procedures power, which
yields minimax optimality in case of Gaussian observations.
Keywords: exponential families, multiscale testing, invariance principle, scan statistic, weak
limit, family wise error rate
AMS classification numbers: Primary 60F17, 62H10, Secondary 60G50, 62F03.
1 Introduction
Suppose we observe an independent, d-dimensional field Y of random variables
Yi โ Fฮธi ,
1 Corresponding
i P Ind :โ t1, ..., nud ,
author
1
(1)
where each observation is drawn from the same given one-dimensional natural exponential family
model F โ tFฮธ uฮธPฮ , but with potentially different parameters ฮธi . Prominent examples include
Yi with varying normal means ยตi or a Poisson field with varying intensities ฮปi . Given some baseline parameter ฮธ0 P ฮ (e.g. all ยตi โ 0 for a Gaussian field), we consider the problem of finding
anomalies (hot spots) in the field Y , i.e. we aim to identify those regions R ฤ Ind where ฮธi โฐ ฮธ0
d
for some i P R. Here R runs through a given family of candidate regions R P Rn ฤ 2In with the
power set 2X of some set X. For simplicity, we will suppress the subindex n whenever it is clear
from the context, i.e. write R โ Rn in what follows. Such problems occur in numerous areas
of application ranging from astronomy and biophysics to genetics engineering, specific examples
include detection in radiographic images (Kazantsev et al., 2002), genome screening (Jiang et al.,
2016) and object detection in astrophysical image analysis (Friedenberg and Genovese, 2013), to
mention a few. Our setting includes the important special cases of Gaussian (Arias-Castro et al.,
2005; Sharpnack and Arias-Castro, 2016), Bernoulli (Walther, 2010), and Poisson random fields
(Zhang et al., 2016). Extensions to models without exponential family structure as well as replacing the baseline parameter ฮธ0 by a varying field of known baseline intensities can be treated as
well (cf. Remark 2.1 below), but to keep the presentation simple, we restrict ourselves to the afore
mentioned setting.
Inline with the above mentioned references (see also Section 1.2), the problem of finding hot
spots is regarded as a multiple testing problem, i.e. many โlocalโ tests on the regions R are
performed simultaneously, while keeping the overall error of wrong detections controllable. For a
fixed region R P R the likelihood ratio test (LRT) for the testing problem
@ i P R : ฮธi โ ฮธ0
(HR,n )
D i P R s.t. ฮธi โฐ ฮธ0 ,
(KR,n )
vs.
is a powerful test in general, and often known to have certain optimality properties (depending
on the structure of R, see e.g. Lehmann and Romano (2005)). Therefore, the LRT will always be
considered throughout this paper as the โlocalโ test. We stress, however, that our methodology
could also be used for other systems of local tests, provided they obey a sufficiently well behaving
asymptotic expansion. The LRT is based on the test statistic
d
ล
ห
ห
supฮธฤ
0 iPR fฮธ pYi q
ล
,
(2)
TR pY, ฮธ0 q :โ 2 log
iPR fฮธ0 pYi q
where fฮธ denotes the density of Fฮธ , and HR,n is rejected when TR pY, ฮธ0 q is too large. As it is not
known a priori which regions R might contain anomalies, i.e. for which R P R the alternative
(KR,n ) might hold true, it is of great importance to control the family wise error arising from
the multiple test decisions of the local tests based on TR pY, ฮธ0 q, R P R. Obviously, without any
further restriction on the complexity of R this error cannot be controlled. To this end, we will
assume that the regions R can be represented as a sequence of discretized regions in
ห
(
R โ Rn :โ R ฤ Ind ห R โ Ind X nRห for some Rห P Rห
(3)
d
for some system of subsets (e.g. all hypercubes) of the unit cube Rห ฤ 2r0,1s , to be specified later.
This gives rise to the sequence of multiple testing problems
HR,n vs. KR,n
simultaneously over Rn .
(4)
The aim of this paper is to provide methodology to control (asymptotically) the family wise error
rate (FWER) ฮฑ P p0, 1q when (4) is considered as a multiple testing problem, i.e. to provide a
multiple test ฯ for (4) (see e.g. Dickhaus, 2014) such that
sup PHR,n rโany false rejection by ฯโs ฤ ฮฑ ` op1q
RPRn
2
as
n ร 8.
(5)
In words, this ensures that the probability of making any wrong detection is controlled by a given
error level ฮฑ, as n ร 8.
This task has been the focus of several papers during the last decades, for a detailed discussion see Section 1.2. We contribute to this field by providing a general theory for a unifying method in the model (1), which includes not only Gaussian (Arias-Castro et al., 2005;
Sharpnack and Arias-Castro, 2016; Kou, 2017; Cheng and Schwartzman, 2017), but also Bernoulli
(Walther, 2010) or Poissonian observations (Kulldorff et al., 2005; Rivera and Walther, 2013; Tu,
2013; Zhang et al., 2016). In view of (Arias-Castro et al., 2011), where also observations from
exponential families as in (1) are discussed, but the local tests are always as in the Gaussian case,
we emphasize that our local test are of type (2), hence exploiting the likelihood in the exponential
family, which will result in improved power (see Frick et al. (2014) for d โ 1). Our main technical
contribution is to prove a weak limit theorem for the asymptotic distribution of our test statistic
for general exponential family models as in (1) and arbitrary dimension d. This can be viewed
as a โmultiscaleโ weak invariance principle for independent but not necessarily identically distributed r.v.โs. Further, we will provide an asymptotic expansion of the testโs power which leads
to minimax optimal detection of the test in specific models.
1.1 Multiscale testing
Our test will be of scanning-type, controlling the FWER by the maximum over the local LRT
statistics in (2), i.e.
Tn โ Tn pY, ฮธ0 , Rn , vq :โ max rTR pY, ฮธ0 q ยด penv p|R|qs .
RPRn
Here |R| denotes the number of points in R. The values
b
penv prq :โ 2v plog pnd {rq ` 1q
(6)
(7)
where log denotes the natural logarithm, act as a scale penalization, which is necessary to guarantee optimal detection power on all scales simultaneously as it prevents smaller regions from
dominating the overall test statistic, as noticed by Duฬmbgen and Spokoiny (2001) and others (see
e.g. Duฬmbgen and Walther, 2008; Walther, 2010; Frick et al., 2014). The constant v in (6) can
be any upper bound of VRห which is given as the complexity of Rห , measured in terms of the
packing number (see Remark 2.2 below). Whenever Rห has finite VC-dimension ฮฝ pRห q, we can
choose VRห โ ฮฝ pRห q, however, the test will have better detection properties if v is as small as
possible with this property (see Section 2.3). Hence, from this point of view it is advantageous to
know exactly the complexity VRห of Rห , a topic which has received less attention than computing
VC-dimensions. Therefore, we compute the packing numbers for three important examples of Rห ,
namely hyperrectangles, hypercubes and halfspaces explicitly in the appendix.
To construct a test which controls the FWER (5), we have to find a sequence of universal global
thresholds q1ยดฮฑ,n such that
P0 rTn ฤ
q1ยดฮฑ,n s ฤ ฮฑ ` op1q,
(8)
where P0 :โ PHI d ,n corresponds to the case that no anomaly is present. Such a threshold suffices,
n
as it can be readily seen that
โ
โฐ
sup PHR,n rโany false rejection in Rโs ฤ P0 โany false rejection in Ind โ .
RPRn
Given q1ยดฮฑ,n , the multiple test then will reject whenever Tn ฤ q1ยดฮฑ,n , and each local test rejects
if TR pY, ฮธ0 q ฤ q1ยดฮฑ,n ` penv p|R|q. Due to (6) and (8), any of these rejections is correct with
probability ฤ 1 ยด ฮฑ, asymptotically.
To obtain the thresholds q1ยดฮฑ,n we provide a Gaussian approximation of the scan statistic (6)
under P0 given by
ห
ห
๏ฌ
ยซ
หรฟ ห
ห
ห
ยด1{2
Mn โ Mn pRn , vq :โ max |R|
(9)
ห Xi ห ยด penv p|R|q
RPRn
หiPR ห
3
with i.i.d. standard normal r.v.โs Xi , i P Ind (Thm. 2.4). We also give a rate of convergence of
this approximation (Thm. 2.5), which is determined by the smallest scale in Rn . Based on these
results, we obtain the P0 -limiting distribution of Tn as that of
ยซ
๏ฌ
ห
`
ห
|W
pR
q|
a
M โ M pRห , vq :โ sup
ยด penv nd |Rห | ฤ 8 a.s.,
(10)
|Rห |
Rห PRห
d
where W is white noise on r0, 1s and (with a slight abuse of notation) |Rห | denotes the Lebesgue
measure of Rห P Rห . This holds true as soon as Rห and Rn have a finite complexity, Rห consists
of sets with a sufficiently regular boundary (see Assumption 1 below), and the smallest scales |Rn |
of the system Rn are restricted suitably, see (12) and the discussion there.
In case of Rห being the subset of all hypercubes, we will also give an asymptotic expansion of the
above testโs power, which allows to determine the necessary average strength of an anomaly such
that it will be detected with asymptotic probability 1. This is only possible due to the penalization
in (6), as otherwise the asymptotic distribution is not a.s. finite. If the anomaly is sufficiently small,
we show that the anomalies which can be detected with asymptotic power one by the described
multiscale testing procedure are the same as those of the oracle single scale test, which knows the
size (scale) of the anomaly in advance. This generalizes findings of Sharpnack and Arias-Castro
(2016) to situations where not only the mean of the signal is allowed to change, but its whole
distribution. Furthermore, if the observations are Gaussian, our test with properly chosen v
achieves the asymptotic optimal detection boundary, i.e. no test can have larger power in a
minimax sense, asymptotically.
Note finally, that weak convergence of Tn to M as in (10) can be viewed as a generalized weak
invariance principle as the r.h.s. does not depend on any unknown quantity, and hence can be e.g.
simulated generically in advance for any given system R as soon as a bound for the complexity of
Rห can be determined.
1.2 Literature review and connections to existing work
Scan statistics and scanning-type procedures based on the maximum over an ensemble of local
tests have received much attention in the literature over the past decades. To determine the quantile, a common option is to approximate the tails of the asymptotic distribution suitably, as done
e.g. by Siegmund and Venkatraman (1995); Siegmund and Yakir (2000); Naus and Wallenstein
(2004); Pozdnyakov et al. (2005); Fang and Siegmund (2016) for d โ 1, by Haiman and Preda
(2006) for d โ 2, and by Jiang (2002) in arbitrary dimensions. If the random field is sufficiently
smooth (in contrast to the setting here) the Gaussian kinematic formula can be employed, see
e.g. Taylor and Worsley (2007), Adler (2000). We also mention Alm (1998), who considers the
situation of a fixed rectangular scanning set in two and three dimensions. In all these papers,
no penalization has been used, which automatically leads to a preference for small scales of order
logpnq (see e.g. Kabluchko and Munk, 2009) and to an extreme value limit, in contrast to (10).
Arias-Castro et al. (2017) study the case of an unknown null distribution and propose a permutation based approximation, which is shown to perform well in the natural exponential family
setting (1), however, only for d โ 1. Conceptually most related to our work are weak limit theorems for scale penalized scan statistics, which have e.g. been obtained by Frick et al. (2014) and
Sharpnack and Arias-Castro (2016). However, these results are either limited to special situations
such as Gaussian observations, or to d โ 1. If a limit exists, the quantiles of the finite sample
statistic can be bounded the quantiles by limiting ones as e.g. done by Duฬmbgen and Spokoiny
(2001); Rivera and Walther (2013).
Our results can be interpreted in both ways as we provide a Gaussian approximation of the scan
statistic in (6) by (9) and that we obtain (10) as a weak limit.
Weak limit theorems for Tn as in (6) are immediately connected to those for partial sum processes. Classical KMT-like approximations (see e.g. Komloฬs et al., 1976; Rio, 1993; Massart, 1989)
provide in fact a strong coupling of the whole process pTR pY, ฮธ0 qqRPRn to a Gaussian version.
Results of this form have been employed for d โ 1 previously in Schmidt-Hieber et al. (2013);
4
Frick et al. (2014). Proceeding like this for general d will restrict the system Rn to scales rn s.t.
|R| ฤ rn where
ndยด1 logpnq โ o prn q
(11)
as n ร 8, which is unfeasibly large for d ฤ 2. Therefore, we take a different route and employ
a coupling of the maxima in (6) and (9), which relies on recent results by Chernozhukov et al.
(2014), see also Proksch et al. (2017). However, in contrast to the present paper, they do not
consider the local LR statistic and require that the largest scale has to go to zero. This leads to an
extreme value type limit in contrast to (10) which incorporates all (larger) scales. To make use of
Chernozhukov et al.โs (2014) coupling results in our general setting, we provide a symmetrizationlike upper bound for the expectation of the maximum of a partial sum process by a corresponding
Gaussian version, cf. Proposition 3.2. Doing so we are able to approximate the distribution of Tn
in (6) by (9) as soon as we restrict ourselves to R P Rn with |R| ฤ rn where the smallest scales
only need to satisfy
log12 pnq โ o prn q as n ร 8,
(12)
which compared to (11) allows for considerably smaller scales whenever d ฤ 2. Note that the
lower scale restriction (12) does not to depend on d. However, as we consider sets in Ind here,
d
the corresponding lower an bound for sets in Rห ฤ 2r0,1s is nยดd log12 pnq โ o pan q, which in fact
depends on d as now the volume of the largest possible set has been standardized to one (see
(3) and Theorem 2.9 below) and coincides with the sampling rate nยดd up to a poly-log-factor.
In contrast, (11) gives nยด1 logpnq โ o pan q, independent
of d, which only
for d โ 1 achieves the
ยด`
ห1{10 ยฏ
12
ยดd
sampling rate n . Under (12) we also obtain OP log pnq{rn
as rate of convergence of
this approximation (see (18) below).
Also the asymptotic power of scanning-type procedures has been discussed in the literature. We
mention Walther (2010) who studies the detection of spacial clusters in a two dimensional Bernoulli
field, or Kabluchko (2011) who gives exact asymptotic expansions in a Gaussian setting. To obtain
optimal power on all scales, proper penalization is necessary, as e.g. stressed by Arias-Castro et al.
(2005) and Sharpnack and Arias-Castro (2016), who provide optimality results in one- and twodimensional Gaussian fields, respectively. Butucea and Ingster (2013) for d โ 2 and Kou (2017) for
general d provide optimality of scanning procedures for Gaussian fields. We are able to generalize
these results in case of Rห being the set of all hypercubes to our exponential family model (1),
despite the fact that under the alternative the whole distribution in (1) might change, whereas for
Gaussian fields typically only the mean changes. Doing so we obtain sharp detection thresholds,
which are known to be minimax in the Gaussian situation, if the parameter v in the penalization
(41) is chosen to be equal to the packing number of the system of hypercubes. In contrast, if v is
chosen to be the VC-dimension, the detection power turns out to be suboptimal. This emphasizes
the importance of knowledge of the packing number explicitly, and an illustrative example for this
will also be given in Example 2.8.
As a potential alternative, weaker error measures which do not control the FWER, such as the
false discovery rate (FDR) could be controlled (see e.g. Benjamini and Hochberg, 1995; Benjamini and Yekutieli,
2001; Li et al., 2016), but this is a different task and beyond the scope of our paper.
2 Theory
In this section we will summarize our theoretical findings. In Section 2.1 we give an overview
and details on our precise setting and present our assumptions on the set of candidate regions
Rห . Section 2.2 provides the validity of the Gaussian approximation in (9) and determines the
P0 -limiting distribution of Tn . In Section 2.3 we derive an asymptotic expansion of the detection
power.
5
2.1 Setting and Assumptions
In the following we assume that F โ tFฮธ uฮธPฮ in (1) is a one-dimensional exponential family, which is regular and minimal, i.e. the Lebesgue densities of Fฮธ are of the form fฮธ pxq โ
hpxq exp pxฮธ, xy ยด ฯpฮธqq, the natural parameter space
*
"
ลผ
exppฮธxq dx ฤ 8
N โ ฮธ P Rd :
Rd
is open and the cumulant transform ฯ is strictly convex on N . Then, the moment generating
function exists and the random variables Yi have sub-exponential tails, see Casella and Berger
(2002) and Brown (1986) for details. Let ฯ pxq :โ supฮธPฮ rฮธ ยจ x ยด ฯ pฮธqs be the Legendre-Fenchel
conjugate of ฯ and
J px, ฮธq :โ ฯ pxq ยด rฮธ ยจ x ยด ฯ pฮธqs ,
then the LRT statistic TR pY, ฮธ0 q in (2) can be written as
g ห
ยธ
f
รฟ
รฟ
f
e
pฮธ ยจ Yi ยด ฯpฮธqq ยด
pฮธ0 ยจ Yi ยด ฯpฮธ0 qq
TR pY, ฮธ0 q โ 2 sup
ฮธ
iPR
iPR
b
ห
`
โ 2 |R| J YฬR , ฮธ0
(13)
ห
`
ล
with YฬR โ |R|ยด1 iPR Yi . Note that by definition it holds J YฬR , ฮธ0 ฤ 0.
Remark 2.1. If observations are not drawn from an exponential family as in (1), or if ฮธ0 P ฮ
is replaced by a field pฮธi qiPInd of known baseline intensities, then the representation of the LRT
statistic TR as in (13) is not valid anymore. Our proofs rely on a third-order Taylor expansions of
TR and on the sub-exponential tails of the random variables Yi (see Theorem 2.5 below), but not
explicitly on the exponential family structure. Therefore, if in more general models corresponding
assumptions are posed (see also Arias-Castro et al., 2017, Sec. 2.2), our results do immediately
generalize to this situation.
To control the supremum in (10), we have to restrict the system of regions Rห suitably. To
this end, we have to introduce some notation. For a set Rห P Rห and x P r0, 1sd we define
d px, BRห q :โ inf yPBRห }x ยด y}2 where BRห denotes the topological boundary of Rห , i.e. BRห โ
ห
Rห z pRห q . Furthermore we define the วซยดannulus Rห pวซq around the boundary of Rห for some วซ ฤ
0
as
!
)
d ห
Rห pวซq :โ x P r0, 1s ห d px, BRห q ฤ วซ .
Assumption 1 (Complexity and regularity of Rห ).
(a) The VC-Dimension of the set Rห is bounded by ฮฝ pRห q ฤ 8.
(b) There exists some constant C ฤ
0 such that |Rห pวซq| ฤ Cวซ for all วซ ฤ
0 and all Rห P Rห with
the Lebesgue measure |ยจ|.
Let us briefly comment on the above assumption.
Remark 2.2.
โข Assumption 1(a) is a standard assumption to control the complexity of the set indexed process,
see e.g. Massart (1989); van der Vaart and Wellner (1996); Duฬmbgen and Spokoiny (2001).
โข Assumption 1(a) immediately implies an upper bound for the cardinality # pRn q of Rn in
(3), this is there exist constants c1 , c2 ฤ
0 such that
# pRn q ฤ c1 nc2 .
(14)
This will allow us to apply recent results by Chernozhukov et al. (2014) to couple the process
in (6) with a Gaussian version as in (9).
6
โข In the following, we will also need a bound for the complexity of Rห in terms of the packing number. The packing number Kpวซ, ฯ, Wq of a subset W of Rห w.r.t. a metric ฯ is
given by the maximum number m of points W1 , . . . , Wm P W s.t. ฯpWi , Wj q ฤ
วซ for all
i โฐ j, i.e. by the largest number of วซ-balls w.r.t. ฯ which can be packed inside W, see
e.g. van der Vaart and Wellner (1996, Def. 2.2.3). In the following we will consider the
symmetric difference
R1ห โณ R2ห :โ pR1ห Y R2ห q z pR1ห X R2ห q ,
and the corresponding metric
ฯห pR1ห , R2ห q :โ
b
|R1ห โณ R2ห |,
for
R1ห , R2ห P Rห
R1ห , R2ห P Rห .
Suppose that there exists a positive number VRห and constants k1 , k2 ฤ
0 such that
ยด
ยฏ
K pฮดuq1{2 , ฯห , tR P Rห : |R| ฤ ฮดu ฤ k1 uยดk2 ฮด ยดVRห
(15)
(16)
for all u, ฮด P p0, 1s. If Assumption 1(a) is satisfied, then (16) holds true with VRห โ ฮฝ pRห q,
which basically follows from the relationship between capacity and covering numbers and
van der Vaart and Wellner (1996, Thm. 2.6.4). However, (16) might also be satisfied for
considerably smaller numbers VRห (see the examples below).
โข We stress that that the assumption on the boundary smoothness (b) is satisfied whenever Rห
consists of regular Borel sets Rห only, i.e. Rห is a Borel set and |BRห | โ 0 for all Rห P Rห .
Example 2.3.
d
1. Consider!the set S ห of all hyperrectangles in r0,)1s , i.e. each S ห P S ห is of the form S ห โ
d ห
rs, ts :โ x P r0, 1s ห si ฤ xi ฤ ti for 1 ฤ i ฤ d . According to van der Vaart and Wellner
(1996, Ex. 2.6.1) we have ฮฝ pS ห q โ 2d, and more refined computations in the appendix (cf.
Lemma 5.1) show that VS ห โ 2d ยด 1 ` วซ with arbitrary วซ ฤ
0. Obviously, the corresponding
discretization Sn consists of hyperrectangles in Ind , which are determined by their upper left
and lower right corners, i.e. # pSn q ฤ n2d . As S ห consists only of regular Borel sets, the
assumption on the boundary smoothness is also satisfied.
d
2. We may also consider the (smaller) set Qห of all hypercubes in r0, 1s , i.e. each Qห P Qห is
d
of the form rt, t ` hs with t P r0, 1s and 0 ฤ h ฤ 1 ยด max1ฤiฤd ti . As Qห ฤ S ห , Assumption
1 is satisfied. More precisely, according to (Despres, 2014), ฮฝ pQห q โ t 3d`1
2 u, and refined
computations in the appendix (cf. Lemma 5.2) show VQห โ 1 independent of d (as opposed
to the VC-dimension).
d
3. Let Hห be the set of all half-spaces in r0, 1s , i.e.
!
)
(
d ห
Hห :โ Ha,ฮฑ | ฮฑ P R, a P Sdยด1 , Ha,ฮฑ :โ x P r0, 1s ห xx, ay ฤ ฮฑ .
The VC-dimension of Hห is ฤ d ` 1 (see e.g. Devroye and Lugosi, 2001, Cor. 4.2), which
proves that Assumption 1 is satisfied. On the other hand, we prove that VHห โ 2 (cf. Lemma
5.3 the appendix).
2.2 Limit theory
Now we are in position to show that the quantiles of the multiscale statistic in (6) can be approximated uniformly by those of the Gaussian version in (9), and furthermore that Mn pRn , vq in (9)
converges to a non-degenerate limit for v ฤ VRห . For the former we require a lower bound on the
d
smallest scale as given in (12). Given a discretized set of candidate regions Rn ฤ 2In and c ฤ
0
we introduce
ห
(
Rn|c :โ R P Rn ห |R| ฤ c .
With this notation we can formulate our main theorem:
7
Theorem 2.4 (Weak P0 limit). Let Yi , i P Ind be a field of random variables as in (1), Rห satisfy
Assumption 1 and let prn qn be a sequence such that (12) holds true. Then it holds under P0 that
ห D
`
Tn Y, ฮธ0 , Rn|rn , v ร M pRห , vq
n ร 8,
as
(17)
with M pRห , vq as in (10) for any fixed v P R. If furthermore v ฤ VRห in (16), then M pRห , vq is
almost surely finite and non-degenerate.
Note that M does not depend on any unknown quantities and can e.g. be simulated. However,
for practical purposes it is advantageous to use the finite sample Gaussian approximation in (9)
to simulate quantiles for Tn as in (6). This is justified by the following theorem:
Theorem 2.5 (Gaussian approximation). Let Yi , i P Ind be a field of random variables as in (1),
and let Rห be a set of candidate regions satisfying Assumption 1(a) and let prn qn ฤ p0, 8q be a
sequence such that (12) holds true. Let v P R be fixed.
(a) Then it holds
ห
ห
`
`
Tn Y, ฮธ0 , Rn|rn , v ยด Mn Rn|rn , v โ OP
หห
log12 pnq
rn
ห1{10 ยธ
(18)
as n ร 8 with Mn as in (9).
(b) For all q P R we have
ห โ `
ห
โฐห
ห
โฐ
โ
`
lim หP0 Tn Y, ฮธ0 , Rn|rn , v ฤ
q ยด P Mn Rn|rn , v ฤ
q ห โ 0.
nร8
(19)
Remark 2.6. Theorems 2.4 and 2.5 are compatible in the sense that for any set of candidate
regions satisfying Assumption 1, v P R and any rn ร 0 satisfying (12) it holds
ห D
`
Mn Rn|rn , v ร M pRห , vq
as
n ร 8,
(20)
with M pRห , vq as in (10).
Example 2.7. Suppose that Rห is a set of candidate regions satisfying Assumption 1. Let us
discuss three important examples of the model (1).
`
ห
1. Gaussian fields: Let Yi โ N ฮธ, ฯ 2 where the variance ฯ 2 ฤ
0 is fixed. In this case,
ฯpฮธq โ 12 ฮธ2 , and
ห
ห
a หY R ยด ฮธ0 ห
TR pY, ฮธ0 q โ |R|
ฯ
2. Bernoulli fields: Let Yi โ Bin p1, pq with p P p0, 1q. The cases p โ 0 and p โ 1 have
to be excluded to obtain a natural exponential family. However, in these cases one would
screen the field correctly, anyway. The natural parameter of this exponential family is ฮธ โ
log pp{p1 ยด pqq, and using ฯ pฮธq โ log p1 ` exp pฮธqq we compute
g
ยจ
ยป
ห
f
ห
ยธ๏ฌ
f
Y
1
ยด
Y
f
R
R
๏ฌ.
TR pY, ฮธ0 q โ e2|R| โY R log ห exppฮธ q โยด p1 ยด Y R q log
1
0
1`exppฮธ0 q
exppฮธ0 q`1
3. Poisson fields: Let Yi โ Poipฮปq with ฮป P R. Again, ฮป โ 0 has to be excluded, but this case
is again trivial. The natural parameter of the exponential family is ฮธ โ log pฮปq, and using
ฯ pฮธq โ exp pฮธq we compute
d
โ
ห
๏พ
ห
YR
ยด pY R ยด exppฮธ0 qq .
TR pY, ฮธ0 q โ 2|R| Y R log
exppฮธ0 q
8
Example 2.8 (P0 -limiting distribution in the hyperrectangle / hypercube case). Recall Example
d
2.3 and let S ห be the set of all hyperrectangles and Qห be the set of all hypercubes in r0, 1s . Then
for prn qn as in (12) it holds under P0 that for any วซ ฤ
0
max rTS pY, ฮป0 q ยด penv p|S|qs
SPSn
|S|ฤrn
D
ร
sup
0ฤsฤtฤ1
ยซ
and
๏ฌ
` d
ห
|W prs, tsq|
a
ยด penv n |rs, ts|
|rs ยด ts|
max rTQ pY, ฮป0 q ยด penv p|Q|qs
QPQn
|Q|ฤrn
D
ร
sup
tPr0,1sd
hPp0,1ยดmax1ฤiฤd ti s
โ
ยด
ยฏ
|W prt, t ` hsq|
d
ยด
pen
phnq
v
hd{2
๏พ
d
as n ร 8, where W is white noise on r0, 1s . Monte-Carlo simulations (by means of (9) with
n โ 96 and d โ 2) of the densities of the right-hand sides with different values of v are shown
in Figure 1. The smallest possible values of v which can be chosen according to Example 2.3 are
given by the packing number, i.e. v โ 3 ` วซ and v โ 1 respectively. The corresponding results
are depicted in the top row of Figure 1 with วซ โ 0 for simplicity. Alternatively, we can use the
VC-dimension v โ 4 and v โ 3 respectively, which lead to the simulated distributions shown in
the bottom row of Figure 1. This nicely illustrates that using a larger value of v will lead to larger
quantiles and hence a loss of detection power: As the distributions of Mn pS n , 4q and Mn pQn , 3q
are extremely close, detecting in the system of squares is not easier than detecting in the system of
rectangles, even though the latter is by far bigger and more complex. The explanation for this is
the penalization (41), which by appropriate choice of the parameter v can be tailored to the system
Rห .
2.3 Asymptotic power
In this section we will analyze the power of our multiscale testing approach in the hypercube-case.
The detection power clearly depends on the size and strength of the anomaly. To describe the
latter, we will frequently employ the functions
mpฮธq :โ ฯ 1 pฮธq โ E rY s ,
vpฮธq :โ ฯ 2 pฮธq โ V rY s
for Y โ Fฮธ .
Heuristics The key point for the following power considerations is that the observations in (1)
can be approximated as
a
v pฮธi q Fฮธi ยด m pฮธi q
Yi ยด m pฮธ0 q
m pฮธi q ยด m pฮธ0 q
a
a
a
โ
`a
,
(21)
v pฮธ0 q
v pฮธ0 q
v pฮธ0 q
v pฮธi q
ยด1{2
i.e. as โsignalโ v pฮธ0 q
pm pฮธi q ยด m pฮธa
0 qq, which is non zero on the anomaly only,
aplus a standardized noise component pFฮธi ยด m pฮธi qq { v pฮธi q which is scaled by a factor vi :โ v pฮธi q {v pฮธ0 q. In
case of Gaussian observations with variance 1, one has vi โ 1 and recovers the situation considered
by Sharpnack and Arias-Castro (2016). Whenever the โsignalโ part in (21) is strong enough, the
anomaly should be detected. In the following, we will make this statement mathematically precise
and also give a comparison of the multiscale testing procedure with an oracle procedure.
9
1
600
600
0.8
400
400
200
200
0.6
0.4
0.2
0
0
0
2
0
(a) Mn pS n , 3q
0
2
(b) Mn pQn , 1q
0
2
(c) Comparison
1
600
600
0.8
400
400
200
200
0.6
0.4
0.2
0
0
0
2
0
(d) Mn pS n , 4q
0
2
(e) Mn pQn , 3q
0
2
(f) Comparison
Figure 1: Simulated densities of the weak limits. The histograms are obtained from 104 runs of the
test statistic (9). For the comparison, the corresponding densities have been estimated
), Mn pQn , vq (
)). Top row: optimal
by a standard kernel estimator (Mn pS n , vq (
calibration with the covering number, bottom row: alternative calibration using the
VC-dimension.
d
Considered alternatives Consider a given family pQหn qnPN of hypercube anomalies Qหn ฤ r0, 1s
with Lebesgue measure |Qหn | โ an P p0, 1q. The corresponding discretized anomalies Qn :โ
d
Ind X nQหn ฤ Ind have size |Qn | โ nd an . We will consider alternatives Ki,n in (4) where ฮธn P ฮn
s.t.
(22)
ฮธin โ ฮธ1n IQn .
The parameters ฮธ1n determine the total strength of the anomaly, which is given by
ยตn pQn q :โ
a
m pฮธ1n q ยด m pฮธ0 q
a
|Qn |
.
v pฮธ0 q
Clearly, any anomaly with fixed size or strength can be detected with asymptotic probability 1.
Therefore, we will consider vanishing anomalies in the sense that
an ล 0,
ยตn pQn q ร 8,
as
n ร 8.
(23)
Furthermore, we will restrict to parameters ฮธ1n in (22) which yield uniformly bounded variances
and uniform sub-exponential tails, this is
ฤ
E rexp psY qs ฤ C for all 0 ฤ s ฤ t and ฮธ P tฮธ0 u Y
tฮธ1n u ,
(24)
v ฤ vi โ
d
nPN
v pฮธ1n q
ฤ vฬ
v pฮธ0 q
for all
i P Ind , n P N
(25)
for Y โ Fฮธ with constants t ฤ
0, C ฤ
0 and 0 ฤ v ฤ vฬ ฤ 8.
In case of Gaussian observations with variance ฯ 2 , (24) and (25) are obviously satisfied, for a
Poisson field this means that the intensities are bounded away from zero and infinity.
10
d
Oracle and multiscale procedure Recall that by Qห is the set of all hypercubes in r0, 1s (cf.
Example 2.3), and Qn its discretization (cf. (3)).
If the size an of the anomaly is known, but its position is
then one would naturally
ห still unknown,
(
restrict the set of candidate regions to RหO :โ Qห P Qห ห |S ห | โ an , and consequently scan only
over (cf. (3))
ห
(
d ห
d
ห
ห
ห
RO
n :โ Q ฤ In Q โ In X nQ for some Q P RO .
As for the true anomaly Qห P RหO , its discretized
RO
n . This gives
` versionO Qnห alsoOsatisfies Qn P
O
rise to an oracle test, which rejects whenever Tn Y, ฮธ0 , Rn , v ฤ
q1ยดฮฑ,n where q1ยดฮฑ,n is the 1 ยด ฮฑ
`
ห
quantile of Mn RnO , v as in (9). Similar as in Theorem 2.5 one can show that this quantile
sequence ensures the oracle test to have asymptotic level ฮฑ. The asymptotic power of this oracle
test can be seen as a benchmark for any multiscale test.
To obtain a competitive multiscale
`
ห procedure, let us choose some rn satisfying (12), and furthermore assume that rn โ o nd an , as otherwise the multiscale procedure will never be able to
detect the true anomaly (as it is not contained in the set of candidate regions which we scan over).
As now position and size of the anomaly are unknown, we consider all such sets in RหMS โ Qห as
candidate regions and consequently scan over
ห
(
d ห
d
ห
ห
ห
RMS
n|rn :โ Q ฤ In Q โ In X nQ for some Q P Q and |Q| ฤ rn .
`
ห
Clearly the true anomaly Qห satisfies Qห P RหMS , and by rn โ o nd an its discretized version Qn also satisfies Qn P RMS
n|rn . This gives rise to a multiscale test, which rejects whenever
ยฏ
ยด
ยฏ
ยด
Mn pRMS
n|rn ,v q
MS
MS
MS
Tn Y, ฮธ0 , RMS
is
the
1
ยด
ฮฑ
quantile
of
M
:โ
q
where
q
,
v
ฤ
q
,
v
R
n
1ยดฮฑ,n
1ยดฮฑ,n
1ยดฮฑ
n|rn
n|rn
as in (9). Theorem 2.5 ensures that the multiscale test has asymptotic level ฮฑ.
M pQห ,v q
ห
ฤ 8 whenever v ฤ VQห โ 1, and it holds
Now, due to Theorem 2.4 q1ยดฮฑ
:โ q1ยดฮฑ
O
MS
ห
q1ยดฮฑ,n
ฤ q1ยดฮฑ,n
ฤ q1ยดฮฑ
ฤ8
for all n P N and v ฤ 1.
Asymptotic power We will now show that the multiscale procedure described above (which requires no a priori knowledge on the scale of the anomaly) asymptotically detects the same anomalies
with power 1 as the oracle benchmark procedure for a known scale. Hence, the penalty choice to
calibrate all scales as in (6) (where Rห โ Qห ), renders the adaptation to all scales for free, at least
asymptotically. This can be seen as a structural generalization of (Sharpnack and Arias-Castro,
2016, Thms. 2 and 4), as under the alternative the whole distribution in (1) and not just its mean
might change. Also the power considerations in Proksch et al. (2017) restrict to this simpler case.
Theorem 2.9. In the setting described above, let an ล 0 be a sequence of scales such that
12
plog nq {nd โ o pan q as n ร 8. Denote by
ห
ห
ห
ห
`
ห
ยตยดx
x`ยต
2
`ฮฆ
,
xฤ0
F x, ยต, ฯ :โ ฮฆ ยด
ฯ
ฯ
the survival function of a folded normal distribution with parameters ยต P R and ฯ 2 ฤ
0, where
ฮฆ is the cumulative distribution function of N p0, 1q. Let furthermore v ฤ VQห โ 1. If (23) is
satisfied, then the following holds true:
(a) The single scale procedure has asymptotic power
โฐ
โ `
ห
O
Pฮธn Tn Y, ฮธ0 , RO
n , v ฤ
q1ยดฮฑ,n
d
ห
โ ฮฑ ` p1 ยด ฮฑqF
O
q1ยดฮฑ,n
`
2v log
ห
ยธ
ห
n
n
?
m
pฮธ
q
ยด
m
pฮธ
q
1
v
pฮธ
q
0
1
1
a
` op1q.
, nd{2 an
,
an
v pฮธ0 q
v pฮธ0 q
11
`
ห
(b) If an โ o nฮฑยดd with ฮฑ ฤ
0 sufficiently small, then the multiscale procedure has asymptotic
power
โ ยด
ยฏ
ฤฑ
MS
Pฮธn Tn Y, ฮธ0 , RMS
,
v
ฤ
q
1ยดฮฑ,n
n|rn
d
ห
ฤ ฮฑ ` p1 ยด ฮฑqF
MS
q1ยดฮฑ,n
`
2v log
ห
ยธ
ห
m pฮธ1n q ยด m pฮธ0 q v pฮธ1n q
1
d{2 ?
a
,
` op1q.
,n
an
an
v pฮธ0 q
v pฮธ0 q
Remark 2.10. In (Sharpnack and Arias-Castro, 2016) a` similar
ห result in case of Gaussian observations is shown. Note that the condition that an โ o nฮฑยดd with ฮฑ ฤ
0 sufficiently small is
missing there, but is however necessary for the proof to work. In (Proksch et al., 2017) it suffices
to assume an ล 0, as the maximum can be explicitly controlled due to its Gumbel-limit.
The above Theorem allows us to explicitly describe those anomalies which will be detected with
asymptotic power 1:
Corollary 2.11. Under the setting in this section and the Assumptions of Theorem 2.9 any such
anomaly is detected with asymptotic power 1 either by the single scale or the multiscale testing
procedure if and only if
c
ยด ยฏ
?
2v pฮธ0 q log a1n ยด nd{2 an |m pฮธ1n q ยด m pฮธ0 q|
a
ร ยด8
(26)
v pฮธ1n q
as n ร 8.
ห
`
Example 2.12.
1. In case of Gaussian observations Yi โ N โn IQn , ฯ 2 with variance ฯ 2 ,
where the baseline mean is 0 and โn the size of the anomaly, this yields detection if and
only if
d
ห ห
1
d{2 ?
as
n ร 8.
|โn | n
an ร ฯ 2v log
an
If we calibrate the statistic with the packing number v โ VQห โ 1 (cf. Example 2.3), then
this coincides with the well known asymptotic detection boundary for hypercubes, see e.g.
Arias-Castro et al. (2005); Frick et al. (2014) for d โ 1, Butucea and Ingster (2013) for
d โ 2, or Kou (2017) for general d.
ห
`
2. For Bernoulli r.v.โs Yi โ Ber p0 IQcn ` pn IQn with p0 , pn P p0, 1q s.t. p0 ` pn ฤ 1, the
condition (26) reads as follows:
c
ยด ยฏ
?
2p0 p1 ยด p0 q log a1n ยด nd{2 an |pn ยด p0 |
a
ร ยด8.
pn p1 ยด pn q
Note, that the minimax detection rate is unknown in this case to best of our knowledge.
ห
`
3. For a Poisson field Yi โ Poi ฮป0 IQcn ` ฮปn IQn with ฮป0 , ฮปn ฤ
0, Theorem 2.9 and Corollary
2.11 can only be applied if ฮปn is a bounded sequence. In this case, (26) reduces to
c
ยด ยฏ
?
2ฮป0 log a1n ยด nd{2 an |ฮปn ยด ฮป0 |
?
ร ยด8.
ฮปn
Again, the minimax detection rate is unknown in this case to best of our knowledge.
12
3 Auxiliary results
Our results rely heavily on a coupling result which allows us to replace the maximum over partial
sums of standardized NEF r.v.โs by a maximum over a corresponding Gaussian version. This can
be obtained from recent results by Chernozhukov et al. (2014) as soon as certain moments can be
controlled, which is the purpose of the following two Lemmata, proofs can be found in Section 4.
In what follows, the letter C ฤ
0 denotes some constant, which might change from line to line.
We start with controlling the maximum of powers of uniformly sub-exponential random variables:
Lemma 3.1. Let Wi , i โ 1, 2, . . . be independent sub-exponential random variables s.t. there exist
k1 ฤ
1 and k2 ฤ
0 s.t.
P r|Wi | ฤ
ts ฤ k1 exppยดk2 tq
(27)
for all i. Then for all m P N there exists a constant C, s.t. for all N ฤ 2
๏พ
โ
E max |Wi |m ฤ C plog N qm .
1ฤiฤN
It is well-known that the above bound can be improved for sub-Gaussian random variables to
โ
๏พ
a
(28)
E max |Xi | ฤ C log N .
1ฤiฤN
Now we will show that the maximum over the partial sum process of independent random
variables can be bounded by the maximum over the corresponding Gaussian version. The latter
can be controlled as in (28) by exploiting the fact that a maximum over dependent Gaussian
random variables is always bounded by a maximum over corresponding independent Gaussian
random variables (see e.g. Sฬidaฬk, 1967)
๏ฌ
ยซ
a
|XI |
(29)
ฤ C log p# pIqq
E max a
IPI
|I|
i.i.d.
with Xi โ N p0, 1q and XI :โ
ล
Xi . This allows us to prove the following:
iPI
Lemma
3.2. Let pZi qiโ1,...,N be independent random variables with E rZi s โ 0 and denote ZI :โ
ล
Zi . If I is an arbitrary index set of sets tIuIPI , then there exists a constant C ฤ
0 independent
iPI
of I s.t.
ยซ
๏ฌ
โ
๏พ
a
|ZI |
E max a
ฤ C log p# pIqq E max |Zi | .
IPI
1ฤiฤN
|I|
With the help of these two lemmata, the following coupling result can then be shown:
Theorem 3.3 (Coupling). Let Zi , i P Ind independent, E rZi s โ 0, V rZi s โ 1, such that (27) is
satisfied for all i with uniform constants k1 ฤ
1 and k2 ฤ
0. Let furthermore vi P rv, vs, i P Ind with
i.i.d.
0 ฤ v ฤ v ฤ 8 independent of i and n, and Xi โ N p0, 1q, i โ 1, . . . , nd , and Rn , s.t. inequality
(14) holds. Then
หห
ห1{6 ยธ
รฟ
log10 pnq
1 รฟ
ยด1{2
vi Xi โ OP
vi Zi ยด max |R|
.
max a
RPRn :
RPRn :
rn
|R| iPR
iPR
|R|ฤrn
|R|ฤrn
13
4 Proofs
In this section we will give all proofs. In the following we will denote by pn the cardinality of
Rn , i.e. pn :โ #pRn q, which by (14) satisfies logppn q โ log n. Recall that C denotes a generic
constant which might differ from line to line.
4.1 Proof of the auxiliary results
We start with proving the auxiliary statements from section 3.
Proof of Lemma 3.1. Let hptq :โ k1 exppยดk2 tq, then
โ
๏พ
โ
๏พ
N
P max |Wi | ฤ
t โ 1 ยด P max |Wi | ฤ t ฤ 1 ยด p1 ยด hptqq ฤ N hptq.
1ฤiฤN
1ฤiฤN
Let tฬ โ hยด1 p1{N q ฤ C logpN q, then
โ
๏พ
โ
๏พ
ลผ8
m
mยด1
E max |Wi |
โm
t
P max |Wi | ฤ
t dt
1ฤiฤN
1ฤiฤN
0
ลผ tฬ
ลผ8
tmยด1 N hptq dt
tฬ
0
ลผ8
m
tmยด1 exppยดk2 tq dt
ฤ pC logpN qq ` k1 mN
ฤm
tmยด1 dt ` m
tฬ
m
ฤ C plog N q ,
where the last inequality follows from integration by parts.
i.i.d.
Proof of Lemma 3.2. Let Xi โ N p0, 1q and ri be i.i.d. Rademacher random variables, i.e. they
take the values ห1 with probability 1{2.
Step (i): Since the Xi are symmetric
ห
ห
ห๏ฌ
ห๏ฌ๏ฌ
ยซ ยซ
ยซ
ห
1 หหรฟ
1 หหรฟ หห
ห
(30)
E max a ห Xi ห โ Er E max a ห ri Xi ห .
I
ห
I
|I| หiPI ห
|I| หiPI
By Lemma 4.5 of (Ledoux and Talagrand, 1991) and choosing F ptq โ t, ฮทi โ Xi and xi :โ pci,I qI ,
where ci,I :โ ?1 ItiPIu (a scaled indicator function) and as norm the max ยดnorm, we obtain
|I|
Er
ห
ห
ห๏ฌ c
ห๏ฌ
ยซ
ฯ
1 หหรฟ หห
1 หหรฟ หห
E max a ห Xi ห .
max a ห ri ห ฤ
I
I
2
|I| หiPI ห
|I| หiPI ห
ยซ
(31)
Step (ii): Let pZi1 q1ฤiฤN be a sequence of independent copies of pZi q1ฤiฤN and define the symฤi :โ Zi ยด Z 1 and equally the symmetrized version of ZI by Z
ฤI :โ
metrized version of Zi by Z
i
ล
1
iPI pZi ยด Zi q. Then by using the same argument as in (30) and Fubiniโs theorem, we derive
๏ฌ
ยซ
๏ฌ
ยซ
1 หห ฤ หห
1
E max a |ZI | ฤ 2E max a หZI ห
I
I
|I|
|I|
ห
ห๏ฌ๏ฌ
ยซ ยซ
1 หหรฟ ฤ หห
โ 2Er E max a ห Zi ri ห
I
ห
|I| หiPI
ห๏ฌ๏ฌ
ห
ยซ ยซ
1 หหรฟ ฤ หห
โ 2E Er max a ห Zi ri ห
I
ห
|I| หiPI
ห
ห๏ฌ๏ฌ
ยซ ยซ
1 หหรฟ หหฤหห หห
โ 2E Er max a ห หZi ห ri ห ,
I
ห
|I| หiPI
14
where the last equality holds in view of the symmetry of ri . Now we will use the contraction
principle, i.e. Theorem 4.4 of (Ledoux and Talagrand, 1991) with F ptq โ t conditionally on
|Zฤi pฯq|
, which is independent of pri q. By choosing xi as in Step (i) we get (after
ฮฑi :โ
ฤ
max |Zj pฯq|
j
ฤj pฯq|)
multiplying both sides with max |Z
j
Er
Therefore
ห๏ฌ
ห
ยซ
โ
ห
ห๏พ
1 หหรฟ หหฤ หห หห
1
หฤ ห
max a ห หZi pฯqห ri ห ฤ E max หZi pฯqห Er max ?
I
1ฤiฤN
I
ห
ห
I
|I| iPI
ยซ
ห๏ฌ
ห
หรฟ ห
ห
ห
ห ri ห .
หiPI ห
ห๏ฌ
ห
๏ฌ
ยซ
โ
ห
ห๏พ
1
1 หหรฟ หห
หฤ ห
E max a |ZI | ฤ 2E max หZi pฯqห Er max a ห ri ห
I
1ฤiฤN
I
|I|
|I| หiPI ห
ห
ห๏ฌ
ยซ
โ
๏พc
1 หหรฟ หห
ฯ
E max a ห Xi ห
ฤ 4E max |Zi |
I
1ฤiฤN
2
|I| หiPI ห
ยซ
๏ฌ
โ
๏พ
?
|XI |
,
โ 8ฯE max |Zi | E max a
1ฤiฤN
I
|I|
ยซ
where we used (31) in the second inequality. Now the statement follows from (29).
Proof of Theorem 3.3. Enumerate each region in Rn by j, 1 ฤ j ฤ pn and define
vi
Xij :โ a
Zi ItiPRj u It|Rj |ฤrn u ,
|Rj |
Xi :โ pXij qjโ1,...,pn ,
for some sequence rn . Then Z :โ max
1ฤjฤpn
ลN
iโ1
(32)
d
i โ 1, . . . , N โ n ,
Xij satisfies
1 รฟ
D
vi Zi .
Z โ max a
RPRn :
|R| iPR
|R|ฤrn
Recall that logppn q ร logpnq. According to (Chernozhukov et al., 2014, Cor. 4.1) we find that
ลN
for every ฮด ฤ
0 there exists a Gaussian version Zฬ :โ max
iโ1 vi Nij with independent random
1ฤjฤpn
vectors N1 , . . . , Nn in Rpn , Ni โ N p0, E rXi Xit sq, 1 ฤ i ฤ N , such that
ห
ฤฑ
โห
(
logpnq
ห
ห
P หZ ยด Zฬ ห ฤ
16ฮด ร ฮด ยด2 B1 ` ฮด ยด1 pB2 ` B4 q logpnq logpnq `
nd
where
ห
ห๏ฌ
N
หรฟ
ห
ห
ห
B1 :โ E
max ห pXij Xik ยด E rXij Xik sqห
1ฤj,kฤpn ห
ห
iโ1
ยซ
๏ฌ
N
รฟ
3
B2 :โ E max
|Xij |
ยซ
1ฤjฤpn
B4 :โ
N
รฟ
iโ1
E
โ
iโ1
3
max |Xij | It
1ฤjฤpn
max |Xij |ฤ
ฮด{ logppn _nqu
1ฤjฤpn
B1 can be controlled as follows. With Xij from (32) we derive
ห๏ฌ
ห
ยป
ห
ห รฟ
2
2
ห
ห
v
pZ
ยด
1q
i
i
ห๏ฌ
ห
โ
a
max
B1 โ E
ห
ห
1ฤj,kฤpn : ห
|R
||R
|
j
k
ห
iPR
XR
j
k
|R |,|R |ฤr
j
k
n
15
๏พ
.
ยป
โ Eโ
max
1ฤj,kฤpn :
|Rj |,|Rk |ฤrn
ห๏ฌ
ห
a
ห
ห
รฟ
ห
|Rj X Rk | หห
1
2
2
a
a
vi pZi ยด 1qหห๏ฌ .
ห
|Rj ||Rk | ห |Rj X Rk | iPRj XRk
ห
Using the restriction on the size of the rectangles we find:
d
d
|Rj X Rk |
| mint|Rj |, |Rk |u|
1
ฤ
ฤ ? .
|Rj ||Rk |
|Rj ||Rk |
rn
ล
Denote Vi :โ vi2 pZi2 ยด 1q, I :โ Rj X Rk P I ฤ Ind and SI :โ iPI Vi . Now
ยซ
๏ฌ
|SI |
1
.
B1 ฤ ? E max a
IPI
rn
|I|
Using Lemma 3.2 we obtain
C a
log p#pIqq E
B1 ฤ ? loooooomoooooon
rn
?
โ
It remains to estimate
E
โ
|vi2 pZi2
max
1ฤiฤN
logpnq
โ
max
1ฤiฤN
|vi2 pZi2
๏พ
ยด 1q|
๏พ
โ
๏พ
2
2
ยด 1q| โ E max vi |Zi ยด 1|
1ฤiฤN
๏พ
โ
2
2
ฤ E max v |Zi ยด 1|
1ฤiฤN
โ
๏พ
2
2
ฤ v E max |Zi | ` v 2 .
1ฤiฤN
So in total we get by Lemma 3.1
a
ห 5
ห1{2
ห
logpnq ` 2
log pnq
B1 ร ?
v C logpN q2 ` v 2 ร
.
rn
rn
For B2 we compute
B2 ฤ
1
1{2
prn q
E
โ
3
max |vi Zi |
1ฤiฤN
ฤ
v3
๏พ
E
1{2
prn q
โ
๏พ ห 6
ห1{2
log pnq
max |Zi |3 ร
,
1ฤiฤN
rn
where we again used Lemma 3.1. Now let ฮด ฤ
0 be fixed. Then
๏ฌ
ยป
N
3
รฟ
|v
Z
|
i i
๏ฌ
B4 ฤ
E โ max
I
|vi Zi |
ฮด
u
ฤ
plog
1ฤjฤpn : |Rj |3{2 tmax
pq
|Rj |1{2
j
iโ1
|Rj |ฤrn
๏ฌ
ยซ
N
3
ฤ 3{2 max E |vi Zi | I
1{2
ฮดr
u
t|Zi |ฤ
|v | n
rn 1ฤiฤN
i log p
Now let rn ฤ
ยด
2d|vi |
ฮด
ยฏ2
plog nq2`2ฮณ for some ฮณ ฤ
1 for n ฤ no pฮด, dq and hence
B4 ฤ
N
โ
โฐ
max E |vi |3 |Zi |3 It|Zi |ฤ
plog nqฮณ u
3{2
rn 1ฤiฤN
16
ฤ
N v3
3{2
rn
3 max
1ฤiฤN
N v3
ลผ8
ลผ8
plog nqฮณ
t2 P r|Zi | ฤ
ts dt
t2 exppยดk2 tq dt
3{2
plog nqฮณ
rn
ลผ
N v3 1 8
u2 exppยดuq du.
โ 3k1 3{2 3
k
ฮณ
rn
2 k2 plog nq
ฤ 3k1
For u large enough s.t. u2 ฤ exppu{2q, i.e. for n ฤ n1 pฮด, d, ฮณq, it holds
ห
ห
ลผ8
ยด uยฏ
3k1 v 3 N
3k1 v 3 N
k2
ฮณ
B4 ฤ
du โ
exp ยด plog nq ,
exp ยด
k23 rn3{2 k2 plog nqฮณ
2
k23 rn3{2
2
and then furthermore
k2
2
ฮณ
plog nq ฤ pd log nq which implies
B4 ฤ
3k1 v 3 nd
1
3k1 v 3
ยดd
n
โ
.
3
3
3{2
k2 prn q
k2 prn q3{2
In conclusion we obtain
ห 10
ห1{2
ห1{2
ห 7
โ
ฤฑ
log pnq
log pnq
` ฮด ยด3
P |Z ยด Zฬ| ฤ
16ฮด รฮด ยด2
rn
rn
ห 4
ห1{2
log pnq
logpnq
` ฮด ยด3
,
`
rn3
nd
which yields the claim.
4.2 Proofs of Section 2.2
Let us now prove the results from Section 2.2, including Theorems 2.4 and 2.5. We start with a
Taylor expansion of Tn , which will allows us to apply Theorem 3.3.
Lemma 4.1. Let Rn be a collection of sets s.t. (14) holds, วซ ฤ
0 and prn qn ฤ p0, 8q be a sequence,
s.t. plog nq10`วซ {rn ร 0. Suppose Yi โ Fฮธ0 P F , i P Ind , are i.i.d. random variables, and recall that
ยด1 ล
for R P Rn we denote Y R :โ |R|
iPR Yi . Then it holds
ห
ห
หห
ห1{4 ยธ
ห
ห
1 |Y R ยด mpฮธ0 q| ห
log3 pnq
ห
2
a
max หTR pY, ฮธ0 q ยด |R|
ห โ OP
RPRn : ห
rn
vpฮธ0 q ห
|R|ฤrn
as n ร 8.
Proof. For independent Gaussian random variables Xi โ N p0, 1q it follows from (28) and(14) that
ห๏ฌ
ยซห
ห
รฟ หห
a
ห
ยด1{2
Xi ห ฤ C log n,
E ห max |R|
ห
หRPRn
iPR
hence
รฟ
1
a
max |R|ยด1{2
Xi โ oP p1q.
logpnq RPRn :
iPR
|R|ฤrn
Combining this result with Theorem 3.3 (with vi โ 1 for all i) we obtain
ห
ห
1 หห รฟ Yi ยด mpฮธ0 q หห
1
?
a
max a
ห โ oP p1q.
ห
log n RPRn : |R| หiPR
vpฮธ0 q ห
|R|ฤrn
17
(33)
Together with (14) it follows
ห
ห
max หY R ยด mpฮธ0 qห ฤ C
RPRn :
|R|ฤrn
ห
logpnqvpฮธ0 q
rn
ห 12
p1 ` oP p1qq ร 0,
n ร 8.
?
Therefore, Y R ฤ
mpฮธ0 q{ 2 in probability if n is` large
uniformly
ห enough
โ
โฐ over R, s.t. |R| ฤ rn .
Now we are in position to analyze JpY R , ฮธ0 q โ ฯ Y R ยด ฮธ0 Y R ยด ฯ pฮธ0 q in the definition of TR ,
ล
see (13). As the sup
pฮธ pYi q is attained at that ฮธ for which ฯ 1 pฮธq โ Y R we derive
ฮธPฮ iPR
`
ห
ฯpY R q โ xmยด1 pY R q, Y R y ยด ฯ mยด1 pY R q ,
and therefore
`
ห `
ห
JpY R , ฮธ0 q โ xmยด1 pY R q, Y R y ยด ฯ mยด1 pY R q ยด xฮธ0 , Y R y ยด ฯpฮธ0 q
` `
ห
ห
โ xmยด1 pY R q ยด ฮธ0 , Y R y ยด ฯ mยด1 pY R q ยด ฯpฮธ0 q .
Note that YฬR P Dpmยด1 q for large enough n, as the latter is an open set. A Taylor expansion of ฯ
around ฮธ0 and one of second order of mยด1 around mpฮธ0 q, yields
ยจ
TR pY, ฮธ0 q โ ห2|R|
ห
Y R ยด mpฮธ0 q
a
vpฮธ0 q
ยธ2
` 2|R|sn
ห
ยธห1{2
Y R ยด mpฮธ0 q โ
a
vpฮธ0 q
(34)
with sn s.t. |sn pxq| ฤ cx3 ` oP p1q for some c ฤ
0. Consequently
ห
ห
ห1 2
pY R ยด mpฮธ0 qq2 หห
ห
TR pY, ฮธ0 q ยด |R|
max
ห
RPRn : ห 2
vpฮธ0 q
|R|ฤrn
ร max |R|
RPRn :
|R|ฤrn
ยด 12
โ max |R|
RPRn :
|R|ฤrn
|Y R ยด mpฮธ0 q|3
` oP p1q
vpฮธ0 q3{2
หล
ห3
ห
ห
ห iPR pYi ยด mpฮธ0 qq ห
ห a a
ห ` oP p1q
ห
|R| vpฮธ0 q ห
ฤplog3 pnqrnยด1 q1{2 ` oP p1q,
1
where we again used (33). Now |a ยด b| ฤ |a2 ยด b2 | 2 yields the claim.
Now we are in position to prove Theorem 2.5. So far we have only shown that the maximum
over the local likelihood ratio statistics can be approximated by Gaussian versions, but we did
not include the scale penalization penv p|R|q in (7). To include this in the approximation result,
we will slice the maximum into scales, where the penalty-term is almost constant. Then, we show
that we may bound the maximum over all scales by the sum of the maximum over theses families.
The price to pay is an additional logpnq factor on the smallest scale.
Proof of Theorem 2.5. (a) It follows from the triangle inequality
|}x}8 ยด }y}8 | ฤ }x ยด y}8 ,
Lemma 4.1 and (12) that
ห
ห
ห
ห max pTR pY, ฮธ0 q ยด penv p|R|qq ยด
ห RPRn :
ห|R|ฤr
n
18
max
RPRn :
|R|ฤrn
ห
ห
ยธหห
หห
ห1{4 ยธ
ห Y ยด mpฮธ q ห
ห
log3 pnq
ห
ห
R
0
1{2
ห
|R| ห a
.
ห ยด penv p|R|q ห โ OP
ห
rn
vpฮธ0 q ห
ห
ห
Define
Y R :โ |R|ยด1{2
X R :โ |R|ยด1{2
รฟ
iPR
รฟ
ห
Yi ยด mpฮธ0 q
a
vpฮธ0 q
Xi ,
iPR
ยธ
i.i.d.
Xi โ N p0, 1q.
With this notation and a symmetry argument we find from the proof of Theorem 3.3 with vi โ 1
that
ห
๏ฌ
ยปห
ห
ห
ห 10
ห1{2
ห R หห
ห Rห
ห
log pnq
P โหห max หY ห ยด max หX หหห ฤ
ฮด ๏ฌ ร ฮด ยด3
.
RPRn :
RPRn :
rn
ห
ห|R|ฤr
|R|ฤr
n
n
12
1{10
Let ฮดn :โ pplog pnq{rn q
ล 0. Now define วซj :โ jฮดn , j P N and
Rn,j :โ tR P Rn | exppวซj q ฤ |R| ฤ exppวซj`1 qu .
Then the set of candidate regions Rn can be written as
*
"
ฤ
`
ห
1
1
log log12 pnq , . . . ,
logpnd q
Rn|rn โ
Rn,j , J :โ
ฮดn
ฮดn
jPJ
with |J| ฤ
logpnd q
ฮดn .
If we abbreviate
penj :โ penv pexp pวซj qq โ
d
ห ห
2v log
nd
exppวซj q
ห
ห
`1 ,
then the slicing above implies
penj`1 ฤ penv p|R|q ฤ penj ,
ยด?
?
? ยฏ
?
Using a ยด b โ pa ยด bq{
a ` b , we get
for all
R P Rn,j .
0 ฤ penj ยด penj`1
2vpวซj`1 ยด วซj q
a
โa
.
2v rlogpnd q ` 1 ยด วซj s ` 2v rlogpnd q ` 1 ยด วซj`1 s
The largest index in J is ฮด1n logpnd q and therefore the maximal value of วซi is given by วซฬ โ logpnd q
and logpnd q ` 1 ยด วซฬ โ 1. Therefore,
c
2vpวซj`1 ยด วซj q
v
?
โ ฮดn
0 ฤ penj ยด penj`1 ฤ
.
2
2 2v
This means that for n ร 8 the penalty terms penv p|R|q, R P Rn,j can be considered as constant.
Now straight forward computations show that
ห
ห
ห
ห
ห
ห
`ห R ห
หห
`ห R ห
ห max หY ห ยด penv p|R|q ยด max หX ห ยด penv p|R|q ห
ห RPRn :
ห
RPRn :
ห|R|ฤr
ห
|R|ฤrn
n
c
ห
ห
ห
หห
ห ห
ห
v
ฤ max หห max หY R ห ยด max หX R หหห ` ฮดn
.
RPRn,j
jPJ RPRn,j
2
d
q
Now the claim follows from |J| ฤ logpn
ฮดn .
(b) This is a direct consequence of (a).
19
We will now continue with the proof of Theorem 2.4. Taking into account the result of Theorem
2.5, we only have to prove Remark 2.6, which will be done in the following.
Lemma 4.2. Let Rห satisfy Assumption 1 and be equipped with the canonical metric ฯห as in (15)
i.i.d.
d
and define Rn as in (3). Furthermore let W denote white noise on r0, 1s . For Xi โ N p0, 1q,
d
i P In define
Zn pRห q :โ nยดd{2
รฟ
i{nPRห
รฟ
D
Xi โ nยดd{2
iPt1,...,nud
|nRห X Ai | Xi ,
Rห P Rห
where Ai โ pi1 ยด 1, i1 s ห . . . ห pid ยด 1, id s is the unit cube with upper corner i. Then it holds
D
Zn ร W,
n ร 8.
Proof. Note that Rห is totally bounded w.r.t. ฯห . We will show the assumptions of (Kosorok,
2008, Thm. 2.1):
1. Tightness: The white noise W is tight.
2. Totally boundedness: By Markovโs inequality and standard bounds on the modulus of continuity, we obtain using Assumption 1(a) that
๏ฌ
ยป
โ
Pห โ
โ
sup
ห
ห
Rห
1 ,R2 PR
ห
ฯpRห
1 ,R2 qฤฮด
ยป
๏ฌ
|Zn pR1ห q ยด Zn pR2ห q| ฤ
วซ๏ฌ
๏ฌ
๏ฌ
๏ฌ
1 โ
sup
|Zn pR1ห q ยด Zn pR2ห q|๏ฌ
ฤ Eโ
๏ฌ
โ
วซ
Rห ,Rห PRห
1
2
ห
ฯpRห
1 ,R2 qฤฮด
ลผฮดa
ร
uยด2ฮฝpRห q ยด 1 du
0
which tends to 0 as ฮด ล 0.
3. Finite dimensional convergence: The convergence of the finite-dimensional laws is an application of the central limit theorem for random fields (Dedecker, 1998, Thm 2.2) and
(Dedecker, 2001, Lemma 2), which shows that
ห ห
ห
หnR X Zd ห
ร |Rห |
nd
for regular Borel sets Rห ฤ r0, 1sd with |Rห |q ฤ
0. Consequently, the central limit theorem
shows for any fixed Rห P Rห that
D
Zn pRห q ร N p0, |Rห |q
as
nร8
A similar computation shows that
Cov pZn pR1ห q, Zn pR2ห qq ร |R1ห X R2ห |
for all R1ห , R2ห P R. This shows finite dimensional convergence.
20
Now we want to apply the generalized version of the continuous mapping theorem (see e.g.
Billingsley, 2013, Thm. 5.5). For c ฤ 0 and x P CpBpr0, 1sdq, Rq, where Bpr0, 1sdq denote the Borel
sets of r0, 1sd define
ยธ
ห
ห
`
ห
|xpR
q|
a
ยด penv nd |Rห |
hc pxq :โ sup
|Rห |
Rห PRห :
|Rห |ฤ
cd
hcn pxq
:โ
max
RPRn :
|R|ฤ
pcnqd
ห
ยธ
|xpR{nq|
a
ยด penv p|R|q .
|R|{nd
The necessary conditions to apply the continuous mapping theorem are given by the following
Lemma:
ห
`
Lemma 4.3. Consider hc , hcn as functions CpBpr0, 1sdq, Rq, } ยจ }8 ร R.
i) hc is uniformly continuous and phcn qnPN is a sequence of equi-continuous functions, (uniformly in n).
ii) For pxn qn P CpBpr0, 1sdq, Rq, s.t. xn ร x it holds
hcn pxn q ร hc pxq,
n ร 8.
Proof.
i) Let วซ ฤ
0, choose ฮด โ วซcd{2 . Consider two functions x, y P CpBpr0, 1sdq, Rq s.t.
dpx, yq โ
sup ||xpRห q| ยด |ypRห q|| ฤ ฮด. By using |max ai ยด max bi | ฤ max |ai ยด bi | we
find
Rห ฤr0,1sd
|hcn pxq
ยด
hcn pyq|
ห
ห
ห |xpR{nq| ยด |ypR{nq| ห
ฮด
ห
ห
a
ฤ max ห
ห ฤ d{2 โ วซ.
d
RPRn ห
ห c
|R|{n
d
|R|ฤ
pcnq
Similar arguments yield the uniform continuity of hc .
ii) Let pxn qn , x P CpBpr0, 1sdq, Rq, s.t. xn ร x. Since the functions phcm qmPN are equicontinuous, for any วซ ฤ
0 we can find an N1 P N s.t. @n ฤ
N1 @m :
|hcm pxn q ยด hcm pxq| ฤ
วซ
.
2
Given วซ and N1 and n ฤ
N1 with |hcm pxn q ยด hcm pxq| ฤ 2วซ , choose m โ n. Then
|hcn pxn q ยด hcn pxq| ฤ วซ{2.
(35)
Now let us define
(
A :โ Rห P Rห : |Rห | ฤ cd ,
(
Bn :โ R{n P Rห : R P Rn , |R| ฤ pcnqd .
The set A is a compact set w.r.t. the metric ฯห defined in (15), w.r.t. which Rห is totally
d
bounded. Furthermore Bn is a finite subset of A. If we fix x P Bpr0, 1s q and introduce
g : A ร R by
ยธ
ห
|xpRห q|
ห
ห
ยด penv p|R |q ,
Rห P Rห ,
gpR q :โ a
|Rห |
then it holds
gpRห q.
hc pxq โ sup gpRห q ฤ hcn pxq โ max
ห
R PBn
Rห PA
21
(36)
since Bn is a subset of A. Straight forward computations show that g is continuous w.r.t.
r P A s.t. hc pxq โ gpRq.
r Now
ฯห , which implies by compactness of A that there exists an R
r
r
let Rn P Bn be a sequence s.t. Rn ร R, n ร 8 w.r.t. ฯ. Then gpRn q ร gpRq as n ร 8 and
hence
(36)
hc pxq ฤ hcn pxq ฤ gpRn q ร gpRฬq โ hc pxq.
Consequently there exists a N2 P N s.t. @n ฤ
N2 it holds
|hc pxq ยด hcn pxq| ฤ วซ{2,
which together with (35) implies
|hcn pxn q ยด hc pxq| ฤ วซ
for all
n ฤ
maxtN1 , N2 u.
Now we are in position to prove Remark 2.6:
Proof of Remark 2.6. By Proposition 4.2 and the generalized version of the continuous mapping
theorem (see e.g. Billingsley, 2013, Thm. 5.5) we get
D
hcn pZn q ร hc pW q,
n ร 8.
The functions hcn and hc have been defined such that
ยด
ยฏ
and hc pW q โ M Rห|cd , v ,
`
ห
hcn pZn q โ Mn Rn|pcnqd , v ,
i.e. for all c ฤ
0 holds
ยด
ยฏ
`
ห D
Mn Rn| pcnqd , v ร M Rห|cd , v
n ร 8.
as
ยฏ
ยด
D
Since M Rห|cd , v ร M pRห , vq , c ร 0, we get
`
ห
lim lim Mn Rn| pcnqd , v โ M pRห , vq .
cร0 nร8
It can also readily be seen from the definition that
ห
โฐ
โ
`
lim inf P Mn Rn| rn , v ฤ t ฤ P rM pRห , vq ฤ ts .
nร8
Now let c ฤ
0 be fixed and assume rn ฤ pcnqd for all n P N. Then we obtain altogether that
ห
โฐ
โ
`
P rM pRห , vq ฤ ts ฤ lim inf P Mn Rn| rn , v ฤ t
nร8
โ
`
ห
โฐ
ฤ lim sup P Mn Rn| pcnqd , v ฤ t
nร8
ร P rM pRห , vq ฤ ts
as
c ล 0,
which yields the claim.
Proof of Theorem 2.4. The main statement follows from Theorem 2.5 together with Remark 2.6. It
remains to show a.s. boundedness and non-degenerateness of M pRห , vq. We apply (Duฬmbgen and Spokoiny,
2001, Thm. 6.1) with ฯห as in (15) and
ฯ 2 pRห q :โ |Rห | ,
XpRห q :โ W pRห q.
22
Let us check the three conditions from their theorem:
i) ฯ 2 pR1ห q ฤ ฯ 2 pR2ห q ` ฯห pR1ห , R2ห q2 for all R1ห , R2ห P Rห is obviously fulfilled since R1ห X R2ห ฤ R2ห
and R1ห zR2ห ฤ R1ห โณ R2ห . Since V rW pRห qs โ |Rห |,
ห 2ห
โ
ฤฑ 1
ฮท
.
(37)
P rXpRห q ฤ
ฯpRห qฮทs โ P W pRห q ฤ
ฮท p|Rห |q1{2 ฤ exp ยด
2
2
ii) For
โ
ฤฑ
P r|XpR1ห q ยด XpR2ห q| ฤ
ฯpR1ห , R2ห qฮทs โ P |W pR1ห q ยด W pR2ห q| ฤ
|R1ห โณ R2ห |q1{2 ฮท
2
2
we compute that W pR1ห qยดW pR2ห q โ N p0, ฯR
โ |R1ห |`|R2ห |ยด2 CovpW pR1ห q, W pR2ห qq
ห
ห q, ฯ ห
R1 ,Rห
1 ,R2
2
and |R1ห โณ R2ห | โ |R1ห | ` |R2ห | ยด 2 |R1ห X R2ห |. With CovpW pR1ห q, W pR2ห qq โ |R1ห X R2ห | we consequently find
ห
ยธ
ห 2ห
ฮท 2 |R1ห โณ R2ห |
ฮท
ห
ห
ห
ห
P r|XpR1 q ยด XpR2 q| ฤ
ฯpR1 , R2 qฮทs ฤ exp ยด
โ
exp
ยด
.
2
2 ฯR
2
ห
ห
,R
1
2
iii) Is fulfilled by Assumption 1(a) (cf. Remark 2.2).
(37) holds with ยดW pRห q as well, hence we get that the statistic M pRห , vq ฤ 8 a.s. Nondegenerateness is obvious, as M is always larger than the value of the local statistic on one fixed
scale, which is non-degenerate.
4.3 Proofs of Section 2.3
Let us now prove the results from Section 2.3, namely Theorem 2.9 and Corollary 2.11. First we
introduce some abbreviations to ease notation. Let
O
q ห :โ q1ยดฮฑ,n
,
MS
q :โ q1ยดฮฑ,n
and denote the total signal on Q P Qn by
ยด1{2
ยตn pQq :โ |Q|
รฟ mpฮธn q ยด mpฮธ0 q
|Q X Qn | m pฮธ1n q ยด m pฮธ0 q
i
a
a
โ a
.
vpฮธ0 q
|Q|
v pฮธ0 q
iPQ
For brevity introduce the Gaussian process
ห
ห
ห
ห
รฟ
1
ห
ห n
vi Xi ห ยด penv p|Q|q ,
ฮณ pQq :โ หยต pQq ` |Q|ยด 2
ห
ห
iPQ
(38)
Q P Qn
a
i.i.d.
with Xi โ N p0, 1q and vi โ v pฮธi q {v pฮธ0 q.
Let us now start with the analysis of the oracle procedure. As a preparation we require to leave
out a suitable subset of hypercubes close to the true anomaly Qn . Therefore, choose a sequence
ฮตn such that ฮตn ล 0 but ฮตn ยตn pQn q ร 8 and denote the set of all hypercubes which are close to
the anomaly by
ห
(
Un :โ Q P Qn pan q ห ยตn pQq ฤ ยตn pQn q p1 ยด ฮตn q .
Furthermore define the extended neighborhood of the anomaly by
ห
(
U :โ Q P Qn pan q ห Q X Q1 โฐ H for some Q1 P Un ,
its complement by T :โ Qn pan q zU. By definition, tฮณ pQquQPT and tฮณ pQquQPUn are independent,
which will allow us to compute the asymptotic power of the single-scale procedure. For a sketch
of Un and U see Figure 2.
23
Figure 2: Exemplary elements of the sets Un , U and T in d โ 2: The anomaly is shown in red, the
hatched cubes belong to Un , the dotted cubes to U, and all black cubes belong to T . By
definition, for all Q P Un and Q1 P T it holds Q X Q1 โ H, which implies independence
of tฮณ pQquQPT and tฮณ pQquQPUn .
Lemma 4.4. Consider the setting from Section 2.3 and recall that q ห is the p1 ยด ฮฑqยดquantile of
Mn pQn pan qq as in (9). Then
ห
ห
1 หล
ห
(a) max |Q|ยด 2 ห iPQ vi Xi ห โ OP p1q as n ร 8
QPU
โ
๏พ
(b) lim P max ฮณ pQq ฤ q ห โ 1 ยด ฮฑ
nร8
QPT
2
Proof. We starta
with bounding the covering number N pU, ฯ, วซq w.r.t. the canonical metric ฯ pQ, Q1 q โ
1
2 ยด 2 |Q X Q | { |Q| |Q1 |. First note that all sets in U have fixed size |Qn |. Hence, given some
วซ ฤ
0, one has
ยฏ
ห
ห ยด
`
ห2
หQ X Q1 ห ฤ 1 ยด วซ |Qn | ,
ฯ Q, Q1 ฤ วซ
รด
2
ห
T
P`
วซ
1 2
1
i.e. ฯ pQ, Q q ฤ วซ if and only if Q X Q contains at least 1 ยด 2 |Q
? n | many voxels. Consequently,
as we onlyP`deal with
it is straight forward to construct a วซ-covering of U with cardinality
ห cubes,
T
ฤ 5 |Qn | { 1 ยด 2วซ |Qn | , i.e.
5 |Qn |
T.
N pU, ฯ, วซq ฤ P`
2ห
1 ยด วซ2 |Qn |
(a) It follows from Dudleyโs entropy integral (see e.g. Marcus and Rosen, 2006, Thm. 6.1.2)
with any fixed Q1 P U that
ห
ห๏ฌ
ยซ
หรฟ
ห
ห
ห
E max |Q|ยด1{2 ห vi Xi ห
QPU
ห
ห
iPQ
หห๏ฌ
ห๏ฌ
ห
ห
ห
ห
ห
ยซ
ยซ
หห
ห
ห
หรฟ
หรฟ
ห
หรฟ
หห
ห
ห
ห
ห
ห
ห
1 ยด1{2
ยด1{2
ยด
|Q
|
v
X
ฤE |Q1 |ยด1{2 ห
vi Xi ห ` E max
v
X
|Q|
หห
ห
ห
ห
ห
i
i
i
i
หห
ห
ห
หiPQ1
หiPQ1
Q,Q1 PU ห
หiPQ
d
c
c
ห
ห
ลผ2a
ลผ2
2v 2
2v 2
วซ2
`C
`C
dวซ ฤ 8
ฤ
log N pU, ฯ, วซq dวซ ฤ
ยด log 1 ยด
ฯ
ฯ
2
0
0
which by Markovโs inequality proves the claim.
(b) A direct consequence of (a) is that
ห
ห
ยซ
๏ฌ
หรฟ
ห
ห
ยด 12 ห
max |Q| ห vi Xi ห ยด penv p|Q|q โ oP p1q.
QPU
หiPQ
ห
24
Furthermore note that ยตn pQq โ 0 and vi โ 1, i P Q for Q P T . Consequently
ห
ห
๏ฌ
๏ฌ
ยซ
ยซ
โ
๏พ
หรฟ ห
1 ห
ห
Xi ห ยด penv p|Q|q ฤ q ห
P max ฮณ pQq ฤ q ห โP max |Q|ยด 2 ห
หiPQ ห
QPT
QPT
ห
ห
๏ฌ
๏ฌ
ยซ
ยซ
หรฟ ห
ห
ห
ยด 12 ห
Xi ห ยด penv p|Q|q ฤ q ` op1q
โP
max
|Q| ห
หiPQ ห
QPQn pan q
โP rMn pQn pan qq ฤ q ห s ` op1q
which yields the claim.
With this Lemma at hand, we are now in position to derive the asymptotic power of the oracle
procedure:
Proof of Theorem 2.9(a). To analyze Pฮธn rTn pY, ฮธ0 , Qn pan qq ฤ
q ห s, we start with showing a ฤ in
the statement of Theorem 2.9(a). By Lemma 4.1 and the triangle inequality we can replace
Tn pY, ฮธ0 , Qn pan qq by
ห
ห
๏ฌ
ยซ
ห รฟ Y ยด mpฮธ q ห
i
0 ห
ยด 12 ห
a
max
|Q| ห
ห ยด penv p|Q|q
หiPQ
QPQn pan q
vpฮธ0 q ห
up to oP p1q. Furthermore (21) and Theorem 3.3 allow us to approximate the latter sum by a
Gaussian version, i.e.
โ
๏พ
n
ห
ห
max
ฮณ pQq ฤ
q ` op1q.
Pฮธn rTn pY, ฮธ0 , Q pan qq ฤ
q s โ P
n
QPQ pan q
Now we derive
P
โ
max
n
QPQ pan q
โ"
ฮณ pQq ฤ
q ห
๏พ
* "
*๏พ
ห
ห
max
ฮณ
pQq
ฤ
q
X
max
ฮณ
pQq
ฤ
q
QPT
QPQn pan q
โ"
* "
*๏พ
ห
ห
`P
max
ฮณ
pQq
ฤ
q
X
max
ฮณ
pQq
ฤ
q
QPT
QPQn pan q
โ"
* "
*๏พ
โ
๏พ
โP max ฮณ pQq ฤ q ห X max ฮณ pQq ฤ
q ห
` P max ฮณ pQq ฤ
q ห
QPT
QPU
QPT
โ"
*
๏พ
โ
๏พ
ฤP max ฮณ pQq ฤ q ห X tฮณ pQn q ฤ
q ห u ` P max ฮณ pQq ฤ
q ห
QPT
QPT
โ
๏พ
โ
๏พ
โP max ฮณ pQq ฤ q ห P rฮณ pQn q ฤ
q ห s ` P max ฮณ pQq ฤ
q ห
โP
QPT
QPT
where we exploited Qn P U and independence of tฮณ pQquQPT and ฮณ pQn q. Lemma 4.4(b) states
that P rmaxQPT ฮณ pQq ฤ q ห s โ 1 ยด ฮฑ ` op1q and hence
Pฮธn rTn pY, ฮธ0 , Qn pan qq ฤ
q ห s ฤ ฮฑ ` p1 ยด ฮฑq P rฮณ pQn q ฤ
q ห s ` op1q.
Furthermore note that ฮณ pQn q ` penv p|Qn |q follows a folded normal distribution with parameters
ยด1 ล
2
ยต โ ยตn pQn q and ฯ 2 โ |Qn |
iPQn vi , this is
ห `
หห
ฮณ pQn q โ หN ยต, ฯ 2 ห ยด penv p|Qn |q .
We compute
ยตn pQn q โ
a
m pฮธ1n q ยด m pฮธ0 q
a
nd an 2, 5C
p1 ` o p1qq ,
v pฮธ0 q
25
(39)
รฟ
v pฮธ1n q
,
v pฮธ0 q
iPQn
b
`
ห
penv p|Q|q โ 2v log aยด1
` op1q
n
|Qn |ยด1
vi2 โ
(40)
for all Q P Qn pan q ,
(41)
which yields by continuity of F and Qn P Qn pan q the proposed lower bound. For the upper bound
(i.e. ฤ in the statement of Theorem 2.9(a)) we proceed as before and obtain
Pฮธn rTn pY, ฮธ0 , Qn pan qq ฤ
q ห s
โ"
* "
*๏พ
ห
ห
โฮฑ ` P max ฮณ pQq ฤ q n X max ฮณ pQq ฤ
q
` op1q
QPT
QPU
โ"
* "
* "
*๏พ
ห
ห
ห
โฮฑ ` P max ฮณ pQq ฤ q X max ฮณ pQq ฤ
q X max ฮณ pQq ฤ
q
QPT
QPU
QPUn
โ"
* "
* "
*๏พ
ห
ห
ห
` P max ฮณ pQq ฤ q X max ฮณ pQq ฤ
q X max ฮณ pQq ฤ q
` op1q
QPT
QPU
QPUn
โ"
* "
*๏พ
โ
๏พ
ห
ห
ห
ฤฮฑ ` P max ฮณ pQq ฤ q X max ฮณ pQq ฤ
q
` P max ฮณ pQq ฤ
q ` op1q
QPT
QPUn
QPU zUn
โ
๏พ
โ
๏พ
ห
ห
โฮฑ ` p1 ยด ฮฑq P max ฮณ pQq ฤ
q ` P max ฮณ pQq ฤ
q ` op1q
QPUn
QPU zUn
where we used independence of tฮณ pQquQPT and tฮณ pQquQPUn . From Lemma 4.4(a) we obtain
ห
ห
ห
ห
ห
ห
ห
ห
ห ยด 21 รฟ
ห
ห
ห ยด 12 รฟ
vi Xi ห ฤ max ห|Q|
vi Xi ห โ OP p1q
max ห|Q|
QPU
ห
ห
ห
ห
QPU zUn
iPQ
iPQ
and further by definition of Un that ยตn pQq ฤ p1 ยด ฮตn q ยตn pQn q for all Q P UzUn . Exploiting (41)
this implies
โ
๏พ
ห
P max ฮณ pQq ฤ
q
QPU zUn
โ
๏พ
b
` ยด1 ห
n
ห
ฤP p1 ยด ฮตn q ยต pQn q ` OP p1q ยด 2 log an ฤ
q
โ
๏พ
b
` ยด1 ห
n
n
ห
โP ยต pQn q ยด 2 log an ยด ฮตn ยต pQn q ` OP p1q ฤ
q โ op1q
b
`
ห
if ยตn pQn q ยด 2 log aยด1
ร C P rยด8, 8q (as ฮตn ยตn pQn q ร 8 by construction), and if ยตn pQn q ยด
n
b
`
ห
2 log aยด1
ร 8, then nothing has to be shown. Altogether this gives
n
โ
๏พ
Pฮธn rTn pY, ฮธ0 , Qn pan qq ฤ
q ห s ฤ ฮฑ ` p1 ยด ฮฑq P max ฮณ pQq ฤ
q ห ` op1q.
QPUn
With similar arguments as in Lemma 4.4 we obtain from ฮตn ล 0 that
โ
๏พ
ห
P max ฮณ pQq ฤ
q โ P rฮณ pQn q ` oP p1q ฤ
q ห s
QPUn
and hence the claim is proven.
Now we turn to the multiscale procedure. As here different scales are considered, the set U is
not large enough any more. Especially, we cannot construct a subset V such that tฮณ pQquV c and
ฮณ pQn q are independent and maxQPV ฮณ pQq is still negligible. Due to this, the corresponding proof
in Sharpnack and Arias-Castro (2016) is incomplete. To overcome this difficulty, we follow the
26
idea to distinguish if the anomaly Qn has asymptotically an effect on ฮณ pQq or not. Whenever Q
is sufficiently large compared to Qn , the impact
will
ยด
ยฏ asymptotically be negligible.
ยดฮณ
For some sequence วซn ล 0 with วซn โ O |Qn |
with some ฮณ ฤ
0 we introduce
#
d
n
ฮดn :โ วซn max ยต pQn q , logpnq
|Qn |
rn
+ยด1
,
(42)
ห
(
V :โ Q P Qn |rn ห ยตn pQq ฤ ฮดn ยตn pQn q
and its complement T 1 :โ Qn |rn zV. For a sketch see Figure 3.
Figure 3: Exemplary elements of the sets V and T 1 in d โ 2: The anomaly is shown in red,
the hatched cubes belong to V and the dotted cubes to T 1 . However, the intersections
marked in black are small enough such that they have asymptotically no influence on
ฮณ pQq.
Opposed to the oracle procedure, we do not have independence of tฮณ pQquQPT 1 and ฮณ pQn q.
However, asymptotically a similar property holds true as shown in the following Lemma:
Lemma 4.5. Consider the setting from Section 2.3 and recall that q is the p1 ยด ฮฑqยดquantile of
Mn pQn |rn q as in (9). Then the following statements hold true as n ร 8:
ห
ห
ยดa
ยฏ
a
1 ล
ห
ห
ln p|Qn |q ` ln pยด ln pm pฮธ1n q ยด m pฮธ0 qqq
(a) max ห|Q|ยด 2 iPQ vi Xi ห โ OP
QPV
ห
ห
ห
ห
ห ยด 12 ล
ห
(b) max1 ห|Q|
vi Xi ห โ oP p1q
QPT ห
ห
iPQXQn
โ
๏พ
(c) P max1 ฮณ pQq ฤ q โ 1 ยด ฮฑ ` op1q
QPT
Proof. Let us again start with
the canonical metric
abounding the covering number NnpV, ฯ, วซq w.r.t.
n
1 2
1
1
ฯ pQ, Q q โ 2 ยด 2 |Q X Q | { |Q| |Q |. For all Q P V it holds ยต pQq ฤ ฮดn ยต pQn q, which implies
ฮดn
a
|Q X Qn |
|Qn |
|Qn | ฤ a
ฤa .
|Q|
|Q|
Consequently, V contains only cubes Q with rn ฤ |Q| ฤ ฮดnยด2 |Qn |.?For a fixed scale k, V contains
at most pC |Qn |q Qโs with |Q| โ k, and for the set ofP`such Qโs
ห Tan วซ-covering can be constructed
as in the proof of Lemma 4.4 with at most C |Qn | { 1 ยด 2วซ k elements, which gives
N pV, ฯ, วซq ฤ C
ยด2
tฮดn
|Qn |u
รฟ
kโrn
หยด1
ห
ห
ห
วซ2
|Qn |
|Qn |
P`
ห
T
ฤC 1ยด
.
|Qn | ln
2
ฮดn2 rn
1 ยด 2วซ k
27
(a) Again with the help of Dudleyโs entropy integral we find
ห
ห๏ฌ
ยซ
หรฟ
ห
ห
ยด1{2 ห
E max |Q|
ห vi Xi ห
QPV
หiPQ
ห
c
ลผ
2a
2v 2
`C
log N pV, ฯ, วซq dวซ
ฤ
ฯ
0
d ห ห
ห
หหยธ
a
|Qn |
ln p|Qn |q ` ln ln
ฤC
ฮดn2 rn
ห
ห
b
a
ln p|Qn |q ` ln pยด ln pm pฮธ1n q ยด m pฮธ0 qqq
ฤC
ยด
ยฏ
ยดฮณ
where we used วซn โ O |Qn |
with some ฮณ ฤ
0. Now Markovโs inequality gives the claim.
a
1
n
(b) For Q P T it holds ยต pQq ฤ ฮดn ยตn pQn q and hence |Q X Qn | ฤ ฮดn |Q| |Qn |. Consequently
ห๏ฌ
ห
ยซ
ห
ห รฟ
ห
ยด1{2 ห
vi Xi ห
E max1 |Q|
ห
ห
QPT
หiPQXQ
n
ห
ห๏ฌ
ยซ
1
ห รฟ
ห
a ห |Qn | ห 4
ห
ยด1{2 ห
E
max |Q X Qn |
ฤ ฮดn
vi Xi ห
ห
ห
ห
rn
QPQn |rn
iPQXQn
ฤC vฬ
a
ฮดn
ห
|Qn |
rn
ห 14
a
logpnq
where we used (29). As the right-hand side converges to 0 by (42), this proves the claim.
(c) This can now be deduced from (a) and (b) as follows. For all Q P T 1 it holds ยตn pQq ฤ
ฮดn ยตn pQn q and hence
ห
ยปห
๏ฌ
ห
ห
ห ยด1 รฟ
ห
max ฮณ pQq ยด max1 โหห|Q| 2
vi Xi หห ยด penv p|Q|q๏ฌ
QPT 1
QPT
ห
ห
iPQzQn
ห๏ฌ
ห
ยซ
ห
ห
ห
ห ยด1 รฟ
vi Xi ห
ฤ max1 ยตn pQq ` ห|Q| 2
ห
QPT
ห
iPQXQn
ห
ห
ห
ห
ห ยด 21 รฟ
ห pbq
n
ฤฮดn ยต pQn q ` max1 ห|Q|
vi Xi ห โ oP p1q
(43)
QPT ห
ห
iPQXQ
n
n
where the last estimate follows from ฮดn ยต pQn q ล 0. Furthermore, as V contains only scales
ฤ ฮดnยด2 |Qn | we obtain that
ห
ยซห
๏ฌ
ห
ห
ห ยด 12 รฟ ห
max ห|Q|
Xi ห ยด penv p|Q|q
QPV ห
ห
iPQ
ห
๏ฌ
ยซห
ห
ห
` ยด2
ห
ห ยด 12 รฟ ห
Xi ห ยด penv ฮดn |Qn |
ฤ max ห|Q|
QPV ห
ห
iPQ
ห
ห
b
a
`
ห
paq
n
ln p|Qn |q ` ln pยด ln pm pฮธ1 q ยด m pฮธ0 qqq ยด penv ฮดnยด2 |Qn |
โ OP
โoP p1q,
(44)
where we used |Qn | โ o pnฮฑ q with ฮฑ ฤ
0 sufficiently small. Consequently
โ
๏พ
P max1 ฮณ pQq ฤ q
QPT
28
(43)
โ
pbq
โ
(44)
โ
โ
ห
ยปห
๏ฌ
๏ฌ
ห
ห
ห ยด1 รฟ
ห
P โ max1 โหห|Q| 2
vi Xi หห ยด penv p|Q|q๏ฌ ฤ q ๏ฌ ` op1q
QPT
ห
ห
iPQzQn
ห
๏ฌ
๏ฌ
ยซห
ยซ
ห
ห
ห ยด 12 รฟ ห
Xi ห ยด penv p|Q|q ฤ q ` op1q
P max1 ห|Q|
ห
QPT
ห
iPQ
ห
๏ฌ
๏ฌ
ยซห
ยซ
ห
ห
ห ยด 12 รฟ ห
Xi ห ยด penv p|Q|q ฤ q ` op1q
P
max ห|Q|
ห
QPQn |rn ห
ยป
iPQ
P rMn pQn |rn q ฤ qs ` op1q
which yields the claim.
Proof of Theorem 2.9(b). For the multiscale procedure we have to compute a lower bound for
Pฮธn rTn pY, ฮธ0 , Qn |rn q ฤ
qs. Similar to the Proof of Theorem 2.9(a) we obtain
Pฮธn rTn pY, ฮธ0 , Qn |rn q ฤ
qs
โ"
*
๏พ
โ
๏พ
ฤP max1 ฮณ pQq ฤ q X tฮณ pQn q ฤ
qu ` P max1 ฮณ pQq ฤ
q ` op1q.
QPT
QPT
By Lemma 4.5(b) we furthermore get
โ
๏พ
P max1 ฮณ pQq ฤ q
QPT
ห
ยซ
๏ฌ
๏ฌ
ยซห
ห
ห
1 รฟ
ห n
ห
vi Xi ห ยด penv p|Q|q ฤ q
โP max1 หยต pQq ` a
QPT
ห
ห
|Q| iPQ
ห
๏ฌ
๏ฌ
ยป
ยปห
ห
ห
รฟ
ห
ห n
1
vi Xi หห ยด penv p|Q|q๏ฌ ฤ q ๏ฌ ` op1q,
โP โ max1 โหหยต pQq ` a
QPT
|Q| iPQzQn
ห
ห
which shows by independence that
โ"
*
๏พ
P max1 ฮณ pQq ฤ q X tฮณ pQn q ฤ
qu
QPT
โ
๏พ
โP max1 ฮณ pQq ฤ q P rฮณ pQn q ฤ
qs ` op1q.
QPT
Now the proof can be concluded as the one of Theorem 2.9(a).
Proof of Corollary 2.11. The procedures have asymptotic power 1 if and only if
ยธ
ห
n
n
a
?
m
pฮธ
q
ยด
m
pฮธ
q
v
pฮธ
q
0
1
1
a
,
ร1
F qฬ ` ยด2 log pan q, nd{2 an
v pฮธ0 q
v pฮธ0 q
as n ร 8 with qฬ P tq ห , qu respectively. The straight-forward estimate
ห
ห
ห*
" ห
`
ห
ยตยดx
ยดx ยด ยต
2
,ฮฆ
F x, ยต, ฯ ฤ max ฮฆ
ฯ
ฯ
shows that this is the case if and only if
x`ยต
ร ยด8
ฯ
or
xยดยต
ร ยด8.
ฯ
Inserting the values for x, ยต and ฯ and noting that q ห , q are uniformly bounded by the p1 ยด
ฮฑqยดquantile of M pQห , vq gives the claim.
29
5 Appendix
Recall the packing number K pวซ, ฯ, Wq from Remark 2.2. In this appendix we compute the packing
numbers given in Example 2.3, which will be done by means of the covering number. The covering
number N pวซ, ฯ, Wq of a subset W ฤ Rห w.r.t. a metric ฯ is given by the minimal number of
balls of radius วซ ฤ
0 needed to cover W (cf. van der Vaart and Wellner, 1996, Def. 2.2.3). It is
immediately clear, that
ยฏ
ยดวซ
, ฯ, W ,
N pวซ, ฯ, Wq ฤ K pวซ, ฯ, Wq ฤ N
2
ยด
ห
(ยฏ
1{2
and hence it sufficed to compute N pฮดuq , ฯห , R P Rห ห |R| ฤ ฮด with ฯห as in (15) to show
(16). In the following, we will use the notation from Example 2.3.
Lemma 5.1. For any วซ ฤ
0 there exists a constant C depending only on the dimension d and วซ
such that for all u, ฮด P p0, 1s it holds
ยด
ยฏ
K pฮดuq1{2 , ฯห , tS P S ห : |S| ฤ ฮดu ฤ Cuยดp2d`วซq ฮด ยดp2dยด1`วซq ,
i.e. (16) holds true with k1 โ C, k2 โ 2d ` วซ and VS ห โ 2d ยด 1 ` วซ.
Proof. We approximate the hyper-rectangles in W โ tS P S ห : |S| ฤ ฮดu by hyper-rectangles with
ห
(d
vertices in the lattice Lm :โ mi ห i โ 0, . . . , m where m has to be specified later. The set of
1
all hyper-rectangles with such vertices and size ฤ ฮด will be denoted by Wm
. For S P W denote
ลd
by k1 , . . . , kd the edge lengths. Then jโ1 kj ฤ ฮด and ki ฤ 1. It is immediately clear that there
1
exists an approximating hyper-rectangle S 1 P Wm
such that
ห
` ห`
หห2 ห
โ หS โณ S 1 ห
ฯ S, S 1
ฤ 2 pk2 ยจ ... ยจ kd ` k1 ยจ k3 ยจ ... ยจ kd ` . . . ` k1 ยจ . . . ยจ kdยด1 q ยจ
ฤ
d
.
m
1
2m
(45)
1{2
d
Hence, we obtain ฯห pS, S 1 q ฤ pฮดuq
if we choose m :โ ฮดu
. Now we have to compute the
1
cardinality of Wd{pฮดuq . First note that the number of possible left bottom vertices is bounded from
1
above by md โ #Lm . If we denote the edge lengths of S 1 P Wm
by l1 , . . . , ld , we can find integers
ลd
ij
d
i1 , ..., id such that lj โ m and jโ1 ij ฤ ฮดm โ: N . Therefore, we obtain
ยด
ยฏ
1
N pฮดuq1{2 , ฯห , tS P S ห : |S| ฤ ฮดu ฤ #Wm
ฤ md ยจ #PN
(46)
!
)
ห ลd
with PN :โ pi1 , . . . , id q P Nd ห
jโ1 ij ฤ N . To compute #PN , we employ Minkowskiโs theo-
ห
rem (cf. Cassels, 1997, Sec. III.2.2), which ensures that the Lebesgue volume โd pN q of px1 , . . . , xd q P r1, N sd ห x1 ยจ . . .
is comparable with #PN up to a factor of 2d . It can readily be shown by induction that
โd pN q โ
1
dยด1
N plog N q
.
pd ยด 1q!
Inserting this into (46), we obtain
ยด
ยฏ
N pฮดuq1{2 , ฯห , tS P S ห : |S| ฤ ฮดu
ฤmd ห #PN
`
ห
ฤ2d md โd ฮดmd
`
หdยด1
รฮดm2d log ฮดmd
30
โ ยด
ยฏฤฑdยด1
โฮด ยดp2dยด1q uยด2d log dd ฮด ยดpdยด1q uยดd
dยด1
dยด1
รฮด ยดp2dยด1q plogp1{ฮดqq
uยด2d plogp1{uqq
where we used px ` yqdยด1 ฤ cxdยด1 y dยด1 for x, y ฤ 1. This proves the claim.
Lemma 5.2. There exists a constant C depending only on the dimension d such that for all
u, ฮด P p0, 1s it holds
ยด
ยฏ
K pฮดuq1{2 , ฯห , tQ P Qห : |Q| ฤ ฮดu ฤ Cฮด ยด1 uยดpd`1q ,
i.e. (16) holds true with k1 โ C, k2 โ d ` 1 and VQห โ 1.
Proof. We proceed as in the Proof of Lemma 5.1. In contrast to hyper-rectangles, we obtain here
instead of (45) the better estimate
dยด1
ห dฮด d
` ห`
หห2 ห
ฯ Q, Q1
โ หQ โณ Q1 ห ฤ
.
m
d
. Furthermore, the cardinality
as all edges have the same length, i.e. we can choose m :โ ฮด1{d
u
1
of Wm is bounded by the number of lower left vertices times the number of possibilities for an
adjacent vertex, which gives
ยด
ยฏ
1
#Wm
ฤ md ยจ ฮด 1{d m โ md`1 ฮด 1{d .
Therefore we finally obtain
ยด
ยฏ
1
N pฮดuq1{2 , ฯห , tS P S ห : |S| ฤ ฮดu ฤ #Wd{pฮด
1{d uq
ห
หd`1
d
ฤ
ฮด 1{d โ dd`1 uยดpd`1q ฮด ยด1 ,
ฮด 1{d u
which proves the claim.
Lemma 5.3. There exists a constant C depending only on the dimension d such that for all
u, ฮด P p0, 1s it holds
ยด
ยฏ
K pฮดuq1{2 , ฯห , tH P Hห : |H| ฤ ฮดu ฤ Cฮด ยด2 uยด2 ,
i.e. (16) holds true with k1 โ C, k2 โ 2 and VHห โ 2.
ห
(
ห i โ 1, ..., N, j โ 1, ..., m with numbers a1 , ..., aN P Sdยด1 and ฮฑ1 , ..., ฮฑm P
Proof.
Let
W
โ
H
N,m
a
,ฮฑ
i
j
โ ? ฤฑ
?
0, d . Note that Ha,ฮฑ โ H for ฮฑ ฤ
d by definition and Pythagorasโ theorem. It is convenient
to choose ฮฑ1 , ..., ฮฑm as equidistant, e.g.
ฮฑi :โ
i ยด 12 ?
dn,
m
i โ 1, . . . , m.
Furthermore we choose a1 , ..., aN as a maximal system of points in Sdยด1 such that ?paj , ak q ฤ
1
` 1 ห dยด1
for all j โฐ k. This implies that
m
หห ห 1 ยธ
N
ฤ
1 dยด1
dยด1
S aj
S
ฤ
m
jโ1
ห
(
with the spherical cap Sa pฮธ0 q โ e P Sdยด1 ห ?pa, eq ฤ ฮธ0 . Note that
ฮธล0
|Sa pฮธ0 q| โ ฯ0ล
0
dยด2
psin tq
psin tq
31
dยด2
dt
dt
โ ฮธ0dยด1
โ ? ฤฑ
for small values of ฮธ0 . Now, for any given a P Sdยด1 and ฮฑ P 0, d , we can find 1 ฤ i ฤ N and
1 ฤ j ฤ m such that
|a ยด ai | ฤ
ห
1
m
1
ห dยด1
,
?
d
|ฮฑ ยด ฮฑj | ฤ
.
m
Now we split
ห
ห
หห2
` ห`
ฤ |Ha,ฮฑ โณ Hai ,ฮฑ | ` หHai ,ฮฑ โณ Hai ,ฮฑj ห
ฯ Ha,ฮฑ , Hai ,ฮฑj
and since Hai ,ฮฑ โณ Hai ,ฮฑj is a d ยด 1-dimensional space of width ฤ
1
` 1 ห dยด1
of hyperpyramids with opening angle ฤ m
, we obtain
?
d
m
and Ha,ฮฑ โณ Hai ,ฮฑ is a union
หห2
` ห`
C
ฤ
ฯ Ha,ฮฑ , Hai ,ฮฑj
m
where C is some generic constant depending only on d. Hence if we choose m โ C ยด1 ฮด ยด1 uยด1 , then
for each H P tH P Hห : |H| ฤ ฮดu there exists H 1 P WN,m such that ฯห pS, S 1 q ฤ pฮดuq1{2 . Now we
have to estimate N . By elementary geometry it follows that
ห ห ห 1 ยธ
หห ห 1 ยธ
N
N
ฤ
ฤ
1 1 dยด1
1 dยด1
dยด1
S aj
ฤS
ฤ
,
S aj
2 m
m
jโ1
jโ1
and furthermore up to boundary points, the sets on the left-hand side are disjoint. Therefore we
obtain for the volumes that
ห
ห
ห ห ห 1 ยธห
หห ห 1 ยธห
ห
ห
1 1 dยด1 หห หห dยด1 หห
1 dยด1 หห
ห
ห
N หSaj
ฤ N หSaj
หฤ S
ห
ห
ห
ห
ห
2 m
m
which implies N โ m. Consequently, #WN,m โ m2 which proves the claim.
Acknowledgements
The authors gratefully acknowledge financial support by the German Research Foundation DFG
through subproject A04 of CRC 755. We also thank Katharina Proksch for many helpful comments
on the proof of Theorem 2.5.
References
Adler, R. J. (2000). On excursion sets, tube formulas and maxima of random fields. Annals of
Applied Probability, pages 1โ74.
Alm, S. E. (1998). Approximation and simulation of the distributions of scan statistics for Poisson
processes in higher dimensions. Extremes, 1(1):111โ126.
Arias-Castro, E., Candeฬs, E. J., and Durand, A. (2011). Detection of an anomalous cluster in a
network. Ann. Statist., 39(1):278โ304.
Arias-Castro, E., Castro, R. M., Taฬnczos, E., and Wang, M. (2017). Distribution-free detection of
structured anomalies: permutation and rank-based scans. Journal of the American Statistical
Association, (to appear).
Arias-Castro, E., Donoho, D. L., and Huo, X. (2005). Near-optimal detection of geometric objects
by fast multiscale methods. IEEE Trans. Inform. Theory, 51(7):2402โ2425.
32
Benjamini, Y. and Hochberg, Y. (1995). Controlling the false discovery rate: a practical and
powerful approach to multiple testing. J. Roy. Statist. Soc. Ser. B, 57(1):289โ300.
Benjamini, Y. and Yekutieli, D. (2001). The control of the false discovery rate in multiple testing
under dependency. Ann. Statist., 29(4):1165โ1188.
Billingsley, P. (2013). Convergence of Probability Measures. John Wiley & Sons.
Brown, L. D. (1986). Fundamentals of statistical exponential families with applications in statistical decision theory. lecture notes. 9:x+283.
Butucea, C. and Ingster, Y. I. (2013). Detection of a sparse submatrix of a high-dimensional noisy
matrix. Bernoulli, 19(5B):2652โ2688.
Casella, G. and Berger, R. L. (2002). Statistical inference, volume 2. Duxbury Pacific Grove, CA.
Cassels, J. W. S. (1997). An introduction to the geometry of numbers. Classics in Mathematics.
Springer-Verlag, Berlin. Corrected reprint of the 1971 edition.
Cheng, D. and Schwartzman, A. (2017). Multiple testing of local maxima for detection of peaks
in random fields. Ann. Statist., 45(2):529โ556.
Chernozhukov, V., Chetverikov, D., and Kato, K. (2014). Gaussian approximation of suprema of
empirical processes. Ann. Statist., 42(4):1564โ1597.
Dedecker, J. (1998). A central limit theorem for stationary random fields. Probab. Theory Related
Fields, 110(3):397โ426.
Dedecker, J. (2001). Exponential inequalities and functional central limit theorems for random
fields. ESAIM Probab. Statist., 5:77โ104.
Despres, C. J. (2014). The vapnik-chervonenkis dimension of norms on Rd . arXiv preprint
arXiv:1412.6612.
Devroye, L. and Lugosi, G. (2001). Combinatorial Methods in Density Estimation. Springer Series
in Statistics. Springer-Verlag, New York.
Dickhaus, T. (2014). Simultaneous Statistical Inference. Springer, Heidelberg. With applications
in the life sciences.
Duฬmbgen, L. and Spokoiny, V. G. (2001). Multiscale testing of qualitative hypotheses. Ann.
Statist., 29(1):124โ152.
Duฬmbgen, L. and Walther, G. (2008). Multiscale inference about a density.
36(4):1758โ1785.
Ann. Statist.,
Fang, X. and Siegmund, D. (2016). Poisson approximation for two scan statistics with rates of
convergence. Ann. Appl. Probab., 26(4):2384โ2418.
Frick, K., Munk, A., and Sieling, H. (2014). Multiscale change point inference. J. R. Stat. Soc.
Ser. B. Stat. Methodol., 76(3):495โ580. With 32 discussions by 47 authors and a rejoinder by
the authors.
Friedenberg, D. A. and Genovese, C. R. (2013). Straight to the source: detecting aggregate objects
in astronomical images with proper error control. J. Amer. Statist. Assoc., 108(502):456โ468.
Haiman, G. and Preda, C. (2006). Estimation for the distribution of two-dimensional discrete
scan statistics. Methodol. Comput. Appl. Probab., 8(3):373โ381.
Jiang, T. (2002). Maxima of partial sums indexed by geometrical structures. Ann. Probab.,
30(4):1854โ1892.
33
Jiang, Y., Qiu, Y., Minn, A. J., and Zhang, N. R. (2016). Assessing intratumor heterogeneity
and tracking longitudinal and spatial clonal evolutionary history by next-generation sequencing.
PNAS, 113(37):E5528โE5537.
Kabluchko, Z. (2011). Extremes of the standardized Gaussian noise. Stochastic Process. Appl.,
121(3):515โ533.
Kabluchko, Z. and Munk, A. (2009). Shaoโs theorem on the maximum of standardized random
walk increments for multidimensional arrays. ESAIM Probab. Stat., 13:409โ416.
Kazantsev, I., Lemahieu, I., Salov, G., and Denys, R. (2002). Statistical detection of defects in
radiographic images in nondestructive testing. Signal Processing, 82(5):791 โ 801.
Komloฬs, J., Major, P., and Tusnaฬdy, G. (1976). An approximation of partial sums of independent
RVโs, and the sample DF. II. Z. Wahrscheinlichkeitstheorie und Verw. Gebiete, 34(1):33โ58.
Kosorok, M. R. (2008). Introduction to Empirical Processes and Semiparametric Inference.
Springer Series in Statistics. Springer, New York.
Kou, J. (2017). Identifying the support of rectangular signals in gaussian noise. arXiv preprint
arXiv:1703.06226.
Kulldorff, M., Heffernan, R., Hartman, J., Assuno, R., and Mostashari, F. (2005). A spacetime
permutation scan statistic for disease outbreak detection. PLOS Medicine, 2(3).
Ledoux, M. and Talagrand, M. (1991). Probability in Banach Spaces, volume 23 of Ergebnisse
der Mathematik und ihrer Grenzgebiete (3) [Results in Mathematics and Related Areas (3)].
Springer-Verlag, Berlin. Isoperimetry and processes.
Lehmann, E. L. and Romano, J. P. (2005). Testing Statistical Hypotheses. Springer Texts in
Statistics. Springer, New York, third edition.
Li, H., Munk, A., and Sieling, H. (2016). FDR-control in multiscale change-point segmentation.
Electron. J. Stat., 10(1):918โ959.
Marcus, M. B. and Rosen, J. (2006). Markov processes, Gaussian processes, and local times, volume
100 of Cambridge Studies in Advanced Mathematics. Cambridge University Press, Cambridge.
Massart, P. (1989). Strong approximation for multivariate empirical and related processes, via
KMT constructions. Ann. Probab., 17(1):266โ291.
Naus, J. I. and Wallenstein, S. (2004). Multiple window and cluster size scan procedures. Methodol.
Comput. Appl. Probab., 6(4):389โ400.
Pozdnyakov, V., Glaz, J., Kulldorff, M., and Steele, J. M. (2005). A martingale approach to scan
statistics. Ann. Inst. Statist. Math., 57(1):21โ37.
Proksch, K., Werner, F., and Munk, A. (2017+). Multiscale scanning in inverse problems. arXiv
preprint arXiv:1611.04537, (to appear in Ann. Statist.).
Rio, E. (1993). Strong approximation for set-indexed partial-sum processes, via KMT constructions. II. Ann. Probab., 21(3):1706โ1727.
Rivera, C. and Walther, G. (2013). Optimal detection of a jump in the intensity of a Poisson
process or in a density with likelihood ratio statistics. Scand. J. Stat., 40(4):752โ769.
Schmidt-Hieber, J., Munk, A., and Duฬmbgen, L. (2013). Multiscale methods for shape constraints
in deconvolution: confidence statements for qualitative features. Ann. Statist., 41(3):1299โ1328.
Sharpnack, J. and Arias-Castro, E. (2016). Exact asymptotics for the scan statistic and fast
alternatives. Electron. J. Stat., 10(2):2641โ2684.
34
Siegmund, D. and Venkatraman, E. S. (1995). Using the generalized likelihood ratio statistic for
sequential detection of a change-point. Ann. Statist., 23(1):255โ271.
Siegmund, D. and Yakir, B. (2000). Tail probabilities for the null distribution of scanning statistics.
Bernoulli, 6(2):191โ213.
Taylor, J. E. and Worsley, K. J. (2007). Detecting sparse signals in random fields, with an
application to brain mapping. Journal of the American Statistical Association, 102(479):913โ
928.
Tu, I.-P. (2013). The maximum of a ratchet scanning process over a Poisson random field. Statist.
Sinica, 23(4):1541โ1551.
van der Vaart, A. W. and Wellner, J. A. (1996). Weak Convergence and Empirical Processes.
Springer Series in Statistics. Springer-Verlag, New York. With applications to statistics.
Sฬidaฬk, Z. (1967). Rectangular confidence regions for the means of multivariate normal distributions. J. Amer. Statist. Assoc., 62:626โ633.
Walther, G. (2010). Optimal and fast detection of spatial clusters with scan statistics. Ann.
Statist., 38(2):1010โ1033.
Zhang, N. R., Yakir, B., Xia, L. C., and Siegmund, D. (2016). Scan statistics on Poisson random
fields with applications in genomics. Ann. Appl. Stat., 10(2):726โ755.
35
| 10math.ST
|
Space-Efficient Latent Contracts
Michael Greenberg
arXiv:1604.02474v4 [cs.PL] 6 Jun 2017
Pomona College
[email protected]
Abstract. Standard higher-order contract monitoring breaks tail recursion and leads to space leaks that can change a programโs asymptotic complexity; space-efficiency restores tail recursion and bounds the
amount of space used by contracts. Space-efficient contract monitoring
for contracts enforcing simple type disciplines (a/k/a gradual typing) is
well studied. Prior work establishes a space-efficient semantics for manifest contracts without dependency [11]; we adapt that work to a latent
calculus with dependency. We guarantee space efficiency when no dependency is used; we cannot generally guarantee space efficiency when
dependency is used, but instead offer a framework for making such programs space efficient on a case-by-case basis.
1
Introduction
Findler and Felleisen [6] brought design-by-contract [17] into the higher-order
world, allowing programmers to write pre- and post-conditions on functions to
be checked at runtime. Pre- and post-conditions are easy in first-order languages,
where itโs very clear who is to blame when a contract is violated: if the precondition fails, blame the caller; if the post-condition fails, blame the callee. In
higher-order languages, however, itโs harder to tell who calls whom! Who should
be to blame when a pre-condition on a higher-order function fails? For example,
consider the following contract:
(pred(ฮปx :Int. x > 0) 7โ pred(ฮปy:Int. y โฅ 0)) 7โ pred(ฮปz :Int. z mod 2 = 0)
This contract applies to a function (call it f , with type (IntโInt)โInt) that takes
another function (call it g, with type IntโInt) as input. The contract says that
g will only be called with positives and only return naturals; f must return an
even number. If f returns an odd number, f is to blame; if g returns a negative
number, then it, too is to blame. But what if g is called with a non-positive
number, say, โ1? Who is to blame then? Findler and Felleisenโs insight was
that even in a higher-order setting, there are only two parties to blame. Here,
g was given to f , so any bad values given to g here are due to some nefarious
action on f โs partโblame f ! That is, the higher-order case generalizes pre- and
post-conditions so that the negative positions of a contract all blame the caller
while the positive positions all blame the callee.
Dependent contractsโwhere the codomain contract can refer to the functionโs argumentโare particularly useful. For example, the square root function,
2
Greenberg
sqrt, satisfies the contract: x :pred(ฮปy:Real. y โฅ 0) 7โ pred(ฮปz :Real. abs (x โ z โ
z ) < ) That is, sqrt takes a non-negative real, x , and returns a non-negative
real z thatโs within of the square root of x . (The dependent variable x is bound
in the codomain; the variable y is local to the domain predicate.)
1.1
Contracts leak space
While implementations of contracts have proven quite successful (particularly so
in Racket [8,19]), there is a problem: contracts leak space. Why?
The default implementation of contracts works by wrapping a function in a
function proxy. For example, to check that f = ฮปx :Int. x + 1 satisfies the contract
C = pred(ฮปz :Int. z mod 2 = 0) 7โ pred(ฮปz :Int. z mod 2 = 0), we monitor the
function by wrapping it in a function proxy monl (C , f ). When this proxy is
called with an input v , we first check that v satisfies C โs domain contract (i.e.,
that v is even), then we run f on v to get some result v 0 , and then check that v 0
satisfies C โs codomain contract (that the result is even). Here the contract will
always fail blaming l : one of v and v 0 will always be odd.
Contracts leak space in two ways. First, there is no bound on the number of
function proxies that can appear on a given function. More grievously, contracts
break tail recursion. To demonstrate the issue with with tail calls, weโll use the
simplest example of mutual recursion: detecting parity.
let odd = ฮปx :Int. if (x = 0) false (even (x โ 1))
and even = ฮปx :Int. if (x = 0) true (odd (x โ 1))
Functional programmers will expect this program to run in constant space, because it is tail recursive. Adding a contract breaks the tail recursion. If we add
a contract to odd and call odd 5, what contract checks accumulate (Fig. 1)?1
Notice how the checks accumulate in the codomain? Even though the mutually
recursive calls to even and odd are syntactically tail calls, we canโt bound the
number of codomain checks that occur. That is, we canโt bound the size of the
stack, and tail recursion is broken! Even though thereโs only one function proxy
on odd, our contracts create a space leak.
1.2
Overview and contributions
Space efficiency for gradual types [24] (a/k/a contracts constrained to type tests)
is well studied [14,15,25,9,23]; Greenberg [11] developed a space-efficient semantics for general, non-dependent contracts. He used a manifest calculus, conflating
contracts and types; however, contracts are typically implemented in latent calculi, where contracts are distinct from whatever types may exist. Greenberg
โbelieve[s] it would be easy to design a latent version of eidetic ฮปH , following
the translations in Greenberg, Pierce, and Weirich (GPW)โ [12]; in this paper,
1
Readers may observe that the contract betrays a deeper knowledge of numbers than
the functions themselves. We offer this example as minimal, not naturally occurring.
Space-Efficient Latent Contracts
3
= monlodd (x :pred(ฮปx :Int. x โฅ 0) 7โ pred(ฮปb:Bool. b or (x mod 2 = 0)),
ฮปx :Int. if (x = 0) false (even (x โ 1)))
and even = ฮปx :Int. if (x = 0) true (odd (x โ 1))
let odd
odd 5
โโโC monlodd (pred[x 7โ5] (. . . ), even 4)
โโโC monlodd (pred[x 7โ5] (. . . ), monlodd (pred[x 7โ3] (. . . ),
odd monlodd (pred(ฮปx :Int. x โฅ 0), 3)))
โ
โโC monlodd (pred[x 7โ5] (. . . ), monlodd (pred[x 7โ3] (. . . ), even 2))
โโโC monlodd (pred[x 7โ5] (. . . ), monlodd (pred[x 7โ3] (. . . ), monlodd (pred[x 7โ1] (. . . ),
odd monlodd (pred(ฮปx :Int. x โฅ 0), 1))))
โ
โโC monlodd (pred[x 7โ5] (. . . ), monlodd (pred[x 7โ3] (. . . ), monlodd (pred[x 7โ1] (. . . ), even 0)))
Fig. 1. Contracts break tail recursion
we show that belief to be well founded by giving a space-efficient semantics for
a (dependent!) variant of contract PCF (CPCF) [3,4].
The rest of this paper discusses a formulation of contracts that enjoys sound
space efficiency; that is, where we slightly change the implementation of contracts
so that (a) programs are observationally equivalent to the standard semantics,
but (b) contracts consume a bounded amount of space. In this paper, weโve
omitted some of the more detailed examples and motivationโwe refer curious
readers to Greenberg [11], though we intend the paper to be self-contained.
We follow Greenbergโs general structure, defining two forms of dependent
CPCF: CPCFC is the classic semantics; CPCFE follows the space-efficient eidetic semantics. We are able to prove space efficiency without dependency, bounding the amount of space consumed by contracts; we are unable to prove space
efficiency in general with dependency, but instead offer a framework that allows
for dependent contracts to be made space efficient.
We offer two primary contributions: adapting Greenbergโs work to a latent
calculus and extending the possibility of space efficiency to dependent contracts.
There are some other, smaller, contributions as well. First, adding in nontermination moves beyond Greenbergโs strongly normalizing calculi, showing that
the POPL 2015 paperโs result isnโt an artifact of strong normalization (where
we can, in theory, bound the size of the any termโs evaluation in advance, not
just contracts). Second, the simpler type system here makes it clear which type
system invariants are necessary for space-efficiency and which are bookkeeping
for proving that the more complicated manifest type system is sound. Third,
by separating contracts and types, we can give tighter space boundsโthe types
function from Greenberg collects types that are never used in a contract, while
we collect exactly contracts. Finally, we explore how space efficiency can be attained in dependent contracts. While we canโt give a guarantee for dependent
4
Greenberg
Types
Terms
B
T
e
::=
::=
::=
op
k
w
v
C
c
r
::=
::=
::=
::=
::=
::=
::=
Bool | Int | . . .
B | T1 โT2
x | k | e1 op e2 | e1 e2 | ฮปx :T . e | ยต(x :T ). e | if e1 e2 e3 |
errl | monl (C , e) | mon(c, e)
add1 | sub1 | . . .
true | false | 0 | 1 | . . .
v | errl
k | ฮปx :T . e | monl (x :C1 7โ C2 , v ) | mon(x :c1 7โ c2 , ฮปx :T . e)
predฯ (e) | x :C1 7โ C2
r | x :c1 7โ c2
nil | predlฯ (e); r
Fig. 2. Syntax of classic and space-efficient CPCF
contracts, we show that itโs possible to achieve and discuss different ways to do
so.
2
Classic and space-efficient Contract PCF
We present classic and space-efficient CPCF as separate calculi sharing syntax
and some typing rules (Fig. 2 and Fig. 3), and a single, parameterized operational semantics with some rules held completely in common (Fig. 4) and others
specialized to each system (Fig. 5). The formal presentation is modal, with two
modes: C for classic and E for space-efficient. While much is shared between
the two modesโtypes, T ; the core syntax of expressions, e; most of the typing
rulesโwe use colors to highlight parts that belong to only one system. Classic
CPCF is typeset in salmon while space-efficient CPCF is in periwinkle.
2.1
Contract PCF (CPCF)
Plain CPCF is an extension of Plotkinโs 1977 PCF [18], developed first by Dimoulas and Felleisen [3,4] (our syntax is in Fig. 2). It is a simply typed language
with recursion. The typing rules are straightforward (Fig. 3). The operational semantics for the generic fragment also uses conventional rules (Fig. 4). Dimoulas
and Felleisen use evaluation contexts to offer a concise description of their system; we write out our relation in full, giving congruence rules (E*L, E*R, EIf)
and error propagating rules (E*Raise) explicitlyโwe will need to restrict congruence for casts, and our methods are more transparent written with explicit
congruence rules than using the subtly nested evaluation contexts of Herman et
al. [14,15], which are error prone [10].
Contracts are CPCFโs distinguishing feature. Contracts, C , are installed via
monitors, written monl (C , e); such a monitor says โensure that e satisfies the
contract C ; if not, the blame lies with label l โ. Monitors only apply to appropriate types (TMon). There are two kinds of contracts in CPCF: predicate contracts
over base type, written predฯ (e), and function contracts, written x :C1 7โ C2 .
Space-Efficient Latent Contracts
5
Predicate contracts predฯ (e) have two parts: a predicate on base types, e,
which identifies which values satisfy the contract; and a closing substitution ฯ
which keeps track of values substituted into the contract. For example, if ฮน is the
identity substitution mapping variables to themselves:
โ predฮน (ฮปx :Int. x > 0) identifies the positives;
โ predฮน (ฮปx :Int. x > y) identifies numbers greater than an unspecified number
y; and,
โ pred[y7โ47] (ฮปx :Int. x > y) identifies numbers greater than 47.
When the closing substitution ฯ is the identity mapping ฮน, we write pred(e)
instead of predฮน (e). In CPCFC , closing substitutions will map each variable to
either (a) itself or (b) a value. Substitution into contracts is a non-issue without
dependency: each contract is just closed. Having introduced dependency, we use
explicit closing substitutions rather than direct substitution for three reasons:
first, it simplifies our space efficiency proof for simple contracts (Sec. 4.1); second, explicitness lets us distinguish the contract pred[x 7โ0] (ฮปx :Int. x = 0) from
pred[x 7โ0] (ฮปx :Int. 0 = 0); third, it emphasizes that contracts are just another
form of closure. Predicates are solely over base types, not functions.
Function contracts x :C1 7โ C2 are satisfied by functions satisfying their parts:
functions whose inputs all satisfy C1 and whose outputs all satisfy C2 . Function
contracts are dependent: the codomain contract C2 can refer back to the input to
the function. For example, the contract x :pred(ฮปz :Int. z > 0) 7โ pred(ฮปy:Int. y >
x ) is satisfied by increasing functions on the positives. Note that x is bound in
the codomain, but z is not.2 When function contracts arenโt dependent, we omit
the binder at the front, e.g., pred(ฮปx :Int. x > 0) 7โ pred(ฮปx :Int. x > 0) means
operators on positives. We check that contracts are satisfied at runtime.
We use explicit, delayed substitutions to keep track of which values are substituted into predicate contracts. To help with our proof of space efficiency, we
donโt track variables that donโt appear in the predicate:
(
predฯ (e)[v /x ] =
predฯ[x 7โv ] (e) x โ fv(ฯ(e))
predฯ (e)
otherwise
Alpha equivalence allows us to give fresh names to variables in the domain of ฯ
by consistently renaming those variables inside of the predicate e. Only holding
on to substitutions that close up free variables in e is a way of modeling closures.
A dependent predicate closes over some finite number of variables; a compiled
representation would generate a closure with a corresponding number of slots
in the closing environment. Restricting substitutions to exactly those variables
appearing free in the predicate serves another purpose: we can easily recover
space-efficiency bounds for programs without dependent contracts (Sec. 4.1).
6
Greenberg
ฮ`e:T
Typing rules
x :T โ ฮ
ฮ`x :T
TVar
ฮ ` k : ty(k )
ฮ, x :T1 ` e12 : T2
ฮ ` ฮปx :T1 . e12 : T1 โT2
ty(op) = T1 โT2 โT
ฮ ` e1 : T 1 ฮ ` e 2 : T 2
ฮ ` e1 op e2 : T
TConst
TAbs
ฮ, x :T ` e : T
ฮ ` ยต(x :T ). e : T
TOp
ฮ ` e1 : T1 โT2 ฮ ` e2 : T1
ฮ ` e1 e2 : T2
ฮ ` e1 : Bool ฮ ` e2 : T ฮ ` e3 : T
ฮ ` if e1 e2 e3 : T
ฮ`e:T ฮ`C :T
ฮ ` monl (C , e) : T
TMon
0
0
ฮ, ฮ ` e : B โBool ฮ ` ฯ
ฮ ` predฯ (e) : B
TPred
TCNil
ฮ ` c1 : T1 ฮ, x :T1 ` c2 : T2
ฮ ` x :c1 7โ c2 : T1 โT2
โ
`ฮน
TId
TMonC
ฮ ` C1 : T1 ฮ, x :T1 ` C2 : T2
ฮ ` x :C1 7โ C2 : T1 โT2
TFun
ฮ`r :B
ฮ ` predlฯ (e); r : B
Closing substitutions
TApp
TIf
ฮ`e:T ฮ`c:T
ฮ ` mon(c, e) : T
ฮ ` predฯ (e) : B
ฮ ` nil : B
TRec
ฮ`c:T
ฮ`C :T
Contract typing
TBlame
ฮ ` errl : T
TCPred
TCFun
ฮ`ฯ
ฮ ` ฯ x :T ` v : T
ฮ, x :T ` ฯ[x 7โ v ]
Fig. 3. Typing rules of classic and space-efficient CPCF
TMap
Space-Efficient Latent Contracts
e1 โโm e2
Operational semantics
(ฮปx :T . e) v โโm e[v /x ]
EBeta
k1 op k2 โโm [[op]] (k1 , k2 )
ยต(x :T ). e โโm e[ยต(x :T ). e/x ]
EIfTrue
if true e2 e3 โโm e2
e1 โโm e10
e1 e2 โโm e10 e2
EOpL
e1 โโm e10
e3 โโm if e10 e2 e3
errl e2 โโm errl
errl op e2 โโm errl
EIf
EAppLRaise
EOpLRaise
EDelta
EFix
EIfFalse
if false e2 e3 โโm e3
e2 โโm e20
v1 e2 โโm v1 e20
EAppL
e1 โโm e10
e1 op e2 โโm e10 op e2
if e1 e2
7
EAppR
e2 โโm e20
v1 op e2 โโm v1 op e20
if errl e2 e3 โโm errl
v1 errl โโm errl
v1 op errl โโm errl
EOpR
EIfRaise
EAppRRaise
EOpRRaise
Fig. 4. Shared operational semantics of CPCF
2.2
Classic Contract PCF (CPCFC )
Classic CPCF gives a straightforward semantics to contracts (Figs. 4 and 5),
largely following the seminal work by Findler and Felleisen [6]. To check a predicate contract, we simply test it (EMonPred), returning either the value or an
appropriately labeled error. Function contracts are deferred: monl (x :C1 7โ C2 , v )
is a value, called a function proxy. When a function proxy is applied, it unwraps the proxy, monitoring the argument with the domain contract, running
the function, and then monitoring the return value with the codomain contract
(EMonApp).
Our semantics may seem to be lax, where no monitor is applied to dependent
uses of the argument in the codomain monitor [12]. In fact, it is agnostic: we could
be picky by requiring that function contract monitors monl (x :C1 7โ C2 , e) have
2
Concrete syntax for such predicates can be written much more nicely, but we ignore
such concerns here.
8
Greenberg
EMonPred
monl (predฯ (e1 ), v2 ) โโC if (ฯ(e1 ) v2 ) v2 errl
monl (x :C1 7โ C2 , v1 ) v2 โโC monl (C2 [v2 /x ], v1 monl (C1 , v2 ))
e โโC e 0
โโC monl (C , e 0 )
monl (C , e)
EMon
monl (C , errl 0 ) โโC errl 0
monl (C , e) โโE mon(labell (C ), e)
mon(nil, v1 ) โโE v1
EMonCNil
mon(x :c1 7โ c2 , v1 ) v2 โโE mon(c2 [v2 /x ], v1 mon(c1 , v2 ))
EMonC
EMonRaise
EMonLabel
mon(predlฯ (e); r , v1 ) โโE if (ฯ(e) v1 ) mon(r , v1 ) errl
e 6= mon(c 0 , e 00 ) e โโE e 0
mon(c, e) โโE mon(c, e 0 )
EMonApp
EMonCPred
EMonCApp
mon(c, errl ) โโE errl
mon(c2 , mon(c1 , e)) โโE mon(join(c1 , c2 ), e)
EMonCRaise
EMonCJoin
Fig. 5. Operational semantics of classic and space-efficient CPCF
the substitution [x 7โ monl (C1 , x )] throughout C2 ; we could be indy by having
0
[x 7โ monl (C1 , x )] throughout C2 [4]. We default to a lax rule to make our proof
of soundness easier, but weโll have as a corollary that classic and space-efficient
semantics yield the same result regardless of what the closing substitutions do
in the codomain (Sec. 3).
Standard congruence rules allow for evaluation inside of monitors (EMon)
and the propagation of errors (EMonRaise).
Metatheory We prove CPCFC โs type system sound with a minimum fuss, using
the usual syntactic methods. The only subtlety is that we must be careful when
proving the substitution property, since we have slightly changed the definition.
In this section, we only consider the typing rules for CPCFC , i.e., those
typeset on white and salmon.
Lemma 1 (Weakening).
โ If ฮ ` e : T and x 6โ fv(e) then ฮ, x :T 0 ` e : T .
โ If ฮ ` C : T and x 6โ fv(C ) then ฮ, x :T 0 ` C : T .
Space-Efficient Latent Contracts
9
Proof. By mutual induction on the terms and contracts.
Lemma 2 (Substitution). If โ
` v : T1 , then
โ ฮ1 , x :T1 , ฮ2 ` e : T2 implies ฮ1 , ฮ2 ` e[v /x ] : T2 , and
โ ฮ1 , x :T1 , ฮ2 ` C : T2 implies ฮ1 , ฮ2 ` C [v /x ] : T2 .
Proof. By mutual induction the terms and contracts.
(e = y) By case analysis on x = y, using weakening (Lemma 1) as appropriate.
(e = k ) Immediate.
(e = e1 op e2 ) By the IHs.
(e = e1 e2 ) By the IHs.
(e = ฮปy:T . e1 ) By case analysis on x = y, narrowing when the two are equal.
(e = ยต(y:T ). e1 ) By case analysis on x = y, narrowing when the two are equal.
(e = if e1 e2 e3 ) By the IHs.
(e = errl ) Immediate.
(e = monl (C , e)) By the IHs.
(C = predฯ (e)) We have ฮ1 , x :T1 , ฮ2 ` predฯ (e) : T2 and we must show that
ฮ1 , ฮ2 ` predฯ (e)[v /x ] : T2 . By inversion, we know that: T2 = B for some
base type B ; ฮ1 , x :T1 , ฮ2 , ฮ0 ` e : B โBool; and ฮ0 ` ฯ.
There are two cases. In both cases, we use TPred.
(x โ fv(e)) The substitution is actually stored in ฯ. We find ฮ1 , ฮ2 , ฮ0 , x :T1 `
e : B by the IH on e and ฮ0 , x :T1 ` ฯ[x 7โ v ] by TMap and our assumption.
(x 6โ fv(e)) The substitution is ignored, and e[v /x ] = e. We find ฮ1 , ฮ2 , ฮ0 `
e : B by the IH and ฮ0 ` ฯ by assumption.
(C = x :C1 7โ C2 ) By the IHs.
As a corollary, closing substitutions ฯ close up exactly their context ฮ0 .
Lemma 3 (Closing substitutions). If ฮ0 ` ฯ and ฮ, ฮ0 ` e : T then ฮ `
ฯ(e) : T .
Proof. By induction on ฮ0 , using substitution (Lemma 2).
Lemma 4 (Progress). If โ
` e : T then either (a) e is some value, v ; (b) e is
some error, errl ; or, (c) e โโC e 0 .
Proof. By induction on the typing derivation.
( TVar) Contradictoryโvariables arenโt well typed in the empty context.
( TConst) k is a value.
( TBlame) errl is an error.
( TAbs) Function abstractions are values.
( TRec) Takes a step by EFix.
( TOp) By the IH, e1 is a value, error, or steps. In the latter two cases, we step
by EOpLRaise or EOpL, respectively.
By the IH, e2 is a value, error, or steps. In the latter two cases we step by
EOpRRaise or EOpR.
If both are values, then we step by EDelta.
10
Greenberg
( TApp) By the IH, e1 is a value, error, or steps. In the latter two cases, we
step by EAppLRaise or EAppL, respectively.
By the IH, e2 is a value, error, or steps. In the latter two cases we step by
EAppRRaise or EAppR.
If both are values, we know that e1 is either a function or a function proxy;
we step by either EBeta or EMonApp, depending on the shape of e1 .
( TIf) By the IH, e1 is a value, error, or steps. In the latter two cases, we step
by EIfRaise or EIf, respectively./
If e1 is a value, it must be either true or false; we step by EIfTrue or EIfFalse, depending on the shape of e1 .
( TMon) By the IH, e is either a value, error, or steps. In the latter two cases,
we step by EMonRaise or EMon, respectively.
If e is a value, we step by EMonPred or EMonApp, depending on the shape
of the contract C .
Lemma 5 (Preservation). If โ
` e : T and e โโC e 0 then โ
` e 0 : T .
Proof. By induction on the typing derivation, with cases on the step taken.
( TVar) Contradictoryโvariables arenโt well typed in the empty context.
( TConst) Contradictoryโconstants are normal forms.
( TBlame) Contradictoryโerrors are normal forms.
( TAbs) Contradictoryโfunctions are normal forms.
( TRec) We must have stepped by EFix; by substitution (Lemma 2) and TFix.
( TOp) If we stepped by an EOpRaise* rule, we are done by TBlame. If we
stepped by a congruence rule, EOp*, we are done by the IH and TOp. If we
stepped by EDelta, by the assumption that built-in operations have sound
denotations.
( TApp) If we stepped by an EAppRaise* rule, we are done by TBlame.If we
stepped by a congruence rule, EApp*, we are done by the IH and TApp. If we
stepped by EBeta, by substitution. (Lemma 2) If we stepped by EMonApp,
then: the domain is well typed by TMon; we can apply the proxied function
by TApp; the codomain check is well formed by substitution (Lemma 2); and
the entire resulting term is well typed by TMon again.
( TIf) If we stepped by EIfRaise, by TBlame. If we stepped by EIf, by the
IH and TIf. If we stepped by EIfTrue or EIfFalse, by assumption.
( TMon) If we stepped by EMonRaise, the resulting error is well typed by
TBlame. If we stepped by EMon, by the IH and TMon. If we stepped
by EMonPred, then: we have โ
` ฯ(e) : B โBool by closing substitution
(Lemma 3); we can type the condition by TApp; the then branch is well typed
by assumption; the false branch is well typed by TBlame; and the whole lot
is well typed by TIf.
2.3
Space-efficient Contract PCF (CPCFE )
How can we recover tail calls in CPCF? CPCFC will happily wrap arbitrarily
many function proxies around a value, and thereโs no bound on the number of
Space-Efficient Latent Contracts
11
labell (predฯ (e1 )) = predlฯ (e1 )
labell (x :C1 7โ C2 ) = x :labell (C1 ) 7โ labell (C2 )
join(nil, r2 ) = r2
join(predlฯ (e); r1 , r2 ) = predlฯ (e); drop(join(r1 , r2 ), predฯ (e))
join(x :c11 7โ c12 , x :c21 7โ c22 ) = x :join(c21 , c11 ) 7โ join(wrap(c12 , x , c22 ), c22 )
drop(nil, predฯ (e)) = nil
drop(predlฯ2 (e2 ); r , predฯ1 (e1 )) =
(
drop(r , predฯ2 (e2 ))
predlฯ2 (e2 ); drop(r , predฯ1 (e1 ))
wrap(predlฯ (e), x , c) =
wrap(nil, x , c) =
wrap(predlฯ (e); r , x , c) =
wrap(y:c1 7โ c2 , x , c) =
predฯ1 (e1 ) โ predฯ2 (e2 )
predฯ1 (e1 ) 6โ predฯ2 (e2 )
๏ฃฑ
l
๏ฃด
x 6โ fv(ฯ(e))
๏ฃฒpredฯ (e)
predlฯ[x 7โmon(join(c 0 ,c),e)] (e) ฯ(x ) = mon(c 0 , e)
๏ฃด
๏ฃณ
predlฯ[x 7โmon(c,ฯ(x ))] (e)
otherwise
nil
wrap(predlฯ (e), x , c); wrap(r , x , c)
y:wrap(c1 , x , c) 7โ wrap(c2 , x , c)
Fig. 6. Contract labeling and predicate stack management
codomain contract checks that can accumulate. The key idea is joining contracts.
Weโll make two changes to the language: weโll bound function proxies so each
function has at most one, and weโll bound stacks to avoid redundant checking.
We ultimately show that contracts without dependency use constant space, but
that the story for dependent functions is more complex (Sec. 4).
Fortuitously, our notion of join solves both of our problems, working identically for both simple and dependent contracts. To ensure a function value can
have only one proxy, we change the semantics of monitoring: when monitoring
a proxied value, we join the new monitor and the old one. To bound the size of
stacks contract checks, we join pending contracts to avoid redundancy.
The join operation works on labeled contracts, which (a) move the label from
the monitor into the contract and (b) allow us to keep track of many predicates
at once (Fig. 6). Concretely, labeled contracts use the metavariable c (as opposed
to C ), comprising function contracts as usual (x :c1 7โ c2 ) and predicate stacks,
r (Fig. 2). A predicate stack r is a list of labeled predicates predl (e), where nil is
the empty stack.
The join operation takes two labeled contracts and combines them, eliminating redundant contracts as it goes. To join a new and an old predicate
stack, we keep new contracts and eliminate redundant old ones; only more โrecentโ contracts are kept. Joining functions works contravariantly, being careful
to maintain correct substitution behavior using wrap.
12
Greenberg
Finally, we establish what we mean by โredundantโ using predicate implication: when does one contract imply another?
Definition 6 (Predicate implication). Let predฯ1 (e1 ) โ predฯ2 (e2 ) be a relation on predicates such that:
(Reflexivity) If โ
` predฯ (e) : B then predฯ (e) โ predฯ (e).
(Transitivity) If predฯ1 (e1 ) โ predฯ2 (e2 ) and predฯ2 (e2 ) โ predฯ3 (e3 ), then
predฯ1 (e1 ) โ predฯ3 (e3 ).
(Substitutivity) When ฮi 1 , x :T 0 , ฮi 2 ` predฯi (ei ) : T and โ
` v : T 0 , if
predฯ1 (e1 ) โ predฯ2 (e2 ) then predฯ1 (e1 )[v /x ] โ predฯ2 (e2 )[v /x ].
(Adequacy) If โ
` predฯi (ei ) : T and predฯ1 (e1 ) โ predฯ2 (e2 ) then โk โ
KB . ฯ1 (e1 ) k โโm true implies ฯ2 (e2 ) k โโm true.
(Decidability) For all โ
` predฯ1 (e1 ) : B and โ
` predฯ2 (e2 ) : B , it is decidable
whether predฯ1 (e1 ) โ predฯ2 (e2 ) or predฯ1 (e1 ) 6โ predฯ2 (e2 ).
The entire development of space-efficiency is parameterized over this implication relation, โ, characterizing when one first-order contract subsumes another.
We write 6โ for the negation of โ. The โ relation is a total pre-order (a/k/a
a preference relation)โit would be a total order, but it may not necessarily enjoy anti-symmetry. For example, we could have predฮน (ฮปx :Int. x โฅ 0) โ
predฮน (ฮปx :Int. x + 1 > 0) and vice versa, even though the two predicates arenโt
equal. You can also view โ as a total order up-to contextual equivalence.
There is at least one workable implication relation: syntactic equality. We
say predฯ1 (e1 ) โ predฯ2 (e2 ) iff e1 = e2 and ฯ1 = ฯ2 . Since weโve been careful
to store only those values that are actually referenced in the closure of the
predicate, the steps to determine these equalities are finite and computable at
runtime. For example, suppose we wish to show that pred[y7โ47] (ฮปx :Int. x >
y) โ pred[y7โ47] (ฮปx :Int. x > y). The code partโthe predicate ฮปx :Int. x >
yโis the same; an implementation might observe that the function pointers
are equal. The environment has only one slot, for y, with the value 47 in it;
an implementation might compare the two environments slot-by-slot. We could
have given an operational semantics which behaves more like an implementation,
explicitly generating conditionals and merge operations in the terms themselves,
but we believe our slightly more abstract presentation is more digestible.
Substitution in the codomain: lax, picky, and indy We extend Greenbergโs notion of join to account for dependency with a new function, wrap.
Greenberg, Pierce, and Weirich identified two variants of latent contracts in
the literature, differing in their treatment of the dependent substitution of arguments in the codomain: picky, where we monitor the value substituted in the
codomain with the domain contract; and lax, where the actual parameter value
substituted into the codomain is unmonitored [12]. There is a third variant,
indy, which applies a monitor to the argument value but uses a different blame
label [4]. These different models of substitution all exhibit different behavior for
abusive contracts, where the codomain contract violates the domain contract.
Space-Efficient Latent Contracts
13
There is another source of substitutions in the codomain: multiple function
proxies. How do the monitors unfold when we have two function proxies? In the
classic lax semantics, we find (leaving the domain check unevaluated):
mon(x :c11 7โ c12 , mon(x :c21 7โ c22 , f )) v
โโC mon(c12 [v /x ], mon(x :c21 7โ c22 , f ) mon(c11 , v ))
โโC mon(c12 [v /x ], mon(c22 [mon(c11 , v )/x ], f mon(c21 , mon(c11 , v ))))
Even though weโre using the lax semantics, we substitute contracts into the
codomain. For the space-efficient semantics to be sound, it must behave exactly
like the classic semantics: no matter what joins happen, CPCFE must replicate the contract substitutions done in CPCFC . We can construct an abusive
contract in CPCFC โeven though it has lax semanticsโby having the inner
function proxy abuse the outer one (Fig. 7). Why was blame raised? Because
c2 โs codomain contract abused c1 โs domain contract. Even though CPCFC has a
lax semantics, wrapping multiple function proxies leads to monitoring domains
from one contract in the codomain of anotherโa situation ripe for abuse.
Space-efficiency means joining contracts, so how can we emulate this classicsemantics substitution behavior? We use the wrap function, forcing a substitution
when two function contracts are joined. By keeping track of these substitutions
at every join, any joins that happen in the future will be working on contracts
which already have appropriate substitutions.
CPCFE uses labeled contracts (Fig. 2); substitution for labeled predicate contracts is explicit and delayed, as for ordinary contracts:
(
predlฯ[x 7โv ] (e) x โ fv(ฯ(e))
l
predฯ (e)[v /x ] =
predlฯ (e)
otherwise
nil[v /x ] = nil
(predlฯ (e); r )[v /x ] = predlฯ (e)[v /x ]; r [v /x ]
We do not do any joining when a substitution occurs (but see Sec. 6). In CPCFE ,
closing substitutions map each variable to (a) itself ([x 7โ x ]), (b) a monitor on
itself ([x 7โ mon(c, x )]), or (c) a value. We add an evaluation rule taking ordinary
contract monitors monl (C , e) to labeled-contract monitors mon(c, e) by means
of the labeling function label (EMonLabel).
Space-efficiency comes by restricting congruence to only apply when there are
abutting monitors (cf. EMonC here in CPCFE to EMon in CPCFC ). When two
monitors collide, we join them (EMonCJoin). Checking function contracts is as
usual (EMonCApp is the same as EMonApp, only the latter works over labeled
contracts); checking predicate stacks proceeds straightforwardly predicate-bypredicate (EMonCNil and EMonCPred).
Metatheory We prove CPCFE โs type system sound; the proof follows that
for CPCFC , though there are more evaluation rules to consider here. We only
consider the typing rules for CPCFE , i.e., those typeset on white and periwinkle.
14
Greenberg
C1 = f :(pred(ฮปx :Int. x > 0) 7โ pred(ฮปx :Int. x > 0)) 7โ pred(ฮปx :Int. x > 0)
C2 = f :(pred(ฮปx :Int. true) 7โ pred(ฮปx :Int. true)) 7โ pred(ฮปx :Int. f 0 = 0)
Referring to the domains as Ci 1 and codomains as Ci 2
โโC
โโC
โโC
โโC
โโโC
โโC
โโโC
โโC
โโโC
โโโC
โโC
โโC
โโC
โโC
โโC
โโC
โโC
โโโC
monl1 (C1 , monl2 (C2 , ฮปf :(IntโInt). f 5)) (ฮปx :Int. x )
monl1 (C12 [(ฮปx :Int. x )/f ],
monl2 (C2 , ฮปf :(IntโInt). f 5) monl1 (C11 , (ฮปx :Int. x )))
monl1 (C12 [(ฮปx :Int. x )/f ], monl2 (C22 [monl1 (C11 , ฮปx :Int. x )/f ],
(ฮปf :(IntโInt). f 5) monl2 (C21 , monl1 (C11 , (ฮปx :Int. x )))))
monl1 (C12 [(ฮปx :Int. x )/f ], monl2 (C22 [monl1 (C11 , ฮปx :Int. x )/f ],
monl2 (C21 , monl1 (C11 , (ฮปx :Int. x ))) 5))
monl1 (C12 [(ฮปx :Int. x )/f ], monl2 (C22 [monl1 (C11 , ฮปx :Int. x )/f ],
monl2 (pred(ฮปx :Int. true),
monl1 (C11 , (ฮปx :Int. x )) monl2 (pred(ฮปx :Int. true), 5))))
monl1 (C12 [(ฮปx :Int. x )/f ], monl2 (C22 [monl1 (C11 , ฮปx :Int. x )/f ],
monl2 (pred(ฮปx :Int. true), monl1 (C11 , (ฮปx :Int. x )) 5)))
monl1 (C12 [(ฮปx :Int. x )/f ], monl2 (C22 [monl1 (C11 , ฮปx :Int. x )/f ],
monl2 (pred(ฮปx :Int. true), monl1 (pred(ฮปx :Int. x > 0),
(ฮปx :Int. x ) monl1 (pred(ฮปx :Int. x > 0), 5)))))
monl1 (C12 [(ฮปx :Int. x )/f ], monl2 (C22 [monl1 (C11 , ฮปx :Int. x )/f ],
monl2 (pred(ฮปx :Int. true), monl1 (pred(ฮปx :Int. x > 0), (ฮปx :Int. x ) 5))))
monl1 (C12 [(ฮปx :Int. x )/f ], monl2 (C22 [monl1 (C11 , ฮปx :Int. x )/f ],
monl2 (pred(ฮปx :Int. true), monl1 (pred(ฮปx :Int. x > 0), 5))))
monl1 (C12 [(ฮปx :Int. x )/f ], monl2 (C22 [monl1 (C11 , ฮปx :Int. x )/f ],
monl2 (pred(ฮปx :Int. true), 5)))
monl1 (C12 [(ฮปx :Int. x )/f ], monl2 (C22 [monl1 (C11 , ฮปx :Int. x )/f ], 5))
monl1 (C12 [(ฮปx :Int. x )/f ],
if ((ฮปx :Int. monl1 (C11 , ฮปx :Int. x ) 0 = 0) 5) 5 errl2 )
monl1 (C12 [(ฮปx :Int. x )/f ], if (monl1 (C11 , ฮปx :Int. x ) 0 = 0) 5 errl2 )
monl1 (C12 [(ฮปx :Int. x )/f ],
if (monl1 (pred(ฮปx :Int. x > 0),
(ฮปx :Int. x ) monl1 (pred(ฮปx :Int. x > 0), 0)) = 0)
l2
5 err )
monl1 (C12 [(ฮปx :Int. x )/f ],
if (monl1 (pred(ฮปx :Int. x > 0),
(ฮปx :Int. x ) (if ((ฮปx :Int. x > 0) 0) 0 errl2 )) = 0)
l2
5 err )
monl1 (C12 [(ฮปx :Int. x )/f ],
if (monl1 (pred(ฮปx :Int. x > 0),
(ฮปx :Int. x ) (if (0 > 0) 0 errl2 )) = 0)
l2
5 err )
monl1 (C12 [(ฮปx :Int. x )/f ],
if (monl1 (pred(ฮปx :Int. x > 0),
(ฮปx :Int. x ) (if false 0 errl2 )) = 0)
5 errl2 )
monl1 (C12 [(ฮปx :Int. x )/f ],
if (monl1 (pred(ฮปx :Int. x > 0), (ฮปx :Int. x ) errl2 ) = 0) 5 errl2 )
errl2
Fig. 7. Abusive function proxies in CPCFC
Space-Efficient Latent Contracts
15
Lemma 7 (Weakening).
โ If ฮ ` e : T and x 6โ fv(e) then ฮ, x :T 0 ` e : T .
โ If ฮ ` C : T and x 6โ fv(C ) then ฮ, x :T 0 ` C : T .
โ If ฮ ` c : T and x 6โ fv(c) then ฮ, x :T 0 ` c : T .
Proof. By mutual induction on the terms and contracts.
Lemma 8 (Substitution). If โ
` v : T1 , then
โ ฮ1 , x :T1 , ฮ2 ` e : T2 implies ฮ1 , ฮ2 ` e[v /x ] : T2 , and
โ ฮ1 , x :T1 , ฮ2 ` C : T2 implies ฮ1 , ฮ2 ` C [v /x ] : T2 .
โ ฮ1 , x :T1 , ฮ2 ` c : T2 implies ฮ1 , ฮ2 ` c[v /x ] : T2 .
Proof. By mutual induction the terms, contracts, and labeled contracts.
(e = y) By case analysis on x = y, using weakening (Lemma 7) as appropriate.
(e = k ) Immediate.
(e = e1 op e2 ) By the IHs.
(e = e1 e2 ) By the IHs.
(e = ฮปy:T . e1 ) By case analysis on x = y, narrowing when the two are equal.
(e = ยต(y:T ). e1 ) By case analysis on x = y, narrowing when the two are equal.
(e = if e1 e2 e3 ) By the IHs.
(e = errl ) Immediate.
(e = monl (C , e)) By the IHs.
(C = predฯ (e)) We have ฮ1 , x :T1 , ฮ2 ` predฯ (e) : T2 and we must show that
ฮ1 , ฮ2 ` predฯ (e)[v /x ] : T2 . By inversion, we know that: T2 = B for some
base type B ; ฮ1 , x :T1 , ฮ2 , ฮ0 ` e : B โBool; and ฮ0 ` ฯ.
There are two cases. In both cases, we use TPred.
(x โ fv(e)) The substitution is actually stored in ฯ. We find ฮ1 , ฮ2 , ฮ0 , x :T1 `
e : B by the IH on e and ฮ0 , x :T1 ` ฯ[x 7โ v ] by TMap and our assumption.
(x 6โ fv(e)) The substitution is ignored, and e[v /x ] = e. We find ฮ1 , ฮ2 , ฮ0 `
e : B by the IH and ฮ0 ` ฯ by assumption.
(C = x :C1 7โ C2 ) By the IHs.
(c = nil) Immediate.
(c = predlฯ (e); r ) As for the predicate contracts above, using the IH to show that
r is still well typed.
(c = x :c1 7โ c2 ) By the IHS.
As a corollary, closing substitutions ฯ close up exactly their context ฮ0 .
Lemma 9 (Closing substitutions). If ฮ0 ` ฯ and ฮ, ฮ0 ` e : T then ฮ `
ฯ(e) : T .
Proof. By induction on ฮ0 , using substitution (Lemma 8).
Lemma 10 (Progress). If โ
` e : T then either (a) e is some value, v ; (b) e
is some error, errl ; or, (c) e โโE e 0 .
Proof. By induction on the typing derivation.
16
Greenberg
( TVar) Contradictoryโvariables arenโt well typed in the empty context.
( TConst) k is a value.
( TBlame) errl is an error.
( TAbs) Function abstractions are values.
( TRec) Takes a step by EFix.
( TOp) By the IH, e1 is a value, error, or steps. In the latter two cases, we step
by EOpLRaise or EOpL, respectively.
By the IH, e2 is a value, error, or steps. In the latter two cases we step by
EOpRRaise or EOpR.
If both are values, then we step by EDelta.
( TApp) By the IH, e1 is a value, error, or steps. In the latter two cases, we
step by EAppLRaise or EAppL, respectively.
By the IH, e2 is a value, error, or steps. In the latter two cases we step by
EAppRRaise or EAppR.
If both are values, we know that e1 is either a function or a function proxy;
we step by either EBeta or EMonCApp, depending on the shape of e1 .
( TIf) By the IH, e1 is a value, error, or steps. In the latter two cases, we step
by EIfRaise or EIf, respectively./
If e1 is a value, it must be either true or false; we step by EIfTrue or EIfFalse, depending on the shape of e1 .
( TMon) We step by EMonLabel.
( TMonC) If the inner term e is a monitor, we step by EMonCJoin. Otherwise, by the IH, the inner term is a value, an error, or steps. If itโs an error,
we step by EMonCRaise. If it steps, we step by EMonC (knowing already
that that e isnโt a monitor). If e is a value, we either step by EMonCNil,
step by EMonCPred, or have a value already (when e is a function).
Lemma 11. If ฮ ` C : T then ฮ ` labell (C ) : T .
Proof. By induction on the typing derivation, using TCPred and TCNil in
the predicate case and TCFun in the function case.
Lemma 12. If ฮ ` r1 : T and ฮ ` r2 : T then ฮ ` join(r1 , r2 ) : T .
Proof. By induction on the typing derivation of r1 .
Lemma 13. If ฮ ` c1 : T and ฮ ` c2 : T then ฮ ` join(c1 , c2 ) : T .
Proof. By induction on the typing derivation of c1 , using Lemma 12 in the base
case and substitution (Lemma 8).
Lemma 14 (Preservation). If โ
` e : T and e โโE e 0 then โ
` e 0 : T .
Proof. By induction on the typing derivation, with cases on the step taken.
( TVar) Contradictoryโvariables arenโt well typed in the empty context.
( TConst) Contradictoryโconstants are normal forms.
( TBlame) Contradictoryโerrors are normal forms.
( TAbs) Contradictoryโfunctions are normal forms.
Space-Efficient Latent Contracts
17
( TRec) We must have stepped by EFix; by substitution (Lemma 8) and TFix.
( TOp) If we stepped by an EOpRaise* rule, we are done by TBlame. If we
stepped by a congruence rule, EOp*, we are done by the IH and TOp. If we
stepped by EDelta, by the assumption that built-in operations have sound
denotations.
( TApp) If we stepped by an EAppRaise* rule, we are done by TBlame.If we
stepped by a congruence rule, EApp*, we are done by the IH and TApp. If we
stepped by EBeta, by substitution. (Lemma 8) If we stepped by EMonCApp,
then: the domain is well typed by TMon; we can apply the proxied function
by TApp; the unmonitored codomain well formed by substitution (Lemma 8);
and the entire resulting term is well typed by TMon again.
( TIf) If we stepped by EIfRaise, by TBlame. If we stepped by EIf, by the
IH and TIf. If we stepped by EIfTrue or EIfFalse, by assumption.
( TMon) Immediate from the assumptions, since labeling contracts preserves
typing (Lemma 11).
( TMonC) If we stepped by EMonCRaise, the resulting error is well typed by
TBlame. If we stepped by EMonC, by the IH and TMon. If we stepped by
EMonCJoin, then by Lemma 13; if by EMonCNil, then by the assumptions
. If we stepped by EMonCPred, then: we have โ
` ฯ(e) : B โBool by closing
substitution (Lemma 9); we can type the condition by TApp; the then branch
is well typed by assumption; the false branch is well typed by TBlame; and
the whole lot is well typed by TIf.
Lemma 15 (Determinism). If e1 โโE e2 and e1 โโE e20 , then e2 = e20 .
Proof. By induction on the first derivation. Recall that we exclude the CPCFC
rules, so only EMonLabel fires on monitors. EMonC and EMonCJoin carefully avoid overlapping.
3
Soundness for space efficiency
CPCFC and CPCFE are operationally equivalent, even though their cast semantics differ. We can make this connection formal by proving that every CPCF
term either: (a) diverges in both CPCFC and CPCFE or (b) reduces to equivalent terms in both CPCFC and CPCFE .
One minor technicality: some of the forms in our language are necessary only
for runtime or only appear in one of the two calculi. We characterize source
programs as those which omit runtime terms.
Definition 16 (Source program). A well typed source program does not use
TBlame or TMonC (and so TCNil, TCPred, and TCFun cannot be used).
Lemma 17 (Associativity of join on predicate stacks).
join(r1 , join(r2 , r3 )) = join(join(r1 , r2 ), r3 ).
Proof. By induction on r1 .
(r1 = nil) Immediate.
18
Greenberg
(r1 = predl (e); r10 ) The IH is join(r10 , join(r2 , r3 )) = join(join(r10 , r2 ), r3 ). We calculate:
join(r1 , join(r2 , r3 )) = join((predlฯ (e); r10 ), join(r2 , r3 ))
= predlฯ (e); drop(join(r10 , join(r2 , r3 )), predฯ (e))
= predlฯ (e); drop(join(join(r10 , r2 ), r3 ), predฯ (e))
= join(predlฯ (e); drop(join(r10 , r2 ), predฯ (e)), r3 )
= join(join((predlฯ (e); r10 ), r2 ), r3 )
= join(join(r1 , r2 ), r3 )
(IH)
Lemma 18 (Associativity of join).
join(c1 , join(c2 , c3 )) = join(join(c1 , c2 ), c3 ).
Proof. By induction on c1 . In the predicate stack case, by Lemma 17. In the
function case, we calculate:
join(x :c11 7โ c12 , join(x :c21 7โ c22 , x :c31 7โ c32 ))
= join(x :c11 7โ c12 , x :join(c31 , c21 ) 7โ join(wrap(c22 , x , c31 ), c32 ))
= x :join(join(c31 , c21 ), c11 ) 7โ
join(wrap(c12 , x , join(c31 , c21 )), join(wrap(c22 , x , c31 ), c32 ))
(IH)
= x :join(c31 , join(c21 , c11 )) 7โ join(wrap(join(wrap(c12 , x , c21 ), c22 ), x , c31 ), c32 )
= join(x :c31 7โ c32 , x :join(c21 , c11 ) 7โ join(wrap(c12 , x , c21 ), c22 ))
= join(x :c31 7โ c32 , join(x :c11 7โ c12 , x :c21 7โ c22 ))
Lemma 19 (Idempotence of predicate stacks). If:
โ โ
` k : B,
โ e k โโโE true, and
โ โ
` join(r1 , r2 ) : B ,
then mon(join(r1 , r2 ), k ) โโโE w iff mon(join(r1 , drop(r2 , predฯ (e))), k ) โโโE w .
Proof. By induction on length of r1 , observing that ฯ(e) k โโโE true is redundantly (but successfully) checked on the left more than on the right.
Greenberg identified the key property for proving soundness of a space efficient semantics: to be sound, the space-efficient semantics must recover a notion
of congruence for checking. In his manifest setting, he calls it cast congruence;
since CPCF uses contract monitors, we call it monitor congruence.
Lemma 20 (Monitor congruence (single step)). If โ
` e1 : T and โ
` c : T
and e1 โโE e2 , then mon(c, e1 ) โโโE w iff mon(c, e2 ) โโโE w .
Proof. By cases on the step taken to find e1 โโE e2 . In the easy case, thereโs
no joining of coercions and the same rule can apply in both derivations. In the
more interesting case, two contract monitors join. In either case, it suffices to
show that the terms are ultimately confluent, since determinism (Lemma 15)will
do the rest.
Space-Efficient Latent Contracts
19
Join-free reductions
( EFix) We give this case explicitly, as the original proof in Greenberg [11]
doesnโt talk about fixpoints.
We must show mon(c, ยต(x :T ). e) โโโE w iff mon(c, e[ยต(x :T ). e/x ]). The
former steps to the latter immediately by EMonC and EFix, so we are done
by determinism (Lemma 15).
The following cases are all similar: EDelta, EBeta, EIfTrue, EIfFalse,
EAppL, EAppR, EOpL, EOpR, EIf, EMonLabel, EMonCApp, and all of
the E*Raise rules.
A word about EMonCApp: one might think that this is a joining reduction,
but in fact it is not: if we can unwrap in the inner step, then the function proxy
isnโt able to join with the outer monitor.
Joining reductions
( EMonCNil) We must show that
mon(c, mon(nil, v1 )) โโโE w โ mon(c, v1 ) โโโE w .
The terms are confluent:
mon(c, mon(nil, v1 )) โโE mon(join(nil, c), v1 ) = mon(c, v1 ).
( EMonCPred) We must show that:
mon(r2 , mon((predlฯ (e); r1 ), v1 )) โโโE w
โ
mon(r2 , if (ฯ(e) v1 ) mon(r1 , v1 ) errl ) โโโE w
The left-hand side steps:
mon(join((predlฯ (e); r1 ), r2 ), v1 ) โโC
mon(predlฯ (e); drop(join(r1 , r2 ), predฯ (e)), v1 )
by EMonCJoin, which in turn steps to
if (ฯ(e) v1 ) mon(drop(join(r1 , r2 ), predฯ (e)), v1 ) errl .
By cases on the behavior of ฯ(e) v1 .
โข If ฯ(e) v1 โโโE true, then both sides reduce by EIfTrue (using EMonC on
the right). The left hand side reduces to mon(drop(join(r1 , r2 ), predฯ (e)), v1 )
while the right hand side is mon(join(r1 , r2 ), v1 ). By idempotence of contracts
(Lemma 19).
โข If ฯ(e) v1 โโโE false, then both sides reduce by EIfFalse (using EMonC
on the right); the right reduces by EMonRaise, and both sides are errl .
โข Finally, if ฯ(e) v1 diverges, then both terms diverge.
20
Greenberg
( EMonC) We must show that:
mon(c, mon(c 0 , e)) โโโE w โ mon(c, mon(c 0 , e 0 )) โโโE w
given that e โโE e 0 and knowing that e isnโt another monitor. Both sides step
by EMonCJoin, and then the left steps by EMon, to find mon(join(c 0 , c), e 0 ).
( EMonCJoin) We must show that:
mon(c, mon(c2 , mon(c1 , e))) โโโE w โ mon(c, mon(join(c1 , c2 ), e)) โโโE w
The left-hand side joins to mon(join(c1 , join(c, c2 )), e) while the right-hand side
joins to mon(join(join(c1 , c2 ), c), e). We have confluence, by associativity of
join (Lemma 18).
( EMonCRaise) We must show that:
mon(c, mon(c 0 , errl )) โโโE w โ mon(c, errl ) โโโE w
The left-hand steps by EMonCJoin, and then both sides can step by EMonCRaise to errl .
Lemma 21 (Monitor congruence). If
โ โ
` e1 : T ,
โ โ
` c : T , and
โ e1 โโโE e2 ,
then mon(c, e1 ) โโโE w iff mon(c, e2 ) โโโE e2 . Diagrammatically:
โ
E e2
e1
โ
mon(c, e2 )
E
w
E
โ
โ
mon(c, e1 )
Proof. By induction on the derivation of e1 โโโE e2 , using single-step monitor
congruence (Lemma 20).
It is particularly satisfying that the key property for showing soundness of
space efficiency can be proved independently of the inefficient semantics. Implementors can work entirely in the context of the space-efficient semantics, knowing that congruence ensures soundness. We show the observational equivalence
of CPCFC and CPCFE by logical relations (Fig. 8), which gives us contextual
equivalenceโthe strongest equivalence we could ask for.
Lemma 22 (Similar contracts are logically related). If ฮ ` C1 โผ C2 : T
and ฮ ` v1 ' v2 : T then ฮ ` monl (C1 , v1 ) ' monl (C2 , v2 ) : T .
Space-Efficient Latent Contracts
Result rules
21
e1 โผ e2 : T
k โผ k : B โโ ty(k ) = B
v11 โผ v21 : T1 โT2 โโ โe12 โผ e22 : T1 . v11 e12 ' v21 e22 : T2
errl โผ errl : T
Term rules
e1 ' e2 : T
e1 ' e2 : T โโ (e1 diverges โง e2 diverges)โจ(e1 โโโC w1 โงe2 โโโE w2 โงw1 โผ w2 : T )
Contract rules (invariant relation)
ฮ ` C1 โผ C2 : T
ฮ ` predฯ1 (e1 ) โผ predฯ2 (e2 ) : B โโ ฮ ` ฯ1 (e1 ) ' ฯ2 (e2 ) : B โBool
ฮ ` x :C11 7โ C12 โผ x :C21 7โ C22 : T1 โT2 โโ
ฮ ` C11 โผ C21 : T1 โง ฮ, x :T1 ` C12 โผ C22 : T2
Closing substitutions and open terms
ฮ |= ฮด
ฮ ` e1 ' e 2 : T
ฮ |= ฮด โโ โx โ dom(ฮ). ฮด1 (x ) โผ ฮด2 (x ) : ฮ(x )
ฮ ` e1 ' e2 : T โโ โฮ |= ฮด. ฮด1 (e1 ) ' ฮด2 (e2 ) : T
Fig. 8. Logical relation between classic and space-efficient CPCF
Proof. By induction on the type index of the invariant relation ฮ ` C1 โผ C2 : T .
Let ฮ |= ฮด be given; we must show that ฮด1 (monl (C1 , v1 )) ' ฮด2 (monl (C2 , v2 )) :
T2 .
The right-hand side steps by EMonLabel to mon(labell (ฮด2 (C2 )), ฮด2 (e2 )).
If T = B , then Ci = predฯi (ei ), and each side reduces to
if (ฮดi (ฯi (ei )) ฮดi (vi )) ฮดi (vi ) errl
(by EMonPred on the left and EMonCPred on the right). By the assumption
in the invariant relation, the conditions of the if co-terminate. The two sides
behave exactly the same when the conditions diverge, raise blame, or return false.
When they return true, they return related values.
The more interesting case is when T = T1 โT2 ; we must show that:
ฮด1 (monl (x :C11 7โ C12 , v1 )) โผ ฮด2 (mon(x :labell (C21 ) 7โ labell (C22 ), v2 )) : T2
The left-hand side is a value; the right-hand side may or may not be a value,
depending on whether v2 is proxied or not.
(v2 = ฮปx :T1 . e2 ) Both sides are values. To show the logical relation, we let arguments v12 โผ v22 : T1 be given and must show that
ฮด1 (monl (x :C11 7โ C12 , v1 )) v12 '
ฮด2 (mon(x :labell (C21 ) 7โ labell (C22 ), v2 )) v22 : T2 .
22
Greenberg
Each side unwraps ( EMonApp and EMonCApp). Since the LR is closed
under evaluation, we can use the IH on the domain and monitor (reducing on
the right to convert to a monitor of labeled contracts). Note that there is no
codomain monitor unless itโs in Ci 2 โs closing substitution already.
(v2 = mon(x :c31 7โ c32 , v20 )) For brevity, let c2 i = labell (C2 i ). The right-hand
side steps by EMonCJoin:
ฮด2 (mon(x :c21 7โ c22 , mon(x :c31 7โ c32 , v20 ))) โโE
ฮด2 (mon(join(x :c31 7โ c32 , x :c21 7โ c22 ), v20 ))
which is mon(x :ฮด2 (join(c21 , c31 )) 7โ ฮด2 (join(c32 , c22 )), ฮด2 (v20 )).
Let arguments v12 โผ v22 : T1 be given. Now we can unwrap each side (by
EMonApp and EMonCApp, respectively); we must show:
monl (ฮด1 (C12 )[v12 /x ], ฮด1 (v1 ) monl (ฮด1 (C11 ), v12 )) '
mon(ฮด2 (join(wrap(c32 , x , c21 ), c22 ))[v22 /x ],
ฮด2 (v20 ) mon(ฮด2 (join(c21 , c31 )), v22 )) : T2
We will use monitor congruence to resolve the extra contracts on the spaceefficient side. Since the LR is closed under evaluation, we can step the righthand side back to separate out the inner monitors, letting us recover something
that behaves like v1 .
That is, to show the goal above, we will show that:
monl (ฮด1 (C12 )[v12 /x ], ฮด1 (v1 ) monl (ฮด1 (C11 ), v12 )) '
mon(ฮด2 (c22 )[v22 /x ], ฮด2 (mon(x :c31 7โ c32 , v20 )) mon(ฮด2 (c21 ), v22 )) : T2 .
We break the check apart in order to apply the IH. Before we explain how to
find this relation, why is proving that these two terms related sufficient to show
that our original terms are related? Itโs sufficient because monitor congruence
(Lemma 21) allows us to consider each of the domain and codomain monitors
separately, knowing that weโll get identical behavior. Weโll see that the wrap
in our original term is accounted for by codomain monitor that appears when
we go through step-by-step.
By the IH, we know that monl (ฮด1 (C11 ), v12 ) ' mon(ฮด2 (c21 ), v22 ) : T1 . If these
terms terminate or diverge, than so will our original right-hand side domain
monitor of join(c21 , c31 ), by Lemma 21. In that case weโre done.
If the terms yield values v13 ' v23 : T1 , we can continue. Using monitor
congruence to step inside of the codomain check (Lemma 21), we have:
โโโE
mon(ฮด2 (c22 )[v22 /x ], ฮด2 (mon(x :c31 โ
7 c32 , v20 )) mon(ฮด2 (c21 ), v22 ))
mon(ฮด2 (c22 )[v22 /x ], ฮด2 (mon(x :c31 โ
7 c32 , v20 )) v23 )
And we must show:
monl (ฮด1 (C12 )[v12 /x ], ฮด1 (v1 ) v13 ) '
mon(ฮด2 (c22 )[v22 /x ], ฮด2 (mon(x :c31 7โ c32 , v20 )) v23 ) : T2 .
Space-Efficient Latent Contracts
23
We can step the right hand side to:
mon(ฮด2 (c22 )[v22 /x ], mon(ฮด2 (c32 )[v23 /x ], ฮด2 (v20 ) mon(c31 , v23 )))
By monitor congruence, we know mon(join(c21 , c31 ), v22 ) and mon(c31 , v23 ) coterminate: either they both diverge, both blame the same label, or reduce to
a common value, v24 . Weโre done in all but the last case, where we must
consider:
mon(ฮด2 (c22 )[v22 /x ], mon(ฮด2 (c32 )[v23 /x ], ฮด2 (v20 ) v24 ))
Recall that mon(ฮด2 (c21 ), v22 ) โโโE v23 ; so mon(ฮด2 (c32 )[v23 /x ], ฮด2 (v20 ) v24 ) is
the same as mon(ฮด2 (wrap(c32 , x , c21 ))[v22 /x ], ฮด2 (v20 ) v24 )โthat is, the wrapping done in the join captures exactly the substitution that would occur if we
evaluated each layer of function proxying step by step. To patch up the derivation, we use substitutivity (Definition 6, part (6)) to see that if the codomains
merged before the substitution, they would also do so after the substitution. So
our modified right-hand term is still in lock step with our original, where c32
sees a value monitored by c21 but c22 doesnโt.
Weโve assumed that ฮด1 (v1 ) ' ฮด2 (v2 ) : T1 โT2 , so we know that ฮด1 (v1 ) v13 '
mon(ฮด(c32 )[v23 /x ], ฮด(v20 ) v24 ) : T2 by back-evaluating the right-hand side a few
steps. If these terms diverge or go to errors together, we are done. Otherwise,
they evaluate to values v10 ' v20 : T2 . It remains to see that:
monl (ฮด1 (C12 )[v12 /x ], v10 ) ' mon(ฮด2 (c22 )[v22 /x ], v20 ) : T2
which we have by the IH. We can return to our original term and see that v20
is what will be given to whatโs left of c22 after joining with wrap(c32 , x , c21 )โ
monitor congruence letโs us know that these monitors will evaluate the same
merged and unmerged.
Lemma 23 (Unwinding). If โ
` ยต(x :T ). e : T , then ยต(x :T ). e โโโm w iff
there exists an n such that unrolling the fixpoint only n times converges to the
same value, i.e., e[ยต(x :T ). . . . e[ยต(x :T ). e/x ] . . . /x ] โโโm w .
Proof. From left-to-right, by induction on the evaluation derivation, observing
that there must be a finite number of unrollings.
From right-to-left, by induction on n, observing that we can replace the substitution by its finite unrolling.
Theorem 24 (CPCFC and CPCFE terms are logically related).
1. If ฮ ` e : T as a source program then ฮ ` e ' e : T .
2. If ฮ ` C : T as a source program then ฮ ` C โผ C : T .
Proof. By mutual induction on the typing relations.
24
Greenberg
Terms ฮ ` e : T
Each case proceeds by letting ฮ |= ฮด be given, and then showing that both sides
co-terminate, i.e., both diverge, raise blame, or return related values.
( TVar) By the definition of ฮ |= ฮด.
( TConst) By the definition of the LR.
( TAbs) By the IHs, letting some argument be given to show that the bodies
behave similarly.
( TOp) By the IHs.
( TApp) By the IHs.
( TMu) We give this case in full, as it is new to the proof.
Let ฮ |= ฮด; we must show that ฮด1 (ยต(x :T ). e1 ) ' ฮด2 (ยต(x :T ). e2 ) : T . Each
side reduces in a single step ( EFix) to ฮดi (ei )[ฮดi (ยต(x :T ). ei )/x ], which can be
rearranged into ฮดi (ei [ยต(x :T ). ei /x ]); we can rearrange this to something that
looks like a dual substitution: ฮดi [ยต(x :T ). e1 , ยต(x :T ). e2 /x ](ei ). By unwinding
(Lemma 23), we can see that the fixpoint on each side either (a) diverges, or
(b) converge to some related values in a finite unrolling and can be replaced by
a finite unrolling. In the former case, we are done because both terms diverge;
in the latter case, we have ฮ, x :T |= ฮด[ยต(x :T ). e1 , ยต(x :T ). e2 /x ] and can apply
the IH.
( TMon) By the IHs and Lemma 22.
( TMonC) Contradictoryโdoesnโt appear in source programs.
( TBlame) Contradictoryโdoesnโt appear in source programs.
Contracts ฮ ` C : T
( TPred) By the IH.
( TFun) By the IHs.
4
Bounds for space efficiency
We have seen that CPCFE behaves the same as CPCFC (Theorem 24), but is
CPCFE actually space efficient? For programs that donโt use dependency, yes!
With dependency, the story is more complicated.
4.1
The simple case
Greenberg showed that for simple contractsโwithout dependencyโwe can put
a bounds on space [11]. We can recover his result in our more general framework.
Observe that a given source program e starts with a finite number of predicate
contracts in it. As e runs, no new predicates appear (because dependent substitutions have no effect), but predicates may accumulate in stacks. In the worst
case, a predicate stack could contain every predicate contract from the original
program e exactly once... but no more than that, because joins remove redundancy! Function contracts are also bounded: e starts out with function contracts
Space-Efficient Latent Contracts
Predicate extraction
25
preds(e), preds(C ), preds(c) : P(e ร (Var * e))
preds(predฯ (e)) =
preds(x ) = โ
S
{(e, ฯ)} โช preds(e) โช [x 7โv ]โฯ preds(v )
preds(k ) = โ
preds(ฮปx :T . e) = preds(e)
preds(x :C1 7โ C2 ) = preds(C1 ) โช preds(C2 )
preds(monl (C , e)) = preds(C ) โช preds(e)
preds(mon(c, e)) = preds(c) โช preds(e)
preds(nil) = โ
preds(e1 e2 ) = preds(e1 ) โช preds(e2 ) preds(predlฯ (e); r ) = {(e, ฯ)} โช preds(e) โช
S
0
preds(e1 op e2 ) = preds(e1 ) โช preds(e2 )
[x 7โe 0 ]โฯ preds(e ) โช preds(r )
preds(if e1 e2 e3 ) =
preds(x :c1 7โ c2 ) = preds(c1 ) โช preds(c2 )
preds(e1 ) โช preds(e2 ) โช preds(e3 )
preds(errl ) = โ
Contract size
PB : N
SB : N
size(C ) : N
PB = |{e โ preds(e) | ฮ ` predฯ (e) : B }|
size(predฯ (e)) = SB when โ
` predฯ (e) : B
SB = L ยท PB ยท log2 PB
size(x :C1 7โ C2 ) = size(C1 ) + size(C2 )
Fig. 9. Predicate extraction and contract size
of a certain height, and evaluation can only shrink that height. The leaves of
function contracts are labeled with predicate stacks, so the largest contract we
could ever see is of maximum height with maximal predicate stacks at every leaf.
As the program runs, abutting monitors are joined, giving us a bound on the
total number of monitors in a program (one per non-monitor AST node).
We can make these ideas formal by first defining what we mean by โall the
predicates in a programโ, and then showing that evaluation doesnโt introduce
predicates (Lemma 29). We let preds(e) be the set of predicates in a term, where
a predicate is represented as a pair of term and a closing substitution.
Lemma 25. preds(drop(r , pred(e))) โ preds(r )
Proof. By induction on the predicate stack r . When r = nil, the proof is trivial;
otherwise, we observe that we only lose predicates from r .
Lemma 26. preds(C ) = preds(labell (C ))
Proof. By induction on C ; the predicate case is immediate, while the arrow case
uses the IHs.
We say program e uses simple contracts when all predicates in e are closed
and every predicate stack has no redundancies. As such a program reduces, no
new contracts appear (and contracts may disappear). Concretely, these requirements are that if predฯ (e 0 ) โ e or predlฯ (e 0 ) โ e, we have fv(e 0 ) = โ
and ฯ = ฮน. Restricting programs to simple contracts is what lets us prove that substitution and
joining donโt increase the set of predicates. The โno redundancyโ requirement
26
Greenberg
0
means that if predlฯ (e1 ); r โ e then โpredlฯ0 (e2 ) โ r . predฯ (e1 ) 6โ predฯ0 (e2 )
(and that r itself has no redundancy, etc.). The following theorems only hold for
programs that use simple contracts.
Lemma 27. preds(e[e 0 /x ]) โ preds(e) โช preds(e 0 )
Proof. By induction on e, using the absorptive property of set union. If e is a
predicate contract, it has no free variables (by assumption), so the substitution
doesnโt hold on to anything.
Lemma 28. If โ
` c1 : T and โ
` c2 : T then preds(join(c1 , c2 )) โ preds(c1 ) โช
preds(c2 ).
Proof. By induction on c1 .
If c1 is a predicate stack, then so must be c2 . If c1 = nil, the proof is immediate. If c1 is a non-empty predicate stack, then by Lemma 25.
In the function contract case, by the IHs. Since weโre using simple contracts,
we know that wrap never does anything, because predicates have no free variables.
Lemma 29 (Reduction is non-increasing in simple predicates). If โ
`
e : T and e โโm e 0 then preds(e 0 ) โ preds(e).
Proof. By induction on the step taken.
( EDelta) Immediateโno predicates.
( EBeta) By substitution (Lemma 27).
( EFix) Observe that the fixpoint operator introduces no preds other than its
body; then by substitution (Lemma 27).
( EIfTrue) By definition: preds(e2 ) โ preds(true) โช preds(e2 ) โช preds(e3 ).
( EIfFalse) By definition, as above.
( EMonPred) By definition: the right-hand side has no new predicates and possibly one fewer.
( EMonApp) The substitution in the codomain is ignored (Lemma 27), so the
right-hand side is just a rearrangement of the left.
( EMonLabel) By definition and the fact that labeling leaves the predicate set
alone (Lemma 26).
( EMonCNil) By definition.
( EMonCPred) As for EMonPred above: the right-hand side has no new
predicates and possibly one fewer.
( EMonCApp) As for EMonApp: we can rearrange our constituent partsโ
because substitutions are ignored (Lemma 27).
( EMonCJoin) By the monotonicity of join (Lemma 28), knowing that wrap
does nothing.
( E*L, E*R, EIf, EMon, EMonC) By the IH.
( E*Raise) Immediateโthere are no predicates on the right-hand side.
To compute the concrete bounds, we define PB as the number of distinct
predicates at the base type B . We can represent a predicate stack at type B
in SB bits, where L is the number of bits needed to represent a blame label. A
Space-Efficient Latent Contracts
27
given well typed contract โ
` C : T can then be represented in size(C ) bits,
where each predicate stacks are represented is SB bits and function types are
represented as trees of predicate stacks. Finally, since reduction is non-increasing
(Lemma 29), we can bound the amount of space used by any contract by looking
at the source program, e: we can represent all contracts in our program in at
most s = maxC โe size(C ) spaceโconstant for a fixed source program.
Readers familiar with Greenbergโs paper (and earlier work, like Herman et
al. [14]) will notice that our bounds are more precise, tracking the number of
holes in contracts per type (size(C )) rather than simply computing the largest
conceivable type (2height(T ) ).
4.2
The dependent case
In the dependent case, we canโt generally bound the number of contracts by the
size of contracts used in the program. Consider the following term, where n โ N:
let downTo = ยต(f :IntโInt).
monl (x :pred(ฮปx :Int. x โฅ 0) 7โ pred(ฮปy:Int. x โฅ y),
ฮปx :Int. if (x = 0) 0 (f (x โ 1))) in
downTo n
How many different contracts will appear in a run of this program? As downTo
runs, weโll see n different forms of the predicate predlฯi (ฮปy:Int. x โฅ y). Weโll
have one ฯn = [x 7โ n] on the first call, ฯnโ1 = [x 7โ n โ 1] on the second
call, and so on. But nโs magnitude doesnโt affect our measure of the size of
source programโs contracts. The number of distinct contracts that appear will
be effectively unbounded.
In the simple case, we get bounds automatically, using the smallest possible implication relationโsyntactic equality. In the dependent case, itโs up
to the programmer to identify implications that recover space efficiency. We
can recover space efficiency for downTo by saying predฯ1 (ฮปy:Int. x โฅ y) โ
predฯ2 (ฮปy:Int. x โฅ y) iff ฯ1 (x ) โค ฯ2 (x ). Then the codomain checks from recursive calls will be able to join:
downTo n โโโE monl (pred[x 7โn] (. . . ), . . . )
โโโE monl (pred[x 7โn] (. . . ), monl (pred[x 7โn โ 1] (. . . ), . . . ))
โโโE monl (pred[x 7โn โ 1] (. . . ), . . . )
Why are we able to recover space efficiency in this case? Because we can come
up with an easily decidable implication rule for our specific predicates matching
how our function checks narrower and narrower properties as it recurses.
Recall the mutually recursive even/odd example (Fig. 1).
= monlodd (x :pred(ฮปx :Int. x โฅ 0) 7โ pred(ฮปb:Bool. b or (x mod 2 = 0)),
ฮปx :Int. if (x = 0) false (even (x โ 1)))
and even = ฮปx :Int. if (x = 0) true (odd (x โ 1))
let odd
28
Greenberg
We can make this example space-efficient by adding the implication that:
predฯ1 (ฮปb:Bool. b or (x mod 2 = 0)) โ predฯ2 (ฮปb:Bool. b or (x mod 2 = 0))
iff ฯ1 (x ) + 2 = ฯ2 (x ). Suppose we put contracts on both even and odd:
let odd = monlodd (x :pred(ฮปx :Int. x โฅ 0) 7โ pred(ฮปb:Bool. b or (x mod 2
ฮปx :Int. if (x = 0) false (even (x
and even =
monleven (x :pred(ฮปx :Int. x โฅ 0) 7โ pred(ฮปb:Bool. b or ((x + 1) mod 2
ฮปx :Int. if (x = 0) true (odd (x
= 0)),
โ 1)))
= 0)),
โ 1)))
Now our trace of contracts wonโt be homogeneous; eliding domain contracts:
odd 5 โโโC monlodd (pred[x 7โ5] (. . . ), even 4)
โโโC monlodd (pred[x 7โ5] (. . . ), monleven (pred[x 7โ4] (. . . ), odd 3))
โโโC monlodd (pred[x 7โ5] (. . . ), monleven (pred[x 7โ4] (. . . ),
monlodd (pred[x 7โ3] (. . . ), even 2)))
โ
โโC monlodd (pred[x 7โ5] (. . . ), monleven (pred[x 7โ4] (. . . ),
monlodd (pred[x 7โ3] (. . . ), monleven (pred[x 7โ2] (. . . ), odd 1))))
โ
โโC monlodd (pred[x 7โ5] (. . . ), monleven (pred[x 7โ4] (. . . ),
monlodd (pred[x 7โ3] (. . . ), monleven (pred[x 7โ2] (. . . ),
monlodd (pred[x 7โ1] (. . . ), even 0)))))
To make these checks space efficient, weโd need several implications; we write
oddp for ฮปb:Bool. b or (x mod 2 = 0) and evenp for ฮปb:Bool. b or ((x + 1) mod 2 =
0). The following table gives conditions on the implication relation for the row
predicate to imply the column predicate:
โ
predฯ1 (oddp )
predฯ1 (evenp )
predฯ2 (oddp )
ฯ1 (x ) + 2 = ฯ2 (x )
ฯ1 (x ) + 1 = ฯ2 (x )
predฯ2 (evenp )
ฯ1 (x ) + 1 = ฯ2 (x )
ฯ1 (x ) + 2 = ฯ2 (x )
Having all four of these implications allows us to eliminate any pair of checks
generated by the recursive calls in odd and even, reducing the codomain checking
to constant spaceโhere, just one check. We could define a different implication
relation, where, say, predฯ1 (oddp ) โ predฯ2 (oddp ) iff ฯ1 (x ) mod 2 = ฯ2 (x ) mod 2.
Such an implication would apply more generally than those in the table aboveโ
it isnโt always obvious how to define the implication relation.
As usual, there is a trade-off between time and space. Itโs possible to write
contracts where the necessary implication relation for space efficiency amounts to
checking both contracts. Consider the following tail-recursive factorial function:
let any = ฮปz :Int. true
let fact = ยต(f :IntโIntโInt).
monl (x :pred(any) 7โ acc:pred(any) 7โ pred(ฮปy:Int. x โฅ 0),
ฮปx :Int. ฮปacc:Int. if (x = 0) acc (f (x โ 1) (x โ acc)))
Space-Efficient Latent Contracts
29
This contract isnโt wrong, just strange: if you call fact with a negative number,
the program diverges and you indeed wonโt get a value back out (contracts
enforce partial correctness). A call of fact 3 yields monitors that check, from
outside to inside, that 3 โฅ 0 and 2 โฅ 0 and 1 โฅ 0 and 0 โฅ 0. When should we
say that predฯ1 (ฮปy:Int. x โฅ 0) โ predฯ1 (ฮปy:Int. x โฅ 0)? We could check that
ฯ1 (x ) โฅ ฯ2 (x )... but the time cost is just like checking the original contract.
More starkly, consider the following function with a strange contract (where
prime is a predicate identifying prime numbers):
let absurd = monl (x :pred(ฮปx :Int. true) 7โ pred(ฮปy:Int. prime x ),
ฮปx :Int. if (x โ 13) 1 (absurd 11))
How does absurd 47 run?
absurd 47 = monl (pred[x 7โ47] (ฮปy:Int. prime x ), absurd 11)
= monl (pred[x 7โ47] (ฮปy:Int. prime x ),
monl (pred[x 7โ11] (ฮปy:Int. prime x ), 1))
What implication relation could resolve these two unrelated checks into one? We
could say that predฯ1 (ฮปy:Int. prime x ) โ predฯ2 (ฮปy:Int. prime x ) iff ฯ1 (x ) and
ฯ2 (x ) are prime. Thereโs no time-wise savings, but it would allow us to collapse
tall stacks of monitors.
5
Where should the implication relation come from?
The simplest option is to punt: derive the implication relation as the reflexive
transitive closure of a programmerโs rules. A programmer might specify how
several different predicates interrelate as follows:
1
2
3
y : Int { x1 >= y } implies y : Int { x2 >= y } when x1 <= x2
y : Int { x1 > y } implies y : Int { x2 >= y } when x1 <= x2 + 1
y : Int { x1 > y } implies y : Int { x2 > y } when x1 <= x2
A default collection of such implications might come with the language; library
programmers should be able to write their own, as well. But it is probably unwise
to allow programmers to write arbitrary implications: what if theyโre wrong? A
good implementation would only accept verified implications, using a theorem
prover or an SMT solver to avoid bogus implications.
Rather than having programmers write their own implications, we could try
to automatically derive the implications. Given a program, a fixed number of
predicates occur, even if an unbounded number of predicate/closing substitution pairings might occur at runtime. Collect all possible predicates from the
source program, and consider each pair of predicates over the same base type,
pred(e1 ) and pred(e2 ) such that ฮ ` ei : B โBool. We can derive from the typing
derivation the shapes of the respective closing substitutions, ฯ1 and ฯ2 . What
are the conditions on ฯ1 and ฯ2 such that predฯ1 (e1 ) โ predฯ2 (e2 )? We are
looking for a property P (ฯ1 , ฯ2 ) such that:
โk โ KB , P (ฯ1 , ฯ2 ) โง ฯ1 (e1 ) k โโโE true โ ฯ2 (e2 ) k โโโE true
30
Greenberg
Ideally, P is also efficiently decidableโat least more efficiently than deciding
both predicates. The problem of finding P can be reduced to that of finding the
weakest precondition for the safety of the following function:
1
2
3
4
fun x : B = >
let y0 = v 10 , ... , yn = v 1n (* ฯ1 โs bindings *)
z0 = v 20 , ... , zn = v 2m (* ฯ2 โs bindings *) in
if e1 x then ( if e2 x then () else error ) else ()
Since P would be the weakest precondition, we would know that we had found
the most general condition for the implication relation. Whether or not the
most general condition is the best condition depends on context. We should also
consider a cost model for P ; programmers may want to occasionally trade space
for time, not bothering to join predicates that would be expensive to test.
Finding implication conditions resembles liquid type inference [20,28,16]: programmers get a small control knob (which expressions can go in P ) and then
an SMT solver does the rest. The settings are different, though: liquid types are
about verifying programs, while weโre executing checks at runtime.
5.1
Implementation
Implementation issues abound. How should the free variables in terms be represented? What kind of refactorings and optimizations can the compiler do, and
how might they interfere with the set of contracts that appear in a program?
When is the right moment in compilation to fix the implication relation? More
generally, whatโs the design space of closure representations and calling conventions for languages with contracts?
6
Extensions
Generalizing our space-efficient semantics to sums and products does not seem
particularly hard: weโd need contracts with corresponding shapes, and the join
operation would push through such shapes. Recursive types and datatypes are
more interesting [22]. Findler et al.โs lazy contract checking keeps contracts from
changing the asymptotic time complexity of the program [7]; we may be able to
adapt their work to avoid changes in asymptotic space complexity, as well.
The predicates here range over base types, but we could also allow predicates over other types. If we allow predicates over higher types, how should the
adequacy constraint on predicate implication (Definition 6) change?
Impredicative polymorphism in the style of System F would require even
more technical changes. The introduction of type variables would make our reasoning about names and binders trickier. In order to support predicates over type
variables, weโd need to allow predicates over higher typesโand so our notion
of adequacy of โ would change. In order to support predicates over quantified
types, weโd need to change adequacy again. Adequacy would end up looking
like the logical relation used to show relational parametricity: when would we
Space-Efficient Latent Contracts
31
have โฮฑ.T1 โ โฮฑ.T2 ? If we substitute T10 for ฮฑ on the left and T20 for ฮฑ on
the right (and T10 and T20 are somehow related), then T1 [T10 /ฮฑ] โ T2 [T20 /ฮฑ]. Not
only would the technicalities be tricky, implementations would need to be careful
to manage closure representations correctly (e.g., what happens if polymorphic
code differs for boxed and unboxed types?).
We donโt treat blame as an interesting algebraic structureโitโs enough for
our proofs to show that we always produce the same answer. Changing our
calculus to have a more interesting notion of blame, like indy semantics [4] or
involutive blame labels [30,29], would be a matter of pushing a shallow change
in the semantics through the proofs.
Finally, it would make sense to have substitution on predicate stacks perform
joins, saying (predlฯ (e); r )[v /x ] = join(predlฯ (e)[v /x ]; nil, r [v /x ]), so that substituting a value into a predicate stack checks for newly revealed redundancies. We
havenโt proved that this change would be sound, which would require changes to
both type and space-efficiency soundness. In particular, weโd need to (a) revise
Lemma 22 and (b) simultaneously prove that substitution and joins preserve
types (Lemmas 8) and 13).
7
Related work
For the technique of space efficiency itself, we refer the reader to Greenberg [11]
for a full description of related work. We have striven to use Greenbergโs notation
exactly, but we made some changes in adapting to dependent contracts: the cons
operator for predicate stacks is a semi-colon, to avoid ambiguity; there were
formerly two things named join, but one has been folded into the other; and our
predicates have closing substitutions to account for dependency. We place one
more requirement on the implication relation than Greenberg did: monotonicity
under substitution, which we call substitutivity. Substitutions werenโt an issue in
his non-dependent system, but we must require that if a join can happen without
having a value for x , then the same join happens when we know x โs value.
CPCF was first introduced in several papers by Dimoulas et al. in 2011 [3,4],
and has later been the subject of studies of blame for dependent function contracts [5] and static analysis [27]. Our exact behavioral equivalence means we
could use results from Tobin-Hochstadt et al.โs static analysis in terms of CPCFC
to optimize space efficient programs in CPCFE . More interestingly, the predicate implication relation โ seems to be doing some of the work that their static
analysis does, so there may be a deeper relationship.
Thiemann introduces a manifest calculus where the compiler optimizes casts
for time efficiency: a theorem prover uses the โdeltaโ between types to synthesize
more efficient checks [26]. His deltas and our predicate implication relation are
similar. He uses a separate logical language for predicates and restricts dependency (codomains can only depend on base values, avoiding abusive contracts).
Sekiyama et al. [21] also use delayed substitutions in their polymorphic manifest contract calculus, but for different technical reasons. While delayed sub-
32
Greenberg
stitutions resemble explicit substitutions [1] or explicit bindings [13,2], we use
delayed substitutions more selectively and to resolve issues with dependency.
The manifest type system in Greenbergโs work is somewhat disappointing
compared to the type system given here. Greenberg works much harder than we
do to prove a stronger type soundness theorem... but that theorem isnโt enough
to help materially in proving the soundness of space efficiency. Developing the
approach to dependency used here was much easier in a latent calculus, though
several bugs along the way would have been caught early by a stronger type
system. Type system complexity trade-offs of this sort are an old story.
7.1
Racketโs implementation
If contracts leak space, how is it that they are used so effectively throughout PLT
Racket? Racket is designed to avoid using contracts in leaky ways. In Racket,
contracts tend to go on module boundaries. Calls inside of a module then donโt
trigger contract checksโincluding recursive calls, like in the even/odd example.
Racket will monitor recursive calls across module boundaries, and these checks
can indeed lead to space leaks. In our terms, Racket tends to implement contract
checks on recursive functions as follows:
downTo = monl (x :pred(ฮปx :Int. x โฅ 0) 7โ pred(ฮปy:Int. x โฅ y),
ยต(f :IntโInt). ฮปx :Int. if (x = 0) 0 (f (x โ 1)))
Note that calling downTo n will merely check that the final result is less than nโ
none of the intermediate values. Our version of downTo above puts the contract
inside the recursive knot, forcing checks every time (Sec. 4.2).
Racket also offers a less thorough form of space efficiencyvia the tail-marks-match?
predicate.3 We can construct a program where Racket will avoid redundant checks,
but but wrapping the underlying function with the same contract twice leads to
a space leak (Figure 10). We use low-level contract mechanisms here, to highlight
the compromises Racket makes for space efficiency, โstrik[ing] a balance between
common ways that tail recursion is broken and checking that would not be too
expensive in the case that there wouldnโt have been any pile-up of redundant
wrappersโ.4
Finally, contracts are first-class in Racket: their monitors take two expressions, one for the contract and one to be monitored. Computing new contracts
at runtime breaks our framing of space-efficiency: if we canโt predetermine which
contracts arise at runtime, we canโt fix an implication relation in advance. We
hope that CPCFE is close enough to Racketโs internal model to provide insight
into how to achieve space efficiency for at least some contracts in Racket.
8
Conclusion
We have translated Greenbergโs original result [11] from a manifest calculus [12]
to a latent one [3,4]. In so doing, we have: offered a simpler explanation of the
3
4
From racket/collects/racket/contract/private/arrow.rkt.
Robby Findler, personal correspondence, 2016-05-19.
Space-Efficient Latent Contracts
1
2
3
4
5
6
7
8
33
( define ( count-em-integer ? x )
( printf " checking ~ s \ n " x )
( integer ? x ))
( letrec
([ f ( contract (- > any / c count-em-integer ?)
( lambda ( x ) ( if ( zero ? x ) x ( f (- x 1))))
โ pos โ neg )])
( f 3))
(a) Space-efficient program
1
2
3
4
5
6
7
( letrec
([ f ( contract (- > any / c count-em-integer ?)
( contract (- > any / c count-em-integer ?)
( lambda ( x ) ( if ( zero ? x ) x ( f (- x 1))))
โ pos โ neg )
โ pos โ neg )])
( f 3))
(a) Space-leaking program
Fig. 10. Space-efficiency in Racket
original result; isolated the parts of the type system required for space bounds,
which were intermingled with complexities from conflating contracts and types;
and, extended the original result, by covering more features (dependency and
nontermination) and more precisely bounding non-dependent programs.
Acknowledgments. The existence of this paper is due to comments from Sam
Tobin-Hochstadt and David Van Horn that I chose to interpret as encouragement. Robby Findler provided the Racket example and helped correct and clarify
a draft; Sam Tobin-Hochstadt also offered corrections and suggestions. The reviews offered helpful comments, too.
References
1. Abadi, M., Cardelli, L., Curien, P.L., Leฬvy, J.J.: Explicit substitutions. Journal of
Functional Programming (JFP) 1(4), 375โ416 (1991)
2. Ahmed, A., Findler, R.B., Siek, J., Wadler, P.: Blame for all. In: Principles of
Programming Languages (POPL) (2011)
3. Dimoulas, C., Felleisen, M.: On contract satisfaction in a higher-order world.
TOPLAS 33(5), 16:1โ16:29 (Nov 2011)
4. Dimoulas, C., Findler, R.B., Flanagan, C., Felleisen, M.: Correct blame for contracts: no more scapegoating. In: Principles of Programming Languages (POPL)
(2011)
5. Dimoulas, C., Tobin-Hochstadt, S., Felleisen, M.: Complete monitors for behavioral
contracts. In: Seidl, H. (ed.) Programming Languages and Systems, LNCS, vol.
7211, pp. 214โ233. Springer Berlin Heidelberg (2012)
6. Findler, R.B., Felleisen, M.: Contracts for higher-order functions. In: International
Conference on Functional Programming (ICFP) (2002)
34
Greenberg
7. Findler, R.B., Guo, S.Y., Rogers, A.: Lazy contract checking for immutable data
structures. In: Chitil, O., Horvaฬth, Z., Zsoฬk, V. (eds.) Implementation and Application of Functional Languages, pp. 111โ128. Springer-Verlag, Berlin, Heidelberg
(2008)
8. Flatt, M., PLT: Reference: Racket. Tech. Rep. PLT-TR-2010-1, PLT Design Inc.
(2010), http://racket-lang.org/tr1/
9. Garcia, R.: Calculating threesomes, with blame. In: International Conference on
Functional Programming (ICFP) (2013)
10. Greenberg, M.: Manifest Contracts. Ph.D. thesis, University of Pennsylvania
(November 2013)
11. Greenberg, M.: Space-efficient manifest contracts. In: Principles of Programming
Languages (POPL) (2015)
12. Greenberg, M., Pierce, B.C., Weirich, S.: Contracts made manifest. In: Principles
of Programming Languages (POPL) (2010)
13. Grossman, D., Morrisett, G., Zdancewic, S.: Syntactic type abstraction. TOPLAS
22(6), 1037โ1080 (Nov 2000)
14. Herman, D., Tomb, A., Flanagan, C.: Space-efficient gradual typing. In: Trends in
Functional Programming (TFP). pp. 404โ419 (Apr 2007)
15. Herman, D., Tomb, A., Flanagan, C.: Space-efficient gradual typing. Higher Order
Symbol. Comput. 23(2), 167โ189 (Jun 2010)
16. Jhala, R.: Refinement types for haskell. In: Programming Languages Meets Program Verification (PLPV). pp. 27โ27. ACM, New York, NY, USA (2014)
17. Meyer, B.: Eiffel: the language. Prentice-Hall, Inc. (1992)
18. Plotkin, G.: LCF considered as a programming language. Theoretical Computer
Science 5(3), 223 โ 255 (1977)
19. Racket contract system (2013)
20. Rondon, P.M., Kawaguchi, M., Jhala, R.: Liquid types. In: Programming Language
Design and Implementation (PLDI) (2008)
21. Sekiyama, T., Igarashi, A., Greenberg, M.: Polymorphic manifest contracts, revised
and resolved. TOPLAS (2016), accepted in September; to appear
22. Sekiyama, T., Nishida, Y., Igarashi, A.: Manifest contracts for datatypes. In: Principles of Programming Languages (POPL). pp. 195โ207. ACM, New York, NY,
USA (2015)
23. Siek, J., Thiemann, P., Wadler, P.: Blame, coercion, and threesomes: Together
again for the first time. In: Programming Language Design and Implementation
(PLDI) (2015)
24. Siek, J.G., Taha, W.: Gradual typing for functional languages. In: Scheme and
Functional Programming Workshop (September 2006)
25. Siek, J.G., Wadler, P.: Threesomes, with and without blame. In: Principles of
Programming Languages (POPL). pp. 365โ376. ACM, New York, NY, USA (2010)
26. Thiemann, P.: A delta for hybrid type checking. In: Wadler Festschrift. pp. 411โ
432. LNCS 9600, Springer Switzerland
27. Tobin-Hochstadt, S., Van Horn, D.: Higher-order symbolic execution via contracts.
In: OOPSLA. pp. 537โ554. ACM, New York, NY, USA (2012)
28. Vazou, N., Rondon, P.M., Jhala, R.: Abstract refinement types. In: Felleisen, M.,
Gardner, P. (eds.) European Symposium on Programming (ESOP). pp. 209โ228.
Springer Berlin Heidelberg, Berlin, Heidelberg (2013)
29. Wadler, P.: A Complement to Blame. In: Ball, T., Bodik, R., Krishnamurthi, S.,
Lerner, B.S., Morrisett, G. (eds.) SNAPL. LIPIcs, vol. 32, pp. 309โ320. Schloss
DagstuhlโLeibniz-Zentrum fuer Informatik (2015)
Space-Efficient Latent Contracts
35
30. Wadler, P., Findler, R.B.: Well-typed programs canโt be blamed. In: European
Symposium on Programming (ESOP) (2009)
| 6cs.PL
|
On Expressing and Monitoring Oscillatory Dynamics
Petr Dluhosฬ, Lubosฬ Brim, and David Sฬafraฬnek โ
Faculty of Informatics
Masaryk University
Botanickaฬ 68a, Brno, Czech Republic
[email protected]
To express temporal properties of dense-time real-valued signals, the Signal Temporal Logic (STL)
has been defined by Maler et al. The work presented a monitoring algorithm deciding the satisfiability
of STL formulae on finite discrete samples of continuous signals. The logic has been used to express
and analyse biological systems, but it is not expressive enough to sufficiently distinguish oscillatory
properties important in biology. In this paper we define the extended logic STLโ in which STL is
augmented with a signal-value freezing operator allowing us to express (and distinguish) detailed
properties of biological oscillations. The logic is supported by a monitoring algorithm prototyped in
Matlab. The monitoring procedure of STLโ is evaluated on a biologically-relevant case study.
1
Introduction
In this paper we deal with automatic decision of the question if a given continuous signal satisfies a given
temporal property. This question originally arose in the domain of analogous circuits verification [17].
The procedure deciding this question has been called monitoring [17]. A monitor is constructed for
a given property allowing off-line or even on-line decision over any continuous signal arising from a
technical device (real case) or a numerical simulation procedure (model case) [18]. An important fact
is that the monitoring procedure is always time bounded and that validity of the given logic property
(discrete nature) is decided only approximately on a signal (continuous nature). These restrictions are
necessary but not limiting to significantly help in avoiding errors in systems construction [21].
In systems biology, continuous signals most typically represent the model case โ theoretical behaviour of mathematical models mimicking the dynamics of biological processes. Temporal properties
are employed to express biological hypothesis [19, 9, 5, 4] and the monitoring procedure provides a
promising analysis tool [7, 22, 11]. Many dynamical phenomena that arise in biological systems have
the form of oscillations. In physics the term oscillation represents an infinite behaviour periodically alternating certain quantities/qualities. The identifying aspect of oscillations is the fact that certain states
in the phase space of the dynamical system are being repeatedly re-visited. A biological example of such
phenomena are circadian rhythms. In [23] an interesting wet-lab experiment has been achieved on the
cyanobacterium Cyanothece sp. that showed a relation between metabolic cycles and circadian rhythms.
A mathematical model of oscillations in gene regulation of cyanobacteria has been provided in [20].
Other models targeting oscillatory behaviour can be found e.g. in [15, 14].
In contrast to physics, the notion of oscillation in biology is usually understood informally and in
a wider scope. Many wet-lab experiments show oscillatory behaviour with decreasing amplitude (socalled damped oscillation). Dual notion, oscillation with increasing amplitude, is also relevant: the
question targeting how many oscillations and how strongly they increase until a permanent oscillation is
โ The
work has been supported by the Grant Agency of Czech Republic grant GAP202/11/0312.
Ezio Bartocci and Luca Bortolussi (Eds.): HSB 2012
EPTCS 92, 2012, pp. 73โ87, doi:10.4204/EPTCS.92.6
c P. Dluhos et al.
This work is licensed under the
Creative Commons Attribution License.
74
On Expressing and Monitoring Oscillations
achieved comes to a significant interest when tuning biological processes via mathematical models [15,
14]. When considering the population behaviour as a real-valued signal in dense-time domain, we need
to quantitatively express and compactly encode the mentioned types of oscillatory phenomena.
In [9], a linear-time logic with constraints over real values has been defined. It can be practically
used to express many dynamical phenomena including oscillations of species concentration. The logic
is interpreted over finite time-series of real-valued data obtained as discretely sampled solutions of differential equations (ODEs) (or a series of physical measurements). Formally, a technical problem may
arise with the dense-time domain of considered signals. In general, in a particular interval on the time
axis of the signal there may exist infinitely many points where a considered property (a predicate over
real-values) changes its truth value. A rigorous semantics which treats this problem is given in [17] in
terms of continuous (real-valued) signals which are required to be piece-wise affine. In such a setting,
it is assumed that there exists a finite interval covering of the signal time-domain where the end points
can be sampled and on which the signal behaves โreasonablyโ in each individual time interval. The logic
with such a semantics is called Signal Temporal Logic (STL) [17] and is based on the (bounded) Metric
Interval Temporal Logic (MITL) [2].
Neither STL, nor other temporal logic, as far as we know, provide any possibility to express (and
distinguish) the classes of oscillations such as damped oscillations or oscillations with increasing amplitude. The reason is impossibility of globally referencing (and relatively comparing) concrete signal
values occurring in time points in which some local property is satisfied. Of course, in STL we can
express directly any single concrete signal, but not a universal property without references to concrete
values. E.g., the damped oscillation in Figure 1c can be expressed in STL as a sequence exactly reaching
the 15 local extremes in the given order. In general, there can appear any number of local extremes in
the observed time interval. Such a general property cannot be expressed in STL.
(a) x(t) = sin( 2ฯt
10 )
(b) x(t) =
t
2ฯt
20 sin( 10 )
(c) x(t) =
20
2ฯt
t sin( 10 )
Figure 1: Various types of oscillations.
In this paper, we propose an extension of STL, denoted STLโ , based on enriching the logic with
a signal-value freeze operator โ[ฯ] which allows referencing to a signal value in a time point when ฯ
is determined true. By means of atomic propositions enriched by variables of the form xโ referring to
โfrozenโ values, we can express damped oscillations by the following formula:
G[0,60] (( F[0,10] โ G[1,10] xโ โฅ x + c ) โง ( F[0,10] โ G[1,10] xโ โค x โ c )).
It says that โthere is always a time instant in near future which is a local maximum for some future
interval and there is also another time instant in near future which is a local minimum for some future
intervalโ. In these intervals, another local maxima and minima for more distant intervals occur, and
so on. This implies that the signal values can be surrounded by a decreasing function from top and an
increasing function from bottom. The constant c sets the extent of damping.
P. Dluhos et al.
75
The concept of freeze quantification has been introduced in [3] to increase real-time temporal logic
expressiveness by allowing every temporal operator to bind a time variable to the time it refers to. In
the context of systems biology this concept has been used in Biological Oscillator Synchronisation Logic
(BOSL) [6] to reason on oscillators synchronisation. In our work we shift the notion of temporal quantification to bind the real-valued signal variables to the temporal reference of time and we do it at the level
of STL logic. Freezing of variable values has been used before in higher-level formalisms employing
local variables [13, 1]. However, these formalisms do not support dense-time binding.
It is necessary to note that when values of derivatives of signal values are known in all sampled
points, some oscillatory properties can be expressed by using plain STL with predicates over derivatives.
However, in such a case all needed derivatives (of all required orders) must be included within the signal.
Getting these data can be computationally hard or even impossible. STLโ allows to express (and monitor)
oscillatory properties without the need of any additional information supporting the signals.
The contribution of this paper is an extension of STL logic with signal value freeze quantification
(Section 3) motivated by the need to express oscillations appearing in biology. The paper is primarily focused on a practical aspect, we give an algorithm for monitoring STLโ formulae over (bounded)
continuous signals (Section 4). The result is supported by a prototype implementation evaluated on a
biological case study of E. coli repressilator (Section 5). Please note that a detailed discussion of STLโ
expressiveness is provided in a masterโs thesis [10] that makes a preliminary version of this paper.
2
Background
First, we briefly recall the real-valued signals over continuous time from [17]. For the purposes of this
paper, we focus only on signals over Rn .
Definition 2.1 Let T = [0, r], r โ Qโฅ0 , T โ Rโฅ0 , be a finite interval (time domain of the signal). A finite
length signal s is a function s : T โ Rn where |s| = r denotes the length of the signal s.
Definition 2.2 Given a signal s : T โ Rn , n denotes the order of the signal s. We use si to denote the i-th
component of the signal, si : T โ R (i.e., the canonical projection to the i-th element).
A signal of order n represents one finite run of a continuous-time system with n variables. A variable
can represent any quantity of the system, e.g., concentration of species, its derivative or any other attribute
of the signal which can be measured and quantified.
To translate the properties of a signal into terms of logic, we use a function transforming real values
of the signal components in every time instant to the Boolean set {0, 1}, representing satisfaction or
dissatisfaction of a property over the signal. These truth values are used as propositional variables in
formulae of the logic. Unlike in [17], we restrict the allowed operations on signal variables to linear
combinations and simple comparisons. Such a restriction is needed for our monitoring algorithm (Section
4) and does not limit expression of the properties of our interest.
Definition 2.3 Linear predicate ฮฝ of order m is a function ฮฝ : Rm โ B of the form โm
i=1 ai xi โผ b where
ai , b โ R are real coefficients, xi are input variables, โผโ {<, โค, >, โฅ, =} and B is a Boolean set B =
{0, 1}. The predicate ฮฝ(x1 , x2 , . . . xm ) returns 1 iff the expression โm
i=1 ai xi โผ b is true and 0 otherwise.
However, in the logic defined in this paper, we need not only to work with the values of variables
acquired in a single time instant, but also with a second set of values from another time instant. For this
reason, we will define an additional function extracting truth values from the signal.
76
On Expressing and Monitoring Oscillations
+
Definition 2.4 Atomic predicate ยต is a function ยต : Sn ร R+
0 ร R0 โ B where Sn is a class of signals
โ
of order n. For each signal s โ Sn and t,t โ [0, |s|], ยต is defined by the formula:
df
ยต(s,t,t โ ) = ฮฝ(s1 (t), . . . , sn (t), s1 (t โ ), . . . , sn (t โ )),
where ฮฝ is a linear predicate of order 2n and si are components of the signal s. Values of the atomic
predicate ยต for t > |s| or t โ > |s| are considered undefined.
An atomic predicate over a signal s describes a Boolean property of the signal s, i.e., if a constraint
specified by the linear predicate ฮฝ is satisfied with respect to two time instants t and t โ . An example
of such a property is โunder condition t โ < t, the difference between values of variables s1 and s2 was
higher in the time t โ than in the time tโ:
ยต(s,t,t โ ) = ฮฝ(s1 (t), s2 (t), s1 (t โ ), s2 (t โ )) = s1 (t) โ s2 (t) < s1 (t โ ) โ s2 (t โ ),
which can be rearranged to the standard form of a linear predicate according to Definition (2.3):
df
ฮฝ(s1 (t), s2 (t), s1 (t โ ), s2 (t โ )) = s1 (t) โ s2 (t) โ s1 (t โ ) + s2 (t โ ) < 0.
Instead of ยต(s,t,t โ ) = s1 (t) โ s2 (t) < s1 (t โ ) โ s2 (t โ ) we usually write ยต(s,t,t โ ) = x โ y < xโ โ yโ ,
denoting the variables of a signal s in time t by letters x, y, z, . . . and the same variables in time t โ as
xโ , yโ , zโ , . . ..
As in [17], we will avoid the undesired cases of atomic predicates where the output values of the
predicate are varying infinitely often. We assume that we deal with signals that are well-behaving with
respect to every ยต, that is, ยต(s) has a bounded variability and every change in ยต(s) is detected in the
sense that every point t such that ยต(s[t]) 6= limt 0 โ>t ยต(s[t 0 ]) is included in the sampling [17].
3
A Logic for Oscillatory Dynamics
In this section we describe the syntax and semantics of STL*. It is based on the Signal Temporal Logic
(STL) [17] which we extend with the signal-value freeze operator โ[ฯ]. We consider atomic predicates
restricted to linear as defined in the previous section.
3.1
Syntax
The formulae of the STL* are inductively defined by the following grammar:
ฯ ::= ยตi | ยฌฯ | ฯ1 โจ ฯ2 | ฯ1 U[a,b] ฯ2 | โฯ,
where ยตi are atomic predicates from Definition 2.4, ยฌ and โจ are standard propositional logic operators, U[a,b] is a bounded until operator constrained by the closed nonsingular time interval [a, b] with
rational end-points. The interpretation of this operator is similar to the one used in the Metric Interval
Temporal Logic (MITL) [2]. Finally, โ is the newly added unary signal-value freeze operator. In the
standard way, we can derive additional temporal operators such as eventually ( F[a,b] ฯ โก true U[a,b] ฯ)
and globally ( G[a,b] ฯ โก ยฌ F[a,b] ยฌฯ).
P. Dluhos et al.
3.2
77
Semantics
Formulae of STL* are interpreted over triplets (s,t,t โ ) where s is a real-valued signal and t,t โ โ [0, |s|]
are two time instants. We write (s,t,t โ ) |= ฯ, iff a formula ฯ is satisfied on the triplet (s,t,t โ ). The
satisfaction of an STL* formula is defined inductively to its structure:
df
(s,t,t โ ) |= ยต
โโ ยต(s,t,t โ ) = 1;
(s,t,t โ ) |= ยฌฯ
โโ (s,t,t โ ) 6|= ฯ;
(s,t,t โ ) |= ฯ1 โจ ฯ2
โโ (s,t,t โ ) |= ฯ1 or (s,t,t โ ) |= ฯ2 ;
df
df
df
(s,t,t โ ) |= ฯ1 U[a,b] ฯ2 โโ โt 0 โ [a + t, b + t] : (s,t 0 ,t โ ) |= ฯ2 โง
โt 00 โ [t,t 0 ] : (s,t 00 ,t โ ) |= ฯ1 ;
(s,t,t โ ) |= โฯ
(1)
df
โโ (s,t,t) |= ฯ.
Because models for STL* are signals, we also speak about satisfaction of a formula over a signal.
df
Definition 3.1 The satisfaction of a formula ฯ over a signal s is defined as: s |= ฯ โโ (s, 0, 0) |= ฯ.
The meaning of the operator โฯ is to freeze the values of the signal over which the formula is
interpreted in the current time point so we can use these values inside the subformula ฯ. Formula โฯ is
true in time t = t0 iff the formula ฯ is true with the time t โ frozen in this time, i.e., t โ = t0 . In combination
with other temporal operators, interesting properties
such as โthe value of the variable
can beโ expressed
x is nondecreasing on the interval Iโ, ฯ1 โก GI โ G[0,ฮต] (x โค x) , where ฮต > 0 is an arbitrary constant.
Or โat some point in the future (during
interval I) the value x increases by the value of 5 within two time
unitsโ, ฯ2 โก FI โ F[0,2] (xโ + 5 = x) .
To determine the satisfaction of a formula over a signal, the signal has to be of a sufficient length.
The necessary length can be computed for each formula inductively to its structure as in [17]. The freeze
operator does not require any additional length:
df
l(ยต)
= 0;
l(ยฌฯ)
= l(ฯ);
l(ฯ1 โจ ฯ2 )
= max(l(ฯ1 ), l(ฯ2 ));
df
df
(2)
df
l(ฯ1 U[a,b] ฯ2 ) = max(l(ฯ1 ), l(ฯ2 )) + b;
l(โฯ)
df
= l(ฯ).
From Definition 3.1 we can see that if a formula ฯ contains an atomic predicate ยตi and there is no
operator โ wrapping this predicate then all variables concerning the frozen time instant t โ are handled as
if t โ = 0.
From the definition of the semantics of STL* (1) follows that in a formula with several nested operators โ, the meaning of a frozen variable xโ is local. I.e., it relates to the nearest operator โ, because the
content of the variable t โ is overwritten by the most nested freeze operator โ. It implies that only a single
set of frozen signal values is accessible at every place in the formula. For example, in a formula:
โ xโ โค y UI (xโ = y โง โ G[0,5] xโ โฅ y ) ,
(3)
the first and the second occurrence of the variable xโ relate to the first usage of โ and address the time
t = 0, in which the formula is interpreted. The third occurrence of xโ , in contrast to the previous two,
78
On Expressing and Monitoring Oscillations
relates to the second operator โ and addresses the time instant in which the subformula on the right side of
UI becomes true. Semantics restricted in this way does not excessively limit the capability of expressing
various biological behaviour while remaining computationally feasible.
4
Algorithm
In this section we deal with monitoring of an STL* formula, which means to determine the satisfaction
of a formula over a finite length signal. The monitoring procedure introduced in this paper is inspired by
constrained LTL model-checking [9] and monitoring of STL formulae [17], but needed to be extended
into 2D space due to freeze operator โ. It is because the task is solved simultaneously for two time
instants, actual time and frozen time.
The idea of the monitoring procedure is to construct a parse tree of the formula and check the satisfaction in a bottom-up manner. First step in checking a formula ฯ over a signal s is to construct a set of
time points in which the formula ฯ is satisfied.
Definition 4.1 Let ฯ be a STL* formula and s be a real-valued signal. A set Sฯ,s = {(t,t โ ) โ [0, |s|] ร
[0, |s|] | (s,t,t โ ) |= ฯ} is called the satisfaction set of formula ฯ over signal s. We use short-form notation
Sฯ whenever the signal s is obvious from the context.
Now we inductively construct satisfaction sets for nodes on higher levels of the parse tree. The last
step of the procedure is to decide if s |= ฯ from satisfaction set for the formula ฯ. According to Definition
3.1, it is equivalent to checking whether the satisfaction set contains the point (0, 0).
Constructing the satisfaction set for a general signal can be a very difficult task. For this reason we
will consider the monitoring algorithm only for piecewise linear signals. This is a reasonable requirement
because in most cases we deal with time series produced by numerical simulations of modelled systems
or by some measurements. These series can be interpreted as piecewise linear signals considering the
values changing linearly between two adjacent points. If required, other points can be generated in
between the existing points to make the signal more precise.
Definition 4.2 A real-valued signal s of order n is called piecewise linear signal iff all the projections
si (t) : [0, |s|] โ R, i = 1, . . . , n are piecewise linear functions defined on a finite set of intervals J =
T
S
{I1 , I2 , . . . , Im } where I j โ [0, |s|], j = 1, . . . , m and J = 0,
/ J = [0, |s|].
Theorem 4.1 (Inductive construction of the satisfaction set) Let s be a piecewise linear signal and
ฯ a formula in STL*. The satisfaction set Sฯ of the formula ฯ over the signal s can be constructed
inductively with respect to the structure of the formula ฯ:
Sยต
Sยฌฯ
Sฯ1 โจฯ2
Sฯ1 U[a,b] ฯ2
Sโฯ
+
โ
{(t,t โ ) โ R+
0 ร R0 | ยต(s,t,t ) = 1};
+
R+
0 ร R0 \ Sฯ ;
Sฯ1 โช Sฯ2 ;
{(t,t โ ) โ Sฯ1 | โt 0 โ [t + a,t + b] : (t 0 ,t โ ) โ Sฯ2 โง
โt 00 โ [t,t 0 ] : (t 00 ,t โ ) โ Sฯ1 };
+
+
โ
= {(t,t โ ) โ R+
0 ร R0 | (t,t) โ Sฯ ,t โ R0 }.
=
=
=
=
Proof Each of the equations follows directly from the definition of semantics of STL* (1).
P. Dluhos et al.
79
The assumption of piecewise linear signals in combination with linearity of atomic predicates (Definitions 2.3, 2.4) enables us to construct satisfaction sets for atomic predicates in polynomial time and
to easily compute sets belonging to higher formulae. The formalism we use for the representation of
satisfaction sets are convex polytopes.
Definition 4.3 Convex polytope P โ Rn is a set {x = (x1 , x2 , . . . , xn ) โ Rnร1 | Ax โค b} where A โ Rmรn
is a matrix and b โ Rmร1 is a column. A convex polytope in R1 is called a line segment, in R2 a convex
polygon.
Each inequality โnj=1 ai j x j โค bi in Definition 4.3 identifies a subspace of Rn . The convex polytope is
obtained as intersection of these subspaces.
Theorem 4.2 Assume s a piecewise linear signal and J = {I1 , . . . , Im } the set of intervals on which
s is defined. Let ยต be an atomic predicate over the signal s. The predicate ยต(s,t,t โ ) = โni=1 ai si (t) +
โni=1 bi si (t โ ) โผ b, โผโ {<, โค, >, โฅ, =} is a linear function over the signal s in variables t and t โ according
df
to Definition 2.4. Denote Si,+j = {(t,t โ ) โ Ii ร I j | ยต(s,t,t โ ) = 1} where i, j โ {1, . . . m}, Ii , I j โ J the set
of time instants at which the atomic predicate ยต is satisfied over signal s on rectangular area Ii ร I j and
df
Si,โj = (Ii ร I j ) \ Si,+j its complement. For t โ Ii ,t โ โ I j there can arrive two situations:
1. if โผ โก =, then the set Si,+j makes a line segment (possibly degenerated to a single point or an empty
set);
2. if โผ 6โก =, then the space Ii ร I j is divided by the line โni=1 ai si (t) + โni=1 bi si (t โ ) = b into two
subspaces Si,+j and Si,โj (Figure 2). (Again, there might be a degenerated case when the line
โni=1 ai si (t) + โni=1 bi si (t โ ) = b does not cross the rectangle {(t,t โ ) โ Ii ร I j }. In this case Si,+j = 0/
and Si,โj = Ii ร I j or vice versa).
Proof Described properties result from the linear form of atomic predicates 2.4 and from the fact that
signal s behaves linearly on each interval Ii โ J , i โ {1, . . . m}.
Figure 2: An illustration of the set Si,+j for a formula xโ < 32 x + 28
3 on the subspace Ii รI j = [0, 4]ร[10, 13].
In both cases, the set Si,+j makes a convex set easily describable by set operations over convex polytopes. In the first case, a line segment itself is a convex polytope. In the second case, either the set Si,+j is
a convex polytope, or (when โผโ {<, >}) it is a convex polytope after subtraction of one bordering line
segment, which is a polytope.
S
Using this algorithm we can express the satisfaction set Sยต as Sยต = i, jโ{1,...,m} Si,+j , where Si,+j are the
sets described above constructed by set operations on polytopes. The set Sยต can be further simplified by
80
On Expressing and Monitoring Oscillations
joining adjacent polytopes. Having satisfaction sets for atomic predicates, we could inductively construct
satisfaction sets for composite formulae from Theorem 4.1 again as operations on polytopes, which could
be achieved in polynomial time [8].
However, working with precise satisfaction sets as defined in Theorem 4.1 can be quite a difficult
task. We have to work with polytopes of different dimensions (polygons, lines and points) and operations
over sets of these objects can be unnecessarily demanding. In real-world applications, we could end up
performing an expensive monitoring over noisy signals measured on imperfect devices or computed
on computers with finite numerical precision. Hence think about less precise, yet faster monitoring
algorithm.
We can imagine a noisy signal as a signal measured or computed with finite precision. The actual
values of the variables can differ from the values presented by the signal up to some error ฮต > 0. This
inaccuracy in the domain of values implies also inaccuracy in the time domain. When investigating the
time instant in which some event occurred (e.g., x > 0) we cannot be sure when exactly it happened. That
is because the critical value x = 0 is burdened by an error and it is possible that x = 0, but also that x > 0
or x < 0 in that particular time instant.
Imagine we are in the situation from Theorem 4.2, but working with a noisy signal. We cannot be
sure about the border of the set Si,+j due to the error ฮต. The condition โni=1 ai si (t) + โni=1 bi si (t โ ) = b
defining points on the border of Si,+j could be easily broken by changing the values of the signal s by
arbitrary small values from (0, ฮต). For this reason, we will ignore these border points and count them as
they were in Si,+j or in Si,โj depending on what would be computationally easier. As a consequence, in the
first case in Theorem 4.2, Si,+j = 0,
/ and in the second case, it does not matter if โผ โก < or โผ โก โค.
As a result of this simplification, the set of allowed operators in atomic predicates is restricted to
{<, >}. The remaining three operators lost their sense. With signals burden with some error ฮต > 0
the satisfaction of atomic predicates can be meaningfully determined only for time instants inside the
satisfaction set. Hence the satisfaction of a formula using the operator =, e.g., x = b or x = y + 2, cannot
be determined. Every reference to a precise value has to be replaced by a sufficiently large interval, e.g.,
formula x = b can be replaced by x โฅ (b โ ฮด ) โง x โค (b + ฮด ) for some ฮด > ฮต/2.
Based on these assumptions, monitoring can be solved approximately. For every pair of intervals
Ii , I j โ J , the satisfaction set on this area can be described by a single convex polygon Si,+j . For the
S
whole satisfaction set Sยต,s we get Sยต,s = i, jโ{1,...,m} Si,+j . The problem of construction of satisfaction
sets for composite formulae from Theorem 4.1 is reduced to operations with sets of convex polytopes in
plane for which efficient algorithms exist [8].
Algorithm 4.1 (Approximative monitoring algorithm for piecewise linear signals)
Input: A piecewise linear signal s and an STL* formula ฯ.
Output: Answer to the question s |= ฯ.
Algorithm inductively constructs the satisfaction set Sฯ :
All the computations are performed on parts of the signal s of sufficient length. This can be computed
according to (2). If the signal does not have the sufficient length, the answer returned by the algorithm
might be wrong.
1. Sยต = i, jโ{1,...,m} Si,+j . The computation of the satisfaction sets Si,+j for individual intervals is performed according to Theorem 4.2, but without determining the satisfaction of the borders (as was
justified in this section).
S
P. Dluhos et al.
81
2. Sยฌฯ = (J ร J ) \ Sฯ . The result can be computed as a simple Boolean operation on polygons.
It is necessary to ensure that the resulting set consists only of convex polygons, which could be
achieved for example by triangulation [8].
3. Sฯ1 โจฯ2 = Sฯ1 โช Sฯ2 . Again a Boolean polygonal operation.
+
+
โ
4. Sโฯ = {(t,t โ ) โ R+
0 ร R0 | (t,t) โ Sฯ ,t โ R0 }. The satisfaction set for the freeze operation can be
computed by: (1) finding an intersection between the line t โ = t and the satisfaction set Sฯ (black
line segments in Figure 3a), (2) substituting values in the second component by the whole axis
t โ , i.e., making a projection to the first component t and then a Cartesian product with the axis t โ
(Figure 3b).
(a)
(b)
Figure 3: Example of computing satisfaction set for the formula โฯ. a) The satisfaction set represented
as a set of (overlapping) convex polygons (different colors are used only for depicting the fact that the
set consists of convex polygons) and the line t = t โ . The regions of intersection of the line and the
satisfaction set are depicted in black color. b) Resulting set Sโฯ obtained by projecting the intervals of
intersection to the axis t and making a Cartesian product with the axis t โ .
5. Sฯ1 U[a,b] ฯ2 = {(t,t โ ) โ Sฯ1 | โt 0 โ [t + a,t + b] : (t 0 ,t โ ) โ Sฯ2 โง โt 00 โ [t,t 0 ] : (t 00 ,t โ ) โ Sฯ1 }. To be more
illustrative, we explain this part of the algorithm from the geometrical point of view, identifying
values t with the horizontal axis and values t โ with the vertical axis.
(a) Sฯ1
(b) Sฯ2
(c) Sฯ1 โฉ Sฯ2
Figure 4: First step of computation of Sฯ1 U[a,b] ฯ2 is to find the intersection Sฯ1 โฉ Sฯ2 .
For each convex polygon P โ Sฯ1 โฉ Sฯ2 (Figure 4c) the following procedure is performed:
82
On Expressing and Monitoring Oscillations
(a) P โช Sฯ1
(b) ordered vertices
(c) rectangular polygons (stripes)
Ri , i = 1, . . . , n โ 1
Figure 5: Next, the space is divided into horizontal stripes. The task is solved in each stripe separately.
(a) Vertices of polygons {P} โช Sฯ1 are increasingly ordered by the second component t โ (duplidf
cates can be removed). Denote the ordered set V = (V1 ,V2 , . . .Vn ) (Figures 5a, 5b);
โ )โV
(b) For i = 1, . . . , n โ 1 every neighbouring pair of vertices Vi = (ti ,tiโ ),Vi+1 = (ti+1 ,ti+1
specifies a rectangular polygon (stripe):
df
โ โ
Ri = {(t,t โ ) โ R+
0 ร [ti ,ti+1 ]}
(Figure 5c). Ri in a form of line segment is considered empty because we do not care about
the border points.
df
(c) The task is solved in every stripe Ri separately. For every nonempty Ri denote Pi = Ri โฉ P and
df
Si = Ri โฉ Sฯ1 . Due to the way of construction of Ri , all polygons in Si and the single polygon
โ ) or the lower (t โ = t โ ) border of the stripe
Pi have all their vertices on the upper (t โ = ti+1
i
Ri (Figure 6a). In fact, these polygons can take only the shape of a triangle or a trapezoid
(Figure 7).
(a) the stripe R4
โ
โ
(b) points on the left side of the line ul
(c) A4 = the rightmost polygon in S40
Figure 6: The potential polygons are identified. (The solution cannot be placed further in time than the
property ฯ2 . Moreover, the property ฯ1 must continuously hold at all time points until ฯ2 is satisfied.)
Now we get rid of the polygons lying on the right side of Pi because their points cannot be
in the solution (they represent the time past the event ฯ2 ). To do so, we isolate the upper
and lower rightmost vertices of the polygon Pi . Denote them as u = (ut , ut โ ) and l = (lt , lt โ )
(Figure 6b). We get a new area:
โ
โ
df
R0i = {(t,t โ ) โ Ri | (t,t โ ) lies on the left side of the line ul }.
P. Dluhos et al.
83
df
The solution can lie only in this area, so we can restrict Si to Si0 = R0i โฉ Si .
Figure 7: An example of a stripe and all possible shapes of polygons inside a stripe.
(d) All the adjoining polygons (sharing an edge) in Si0 are connected to form maximal seamless
convex polygons (e.g., the green and orange polygons in Figure 6b).
(e) Let Ai be the rightmost polygon in Si0 (Figure 6c) (Even after connecting some polygons in Si0
their shape can still be only triangular or trapezoidal (Figure 7) so there is only one rightmost
polygon in Si0 ). Then A0i = Ai โฉ (Pi (b, a)) is the solution for the stripe Ri (Figure 8).
df
The operation is defined as A (a, b) = {(x, y) โ R ร R | โc โ (a, b) : (x + c, y) โ A} which
is equal to A โ (โa, โb), where โ is the Minkowski sum.
S
0
(f) The final satisfaction set is given by Sฯ1 U[a,b] ฯ2 = nโ1
i=1 Ai .
(a) P4 before application of the operator
(b) the shifted polygon P4
(2.5, 2.5) (c) A04 = A4 โฉ (P4 (2.5, 2.5)), the final
solution in the stripe R04
Figure 8: Last step is to consider the interval [a, b] bounding the operator U.
6. The result s |= ฯ which is equivalent to (0, 0) โ Sฯ is returned.
Remark 4.1 The satisfaction set for temporal operator future F[a,b] ฯ โก trueU[a,b] ฯ (and hence G[a,b] ฯ)
can be computed more easily than according to the step 5. It can be obtained directly as S F[a,b] ฯ =
Sฯ (b, a).
4.1
Time and space complexity
Time and space complexity of all steps of the Algorithm 4.1 is proportional to the number of polygons
they are working with. Number of polygons generated in step 1 is at most n2 for each atomic predicate,
where n is the number of intervals on which the signal is defined.
The number of polygons does not asymptotically change during the computation of operations described in other steps of the algorithm and all these functions do not work slower than O(n2 ) (see [8] for
more details). The output polygons also keep small number of vertices during the process.
The upper bound on the total computation time is therefore O(kn4 ), where n is the number of intervals
on which the signal is defined and k is the size of the investigated formula.
84
5
On Expressing and Monitoring Oscillations
Evaluation and Case Study
A prototype of the approximative monitoring Algorithm 4.1 was implemented in Matlab (version R2011b).
The Multi-Parametric Toolbox (MPT) package [16] (version 2.6.3) was used for the polygonal operations. We have not focused on efficiency of the implemented algorithm, our goal was to prove the concept of the presented algorithm. Detailed description of the implementation, results of the experiments
and performance analysis can be found in [10].
We have studied a biological system of three transcriptional repressors which was designed and built
into bacteria Escherichia coli [14]. Concentrations of involved proteins are periodically oscillating which
causes periodic production of a green fluorescent protein. Intensity of fluorescence of this protein, which
can be measured, gives evidence of the ongoing activity of the network (Figure 9).
Figure 9: The fluorescent intensity of a colony of Escherichia coli containing the repressilator. The
intensity is increasing overall due to the increasing number of individuals in the colony. The period of
oscillations is lower than the time between cell division, but the whole repressilator is transmitted from
generation to generation. Figure was taken from [14].
The network was modelled as a system of six differential equations:
mฬ1
mฬ2
mฬ3
ฮฑ
= โm1 + 1+p
n + ฮฑ0 ;
3
ฮฑ
= โm2 + 1+pn + ฮฑ0 ;
1
ฮฑ
= โm3 + 1+p
n + ฮฑ0 ;
2
pห1
pห2
pห3
= โฮฒ (p1 โ m1 );
= โฮฒ (p2 โ m2 );
= โฮฒ (p3 โ m3 ).
(4)
dmi
df d pi
, pฬi =
; m1 , m2 and m3 correspond to activity of genes lacl,tetR and cl; p1 , p2
dt
dt
and p3 are concentrations of corresponding proteins and ฮฑ, ฮฒ , ฮฑ0 , n are constants (a typical behaviour of
the system is depicted in Figure 10).
The analysis of the system (4) and the estimation of parameters ฮฑ, ฮฒ , ฮฑ0 , n producing the oscillatory
behaviour was originally done by means of manual qualitative analysis of ODEs [14]. However, we can
perform the analysis automatically using the monitoring of STL* formulae. We can specify the desired
oscillatory property by the formula:
df
Where mฬi =
df
ฯ = G[10,190] F[0,50] โ ( F[1,50] mโi < mi ) โง F[1,50] mโi > mi )
(5)
and test the satisfaction for different values of parameters on runs of the length at least 300 minutes. The
expected period has to be lower than 50 minutes. We start the testing 10 minutes later after the beginning
to avoid the initial swing and end the testing 50 minutes before the end of the measurement because the
signal might be cut in the middle of a period.
P. Dluhos et al.
85
Figure 10: A typical signal produced by the system (4). Only variables m1 , m2 and m3 are depicted.
(a) ฮฑ = 400, ฮฒ = 0.2, ฮฑ0 = 0.2, n = 2
(b) ฮฑ = 400, ฮฒ = 0.2, ฮฑ0 = 2, n = 2
Figure 11: Sample runs of the system (4) for different sets of parameters. The initial values were m1 =
0.1, m2 = 0.3, m3 = 0.2, p1 = 0.2, p2 = 0.1, p3 = 0.3. Only the values of m1 are depicted.
Formula (5) is satisfied by both runs in Figure 11. To avoid the case of damped oscillations, we can
add the formula:
df
ฯ = G[10,200] โ ( F[1,50] mโi โค mi ) .
(6)
It ensures that the values reached in each period are not decreasing. By connecting formulae (5) and
(6) we get the formula ฯ โง ฯ. It does express the desired oscillatory behaviour in Figure 11a and it is not
satisfied by signals of the type depicted in Figure 11b.
Another property of the repressilator can be expressed by the formula:
G[0,270] โ ( F[0,30] (mโ1 + 1 > m3 โง mโ1 โ 1 < m3 ) ,
(7)
which means that โthe values of m1 precede the values of m3 in such sense that for every value of m1 , m3
reaches similar value in short time after m1 didโ (Figure 12).
Full estimation of parameters could not be performed due to high time demands of the implemented
monitoring algorithm [10]. A single run of the monitoring algorithm for the formulae (5), (6) or (7)
over a signal sampled by 80 points took several hours on a regular PC. Reduction of the number of
points describing the signal would lead to excessive loss of information. We have found out that the
86
On Expressing and Monitoring Oscillations
Figure 12: Sample run of the system (4) satisfying the formula (7). The parameters were ฮฑ = 400, ฮฒ =
0.2, ฮฑ0 = 0.2, n = 2 and the initial values m1 = 0.1, m2 = 0.3, m3 = 0.2, p1 = 0.2, p2 = 0.1, p3 = 0.3.
Depicted variables are m1 โ red and m3 โ green.
bottleneck in efficiency of the prototype implementation lies in polyhedral operations performed by
MPT. Since we work in 2D and need only a small subset of operations, we believe that our algorithm
can be significantly accelerated when an optimal implementation is employed. Here we focused on
demonstrating the applicability while leaving efficiency for future work.
Different task would be to ensure that the behaviour of concentrations of the fluorescent protein in the
bacteria (Figure 9) is in correspondence with the model. While it could be done only manually in [14], if
we had the data, we would be able to test the properties of the measurements identically as the properties
of the signals produced by ODEs.
6
Conclusion
We have proposed an extended Signal Temporal Logic STLโ motivated by the need to express properties
of biological dynamical systems in a detail sufficient to distinguish different shapes of oscillation. We
have provided a monitoring algorithm that approximately computes the truth value of an STLโ formula
for a given continuous (piece-wise linear) signal. The method has been prototyped in Matlab and the
results achieved on a case study of oscillatory behaviour of the repressilator showed that the method
satisfactorily works for signals generated by numerical simulation. However, the employed library MPT
for polyhedral operations appears to be not efficient enough to satisfy the needs of practical usage.
For future work on the practical side, we plan to implement more efficient algorithms for the specific
polyhedral operations we use in the monitoring procedure. Another straightforward direction of future
development is lifting of the robustness measure [11] to the extended logic.
A very inspiring work is [12] where Time-Frequency Logic (TFL) is defined by shifting STL semantics to frequency domain. TFL provides another way to express permanent oscillations. However, nonpure oscillatory behaviour such as damped oscillations require specific elaboration in the time-domain.
Joining TFL semantics with the STLโ concept of real-value freezing can be an interesting step further.
References
[1] Accelera Organization, Inc. (2004): SystemVerilog 3.1a Language Reference Manual.
[2] R. Alur, T. Feder & T. A. Henzinger (1996): The benefits of relaxing punctuality. J ACM 43(1), pp. 116โ146,
doi:10.1145/227595.227602.
[3] R. Alur & T. A. Henzinger (1994): A really temporal logic.
J ACM 41(1), pp. 181โ203,
doi:10.1145/174644.174651.
P. Dluhos et al.
87
[4] P. Ballarini & M. L. Guerriero (2010): Query-based verification of qualitative trends and oscillations in
biochemical systems. Theor. Comput. Sci. 411(20), pp. 2019โ2036, doi:10.1016/j.tcs.2010.02.010.
[5] J. Barnat, L. Brim & D. Sฬafraฬnek (2010): High-performance analysis of biological systems dynamics with
the DiVin E model checker. Brief. in Bioinformatics 11, pp. 301โ312, doi:10.1093/bib/bbp074.
[6] E. Bartocci, F. Corradini, E. Merelli & L. Tesei (2010): Detecting synchronisation of biological oscillators
by model checking. Theoretical Computer Science 411(20), pp. 1999 โ 2018, doi:10.1016/j.tcs.2009.12.019.
[7] G. Batt, D. Ropers, H. de Jong, J. Geiselmann, R. Mateescu, M. Page & D. Schneider (2005): Validation
of qualitative models of genetic regulatory networks by model checking: analysis of the nutritional stress
response in Escherichia coli. In: ISMB (Supplement of Bioinformatics), pp. 19โ28.
[8] M. de Berg, O. Cheong, M. van Kreveld & M. Overmars (2008): Computational Geometry: Algorithms and
Applications, 3 edition. Springer, Berlin.
[9] L. Calzone, N. Chabrier-rivier, F. Fages & S. Soliman (2006): Machine learning biochemical networks from
temporal logic properties. Trans Comput Syst Biol 4220, pp. 68โ94, doi:10.1007/11880646 4.
[10] P. Dluhosฬ (2012): Specification and monitoring of oscillation properties in dynamical systems. Masterโs
thesis, Masaryk University. Available at http://is.muni.cz/th/269281/fi_m/thesis.pdf.
[11] A. Donzeฬ & O. Maler (2010): Robust satisfaction of temporal logic over real-valued signals. In: FORMATSโ10, Springer-Verlag, Berlin, Heidelberg, pp. 92โ106, doi:10.1007/978-3-642-15297-9 9.
[12] A. Donzeฬ, O. Maler, E. Bartocci, D. Nickovic, R. Grosu & S. Smolka (2012): On Temporal Logic and Signal
Processing. Accepted to ATVA 2012.
[13] C. Eisner & D. Fisman (2008): Augmenting a regular expression-based temporal logic with local variables.
In: FMCAD โ08, IEEE Press, pp. 23:1โ23:8, doi:10.1.1.140.3930.
[14] M. B. Elowitz & S. Leibler (2000): A synthetic oscillatory network of transcriptional regulators. Nature
403(6767), pp. 335โ338, doi:10.1038/35002125.
[15] B. N. Kholodenko (2000): Negative feedback and ultrasensitivity can bring about oscillations in the
mitogen-activated protein kinase cascades. Eur J Biochem 267(6), pp. 1583โ1588, doi:10.1046/j.14321327.2000.01197.x.
[16] M. Kvasnica, P. Grieder & M. Baoticฬ (2004): Multi-Parametric Toolbox (MPT).
[17] O. Maler & D. Nickovic (2004): Monitoring temporal properties of continuous signals. In: Proc. of
FORMATS-FTRTFT, Springer, pp. 152โ166, doi:10.1.1.102.2905.
[18] O. Maler, D. Nickovic & A. Pnueli (2008): Checking Temporal Properties of Discrete, Timed and Continuous
Behaviors. In: Pillars of Computer Science, LNCS 4800, Springer, pp. 475โ505, doi:10.1007/978-3-54078127-1 26.
[19] R. Mateescu, P. T. Monteiro, E. Dumas & H. de Jong (2011): CTRL: Extension of CTL with regular expressions and fairness operators to verify genetic regulatory networks. Theor. Comput. Sci. 412(26), pp.
2854โ2883, doi:10.1016/j.tcs.2010.05.009.
[20] F. Miyoshi, Y. Nakayama, K. Kaizu, H. Iwasaki & M. Tomita (2007): A Mathematical Model for the KaiProtein-Based Chemical Oscillator and Clock Gene Expression Rhythms in Cyanobacteria. Journal of Biological Rhythms 22(1), pp. 69โ80, doi:10.1177/0748730406295749.
[21] D. Nickovic & O. Maler (2007): AMT: a property-based monitoring tool for analog systems. In: Proceedings of the 5th international conference on Formal modeling and analysis of timed systems, FORMATSโ07,
Springer-Verlag, Berlin, Heidelberg, pp. 304โ319.
[22] A. Rizk, G. Batt, F. Fages & S. Soliman (2008): On a Continuous Degree of Satisfaction of Temporal
Logic Formulae with Applications to Systems Biology. In: Proc. of CMSBโ08, Springer, pp. 251โ268,
doi:10.1007/978-3-540-88562-7 19.
[23] J. Cฬervenyฬ & L. Nedbal (2009): Metabolic Rhythms of the Cyanobacterium Cyanothece sp. ATCC
51142 Correlate with Modeled Dynamics of Circadian Clock. J Biol Rhythms 24(4), pp. 295โ303,
doi:10.1177/0748730409338367.
| 5cs.CE
|
The Lottery Ticket Hypothesis: Training Pruned
Neural Networks
arXiv:1803.03635v1 [cs.LG] 9 Mar 2018
Jonathan Frankle
MIT CSAIL
[email protected]
Michael Carbin
MIT CSAIL
[email protected]
Abstract
Recent work on neural network pruning indicates that, at training time, neural
networks need to be significantly larger in size than is necessary to represent the
eventual functions that they learn. This paper articulates a new hypothesis to explain
this phenomenon. This conjecture, which we term the lottery ticket hypothesis,
proposes that successful training depends on lucky random initialization of a
smaller subcomponent of the network. Larger networks have more of these โlottery
tickets,โ meaning they are more likely to luck out with a subcomponent initialized
in a configuration amenable to successful optimization.
This paper conducts a series of experiments with XOR and MNIST that support
the lottery ticket hypothesis. In particular, we identify these fortuitously-initialized
subcomponents by pruning low-magnitude weights from trained networks. We then
demonstrate that these subcomponents can be successfully retrained in isolation
so long as the subnetworks are given the same initializations as they had at the
beginning of the training process. Initialized as such, these small networks reliably
converge successfully, often faster than the original network at the same level
of accuracy. However, when these subcomponents are randomly reinitialized or
rearranged, they perform worse than the original network. In other words, large
networks that train successfully contain small subnetworks with initializations
conducive to optimization.
The lottery ticket hypothesis and its connection to pruning are a step toward
developing architectures, initializations, and training strategies that make it possible
to solve the same problems with much smaller networks.
1
Introduction
Recent work on neural network pruning (e.g., [4, 3, 2]) indicates that neural networks can be dramatically simplified once trained. After training is complete, upwards of 90% of weights can be pruned
without reducing accuracy. If a network can be so pruned, then the function that it learned could
have been represented by a far smaller network than that used during training. However, researchers
believe1 that these smaller networks cannot be trained as readily as their larger counterparts, in spite
of the fact that they are demonstrably capable of representing the desired functions. In this paper,
we contend that it is indeed possible to train these smaller networks directly. In fact, these small,
trainable networks are embedded within the larger models that we typically train.
This paper articulates a possible explanation for the disconnect between a neural networkโs representation capacity and its trainability. This conjecture, which we term the lottery ticket hypothesis,
1
[4] mentions that โCNNs contain fragile co-adapted featuresโ and that โgradient descent is able to find
a good solution when the network is initially trained, but not after re-initializing some layers and retraining
them...When we retrain the pruned layers, we should keep the surviving parameters instead of re-initializing
them.โ
states that training succeeds for a given network if one of its subnetworks has been randomly initialized such that it could be trained in isolationโindependent of the rest of the networkโto high
accuracy in at most the number of iterations necessary to train the original network. We refer to these
fortuitously-initialized networks as winning tickets.
Subnetworks and winning tickets. From the perspective of the lottery ticket hypothesis, a networkโs
initialization procedure can be thought of as drawing many samples from a distribution over initialized
subnetworks. Ideally, the procedure manages to draw a subnetwork with the right architecture and
weight initializations for optimization to succeed (a winning ticket). If a network of size m (where
size is measured in units or weights) is being trained to solve a problem but a network of size n
(where n โค m) is sufficient to represent the function to be learned, then the lottery ticket hypothesis
views the original network as containing m
n overlapping subnetworks. If the larger network is able
to train successfully, it is because one of these subnetworks lucked into an initialization amenable to
optimization.
Metaphorically, training a network larger than is necessary to represent the function to be learned is
like buying many lottery tickets. Larger networks have combinatorially more subcomponents that
could facilitate successful training (i.e., more lottery tickets). The initialization strategy determines
which of these subcomponents are well-situated for optimization to succeed (i.e., which tickets are
winners). If a subcomponent is initialized favorably (i.e., the network picked a winning ticket),
training succeeds.
Identifying winning tickets. In this paper, we demonstrate that it is possible to automatically identify
winning tickets by making a small but critical modification to the experiment of Han et al. [4]. We
prune a trained neural networkโs smallest weights (as measured by their magnitudes after training)
in the same manner as Han et al.; the set of connections that survives this pruning process is the
architecture of a winning ticket as anticipated by the lottery ticket hypothesis. Unique to our work,
the winning ticketโs weights are the values to which these connections were initialized before training
began. Where Han et al. aimed to compress networks during the training process, our goal is to
find small networks that can be trained independently from the start. We show that a winning ticket
extracted in this fashion, when initialized with the original weights from before training, can be
trained successfully in isolation at least as fast as (and typically faster than) the full network.
Methodology. To empirically assess the lottery ticket hypothesis, we use the following procedure to
extract winning tickets from fully-connected networks of a variety of sizes for MNIST and, as an
illustrative example, from small networks for XOR. This procedure is identical to Han et al.โs pruning
process with the addition of the crucial last step: resetting the weights to their original values from
before training.
1. Randomly initialize a neural network.
2. Train the network until it converges.
3. Prune a fraction of the network.
4. To extract the winning ticket, reset the weights of the remaining portion of the network to
their values from (1) (i.e., the initializations they received before training began).
If successful training really does rely on fortuitous initialization of a subcomponent of the network
and pruning really does reveal this winning ticket, then the lottery ticket hypothesis predicts that
the pruned networkโwhen reset to the original initializations from before trainingโwill train
successfully at sizes too small for a randomly-initialized or a randomly-configured network to do so.
Research questions. To test the lottery ticket hypothesis, we evaluate the following research
questions:
How effectively do winning tickets train in comparison to the original network and to randomly sampled networks of similar size? For a variety of network configurations and perturbations of winning
tickets, we measure both convergence times and test accuracy once the network has converged.
How big are winning tickets relative to the size of the original network? By training on networks
of various sizes, we explore whether the size of a winning ticket remains constant for a particular
learning problem or grows in proportion to the size of the larger network from which it is derived.
2
10 Units
DB
ZL
8 Units
DB
ZL
6 Units
DB
ZL
4 Units
DB
ZL
2 Units
DB
ZL
98.5
96.8
92.5
78.3
49.1
92.9
87.5
76.8
55.3
17.6
Figure 1: Success rates of 1000 random XOR networks, each with the specified number of hidden
units. DB = percent of trials that found the correct decision boundary. ZL = percent of trials that
reached zero loss.
How sensitive are our results to particular pruning strategies? We test two broad classes of strategies:
pruning hidden units with the lowest-magnitude incoming and/or outgoing weights (for XOR) and
individually pruning the lowest-magnitude weights (for MNIST). We also study whether networks
can be pruned in a single step or whether they must repeatedly be pruned, retrained, and reset in an
iterative process.
Results. Our experimental results support the lottery ticket hypothesis.
XOR. We trained a simple network with one hidden layer to learn XOR. The minimal architecture
capable of representing XOR, a hidden layer with two randomly-initialized units, reached zero loss
18% of the time. In contrast, when a network with ten hidden units that reached zero loss was
iteratively pruned down to a two-unit winning ticket, the winning ticket reached zero loss 80% of the
time when trained with its original initializations.
MNIST. Up to a certain point, winning tickets derived by pruning converged faster than and at least as
accurately as the original network; after this point, convergence times and accuracy gradually and
then rapidly dropped off. In a single step, we could prune networks by 75% while still finding winning
tickets that, on average, converged 38% faster than the original network and matched its accuracy.
Pruning iteratively by 20% at a time, winning tickets 91% smaller than the original network converged
on average 39% faster. Networks iteratively pruned by up to 98% on average still converged as fast as
the original network while maintaining accuracy. When winning tickets were randomly reinitialized
or their weights were randomly rearranged, convergence times increased and accuracy decreased as
compared to the original network. Depending on the metric of winning ticket size, winning tickets
grew either gradually or marginally with network size.
Contributions and implications.
โข We propose the lottery ticket hypothesis as a new perspective on neural network training.
โข We further posit that pruning uncovers the winning tickets that the lottery ticket hypothesis
predicts, leading to an algorithm for extracting winning tickets from trained networks.
โข We apply this algorithm to empirically evaluate these conjectures on small networks. The
evidence we find supports both the lottery ticket hypothesis and our contention that pruning
can extract winning tickets.
Although this paper focuses mainly on measurement, it has important implications for our understanding of training. The increased representation power of large networks is not necessarily required for
gradient descent to learn functions with small representations. Lurking within these large networks
are small, fortuitously-initialized winning tickets that are both more efficient to train (as a product of
their size) and faster to converge (as a product of their initialization). By examining the initalizations
and architectures of successful winning tickets, we might find new ways of designing networks that
are smaller but equally-capable (if not superior).
2
Learning the XOR Function
The XOR function is among the simplest examples that distinguish neural networks from linear
classifiers. Before presenting our results for MNIST, we summarize the lottery ticket hypothesis
as it applies to this simple computation. The XOR function has four data points: the coordinates
(0, 0), (0, 1), (1, 0), and (1, 1). The first and last points should be placed in class 0 and the middle
two points in class 1. Geometrically, this problem requires a nonlinear decision boundary. In this
experiment, we consider the family of fully connected networks for XOR with two input units, one
hidden layer (ReLU activation), and one output unit (sigmoid activation).
3
Pruning Strategy
10 Units
DB
ZL
4 Units (Pruned)
DB
ZL
2 Units (Pruned)
DB
ZL
One-shot Product
99.2
93.3
98.0
90.3
82.4
65.3
Input Magnitude
98.9
93.5
97.9
92.2
83.8
76.5
Output Magnitude
99.0
93.3
96.9
85.9
78.6
56.1
Product
98.5
92.9
97.6
90.3
91.5
79.4
Figure 2: Success rates of different pruning strategies on 1000 trials each. DB and ZL defined as in
Figure 1. The pruned columns include only those runs for which both the original ten-unit network
and the pruned winning ticket found the right decision boundary or reached zero loss. The first row
of the table was obtained by pruning in one shot; all subsequent rows involved pruning iteratively
Although a network of this form with two hidden units is sufficient to perfectly represent the
XOR function,2 the probability that a standard training approachโone that randomly initializes the
networkโs weights and then applies gradient descentโcorrectly learns XOR for a network with two
hidden units is low relative to that for a larger network.
Figure 1 contains the overall success rates (percent of networks that found the right decision boundary
or reached zero loss). In 1000 training runs, a network with two hidden units learned a correct
decision boundary in only 49.1% of trials. Cross-entropy loss reached 0 (meaning the network
learned to output a hard 0 or 1) in only 17.6% of trials. Meanwhile, an otherwise identical network
outfitted with ten hidden units learned the decision boundary in 98.5% of trials and reached 0 loss in
92.9% of trials. Figure 1 charts the loss for these and other hidden layer sizes.3
To put the central question of this paper in the concrete terms of the XOR problem, why do we need
to start with a neural network with ten hidden units to ensure that training succeeds when a much
smaller neural network with two hidden units can represent the XOR function perfectly? We propose
the lottery ticket hypothesis as an explanation for this phenomenon.
The Lottery Ticket Hypothesis. Training succeeds for a given network if one of its subnetworks
(a โwinning ticketโ) has been randomly initialized such that it can be trained in isolation to high
accuracy in at most the number of iterations necessary to train the original network.
According to the lottery ticket hypothesis, successful networks with a large number of parameters
(e.g., the XOR network with ten hidden units) should contain winning tickets comprising a small
number of fortuitously-initialized weights on which training will still succeed.
2.1
Methodology
To test the lottery ticket hypothesis with the XOR function, we instantiated the experiment from Part
1 with the following details:
1. Randomly initialize a network with ten hidden units.
2. Train for 10,000 iterations on the entire training set.
3. Prune a certain number of hidden units according to a particular pruning heuristic.
4. To extract the winning ticket, reset the pruned network to the original initializations.
The first three steps extract the architecture of the winning ticket; the crucial final step extracts the
corresponding initializations. We ran this experiment with two different classes of pruning strategies.
One-shot pruning involves pruning the network in a single pass. For example, one-shot pruning
a network by 80% would involve removing 80% of its units after it has been trained. In contrast,
iterative pruning involves repeating steps (2) through (4) several times, removing a small portion of
n โn
1
Example satisfying weights for the first layer: โn
n . Satisfying weights for the output unit: [ 1 ].
Satisfying bias for the output unit: โn/2. n โฅ 1. As n grows, the output approaches a hard 1 or 0.
3
Weights were sampled from a normal distribution centered at 0 with standard deviation 0.1; all values more
than two standard deviations from the mean were discarded and resampled. Biases were initialized to 0. The
network was trained for 10,000 iterations.
2
4
the units (in our case, two units) on each iteration. We find iterative pruning to be more effective for
extracting smaller winning tickets; Han et al. [4] found the same for compressing large networks
while maintaining accuracy.
We consider three different heuristics for determining which hidden units should be pruned:
โข Input magnitude: remove the hidden unit with the smallest average input weight magnitudes.
โข Output magnitude: remove the hidden unit with the smallest output weight magnitude.
โข Magnitude product: remove the hidden unit with the smallest product of the magnitude of
its output weight and the sum of the magnitudes of its input weights.
The magnitude product heuristic achieved the best results, so we use it unless otherwise stated.
2.2
Results
One-shot pruning. We generated 1000 networks with ten hidden units and pruned them down to
both four and two hidden units using the magnitude product heuristic. The results of doing so appear
in the first row of Figure 2. The winning tickets with two hidden units found the correct decision
boundary 82.4% of the time (up from 49.1% for randomly-initialized networks with two hidden units)
and reached zero loss 65.3% of the time (up from 17.6% of the time for a random network).
Iterative pruning. We conducted the iterative version of the pruning experiment 1000 times, starting
with networks containing ten hidden units that were eventually pruned down (in two unit increments)
to networks containing a candidate winning ticket of just two hidden units. Of the 93.5% of ten
hidden unit networks that reached zero loss, 84.9% 4 had a two hidden unit winning ticket that also
reached zero loss (as compared to 17.6% of randomly-intialized two hidden unit networks). Likewise,
of the 98.9% of ten hidden unit networks that found the correct decision boundary, 92.8% had a
two-unit winning ticket that did the same (as compared to 49.1% of randomly-initialized two hidden
unit networks). The four hidden unit winning tickets almost identically mirror the performance of the
original ten hidden unit network. They found the correct decision boundary and reached zero loss
respectively in 99% and 97% of cases where the ten hidden unit network did so. Both of these pruned
trials appear in Figure 2 (under the Magnitude Product row).
These experiments indicate that, although iterative pruning is more computationally demanding than
one-shot pruning, it finds winning tickets at a higher rate than one-shot pruning. More importantly,
they also confirm that networks with ten hidden units can be pruned down to winning tickets of two
hidden units that, when initialized to the same values as they were in the original network, succeed in
training far more frequently than a randomly initialized network with two hidden units. The winning
tickets with four hidden units succeed nearly as frequently as the ten unit networks from which
they derive. Both of these results support the lottery ticket hypothesisโthat large networks contain
smaller, fortuitously-initialized winning tickets amenable to successful optimization.
In addition to the magnitude-product pruning heuristic, we also tested the input magnitude and output
magnitude heuristics. The results of doing so appear in Figure 2. The magnitude product heuristic
outperformed both. We posit that this success is due to the fact that, in the XOR case when all
input values are either 0 or 1, the product of input and output weight magnitudes should mimic the
activation of the unit (and therefore with its influence on the output).
3
MNIST (One-shot Pruning)
In this section and those that follow, we explore the lottery ticket hypothesis as applied to the MNIST
dataset. Here, we analyze the behavior of one-shot pruning; in the following section, we show the
additional power that iterative pruning offers.
4
These numbers are derived from the last row of Figure 2. 93.5% of networks with ten hidden units reached
zero loss. 79.4% of networks started with ten units, reached zero loss, and were pruned to into two-unit networks
that also reached zero loss. 79.4% of 93.5% is 84.9%.
5
3.1
Methodology
We trained and pruned a network with two fully-connected layers. We used the LeNet-300-100
architecture [6], which has 784 input units (corresponding to the pixels of the 28x28 images in
MNIST), a fully-connected hidden layer with 300 units, a fully-connected hidden layer with 100
units, and ten fully-connected output units (one for each class). The hidden units have ReLU
activation functions, and the output units have softmax activation functions. By default, biases were
initialized to 0 and weights were randomly sampled from a normal distribution with mean 0 and
standard deviation 0.1 (values more than two standard deviations from the mean were discarded and
resampled). Networks were optimized using stochastic gradient descent with a learning rate of 0.05.
This section follows the experimental template from Section 1:
1. Randomly initialize the network.
2. Train for 50,000 iterations on 100-example mini-batches from the training data
3. Prune a certain percentage of the weights from within each hidden layer, removing those
with the lowest magnitudes.
4. To extract the winning ticket, reset the values of the weights of the pruned network to their
original initializations from before training.
The pruning strategy we follow for MNIST removes individual weights rather than entire units. In
preliminary experiments, we found this strategy to be more effective (Srinivas and Babu explore
pruning by unit in [12]). We use the simplest weight-by-weight pruning heuristic possible: remove
those weights with the lowest magnitudes within each hidden layer (just as in [4]). Weights connecting
to the output layer are pruned by half of the percentage at which the rest of the network is pruned to
avoid severing connectivity to the output units.
3.2
Results
Figure 3: The test set accuracy on MNIST as training proceeds. These charts are zoomed into the
very highest levels of accuracy. Each curve shows the average progression of five trials of training at
the specified pruning level. Percents are the percent of the weights in each layer that remain after
pruning. The error bars show the minimum and maximum values of any one of those five trials. Dots
signify the moment when the corresponding colored line has converged, with error bars showing the
earliest and latest convergence times amongst the five trials.
Pruningโs most substantial impact was on convergence times. When pruned to between 75% and
25% of the size of the original network, the winning tickets converged on average at least 25% faster
while accuracy remained on average within 0.15% of the original networkโs accuracy. The winning
ticket that was pruned to 25% of the original size converged on average 38% faster than the original
network. Further pruning caused convergence times to slowly rise and accuracy to drop.
Figure 3 shows the test set accuracy and convergence behavior of winning tickets pruned to different
levels as they were trained.5 Each curve is the average of five different runs starting from distinct,
5
We define convergence as the moment at which the 1000-iteration moving average of test accuracy changed
by less than 0.002 for 1000 consecutive iterations. We measured test accuracy every 100 iterations. According to
this definition of convergence, the one-shot-pruned winning tickets improved their test accuracy by an average of
0.0019 (standard deviation 0.00085) after convergence. We acknowledge that determining convergence times is
an imprecise art, but this metric seems to adequately characterize the behavior of convergence for our purposes.
6
Figure 4: The test set accuracy on MNIST as training proceeds for winning tickets of various sizes
and for winning tickets whose weights have been randomly reinitialized (control experiment 1).
randomly initialized networks; error bars indicate the minimum and maximum value that any run
took on at each point in the training process. The dots indicate the average convergence times for the
curve in the corresponding color; error bars indicate the minimum and maximum convergence times.
The left graph in Figure 3 shows that, for the first few pruning levels, convergence times decrease
and accuracy increases. A winning ticket comprising 90% of the weights from the original network
converges slightly faster than the original network but slower than a winning ticket with 75% of the
original weights. This pattern continues until the network is pruned to about 55% of the original size,
after which (as the right graph in Figure 3 shows) convergence times flatten and then, after about
35%, increase. When the winning ticket is between 10% and 15% of the original size of the network,
it returns to the performance of the unpruned network.
In the terms of the lottery ticket hypothesis, we attribute improving convergence times to the removal
of unnecessary, noisy parts of the network as pruning hones in on the winning ticket. Convergence
times reach a tipping point as pruning begins to remove weights that are essential to the winning
ticket, after which convergence times increase and accuracy decreases.
The lottery ticket hypothesis also predicts that this behavior is largely attributable to a confluence of
initialization and architecture. To test this conjecture, we ran two control experiments: (1) retain the
winning ticketโs architecture but randomize its weights and (2) retain the winning ticketโs weights but
randomize its architecture.
Control experiment 1. This experiment evaluates the extent to which initialization is a necessary
component of a winning ticket. Figure 4 shows this experiment. The curves for the original network
and winning tickets that are 75% and 35% of the original networkโs size are the same as in Figure 3.
Two curves have been added for the control experiments. Each control experiment entailed training
a network that used a winning ticketโs architecture but randomly reinitialized its weights from the
original initialization distribution (N (0, 0.1)). We trained three control experiments for each winning
ticket, so the control curves are the average of 15 experiments. Unlike the winning tickets, the control
experiments converged on average more slowly than the original network, simultaneously achieving
lower levels of accuracy. These differences were substantial: the average 35% and 25% winning
tickets converged 1.91 and 2.28 times as fast as the corresponding average controls.
The error bars on convergence times reflect that the control trials exhibited a much wider variance in
behavior. For example, the earliest-converging of the 35% control trials converged faster than the
average unpruned network; however, the average 35% control trial convergence time converged 27%
slower than the average original network.
This experiment further supports the lottery ticket hypothesisโ emphasis on fortuitous initialization.
Using the same pruned architecture, the original initialization not only withstood but benefited from
pruning, while performance of the reinitialized network immediately suffered and steadily diminished
as the network was further pruned. This outcome mirrors, on a larger scale, the result of the XOR
experiment, in which networks with many hidden units could be pruned to smaller winning tickets
that found the right decision boundary at a much higher rate than randomly-initialized small networks.
Figure 5 provides a broader perspective on these patterns across all of the levels to which we pruned.
The left graph shows the convergence time in relation to the percentage of the network remaining after
pruning. The blue line is the average of the five winning ticket trials at each level. The convergence
7
Figure 5: The convergence times (left) and accuracies (right) when running the MNIST pruning
experiment to various degrees of pruning. The blue line is the average of five trials with different
starting initializations that prune and reuse the original initialization. Each of the multicolored lines
represents three randomly reinitialized control trials (one for each trial with the original initialization).
The error bars are the minimum and maximum value any trial takes on at each interval.
Figure 6: The convergence times and accuracy for the five winning tickets at each level of pruning
(blue line), the 15 trials where the winning ticket weights were reinitialized (orange line), and the 15
trials where the winning ticket weights were maintained but shuffled within each layer (green line).
time initially decreases before leveling off between 55% and 35% and then slowly climbing again.
In contrast, the multicolored lines, which represent the groups of control trials for each winning
ticket, steadly require longer to converge as more of the network is pruned. In the control experiment,
the error bars are much larger, suggesting wider variation in convergence times compared to the
consistent convergence times of the winning tickets.
The right graph in Figure 5 provides important context: how accurate are the networks at the moment
they converge? The average trial that used the original initialization (the blue line) maintans accuracy
within 0.15% of the original network when pruned down to 15%, after which accuracy drops off. In
contrast, the accuracy of the average control trial drops below this level when the network has been
pruned by about 30%, falling precipitously when pruned by 15% (0.6% below the original networkโs
accuracy).
This experiment supports the lottery ticket hypothesisโ prediction that fortuitous initialization is a
necessary ingredient to make a winning ticket. The winning ticketโs structure alone is insufficient to
explain its success.
Control experiment 2. This experiment evaluates the extent to which architecture is a necessary
component of a winning ticket. For each winning ticket at each level of pruning, we randomly shuffled
the locations of the weights in each hidden layer while maintaining their original initializations. The
results of doing so appear in Figure 6. Just as in Figure 5, the blue line traces winning tickets pruned
to various sizes. The orange line is the average of all 15 of the trials from control experiment 1
(reinitializing the winning tickets). The green line is the average of all 15 of the trials from control
experiment 2 (shuffling the winning tickets without reinitializing). The convergence times for the two
control experiments are similar: they start increasing immediately and increase more rapidly as the
network gets smaller. The accuracy of control experiment 2 drops off slightly earlier than control
experiment 1, which itself dropped off before the winning ticket did.
This experiment supports the lottery ticket hypothesisโ prediction that winning tickets emerge from a
combination of initialization and structure. Neither initialization (control experiment 1) nor structure
(control experiment 2) alone is sufficient to explain the better performance of the winning tickets.
8
Figure 7: The convergence times and accuracy of winning tickets extracted from fully-connected
networks for MNIST using one-shot pruning (orange) and iterative pruning (blue). Note that the
x-axis is logarithmic.
Summary. The first notable result from this set of experiments is that, even when pruned to sizes
much smaller than the original network, winning tickets are still able to converge at all. This supports
the core prediction of the lottery ticket hypothesis: pruning reveals smaller subcomponents that were
originally initialized such that they can train successfully in isolation. Not only do these networks
train successfully, but they converge faster than and maintain the accuracy of the networks from which
they derive. Furthermore, winning tickets emerge from a confluence of both fortuitous initalization
and structure.
4
MNIST (Iterative Pruning)
In the XOR experiment in Section 2, iterative pruning [4]โrepeatedly training, pruning, reinitializing,
and pruning againโarrived at winning tickets that were more likely to train successfully In this
section, we find that iterative pruning makes it possible to extract winning tickets from our MNIST
network that are far smaller than those generated by one-shot pruning.
4.1
Methodology
We use the same experimental setup (network architecture, initialization strategy, and optimization
strategy) as in Section 3. We follow a similar procedure repetitively in order to iteratively prune.
1. Randomly initialize the network.
2. Train for 50,000 iterations on 100-example mini-batches from the training data
3. Prune 20% of the weights from within each hidden layer and 10% of the weights in the
output layer, removing those with the lowest magnitudes.
4. Reset the weight values of the pruned network to their initializations from before training.
5. Repeat steps (2) through (4) until the network has been pruned to the desired size. The result
of the last iteration of (4) is the winning ticket.
We iteratively prune the incoming weights of the first and second layers of the network by 20% and
the weights of the output layer by 10%.6 We start with a network with two fully-connected hidden
layers with 300 and 100 hidden units and prune the network until just under 1% of the original
weights remained.
Comparison to one-shot pruning. Figure 7 shows the difference in convergence times and accuracy
between one-shot pruning (orange) and iterative pruning (blue). (Note that the x-axis is logarithmic
in Figure 7 and in most figures in this section.)
The average iteratively pruned winning tickets reach initially reach lower convergence times. These
convergence times flatten when the original network is pruned to between 41% (36% faster than
the original network) and 8.5% (38% faster than the original network) of the original network size,
as compared to between 55% (44% faster than the original network) and 40% (41% faster than the
6
As mentioned in Section 3, we prune the output layer at a lower rate to reduce the chances of severing
connectivity to any of the output units.
9
Figure 8: The convergence times and accuracy of winning tickets extracted by iteratively pruning and
control experiments. The blue line is the average of five winning tickets. The orange line is control
experiment 1: winning tickets that have been reinitialized. The green line is control experiment 2:
winning tickets whose weights were randomly shuffled. The red line is the performance of one-shot
pruning. The locations where the control trials cut off are those at which, according to our metric,
they no longer converged.
original network) for one-shot pruning. The average iteratively pruned network returns to the original
convergence time when pruned to 1.8% (as compared to between 5% and 10% for one-shot pruning).
Likewise, accuracy actually increases slightly for many winning tickets, returning to the original
networkโs accuracy at a winning ticket size of 2.8% on average. In contrast, one-shot pruning begins
to drop off when the winning ticket is 15% of the size of the original network.
Although iterative pruning can extract much smaller winning tickets than one-shot pruning, it is far
more costly to find those winning tickets. Extracting a winning ticket with one-shot pruning requires
training the original network a single time, regardless of how much the network is pruned. In contrast,
iteratively pruning a network by 20% at each iteration until it is about 5% of the original networkโs
size requires training the network 14 times. However, since our goal is to understand the behavior
of winning tickets rather than to find them efficiently, iterative pruningโs compelling advantage is
that it is able to extract smaller winning tickets that maintain convergence and accuracy performance,
placing a tighter upper-bound on the size of a networkโs winning ticket.
4.2
Results
In this section, we re-run the control experiments from Section 3.1. Just as before, we aim to explore
the extent to which architecture and initialization are responsible for a winning ticketโs ability to
continue to converge at such small sizes. Figure 8 contains the average results of performing control
experiment 1 (randomly reinitializing the winning ticketโs weights) in orange and control experiment
2 (randomly shuffling the winning ticketโs weights) in green. For comparison, the curve in red is the
performance of one-shot pruning.
Control experiment 1. Just as with one-shot pruning, average convergence times for control
experiment 1 begin increasing as soon as the network is pruned and continue to grow at a steady
rate. The error bars in Figure 8 reflect that convergence times vary widely for pruned networks that
are reinitialized. The average control trialโs accuracy begins dropping off (more than 0.15% lower
than the original networks accuracy) when the network is pruned to about 31%, whereas the average
iteratively pruned network drops below this level when pruned to 1.5%. Just as with the one-shot
experiment, this control trial indicates that initialization plays a critical role in making a winning
ticket.
Control experiment 2. Average convergence times for control trial 2 increase steadily in a pattern
similar to those from control trial 1. Error bars indicate that these convergence times similarly vary
widely. Accuracy begins dropping off earlier, at about 51.2% and more steeply, potentially suggesting
that architecture might be more important than initialization.
Summary. The control experiments for iterative pruning put the results from Section 3 in sharper
relief. Iterative pruning makes it possible to extract smaller winning tickets than from one-shot
pruning that reach lower convergence times than the original network while maintaining or exceeding
its level of accuracy. The control experiments show that both initialization and network architecture
10
Figure 9: The distributions of the initializations of weights that survived iterative pruning across ten
iterative pruning runs. The graphs contain the initializations of the network pruned to (left to rigth)
100%, 51.2%, 16.8%, and 5.50%. The blue, orange, and green lines are the distributions of initial
weights for the first hidden layer, second hidden layer, and output layer, respectively.
play factor into creating a winning ticket, with control trial 2 suggesting that network architecture
might be slightly more important.
The experiments on XOR and MNIST support the lottery ticket hypothesis. Embedded within larger
networks are small subcomponents that are fortuitously initialized in a manner conducive to successful
training. We extracted the winning ticket architectures by pruning and determined the corresponding
initializations by resetting the winning ticketโs connections to their original from before training.
These networks not only trained successfully but, in the case of iteratively-pruning with the MNIST
network, converged faster and more accurately. Meanwhile, neither architecture nor initialization
alone could entirely account for this result.
We next investigate the architecture and initializations of these small winning tickets (Section 5) and
the behavior of winning tickets when subjected to a wider variety of parameters (Section 6).
5
Examining Winning Tickets
In this section, we briefly explore the internal structure of winning tickets that result from iterativelypruning our MNIST network. We have already found evidence to support the claim that winning
tickets arise out of a confluence of architecture and initialization. What exactly do those architectures
and initializations look like?
Initializations. Figure 9 shows the initialization distributions for winning tickets at four different
levels of pruning. Note that these are the values of the winning ticketโs weights from before training.
The graph in the upper left contains the initial weights of the entire network (no pruning), which are
initialized according to a normal distribution with mean 0 and standard deviation 0.1. The graph
in the upper right contains the weights after iteratively pruning the network down to 51.2% of its
original size. The blue, orange, and green lines are the distriutions of initial weights for the first
hidden layer, second hidden layer, and output layer, respectively.
At 51.2%, the remaining weights already show the impact of pruning. The first and second hidden
layerโs distributions are bimodal, with two peaks mirrored opposite 0. Since these distributions plot
the original initializations of the weights that survive the pruning process (i.e., the weights before
training), these distributions were created by removing samples from a formerly normal distribution.
These peaks on the 51.2% graph appear to be the left and right tails of the original normal distribution.
The missing weights have been pruned.
Interestingly, pruning occurs after training and these are graphs of weights before training. In other
words, for these distributions to emerge, small weights from before training must have remained
small after training. The second hidden layer (orange) retains more of its center than the first hidden
layer, indicating that those weights likely moved more during training. The output distribution (green)
more closely resembles the original normal distribution, indicating that its weights probably moved
significantly during training. One other contributing factor to the output distribution is that we prune
it at a slower rate, meaning that the effects of pruning make take longer to appear.
11
Figure 10: For each unit in the current layer, how many units in the previous layer connect to it?
The left graph is for the first hidden layer. The middle graph is for the second hidden layer. The
right graph is for the output layer. The blue, orange, and green lines are for the winning tickets when
iteratively pruned to 80%, 16.8%, and 5.50%, respectively. Each point on the line represents a single
unit; the units have been sorted in descending order by the number of connections they have. These
data points were collected over ten trials.
The pattern for 51.2% pruning plays out in more extreme form at 16.8% (lower left graph) and 5.50%
(lower right graph). The middles of the first and second hidden layer distributions continue to get
hollowed out, and the same happens (albeit more slowly) to the output distribution. Even with these
extreme-looking input distributions, the corresponding networks converged faster than the original
network and retained the same accuracy.
Considering the extent to which the particular pruning strategy we pursued left its imprint on the
winning tickets, it is worth considering the impact that other pruning strategies would have and, more
broadly, whether the winning tickets we found are a product of the pruning strategy we pursued
or whether the pruning strategy we pursued happens to exploit a deeper reality of the way neural
networks behave.
Architecture. As the network is pruned, it becomes sparser. Figure 10 shows the distributions of
surviving connections aggregated across ten trials7 between a unit in layer n and units in layer n โ 1
when the network is pruned to 80% (blue), 16.8% (orange), and 5.50% (green) of its original size.
The left, middle, and right graphs show the first hidden layer, second hidden layer, and output layer.
When pruned to 80%, the network remains almost fully-connected, with only slight differences
between the units with the most and least connections. As the network is further pruned, units in
the first hidden layer continue to have a roughly equal number of connections to units in the input
layer. Even when the network is pruned to 5.50%, only a small fraction of the hidden units in the first
layer have been eliminated entirely. The second hidden layer becomes less evenly connected as more
weights are pruned. By the time the network is pruned to 5.50%, nearly a third of the units in the
second hidden layer have been fully disconnected, and there is a steep decline from the best-connected
units to the worst-connected. The output layer shows a less severe slope, likely because every output
unit serves a clear function and because we prune the output layer at a slower rate.
The winning tickets are quite sparse. Even when the network is pruned by nearly 95%, only a fraction
of the units have been eliminated entirely. No units maintain a large number of connections after
pruning; instead, nearly all units retain a proportionally small number of connections.
6
Exploring MNIST Parameters
This section explores the sensitivity of the MNIST results to the parameters of the lottery ticket
experiment. Namely, we explore the role that initialization and network size play in the properties of
the winning tickets that emerge.
6.1
Initialization
Although our default network was initialized from a normal distribution with mean 0 and standard
deviation 0.1, we experimented with several other standard deviations to explore the effect of larger
7
We also removed any edges that did not have a path to an output unit.
12
Figure 11: The convergence times and accuracy for groups of five winning tickets initialized with
various standard deviations โฅ 0.1.
Figure 12: The convergence times and accuracy for groups of five winning tickets initialized with
various standard deviations โค 0.1.
and smaller weights on the behavior of winning tickets. One might expect that our pruning strategy
would be especially vulnerable to initializing network weights too large: by selecting for the highestmagnitude weights, it might exacerbate exploding gradients. Likewise, it might be resilient to
initializing network weights too small, since it will select for the largest weights after training.
In this section, we present the results using the one-shot pruning strategy. The results for iterative
pruning were similar.
Figure 11 shows the convergence times and accuracy for winning tickets of networks initialized with
standard deviations larger than 0.1 (0.2, 0.4, and 0.8). As expected, convergence times increase and
accuracy decreases as the standard deviations increase. We did not explore whether the extent to
which this behavior resulted from exploding gradients or weaknesses in the pruning strategy.
Figure 12 contains the same information for winning tickets of networks initialized with standard
deviations smaller than 0.1. A standard deviation of 0.1 produces the fastest convergence times but
cedes a certain amount of accuracy in doing so. In contrast, a standard deviation of 0.025 causes
winning tickets to converge more slowly but to higher-accuracy optima. This behavior suggests that
there are sweet spots for both convergence times (stddev=0.1) and accuracy (stddev=0.025) and a
tradeoff-space in between.
6.2
Network Size
We experimented with increasing the size from the default network (layers of 300 and 100 hidden
units) in order to determine whether there is a fixed winning ticket size for a particular learning
problem, or whether larger networks naturally beget larger winning tickets. We consider two possible
definitions of the โsizeโ of a networkโs winning ticket:
โข A winning ticket is the minimal network that minimizes convergence time. Since convergence times initially decrease with pruning, this heuristic looks for the winning ticket with
the lowest possible convergence time.
โข A winning ticket is the minimal network that retains the accuracy of the original network.
Accuracy remains relatively flat as smaller and smaller winning tickets are created; it then
13
Figure 13: The convergence times and accuracy for groups of five winning tickets extracted from
networks of various sizes with the one-shot pruning strategy. Error bars were elided to improve
readability. The legend contains the size of the network (e.g., 300-100 means a network with hidden
layers of 300 and 100 units). All networks were initialized with a standard deviation of 0.05.
Figure 14: The convergence times and accuracy for groups of five winning tickets extracted iteratively
from networks of various sizes. Error bars were elided to improve readability. All networks were
initialized with a standard deviation of 0.05.
reaches a tipping point and drops off rapidly. This definition considers the winning ticket to
be the last moment before this accuracy drop-off takes place.
One-shot pruning. We trained networks whose sizes were multiples of the original network size.
The results of doing so and applying the one-shot pruning strategy appear in Figure 13, which plots
convergence times and accuracy according to the number of weights in the winning ticket.
According to the convergence-based definition of a winning ticket, the winning ticket sizes increase
gradually with the size of the network. The LeNet-300-100 architecture appears to reach this point at
about 140,000 weights, where the LeNet-600-300 does so at about 200,000 weights. The same pattern
holds for the larger architectures. Larger networks are capable of representing more sophisticated
functions, so pruning larger networks may produce different network architectures that exploit this
additional representation capacity to converge faster. Indeed, the larger the network, the lower the
convergence times its winning tickets were able to achieve and the larger the size at which it reached
them.
The accuracy-based definition of a winning ticket agreed. As the bottom graph of Figure 13 illustrates,
the accuracy of larger networks dropped off steeply at slightly earlier times than the accuracy of
smaller networks. However, these differences were quite smallโon the order of tens of thousands of
weights. Although winning ticket size does seem to increase with network size by this definition, the
changes were very slight and winning ticket sizes close to uniform.
Iterative pruning. As Figure 14 reflects, the convergence and accuracy trends for iteratively pruning
larger networks remains the same as in the one-shot case. Larger networks reach their minimum
convergence times at gradually larger sizes, but accuracy plummets in unison. There are two key
differences worth noting in the iterative case.
14
Figure 15: The convergence times and accuracy of winning tickets extracted by iteratively pruning by
different rates on each iteration. Error bars have been elided for readability. Note that the x-axis is
not logarithmic.
First, both minimum convergence times and accuracy dropoffs occur at much smaller network sizes
than in the one-shot experiments. This result coincides with the other iterative experiments, which
demonstrate that iterative pruning creates winning tickets that can be pruned to much smaller sizes
before convergence times increase and accuracy diminishes. Whereas the accuracy dropoff took
place when the networks had about 150,000 weights in the one-shot experiments, it occurs when the
iteratively-derived winning tickets have just tens of thousands of weights.
Second, each of the accuracy graphs has a small bulge upwards just before dropping off, indicating
that accuracy actually increases slightly when the winning tickets are smallest. These bulges occur at
the same winning ticket size in all cases, regardless of the initial size of the network.
Summary. The analysis in this subsection leaves many open questions for future research. Although
we do not undertake extensive analysis of the internal structure of winning tickets in this study,
comparing equally-sized winning tickets derived from networks of different sizes would shed light
on the extent to which the winning tickets themselves are similar or different between various initial
network sizes.
6.3
Exploring Iterative Pruning Rates
Choosing the exact rate at which to prune on each iteration of iterative pruning entails balancing
the performance of the resulting winning ticket with the number of iterations necessary to extract
that winning ticket. Figure 15 shows the convergence times and accuracy for the LeNet-300-100
architecture iteratively pruned at different rates on each iteration. (Note that the x-axis is not
logarithmic.) This experiment can be thought of as exploring middle grounds between one-shot
pruning and iteratively pruning at a small rate.
Although pruning by a larger percentage (e.g., 70% or 50%) on each iteration reaches smaller winning
tickets faster, those winning tickets are pruned too aggressively and fail to match the convergence
times or accuracy of winning tickets pruned more slowly. On the other end of the spectrum, iteratively
pruning by 10% appears to achieve the best convergence times and accuracy but would require
training the network 28 times to extract a winning ticket 5% of the original networkโs size. For our
experiments, we prune by 20%, which balances performance with the amount of training required.
6.4
Weight Resetting
Before each training iteration of our iterative pruning approach, we reset the weights of the unpruned
connections to their original values from before training. Doing so is part of our experiment to
evaluate the lottery ticket hypothesis: exploring how well winning tickets obtained by pruning train
in isolation. We conjecture that resetting before each training iteration makes it easier to find small
winning tickets. In effect, each iteration is a recursive pruning problem in which a subnetwork that
trains effectively when starting from the original initializations must be pruned to a slightly smaller
network that does the same.
In contrast, Han et al. [4] interleave training and pruning without ever resetting weights. After a
round of training, low-magnitude weights are pruned and then training continues based on the trained
15
Figure 16: The convergence times and accuracy of winning tickets extracted by iteratively pruning
using weight resetting between iterations (our strategy, in blue) and by continuing to use the trained
weights after pruning (Han et al [4]โs strategy, in orange).
weights. These differences in approaches reflect two different goals: Han et al. want to produce the
smallest possible trained network, while we wish to find a pruned network that trains successfully
from the start.
Figure 16 shows the convergence times and accuracy achieved by the winning tickets extracted using
these two pruning strategies. To simulate Han et al.โs strategy, we iteratively trained a network, pruned
low-magnitude weights, and continued training using the trained weights. At each iteration, we
copied the resulting network, reset its weights to the original initializations, and trained the network
to obtain the results in Figure 16.
As Figure 16 shows, Han et al.โs pruning strategy is quite effective at finding small networks that rain
successfully, although our strategy of resetting weights at each iteration maintains lower convergence
times and higher accuracy for slightly longer. However, since Figure 16 is on a logarithmic scale,
these differences appear only at very small network sizes.
7
Related Work
Pruning. LeCun et al. first explored pruning as a way to reduce the size of neural networks [7]; they
pruned based on the second derivative of the loss function with respect to each weight. Hassibi et
al. [5] build on this approach.
More recently, Han et al. [4, 3, 2] showed that these techniques could be used to substantially reduce
the size of modern image-recognition networks. Since then, a rich variety of neural network pruning
approaches have emerged (e.g., pruning smallest weights [4], pruning units in a Bayesian fashion [9],
pruning entire convolutional filters [8, 10], fusing redundant units to increase network diversity [11]).
The goal of this literature on pruning is to compress trained neural networks, reducing the size of
a large model such that it can run efficiently on restricted computational platform (e.g., a mobile
device) without sacrificing accuracy. In contrast, we aim to make it possible to train small neural
networks from the start.
In [4] and follow-up work, network compression takes place in three iterative steps. First, a large
network is trained. Second, weights or units are pruned according to a heuristic. Third, the network
is further trained using the already-trained weights. Han et al. find that, without this third retraining
step, network performance drops off much earlier in the pruning process. Han et al. also caution that
the pruned network should not be re-initialized after training, but do not consider reusing the values
to which the surviving weights were initialized in the original network as we do.
Our work builds off of the literature on pruning by shedding light on the mechanisms that make
pruning possible. The fact that networks can be pruned while maintaining accuracy indicates that the
function to be learned can be represented with a much smaller network than the one used for training.
We aim to understand why pruning is possible and investigate whether small networks can be trained
directly (rather than pruning large networks to smaller sizes after training).
The lottery ticket hypothesis posits that large networks have small, fortuitously-initialized subnetworks
that facilitate successful training. From this point of view, neural network pruning finds these winning
tickets. To evaluate the lottery ticket hypothesis on small, fully-connected networks, we leverage Han
16
et al.โs experimental approach, except that we make a crucial modification: after pruning we reset
each weight to its original value.
Our results explain or complement those of Han et al. The lottery ticket hypothesis offers insight
into why Han et al. are able to prune networks. Many of the trends we see (e.g., that the accuracy
of iteratively-pruned winning tickets drops off at very small winning ticket sizes or that the original
initializations of pruned networks take on a bimodal distribution) parallel those that Han et al. find
when continuing to train pruned networks based on their trained weights.
Dropout. Dropout [13] creates a smaller subnetwork for each training iteration by randomly removing a subset of the units (or weights). At inference-time, a unitโs activation is reduced by the
probability that it was dropped out. Intuitively, dropout is intended to reduce overfitting and improve
generalization by forcing units to remain robust to changes in the network. Follow-up work on
dropout [1] has characterized training with dropout as โperform[ing] gradient descent...with respect
to...the ensemble of all possible subnetworksโ and inference with dropout as approximately computing
the average over this ensemble.
In the terminology of dropout, our experiment aims to discover a single, particularly successful
member of this ensemble of subnetworks. Our dropout heuristic is that, after training the network
once without dropout, we drop out the lowest k% of weights (by magnitude after training) with
probability 1 and all other weights with probability 0. In other words, we perform an extremely
aggressive, coarse-grained form of dropout based on examining the results of training the network
once without dropout.
However, our goal is different. Dropout is designed to regularize a network during training, a process
that can be used to produce sparse networks. We aim to directly find small (and, in the case of the
networks we found, sparse) networks that can be trained from start to finish without removing further
weights.
Our broader formulation of the lottery ticket hypothesis does closely relate to dropoutโs notion of
ensemble learning. The lottery ticket hypothesis views a randomly-initialized large network as a
collection of a combinatorial number of small networks (i.e., lottery tickets) of which one (i.e., the
winning ticket) must be initialized fortuitously to enable training to succeed. From this point of view,
a large network begins with the possibility of coalescing toward one of an exponential number of
subnetworks, and gradient descent drives it toward the subnetwork comprising the winning ticket that
we find.
8
Limitations
This work is limited in several ways. We only examine fully-connected networks, and for two of the
smallest possible examples (XOR and MNIST). We do not consider convolutional networks or larger
networks that better reflect real-world examples.8 Our evidence for the lottery ticket hypothesis is
purely experimental; we do not offer any theoretical analysis to formally support this claim. Finally,
although we analyze the structure and initialization distributions of winning tickets for MNIST, we
have yet to devise a way to turn these observations into useful strategies for training smaller networks.
We anticipate exploring these avenues in future work and updating this paper as we do so.
9
Conclusions and Future Work
This paper proposes a new hypothesis to explain why large neural networks are amenable to substantial
pruning yet the pruned networks cannot be trained effectively from scratch. This conjecture, known as
the lottery ticket hypothesis, holds that training succeeds when a subcomponent of the larger network
is randomly initialized in a fashion that is suitable for optimization. Furthermore, it conjectures
that pruning uncovers these winning tickets. To empirically evaluate this hypothesis, we devised an
experiment based on the work of Han et al. [4] where, after pruning a trained network, remaining
weights are reset to their original initializations. If the lottery ticket hypothesis holds and pruning
8
However preliminary experiments with CIFAR10 on a convolutional network reflect the same behavior
described in this paper for MNIST.
17
uncovers these winning tickets, then these pruned networks should train successfully in isolation
when reset to their original initializations.
On XOR, we found that winning tickets derived from larger networks were able to learn the decision
boundary and reach zero loss far more frequently than those that were randomly initialized. On
MNIST, winning tickets converged more quickly and reached higher accuracy than the original
network. Control experiments supported the claim that winning tickets represent a confluence of
fortuitious initialization and network architecture.
This paper articulates a new perspective on neural network training and supports that view empirically.
Now that a foundation has been laid, there are numerous research directions to further evaluate the
lottery ticket hypothesis and exploit this perspective to improve network design and training.
Larger examples. The largest network that we examine is a fully-connected network for MNIST.
Repeating the experiments outlined in this paper for a convolutional network, larger networks, and
harder learning tasks would make it possible to understand whether the lottery ticket hypothesis holds
more generally and how it manifests in these settings.
Understanding winning tickets. This paper focuses mainly on the behavioral properties of the
lottery ticket hypothesis, pruning, and winning tickets. One logical next step is to systematically
analyze the architectures and initializations of lottery tickets. To what extent are winning tickets
unique artifacts created by randomly initializing large networks and getting lucky? To what extent
is there common structure between multiple winning tickets for the same task? What do winning
tickets tell us about the functions that neural networks learn for particular tasks?
Lottery ticket networks. The lottery ticket hypothesis and the existence of winning tickets demonstrate that small networks can be trained from start to finish. The most concrete follow-up to this
work would be to exploit the lessons learned by leveraging winning tickets to develop new network
architectures and initialization regimes that allow smaller networks to be trained for a wider variety
of learning tasks. Doing so could reduce the amount of computation needed to train neural networks.
References
[1] Pierre Baldi and Peter J Sadowski. 2013. Understanding dropout. In Advances in neural
information processing systems. 2814โ2822.
[2] Song Han, Huizi Mao, and William J. Dally. 2015. Deep Compression: Compressing Deep Neural Network with Pruning, Trained Quantization and Huffman Coding. CoRR abs/1510.00149
(2015). arXiv:1510.00149 http://arxiv.org/abs/1510.00149
[3] Song Han, Huizi Mao, and William J Dally. 2015. A deep neural network compression pipeline:
Pruning, quantization, huffman encoding. arXiv preprint arXiv:1510.00149 10 (2015).
[4] Song Han, Jeff Pool, John Tran, and William Dally. 2015. Learning both weights and connections for efficient neural network. In Advances in neural information processing systems.
1135โ1143.
[5] Babak Hassibi, David G Stork, and Gregory J Wolff. 1993. Optimal brain surgeon and general
network pruning. In Neural Networks, 1993., IEEE International Conference on. IEEE, 293โ
299.
[6] Yann LeCun, Lรฉon Bottou, Yoshua Bengio, and Patrick Haffner. 1998. Gradient-based learning
applied to document recognition. Proc. IEEE 86, 11 (1998), 2278โ2324.
[7] Yann LeCun, John S Denker, and Sara A Solla. 1990. Optimal brain damage. In Advances in
neural information processing systems. 598โ605.
[8] Hao Li, Asim Kadav, Igor Durdanovic, Hanan Samet, and Hans Peter Graf. 2016. Pruning
filters for efficient convnets. arXiv preprint arXiv:1608.08710 (2016).
[9] Christos Louizos, Karen Ullrich, and Max Welling. 2017. Bayesian compression for deep
learning. In Advances in Neural Information Processing Systems. 3290โ3300.
18
[10] Jian-Hao Luo, Jianxin Wu, and Weiyao Lin. 2017. Thinet: A filter level pruning method for
deep neural network compression. arXiv preprint arXiv:1707.06342 (2017).
[11] Zelda Mariet and Suvrit Sra. 2015. Diversity Networks: Neural Network Compression Using
Determinantal Point Processes. arXiv preprint arXiv:1511.05077 (2015).
[12] Suraj Srinivas and R Venkatesh Babu. 2015. Data-free parameter pruning for deep neural
networks. arXiv preprint arXiv:1507.06149 (2015).
[13] Nitish Srivastava, Geoffrey Hinton, Alex Krizhevsky, Ilya Sutskever, and Ruslan Salakhutdinov.
2014. Dropout: A simple way to prevent neural networks from overfitting. The Journal of
Machine Learning Research 15, 1 (2014), 1929โ1958.
19
| 2cs.AI
|
Infinitely generated semigroups and polynomial complexity
arXiv:1503.04610v2 [math.GR] 11 May 2016
J.C. Birget
Abstract
This paper continues the functional approach to the P-versus-NP problem, begun in [2]. Here
we focus on the monoid RMP2 of right-ideal morphisms of the free monoid, that have polynomial
input balance and polynomial time-complexity. We construct a machine model for the functions
in RMP2 , and evaluation functions. We prove that RMP2 is not finitely generated, and use this to
show separation results for time-complexity.
1
Introduction
In [2] we defined the monoids of partial functions fP and RMP2 . The question whether P = NP is
equivalent to the question whether these monoids are regular. The monoid fP consists of all partial
functions Aโ โ Aโ that are computable by deterministic Turing machines in polynomial time, and that
have polynomial I/O-balance. The submonoid RMP2 consists of the elements of fP that are right-ideal
morphisms of Aโ . One-way functions (according to worst-case time-complexity) are exactly the nonregular elements of fP. It is known that one-way functions (according to worst-case time-complexity)
exist iff P 6= NP. Also, f โ RMP2 is regular in fP iff f is regular in RMP2 . Hence, P = NP iff fP is
regular, iff RMP2 is regular. We refer to [9, 15] for background on P and NP.
The original motivation for studying RMP2 in addition to fP was that RMP2 is reminiscent of the
Thompson-Higman groups [14, 16, 12, 7, 6, 5] and the Thompson-Higman monoids [4]. It also quickly
turned out that RMP2 , while having the same connection to P-vs.-NP as fP, has different properties
than fP (e.g., regarding the Green relations, and actions on {0, 1}ฯ ; see [2, 3]). It is hard to know
whether this approach will contribute to a solution of the P-vs.-NP problem, but the monoids fP and
RMP2 are interesting by themselves.
Above and in the rest of the paper we use the following notation and terminology. We have an
alphabet A, which will be {0, 1} unless the contrary is explicitly stated, and Aโ denotes the set of all
strings over A, including the empty string ฮต. For x โ Aโ , |x| denotes the length of the string x. For
a partial function f : Aโ โ Aโ , the domain is Dom(f ) = {x โ Aโ : f (x) is defined}, and the image
is Im(f ) = f (Aโ ) = f (Dom(f )). When we say โfunctionโ, we mean partial function (except when
we explicitly say โtotal functionโ). Similarly, for a deterministic input-output Turing machine with
input-output alphabet A, the domain of the machine is the set of input words for which the machine
produces an output; and the set of output words is the image of the machine.
A function f : Aโ โ Aโ is called polynomially balanced iff there exists polynomials p, q such that
for all x โ Dom(f ): |f (x)| โค p(|x|) and |x| โค q(|f (x)|). The polynomial q is called an input balance
function for f .
As we said already, fP is the set of partial functions f : Aโ โ Aโ that are polynomially balanced,
and such that x โ Dom(f ) 7โโ f (x) is computable by a deterministic polynomial-time Turing machine.
Hence, Dom(f ) is in P when f โ fP, and it is not hard to show that Im(f ) is in NP. Clearly, fP is a
monoid under function composition.
A function f : Aโ โ Aโ is said to be one-way (with respect to worst-case complexity) iff f โ fP, but
there exists no deterministic polynomial-time algorithm which, on every input y โ Im(f ), outputs some
x โ Aโ such that f (x) = y. By โone-wayโ we will always mean one-way with respect to worst-case
complexity; hence, these functions are not โcryptographic one-way functionsโ (in the sense of, e.g.,
1
[8, 13, 10]). However, they are important for the P-vs.-NP problem because of the following folklore
fact (see e.g., [11] p. 33): One-way functions exist iff P 6= NP.
As is easy to prove (see the Introduction of [2]), f โ fP is not one-way iff f is regular in fP. By
definition, an element f in a monoid M is regular iff there exists f โฒ โ M such that f f โฒ f = f ; in this
case, f โฒ is called an inverse of f .1 A monoid M is called regular iff all the elements of M are regular.
In summary we have: The monoid fP is regular iff P = NP.
Let us look in more detail at the monoid RMP2 . A right ideal of Aโ is a subset R โ Aโ such that
R Aโ = R (i.e., R is closed under right-concatenation by any string). For two strings v, w โ Aโ , we
say that v is a prefix of w iff (โx โ Aโ )[ vx = w ]. A prefix code in Aโ is a set P โ Aโ such that no
word in P is a prefix of another word in P . For any right ideal R there exists a unique prefix code PR
such that R = PR Aโ ; we say that PR generates R as a right ideal. For details, see e.g. [6, 4]; a good
reference on prefix codes, and variable-length codes in general is [1].
A right-ideal morphism is a partial function h : Aโ โ Aโ such that for all x โ Dom(h) and
all w โ Aโ : h(xw) = h(x) w. In that case, Dom(h) and Im(h) are right ideals. For a right-ideal
morphism h, let domC(h) (called the domain code) be the prefix code that generates Dom(h) as a
right ideal. Similarly, let imC(h), called the image code, be the prefix code that generates Im(h). So a
right-ideal morphism h is determined by h|domC(h) (the restriction of h to its domain code). In general,
imC(h) โ h(domC(h)), and it can happen that imC(h) 6= h(domC(h)). We define
RMP2 = {f โ fP : f is a right-ideal morphism of Aโ }.
By Prop. 2.6 in [2], f โ RMP2 is regular in RMP2 iff f is regular in fP. The monoid RMP2 is regular
iff P = NP.
We saw (Cor. 2.9 in [2]) that fP and RMP2 are not isomorphic, that the group of units of RMP2 is
trivial (Prop. 2.12 in [2]), and that RMP2 has only one non-0 J -class (Prop. 2.7 in [2]). In [3] we will
see that RMP2 has interesting actions on {0, 1}ฯ , and has interesting homomorphic images (some of
which are regular monoids, and some of which are regular iff P = NP). Overall, RMP2 seems to have
โmore structureโ than fP.
It is proved in [2] (Section 3) that fP is isomorphic to a submonoid of RMP2 . To prove this, we use
an encoding of the three-letter alphabet {0, 1, #} into words over the two-letter alphabet {0, 1}; this
encoding will also be used here. First, we encode the alphabet {0, 1, #} by code(0) = 00, code(1) = 01,
code(#) = 11. A word x1 . . . xn โ {0, 1, #}โ is encoded to code(x1 ) . . . code(xn ). For a fixed k > 0,
a k-tuple of words (u1 , . . . , ukโ1 , uk ) โ {0, 1}โ ร . . . ร {0, 1}โ is encoded to code(u1 # . . . ukโ1 #) uk
= code(u1 ) 11 . . . code(ukโ1 ) 11 uk โ {0, 1}โ . A function f โ fP is encoded to f C โ RMP2 , defined
by domC(f C ) = code(Dom(f ) #), so Dom(f C ) = code(Dom(f )) 11 {0, 1}โ ; and
f C (code(x #) v) = code(f (x) #) v,
for all x โ Dom(f ) and v โ {0, 1}โ ; equivalently, f C (code(x) 11 v) = code(f (x)) 11 v. Then for every
L โ {0, 1}โ , code(L#) is a prefix code, which belongs to P iff L is in P. And f โ fP iff f C โ RMP2 .
The transformation f 7โ f C is a isomorphic embedding of fP into RMP2 ; moreover, f C is regular in
RMP2 iff f is regular in fP. From here on, the alphabet denoted by A will always be {0, 1}.
In [2] (Section 4) we introduced a notion of polynomial program for Turing machines with built-in
polynomial counter (for input balance and time-complexity). These programs form a machine model
that characterizes the functions in fP. For a polynomial program w, we let ฯw โ fP denote the function
computed by this program. For every polynomial q of the form q(n) = a nk + a (where a, k are positive
integers), we constructed an evaluation map evC
q โ fP such that for every polynomial program w with
built-in polynomial pw (n) โค q(n) (for all n โฅ 0), and all x โ Aโ ,
evC
= code(w) 11 ฯw (x)
q code(w) 11 x
1
The terminology varies, depending on the field. In semigroup theory f โฒ such that f f โฒ f = f is called a semi-inverse
or a pseudo-inverse of f , in numerical mathematics f โฒ is called a generalized inverse, in ring theory and in category
theory itโs called a weak inverse. In semigroup theory the term โinverseโ of f is only applied to f โฒ if f โฒ f f โฒ = f โฒ holds
in addition to f f โฒ f = f . It is easy to see that if f f โฒ f = f then f โฒ f f โฒ (= v) satisfies f vf = f and vf v = v.
2
C
if x โ Dom(ฯw ); if x 6โ Dom(ฯw ) then evC
q code(w) 11 x is undefined. We used evq , with any
polynomial q of degree โฅ 2 with large enough coefficient, to prove the following: First, fP is finitely
generated (Theorem 4.5 in [2]). Second, evC
q is complete in fP with respect to inversive polynomial
reduction (Section 5 of [2]). Later in this paper (Def. 2.4 and following) we define completeness and
various reductions for RMP2 , along the same lines as for fP.
Note that fP and RMP2 , in their entirety, do not have evaluation maps that belong to fP, respectively RMP2 (since such maps would not have polynomially bounded complexity). That is the reason
why we restrict ev and evR to complexity โค q(.), and why we need precise machine models for fP and
RMP2 (as opposed to more intuitive โhigher-levelโ models).
In Section 2 we define a machine model that characterizes the functions in RMP2 ; and for any large
CC
enough polynomial q we construct evaluation maps evRC
for the functions in RMP2 that
q and evRq
have balance and time-complexity โค q. We prove that evRCC
is complete in RMP2 (and in fP) with
q
respect to inversive Turing reduction. In Section 3 we prove that RMP2 is not finitely generated, and in
Section 4 we show that infinite generation has some complexity consequences, i.e., infinite generation
can be used for a time-complexity lower-bound argument.
2
Machine model and evaluation maps for RMP2
The evaluation map evC
q : code(w) 11 x 7โโ code(w) 11 ฯw (x), that we constructed for fP in [2], works
in particular when ฯw โ RMP2 (provided that ฯw has time-complexity and input-balance โค q). But
P
C
evC
q is not a right-ideal morphism and, moreover, ev q can evaluate functions that are not in RM2 . We
want to construct an evaluation map that belongs to RMP2 , and that evaluates exactly the elements of
RMP2 that have balance and complexity โค q. In [2] we constructed a machine model for fP, namely a
class of Turing machines with built-in polynomial counter (for controlling the time-complexity and the
input-balance). We will refine these Turing machines in order to obtain a machine model for accepting
the right ideals in P, and for computing the functions in RMP2 .
We will consider deterministic multi-tape Turing machines with input-output alphabet A, with
a read-only input tape, and a write-only output tape. Moreover we assume that on the input tape
and on the output tape, the head can only move to the right, or stay in place (but cannot move
left). We assume that the input tape has a left endmarker #, and a right endmarker B (the blank
symbol). At the beginning of a computation of such a machine M on input z โ Aโ , the input tape
has content # z B, with the input tape head on # ; initially, all other tapes are blank (i.e., they are
filled with infinitely many copies of the letter B). The output tape does not need endmarkers (since
it is write-only). We assume that M has a special output state qout , and that M only goes to state
qout when the output is complete; the output state is a halting state (i.e., M has no transition from
state qout ). An important convention for a Turing machine M with non-total input-output function
fM is the following: If M on input x halts in a state that is not qout , then there is no output (even if
the output tape contains a non-blank word). So, in that case, fM (x) is undefined. The content of the
output tape is considered unreadable, or hidden, until the output state qout is reached.
This kind of Turing machine can compute any partial recursive function (the restrictions on the
input and output tapes do not limit the machine, because of the work-tapes). To compute a function
in fP, we add a built-in polynomial (used as a bound on input balance and time-complexity); see
Section 4 in [2].
In order to obtain a machine model for the functions in RMP2 the above Turing machines (with
built-in polynomial) will be restricted so that they compute right-ideal morphisms of Aโ . This is done
in two steps: First, sequential functions and sequential Turing machines are introduced. From this it
is easy to obtain a class of Turing machines that compute right-ideal morphisms (which are a special
kind of sequential functions). Recall that by โfunctionโ we mean partial function. By definition, a
function f : Aโ โ Aโ is sequential iff
3
for all x1 , x2 โ Dom(f ): if x1 is a prefix of x2 then f (x1 ) is a prefix of f (x2 ).
Obviously, every right-ideal morphism is a sequential function.
A sequential Turing machine is a deterministic multi-tape Turing machine M (with special input
tape and special output tape and output state, according to the conventions above), with input-output
function fM , such that the following holds.
For every x โ Dom(fM ) and every word z โ Aโ : in the computation of M on input xz,
the input-tape head does not start reading z B until fM (x) has been written on the output tape.
To โread a letter โโ (in zB) means to make a transition whose input letter is โ. So, the input tape
has content # xz B, with the input-tape head on the left-most letter of zB (but no transition has been
made on that letter yet), and the output tape now has content fM (x). Of course, at this moment the
computation of M on input xz is not necessarily finished; the state is not necessarily qout , the output
might still grow, and qout might be reached eventually, or not; if qout is never reached, there is no final
output.
The sequential Turing machines form a machine model for the partial recursive sequential functions.
If we let the machines have a built-in polynomial we obtain a machine model for the sequential functions
in fP.
Finally, to obtain a machine model for the functions in RMP2 we take the sequential Turing
machines with built-in polynomial, with the following additional condition.
For every x โ Dom(fM ) and every word z โ Aโ : in the computation of M on input xz,
once fM (x) has been written on the output tape (after x was read on the input tape),
the remaining input z is copied to the output tape; at this point the state qout is reached.
We call such a machine an RMP2 -machine.
The following shows how, from an fP-machine for a function f , an RMP2 -machine for f can be
constructed, provided that f โ RMP2 .
Let us first consider right ideals in P, rather than functions. For any polynomial program w for
a Turing machine Mw that accepts a language L โ P, we construct a new polynomial program v
describing a Turing machine Mv that behaves as follows: On any input x โ {0, 1}โ , Mv successively
examines prefixes of x until it finds a prefix, say p, that is accepted by Mw ; Mv does not read the letter
of x that comes after p until it has decided that p 6โ L. As soon as Mv finds a prefix p of x such that
p โ L, Mv accepts the whole input x. If Mw accepts no prefix of x, Mv rejects x. Thus, Mv accepts
LAโ (the right ideal generated by L); if L is a right ideal then LAโ = L. If Mw has time-complexity
โค T (.) (a polynomial) then Mv has time-complexity โค T (.)2 .
Let us now consider functions in RMP2 . Given any polynomial program w for a function ฯw โ fP,
we construct a new polynomial program v such that Mv , on input x, successively examines all prefixes
of x until it finds a prefix p in Dom(ฯw ); let ฯw (p) = y. Then, on input x, the machine Mv outputs y z,
where z is such that x = p z. Note that since p is the shortest prefix of x such that p โ Dom(ฯw ), we
actually have p โ domC(ฯw ) (if Dom(ฯw ) is a right ideal). The machine Mv does not read the letter of x
that comes after a prefix p until it has decided that p 6โ Dom(ฯw ) or p โ domC(ฯw ). Hence, the function
computed by Mv is in RMP2 . This construction describes a transformation f โ fP 7โโ fpref โ RMP2 ,
where fpref is defined as follows:
fpref (x) = f (p) z,
where x = p z, and p is the shortest prefix of x that belongs to Dom(f ); so, p โ domC(fpref ). Thus for
every f โ fP we have: f โ RMP2 iff fpref = f .
Based on RMP2 -machines we can construct evaluation maps for RMP2 . Let q be a polynomial
where q(n) = a nk + a for some integers a, k โฅ 1. We define evRC
q , as follows:
evRC
= code(w) 11 ฯw (x),
q code(w) 11 x
for all RMP2 -programs w with built-in polynomial pw โค q, and for all x โ Dom(ฯw ). The details of
C
P
the construction are the same as for evC
q ; see Section 4 in [2]. Although evRq belongs to RM2 and
4
evaluates all RMP2 -programs w with built-in polynomial โค q, we will prove in Theorem 4.3 that the
complexity of evRC
q is higher than q.
The following doubly coded evaluation function is usually more useful for RMP2 -programs. It is
defined by
evRCC
code(w) 11 code(u) 11 v = code(w) 11 code(ฯw (u)) 11 v,
q
when u โ domC(ฯw ), v โ Aโ , and w is as before.
CC
To give a relation between evRC
we will use the following partial recursive right-ideal
q and evRq
P
morphism ฮณ, defined for very RM2 -program w โ Aโ and every x โ Dom(ฯw ) by
ฮณ code(w) 11 x = code(w) 11 code(u) 11 v,
where x = uv, and u is the shortest prefix
of x such that u โ Dom(ฯw ); equivalently, u โ domC(ฯw ).
When x 6โ Dom(ฯw ), ฮณ code(w) 11 x is undefined. Essentially, ฮณ finds the shortest prefix of x that
belongs to Dom(ฯw ) (or equivalently, to domC(ฯw )). The function ฮณ can be evaluated by examining
successively longer prefixes of x until a prefix u โ Dom(ฯw ) is fund. So ฮณ is computable with recursive
domain, when w ranges over RMP2 -programs.
For any fixed RMP2 -program w, let ฮณw be ฮณ restricted to this w, i.e., ฮณw = ฮณ|code(w) 11 Aโ . In other
words, Dom(ฮณw ) = code(w) 11 Dom(ฯw ), and
ฮณw (code(w) 11 uv) = code(w) 11 code(u) 11 v
o by Dom(ฮณ o ) = Dom(ฯ ) (as opposed to
when u โ domC(ฯw ), v โ Aโ . Similarly we define ฮณw
w
w
code(w) 11 Dom(ฯw )), and
o (uv) = code(w) 11 code(u) 11 v
ฮณw
o ) = Im(ฮณ ) = code(w) 11 domC(ฯ ) 11 Aโ .
when u โ domC(ฯw ), v โ Aโ . So, Im(ฮณw
w
w
P
o
Then ฮณw and ฮณw belong to RM2 for every fixed w. But ฮณ itself is not polynomial-time computable,
since it has to work for all possible RMP2 -programs w.
Another restricted form of ฮณ that belongs to RMP2 is obtained by choosing a fixed polynomial q,
and defining ฮณq as the restriction of ฮณ to the set
{code(w) 11 x : w is a RMP2 -program with built-in polynomial โค q, and x โ Dom(ฯw )}.
Hence, ฮณq โ RMP2 .
We also define the functions ฯ0 , ฯ1 , ฯ0 , ฯ1 โ RMP2 by ฯa (x) = ax, ฯa (ax) = x, for all x โ {0, 1}โ
and a โ {0, 1}. For a word w = an . . . a1 with ai โ {0, 1} we denote ฯan โฆ . . . โฆ ฯa1 by ฯw , and
ฯan โฆ . . . โฆ ฯa1 by ฯw .
o =ฮณ โฆฯ
o
Then we have: ฮณw
w
code(w) 11 , and ฮณw = ฮณw โฆ ฯcode(w) 11 .
Another important function in RMP2 is the decoding function, defined for any u, v โ Aโ by
decode(code(u) 11 v) = uv,
so domC(decode) = {00, 01}โ 11, and imC(decode) = {ฮต}. We also define a second-coordinate decoding
function, for all u1 , u2 , v โ Aโ , by
decode2 code(u1 ) 11 code(u2 ) 11 v = code(u1 ) 11 u2 v.
So, decode2 โ RMP2 , domC(decode2 ) = {00, 01}โ 11 {00, 01}โ 11, and imC(decode2 ) = {00, 01}โ 11.
CC
Now we can formulate a relation between evRC
q and evRq :
CC
evRC
โฆ ฮณq .
q = decode2 โฆ evRq
In order to show that evRCC
is complete with respect to inversive reduction in RMP2 , we will
q
adapt the padding and unpadding functions (defined for fP in [2], Section 4) to RMP2 . Although for
5
RMP2 we keep the same names as for the corresponding (un)padding functions in fP, the functions
are slightly different. The padding procedure begins with the function expand(.), defined by
expand code(w) 11 code(u) 11 v
= code(ex(w)) 11 04 |code(u)|
2 +8 |code(u)|+2
01 code(u) 11 v,
2
for all u โ domC(ฯw ), v โ Aโ , and RMP2 -programs w. The word 04 |code(u)| +8 |code(u)|+2 01 is of the
2
form code(s) for a word s โ 0โ 1; and 04 |code(u)| +8 |code(u)|+2 01 code(u) is also a code word, namely
2
code(su). Since 0โ 1 and its subset (00)โ 01 are prefix codes, code(s) = 04 |code(u)| +8 |code(u)|+2 01 is
uniquely determined as a prefix of code(su).
Here, ex(w) is an RMP2 -program obtained from w so that
ฯex(w) (00)h 01 code(u) 11 v = (00)h 01 code(ฯw (u)) 11 v,
for all u โ domC(ฯw ), v โ Aโ , and h > 0. Moreover, if n 7โ a nk + a is the built-in polynomial of the
program w then the built-in polynomial of ex(w) is
pe (n) = ae nโk/2โ + ae , with ae = max{12, โa/2k โ + 1}.
The detailed justification of the numbers used in the definition of expand and ex (as well as reexpand,
recontr, and contr below) is given in [2], Section 4.
It is important that expand uses the prefix u of x for padding (in the format code(u) 11, where
u โ domC(ฯw )). If the whole input x were used for computing the amount of padding, expand would
o , in order to isolate the
not be a right-ideal morphism. This is the reason why we introduce ฮณw or ฮณw
prefix u โ domC(ฯw ) of x.
We iterate expansion (padding) by applying the following function, where ex(.) is as above:
reexpand code(ex(z)) 11 0k 01 code(u) 11 v
= code(ex(z)) 11 04k
2 +8k+2
01 code(u) 11 v,
where k > 0, u, v โ Aโ , and z is any RMP2 -program; k is even in the context where reexpand will be
used.
Repeated contraction (unpadding) is carried out by applying the following function, for k > 0:
recontr code(ex(z)) 11 (00)k 01 code(y) 11 v
โ
= code(ex(z)) 11 (00)max{1, โ k/2โโ1} 01 code(y) 11 v;
โ
note that max{1, โ k/2โ โ 1} โฅ 1.
The unpadding procedure ends with the application of the function
contr code(ex(z)) 11 (00)k 01 code(y) 11 v = code(z) 11 code(y) 11 v,
if 2 โค |(00)k | = 2k โค 4 |code(y)|2 + 8 |code(y)| + 2.
The functions expand(.), ex(.), reexpand(.), recontr(.), and contr(.), are undefined in the cases where
no output has been specified above.
Lemma 2.1 Let q2 be the polynomial defined by q2 (n) = 12 n2 + 12. For any ฯw โ RMP2 , where w
is a RMP2 -program with built-in polynomial q (of the form q(n) = a nk + a for positive integers a, k),
we have for all u โ domC(ฯw ), v โ Aโ :
(โ)
ฯw (uv)
m
o
= decode โฆ ฯcode(w) 11 โฆ contr โฆ recontr 2m โฆ evRCC
q2 โฆ reexpand โฆ expand โฆ ฮณw (uv)
m
o
= ฯcode(w) 11 โฆ decode2 โฆ contr โฆ recontr2m โฆ evRCC
q2 โฆ reexpand โฆ expand โฆ ฮณw (uv),
where m = โlog2 (a + k)โ.
6
Proof. This is similar to the proof of Prop. 4.5 in [2], with a few modifications. For u โ domC(ฯw ),
v โ Aโ ,
ฮณo
w
uv 7โโ
expand
code(w) 11 code(u) 11 v
code(ex(w)) 11 04 |code(u)|
7โโ
reexpand
m
7โโ
2 +8 |code(u)|+2
01 code(u) 11 v
code(ex(w)) 11 0Nm+1 01 code(u) 11 v,
where N1 = 4 |code(u)|2 + 8 |code(u)| + 2, so |0N1 01| = (2 (|code(u)| + 1))2 ; by induction, Ni =
2 + 8N
Ni 01| = (2 (N
2
4 Niโ1
iโ1 + 2 for 1 < i โค 2m + 1, and |0
iโ1 + 1)) . The above string, which will
CC
now be the argument of evq2 , has length > Nm+1 + 2 + |code(u)|, which is much larger than the time
it takes to simulate the machine with program w on input u. So evRCC
q2 can now be applied correctly.
Continuing the calculation,
evRCC
q2
7โโ
code(ex(w)) 11 0Nm+1 01 code(ฯw (u)) 11 v
recontr 2m
7โโ
code(w) 11 00 01 code(ฯw (u)) 11 v.
We use 2m in recontr 2m because ฯw (u) could be much shorter than u; but because of polynomial input
balance, |u| โค pw (|ฯw (u)|). Note that doing more input padding than necessary does not do any harm;
and recontracting (unpadding) more than needed has no effect (by the definition of recontr). Hence
contr can now be applied correctly. We complete the calculation:
contr
7โโ
code(w) 11 code(ฯw (u)) 11 v
decode2
7โโ
code(w) 11 ฯw (u) v
ฯcode(w) 11
7โโ
ฯw (u) v.
โท
Lemma 2.2. RMP2 has the following infinite generating set:
{decode, ฯ0 , ฯ1 , ฯ0 , ฯ1 , contr, recontr, evRCC
q2 , reexpand, expand}
โช {ฮณw : w is any RMP2 -program}.
Here, decode can be replaced by decode2 . Yet another infinite generating set of RMP2 is
k
{ฯ0 , ฯ1 , ฯ0 , ฯ1 } โช {evRC
q : q is any polynomial of the form q(n) = a n + a with a, k โ Nโฅ1 }.
o = ฮณ โฆฯ
Proof. The first infinite generating set follows from Lemma 2.1. Recall that ฮณw
w
code(w) 11 .
The second generating set follows in a straightforward way from the proof of Prop. 4.5 in [2]. โท
Proposition 2.3 RMP2 is generated by a set of regular elements of RMP2 .
Proof. The generators ฯ0 , ฯ1 , ฯ0 , ฯ1 are easily seen to be regular. Thus, using the second infinite
generating set in Lemma 2.2, it is enough to factor evRC
q into regular elements. We have:
evRC
q = ฯ2,q โฆ Eq ,
where Eq and ฯ2,q are defined as follows: For every RMP2 -program w with built-in polynomial โค q,
and every u โ domC(ฯw ) and v โ Aโ ,
Eq code(w) 11 code(u) 11 v = code(w) 11 code(u) 11 code(ฯw (u)) 11 v;
and for all z, y, x, v โ Aโ such that |x| โค q(|y|),
ฯ2,q code(z) 11 code(x) 11 code(y) 11 v = code(z) 11 code(y) 11 v.
The functions are undefined otherwise. It is easy to see that Eq and ฯ2,q have polynomial-time inversion
algorithms (i.e., they are regular), and belong to RMP2 . โท
P
We will show now that evRCC
q2 is complete in RM2 and in fP, with respect to a certain โinversive
reductionโ. We need to recall some definitions from [2] concerning reductions between functions in fP
or RMP2 , and in particular, reductions that โpreserve one-waynessโ (inversive reductions).
7
Definition 2.4 Let f1 , f2 : Aโ โ Aโ be two polynomially balanced right-ideal morphisms.
(1) We say that f2 simulates f1 (denoted by f1 4 f2 ) iff there exist ฮฑ, ฮฒ โ RMP2 such that f1 = ฮฒโฆf2 โฆฮฑ.
(2) We have a polynomial-time Turing simulation of f1 by f2 (denoted by f1 4T f2 ) iff f1 can be
computed by an oracle RMP2 -machine that can make oracle calls to f2 ; such oracle calls can, in
particular, be calls on the membership problem of Dom(f2 ).
In the above definition, f1 , f2 need not be polynomial-time computable.
Since RMP2 is J 0 -simple (Prop. 2.7 in [2]), every f1 โ RMP2 is simulated by every f2 โ RMP2 โ{0}
(for each of the above simulations).
Definition 2.5 (Inversive reduction). If 4X is a simulation between right-ideal morphisms (e.g.,
as in the previous definition) then the corresponding inversive reduction is defined as follows. We say
that f1 inversively X-reduces to f2 (denoted by f1 6inv,X f2 ) iff
(1) f1 4X f2 , and
(2) for every inverse f2โฒ of f2 there exists an inverse f1โฒ of f1 such that f1โฒ 4X f2โฒ ; here, f2โฒ and f1โฒ
range over all polynomially balanced right-ideal morphisms Aโ โ Aโ .
Note that J 0 -simplicity (Prop. 2.7 in [2]) does not apply for inversive reduction since f2โฒ , f1โฒ do not range
over just RMP2 . One easily proves the following about polynomially balanced right-ideal morphisms
f1 , f2 (see [2], Section 5):
If f1 6inv,T f2 and f2 โ RMP2 , then f1 โ RMP2 ; if, in addition, f2 is regular, then f1 is regular
(equivalently, if, in addition, f1 is one-way, then f2 is one-way).
Definition 2.6 A polynomially balanced right-ideal morphism f0 is complete in a set S (of right-ideal
morphisms) with respect to an (inversive) reduction 6inv,X iff f0 โ S, and for all ฯ โ S: ฯ 6inv,X f0 .
See Section 5 of [2] for more details and properties of these simulations and reductions; in [2] the
focus was on fP, whereas here we concentrate on RMP2 . The simulations in Def. 2.4 are similar to the
standard notions of reductions between decision problems. The concept of inversive reduction was first
introduced in [2]; it is the appropriate notion of reduction between functions when one-wayness is to
be preserved under upward reduction (and regularity is to be preserved under downward reduction).
In the above definitions we only refer to polynomially balanced inverses; this is justified by the
following Proposition, according to which โbalanced functions have balanced inversesโ.
Proposition 2.7 Suppose f is a right-ideal morphism with balance โค q(.) (where q(.) is a polynomial), and f has an inverse f1โฒ with time-complexity โค T (.). Then f has an inverse f โฒ with balance
โค q and time-complexity โค T (.) + c q(.) (for some constant c > 1). The inverse f โฒ can be chosen as
a restriction of f1โฒ .
Proof. Let f โฒ be the restriction of f1โฒ to the set
{y โ Dom(f1โฒ ) : |y| โค q(|f1โฒ (y)|) and |f1โฒ (y)| โค q(|y|)}.
Then f โฒ obviously has balance โค q. Note that since f1โฒ is an inverse of f we have Im(f ) โ Dom(f1โฒ ).
To show that f โฒ is an inverse of f it is sufficient to check that the domain of f โฒ contains Im(f ). Let
y = f (x) โ Im(f ) for some x โ Dom(f ). Then f (f1โฒ (y)) = y, since f1โฒ is an inverse.
Checking |y| โค q(|f1โฒ (y)|): |y| = |f (f1โฒ (y))| โค q(|f1โฒ (y)|; the inequality holds since q is a balance for
f on input f1โฒ (y).
Checking |f1โฒ (y)| โค q(|y|): |f1โฒ (y)| โค q(|f (f1โฒ (y))|) since q is a balance for f on input f1โฒ (y); and
q(|f (f1โฒ (y))|) = q(|y|) since f (f1โฒ (y)) = y.
To find a time-complexity bound for f โฒ , we first compute f1โฒ (y) in time โค T (|y|); thereby we also
verify that y โ Dom(f1โฒ ). To check whether y is in the domain of f โฒ we first compare |y| and |f1โฒ (y)| in
time โค |y| + 1.
8
Checking |y| โค q(|f1โฒ (y)|): If |y| โค |f1โฒ (y)| then we automatically have |y| โค q(|f1โฒ (y)|). If |y| โฅ
we compute q(|f1โฒ (y)|) in time O(q(|f1โฒ (y)|)) (โค O(q(|y|))), by writing the number |f1โฒ (y)| in
binary, and then evaluating q (see Section 4 of [2] for a similar computation). Then we check |y| โค
q(|f1โฒ (y)|) in time โค |y| + 1. Checking |f1โฒ (y)| โค q(|y|) is done in a similar way, in time โค O(q(|y|)) +
|y| + 1. โท
|f1โฒ (y)|
P
Theorem 2.8 The map evRCC
q2 is complete for RM2 with respect to inversive Turing reduction.
Proof. Lemma 2.1 provides the following simulation of ฯw by evRCC
q2 :
m
o
ฯw = decode โฆ ฯcode(wโฒ ) 11 โฆ contr โฆ recontr2m โฆ evRCC
q2 โฆ reexpand โฆ expand โฆ ฮณw .
To obtain an inversive Turing simulation, let eโฒ be any inverse of evRCC
q2 . Slightly modifying the proof
of Prop. 5.6 in [2], we apply eโฒ to any string of the form
code(ex(w)) 11 0Nm+1 11 code(p) 11 z,
where p โ ฯw (domC(ฯw )), and z โ Aโ ; then for any p โ imC(ฯw ) (โ ฯw (domC(ฯw ))), and z โ Aโ :
eโฒ code(ex(w)) 11 0Nm+1 11 code(p) 11 z
= code(ex(w)) 11 0Nm+1 11 code(t) 11 z,
โฒ
โฒ
โฒ
โฒ
for some t โ ฯโ1
w (p) โ Dom(ฯw ). Based on e we now construct an inverse ฯw of ฯw such that ฯw 4T e ;
for any y โ Im(ฯw ) we define
o (y).
ฯโฒw (y) = decode โฆ ฯcode(wโฒ ) 11 โฆ contr โฆ recontr 2m โฆ eโฒ โฆ reexpandm โฆ expand โฆ ฮดw
o (y) is defined by
Here, ฮดw
o (y) = code(w) 11 code(p) 11 z,
ฮดw
o (.) is similar to ฮณ o (.), except that ฮด o (.) uses imC(ฯ ),
when y = pz with p โ imC(ฯw ), z โ Aโ . So, ฮดw
w
w
w
o (.) uses domC(ฯ ). We saw that ฮณ o โ RMP ; but unless P = NP, ฮด o will not be in RMP
whereas ฮณw
w
w
2
w
2
in general.
o (y) can be computed by an RMP -machine M that makes oracle calls to Dom(eโฒ )
The value ฮดw
2
and to eโฒ as follows. On input y, M considers all prefixes of y of increasing lengths, p1 , . . . , pk ,
until pj โ Im(ฯw ) is found. Since pj is the first prefix in Im(ฯw ), we have pj โ imC(ฯw ) and
o (y) = code(w) 11 code(p ) 11 z. To test for each p whether p โ Im(ฯ ), M pads p to produce
ฮดw
j
i
i
w
i
Nm+1 11 code(p ).
0Nm+1 11 code(pi ); if pi โ Im(ฯw ) then eโฒ code(ex(w))
11
โข
is
defined
on
input
0
i
Thus, if code ex(w)) 11 0Nm+1 11 code(pi ) 6โ Dom(eโฒ ), then pi 6โ Im(ฯw ). On the other hand, if
code ex(w)) 11 0Nm+1 11 code(pi ) โ Dom(eโฒ ), then let ti โ ฯโ1
w (pi ) be such that
โฒ
N
m+1
e code(ex(w)) 11 0
11 code(pi ) = code(ex(w)) 11 0Nm+1 11 code(ti ).
One oracle call to eโฒ yields this, and hence ti . Then we can use ฯw to check whether ti โ Dom(ฯw );
and this holds iff pi โ Im(ฯw ). This way, M can check whether pi โ Im(ฯw ). Thus, if y โ Im(ฯw ), M
will find pj โ Im(ฯw ). When y 6โ Im(ฯw ), M produces no output; this doesnโt matter since we do not
care how ฯโฒw is defined outside of Im(ฯw ).
o (y) is known, the remaining simulation
Once ฮดw
decode โฆ ฯcode(wโฒ ) 11 โฆ contr โฆ recontr 2m โฆ eโฒ โฆ reexpandm โฆ expand
o (y) = code(w) 11 code(p) 11 z, yields ฯโฒ (y).
of eโฒ , applied to ฮดw
w
The function ฯโฒw is an inverse of ฯw : Indeed, for x โ Dom(ฯw ), we have ฯw (x) = pz for some
p โ imC(ฯw ), z โ Aโ . Then
o (pz) = code(ex(w)) 11 0Nm+1 11 code(p) 11 z;
reexpandm โฆ expand โฆ ฮดw
and applying eโฒ then yields
code(ex(w)) 11 0Nm+1 11 code(t) 11 z,
9
for some t โ ฯโ1
w (p). Applying
decode โฆ ฯcode(wโฒ ) 11 โฆ contr โฆ recontr2m
โฒ
โฒ
now yields tz. Finally, ฯw (tz) = pz, since t โ ฯโ1
w (p). So, ฯw ฯw ฯw (x) = ฯw ฯw (pz) = ฯw (tz) = pz =
ฯw (x). โท
P
We show next that evRCC
q2 is not only complete for RM2 , but for all of fP.
P
Proposition 2.9 The map evRCC
q2 (โ RM2 ) is complete for fP with respect to 6inv,T .
Proof. By Prop. 5.6 in [2], evC
q2 is complete in fP for inversive simulation. By Prop. 5.17 in [2],
P
C
C
C
C
C C
C maps into
evq2 6inv (evq2 ) . Moreover, (evq2 )C 6inv,T evRCC
q2 ; indeed, (ev q2 ) โ RM2 (since f 7โ f
CC
P
P
C
C
C
RM2 ), and we just saw that evRq2 is complete in RM2 . Hence evq2 6inv (evq2 ) 6inv,T evRCC
โท
q2 .
3
Non-finite generation
In [2] we proved that fP is finitely generated, and we left open the question whether RMP2 is also
finitely generated. We will now answer this question negatively. We will use the following general
compactness property: If a semigroup S is finitely generated, and if ฮ is any infinite generating set of
S, then S is generated by some finite subset of this set ฮ.
Theorem 3.1.
RMP2 is not finitely generated.
Proof. We saw that RMP2 is generated by the infinite set
{ฯ0 , ฯ1 , ฯ0 , ฯ1 , decode2 , contr, recontr, evRCC
q2 , reexpand, expand}
โช {ฮณw : w is an RMP2 -program}.
Let us assume, by contradiction, that RMP2 is finitely generated. Then a finite generating set can be
extracted from this infinite generating set, so RMP2 is generated by
ฮfin = {ฯ0 , ฯ1 , ฯ0 , ฯ1 , decode2 , contr, recontr, evRCC
q2 , reexpand, expand} โช {ฮณi : i โ F },
where F is some finite set of RMP2 -programs. So for every ฮณw there is a word in ฮโfin that expresses
ฮณw as a finite sequence of generators. Recall that Dom(ฮณw ) = code(w) 11 Dom(ฯw ), and for any
x โ Dom(ฯw ),
ฮณw (code(w) 11 x) = code(w) 11 code(u) 11 v,
where x = uv and u โ domC(ฯw ).
The proof strategy will consist in showing that there are infinitely many functions ฮณw that do not
have a correct representation over ฮfin . More precisely, for all RMP2 -programs w and all u โ domC(ฯw ),
we have ฮณw (code(w) 11 u) = code(w) 11 code(u) 11; so ฮณw (code(w) 11 u) โ {00, 01}โ 11 {00, 01}โ 11. On
the other hand, we will show that there exist (infinitely many) RMP2 -programs w such that for every
X โ (ฮfin )โ that represents ฮณw , there exist (infinitely many) u โ domC(ฯw ) such that: X(code(w) 11 u)
= code(w) 11 code(u1 ) 11 u2 , where u2 is non-empty; so, X(code(w) 11 u) 6โ {00, 01}โ 11 {00, 01}โ 11.
Thus we obtain a contradiction.
We consider the RMP2 -programs w such that domC(ฯw ) satisfies:
(1) no word in domC(ฯw ) contains 11 as a subsegment;
(2) for all i โ F , domC(ฯi ) 6= domC(ฯw );
(3) for any u โ domC(ฯw ) and any integer n > 0, there exists v โ domC(ฯw ) of length |v| > n such
that u = u0 c, u0 is a prefix
of v, and |c| โค 4. Equivalently:
โu โ domC(ฯw ) โn > 0 โv โ domC(ฯw ), |v| > n โu0 , c, z โ Aโ [ v = u0 z, u = u0 c, |c| โค 4 ].
10
We can picture this as a path in the tree of Aโ , labeled by u and ending at vertex u; at vertex u0
along this path, at distance โค 4 from vertex u, a second path branches off and ends at vertex v (of
length |v| > n).
The following family of examples shows that there exist infinitely many RMP2 -programs w that
satisfy properties (1)-(3). In each of these examples (parameterized by a โ {0, 1}โ ) we have
domC(ฯw ) = {code(an ) 0010 : n > 0},
where a โ {0, 1}โ is any fixed non-empty word (depending on w), chosen so that domC(ฯw ) 6= domC(ฯi )
for all i โ F (thus property (2) holds). Any word a that is long enough will work; indeed, for
different words a the above prefix codes are different, whereas F is finite. Property (1) follows from
the definition of code (namely, code(0) = 00, code(1) = 01). Property (3) holds because for every
u = code(am ) 0010 and every n > 0, we can take u0 = code(am ) and v = code(an+m ) 0010. The set
{code(an ) 0010 : n > 0} is a regular language, with regular expression (code(a))+ 0010.
Let X โ ฮโfin be a representation of ฮณw , where w is any RMP2 -program from the family of examples
above with properties (1)-(3). We will consider certain suffixes Si of X, over ฮfin .
Let S0 be the shortest suffix of X such that for all u โ domC(ฯw ), S0 (code(w) 11 u) is of the form
code(x) 11 code(y) 11 z โ {00, 01}โ 11 {00, 01}โ 11 {0, 1}โ . Then S0 exists since X itself (representing
ฮณw ) maps code(w) 11 u to code(w) 11 code(u) 11 โ {00, 01}โ 11 {00, 01}โ 11 {0, 1}โ .
Inductively we define S1 , S2 , . . . , Si , . . . , where Si is the shortest suffix of X that has Siโ1 as a
strict suffix, and such that for all u โ domC(ฯw ) we have:
Si code(w) 11 u โ {00, 01}โ 11 {00, 01}โ 11 {0, 1}โ .
So, Si code(w) 11 u is of the form code(w1 ) 11 code(u1 ) 11 u2 with w1 , u1 , u2 โ Aโ . Then X = SN
for some N โฅ 0 (and |X| > N ).
Theorem 3.1 now follows from the next Lemma, according to which there are (infinitely many)
u โ domC(ฯw ) such that SN (code(w) 11 u) = code(w) 11 code(u1 ) 11 u2 , with u2 non-empty. On
the other hand, X = SN , and X represents ฮณw , hence by the definition of ฮณw we have for every
u โ domC(ฯw ): SN (code(w) 11 u) = code(w) 11 code(u) 11; so u2 is empty. Thus, the assumption
that X (over the finite generating set ฮfin ) represents ฮณw , leads to a contradiction.
Lemma 3.2 Let ฮณw be such that domC(ฯw ) = {code(an ) 0010 : n > 0} for some word a โ {0, 1}โ ,
chosen so that the program w satisfies properties (1)-(3). Let X be a word over ฮfin that represents
ฮณw , and let |X| be the length of X over ฮfin . Let S0 , . . . , SN be the suffixes of X defined above, with
SN = X. Then there exist โ and n with โ > n > 0 such that for all i = 0, . . . , N and all u โ domC(ฯw )
with |u| โฅ โ:
Si (code(w) 11 u) = code(w1 ) 11 code(u1 ) 11 u2 ,
for some w1 , u1 , u2 โ Aโ . Moreover, u2 has a non-empty common suffix with u, and this common
suffix has length at least n.
Proof. We have for all u โ domC(ฯw ): Si (code(w) 11 u) = code(w1 ) 11 code(u1 ) 11 u2 , for some
w1 , u1 , u2 โ Aโ . We want to show that there is โ such that for all u โ domC(ฯw ) with |u| โฅ โ: u2 has
a non-empty (sufficiently long) suffix in common with u; the number n is an auxiliary parameter. We
take u of the form u = code(am ) 0010 and use induction on i = 0, . . . , N .
Proof for S0 : The only generators from ฮfin that can occur in S0 are ฯ0 , ฯ1 , ฯ0 , ฯ1 and ฮณj (for j โ F ).
Indeed, the other generators in ฮfin (namely decode2 , contr, recontr, evRCC
q2 , reexpand, expand) are only
applicable to inputs of the form code(x) 11 code(y) 11 z; so, S0 would end before a generator in {decode2 ,
contr, recontr, evRCC
q2 , reexpand, expand} can be applied. Moreover, S0 cannot start with a generator
in {decode2 , contr, recontr, evRCC
q2 , reexpand, expand}; indeed, for all inputs code(w) 11 u โ domC(X),
u = code(am ) 0010 contains no 11, so these generators are not defined on any element of domC(X).
So, S0 is over {ฯ0 , ฯ1 , ฯ0 , ฯ1 } โช {ฮณj : j โ F }.
11
The actions of ฯ0 , ฯ1 , ฯ0 , ฯ1 can change an input in at most |S0 | positions at the left end of the
input, so these actions preserve a common suffix u2 and u of length โฅ |u| โ |S0 |. Thus, if S0 consists
only of instances of ฯ0 , ฯ1 , ฯ0 , ฯ1 , the Lemma holds for S0 if |u| โฅ โ โฅ n + |S0 | and n > 0.
Suppose now that S0 contains ฮณj for some j โ F . Then (if m > |S0 |/|a|), instances of ฯ0 , ฯ1 , ฯ0 , ฯ1
will transform the input u = code(w) 11 code(am ) 0010 into a word code(x) 11 s code(ak ) 0010 (for
some x, s โ Aโ , k > 0), such that ฮณj can be applied. This action changes an input in < |S0 | positions
at the left end of the input. Since ฮณj is assumed to be applicable now, we must also have x = j and
s = y0 z for some y0 โ domC(ฯj ), z โ Aโ . Then the output of ฮณj is ฮณj code(j) 11 s code(ak ) 0010
= code(j) 11 code(y0 ) 11 z code(ak ) 0010, thus the common suffix of u2 and u could decrease by length
โค |y0 | under the action of ฮณj . So we let โ โฅ n + |S0 | + |y0 | and n > 0. Also, at most one ฮณj (with
j โ F ) occurs in S0 , since after ฮณj the output is of the form code(w1 ) 11 code(u1 ) 11 u2 , which marks
the end of the action of S0 . This proves the Lemma for S0 .
Inductive step โSi โ Si+1 โ, for 0 โค i < N : By induction we assume that for all u โ domC(ฯw )
with |u| โฅ โ, we have Si (code(w) 11 u) = code(w1 ) 11 code(u1 ) 11 u2 for some w1 , u1 , u2 โ Aโ , where u2
and u have a common suffix of length โฅ n (> 0). Let us write Si+1 = Ti+1 Si ; then Ti+1 is non-empty
(by the definition of Si+1 ). We also let T0 = S0 .
Claim 1: If Ti+1 contains a generator g โ {contr, recontr, evRCC
q2 , reexpand, expand, decode2 }, then g
is the first (i.e., rightmost) letter of Ti+1 , and g occurs only once.
Indeed, if g were applicable later in Ti+1 , the output of the generator preceding g would be of the
form code(w1 ) 11 code(u1 ) 11 u2 , so Si+1 would have ended before g was applied.
Claim 2: If Ti+1 contains a generator g โ {contr, recontr, evRCC
q2 , reexpand, expand} โช {ฮณj : j โ F },
then g is the last (i.e., leftmost) letter of Ti+1 , and g occurs only once.
Indeed, such a generator outputs a word of the form code(w1 ) 11 code(u1 ) 11 u2 . So, Si+1 ends after
such a generator.
As a consequence of Claims 1 and 2, if Ti+1 contains a generator g โ {contr, recontr, evRCC
q2 ,
reexpand, expand}, then Ti+1 consists of just g. A generator of this form does not change u2 .
So we can assume for the remaining cases that Ti+1 is of the form ti+1 , or ti+1 ยท decode2 , or ฮณj ยท ti+1 ,
or ฮณj ยท ti+1 ยท decode2 , where j โ F and ti+1 is over the generators ฯ0 , ฯ1 , ฯ0 , ฯ1 .
Let code(w1 ) 11 code(u1 ) 11 u2 be the input of Ti+1 (and this is also the output of Si ), where u2
and u have a common suffix of length โฅ n.
โข Case where Ti+1 is over the generators ฯ0 , ฯ1 , ฯ0 , ฯ1 : Then Ti+1 changes the input in at most |Ti+1 |
positions at the left end of the input, so u2 will not be affected if โ โ n โฅ |Ti+1 | (and n > 0).
โข Case where Ti+1 = ti+1 ยท decode2 , with ti+1 over ฯ0 , ฯ1 , ฯ0 , ฯ1 : The output of decode2 is of the form
code(w1 ) 11 u1 u2 , so the common suffix of u2 and u is preserved by decode2 . The action of ti+1 ,
containing only generators from {ฯ0 , ฯ1 , ฯ0 , ฯ1 }, affects at most |ti+1 | positions near the left side of the
input, so u2 is not changed if โ โ n โฅ |Ti+1 | (and n > 0).
โข Case where Ti+1 = ฮณj ยท ti+1 , with ti+1 over ฯ0 , ฯ1 , ฯ0 , ฯ1 : Applications of ฯ0 , ฯ1 , ฯ0 , ฯ1 change fewer
than |ti+1 | letters of the input near the left end, so the common suffix is not affected if โ โ n โฅ |Ti+1 |.
When ฮณj is applied, the output produced will be of the form code(j) 11 code(yi+1 ) 11 z code(an ) 0010,
where yi+1 โ domC(ฯj ). Then u2 will not be affected if we pick โ โฅ n + |Ti+1 | + |yi+1 | and n > 0.
โข Case where Ti+1 = ฮณj ยท ti+1 ยท decode2 , with ti+1 over ฯ0 , ฯ1 , ฯ0 , ฯ1 : This case can be handled as a
combination of the previous two cases.
m
In all the aboveP
cases the constraints are fulfilled
PNfor all i = 0, . . . , N , and for all u = code(a ) 0010, if
N
m โฅ N + |X| + i=0 |yi | (using the fact that
i=0 |Ti | = |X|). Note that the words yi do not depend
on the choice of the input u = code(am ) 0010, whenever m is long enough; indeed, to determine all yi
we can apply each Si to the infinite word code(a)ฯ โ {0, 1}ฯ . โท
12
Notation. For a given polynomial q (of the form q(n) = a nk + a with integers a, k โฅ 1), let
(q)
S2
= {f โ RMP2 : f is computed by an RMP2 -program with built-in polynomial โค q}.
(q)
We call w an S2 -program iff w is an RMP2 -program with built-in balance and time-complexity
polynomial โค q.
(q)
(q)
(q)
Let RM2 = hS2 i, i.e., the submonoid of RMP2 generated by the set S2 . Obviously, we have:
Proposition 3.3 For any set of polynomials {qi : i โ N} of the form qi (n) = ai nki + ai , such that
S
(qi )
sup{ai : i โ N} = +โ = sup{ki : i โ N}, we have:
= RMP2 .
โท
iโN RM2
(q)
The non-finite generation result for RMP2 also holds for RM2 , and the proof is similar. We need a
few preliminary facts.
(q)
Lemma 3.4 For every polynomial q of the form q(n) = a nk +a with a, k โฅ 2, and every S2 -program
(q)
w we have: ฮณw โ S2 .
Proof. Recall that ฮณw (code(w) 11 uv) = code(w) 11 code(u) 11 v, where u โ domC(ฯw ). The input
balance of ฮณw is โค q. Indeed, the input is shorter than the output; and the output length is 2 |w| + 2 +
2 |u| + 2 + |v|, which is less than q(|code(w) 11 uv|) = q(2 |w| + 2 + |u| + 2 + |v|) when q(n) โฅ 2 n2 + 2.
To compute code(w) 11 code(u) 11 v from input code(w) 11 uv, an RMP2 -machine can proceed as
follows: First, the machine reads and outputs code(w) 11. Then it runs the program w on input
uv, i.e., it simulates the corresponding RMP2 -machine Mw (which has built-in polynomial q), with
an extra tape and a few modifications. While searching for a prefix of uv in domC(ฯw ), the longest
prefix examined so far is kept on the extra tape; the output ฯw (u) of Mw will not be written on the
output tape. Once u (the prefix of uv in domC(ฯw )) has been found (and written on the extra tape),
code(u) 11 v is appended on the output tape.
All this takes time โค |code(w) 11| + q(|u|) + |code(u) 11 v| = 2 |w| + 2 + q(|u|) + 2 |u| + 2 + |v|; this
is < q(2 |w| + 2 + |u| + 2 + |v|) = q(|code(w) 11 uv|) when q(n) โฅ 2 n2 + 2. โท
(q)
Lemma 3.5 Let q be a polynomial that is larger than a certain polynomial of degree 5. Then RM2
is generated by
(q)
{ฯ0 , ฯ1 , ฯ0 , ฯ1 , decode2 , contr, recontr, evRCC
q2 , reexpand, expand} โช {ฮณz : z is an S2 -program}.
(q)
Proof. When w is an S2 -program then as a consequence of Lemma 2.1,
m
o
ฯw = ฯcode(wโฒ ) 11 โฆ decode2 โฆ contr โฆ recontr2m โฆ evRCC
q2 โฆ reexpand โฆ expand โฆ ฮณw ,
m
= ฯcode(wโฒ ) 11 โฆ decode2 โฆ contr โฆ recontr2m โฆ evRCC
q2 โฆ reexpand โฆ expand โฆ ฮณw โฆ ฯcode(w) 11 ,
(q)
where q2 is a certain polynomial of degree 2. So the above generating set does indeed generate RM2 .
(q)
We still need to show that these generators belong to RM2 .
The functions ฯ0 , ฯ1 , decode2 , contr, recontr, reexpand, expand, ฯ0 , ฯ1 have balance and complexity
(q)
(q)
โค 4 (n + 1)2 . And ฮณw โ RM2 if w is an S2 -program (by Lemma 3.4). Let us verify that evRCC
q2 has
5
balance โค q2 and complexity O(n ). By definition,
evRCC
q2 (code(w) 11 code(u) 11 v) = code(w) 11 code(ฯw (u)) 11 v.
Then evRCC
q2 has balance โค q2 , since on an output of length n = 2 |w|
+ 2 + 2 |ฯw (u)| + 2, the input
length is โค 2 |w| + 2 + 2 q2 (|ฯw (u)|) + 2 โค q2 2 |w| + 2 + 2 |ฯw (u)| + 2 = q2 (n).
(q)
When ฯw can be computed by an RM2 -machine with built-in polynomial pw (โค q2 ), then
2
2
evRCC
q2 (code(w) 11 code(u) 11) can be computed in time โค c |w| pw (|u|) โค c |w| q2 (|u|) , for some
5
constant c > 0 (see the proof of Prop. 4.4 in [2]). Since q2 has degree 2, evRCC
q2 has complexity O(n ).
(q)
Thus, there exists q of degree 5 such that the above generators belong to RM2 .
13
โท
Theorem 3.6 For any polynomial q such that q(n) = a nk + a, with k โฅ 5 and a > a0 (for some
(q)
constant a0 > 1), we have: RM2 is not finitely generated.
(q)
Proof. The proof is very similar to the proof of Theorem 3.1. We saw in Lemma 3.5 that RM2 is
generated by the infinite set
(q)
{ฯ0 , ฯ1 , ฯ0 , ฯ1 , decode2 , contr, recontr, evRCC
q2 , reexpand, expand} โช {ฮณz : z is an S2 -program}.
(q)
Let us assume, by contradiction, that RM2 is finitely generated. Then a finite generating set can
(q)
be extracted from this infinite generating set; so RM2 is generated by
ฮfin = {ฯ0 , ฯ1 , ฯ0 , ฯ1 , decode2 , contr, recontr, evRCC
q2 , reexpand, expand} โช {ฮณi : i โ F },
(q)
(q)
where F is some finite set of S2 -programs. For every S2 -program w let X be a word in ฮโfin that
expresses ฮณw as a finite sequence of generators.
From here on, the proof is identical to the proof of Theorem 3.1. We use the fact that domC(ฯw ) =
{code(an ) 0010 : n > 0} is a finite-state language, so for such a program w, ฮณw has linear complexity
(q)
(being computable by a Mealy machine) and belongs to S2 . โท
4
4.1
Some complexity consequences of non-finite generation
Hierarchy and separation
(q)
Proposition 4.1 Let q be a polynomial of the form q(n) = a nk + a such that a, k โฅ 1. The set S2 ,
(q)
and hence the monoid RM2 , are contained in a finitely generated submonoid of RMP2 .
Proof. Let w be a RMP2 -program such that ฯw has I/O-balance and time-complexity โค q. Then
evRC
q can simulate ฯw directly, without any need of padding and unpadding. So we have for all
u โ domC(ฯw ), v โ Aโ :
ฯw (uv) = ฯcode(w) 11 โฆ evRC
q โฆ ฯcode(w) 11 (uv).
(q)
So S2 is contained in the submonoid generated by {ฯ0 , ฯ1 , ฯ0 , ฯ1 , evRC
q }. (Compare with Lemma 2.2
and the proof of Prop. 4.5 in [2].) โท
The proof of Prop. 4.1 yields the following chain of submonoids in which non-finitely generated and
finitely generated submonoids alternate.
Corollary 4.2 Let . . . < qi < qi+1 < . . . be any sequence of polynomials such that for all i โฅ 0,
P
P
qi+1 is is large enough so that evRC
qi has an RM2 -program with built-in polynomial qi+1 . Then RM2
contains a strict inclusion chain, which is infinite in the upward direction,
(q )
. . . $ RM2 i
(q
i+1
$ hฯ0 , ฯ1 , ฯ0 , ฯ1 , evRC
qi iRMP $ RM2
2
)
$ ...
... .
Proof. The strictness of the inclusions in the chain follows from the fact that non-finite generation
and finite generation alternate. โท
Theorem 4.3 Let q be a polynomial of the form q(n) = a nk + a such that a > 1, k โฅ 1. The
(q)
submonoid RM2 โ RMP2 has the following properties:
(1)
(q)
RM2 6= RMP2 .
(q)
(2) If q(n) โฅ 2 (n + 1)2 (for all n โ N), then RM2 contains elements of arbitrarily high polynomial
balance and time-complexity.
(3)
(q)
(q)
S2 6= RM2 , if q(n) โฅ 2 (n + 1)2 .
14
(4)
(q)
evRC
q 6โ RM2 , if k โฅ 5 and a โฅ a0 (where a0 is as in Theorem 3.6).
Moreover, evRC
q has balance โค q, but its time-complexity is not โค q.
(5) Let q1 , q2 be polynomials of the above form, such that q1 (n) < q2 (n) for all n โ N. Suppose
also that q1 (n) = a nk + a with k โฅ 5 and a โฅ a0 (as in (4)), and that q2 is large enough so that
(q2 )
(q1 )
(q )
evRC
$ RM2 2 .
q1 โ RM2 . Then RM2
(q)
Proof. (1) Since RM2 is contained in a finitely generated submonoid of RMP2 (Prop. 4.1), and
RMP2 is not contained (by โ) in a finitely generated submonoid of RMP2 (itself), inequality follows.
2
(2) Consider the function s : 0n 1x 7โ 02n 1x, for all n โฅ 0, x โ {0, 1}โ . Then s has time-complexity
โค 2 (n + 1)2 . Indeed, a Turing machine on input 0n 1 can read this word n times, each time turning
2
an input 0 into some new letter a, and each time writing 0n on the output tape; this produces 0n in
2
the output; then one more copy of 0n is made, followed by 1. This takes time โค 2 (n + 1)2 .
m
Then, sm (i.e., the composition of m instances of s) has complexity โฅ 2m n2 (since the output
(q)
length is that high, the time must be at least that much too). Thus the functions sm โ RM2 (as m
grows) have unbounded complexity, both in their degree and in their coefficient.
(q)
(3) By (2), RM2 contains functions with arbitrarily high polynomial balance and time-complexity,
(q)
whereas S2 only contains functions with balance and complexity โค q.
(q)
(4) By Prop. 4.1, RM2 is contained in the submonoid generated by {ฯ0 , ฯ1 , ฯ0 , ฯ1 , evRC
q }; and we
(q)
(q)
(q)
easily see that ฯ0 , ฯ1 , ฯ0 , ฯ1 โ RM2 . Hence, if evRC
q belonged to RM2 , the monoid RM2 would
be finitely generated, contradicting Theorem 3.6.
The input balance of evRC
q is โค q (see Lemma 3.5, where this is proved for q2 ). It follows that the
(q)
C
time-complexity of evRC
q is not โค q, otherwise we would have evRq โ RM2 .
(q )
(q )
1
2
C
(5) This follows from (4) since evRC
q 6โ RM2 , but evRq โ RM2 .
โท
Corollary 4.4 (Strict complexity hierarchy of submonoids in RMP2 ). There exists an infinite
sequence of polynomials (qi : i โ N), each of the form qi (n) = ai nki + ai with ki , ai > 1, and with
qi (n) < qi+1 (n) for all i, n โ N, such that the following holds:
S
(q
)
(q )
(qi )
RM2 i $ RM2 i+1 for all i, and
= RMP2 .
iโN RM2
Moreover, RMP2 (which is not finitely generated) is the union of a โ-chain of 4-generated submonoids.
Proof. The first statements follow from Theorem 4.3 (1) and Prop. 3.3. The last statement follows
from Cor. 4.2. โท
(q )
Since each RM2 i contains functions of arbitrarily high polynomial complexity (by Theorem 4.3
(q )
(2)), the monoids RM2 i form a strict complexity hierarchy of a new sort, different from the usual
(q)
complexity hierarchies. The fact that S2 6= RMP2 could have been shown by a diagonal argument.
It is not clear whether classical separation techniques from complexity theory would show the results
(1), (3), (4), (5) of Theorem 4.3.
Remark: The monoid fP, being finitely generated, does not contain an infinite strict complexity
hierarchy of monoids (but it can contain hierarchies of sets). Indeed, we have in general:
Fact. A finitely generated monoid M does not contain any infinite strict ฯ-chain of submonoids whose
union is M .
S
Indeed, if we had a chain (Mi : i โ ฯ) with M0 $ . . . $ Mi $ Mi+1 $ . . . . . . $
S iโฯ Mi = M , then
there would exist j such that Mj contains a finite set of generators of M (since iโฯ Mi = M ). Then
Mj = M , contradicting the strict hierarchy.
15
This Fact does not hold for chains over arbitrary order types; it holds for limit ordinals. The
non-finitely generated monoid RMP2 contains the encoding fPC as a submonoid (see Section 3 in [2]).
And fPC is finitely generated (being an isomorphic copy of fP), and fPC contains an isomorphic copy
of RMP2 . This leads to non-ฯ strict chains of submonoids of fP and of RMP2 .
4.2
Irreducible functions
(q)
Another consequence of non-finite generation is that RMP2 and RM2 have โirreducibleโ elements,
i.e., elements that cannot be expressed by composition of lower-complexity elements. We make this
precise in the next definitions.
In this subsection we do not use evaluation maps, so we can use โpolynomialsโ q(n) = a nk + a
where we drop the requirement that a, k are integers, i.e., we now allow real numbers โฅ 1.
Definition 4.5 The inf complexity degree of f โ RMP2 is
(q)
df = inf{k โ Rโฅ1 : f โ S2 for some polynomial q of the form q(n) = b nk + b,
for some b > 1 }.
We also define the inf complexity coefficient cf of f by
cf = inf{Cf (ฮต) : ฮต โ R>0 },
where
(q)
Cf (ฮต) = inf{a โ Rโฅ1 : f โ S2
for some polynomial q of the form q(n) = a ndf +ฮต + a}.
The inf complexity polynomial of f is the polynomial qf given by qf (n) = cf ยท (ndf + 1) (for all n โ N).
(qf )
Since df and cf are defined by infimum, f might not be in S2
following.
. By the definition of inf we have the
Proposition 4.6 For any polynomial q(n) = a nk + a with k > df and a > cf :
(q)
f โ RM2 .
โท
On the other hand, for every ฮต1 > 0, ฮต2 > 0:
(p1 )
for any polynomial p1 (n) = b ndf โฮต1 + b with any b > 1;
(p2 )
where p2 (n) = (cf โ ฮต2 ) ยท (ndf + 1).
f 6โ S2
f 6โ S2
Definition 4.7 Let us choose ฮด1 , ฮด2 โ R>0 . A function f โ RMP2 is called (ฮด1 , ฮด2 )-reducible iff
(q)
f โ RM2 for some polynomial q(n) = (cf โ ฮด2 ) ยท (ndf โฮด1 + 1). And f is called (ฮด1 , ฮด2 )-irreducible iff
f is not (ฮด1 , ฮด2 )-reducible.
(q)
(q)
In other words, f is (ฮด1 , ฮด2 )-reducible iff f is a composite of elements of S2 i.e., f โ RM2 , where
q(n) = (cf โ ฮด2 ) ยท (ndf โฮด1 + 1). So, f can be factored into functions that โhave strictly lower complexity
than f โ (regarding both the degree and the coefficient). Note that in the definition of df and cf we
(q)
(q)
used S2 , not RM2 (Def. 4.5).
(q )
(q )
Proposition 4.8 For all ฮด1 , ฮด2 โ R>0 and all polynomials q1 , q2 such that RM2 1 $ RM2 2 , there
(q )
(q )
exist (ฮด1 , ฮด2 )-irreducible functions in RM2 2 โ RM2 1 .
(q )
(q )
Proof. By contradiction, assume that there exist ฮด1 , ฮด2 such that every f โ RM2 2 โ RM2 1 is
(q )
(ฮด1 , ฮด2 )-reducible, i.e., f can be factored as f = fm โฆ . . . โฆ f1 , where fi โ RM2 2 (i = 1, . . . , m) with
inf degree dfi < df โ ฮด1 and inf coefficient cfi < cf โ ฮด2 . By the contradiction assumption, among these
(q )
(q )
factors, those that are in RM2 2 โ RM2 1 can themselves be factored into elements of degree and
(q )
(q )
coefficient lower by amount ฮด1 , respectively ฮด2 . I.e., a factor fi โ RM2 2 โ RM2 1 can be factored as
16
fi = fi,mi โฆ . . . fi,1 with dfi,j < dfi โ ฮด1 and cfi,j < cfi โ ฮด2 ; hence, dfi,j < df โ 2 ฮด1 and cfi,j < cf โ 2 ฮด2 ,
for j = 1, . . . , mi . By repeating this process we keep reducing the degree and the coefficient by at
least ฮด1 , respectively ฮด2 , in each step. After a finite number of steps we obtain a factorization of f into
(q )
(q )
(q )
functions in RM2 1 , contradicting the assumption that RM2 1 $ RM2 2 . โท
Remark: A finitely generated monoid, like fP, does not contain irreducible functions of arbitrarily
large complexity. Indeed, all elements are expressible as a composite of elements of bounded complexity
(namely the maximum complexity of the finitely many generators).
Acknowledgement: The paper benefitted from the refereeโs thoughtful reading and advice.
References
[1] J. Berstel, D. Perrin, Theory of Codes, Academic Press (1985).
[2] J.C. Birget, โSemigroups and one-way functionsโ, International J. of Algebra and Computation 25.1-2
(2015) 3-36.
[3] J.C. Birget, โPolynomial-time right-ideal morphisms and congruencesโ, http://arXiv.org/abs/1511.02056
(Nov. 2015).
[4] J.C. Birget, โMonoid generalizations of the Richard Thompson groupsโ, J. of Pure and Applied Algebra
213(2) (2009) 264-278.
[5] J.C. Birget, โCircuits, coNP-completeness, and the groups of Richard Thompsonโ, International J. of
Algebra and Computation 16(1) (Feb. 2006) 35-90.
[6] J.C. Birget, โThe groups of Richard Thompson and complexityโ, International J. of Algebra and Computation 14(5,6) (Dec. 2004) 569-626.
[7] J.W. Cannon, W.J. Floyd, W.R. Parry, โIntroductory notes on Richard Thompsonโs groupsโ,
LโEnseignement Matheฬmatique 42 (1996) 215-256.
[8] W. Diffie, M. Hellman, โNew directions in cryptographyโ, IEEE Trans. Information Theory 22.6 (1976)
644-654.
[9] D.Z. Du, K.I. Ko, Theory of Computational Complexity, Wiley (2000).
[10] O. Goldreich, Foundations of Cryptography: Basic Tools, Cambridge U.P. (2001).
[11] L.H. Hemaspaandra, M. Ogihara, The Complexity Theory Companion, Springer (2002).
[12] G. Higman, โFinitely presented infinite simple groupsโ, Notes on Pure Mathematics 8, The Australian
National University, Canberra (1974).
[13] L. Levin, โThe tale of one-way functionsโ, Problemy Peredatshi Informatsii 39.1 (2003) 92-103.
[14] R. McKenzie, R.J. Thompson, โAn elementary construction of unsolvable word problems in group theoryโ,
in Word Problems, (W. Boone, F. Cannonito, R. Lyndon, editors), North-Holland (1973) pp. 457-478.
[15] Ch. Papadimitriou, Computational Complexity, Addison-Wesley (1994).
[16] Richard J. Thompson, โEmbeddings into finitely generated simple groups which preserve the word problemโ, in Word Problems II, (S. Adian, W. Boone, G. Higman, editors), North-Holland (1980) pp. 401-441.
17
| 4math.GR
|
Simple Problems
The Simplicial Gluing Structure of Pareto Sets and Pareto Fronts
arXiv:1709.10377v1 [math.OC] 18 Apr 2017
Naoki Hamada
Fujitsu Laboratories Ltd.
4-1-1 Kamikodanaka, Nakahara-ku
Kawasaki, Japan
[email protected]
ABSTRACT
1.2 Related Studies in Other Fields
Quite a few studies on real-world applications of multi-objective
optimization reported that their Pareto sets and Pareto fronts form
a topological simplex. Such a class of problems was recently named
the simple problems, and their Pareto set and Pareto front were observed to have a gluing structure similar to the faces of a simplex.
This paper gives a theoretical justi๏ฌcation for that observation by
proving the gluing structure of the Pareto sets/fronts of subproblems of a simple problem. The simplicity of standard benchmark
problems is studied.
Theories concerning the easiness of covering solutions have been
developed in several optimization-related ๏ฌelds as well as the EMO
community. Most of them are studies on topological properties of
solution sets.
1.2.1 Contractibility. The earliest work can be found in 1951 by
Koopmans [11] Assertion 4.14 in which he applied the linear programming to economics and pointed out some conditions making
the Pareto front contractible. Peleg [18] generalized this result and
showed that the Pareto front is contractible if the feasible objective
region is a convex set. Afterward, the study spread to operations
CCS CONCEPTS
research, and the closedness, the (arcwise) connectedness, and the
โขApplied computing โ Multi-criterion optimization and decisioncontractibility of the Pareto set/front under general settings were
making; โขMathematics of computing โ Evolutionary algostudied on linear programming in 1970โs and on (quasi) convex prorithms; Nonconvex optimization; Geometric topology;
gramming in 1980โs. These results are collected in Luc [15] Section
6. Recently, similar results were obtained under more general probKEYWORDS
lem classes such as the lexicographic quasiconvexity [20] and the
multi-objective optimization, continuous optimization, problem class,
arcwise cone-quasiconvexity [12]. The (arcwise) connectedness of
strati๏ฌcation
the Pareto set is a necessary condition that the homotopy method
covers the solutions.
ACM Reference format:
Naoki Hamada. 2017. Simple Problems. In Proceedings of GECCO โ17 Companion, Berlin, Germany, July 15-19, 2017, 10 pages.
DOI: http://dx.doi.org/10.1145/3067695.3076069
1 INTRODUCTION
1.1 Motivation
The success of evolutionary multi-objective optimization (EMO) is
widely spreading over various academic and industrial ๏ฌelds. Recent numerical studies showed that decomposition-based EMO algorithms such as MOEA/D [33], NSGA-III [3], and AWA [6โ8, 24,
25] have an ability to approximate the entire Pareto set and Pareto
front of many-objective problems.
In contrast to their abundance of experimental successes, the
theory shedding light on why they work is still under developing.
Especially, the problem class in which decomposition-based EMO
algorithms can cover the entire Pareto set/front has not been understood. This paper discusses some problem class in which solutions are well-behaved for scalarization.
Permission to make digital or hard copies of part or all of this work for personal or
classroom use is granted without fee provided that copies are not made or distributed
for pro๏ฌt or commercial advantage and that copies bear this notice and the full citation on the ๏ฌrst page. Copyrights for third-party components of this work must be
honored. For all other uses, contact the owner/author(s).
GECCO โ17 Companion, Berlin, Germany
ยฉ 2017 Copyright held by the owner/author(s). 978-1-4503-4939-0/17/07. . . $15.00
DOI: http://dx.doi.org/10.1145/3067695.3076069
1.2.2 Decomposition. The decomposition approach considers
not only a given problem but also its subproblems each optimizing
a subset of objective functions and studies the relation among their
solutions. Lowe et al. [14] in 1984 showed that the weak Pareto set
of a convex programming is the union of the Pareto sets of subproblems. Malivert et al. [16] extended the result to explicitly quasiconvex upper semicontinuous functions. Popovici [19] named this
property the Pareto reducible and gave a su๏ฌcient condition independent of convexity. Ward [32] showed that the strictly Pareto
solutions to a convex programming problem are completely surrounded by the Pareto solutions of subproblems. Recent studies [12,
20, 21] revealed that the Pareto reducibility of the lexicographic
quasiconvex programming problem is closely related to the contractibility, through the simply shadiness [1] of the Pareto front.
1.2.3 Stratification. From pure mathematics, the singularity theory of di๏ฌerentiable maps gives a decomposition of solutions. In
1973, Smale [26] applied this theory to an economic problem and
stated that the Pareto set of a pure exchange economy of m agents
is homeomorphic to an (m โ 1)-simplex, provided the quasiconvexity and monotonicity of the agentsโ utility functions. Lovison
et al. [13] pointed out that each face of this simplex corresponds
to the Pareto set of each subproblem optimizing a subset of objective functions. In Smale [26] and its sequels [27โ31], he discussed the strati๏ฌcation of Pareto critical points of generic maps
GECCO โ17 Companion, July 15-19, 2017, Berlin, Germany
N. Hamada
with the transversality and rank assumption of derivatives. de
Melo [2] showed that the C โ -maps whose Pareto critical points
admit a strati๏ฌcation are generic, i.e., they form a dense subset of
the space of C โ -maps under the Whitney topology. Recently, Lovison et al. [13] collected related works to this approach and further
developed de Meloโs result, and showed that local Pareto sets of
su๏ฌciently proper maps admit a Whitney strati๏ฌcation.
1.3
Our Approach
These attempts are going on in two courses: the linear/convex
analysis originated by Koopmans and the global analysis by Smale.
The former seems much restrictive for the global optimization nature of EMO algorithms. The latter approach is su๏ฌciently general
but currently hard to compute. We need a handy theory for understanding the behavior of EMO algorithms. Recently, Hamada
et al. [8] de๏ฌned a class of problems called the simple problem. They
pointed out, without rigorous proofs, that the Pareto set and Pareto
front of a simple problem are both homeomorphic to a simplex and
the faces of the simplex correspond to the Pareto sets and their images of the subproblems. They also discussed that this property is
closely related to scalarization. This paper gives rigorous proofs
for their arguments.
1.4
Contribution
(1), and the evaluation map f , depending on the context. We call
the empty set โ
a 0-objective problem and de๏ฌne its evaluation map
as the empty map โ
: โ
โ R0 to a one-point set R0 = {0}.
For problems f , ะด such that ะด โ f as sets, we say that ะด is a
subproblem of f and f is a superproblem of ะด. We call the set of all
subproblems of a problem f the decomposition of f and denote by
2 f = {ะด | ะด โ f }.
If solutions x, y โ X to a problem f satisfy the conditions
โfi โ f , fi (x) โค fi (y) and โf j โ f , f j (x) < f j (y),
then we say that x f -dominates y and denote it by x โบ f y. We
denote f (x) = f (y) by x = f y and (x โบ f y) โจ (x = f y) by x f y.
If a solution x โ โ X to a problem f satis๏ฌes
โx โ X , x 6โบ f x โ ,
then x โ is called a Pareto solution to f .
The set of all Pareto solutions of a problem f = { f 1 , . . . , fm }
is called the Pareto set, denoted by X โ (f ) or X โ (f 1 , . . . , fm ). The
image of X โ (f ) by a map ะด is denoted by ะดX โ (f ). Especially, the
image f X โ (f ) is called the Pareto front. Through the paper, we
abbreviate the composition of mapsฯ โฆฯ toฯฯ. The above notation,
ะดX โ , can be considered as ะด โฆ X โ by regarding X โ as a map X โ :
2 F โ 2X .
In this paper, we give a proof that the boundary of the Pareto set
(resp. Pareto front) of a simple problem is the union of the interior of the Pareto sets (resp. their images) of subproblems. This
property enables us to numerically compute a strati๏ฌcation of the
Pareto set/front.
Additionally, we investigate the simplicity of benchmark problems widely-used in the EMO community: all problems in ZDT
suite [34] and DTLZ suite [4] are non-simple, ๏ฌve of problems in
WFG suite [10] can be simple under a very restrictive situation,
and MED problem [7] is always simple.
3 SIMPLE PROBLEM
1.5
First, we present the de๏ฌnition of simple problem and its graphical
intuition.
Contents
The rest of the paper is organized as follows. Section 2 prepares
basic notions and notations used in subsequent sections. Section
3 gives some properties of solutions to simple problems and their
relation to scalarization. Section 4 discusses the simplicity of existing benchmark problems. Section 5 gives conclusions and remarks
for future work.
2
PRELIMINARIES
This paper considers the following n-variable m-objective problem:
minimize
f (x) = (f 1 (x), . . . , fm (x))
n
x โX โR
: Rn โ
(1)
where we call f
Rm the evaluation map, fi : Rn โ R (i =
1, . . . ,m) the i-th objective function, Rn the variable space, X โ Rn
the feasible region, x โ Rn a solution, Rm the objective space, and
f (x) โ Rm an evaluation value.
We will make various problems by removing some of objective
functions from (1) and discuss a gluing structure of their solutions.
To write such arguments clearly, we de๏ฌne the problem as a ๏ฌnite
set of objective functions F = {f 1 , . . . , fm } and regard (1) as a
notation for it. We abuse f to denote the problem F , the equation
This section introduces the de๏ฌnition of simple problem and shows
its solution structure. Section 3.1 presents the de๏ฌnition of simple
problem. Section 3.2 shows some inclusion properties of solutions
among subproblems. Section 3.3 shows that those solutions have
the gluing structure of a topological simplex. Section 3.4 points
out that this gluing structure enables decomposition-based EMO
algorithms to cover the Pareto set and Pareto front.
3.1 De๏ฌnition
De๏ฌnition 3.1 (simple problem [8]). A problem f is simple or has
simplicity if every subproblem ะด โ 2 f satis๏ฌes the following conditions:
(S1) X โ (ะด) โ โkโ1 if ะด is k-objective,
(S2) ะด|X โ (ะด) : X โ (ะด) โ Rk is an embedding.
n
o
ร
Here, โkโ1 = (x 1 , . . . , xk ) โ [0, 1]k | xi = 1 is the standard
(k โ 1)-simplex. By A โ B, we denote that topological spaces A
and B are homeomorphic, which is de๏ฌned as there are continuous maps ฯ : A โ B and ฯ : B โ A such that ฯฯ = idA and
ฯฯ = idB . Such maps, ฯ and ฯ, are called homeomorphisms. The
topology of X โ (ะด) is induced from the variable space Rn . That is,
any open set U in X โ (ะด) can be written as U = V โฉ X โ (ะด) with
some open set V in Rn under the Euclidean topology. Similarly,
all spaces discussed in this paper are implicitly equipped with induced topologies from either the variable space Rn or the objective
space Rm . By ฯ|Aโฒ : Aโฒ โ B, we denote the restriction of a map
ฯ : A โ B to a set Aโฒ โ A, which is the composite ฯฮน : Aโฒ โ B
with the inclusion map ฮน : Aโฒ ึโ A, a 7โ a. The embedding of A to
Simple Problems
GECCO โ17 Companion, July 15-19, 2017, Berlin, Germany
X*(f1, f2, f3)
2
f1(x)
f2(x)
1.5
minimize
x 1 , x 2 โ[โ2, 2]
1
RGB(x ) = (y1 (x ), y2 (x ), y3 (x ))
(
(f i โ ะด)
f i โ f i (x ) / f i โ f i
yi (x ) =
0
(f i < ะด)
f i = max f i (x ) | x โ X โ (ะด) + 1e-16
f i = min f i (x ) | x โ X โ (ะด)
f3(x)
0.5
+ 3(x 2 โ 1)2
x 12
x2
f 1 (x ) =
x 22
f 2 (x ) = 2(x 1 โ 1)2 +
0
-0.5
-1
f 3 (x ) = 3(x 1 + 1)2 + 2(x 2 + 1)2
-1.5
-2
-2
-1.5
-1
-0.5
0
0.5
1
1.5
2
x1
X*(f1, f2)
2
1.5
1.5
0.5
0.5
0.5
x2
1
-0.5
0
-0.5
-1
-1
-1
-1.5
-1.5
-2
-2
-1.5
-1
-0.5
0
0.5
1
1.5
2
-2
-2
-1.5
-1
-0.5
x1
0
0.5
1
1.5
2
-2
1.5
1.5
0.5
0.5
-0.5
x2
0.5
x2
1
0
0
-0.5
-1
-1
-1.5
-1.5
-2
0
0.5
1
1.5
2
1
1.5
2
X*(f3)
f3(x)
0
-1
-0.5
0.5
-0.5
-1.5
-2
0
1.5
1
-1
-0.5
2
f2(x)
1
-1.5
-1
x1
X*(f2)
2
f1(x)
-2
-1.5
x1
X*(f1)
2
x2
0
-0.5
-1.5
-2
f1(x)
f3(x)
1.5
1
0
X*(f3, f1)
2
f2(x)
f3(x)
1
x2
x2
X*(f2, f3)
2
f1(x)
f2(x)
-2
-2
-1.5
-1
x1
-0.5
0
x1
0.5
1
1.5
2
-2
-1.5
-1
-0.5
0
0.5
1
1.5
2
x1
Figure 1: A simple 3-objective problem f = { f 1 , f 2 , f 3 } and its subproblem ะดโs Pareto set X โ (ะด). The Pareto sets are colored by
converting the f 1 , f 2 , f 3 -coordinates to RGB using the equations in the top-right cell.
are homeomorphic to โ0 , a point! A map on a one-point set always satis๏ฌes (S2); there is no special implication. Finally, there is
a 0-objective problem (not shown in Fig. 1) that corresponds to the
Let us cultivate the intuitive understanding of this de๏ฌnition
case of no objective function. This is just required for formality.
with Fig. 1. When considering a simple problem, we also deal with
Note that the conditions (S1) and (S2) only impose the problem
its subproblems optimizing all subsets of given objective functions.
structure within the Pareto set and admit an arbitrary structure
The ๏ฌrst subproblem is the original problem itself optimizing all
out of the Pareto set. This is contrastive to conventional probthe objectives. The example in the ๏ฌgure is 3-objective, and the
lem classes such as linear/convex/polynomial programming probcondition (S1) imposes that its Pareto set, X โ (f 1 , f 2 , f 3 ), is homeolems which regulate their structures over the entire domain. The
morphic to โ2 , a surface created by bending and stretching a trisimplicity is independent of those problem classes. In fact, evangle (without cutting and connecting). The condition (S2) guarery class of linear/convex/polynomial programming problems conantees that the restricted evaluation map f : X โ (f 1 , f 2 , f 3 ) โ
tains both of simple problems and non-simple problems! As a ref X โ (f 1 , f 2 , f 3 ) and its inverse map f โ1 : f X โ (f 1 , f 2 , f 3 ) โ X โ (f 1 , f 2 , f 3 ) sult, the simplicity characterizes a new aspect of โeasiness to solveโ.
are bijective, continuous, and thus homeomorphisms. This implies
3.2 Inclusion Properties
that the Pareto front, f X โ (f 1 , f 2 , f 3 ), is also homeomorphic to โ2 ,
and every point on f X โ (f 1 , f 2 , f 3 ) continuously corresponds to a
This section shows inclusion relations of the Pareto sets and its
unique solution on X โ (f 1 , f 2 , f 3 ) and vice versa. Next, we remove
images for subproblems of a simple problem. To isolate the conone of objectives, resulting in three 2-objective subproblems. Their
sequence of assuming the simplicity from general properties of
Pareto sets, X โ (f 1 , f 2 ), X โ (f 2 , f 3 ), X โ (f 3 , f 1 ), are homeomorphic to
Pareto-optimality, we begin without the assumption.
โ1 by (S1), a curve without loops. By (S2), their Pareto fronts are
Proposition 3.2. For any problem f (possibly non-simple) and
also a curve in which each point continuously corresponds to a
any
subproblem ะด โ f , the following relations hold:
unique Pareto solution. Again removing an objective, we get three
X โ (ะด) โ X w (ะด) โ X w (f )
1-objective subproblems. Their Pareto sets, X โ (f 1 ), X โ (f 2 ), X โ (f 3 ),
B is the composite ฮนฯ : A โ B of a homeomorphism ฯ : A โ B โฒ
and the inclusion map ฮน : B โฒ ึโ B.
GECCO โ17 Companion, July 15-19, 2017, Berlin, Germany
N. Hamada
where X w (ะด) is the weak Pareto set of ะด, that is, the set of points
each x โ X satisfying
โy โ X , โfi โ ะด : fi (x) โค fi (y).
(2)
Proof. The ๏ฌrst inclusion, X โ (ะด) โ X w (ะด), is a well-known fact
(see, for example, Miettinen [17] Section 2.5). The second relation,
X w (ะด) โ X w (f ), directly follows from (2).
In the de๏ฌnition of simplicity, the conditions (S1) and (S2) are imposed on all subproblems as well as a given problem, which means
that the subproblems inherit the simplicity from the superproblem.
Proposition 3.7. If a problem f is simple, then any subproblem
ะด โ f is simple.
Proof. If ะด โ f , then 2ะด โ 2 f . Thus, if all the problems in 2 f
satisfy (S1) and (S2), then also do in 2ะด , which implies that if f is
simple, then ะด is.
However, it does not hold that X โ (ะด) โ X โ (f ) in general.
Example 3.3. Consider a 1-variable 2-objective problem
minimize f 1 (x) = 0, f 2 (x) = x.
x โ[0, 1]
Clearly, the Pareto sets are X โ (f 1 ) = [0, 1] and X โ (f 1 , f 2 ) = {0},
which implies X โ (f 1 ) * X โ (f 1 , f 2 ).
In contrast, simple problems do not have such ill-behaved solutions.
Proposition 3.4. If a problem f is simple, then
X w (f ) = X โ (f ).
Proof. From Proposition 3.2, we have X w (f ) โ X โ (f ). We
will prove X w (f ) โ X โ (f ) by contradiction. Suppose that a point
x โ X w (f ) \ X โ (f ) exists. Then, since x is weakly Pareto-optimal,
the condition
โy โ X , โfi โ f : fi (x) โค fi (y)
(3)
holds. On the other hand, since x is not Pareto-optimal, the condition
โy โ X \ {x } , โfi โ f : fi (y) โค fi (x)
(4)
holds. A point y in (4) should satisfy (3), which means
โfi โ f : fi (y) = fi (x).
By (3), we have x โ X โ (fi ) and thus y โ X โ (fi ). This contradicts
(S2); more speci๏ฌcally, fi cannot be an injection on X โ (fi ).
Therefore, the simplicity ensures the inclusion relationship of
Pareto sets.
Proposition 3.5. For a simple problem f and any subproblem
ะด โ f , it holds that
X โ (ะด) โ X โ (f ).
Proof. Combine Proposition 3.2 with Proposition 3.4.
Therefore, propositions that hold for a simple problem also hold
for its subproblems. For example, the actual assertion of Proposition 3.4 is that any subproblem of f , as well as f itself, does not
have a weakly Pareto-optimal point which is not Pareto-optimal.
The interpretation of Proposition 3.6 is bit more complicated: given
a simple problem h, the assertion holds for any pair of problems
f , ะด such that ะด โ f โ h. Henceforth, we will not repeat this
property, but it is always valid when propositions involve simple
problems.
Similarly to that the empty set is a subset of every set, a 0objective problem is a subproblem of every problem. Therefore,
if 0-objective problems do not exist or are not simple, then there
cannot exist any simple problem. Let us check them.
Proposition 3.8. There exists a 0-objective problem โ
; it is unique
and simple.
Proof. The existence and the uniqueness follow from those of
the empty set and empty map. Let us check the simplicity. Since
the only subproblem of โ
is โ
itself, it su๏ฌces to show that โ
satis๏ฌes (S1) and (S2).
(S1): Since โ
is the 0-objective problem, it su๏ฌces to show X โ (โ
) โ
โ1
โ . It holds indeed as โโ1 = โ
and X โ (โ
) = โ
.
(S2): By X โ (โ
) = โ
, the restricted evaluation map, โ
|X โ (โ
) :
โ
X (โ
) โ R0 , is the evaluation map โ
: โ
โ R0 itself. Since
โ
: โ
โ R0 can be decomposed into a homeomorphism id : โ
โ โ
and an inclusion map ฮน : โ
ึโ R0 as โ
= ฮนid, the restriction
โ
|X โ (โ
) : X โ (โ
) โ R0 is an embedding.
Using this fact, we can see the topology of the image of the
Pareto set. Although, the condition (S1) itself addresses only the
topology of the Pareto set, combined with (S2), we show that the
Pareto front and the image in the superproblem have the same
topology.
Now we have con๏ฌrmed that for each subproblem, the Pareto
set and its image are well-behaved. The next section investigates
that those solutions are nicely glued together.
Proposition 3.6. For a simple problem f and any subproblem
ะด โ f , if ะด is k-objective, then
The goal of this section is to give a proof that the solutions to a
simple problem have a special gluing structure as shown in Figs. 2
and 3. This structure is an analogy of the faces of a simplex. A
2-simplex [v 1 ,v 2 , v 3 ] is a triangle spanned by vertices v 1 ,v 2 ,v 3
and its boundary โ[v 1 ,v 2 ,v 3 ] is the union of three edges, or 1simplices, [v 1 ,v 2 ], [v 2 , v 3 ], [v 3 ,v 1 ]. Each edge [vi , v j ] has the boundary consisting of two points, or 0-simplices, [vi ] and [v j ]. The
boundary of each vertex [vk ] is the empty set, or the (โ1)-simplex.
We can expand these relations using A = int A โ โA and see that
the boundary of a simplex is expressed as the disjoint union of the
X โ (ะด) โ ะดX โ (ะด) โ f X โ (ะด) โ โkโ1 .
Proof. By De๏ฌnition 3.1, X โ (ะด) โ ะดX โ (ะด) โ โkโ1 is evident.
We will show the nontrivial part: X โ (ะด) โ f X โ (ะด). It su๏ฌces to
show that the restriction f |X โ (ะด) is an embedding. Remember that
the restriction f |X โ (f ) is an embedding by de๏ฌnition and X โ (ะด) โ
X โ (f ) in Proposition 3.5. In general, any restriction of an embedding is again an embedding.
3.3 Gluing Properties
Simple Problems
GECCO โ17 Companion, July 15-19, 2017, Berlin, Germany
open faces:
X*( f3)
โ[v 1 ,v 2 ,v 3 ] =
int[v 1 ,v 2 ] โ int[v 2 ,v 3 ] โ int[v 3 ,v 1 ]
X*( f2, f3)
โ int[v 1 ] โ int[v 2 ] โ int[v 3 ].
Generally, Pareto sets and their images may have a more complex topological structure. However, for a simple problem, we have
seen in Proposition 3.6 that those form topological manifolds with
boundary (hereafter, simply call manifolds) homeomorphic to a
simplex. In a k-manifold M, a point having an open neighborhood
homeomorphic to Rk is called an interior point, and the set of all
interior points is called the interior of M, denoted by int M. The
other points are boundary points having an open neighborhood
homeomorphic to [0, โ) ร Rkโ1 , and the set of all boundary points
is called the boundary of M, denoted by โM. For a simple problem,
a similar relation holds among Pareto sets as shown in Fig. 2:
โX โ (f 1 , f 2 , f 3 ) =
int X โ (f 1 , f 2 ) โ int X โ (f 2 , f 3 ) โ int X โ (f 3 , f 1 )
โ int X โ (f 1 ) โ int X โ (f 2 ) โ int X โ (f 3 ).
(5)
X*( f3, f1)
X*( f1, f2, f3)
X*( f2)
X*( f1 , f2)
X*( f1)
Figure 2: A simple 3-objective problem f = {f 1 , f 2 , f 3 } and its
gluing structure of the Pareto sets X โ (ะด) of subproblems ะด โ
f . The boundary of the Pareto set X โ (ะด) of each subproblem
ะด โ f consists of the Pareto sets X โ (h) of all subproblems
h โ ะด.
fX*( f2)
fX*( f1 , f2)
The same relation holds for the images as shown in Fig. 3:
fX*( f1)
โ f X โ (f 1 , f 2 , f 3 ) =
int f X โ (f 1 , f 2 ) โ int f X โ (f 2 , f 3 ) โ int f X โ (f 3 , f 1 )
โ int f X โ (f 1 ) โ int f X โ (f 2 ) โ int f X โ (f 3 ).
fX*( f1, f2, f3)
(6)
It is known that such a gluing structure of solutions commonly
appears in facility location problems, studied for a long time (see
for example Rodrฤฑฬguez-Chฤฑฬa et al. [22] and the references therein).
It is also seen in other applications and exploited as a heuristic for
practitioners [5].
Now we start to show (5) and (6) for an arbitrary number of
objectives. First of all, let us see some basic properties of the Pareto
front that hold for any class of problems.
Lemma 3.9. For an m-objective (possibly non-simple) problem f
whose Pareto front f X โ (f ) forms an (m โ 1)-manifold, the projection
Rm
โ Ri โ1 ร {0} ร Rmโi โ Rmโ1 ,
ฯโi :
(y1 , . . . , ym ) 7โ (y1 , . . . , yi โ1, 0, yi +1, . . . , ym )
restricted to int f X โ (f ) is an embedding.
Proof. Generally, any projection and its restriction to any open
set are continuous and open, and any injective continuous open
map is an embedding. Thus, it su๏ฌces to show that ฯโi is injective
when restricted to int f X โ (f ). If ฯโi |int f X โ (f ) is not injective, then
int f X โ (f ) contains two points having the same coordinates except for the i-th value. This means that one point f -dominates another, contradicting the de๏ฌnition of the Pareto front f X โ (f ).
This lemma asserts that the interior of the Pareto front can be
๏ฌattened while keeping its topology and ordering. As shown in
Fig. 4, the projection induces a coordinate neighborhood (ฯโi , U )
at any point y โ int f X โ (f ) where for any points y, y โฒ โ U , it holds
that y j โค y jโฒ โ ฯโi (y)j โค ฯโi (y โฒ)j for all j , i. This property is
the key to investigate the interaction between the topology and
the dominance-ordering on the interior of the Pareto front.
fX*( f2, f3)
fX*( f3, f1)
fX*( f3)
Figure 3: A simple 3-objective problem f = {f 1 , f 2 , f 3 } and
its gluing structure of the Pareto set images f X โ (ะด) for all
subproblems ะด. Although the shape is di๏ฌerent from Fig. 2,
the topology is the same.
Lemma 3.10. Consider an m-objective (possibly non-simple) problem f whose Pareto front f X โ (f ) forms an (m โ 1)-manifold. The
following statement holds for any y โ int f X โ (f ): any neighborhood
U โ f X โ (f ) of y has a point that ะด-dominates y and is (f \ ะด)dominated by y for each ะด such that โ
โ ะด โ f .
Proof. By Lemma 3.9, the projection ฯโi restricted to f X โ (f )
is an embedding, and thus ฯโi (U ) is a neighborhood of a point
ฯโi (y) in Rmโ1 . Then, we can take an (m โ 1)-hyper-cube centered
at ฯโi (y) in f X โ (f ) and can write its vertices as (y1 ยฑ ฮต, . . . , yi โ1 ยฑ
ฮต,yi +1 ยฑ ฮต, . . . , ym ยฑ ฮต). Here, ฮต is a small positive number and
signs, ยฑ, run over all possible combinations. Among these vertices,
let ฯโi (v) be the one such that coordinates related to ะด โ f โi =
f \ { fi } are โฮต and related to f โi \ ะด are +ฮต. Thus, it holds that
y โปะด v and y โบ(f โi \ะด) v. Especially, ะด = f โi implies y โบfi v and
ะด = โ
implies y โปfi v. Otherwise, it means that y โบ f v or y โป f v,
contradicting y,v โ f X โ (f ). Repeating the above argument for all
i, we complete the proof.
GECCO โ17 Companion, July 15-19, 2017, Berlin, Germany
ฯ-1
ฯ-2
1
0.5
f3
fX*(f)
0
U
ฯ-3
0
y
0.2
0.4
0.6
0
0.2
0.4
f2
f1
0.8
0.6
0.8
1 1
Figure 4: A 3-objective (possibly non-simple) problem f =
{ f 1 , f 2 , f 3 } and its Pareto front projections. The projection
ฯโi restricted to int f X โ (f ) is injective and thus an embedding. By this fact, any interior point y and its neighborhood
U in f X โ (f ) are mapped to an interior point ฯโi (y) and its
neighborhood ฯโi (U ) in ฯโi f X โ (f ).
Other than the Pareto front f X โ (f ), do Lemmas 3.9 and 3.10
extend to the Pareto set image f X โ (ะด) of a subproblem ะด โ f ?
The answer is NO: for general problems, the projection ฯโi is not
an embedding of int f X โ (ะด).
Example 3.11. Again consider the problem in Example 3.3:
minimize f 1 (x) = 0, f 2 (x) = x.
x โ[0, 1]
The Pareto set of the subproblem f 1 is X โ (f 1 ) = [0, 1], and its image is f X โ (f 1 ) = {(0, y) | 0 โค y โค 1}. The interior int f X โ (f 1 ) =
{(0, y) | 0 < y < 1} can be projected to ฯโ2 int f X โ (f 1 ) = f 1X โ (f 1 ) =
{0}, which implies ฯโ2 |int f X โ (f1 ) is not injective and thus not an
embedding. Furthermore, since X โ (f 1 , f 2 ) = {0}, we see that the
set X โ (f 1 ) \ X โ (f 1 , f 2 ) = (0, 1] is weakly Pareto-optimal and not
Pareto-optimal in f . The existence of these weak Pareto optima
disrupts the injectivity of ฯโ2 .
Contrary, if the problem is simple, then there are no solutions
that are weakly Pareto-optimal and not Pareto-optimal, which enable us to extend Lemmas 3.9 and 3.10 to the image f X โ (ะด).
Corollary 3.12. Consider a simple problem f and a subproblem
ะด โ f . The restriction of the projection ฯโi to int f X โ (ะด) is an embedding.
Proof. If ฯโi |int f X โ (ะด) is not injective, then int f X โ (ะด) contains two points that have the same coordinates except for the i-th
value. This means that f has a weak Pareto solution which is nonPareto, contradicting Proposition 3.4.
Corollary 3.13. Consider a simple problem f and a subproblem ะด โ f . For any y โ int f X โ (ะด), the following statement holds:
for any neighborhood U โ f X โ (ะด) of y, there exists a point that
h-dominates y and is (ะด \ h)-dominated by y for each h such that
โ
โ h โ ะด.
N. Hamada
Proof. Chose an objective function fi โ f \ ะด and let the remaining set be f โi = f \{ fi }. By Corollary 3.12, f X โ (ะด) is mapped
to f โi X โ (ะด) by ฯโi , homeomorphically. Next,
chose another f j โ
f โi \ะด and let the remainder be f โi j = f โi \ f j . Again by Corollary 3.12, f โi X โ (ะด) is mapped to f โi j X โ (ะด) by ฯโj , homeomorphically. Though the repeated application of projections as long as it
is an embedding, the original Pareto set image is ๏ฌnally mapped to
ะดX โ (ะด). Let the composite of used projections ฯโi , ฯโj , . . . be ฯโโ .
Generally, the composite of embeddings is again an embedding.
Thus, a point y โ int f X โ (ะด) and its neighborhood U โ f X โ (ะด) is
mapped homeomorphically to a point ฯโโ (y) โ int ะดX โ (ะด) and its
neighborhood ฯโโ (U ) โ ะดX โ (ะด). Proposition 3.6 asserts ะดX โ (ะด) โ
โ |ะด |โ1 , which together with Lemma 3.10 completes the proof.
By this property, we can see the simplicity ensures that Pareto
set images of subproblems are located on the boundary of their
superproblems.
Lemma 3.14. For a simple problem f and subproblems ะด, h such
that h โ ะด โ f , the following relation holds:
โ f X โ (ะด) โ f X โ (h).
Proof. Suppose there exists a point y โ f X โ (h) that is an interior point of f X โ (ะด). Now, y โ int f X โ (ะด) and h โ ะด holds and
thus by Corollary 3.13, some neighborhood U โ f X โ (ะด) of y has a
point h-dominating y. This contradicts y โ f X โ (h).
Our next question is whether a similar relation holds for the
Pareto set before mapped by f . To check this, we need the following lemma:
Lemma 3.15. For a simple problem f and a subproblem ะด โ f ,
the map f commutes with the boundary and interior:
f โX โ (ะด) = โ f X โ (ะด),
โ
โ
f int X (ะด) = int f X (ะด).
(7)
(8)
Proof. Generally, an embedding maps boundary to boundary
and interior to interior. Now f is an embedding on X โ (ะด) โ X โ (f ),
and thus it holds that f โ = โ f and f int = int f .
Using this fact, we show that under the simplicity, Pareto sets
of subproblems have the same relation as its images.
Corollary 3.16. For a simple problem f and a (proper!) subproblem ะด โ f , the following relation holds:
โX โ (f ) โ X โ (ะด).
Proof. Since f is an embedding on X โ (f ), there is the inverse
map f โ1 : f X โ (f ) โ X โ (f ). Lemma 3.15 converts Lemma 3.14 to
the assertion as follows:
โ f X โ (f ) โ f X โ (ะด)
โ
f โX โ (f ) โ f X โ (ะด)
โ1
โ f f โX โ (f ) โ f โ1 f X โ (ะด)
โ
โX โ (f ) โ X โ (ะด).
The last key to the main theorem is the sphere embedding.
Lemma 3.17. Every embedding f : S n โ S n is surjective and thus
a homeomorphism where S n is an n-sphere S n = x โ Rn+1 | kx k = 1 .
Simple Problems
GECCO โ17 Companion, July 15-19, 2017, Berlin, Germany
Proof. Suppose f is not surjective. Then, there exists a point
y โ S n \ f (S n ) and a stereographic projection with north pole
y, denoted by ฯ : S n \ {y} โ Rn . Generally, any stereographic
projection is an embedding, and the composite of embeddings is
an embedding. Therefore, ฯ f is an embedding of S n into Rn . This
contradicts the well-known fact that S n cannot be embedded into
Rn .
Remark 1. To keep the proof elementary, here we assumed that
S n ึ6 โ Rn is known and derived that S n ึโ S n is surjective. There
is an alternative proof deriving both by the Mayer-Vietoris exact sequence in a uni๏ฌed fashion. Consult Hatcher [9], the two paragraphs
after the proof of Proposition 2B.1 (pp. 169โ170).
Now, we show the goal of this section.
Theorem 3.18. For a simple problem f and a subproblem ะด โ f ,
it holds that
โX โ (ะด) =
ร
int X โ (h),
(9)
h โะด
โ f X โ (ะด) =
ร
int f X โ (h).
Proof. First, we show (10). What to be proven are:
(a) if h , h โฒ , then int f X โ (h) โฉ int f X โ (h โฒ ) = โ
,
ร
(b) โ f X โ (ะด) = h โะด int f X โ (h).
(a) When h โ h โฒ, it holds from Lemma 3.14 that โ f X โ (h) โ
f X โ (h โฒ ). The same holds for the inverse case h โ h โฒ. We thus
consider the case there is no inclusion relation between h and h โฒ.
Assume there exists a point y โ int f X โ (h) โฉ int f X โ (h โฒ ), and let
U be a neighborhood ofy in f X โ (h โชh โฒ ). If there exists a point z โ
U \ f X โ (h) โช f X โ (h โฒ ) , then y โบh z and y โบh โฒ z hold, implying
y โบ(hโชhโฒ ) z. This contradicts z โ U โ f X โ (h โช h โฒ ). If z does not
exist, then the dimension of U must be equal to that of f X โ (h) or
f X โ (h โฒ ), which contradicts dim U = h โช h โฒ โ 1. Consequently,
such y cannot exist.
(b) Since Lemma 3.14 states โ f X โ (ะด) โ f X โ (h), we have
โ f X โ (ะด) โ
f X โ (h)
h โะด
โ
ร
From the second to third lines, we used the general property of a
map f (A) โช f (B) = f (A โช B).
3.4 Relation to Scalarization
Equations (7)โ(10) together de๏ฌne a gluing structure of the Pareto
sets and their images of subproblems of a simple problem. This
structure induces a natural strati๏ฌcation1 of the Pareto set (resp.
the Pareto front) where each stratum is the interior of the Pareto
set (resp. its image) of a subproblem. Therefore, we can numerically compute the strati๏ฌcation by solving each subproblem. Points
spreading over all strata can be a good covering of the Pareto set/front.
To see why this structure enables decomposition-based EMO
algorithms to cover the Pareto set/front, consider the weighted
Tchebyshev-norm scalarization
minimize fw (x) = max wi (fi (x) โ z i )
(10)
h โะด
ร
We can get (9) by converting (10) with Lamma 3.15:
ร
โ f X โ (ะด) = h โะด int f X โ (h)
ร
โ
โ
f โX (ะด) = h โะด f int X โ (h)
ร
โ
f โX โ (ะด) = f h โะด int X โ (h)
โ1
โ1 ร
โ
โ f f โX (ะด) = f f h โะด int X โ (h)
ร
โ
โX โ (ะด) = h โะด int X โ (h).
int f X โ (h).
h โะด
ร
Thus, there is the inclusion map ฮน : h โะด int f X โ (h) ึโ โ f X โ (ะด).
Generally, any inclusion map is an embedding. Combining (a) with
Lemma 3.14, we have f X โ (h) โฉ f X โ (h โฒ ) = f X โ (h โฉ h โฒ ). Therefore,
ร
โ
h โะด int f X (h) is the union of manifolds each homeomorphic to
a simplex, which are glued as the faces of a simplex. This fact enร
sures h โะด int f X โ (h) โ โโ |ะด |โ1 โ S |ะด |โ2 . Contrary, f X โ (ะด) โ
โ |ะด |โ1 implies โ f X โ (ะด) โ โโ |ะด |โ1 โ S |ะด |โ2 . As Lemma 3.17 ensures that S n ึโ S n is surjective, the inclusion map ฮน is surjective,
ร
implying that h โะด int f X โ (h) = โ f X โ (ะด) holds.
i
x โX
(11)
where the weight w = (w 1 , . . . , wm ) is chosen from โmโ1 and the
utopian point is ๏ฌxed to be z i = inf x โX fi (x). Let ei be the i-th
standard base in Rm whose i-th coordinate is one and the other
coordinates are zero. The standard (m โ 1)-simplex is rewritten
as โmโ1 = [e 1 , . . . , em ]. Using the notation of the weight-optima
correspondence
ร
X โ (fw ),
S(W ) =
w โW
a well-known fact of the optima to (11) can be written as
S([ei 1 , . . . , ei k ]) = X w (fi 1 , . . . , fi k )
(12)
for any choice of an arbitrary number of indices i 1 , . . . , i k โ {1, . . . ,m}.
If the problem is simple, then we can go further: Proposition 3.4
extends (12) to
S([ei 1 , . . . , ei k ]) = X โ (fi 1 , . . . , fi k ),
and by Corollary 3.16 we have
S(โ[ei 1 , . . . , ei k ]) = โX โ (fi 1 , . . . , fi k ).
Therefore, a weight on each face gives a boundary point of each
stratum with corresponding indices.
Unfortunately, the Lโ -norm, as well as other existing scalarization methods including the weighted sum, the augmented Chebyshevnorm, PBI [33], and IPBI [23], does NOT give the correspondence
between the interiors:
S(int[ei 1 , . . . , ei k ]) , int X โ (fi 1 , . . . , fi k ).
Nevertheless, once boundary points of a stratum are obtained, we
can ๏ฌnd new weights corresponding to interior points of the stratum by interpolating the weights used for the boundary points.
Thus, the grid arrangement or divide-and-conquer generation of
weights over [ei 1 , . . . , ei k ] practically often hit interior points of
X โ (fi 1 , . . . , fi k ).
1 The
smoothness of the strati๏ฌcation is determined from that of the evaluation map.
GECCO โ17 Companion, July 15-19, 2017, Berlin, Germany
4
SIMPLICITY OF BENCHMARKS
This section investigates the simplicity of benchmark problems
widely-used in the EMO community: ZDT suite [34], DTLZ suite [4],
WFG suite [10], and MED problem [7].
4.1
N. Hamada
Proof. Every problem has an objective function ignoring some
variables as follows:
DTLZ1โ6: fm (y, z) = (1 + ะด(z))f (y1 )
DTLZ7: f 1 (y, z) = y1
DTLZ8, 9: f 1 (y, z) = y10.1 + y20.1 + ยท ยท ยท + y 0.1
โn/m โ
ZDT Suite
The ZDT suite has six n-variable 2-objective problems named ZDT1โ
6. The decision variables are split into the position variables y =
(y1 , . . . , yk ) (0 < k < n) and the distance variables z = (z 1 , . . . , z l )
(l = n โ k), de๏ฌning the problems in the following uni๏ฌed format:
minimize f (y, z) = (f 1 (y, z), f 2 (y, z)),
Therefore, DTLZ1โ9 are all non-simple.
Furthermore, Huband et al. [10] Table VII shows that DTLZ1โ6
has f that is not injective on X โ (f ) and DTLZ7 has a disconnected
Pareto front. This is another evidence for the non-simplicity of
DTLZ1โ7.
(y,z)โY รZ
4.3 WFG Suite
where f 1 (y, z) = f (y1 ),
f 2 (y, z) = ะด(z)h(f 1 (y),ะด(z)),
The WFG suite contains nine problems, WFG1โ9, having the form:
minimize f (x) = (f 1 (x), . . . , fm (x)),
X = Y ร Z = (Y1 ร ยท ยท ยท ร Yk ) ร (Z 1 ร ยท ยท ยท ร Zl ),
Y1 = [0, 1],
(
[โ5, 5]
Y2 , . . . , Yk , Z 1 , . . . , Zl =
[0, 1]
(y,z)โY รZ
where fi (x) = xm + 2i ร hi (x 1 , . . . , xmโ1 ),
Y
โ X 1 ร ยท ยท ยท ร Xmโ1 ,
tY :
(y1, . . . , yk ) 7โ (x 1 , . . . , xmโ1 ),
Z
โ Xm ,
tZ :
(z 1, . . . , z l ) 7โ xm ,
(ZDT4),
(otherwise).
Users can make di๏ฌerent problems by changing placeholder functions f , ะด, h. For the concrete speci๏ฌcation of f , ะด, h for ZDT1โ6,
see Zitzler et al. [34]. The above general formulas are enough to
show that the problems are non-simple.
X = X 1 ร ยท ยท ยท ร Xm = [0, 1]m ,
Y = [0, 2] ร [0, 4] ร ยท ยท ยท ร [0, 2k],
Z = [0, 2k + 2] ร [0, 2k + 4] ร ยท ยท ยท ร [0, 2n].
Theorem 4.1. ZDT1โ6 are all non-simple, independent of the choice
of variable dimension n and position-variable dimension k. Additionally, this suite cannot create simple problems no matter how f , ะด, h
are speci๏ฌed unless their domains are modi๏ฌed.
Proof. First, we exclude ZDT5 from the following analysis since
it is a binary-variable problem which is clearly non-simple. Then,
for ZDT1โ4, 6, the function f de๏ฌning f 1 depends on a single variable, y1 . The other variables can take an arbitrary value on the
optima of f , and thus X โ (f 1 ) = Y1โ (f ) ร Y2 ร ยท ยท ยท ร Yk ร Z . This
means X โ (f 1 ) 6โ โ0 and contradicts the simplicity condition (S1).
Consequently, ZDT1โ6 are all non-simple.
The reason why this suite cannot be simple is that f depends
only on y1 . Generally, when the problem has an objective function
independent of some variables, its Pareto set extends to higher dimensions than usual, contradicting the simplicity condition (S1).
The existence of unused variables is a quick test for non-simplicity.
4.2
DTLZ Suite
The DTLZ suite consists of nine problems named DTLZ1โ9. Their
decision variables are split into position variables y and distance
variables z, as ZDT, but the number of objectives m can be set arbitrarily. See Deb et al. [4] for de๏ฌnition.
Theorem 4.2. DTLZ1โ9 are all non-simple, independent of the
choice of variable dimension n, objective dimension m, and positionvariable dimension k.
The functions h 1 , . . . , hm , tY , t Z are placeholders. In this suite, the
variables y and z are mapped by the transformation functions tY
and t Z to the position variables x 1 , . . . , xmโ1 and the distance variable xm , then passed to the objective functions fi . For this reason,
y and z are called the position-related variables and the distancerelated variables, respectively. For the concrete de๏ฌnition, see Huband
et al. [10].
Theorem 4.3. WFG2, 4, 5, 9 are always non-simple. WFG1, 3,
6โ8 are simple if and only if the dimension of the position-related
variables y is k = 1. Here, one can set k = 1 only when the number
of objectives is m = 2 because Huband et al. [10] Table XIV shows
that these problems require k mod (m โ 1) = 0.
Proof. First, consider WFG2. Huband et al. [10] Table XIV
shows that WFG2 has a disconnected Pareto front. Such a front
cannot be homeomorphic to โmโ1 , which contradicts the property
of a simple problem shown in Proposition 3.6. The following discussion treats the rest of the problems.
Let us check the properties of the Pareto set X โ (f ) in the transformed variable space X = [0, 1]m and the map f on X โ (f ). As
described in Huband et al. [10], all problems2 have
X โ (f ) = [0, 1]mโ1 ร {0} .
By the properties of the shape functions hi shown in Huband et al. [10]
Table X, f is an embedding upon X โ (f ) if and only if m = 2.3 For
2 As
opposed to Huband et al. [10], WFG2 actually has a di๏ฌerent Pareto set in which
x 1 is conditioned to be Pareto-optimal. To avoid a complication caused by this di๏ฌerence, we ๏ฌrst ๏ฌnished WFG2.
3 Except for Disconnected used only in WFG2.
Simple Problems
GECCO โ17 Companion, July 15-19, 2017, Berlin, Germany
4.4 MED
m > 2, it holds that
f (0, x 2 , . . . , xmโ1 , 0) = 0,
and thus f is not injective on X โ (f ).
Since the transformation functions, tY and t Z , are surjective as
described in Huband et al. [10], the composite evaluation map f t :
(tY ,tZ )
This is a single problem, MED, de๏ฌned as follows:
minimize
f (x) = (f 1 (x), . . . , fm (x)),
n
x โX =R
where fi (x) = x โ xiโ
xiโ
f
Y ร Z โโโโโโโ X โ
โ Rm is not injective on the Pareto set (Y ร
Z )โ (f t) in the untransformed variable space Y ร Z for m > 2. This
does not meet the simplicity condition (S2).
In the case of k > m โ1, the transformation function tY involves
Reduction: Weighted Sum or Reduction: Non-separable to
decrease the dimension of Y . By examining Huband et al. [10] Table XI, we can see that both functions are not injective. Therefore,
tY maps two di๏ฌerent points y, y โฒ โ Y to the same Pareto solution
(x 1 , . . . , xmโ1 ) โ [0, 1]mโ1 , contradicting the simplicity condition
(S2).
There remains the case k = 1 and m = 2 where the problems
may be simple. First, let us consider the 1-objective subproblems.
From Huband et al. [10] Table X, we have
X โ (f 1 ) = {(0, 0)} ,
X โ (f 2 ) = {(1, 0)} .
This implies that the simplicity condition (S1) for these problems
is equivalent to the following criterion:
tYโ1 (0), tYโ1 (1), t Zโ1 (0) are all a point.
Since (S2) automatically follows from (S1) when the problem is 1objective, the above criterion is a necessary and su๏ฌcient condition for the simplicity. We can see from Huband et al. [10] Table XI
that tYโ1 (0) and t Zโ1 (0) are always a point, but it depends on the case
whether tYโ1 (1) is a point or not. WFG4, 5, 9 introduce Shift: Deceptive or Shift: Multi-modal into tY , making tYโ1 (1) not a point.
Thus, these problems are non-simple. For WFG1, 3, 6โ8, tYโ1 (1) becomes a point, and their 1-objective subproblems are simple. Next,
let us consider their 2-objective subproblems. It holds that
X โ (f 1 , f 2 ) = [0, 1] ร {0} ,
and it has been con๏ฌrmed that f = {f 1 , f 2 } is an embedding on
X โ (f 1 , f 2 ) and t Zโ1 (0) is a point. Therefore, the equivalent condition
to the simplicity is as follows:
tYโ1 : [0, 1] โ [0, 2] embedding.
For k = 1 and m = 2, the transformation function tY in WFG1, 3,
6โ8 can be simpli๏ฌed into the form tY (y) = y ฮฑ . Thus, its inverse,
tYโ1 (x) = x 1/ฮฑ , is an embedding. Now, we have checked that WFG1,
3, 6โ8 are simple if and only if k = 1 and m = 2.
Note that Huband et al. [10] Table XIV describes that WFG3
has a degenerate Pareto front, which seems to be an evidence that
WFG3 is always non-simple. However, the degeneracy actually
occurs only when m > 2. In our analysis for m = 2, the Pareto
front of WFG3 forms a line segment, which does not disrupt the
simplicity.
pi
,
= (0, . . . , 0, 1 , 0, . . . , 0),
| {z } | {z }
i โ1
(13)
nโi
0 < pi < โ.
The front-shape parameters, pi , which determine the convexity of
the Pareto front, are user-speci๏ฌed parameters as well as the variable dimension n and the number of objectives m.
Theorem 4.4. MED is always simple independent of the choice of
parameters n,m,pi . Additionally, changing individual optima, xiโ ,
does not break the simplicity as long as they are a๏ฌnely independent.
Proof. First, consider the case of pi = 1. This corresponds to a
facility location problem under the L2 -norm. The Pareto set of this
โ [32]. Thus, if
problem is known as the convex hull of x 1โ , . . . , xm
โ
โ
m โค n + 1 holds and x 1 , . . . , xm are a๏ฌnely independent, then the
โ . Indeed,
convex hull is the (m โ 1)-simplex spanned by x 1โ , . . . , xm
by the de๏ฌnition of xiโ , this problem can be de๏ฌned only when
โ are a๏ฌnely independent. Thus, the Pareto
m โค n, and x 1โ , . . . , xm
โ
set X (f ) is an (m โ 1)-simplex, which ensures that the problem
f satis๏ฌes the simplicity condition (S1). Analyzing the gradient of
the L2 -norm, we can see that the map f is an embedding on X โ (f ),
which satis๏ฌes (S2). The same argument applies to the subproblems, con๏ฌrming that they satisfy (S1) and (S2); the problem f is
simple.
The case pi , 1 can be considered as the composite of fi in the
case of pi = 1 and the pi -th power. Since any positive power is an
order-preserving homeomorphism [0, โ) โ [0, โ), the composition preserves the simplicity of the facility location problem.
5 CONCLUSIONS
In this paper, we have discussed the simple problem and showed
that the Pareto sets of its subproblems (resp. their images) constitute a strati๏ฌcation of its Pareto set (resp. its Pareto front). This
topological property gives a theoretical guarantee that decompositionbased EMO algorithms can obtain an entire approximation of the
Pareto set as well as the Pareto front. We have also investigated the
simplicity of benchmark problems widely-used in the EMO community. All problems in the ZDT and DTLZ suites are non-simple.
The WFG suite contains ๏ฌve simple problems under a very restrictive situation but usually does not, whereas the MED problem is
always simple.
We believe that the absence of simple problems in the standard
benchmark suites is a considerable gap between the benchmark
and the real-world since there are many evidences that a large portion of nowadays applications seems to be simple. Additionally,
real-world applications involving simulations can be black-box; it
would be important to develop an estimation method for the simplicity of black-box problems from a ๏ฌnite set of approximate solutions.
GECCO โ17 Companion, July 15-19, 2017, Berlin, Germany
REFERENCES
[1] J. Benoist. 2003.
Contractibility of E๏ฌcient Frontier of Simply Shaded
Sets.
Journal of Global Optimization 25, 3 (2003), 321โ335. DOI:
http://dx.doi.org/10.1023/A:1022448811953
[2] W. de Melo. 1976. On the Structure of the Pareto Set of Generic Mappings.
Boletim da Sociedade Brasileira de Matemaฬtica โ Bulletin of the Brazilian Mathematical Society 7, 2 (1976), 121โ126. DOI:http://dx.doi.org/10.1007/BF02584786
[3] K. Deb and H. Jain. 2014.
An Evolutionary Many-Objective Optimization Algorithm Using Reference-Point-Based Nondominated Sorting Approach, Part I: Solving Problems With Box Constraints.
IEEE Transactions on Evolutionary Computation 18, 4 (Aug 2014), 577โ601. DOI:
http://dx.doi.org/10.1109/TEVC.2013.2281535
[4] K. Deb, L. Thiele, M. Laumanns, and E. Zitzler. 2005. Scalable Test Problems
for Evolutionary Multiobjective Optimization. In Evolutionary Multiobjective
Optimization, A. Abraham, L. Jain, and R. Goldberg (Eds.). Springer London,
105โ145. DOI:http://dx.doi.org/10.1007/1-84628-137-7 6
[5] R.M. Everson, D.J. Walker, and J.E. Fieldsend. 2013. Edges of Mutually Nondominating Sets. In Proceedings of the 15th Annual Conference on Genetic and
Evolutionary Computation (GECCO โ13). ACM, New York, NY, USA, 607โ614.
DOI:http://dx.doi.org/10.1145/2463372.2463452
[6] N. Hamada, Y. Nagata, S. Kobayashi, and I. Ono. 2010. Adaptive Weighted Aggregation: A Multiobjective Function Optimization Framework Taking Account of
Spread and Evenness of Approximate Solutions. In Proceedings of the 2010 IEEE
Congress on Evolutionary Computation (CEC 2010). 787โ794.
[7] N. Hamada, Y. Nagata, S. Kobayashi, and I. Ono. 2011. Adaptive Weighted Aggregation 2: More Scalable AWA for Multiobjective Function Optimization. In
Proceedings of the 2011 IEEE Congress on Evolutionary Computation (CEC 2011).
2375โ2382.
[8] N. Hamada, Y. Nagata, S. Kobayashi, and I. Ono. 2011. On Scalability of Adaptive
Weighted Aggregation for Multiobjective Function Optimization. In Proceedings
of the 2011 IEEE Congress on Evolutionary Computation (CEC 2011). 669โ678.
[9] A. Hatcher. 2002. Algebraic Topology. Cambridge University Press, Cambridge,
New York. http://opac.inria.fr/record=b1122188
[10] S. Huband, P. Hingston, L. Barone, and L. While. 2006. A Review of
Multiobjective Test Problems and a Scalable Test Problem Toolkit. IEEE
Transactions on Evolutionary Computation 10, 5 (Oct. 2006), 477โ506. DOI:
http://dx.doi.org/10.1109/TEVC.2005.861417
[11] T.C. Koopmans. 1951. Analysis of Production as an E๏ฌcient Combination of Activities. In Activity Analysis of Production and Allocation (Proceedings of a Conference) (Cowles Commission Monograph), T.C. Koopmans (Ed.). John Wiley &
Sons, Inc., New York, 33โ97.
[12] D. La Torre and N. Popovici. 2010. Arcwise Cone-Quasiconvex Multicriteria Optimization. Operations Research Letters 38, 2 (2010), 143โ146. DOI:
http://dx.doi.org/10.1016/j.orl.2009.11.003
[13] A. Lovison and F. Pecci. 2014. Hierarchical Strati๏ฌcation of Pareto Sets. ArXiv
e-prints (July 2014). arXiv:math.OC/1407.1755 http://arxiv.org/abs/1407.1755.
[14] T.J. Lowe, J.-F. Thisse, J.E. Ward, and R.E. Wendell. 1984. On E๏ฌcient Solutions to
Multiple Objective Mathematical Programs. Management Science 30, 11 (1984),
1346โ1349. DOI:http://dx.doi.org/10.1287/mnsc.30.11.1346
[15] D.T. Luc. 1989. Theory of Vector Optimization. Lecture Notes in Economics and
Mathematical Systems, Vol. 319. Springer-Verlag.
[16] C. Malivert and N. Boissard. 1994. Structure of E๏ฌcient Sets for Strictly Quasi
Convex Objectives. Journal of Convex Analysis 1 (1994), 143โ150.
[17] K.M. Miettinen. 1999. Nonlinear Multiobjective Optimization. International Series in Operations Research & Management Science, Vol. 12. Springer-Verlag,
GmbH.
[18] B. Peleg. 1972. Topological Properties of the E๏ฌcient Point Set. Proc. Amer.
Math. Soc. 35, 2 (1972), 531โ536. http://www.jstor.org/stable/2037641
[19] N. Popovici. 2005.
Pareto Reducible Multicriteria Optimization Problems.
Optimization 54, 3 (2005), 253โ263.
DOI:
http://dx.doi.org/10.1080/02331930500096213
[20] N. Popovici. 2006. Structure of E๏ฌcient Sets in Lexicographic Quasiconvex Multicriteria Optimization. Operations Research Letters 34, 2 (2006), 142โ148. DOI:
http://dx.doi.org/10.1016/j.orl.2005.03.003
[21] N. Popovici. 2007.
Explicitly quasiconvex set-valued optimization.
Journal of Global Optimization 38, 1 (2007), 103โ118. DOI:
http://dx.doi.org/10.1007/s10898-006-9085-1
[22] A.M. Rodrฤฑฬguez-Chฤฑฬa and J. Puerto. 2002. Geometrical Description of the Weakly
E๏ฌcient Solution Set for Multicriteria Location Problems. Annals of Operations
Research 111 (2002), 181โ196. DOI:http://dx.doi.org/10.1023/A:1020905820371
[23] H. Sato. 2014. Inverted PBI in MOEA/D and Its Impact on the Search Performance on Multi and Many-objective Optimization. In Proceedings of the 2014
Annual Conference on Genetic and Evolutionary Computation (GECCO โ14). ACM,
New York, NY, USA, 645โ652. DOI:http://dx.doi.org/10.1145/2576768.2598297
[24] T. Shioda and I. Ono. 2015.
Adaptive Weighted Aggregation with Enhanced Relocation and Its Performance Evaluation.
Transaction of the
Japanese Society for Evolutionary Computation 6, 2 (2015), 104โ117. DOI:
N. Hamada
http://dx.doi.org/10.11394/tjpnsec.6.104
[25] T. Shioda and I. Ono. 2015. Adaptive Weighted Aggregation with Step Size Control Weight Adaptation for Multiobjective Continuous Function Optimization.
SICE Journal of Control, Measurement, and System Integration 8, 5 (2015), 303โ
311. DOI:http://dx.doi.org/10.9746/jcmsi.8.303
[26] S. Smale. 1973. Global Analysis and Economics I: Pareto Optimum and a Generalization of Morse Theory. In Dynamical Systems, M. M. Peixoto (Ed.). Academic
Press, 531โ544. DOI:http://dx.doi.org/10.1016/B978-0-12-550350-1.50044-8
[27] S. Smale. 1974. Global Analysis and Economics IIA: Extension of a Theorem of Debreu. Journal of Mathematical Economics 1, 1 (1974), 1โ14. DOI:
http://dx.doi.org/10.1016/0304-4068(74)90031-7
[28] S. Smale. 1974. Global Analysis and Economics III: Pareto Optima and Price
Equilibria. Journal of Mathematical Economics 1, 2 (1974), 107โ117. DOI:
http://dx.doi.org/10.1016/0304-4068(74)90002-0
[29] S. Smale. 1974.
Global Analysis and Economics IV: Finiteness and
Stability of Equilibria with General Consumption Sets and Production.
Journal of Mathematical Economics 1, 2 (1974), 119โ127. DOI:
http://dx.doi.org/10.1016/0304-4068(74)90003-2
[30] S. Smale. 1974. Global Analysis and Economics V: Pareto Theory with Constraints. Journal of Mathematical Economics 1, 3 (1974), 213โ221. DOI:
http://dx.doi.org/10.1016/0304-4068(74)90013-5
[31] S. Smale. 1976.
Global Analysis and Economics VI: Geometric Analysis of Pareto Optima and Price Equilibria under Classical Hypotheses.
Journal of Mathematical Economics 3, 1 (1976), 1โ14.
DOI:
http://dx.doi.org/10.1016/0304-4068(76)90002-1
[32] J. Ward. 1989. Structure of E๏ฌcient Sets for Convex Objectives. Mathematics of
Operations Research 14, 2 (1989), 249โ257.
[33] Q. Zhang and H. Li. 2007. MOEA/D: A Multiobjective Evolutionary Algorithm
Based on Decomposition. IEEE Transactions on Evolutionary Computation 11, 6
(December 2007), 712โ731. DOI:http://dx.doi.org/10.1109/TEVC.2007.892759
[34] E. Zitzler, K. Deb, and L. Thiele. 2000. Comparison of Multiobjective Evolutionary Algorithms: Empirical Results. IEEE Transaction on Evolutionary Computation 8, 2 (2000), 173โ195. DOI:http://dx.doi.org/10.1162/106365600568202
| 9cs.NE
|
Distributed Spanner Approximation
Keren Censor-Hillelโ
Michal Doryโ
arXiv:1802.03160v1 [cs.DS] 9 Feb 2018
February 12, 2018
Abstract
We address the fundamental network design problem of constructing approximate minimum
spanners. Our contributions are for the distributed setting, providing both algorithmic and
hardness results.
Our main hardness result shows that โan ฮฑ-approximation for the minimum directed kspanner
โ โproblem for k โฅ 5 requires โฆ(n/ ฮฑ log n) rounds using deterministic algorithms or
โฆ( n/ ฮฑ log n) rounds using randomized ones, in the Congest model of distributed computing.
Combined with the constant-round O(n )-approximation algorithm in the Local model of
[Barenboim, Elkin and Gavoille, 2016], as well as a polylog-round (1 + )-approximation algorithm
in the Local model that we show here, our lower bounds for the Congest model imply a strict
separation between the Local and Congest models. Notably, to the best of our knowledge,
this is the first separation between these models for a local approximation problem.
Similarly, a separation between the directed and undirected cases is implied. We also prove
that the minimum weighted k-spanner problem for k โฅ 4 requires a near-linear number of rounds
in the Congest model, for directed or undirected graphs. In addition, we show lower bounds
for the minimum weighted 2-spanner problem in the Congest and Local models.
On the algorithmic side, apart from the aforementioned (1 + )-approximation algorithm
for minimum k-spanners, our main contribution is a new distributed construction of minimum
2-spanners that uses only polynomial local computations. Our algorithm has a guaranteed
approximation ratio of O(log(m/n)) for a graph with n vertices and m edges, which matches
the best known ratio for polynomial time sequential algorithms [Kortsarz and Peleg, 1994],
and is tight if we restrict ourselves to polynomial local computations. An algorithm with this
approximation factor was not previously known for the distributed setting. The number of rounds
required for our algorithm is O(log n log โ) w.h.p, where โ is the maximum degree in the graph.
Our approach allows us to extend our algorithm to work also for the directed, weighted, and
client-server variants of the problem. It also provides a Congest algorithm for the minimum
dominating set problem, with a guaranteed O(log โ) approximation ratio.
โ
Technion, Department of Computer Science, {ckeren,smichald}@cs.technion.ac.il. Supported in part by the
Israel Science Foundation (grant 1696/14).
1
Introduction
A k-spanner of a graph G is a sparse subgraph of G that preserves distances up to a multiplicative
factor of k. First introduced in the late 80โs [56, 57], spanners have been central for numerous
applications, such as synchronization [2, 3, 57], compact routing tables [4, 12, 58, 64], distance
oracles [6, 62, 65], approximate shortest paths [25, 32], and more.
Due to the prominence of spanners for many distributed applications, it is vital to have distributed
algorithms for constructing them. Indeed, there are many efficient distributed algorithms for finding
sparse spanners in undirected graphs, which give a global guarantee on the size of the spanner.
A prime example are algorithms that construct (2k โ 1)-spanners with O(n1+1/k ) edges, for a
graph with n vertices [7, 17, 18, 28, 40], which is optimal in the worst case assuming Erdoฬsโs girth
conjecture [33].
As opposed to finding spanners with the best worst-case sparsity, this paper focuses on the network
design problem of approximating the minimum k-spanner, which is a fundamental optimization
problem. This is particularly crucial for cases in which the worst-case sparsity is ฮ(n2 ) such as 2spanners (complete bipartite graphs) or directed spanners. Spanner approximation is at the heart of a
rich line of recent work in the sequential setting, presenting approximation algorithms [8,14,15,21,23],
as well as hardness of approximation results [19, 31, 45].
There are only few distributed spanner approximation algorithms known to date. A distributed
algorithm with an expected approximation ratio of O(log n) for the minimum 2-spanner problem is
e โn) for
given in [21]. This was recently extended to k > 2, achieving an approximation ratio of O(
directed k-spanners [22], which matches the best approximation known in the sequential setting [8].
Yet, in the distributed setting, it is possible to obtain better approximations if local computation
is not polynomially bounded. A constant time O(n )-approximation algorithm for directed or
undirected minimum k-spanner, which takes exp(O(1/)) + O(k) rounds for any constant > 0 and
a positive integer k, is given in [5]. In addition, we show a polylogarithmic time (1+)-approximation
algorithm for these problems, following the framework of a recent algorithm for covering problems [39]
(see Section 6). This approximation is much better than the best approximation that can be acheived
in the sequential setting, due to the hardness results of [19, 31]. All these algorithms work in the
classic Local model of distributed computing [51], where vertices exchange messages of unbounded
size in synchronous rounds.
A natural question is whether we can obtain good approximations efficiently also in the Congest
model [54], where the messages exchanged are bounded by O(log n) bits. In the undirected case,
efficient constructions of (2k โ 1)-spanners with O(n1+1/k ) edges in the Congest model [7, 28]
imply O(n1/k )-approximations, since any spanner of a connected graph has at least n โ 1 edges.
However, for directed graphs there are no efficient algorithms in the Congest model.
Our contribution in this paper is twofold. We provide the first hardness of approximation results
for minimum k-spanners in the distributed setting. Our main hardness result shows that there are
no efficient approximation algorithms for the directed k-spanner problem for k โฅ 5 in the Congest
model. This explains why all the current approximation algorithms for the problem require large
messages, and also creates a strict separation between the directed and undirected variants of the
problem, as the latter admits efficient approximations in the Congest model. In addition, we
provide new distributed algorithms for approximating the minimum k-spanner problem and several
variants in the Local model. Our main algorithmic contributaion is an algorithm for minimum
2-spanners that uses only polynomial local computations and guarantees an approximation ratio of
O(log m
n ), which matches the best known approximation for polynomial sequential algorithms [46].
On the way to obtaining our results, we develop new techniques, both algorithmically and for
obtaining our lower bounds, which can potentially find use in studying various related problems.
1
1.1
1.1.1
Our contributions
Hardness of approximation
We show several negative results implying hardness of approximating various spanner problems in
both the Local and Congest models. While there are many recent hardness of approximation
results for spanner problems in the sequential setting [14, 19, 31, 45], to the best of our knowledge
ours are the first for the distributed setting.
(I.) Directed k-spanner for k โฅ 5 in the CONGEST model: Perhaps our main negative
result is a proof for the hardness of approximating the directed k-spanner problem for k โฅ 5 in the
Congest model.
Theorem 1.1. Any (perhaps randomized) distributed ฮฑ-approximation
algorithm in the Congest
โ
n
n
.
model for the directed k-spanner problem for k โฅ 5 takes โฆ( โฮฑยทlog n ) rounds, for 1 โค ฮฑ โค 100
When restricting attention to deterministic algorithms, we prove a stronger lower bound of
e
โ
โฆ( nฮฑ ), for any ฮฑ โค nc for a constant c > 1.
For example, this gives that a constant or a polylogarithmic approximation ratio for the directed
e โn) rounds using randomized algorithms or
k-spanner problem in the Congest model requires โฆ(
e
โฆ(n)
rounds using deterministic algorithms. Even an approximation ratio of only n is hard and
e 1/2โ/2 ) rounds using randomized algorithms or โฆ(n
e 1โ/2 ) rounds using deterministic
requires โฆ(n
ones, for any 0 < < 1. Moreover, in the deterministic case, even an approximation ratio of nc , for
e โn) rounds. This is to be contrasted with an approximation of n,
appropriate values of c, requires โฆ(
which can be obtained without any communication by taking the entire graph, since any k-spanner
has at least n โ 1 edges.
LOCAL vs. CONGEST. The major implication of the above is a strict separation between
the Local and Congest models, since the former admits a constant-round O(n )-approximation
algorithm [5]1 and a polylogarithmic (1 + )-approximation algorithm (see Section 6) for directed
k-spanners. Such a separation was previously known only for global problems (problems that are
subject to an โฆ(D) lower bound, where D is the diameter of the graph), and for local decision
problems (such as determining whether the graph contains a k-cycle). To the best of our knowledge,
ours is the first separation for a local approximation problem.
Directed vs. undirected. Our lower bound also separates the undirected and directed kspanner problems, since there are efficient algorithms in the Congest model for constructing
(2k โ 1)-spanners with O(n1+1/k ) edges [28, 40] which imply an O(n1/k )-approximation. The best
randomized algorithm for the task takes k rounds [28], and the best deterministic algorithm is
a recent algorithm which takes O(n1/2โ1/k ) rounds for a constant even k [40]. Achieving the
e 1/2โ1/2k ) rounds using randomization, or
same approximation for directed graphs necessitates โฆ(n
e 1โ1/2k ) rounds using deterministic algorithms.
โฆ(n
(II.) Weighted k-spanner for k โฅ 4 in the CONGEST model: In addition to the above
main result, we consider weighted k-spanners, and show that any ฮฑ-approximation for the weighted
e n ) rounds, and that โฆ(n)
e
undirected k-spanner problem for k โฅ 4 requires โฆ(
rounds are needed for
k
the weighted directed k-spanner problem.
1
In [5], a constant time randomized algorithm for directed k-spanner is presented. However, the deterministic
network decomposition presented in [5] gives a polylogarithmic deterministic approximation for directed k-spanner as
well, which shows the separation also for the deterministic case.
2
Weighted vs. unweighted. As these lower bounds hold also for randomized algorithms, we
obtain yet another separation, between the weighted and the unweighted variants of the problem,
since the aforementioned k-round (2k โ 1)-spanner constructions imply an O(n1/k ) approximation
for the unweighted case.
LOCAL vs. CONGEST. Since both the constant-round algorithm for approximating kspanners within a factor of O(n ) [5] and the (1 + )-approximation algorithm that we give in
Section 6 are suitable for the weighted case, our hardness result for the weighted case implies the
separation between the Local and Congest models also when having weights. This holds also for
the undirected weighted case.
(III.) Weighted 2-spanner in the LOCAL and CONGEST models: Finally, we show lower
bounds for the weighted 2-spanner problem, which, in a nutshell, are obtained by a reduction that
captures the intuition that approximating the minimum weight 2-spanner is at least as hard as
approximating the minimum vertex cover (MVC). We emphasize that the reduction from the
set cover problem to the unweighted 2-spanner problem given in [45] is inherently sequential, by
requiring the addition of a vertex that is connected to all other vertices in the graph, and hence is
unsuitable for the distributed setting.
q
Our reduction implies that โฆ( logloglogโโ ) or โฆ( logloglogn n ) rounds are required for a logarithmic
approximation ratio for weighted 2-spanner in the Local model, by plugging in the lower bounds
e 2 ) lower bound for an exact solution
for MVC given in [48]. In addition, our reduction implies an โฆ(n
for weighted 2-spanner in the Congest model, by using the near-quadratic lower bound for exact
MVC given recently in [11]. This is tight up to logarithmic factors since O(n2 ) rounds allow learning
the entire graph topology and solving essentially all natural graph problems.
1.1.2
Distributed approximation algorithms
We show new distributed algorithms for approximating minimum k-spanners. Our main algorithmic
contribution is a new algorithm for the minimum 2-spanner problem that uses only polynomial local
computations (see Section 4). In addition, we show that if local computation is not polynomially
bounded it is possible to achieve (1 + )-approximation for minimum k-spanners (see Section 6).
(I.) Distributed (1 + )-approximation of minimum k-spanners: In Section 6, we present
(1+ )-approximation algorithms for spanner problems, following the framework of a recent algorithm
for covering problems [39]. We show the following.
Theorem 1.2. There is a randomized algorithm with complexity O(poly(log n/)) in the Local
model that computes a (1 + )-approximation of the minimum k-spanner w.h.p, where k is a constant.
The algorithm is quite general and can be adapted similarly to additional variants. Theorem
1.2 shows that although spanner problems are hard to approximate in the sequential setting, it
is possible to achieve extremely strong approximations for them efficiently in the Local model.
This demonstrates the power of the Local model. However, the algorithm is based on learning
neighborhoods of polylogarithmic size and solving NP-complete problems (finding optimal spanners).
It is desirable to design also algorithms that work with more realistic assumptions. We next focus
on the 2-spanner problem and show a new algorithm that uses only polynomial local computations
and uses the power of the Local model only for learning neighborhoods of diameter 2.
3
(II.) Distributed approximation of minimum 2-spanners: If we restrict ourselves to polynomial local computations, the best algorithm for the minimum 2-spanner problem is the O(log n)-round
O(log n)-approximation in expectation of Dinitz and Krauthgamer [21],2 which solves even the more
general problem of finding fault-tolerant spanners.
However, this still leaves several open questions regarding minimum 2-spanners. First, the best
approximation to the problem in the sequential setting is O(log m
n ) where m is the number of edges
in the graph. Can we achieve such approximation also in the distributed setting? Second, the
approximation ratio holds only in expectation. Can we design an algorithm that guarantees the
approximation ratio? Third, this algorithm requires learning neighborhoods of logarithmic radius,
and hence a direct implementation of it in the Congest model is not efficient. Can we design a
more efficient algorithm in the Congest model?
We design a new algorithm for the minimum 2-spanner problem, answering some of these
questions. Our algorithm obtains an approximation ratio of O(log m
n ) always, within O(log n log โ)
rounds w.h.p,3 where โ is the maximum vertex degree, summarized as follows.
Theorem 1.3. There is a distributed algorithm for the minimum 2-spanner problem in the Local
model that guarantees an approximation ratio of O(log m
n ), and takes O(log n log โ) rounds w.h.p.
Our approximation ratio of O(log m
n ) matches that of the best approximation in the sequential
setting up to a constant factor [46], and is tight if we restrict ourselves to polynomial local
computations [45]. In addition, the approximation ratio of our algorithm is guaranteed, rather
than only holding in expectation. This is crucial for the distributed setting since, as opposed
to the sequential setting, running the algorithm several times and choosing the best solution
completely blows up the complexity because learning the cost of the solution requires collecting
global information. Note that although our algorithm can be converted into an algorithm with
a guaranteed polylogarithmic time complexity and an approximation ratio that holds only in
expectation, the opposite does not hold. Another feature of our algorithm is that it uses the power
of the Local model only for learning the 2-neighborhood of vertices. A direct implementation of
our algorithm in the Congest model yields an overhead of O(โ) rounds, which is efficient for small
values of โ. We address this issue further in Section 1.3.
(III.) Distributed approximation of additional 2-spanners: The techniques we develop for
constructing and analyzing our spanner have the advantage of allowing us to easily extend our
construction to the directed, weighted and client-server variants of the problem. We obtain the
same approximation ratio for the directed case as in the undirected case, and for the weighted case
we give an approximation ratio of O(log โ), both improving upon the O(log n) approximation in
expectation of [21]. For the client-server 2-spanner case, which to the best of our knowledge ours
is the first distributed approximation, we obtain an approximation ratio that matches that of the
sequential algorithm [29].
(IV.) Distributed approximation of MDS: Finally, our technique also gives an efficient
algorithm for the minimum dominating set (MDS) problem, which obtains an approximation
ratio of O(log โ) always. Our algorithm for MDS works even in the Congest model and takes
O(log n log โ) rounds w.h.p. The MDS problem has been studied extensively by the distributed
2
In [21], a time complexity of O(log2 n) rounds is claimed. However, the algorithm is based on sampling a certain
decomposition O(log n) times independently, which takes O(log n) rounds each time. From the independence of the
decompositions, the computations can be parallelized in the Local model, achieving a time complexity of O(log n)
rounds. See also [22].
3
As standard in this setting, a high probability refers to a probability that is at least 1 โ n1c for a constant c โฅ 1.
4
computing community, with several efficient algorithms for MDS in the Congest obtaining an
approximation ratio of O(log โ) in expectation [43, 48, 49]. To the best of our knowledge, our
algorithm is the first that guarantees this approximation ratio always.
1.2
1.2.1
Technical overview
Hardness of approximation
We prove Theorem 1.1 by a reduction from 2-party communication problems, as has been proven
fruitful for various lower bounds for the Congest model [1, 11, 24, 35, 42, 63]. In principle, a family
of graphs is constructed depending on the input strings of the two players, such that the solution to
the required Congest problem uniquely determines whether the input strings of the players satisfy
a certain Boolean predicate. The most common usage is of set-disjointness, although other 2-party
communication problems have been used as well [10, 26, 34, 55]. The two players can simulate a
distributed algorithm for solving the Congest problem, and deduce their output for the 2-party
communication problem accordingly. This yields a lower bound for the Congest problem, based
on known lower bounds for the communication complexity of the 2-party problem, by incorporating
the cost of the simulation itself.
The prime caveat in using this framework for approximation problems is that in the above
examples a modification of a single input bit has a slight influence on the graph. For example, when
showing a lower bound for computing the diameter, any bit of the input affects the distance between
one pair of vertices [1, 35, 42]. This is sufficient when computing some global property of the graph.
Indeed, the distance between a single pair of vertices can change the diameter of the graph. The
challenge in designing a construction for approximating k-spanners is that now any single bit needs
to affect drastically the size of the minimum k-spanner. In more detail, any k-spanner has at least
n โ 1 edges and, hence, for a meaningful lower bound for an ฮฑ-approximation, any input bit must
affect at least โฆ(ฮฑn) edges.
We manage to overcome the above challenge by constructing a graph that captures this requirement and allows a reduction from set-disjointness. The main technical ingredient is a dense
component in which many edges are affected by single input bits. This component resides in its
entirety within the set of vertices that is simulated by a single player of the two, thus resulting in a
non-symmetric graph construction. This is crucial for our proof, as otherwise the density of this
component would imply a dense cut between the two sets of vertices simulated by the players, which
in turn would nullify the achievable lower bound. For having this property, we believe that our
construction may give rise to follow-up lower bound constructions for additional local approximation
problems.
Our graph construction is designed using several parameters, which allows us to show trade-offs
between the time complexity of an algorithm and its approximation ratio, and gives lower bounds
even for large values of ฮฑ.
Our stronger lower bounds for the deterministic case are obtained using the 2-party gapdisjointness problem rather than the more common set-disjointness problem. Since gap-disjointness
allows more slack, we obtain stronger lower bounds, at the price of them holding only for deterministic
algorithms. We believe that the flexibility of the gap-disjointness problem may be useful in showing
additional strong lower bounds for approximation problems. Our stronger lower bounds for the
weighted case are obtained by assigning weights to the edges of the graph in a manner which allows
us to shave off certain edges that affect the bound.
5
1.2.2
Distributed approximation of minimum 2-spanners
Our algorithm for approximating minimum 2-spanners is inspired by the sequential greedy algorithm
of Kortsarz and Peleg [46], in which dense stars are added to the spanner one by one, obtaining an
approximation ratio of O(log m
n ). A star is a subset of edges between a vertex v and some of its
neighbors. The density of a star is the ratio between the number of edges 2-spanned by the star
and the size of the star, where an edge e = {u, v} is 2-spanned by a star S if S includes a path of
length two between u and v. A roughly intuition for the greedy algorithm is that if S is a dense
star then adding its edges to the spanner allows 2-spanning many edges by adding only a small
number of edges to the spanner.
A direct implementation of this greedy approach in the distributed setting is highly expensive,
since deciding upon the densest star inherently requires collecting global information. Moreover,
one would like to leverage the ability of the distributed setting to add multiple stars to the spanner
simultaneously. To address both sources of inefficiency, rather than computing the star that is
the densest in the entire graph, we compute all the stars that are the densest in their local 2neighborhood. While greatly speeding up the running time, adding all of these locally densest stars
to the spanner is too extreme, and results in a poor approximation ratio. Instead, we consider these
stars as candidates for being added to the spanner.
The key challenge is then to break symmetry among the candidates, while balancing the need
to choose many stars in parallel (for a fast running time) with the need to bound the overlap in
spanned edges among the candidates (for a small approximation ratio). We tackle this conflict
by constructing a voting scheme for breaking symmetry by choosing among the stars based on a
random permutation. Interestingly, our approach is inspired by a parallel algorithm for set cover [60].
We let each edge vote for the first candidate that 2-spans it according to the random permutation.
A candidate that receives a number of votes which is at least 18 of the edges it 2-spans is added to
the spanner, and we continue this process iteratively.
Since we add to the spanner only stars receiving many votes, this approach guarantees that
there is not too much overlap in the edges 2-spanned by different stars, which eventually culminates
in a proof of an approximation ratio of O(log m
n ), which matches the one obtained by the greedy
approach.
A tricky obstacle lies in showing that our algorithm completes in O(log n log โ) rounds w.h.p.
This is because, as opposed to the set cover case, there may be as many as 2โ different stars centered
at each vertex, and a vertex may be required to add candidate stars multiple times during the
execution of the algorithm. It turns out that an arbitrary choice for a candidate among all densest
stars centered at a vertex is incapable of providing an efficient time complexity. To overcome this
issue, we design a subtle mechanism for proposing a candidate star, and pair it with a proof that
our algorithm indeed completes in the claimed number of rounds.
1.3
Discussion
While our results in this paper significantly advance the state-of-the-art in distributed approximation
of minimum k-spanners, intriguing questions remain open. First, the landscape of the trade-offs
between the approximation ratio and the running time of distributed minimum k-spanner algorithms
is yet to be fully mapped. For example, the O(log โ) factor in the running time of our approximation
algorithm for weighted 2-spanner is tight up to an O(log log โ) factor, due to our reduction from
MVC and the known lower bounds for it. However, it remains open whether the O(log n) factor
is necessary. Additional gaps remain open for other various approximation ratios. In particular,
an interesting question is to show a lower bound for approximating the undirected unweighted
6
minimum k-spanner problem.
A curious question is whether our algorithm can be efficiently made to work in the Congest
model. A direct implementation would yield an overhead of O(โ) for the running time, for computing
the densities of stars, and for sending the candidate stars. We emphasize that knowing the density
of the neighborhood of vertices is crucial for additional algorithms, such as the state-of-the-art
(โ + 1)-coloring algorithm of Harris et al. [41]. Another interesting question is to design an efficient
deterministic algorithm achieving the same approximation ratio.
For larger values of the stretch k, our lower bounds imply a strict separation between the Local
and Congest models for the number of rounds required for approximating directed minimum
k-spanners. Such a separation was previously known only for global problems (problems that are
subject to an โฆ(D) lower bound, where D is the diameter of the graph), and for local decision
problems (such as determining whether the graph contains a k-cycle). Interestingly, ours is the first
separation for a local approximation problem. It is a central open question whether such separations
hold also for local symmetry breaking problems.
Interestingly, our algorithm, as well as other distributed approximation algorithms for the
minimum k-spanner in the Local model, work also for directed graphs, achieving the same
approximation ratio and round complexity. However, our hardness results create a strict separation
between the undirected and directed variants in the Congest model. It will be interesting to show
such separations for other problems.
1.4
Additional related work
Spanners have been studied extensively in the distributed setting, producing many efficient algorithms
for finding sparse spanners in undirected graphs [7, 17, 18, 27, 28, 40]. These algorithms construct
(2k โ 1)-spanners with O(n1+1/k ) edges for any fixed k โฅ 2, with the fastest completing in k
rounds [17, 28], which is tight [17]. Many additional works construct various non-multiplicative
spanners in the distributed setting, such as [59] and the excellent overview within.
Many recent studies address spanner approximations in the sequential setting. The greedy
algorithm of [46] achieves an approximation ratio of O(log m
n ) for the minimum 2-spanner problem.
This was extended to the weighted, directed and client-server cases [29,45]. Approximation algorithms
for the directed k-spanner problem for k > 2 are given in [8,9,20,23,30], with the best approximation
โ
e 1/3 ) for k = 3, 4 [8, 23]. These
ratio of O( n log n) for k > 4, and an approximation ratio of O(n
approximation ratios are matched by a recent distributed O(k log n)-round algorithm, that uses
only polynomial local computations [22]. Approximation algorithms are given also for pairwise
spanners and distance preservers [14], for spanners with lowest maximum degree [13, 15, 22, 47], for
fault-tolerant spanners [21, 23], and more.
Hardness of approximation results in the sequential setting give that for k = 2, no polynomial
algorithm gives an approximation ratio better than ฮ(log n) [45], which shows that the sequential
greedy algorithm is optimal. For k > 2, the problem is even harder. For any constant > 0 and
k โฅ 3 there are no polynomial-time algorithms that approximate the k-spanner problem within a
1โ
factor better than 2(log n)/k [19], or the directed k-spanner problem within a factor better than
1โ
2(log n) [31]. Similar results are known for additional variants [14, 31].
Spanner problems are closely related to covering problems such as set cover, minimum dominating
set (MDS), and minimum vertex cover. Indeed, some of the ingredients of our algorithms borrow
ideas from distributed and parallel algorithms for such problems. Our symmetry breaking scheme
is inspired by the parallel algorithm for set cover of Rajagopalan and Vazirani [60], however, the
general structure of this algorithm requires global coordination and hence is not suitable for the
distributed setting. There are also several ideas inspired by the distributed MDS algorithm of Jia et
7
al. [43], such as, rounding the densities and comparing densesties in 2-neighborhoods. However, [43]
breaks the symmetry between the candidates in a different way which results in an approximation
ratio of O(log โ) in expectation. The connection between spanners to set cover is used also in [9]
where they show that covering the edges of a graph by stars is also useful for approximating the
directed k-spanner problem for k > 2. In this context, we also mention the distributed algorithm
of [37] for the minimum connected dominating set problem, which also uses stars as the main
component for its construction. Our work is, however, incomparable, especially since the minimum
connected dominating set problem is a global problem, admitting an โฆ(D) lower bound even in the
Local model.
1.5
Preliminaries
Let G = (V, E) be a connected undirected graph with n vertices and maximum degree โ. Let
S โ E be a subset of the edges, and let k โฅ 1. We say that an edge e = {u, v} is covered by S if
there is a path of length at most k between u and v in S. A k-spanner of G is a subgraph of G that
covers all the edges of G. A k-spanner of a subgraph G0 โ G is a subgraph of G that covers all the
edges of G0 . For a directed graph, we say that a directed edge e = (u, v) is covered by a subset of
edges S, if S includes a directed path of length at most k from u to v, and define a k-spanner for a
directed graph accordingly.
In the minimum k-spanner problem the input is a connected undirected graph G = (V, E) and
the goal is to find the minimum size k-spanner of G. The directed k-spanner problem is defined
accordingly, with respect to directed graphs. In the weighted k-spanner problem each edge e has a
non-negative weight w(e) and the goal
P is to find the k-spanner of G having minimum cost, where
the cost of a spanner H is w(H) = eโH w(e).4 In the client-server k-spanner problem, introduced
in [29], the input is a connected undirected graph G = (V, E) that its edges are divided to two types:
clients C and servers S (there may be edges e โ C โฉ S), and the goal it to find the minimum size
k-spanner of C that includes only edges of S.
In the distributed setting, the input for the k-spanner problem is the communication graph G
itself. Each vertex initially knows only the identities of its neighbors, and needs to output a subset
of its edges such that the union of all outputs is a k-spanner. The communication in the network is
bidirectional, even when solving the directed k-spanner problem.
Roadmap: In Section 2, we present our hardness of approximation results for directed and
weighted k-spanners in the Congest model. In Section 3, we provide hardness of approximation
results for weighted 2-spanners. In Section 4, we present our algorithm for the minimum 2-spanner
problem and show its extensions to other variants. In Section 5, we describe our MDS algorithm.
Finally, in Section 6, we show our (1 + )-approximation for minimum k-spanners.
2
Hardness of approximation in the CONGEST model
In this section, we prove hardness of approximation results for approximating k-spanners in the
Congest model. As explained in Section 1.2.1, we build upon the previous used framework of
reducing 2-party communication problems to distributed problems for the Congest model. The
key technical challenge that we overcome is how to plant a dense subgraph into the construction,
4
There is another variant of the weighted k-spanner problem, in which the weight of an edge represents a length.
We emphasize that in our case all the edges have length 1.
8
without inducing a large cut between the vertices simulated by the two players, but while still
having the choice of edges taken from the dense subgraph to the spanner depend on both inputs.
We describe a graph construction that allows us to provide a reduction from problems of
2-party communication. In the latter setting, two players, Alice and Bob, receive input strings
a = (a1 , ..., aN ) and b = (b1 , ..., bN ), respectively, of size N . Their goal is to solve a problem related
to their inputs, while communicating a minimum number of bits. For example, the set disjointness
problem requires the players to decide if their input strings represent disjoint subsets of [N ], that is,
they need to decide if there is a bit 1 โค i โค N such that ai = bi = 1. The communication complexity
of set disjointness is known to be linear in the length of the strings [50, 61].
Lemma 2.1. Solving the set disjointness problem on input strings of size N , requires exchanging
โฆ(N ) bits, even using randomized protocols.
We start by showing that approximating the directed k-spanner problem in the Congest model
is hard for k โฅ 5, and then modify our construction to provide hardness results for the weighted
case.
The general approach is to build a dense graph G, where some of its edges depend on the inputs
of Alice and Bob, such that if the inputs of Alice and Bob are disjoint then there is a sparse 5-spanner
in G (which is also a k-spanner for k โฅ 5), and otherwise any k-spanner has many edges. By
simulating the distributed approximation algorithm for the k-spanner problem, Alice and Bob solve
set disjointness. Hence, depending on the parameters of our graph construction, a communication
lower bound for the latter would imply a lower bound on the number of rounds required for the
former.
In [35,42], a reduction from set disjointness is used in order to show a lower bound for computing
the diameter of a graph. The main idea is that each bit of the inputs affects the distance between
two vertices in the graph, and if the distance between any of these pairs of vertices is long it affects
the diameter of the graph. This idea is useful also for showing lower bound for spanner problems,
and indeed one of the elements in our construction is similar to the constructions in [35,42]. However,
the main difference in our case is that the distance between one pair of vertices in the graph does
not affect significantly the size of the minimum spanner.
In order to overcome it, we suggest the following construction. Our graph consists of two
subgraphs. One of them depends on the inputs, and the other one is a complete bipartite graph D
that each of its sides is divided to blocks of size ฮฒ. We connect the two subgraphs in such a way
that each bit i of the inputs affects ฮฒ 2 edges of D, which must be added to the spanner if and only
if ai = bi = 1.
Let `, ฮฒ be positive integers. We construct a graph G = G(`, ฮฒ) according to the parameters ` and
ฮฒ. Later we plug-in different values of ` and ฮฒ in order to obtain several trade-offs. The graph G(`, ฮฒ)
is a directed graph, with V = X1 โชX2 โชY1 โชY2 โชY3 , where X1 = {x1i |1 โค i โค `}โช{x2i |1 โค i โค `}, Y1 =
{yi1 |1 โค i โค `} โช {yi2 |1 โค i โค `}, X2 = {xij |1 โค i โค `, 1 โค j โค ฮฒ}, Y2 = {yij |1 โค i โค `, 1 โค j โค ฮฒ},
and Y3 = {yi3 |1 โค i โค `}. See Figure 1 for an illustration.
The set of edges consists of a matching between X1 and Y1 that includes all the directed edges
1
(xi , yi1 ) and (x2i , yi2 ), for 1 โค i โค `. In addition, there is a complete bipartite graph D between the
vertices of X2 and Y2 that includes all the directed edges (xij , yrs ) for 1 โค i, r โค `, 1 โค j, s โค ฮฒ. For
each vertex xij โ X2 there is an edge (xij , x1i ). For each vertex yij โ Y2 there is an edge (yi3 , yij ).
In addition, the graph includes the edges (yi2 , yi3 ), for 1 โค i โค `.
In addition, the two input strings a, b of length `2 bits, denoted by aij , bij for 1 โค i, j โค `, affect
G in the following way. The edge (x1i , x2j ) is in G if and only if aij = 0, and the edge (yi1 , yj2 ) is in G
if and only if bij = 0.
9
๐2
๐2
๐ฅ11
๐ฆ11
๐ฅ12
๐ฆ12
๐1
๐1
๐ฅ11
๐ฆ11
๐ฅ21
๐ฆ21
๐ฅโ1
๐ฆโ1
๐ฅ12
๐ฆ12
๐ฅ22
๐ฆ22
๐ฅโ2
๐ฆโ2
๐3
๐ฅ1๐ฝ
๐ฆ13
๐ฆ1๐ฝ
๐ฆ23
๐ฅโ1
๐ฆโ1
๐ฅโ2
๐ฆโ2
๐ฅโ๐ฝ
๐ฆโ๐ฝ
๐ฆโ3
Figure 1: The graph G, with some of its edges omitted for clarity. The red dashed edges are
examples of optional edges which depend on the input strings a and b.
Note that the number of vertices in G is n = ฮ(`ฮฒ), and that D consists of (`ฮฒ)2 = ฮ(n2 ) edges,
and recall the goal of constructing a sparse k-spanner for G with k โฅ 5. Since D is a dense subgraph,
taking its edges to the spanner would be expensive. However, in order to avoid taking the edges of
D to the spanner, the spanner must include a directed path of length at most k between every pair
of vertices xij , yrs , which does not include edges of D. The existence of such a path depends on the
input strings in the following way.
Claim 2.2. If one of the edges (x1i , x2r ), (yi1 , yr2 ) is in G, there is a directed path of length 5 between
the vertices xij , yrs that does not contain edges of D. Otherwise, the only directed path from xij to
yrs is the path that consists of the edge (xij , yrs ).
Proof. Note that any directed path from xij to yrs that does not include the edges of D must begin
with the edge (xij , x1i ) and must end with the two edges (yr2 , yr3 ), (yr3 , yrs ). Hence, the existence
of such a path depends on whether there is a directed path from x1i to yr2 . We show that there
is a directed path of length 2 from x1i to yr2 if at least one of the edges (x1i , x2r ), (yi1 , yr2 ) is in G.
Otherwise, there is no directed path of any length from x1i to yr2 .
Let P be a directed path from x1i to yr2 . The path P must cross the cut between X1 to Y1 either
by the edge (x1i , yi1 ) or by the edge (x2r , yr2 ), since any path (of any length) from x1i can only cross
the cut through the edge (x1i , yi1 ) or by an edge of the form (x2j , yj2 ). However, if j 6= r, yr2 is not
reachable from yj2 . If P crosses by the edge (x1i , yi1 ) the only way to reach yr2 from yi1 is by the edge
(yi1 , yr2 ). In the second case, the edge (x1i , x2r ) must be the first edge in the path.
In conclusion, if one of the edges (x1i , x2r ), (yi1 , yr2 ) is in G, then there is a directed path of length
5 between the vertices xij , yrs that does not contain edges of D. Otherwise, there is no directed
path of any length from x1i to yr2 . In this case, the only directed path from xij to yrs is the path
that consists of the edge (xij , yrs ).
10
Claim 2.2 captures the essence of why our construction is suitable for an approximation problem.
Next, we use our graph construction and this claim in order to show our hardness results.
2.1
Randomized directed k-spanner
In this section, we address the โdirected k-spanner problem for k โฅ 5, and show that obtaining an
n
ฮฑ-approximation requires โฆ( โฮฑ log
) rounds in the Congest model, even when using randomized
n
algorithms.
Lemma 2.3. Let G = G(`, ฮฒ) for ฮฒ โฅ `, let k โฅ 5, and let c = 7. If the input strings a, b are
disjoint, then there is a k-spanner of size at most c`ฮฒ for G. Otherwise, any k-spanner for G
includes at least ฮฒ 2 edges of D.
Proof. If the input strings a, b are disjoint, then for every pair of indexes i, r at least one of the
edges (x1i , x2r ), (yi1 , yr2 ) is in G. Hence, by Claim 2.2, there is a directed path of length at most 5
between every two vertices xij , yrs , which does not contain edges of D. This gives a 5-spanner of
size at most c`ฮฒ edges for G by taking all the edges not in D, since there are at most 2`ฮฒ + 2`2 + 3`
such edges, which is at most c`ฮฒ since ` โค ฮฒ and c = 7. This is also a k-spanner for any k โฅ 5.
If the input strings are not disjoint, then there is a pair of indexes i, r such that neither of the
edges (x1i , x2r ), (yi1 , yr2 ) is in G. Hence, by Claim 2.2, there is no directed path between the vertices
xij , yrs except for the path that includes the edge (xij , yrs ). Therefore, we need to take all the
edges (xij , yrs ) to the spanner for all values of j and s, which means adding ฮฒ 2 edges of D to the
spanner.
Let k โฅ 5 and let A be a distributed ฮฑ-approximation algorithm for the minimum k-spanner
problem. Denote by T (n) the time complexity of A on a graph with n vertices. The approximation
ratio ฮฑ = ฮฑ(n) of the algorithm A may depend on n, and we assume that it is a monotonic increasing
function of n, and that if n = ฮ(n0 ), then ฮฑ(n) = ฮ(ฮฑ(n0 )).
Our goal is to show that A can be used to solve set disjointness. If ฮฑ ยท c`ฮฒ < ฮฒ 2 , then by Lemma
2.3, the algorithm A gives a protocol for set disjointness, in which case we show a lower bound of
โฆ( log` n ) on the time complexity of A, as stated in the following lemma.
Lemma 2.4. Let G = G(`, ฮฒ). If there is a threshold t such that if the input strings a, b are disjoint,
an optimal spanner of G has at most t edges, and otherwise each spanner of G includes more than
ฮฑ(n) ยท t edges of D, then T (n) = โฆ( log` n ).
Proof. We use A to solve set disjointness on input strings of length N = `2 in the following way.
Let a, b be two input strings of length N , given to Alice and Bob respectively. We take the graph
G = G(`, ฮฒ) and define VB = Y1 , VA = V \ VA . Since the input strings a and b affect only edges
between vertices within VA and within VB respectively, it holds that Alice knows all the edges
adjacent to vertices in VA and Bob knows all the edges adjacent to vertices in VB . The cut between
VA to VB consists of ฮ(`) edges: the 2` edges of the matching between X1 to Y1 , and the ` edges
between Y1 to Y3 . Now Alice and Bob simulate A on G as follows. Alice simulates the vertices in VA
and Bob simulates the vertices in VB . At each round, Alice and Bob exchange the messages going
over the cut between VA and VB in either direction. Messages that are sent between vertices in VA or
between vertices in VB are simulated locally by Alice and Bob, without any communication. Since
the size of messages is O(log n) bits, and the size of the cut is ฮ(`), they can simulate one round of
A by exchanging at most O(` ยท log n) bits, and therefore they can simulate the entire execution of A
by exchanging at most O(T (n) ยท ` ยท log n) bits.
11
At the end of the simulation, Alice knows which of the edges of D are taken to the spanner. If
there are more than ฮฑ(n) ยท t edges of D in the spanner, Alice concludes that the input strings are
not disjoint, and otherwise she concludes that they are disjoint.
To show that this produces the correct output, recall the condition of the lemma that if the
input strings are disjoint then the size of an optimal spanner is at most t and otherwise it is more
than ฮฑ(n) ยท t. Therefore, if the input strings are disjoint, since A is an ฮฑ(n)-approximation algorithm,
it constructs a spanner with at most ฮฑ(n) ยท t edges, in which case Alice indeed outputs that the
input strings are disjoint. Otherwise, if the input strings are not disjoint, the size of any spanner is
more than ฮฑ(n) ยท t edges, in which case Alice indeed outputs that the input strings are not disjoint.
Hence, Alice and Bob solve set disjointness by exchanging O(T (n) ยท ` ยท log n) bits. However, any
(perhaps randomized) protocol that solves disjointness on inputs of size N = `2 requires exchanging
`
`2
โฆ(`2 ) bits by Lemma 2.1. This gives T (n) = โฆ( `ยทlog
n ) = โฆ( log n ).
Using Lemma 2.3 and Lemma 2.4, we prove our following main theorem.
Theorem 1.1. Any (perhaps randomized) distributed ฮฑ-approximation
algorithm in the Congest
โ
n
n
.
model for the directed k-spanner problem for k โฅ 5 takes โฆ( โฮฑยทlog n ) rounds, for 1 โค ฮฑ โค 100
Proof. We show that there is a threshold t that distinguishes whether the inputs are disjoint. Then,
using Lemma 2.4, we get a lower bound on the round complexity of A.
0
We define G = G(`, ฮฒ) with the following choice of the
q parameters ฮฒ, `. Let n be a positive
integer, and let c = 7. Let q = dฮฑ(n0 )ce + 1. Let ` = b
n
100
ฮฑ(n) โค
ensures that cq โค
n = ฮ(`ฮฒ) = ฮ(q`2 ) = ฮ(q ยท
n0 ,
n0
q )
n0
cq c,
and let ฮฒ = q`. The requirement
which shows that ` is positive. The number of vertices in G is
= ฮ(n0 ). In addition, note that n โค c`ฮฒ, since the number of
0
vertices in G is 2`ฮฒ + 5`, which gives n โค c`ฮฒ = cq`2 โค cq ยท ncq = n0 .
Let t = c`ฮฒ. By Lemma 2.3, If the inputs are disjoint, there is a k-spanner for G having at most
t = c`ฮฒ edges, and otherwise any k-spanner for G includes at least ฮฒ 2 edges of D. By the definition
of q, it holds that ฮฑ(n0 ) ยท c < q, which gives ฮฑ(n0 ) ยท c`ฮฒ < q`ฮฒ = ฮฒ 2 . Since n โค n0 , it holds that
ฮฑ(n) โค ฮฑ(n0 ), which gives ฮฑ(n) ยท t = ฮฑ(n) ยท c`ฮฒ < ฮฒ 2 .
q
Hence, t satisfies the conditions of Lemma 2.4, which gives T (n) = โฆ( log` n ). Since ` = ฮ( nq ) =
โ
q
n
).
ฮ( ฮฑ(n)
), it holds that T (n) = โฆ( log` n ) = โฆ( โ n
ฮฑ(n)ยทlog n
Theorem 1.1 shows that achieving a constant or a polylogarithmic approximation ratio for the
e โn) rounds, and even achieving an
directed k-spanner problem in the Congest model requires โฆ(
e 1/2โ/2 ) rounds, for any 0 < < 1.
approximation ratio of n is hard, requiring โฆ(n
This proves a strict separation between the Local and Congest models, since there is a
constant round O(n )-approximation algorithm [5], and a polylogarithmic (1 + )-approximation
algorithm (see Section 6) for directed k-spanner in the Local model.
It also separates the undirected and directed k-spanner problems, since there are randomized
k-round algorithms in the Congest model for constructing (2k โ 1)-spanners with O(n1+1/k )
edges [28]. These algorithms obtain an approximation ratio of O(n1/k ) for the undirected minimum
(2k โ 1)-spanner problem in k rounds, where achieving the same approximation for the directed
e 1/2โ1/2k ) rounds according to Theorem 1.1.
problem requires โฆ(n
2.2
Deterministic directed k-spanner
We next show that any deterministic algorithm solving the directed k-spanner problem for k โฅ 5,
n
requires โฆ( โฮฑยทlog
) rounds. The trick that allows a stronger lower bound is that we use a different
n
12
problem from communication complexity, which we refer to as the gap disjointness problem. This
problem is also mentioned in [34].
In the gap disjointness problem, Alice and Bob receive the input strings a = (a1 , ..., aN ) and
b = (b1 , ..., bN ), respectively, and their goal is to distinguish whether their input strings are disjoint
N
or are far from being disjoint. The inputs are far from being disjoint if there are at least 12
indexes
i, such that ai = bi = 1. If the inputs are neither disjoint nor far from being disjoint, any output of
Alice and Bob is valid. The gap disjointness problem can be easily solved by randomized protocols
exchanging O(1) bits. However, solving the problem deterministically requires exchanging โฆ(N )
bits.
Lemma 2.5. Solving the gap disjointness problem deterministically on input strings of size N
requires exchanging โฆ(N ) bits.
For a proof of Lemma 2.5, see example 5.5 in [50], where it is shown that approximating the
size of the intersection |a โฉ b| requires exchanging โฆ(N ) bits. The proof relies only on showing that
distinguishing between disjoint inputs and inputs with intersection of more than N6 bits is difficult
N
(note that any such inputs have intersection of size at least 12
). Hence, the exact same proof shows
that solving gap disjointness requires exchanging โฆ(N ) bits using a deterministic protocol.
In order to use set disjointness for the proof of Theorem 1.1, it was necessary to devise a
construction where each bit of the input affects many edges of the spanner, in order to argue that
even if there is only one index i such that ai = bi = 1, then the players can correctly decide whether
the inputs are disjoint by checking the size of the spanner. However, when we use gap disjointness,
the players need to distinguish only between the case that the inputs are disjoint and the case that
they are far from being disjoint, which allows much more flexibility and gives stronger lower bounds
for the deterministic case.
Lemma 2.6. Let G = G(`, ฮฒ) for 1 โค ฮฒ โค `, let k โฅ 5 and let c = 7. If the input strings a, b are
disjoint, then there is a k-spanner of size at most c`2 . If the input strings are far from being disjoint,
2
any k-spanner for G includes at least ฮฒ12 `2 edges of D.
Proof. If the input strings are disjoint, taking all the edges not in D is a 5-spanner, as shown in the
proof of Lemma 2.3. These are at most 2`ฮฒ + 2`2 + 3` edges not in D, which is at most c`2 since
ฮฒ โค ` and c = 7. This is also a k-spanner for any k โฅ 5.
`2
If the input strings are far from being disjoint then there are at least 12
pairs (i, r) such that
`2
1
2
1
2
none of the edges (xi , xr ), (yi , yr ) are in G. Hence, by Claim 2.2, there are at least 12
pairs (i, r)
such that there is no directed path between the vertices xij , yrs except for the path that consists
of the edge (xij , yrs ). For each such pair, we need to take all the directed edges (xij , yrs ) to the
spanner for all the values of j and s, which means adding ฮฒ 2 edges to the spanner. Summing over
2
`2
all the 12
pairs, we get that any k-spanner must include at least ฮฒ12 `2 edges of D.
Let k โฅ 5 and let A be a deterministic distributed ฮฑ-approximation algorithm for the minimum
k-spanner problem. Denote by T (n) the round complexity of A on a graph with n vertices. The
following lemma adapts Lemma 2.4 to the gap disjointness problem. Its proof is the same as the
proof of Lemma 2.4, with the difference that now Alice concludes that the input strings are far
from being disjoint if and only if the constructed spanner has more than ฮฑ(n) ยท t edges of D. Also,
now the lower bound holds only for the deterministic case, since it relies on the communication
complexity of gap disjointness.
Lemma 2.7. Let G = G(`, ฮฒ). If there is a threshold t such that if the input strings a, b are disjoint
then an optimal k-spanner of G has at most t edges, and if the input strings are far from being
disjoint then each k-spanner of G includes more than ฮฑ(n) ยท t edges of D. Then, T (n) = โฆ( log` n ).
13
Using Lemma 2.6 and Lemma 2.7, we show the following.
Theorem 2.8. Any deterministic distributed ฮฑ-approximation algorithm in the Congest model
n
for the directed k-spanner problem for k โฅ 5 takes โฆ( โฮฑยทlog
) rounds, for 1 โค ฮฑ โค cn0 for a constant
n
c0 > 1.
Proof. We construct the graph G = G(`, ฮฒ) withp
the following choice for the parameters `, ฮฒ. Let
n0
n0 be a positive integer, and let c = 7. Let ฮฒ = d 12ฮฑ(n0 )ce + 1, and let ` = b cฮฒ
c.
0
The number of vertices in G is n = ฮ(`ฮฒ) = ฮ( nฮฒ ฮฒ) = ฮ(n0 ). In addition, it holds that n โค c`ฮฒ
0
n
since the number of vertices in G is 2`ฮฒ + 5`, which gives n โค c`ฮฒ โค cฮฒ
cฮฒ = n0 . In order to use
Lemma 2.6 we need to verify that ฮฒ โค `. Note that
p n = c1 `ฮฒpfor a constant 2 โค c1 โค c. It follows
that ฮฒ โค ` if and only if c1 ฮฒ 2 โค n. Since ฮฒ =q
ฮ( ฮฑ(n)) = c2 ฮฑ(n) for a constant c2 , if we choose
c0 = c1 c22 , we get that if ฮฑ(n) โค
n
c0 ,
then ฮฒ โค
n
c1 ,
which gives c1 ฮฒ 2 โค n as needed.
We now define t = c`2 . By Lemma 2.6, if the input strings a, b are disjoint, then there is a
k-spanner of size at most t = c`2 . Otherwise, if the input strings are far from being disjoint, then any
2
k-spanner for G includes at least ฮฒ12 `2 edges of D. By the choice of ฮฒ and since n โค n0 , it holds that
2
12ฮฑ(n) ยท c < ฮฒ 2 , which gives ฮฑ(n) ยท t = ฮฑ(n) ยท c`2 < ฮฒ12 `2 , which shows that t satisfies the conditions
of Lemma 2.7. Using Lemma 2.7 we get that T (n) = โฆ( log` n ). Note that now ` = ฮ( ฮฒn ) = ฮ( โ n ),
ฮฑ(n)
which shows that T (n) = โฆ( โ
n
).
ฮฑ(n)ยทlog n
Theorem 2.8 shows that achieving a constant or a polylogarithmic approximation ratio for the
e
directed k-spanner problem in the Congest model requires โฆ(n)
rounds for any deterministic
e 1โ/2 ) rounds, for
algorithm. In addition, even an approximation ratio of n is hard, requiring โฆ(n
n
any 0 < < 1. Notably, even an approximation ratio of c for appropriate values of c is hard,
e โn) rounds. This is to be contrasted with the fact that obtaining an approximation
requiring โฆ(
ratio of n requires no communication, since any k-spanner has at least n โ 1 edges.
Theorem 2.8 separates the Local and the Congest models, since the deterministic network
decomposition described in [5] gives a deterministic O(n )-approximation for directed k-spanner for
a constant k in polylogarithmic time in the Local model.
It also separates the undirected and directed k-spanner problems for deterministic algorithms.
Currently the best deterministic algorithm in the Congest model for the undirected k-spanner
problem, is a recent algorithm [40] which constructs (2kโ1)-spanners of size O(n1+1/k ) in O(n1/2โ1/k )
rounds for a constant even k (in the Local nodel there is a k-round deterministic algorithm for this
problem [17]). This gives an O(n1/k )-approximation for undirected (2k โ 1)-spanners. Achieving the
e 1โ1/2k ) rounds according to Theorem 2.8.
same approximation for the directed problem requires โฆ(n
2.3
Weighted k-spanner
We extend our construction to the weighted case, showing that any approximation for the weighted
e
k-spanner in the Congest model takes โฆ(n)
rounds for k โฅ 4, even for randomized algorithms. A
similar result holds for the weighted undirected case. In the weighted case, rather than guaranteeing
that each input bit affects many edges of the spanner, we simply assign weight 0 to all the edges
that are not in D and weight 1 to all the edges of D. Hence, taking even a single edge from D
is very expensive if we can avoid it. This allows us to show a simpler construction, obtaining a
stronger lower bound for the weighted case, as follows.
We build a graph Gw (`) = Gw = (Vw , Ew ) which is the same as G, except for the following
differences (see Figure 2). We define ฮฒ = 1, and change the set of vertices to be Vw = V \ Y3 .
14
Since ฮฒ = 1, the vertices in X2 and Y2 are only of the form xi1 , yi1 for 1 โค i โค `. We change
their names from xi1 , yi1 to xi and yi , respectively. For each 1 โค i โค ` we replace the two edges
(yi2 , yi3 ), (yi3 , yi1 ) โ E by the edge (yi2 , yi ) โ Ew . Since ฮฒ = 1, the size of the cut between Y1 and the
rest of the graph is still ฮ(`).
๐2
๐2
๐ฅ1
๐ฆ1
๐ฅ2
๐ฆ2
๐ฅโ
๐ฆโ
๐1
๐1
๐ฅ11
๐ฆ11
๐ฅ21
๐ฆ21
๐ฅโ1
๐ฆโ1
๐ฅ12
๐ฆ12
๐ฅ22
๐ฆ22
๐ฅโ2
๐ฆโ2
Figure 2: The graph Gw , with some of its edges omitted for clarity. The red dashed edges are
examples of optional edges which depend on the input strings a and b.
The following theorem states our lower bound for the weighted directed case.
Theorem 2.9. Any (perhaps randomized) distributed ฮฑ-approximation algorithm in the Congest
model for the weighted directed k-spanner problem for k โฅ 4 takes โฆ( logn n ) rounds.
Proof. Let n = 6` for a positive integer `, and let Gw = Gw (`). Note that the number of vertices in
Gw is exactly n. There is a 4-spanner of cost 0 for Gw if and only if there is a path of length at
most 4 of edges of weight 0 between every pair of vertices xi , yj . A path of length at most 4 between
xi and yj that includes only edges of weight 0, must start with the edge (xi , x1i ) and must end with
the edge (yj2 , yj ). Following the proof of Claim 2.2, we argue that there is such a path if and only if
one of the edges (x1i , x2j ), (yi1 , yj2 ) is in Gw . Otherwise, there is no directed path of weight 0 between
xi and yj .
It follows that for every k โฅ 4, there is a k-spanner of cost 0 for Gw if and only if the inputs a
and b are disjoint. Hence, a distributed ฮฑ-approximation algorithm A for the weighted k-spanner
problem can be used to solve set disjointness: we define VB = Y1 , VA = V \ VB and let Alice and
Bob simulate the algorithm on Gw as before. At the end of the simulation, Alice concludes that the
inputs are disjoint if and only if none of the edges of D are taken to the spanner.
If the inputs are disjoint, then there is a spanner of cost 0. Hence, for any ฮฑ โฅ 1, an ฮฑapproximation must return a spanner of cost 0 if such exists. Otherwise, any spanner must include
at least one of the edges of D which proves that the output of Alice is indeed correct.
As in the proof of Lemma 2.4, we get that T (n) = โฆ( log` n ). Since n = 6`, this gives T (n) =
โฆ( logn n ).
We prove a similar bound for the weighted undirected k-spanner problem for k โฅ 4. In the
undirected case, we would like to construct a similar graph Gw , with only modifying all of its edges
to be undirected. It would still hold that there is a path of length at most 4 of edges of weight 0
15
between the vertices xi , yj if and only if one of the edges {x1i , x2j }, {yi1 , yj2 } is in Gw , following the
same proof. However, since the edges are undirected, there may be a path of length longer than 4 of
edges of weight 0 between the vertices xi , yj , even if none of the edges {x1i , x2j }, {yi1 , yj2 } is in Gw ,
which requires us to modify our construction in order for our bounds to apply also for k > 4.
We change the construction of Gw as follows. For each 1 โค i โค ` we replace the edge {yi2 , yi } by
a path of length k โ 3, by adding to the graph k โ 4 vertices yi3 , ..., yikโ2 and the required edges for
constructing the path {yi2 , yi3 , ..., yikโ2 , yi }. All of the edges of the path have weight 0.
Any path of length at most k of edges of weight 0 between xi to yj must start with the edge
{xi , x1i } and must end with the path of length k โ 3 that we added between yj2 to yj . Hence, there
is a path of length at most k between xi to yj of edges of weight 0 if and only if there is a path of
length 2 between x1i and yj2 . This can only happen if one of the edges {x1i , x2j }, {yi1 , yj2 } is in the
graph.
The rest of the proof is exactly the same as in the directed case. However, we added ฮ(k`)
vertices to the graph. Hence, the number of vertices in the graph is n = ฮ(k`) and not ฮ(`) as
e n ) to the undirected
before, which gives ` = ฮ( nk ). This allows us to prove a lower bound of โฆ(
k
e
problem (which is still โฆ(n)
for small values of k).
Theorem 2.10. Any (perhaps randomized) distributed ฮฑ-approximation algorithm in the Congest
n
model for the weighted undirected k-spanner problem for k โฅ 4 takes โฆ( kยทlog
n ) rounds.
3
Hardness of approximation of weighted 2-spanner
In this section, we show that approximating the weighted 2-spanner problem is at least as hard as
approximating the (unweighted) minimum vertex cover (MVC) problem. Therefore, known lower
bounds for MVC translate directly to lower bounds for the weighted 2-spanner problem.
In the MVC problem the input is a graph G = (V, E) and the goal is to find a minimum set of
vertices C that covers all the edges. That is, it is required that for each edge e = {v, u}, at least
one of v and u is in C.
Let G = (V, E) be an input graph to the MVC problem. We construct a new graph GS = (VS , ES )
in the following way (see Figure 3). For each vertex v โ V , there are 3 vertices in VS : v1 , v2 , v3 .
We connect these 3 vertices by a triangle, where the edge {v1 , v2 } has weight 1, and the edges
{v1 , v3 }, {v2 , v3 } have weight 0. In addition, for each edge {v, u} โ E, there are 3 edges in ES :
{v1 , u1 }, {v2 , u2 }, both having weight 0, and one of the edges {v1 , u2 }, {u1 , v2 }, according to the
order of the IDs of v and u, having weight 2.
0
๐ฃ3
0
๐ฃ1
1
0
๐ฃ2
๐ข1
2
๐ข3
1
๐ข2
0
0
0
Figure 3: For each vertex v โ G, there is a corresponding triangle in GS between the vertices
v1 , v2 , v3 . The edge {v, u} โ G has 3 corresponding edges in GS : {v1 , u1 }, {v2 , u2 }, {v1 , u2 }.
We show that a solution for the weighted 2-spanner problem in GS gives a solution for MVC in
G.
16
Claim 3.1. The cost of the minimum 2-spanner in GS is exactly the size of the minimum vertex
cover in G.
Proof. Let C be a minimum vertex cover in G. We construct a 2-spanner HC for GS as follows.
First, HC includes all the edges having weight 0. In addition, for every v โ C, we add to HC the
edge {v1 , v2 }. Note that these edges have weight 1, and all the other edges we add to HC have
weight 0, hence, the cost of HC is exactly |C|. We now show that HC is a 2-spanner. All the
edges having weight 0 in GS are added to the spanner, and hence they are covered. All the edges
having weight 1 are covered by edges of weight 0, since an edge {v1 , v2 } is covered by the path
{v1 , v3 }, {v3 , v2 }. Let {v1 , u2 } be an edge of weight 2 in GS , and let {v, u} be the corresponding
edge in G. Since C is a vertex cover, at least one of the vertices v, u is in C. In the former case,
we add {v1 , v2 } to HC , hence, the edge {v1 , u2 } is covered by the path {v1 , v2 }, {v2 , u2 } (note that
{v2 , u2 } has weight 0 and is included in HC ). In the latter case, {v1 , u2 } is covered by the path
{v1 , u1 }, {u1 , u2 }. Hence, HC is a 2-spanner having cost |C|.
In the other direction, let H be a minimum cost 2-spanner in GS having cost w(H). We construct
a vertex cover CH in G with size w(H). We start by converting H into a 2-spanner H 0 with the
same cost. First, H 0 contains all the edges having weight 0 in GS and all the edges having weight 1
in H. In addition, if H includes an edge {v1 , u2 } having weight 2, we replace it in H 0 by the two
edges {v1 , v2 }, {u1 , u2 }, each having weight 1. This transformation clearly cannot increase the cost.
We next show that H 0 is still a 2-spanner. Since H 0 includes all the edges having weight 0 in GS , it
covers all the edges of weight 0 or 1 by edges of weight 0, as explained above. In addition, any edge
of weight 2 that is covered in H by a path of length 2 that includes only edges of weight 0 or 1, is
covered in H 0 in the same way. Let e = {x1 , y2 } be an edge of weight 2, covered in H by a path P of
length at most 2 that includes the edge e0 = {v1 , u2 } โ H having weight 2 (e0 may be different than
e). It holds that e0 6โ H 0 , since e0 has weight 2, hence, we added the edges {v1 , v2 } and {u1 , u2 } to
H 0 . Since P has length at most 2, it follows that x1 = v1 or y2 = u2 . In the first case, e = {v1 , y2 }
and the path {v1 , v2 }, {v2 , y2 } covers e (we added {v1 , v2 } to H 0 , and since {v1 , y2 } โ ES , then
{v2 , y2 } is also in ES and has weight 0). In the second case, e = {x1 , u2 } and {x1 , u1 }, {u1 , u2 } is a
path of length 2 that covers e in H 0 .
Therefore, H 0 is a 2-spanner with the same cost of H. We define CH = {v|{v1 , v2 } โ H 0 }. The
size of CH is exactly w(H 0 ) since the edges {v1 , v2 } โ H 0 are exactly all the edges of H 0 having
weight 1, and H 0 includes only edges of weight 0 or 1. In addition, we claim that CH is a vertex
cover. Let {v, u} โ E, then one of the edges {v1 , u2 } or {u1 , v2 } is in ES . Assume w.l.o.g that
e = {v1 , u2 } โ ES . Note that e 6โ H 0 since it has weight 2. Since H 0 is a 2-spanner it includes a
path of the form {v1 , x}, {x, u2 } that covers e. It must hold that x = v2 or x = u1 (if, for example,
x = w1 such that w1 =
6 u1 , then the edge {w1 , u2 } has weight 2 and is not in H 0 ). Hence, at least
one of the edges {v1 , v2 }, {u1 , u2 } is in H 0 , which means that at least one of v, u is in CH as needed.
In conclusion, the cost of a minimum 2-spanner in GS is exactly the size of the minimum vertex
cover in G.
We can now relate the above to the number of rounds required for distributed algorithms that
solve or approximate these two problems.
Lemma 3.2. Let A be a distributed ฮฑ-approximation algorithm for the weighted 2-spanner problem
that takes T (n) rounds on a graph with n vertices. Then there is an ฮฑ-approximation algorithm for
MVC that takes 3T (3n) rounds on a graph with n vertices.
Proof. We describe an algorithm AM V C that approximates MVC. Let G be an input graph for
MVC. The algorithm AM V C simulates A on the graph GS , in the following way. Each vertex
17
v โ V simulates AM V C on the vertices v1 , v2 , v3 . Each time a message is sent on one of the 3 edges
corresponding to an edge {v, u} โ E, we send this message over the edge {v, u} โ E. Since we
may need to send 3 different messages on this edge, each round of A can be simulated in three
rounds of AM V C .5 When A finishes, we convert the solution H to a vertex cover CH as described
in the proof of Claim 3.1, without any communication. From Claim 3.1, it follows that if H is an
ฮฑ-approximation for the weighted 2-spanner problem in GS , then CH is an ฮฑ-approximation for
MVC in G. Let n be the number of vertices in G. The number of vertices in GS is 3n from the
definition of GS , hence the time complexity of simulating A on GS is 3T (3n).
Lemma 3.2 shows that if A works in the Congest model, then AM V C works in the Congest
model as well. Hence, lower bounds for approximating MVC in both the Local and the Congest
models give lower bounds for the weighted 2-spanner problem. This gives the following results.
Theorem 3.3. To obtain a constant or a polylogarithmic approximation ratio for the weighted
2-spanner problem, even in the Local model,
q there are graphs on which every distributed algorithm
log โ
requires at least โฆ( log log โ ) rounds and โฆ( logloglogn n ) rounds.
Theorem 3.3 follows from Theorem 14 in [48] and from Lemma 3.2. Note that the number of
vertices and the maximum degree in GS are equal up to a constant factor to the number of vertices
and maximum degree in G. In addition, Theorem 13 in [48], allows us to show trade-offs between
the time complexity of a distributed algorithm for weighted 2-spanner to the approximation ratio it
gets.
Theorem 3.4. For every integer k > 0, there are graphs G, such that in k communication rounds
in the Local model, every distributed algorithm
for the weighted 2-spanner problem on G has
!
1
1โo(1)
k+1
n 4k2
approximation ratios of at least โฆ
and โฆ โ k
.
k
In the Congest model, solving MVC optimally takes โฆ
which carries over to exact spanners, as follows.
n2
log2 n
rounds (see Theorem 2 in [11]),
Theorem 3.5. Any distributed
in the Congest model that solves the weighted 2-spanner
algorithm
n2
problem optimally requires โฆ log2 n rounds.
All of these lower bounds hold also for randomized algorithms.
Remarks: Our reduction from MVC can be adapted to obtain additional bounds. First, by
changing the weights of all edges having weight 2 to have weight 1, we obtain that an ฮฑ-approximation
for the weighted 2-spanner problem gives a 2ฮฑ-approximation for MVC. This implies the lower
bounds of Theorem 3.3 and Theorem 3.4 also for graphs with 0, 1 weights. This can be viewed as
lower bounds for the 2-spanner augmentation problem, in which we are given an initial set of edges
and need to augment it with the minimal number of edges that induces a 2-spanner.
Further, the same lower bounds hold for the directed weighted case. We modify the construction
such that the edges of the triangle for vertex v are (v1 , v2 ), (v1 , v3 ), (v3 , v2 ). For an edge {v, u} โ E,
ES includes 5 directed edges: (v1 , u1 ), (u1 , v1 ), (v2 , u2 ), (u2 , v2 ) and one of the edges (v1 , u2 ), (u1 , v2 ).
The weights of all the edges remain as in the undirected case.
5
In the Local model we can send these 3 messages in one round. However, we spend three different rounds in
order for the simulation to work also in the Congest model.
18
4
Distributed approximation for 2-spanner problems
Here we present our distributed approximation algorithm for the minimum 2-spanner problem. We
need the following terminology and notation.
A v-star is a non-empty subset of edges between v and a subset of its neighbors. The density
S|
of a star S with respect to a subset of edges H, denoted by ฯ(S, H), equals |C
|S| , where CS is the
set of edges of H 2-spanned by the star S, where an edge e = {u, w} is 2-spanned by the v-star
S if S includes the edges {v, u}, {v, w}. Note that S covers all the edges 2-spanned by S and also
the edges of S, but it 2-spans only non-star edges. The densest v-star with respect to H is the
v-star having maximal density with respect to H. The density of a vertex v with respect to H,
denoted by ฯ(v, H), is the density of the densest v-star. If H is clear from the context, we refer to
ฯ(S, H) and ฯ(v, H) as the density of S and the density of v, and denote them by ฯ(S) and ฯ(v),
respectively. The rounded density of a star S with respect to H, denoted by ฯฬ(S, H), is obtained
by rounding ฯ(S, H) to the closest power of 2 that is greater than ฯ(S, H). Similarly, the rounded
density of a vertex v with respect to H, denoted by ฯฬ(v, H), is obtained by rounding ฯ(v, H) to
the closest power of 2 that is greater than ฯ(v, H). The full v-star is the star that includes all the
edges between v and its neighbors. The 2-neighborhood of a vertex v consists of all the vertices at
distance at most 2 from v.
In our algorithm, each vertex v maintains a set Hv that includes all the edges 2-spanned by the
full v-star that are still not covered by the edges added to the spanner. The algorithm proceeds in
iterations, where in each iteration the following is computed:
1. Each vertex v computes its rounded density ฯv = ฯฬ(v, Hv ), and sends it to its 2-neighborhood.
2. Each vertex v such that ฯv โฅ ฯu for each u in its 2-neighborhood and ฯ(v, Hv ) โฅ 1 is a
candidate. Let Sv be a v-star with density at least ฯ4v , chosen according to Section 4.1 (a
choice which is central for our analysis to carry through). Vertex v informs its neighbors
about Sv . Let Cv be the edges of Hv 2-spanned by Sv .
3. Each candidate v chooses a random number rv โ {1, ..., n4 } and sends it to its neighbors.6
4. Each uncovered edge that is 2-spanned by at least one of the candidates, votes for the first
candidate that 2-spans it according to the order of the values rv . If there is more than one
candidate with the same minimum value, it votes for the one with minimum ID.
5. Each star Sv for which v receives at least
spanner.
|Cv |
8
votes from edges it 2-spans is added to the
6. Each vertex v updates the set Hv in its 2-neighborhood by removing from it edges that are
now covered.
7. If the maximal density in the 2-neighborhood of v is at most 1, v adds to the spanner all the
edges adjacent to it that are still not covered, and outputs the edges adjacent to it that were
added to the spanner during the algorithm.
At the end of the algorithm all the edges are covered by spanner edges, since we add to the
spanner edges that are not 2-spanned during the algorithm.
6
Knowing the exact value of n is unnecessary, and the typical assumption that the vertices know a polynomial
upper bound on n suffices.
19
Since all the candidates have maximal rounded density in their 2-neighborhood, it follows that
all the candidates that cover the same edge have the same rounded density, which is crucial in the
analysis. In addition, rounding the densities guarantees that there are only O(log โ) possible values
for the maximal rounded density, which allows us to show an efficient time complexity.
Each iteration takes constant number of rounds in the Local model. For example, to calculate
ฯฬ(v, Hv ), each vertex v learns all the edges between its neighbors that are still uncovered, by having
each vertex u send to its neighbors a list of its neighbors w such that the edges {u, w} are still not
covered. We next show that the algorithm requires only polynomial local computations.
We can compute the densest v-star in polynomial time as in the sequential algorithm (see Lemma
2.1 in [46]). This is the maximal density problem, that can be solved in polynomial time using flow
techniques [36]. This allows us to compute the rounded density of a vertex. We next explain how we
choose the star Sv in polynomial time. Other computations in the algorithm are clearly polynomial.
4.1
Choosing the star Sv
In step 2 of each iteration, a candidate vertex v chooses a v-star with density at least ฯ4v . However,
there may be multiple v-stars with such density, and choosing an arbitrary star between them does
not meet our claimed round complexity, and it is crucial to choose the stars in a certain way. In
addition, we have to find such star using only polynomial local computations. We next describe
how to choose the star Sv .
Let Hvi be the subset Hv at the beginning of iteration i. It holds that Hvi+1 โ Hvi for all i. Let
ฯ = ฯฬ(v, Hvi ). The star Svi that v chooses in iteration i is defined as follows. If i is the first iteration
in which v is a candidate with rounded density ฯ, then Svi is chosen as follows. First, v computes
the densest v-star, denote it by S. Now, if there is an edge e such that ฯ(S โช {e}, Hvi ) โฅ ฯ4 , then v
adds such an edge to S. Otherwise, if there is a disjoint v-star S 0 such that ฯ(S 0 , Hvi ) โฅ ฯ4 , then v
adds the edges of S 0 to S. Now v continues in the same manner until there is no edge or disjoint
star it can add to S without decreasing the density below ฯ4 . The resulting star is Svi .
If v is already a candidate with rounded density ฯ in iteration i โ 1, then if ฯ(Sviโ1 , Hvi ) โฅ ฯ4 , we
define Svi = Sviโ1 . Otherwise, if Sviโ1 contains a star with density at least ฯ4 with respect to Hvi , we
define Svi as follows. v starts by computing the densest v-star S that is contained in Svi , and then
adds to it edges or disjoint stars as before, however, it only considers adding edges or disjoint stars
from Sviโ1 . This guarantees that Svi โ Sviโ1 . If Sviโ1 does not contain a star with density at least ฯ4
with respect to Hvi , v chooses an arbitrary v-star with rounded density ฯ. (We later show that this
never happens).
The computations are polynomial. v adds edges to S at most n times. Each time it adds edges
it does the following computation: it checks if there is an edge such that ฯ(S โช {e}, Hvi ) โฅ ฯ4 , and
since there are at most n optional edges, the computation is polynomial. It also checks if there is a
disjoint star with density at least ฯ4 . To compute this, it computes the densest star that is disjoint
to S.
4.2
Analysis
In this section, we present the analysis of our distributed approximation algorithm for the minimum
2-spanner problem, and prove the following theorem.
Theorem 1.3. There is a distributed algorithm for the minimum 2-spanner problem in the Local
model that guarantees an approximation ratio of O(log m
n ), and takes O(log n log โ) rounds w.h.p.
Let H be the set of edges of the spanner produced by the algorithm. When the algorithm ends,
โ
all the edges are covered, hence H is a 2-spanner. We show that its size it at most O(log m
n )|H |,
20
where H โ is the set of edges of a minimum 2-spanner. Afterwards, we show that the time complexity
of the algorithm is O(log n log โ) rounds, w.h.p.
4.2.1
Approximation ratio
We start by showing that our algorithm guarantees an approximation ratio of O(log m
n ). The analysis
of the sequential algorithm of [46] that obtains the same approximation ratio strongly depends on
the facts that stars are added to the spanner one by one and that the star that is added at each step
has maximal rounded density. These allow dividing the edges to several subsets according to the
order in which they are covered in the algorithm, and bounding the number of edges in each subset.
Our analysis borrows ideas from the above analysis, but requires a more sophisticated accounting,
since our algorithm adds multiple stars in each iteration, with varying densities. In addition to
overcoming these uncertainties, a compelling aspect of our approach is that it easily extends to
other variants of the problem, such as the client-server 2-spanner problem [29].
To show the approximation ratio, we assign each edge e โ E a value cost(e) such that the sum
of the costs of all edges is closely related both to |H| and |H โ |, by satisfying
X
m โ
|H |,
|H| โค 8
cost(e) โค O log
n
eโE
which implies our claimed approximation ratio.
We write H = H1 โช H2 , where H1 are edges added to the spanner during the algorithm, and
H2 are edges added to the spanner at the end of the algorithm, when the maximal density in the
2-neighborhood of a vertex is at most 1.
For an edge e โ H2 , we set cost(e) = 1. For an edge e โ H1 , let i be the iteration in which e is
first covered in the algorithm. The edge e may be covered by a candidate star Sv that it votes for
and is added to the spanner at iteration i. In this case, we set cost(e) = ฯ1 , where ฯ is the density of
the star Sv that e chooses at iteration i. Another option is that e is covered as a result of adding
other stars to the spanner at iteration i: it may be covered either by a different star than the one
it votes for, or by a path of length 2 that is created by edges added to the spanner at iteration i
together with edges added at previous iterations. In each of these cases, we set cost(e) = 0. We first
show the left inequality above.
P
Lemma 4.1. |H| โค 8 ยท eโE cost(e).
P
P
|H1 | โค 8 P
Proof. ToPprove that |H| โค 8 eโE cost(e), it is enough to show thatP
eโE\H2 cost(e) and
|H2 | โค 8 eโH2 cost(e). The second inequality follows since |H2 | = eโH2 1 = eโH2 cost(e). We
next prove the first inequality.
P
Let Stars be the set of stars added to H1 in the algorithm. It holds that |H1 | โค SโStars |S|,
since each edge of H1 is included in at least one star. Let Sv be a star added to H1 at iteration i,
having density ฯ at that iteration. Recall that we add Sv to the spanner since it gets at least |C8v |
votes from the edges it 2-spans. Denote by V otes(Sv ) the set of edges that vote for Sv at iteration i.
For each e โ V otes(Sv ), we defined cost(e) = ฯ1 , which gives,
X
eโV otes(Sv )
cost(e) โฅ
1 |Cv |
|Sv | |Cv |
|Sv |
ยท
=
ยท
=
.
ฯ
8
|Cv |
8
8
P
Hence, for each S โ Stars, |S| โค 8 ยท eโV otes(S) cost(e). For each edge e, there is at most one star
S โ Stars such that e โ V otes(S), since an edge votes for at most one star at the iteration in which
21
it is covered. In addition, an edge e โ V otes(S) is 2-spanned during the algorithm, which means
that e 6โ H2 . Hence, we get
X
X
X
X
|H1 | โค
|S| โค 8 ยท
cost(e) โค 8 ยท
cost(e).
SโStars
SโStars eโV otes(S)
eโE\H2
This completes the proof of Lemma 4.1.
P
To bound eโE cost(e) from above, let r = m
n , and f = dlog re. We divide the edges of E
f +1
to f + 2 subsets {Ej }j=0 according to their costs, and show that for each j, the sum of costs
โ
of
P edges in Ej is at most โO(|H |). Since there are f + 2 = O(log r) subsets, we conclude that
eโE cost(e) โค O(log r)|H |.
Let E0 = {e : cost(e) = 0} and Ef +1 = H2 . Note that all the edges not in E0 and Ef +1 are
edges that were 2-spanned in the algorithm by the candidate star they vote for. We divide these
edges to f subsets as follows. Let E1 = {e 6โ H2 : 0 < cost(e) โค 2r }, and for 2 โค j โค f , let
jโ1
j
Ej = {e 6โ H2 : 2 r < cost(e) โค 2r }. For each edge e, it holds that cost(e) โค 1, since the density
of stars added to H1 during the algorithm is at least 1, and since we defined cost(e) = 1 for edges
f
+1
Ef .
e โ H2 . Hence, for each edge e, we have cost(e) โค 2r , which gives E = โชfj=0
P
Lemma 4.2. For every 0 โค j โค f + 1, eโEj cost(e) = O(|H โ |).
P
Proof. For j = 0, the claim holds trivially. For j = 1, it holds that eโE1 cost(e) โค 2r ยท |E| โค 2n =
O(|H โ |), where the last equality follows from the fact that any 2-spanner for G has at least n โ 1
edges, since G is connected.
For 2 โค j โค f , let Hjโ be the set of edges of a minimum 2-spanner for Ej . For each
P vertex v, let
โ
Sj (v) be the full v-star in Hjโ . We define Starsj = {Sjโ (v)}vโV . We next show that eโEj cost(e) โค
P
P
P
P
9 SโStarsj |S|. To prove this, we write eโEj cost(e) = eโEj โฉStarsj cost(e)+ eโEj \Starsj cost(e).
P
P
Since cost(e) โค 1, we get eโEj โฉStarsj cost(e) โค SโStarsj |S|.
P
P
We now show that eโEj \Starsj cost(e) โค 8 SโStarsj |S|. Consider a specific star S โ Starsj ,
and let (e1 , ..., e` ) be the edges of Ej 2-spanned by S according to the order in which they were
2-spanned in the algorithm, breaking ties arbitrarily. Note that all the edges in Ej for 1 โค j โค f are
2-spanned in the algorithm as explained above. The density of S at the beginning of the iteration
`
in which e1 is 2-spanned is at least |S|
, since S may 2-span additional edges that are not in Ej .
Since all the candidates that 2-span an edge have the same rounded density because they all have
maximal rounded density in their 2-neighborhood, it holds that the density of the star Sv that
`
`
2-spans e1 is at least 4|S|
, as v chooses a star with density at least ฯ4v โฅ 4|S|
. Hence, cost(e1 ) โค 4|S|
` .
This gives, ` โค
4|S|
cost(e1 )
โค
each edge e โ Ej , cost(e)
r
4|S|, where the
2jโ1
2j
โค r . Therefore,
`
X
i=1
cost(ei ) โค
last inequality follows since e1 โ Ej . Note that for
2j
2j
r
`โค
ยท jโ1 4|S| = 8|S|.
r
r 2
Let CS be the set of edges of Ej 2-spanned by the star S. Since Hjโ is a 2-spanner for Ej , every
edge e โ Ej \ Starsj is 2-spanned by at least one star S โ Starsj . Summing over all the stars in
Starsj gives
X
X X
X
cost(e) โค
cost(e) โค 8
|S|.
eโEj \Starsj
SโStarsj eโCS
22
SโStarsj
P
Note that SโStarsj |S| = 2|Hjโ |, since each edge of Hjโ is included in exactly two stars in Starsj .
In addition |Hjโ | โค |H โ | since H โ covers all the edges
P of E, and in particular all the edges of Ej ,
and Hjโ is the minimum 2-spanner of Ej . This gives eโEj cost(e) = O(|H โ |), which completes the
proof for 2 โค j โค f .
For j = f + 1, we define Hjโ and Starsj as before. Let S โ Starsj , and let (e1 , ..., e` ) be the
edges of Ej = H2 that are 2-spanned by S according to the order in which they were added to H2
in the algorithm, breaking ties arbitrarily. It must hold that ` โค |S|, as otherwise the density of S
is greater than
P` one at the iteration in which e1 is added to H2 , which contradicts the algorithm.
This
P gives i=1 cost(eโi ) โค ` โค |S|. Following the same arguments for the case 2 โค j โค f , we get
eโEj cost(e) = O(|H |), which completes the proof.
P
Lemmas 4.1 and 4.2 give |H| โค 8 eโE cost(e) โค O(log r)|H โ |, which proves the following
claimed approximation ratio.
Lemma 4.3. The approximation ratio of the algorithm is O(log m
n ).
4.2.2
Time complexity
We now show that our algorithm completes in O(log n log โ) rounds, w.h.p. In [43, 60], a potential
function argument is given for analyzing the set cover and minimum dominating set problems that
are addressed. We analyze our algorithm along a similar argument, but our algorithm necessitates a
more intricate analysis, mainly due to the fact that each vertex may be the center of multiple stars
that are added during the algorithm, rather than being chosen only once for a dominating set. The
latter may contain at most n vertices, while for the spanner constructed by our algorithm there
are initially n2โ possible stars which may constitute it. Nevertheless, we show how to get a time
complexity of O(log n log โ) rounds for our minimum 2-spanner algorithm, which matches the time
complexity of the above set cover and dominating set algorithms.
The crucial component in proving our small time complexity is showing that as long as the
rounded density of v does not change between iterations, v always chooses a star Sv that is equal to
or contained in the star that it chooses in the previous iteration. As explained in Section 4.1, if
the rounded density of v is the same in iterations i and i + 1, v tries to choose a star Svi+1 which is
contained in Svi . We show that this is always the case.
The following will be useful in our analysis.
Observation 1. Let x1 , x2 , ..., xn be non-negative numbers, and let y1 , y2 , ..., yn be positive numbers,
then
Pn
xi
xi
xi
i=1
min
โค Pn
โค max
.
i
i
yi
yi
i=1 yi
n o
n o
x
In addition, the inequalities become equalities only if for all j, yjj = mini xyii = maxi xyii .
Observation 1 follows from writing
Pn
i=1 xi
=
Pn
xi
i=1 yi
ยท yi . We now prove the following.
Claim 4.4. Let v be a candidate star in iteration i. If ฯฬ(v, Hvi ) = ฯฬ(v, Hvi+1 ) = ฯ, then v chooses a
star contained in Svi in iteration i + 1.
Proof. Assume to the contrary that there is an iteration i such that ฯฬ(v, Hvi ) = ฯฬ(v, Hvi+1 ) = ฯ, and
there is no star contained in Svi with density at least ฯ4 with respect to Hvi+1 . Let i0 be the first
0
iteration in which ฯฬ(v, Hvi0 ) = ฯ, and let i0 be the first iteration after i0 where ฯฬ(v, Hvi ) = ฯ and
0
0
ฯ
there is no star contained in Svi โ1 with density at least 4 with respect to Hvi . Let S โ be the densest
23
0
0
0
v-star with respect to Hvi . Then ฯ(S โ , Hvi ) โฅ ฯ2 since ฯฬ(v, Hvi ) = ฯ. Let S0 be the full v-star, and
let (S1 , S2 , ..., Sk ) be the sequence of stars chosen by v between iteration i0 and iteration i0 โ 1 in
the order in which they were chosen. For all 0 โค j โค k, it holds that Sj โ Sjโ1 , since i0 is the first
iteration in which this does not hold.
We next show by induction that S โ โ Sj for all 0 โค j โค k. In particular this will give S โ โ Sk .
0
Hence, at iteration i0 there is a star contained in Svi โ1 = Sk with density at least ฯ4 , in contradiction
to the definition of i0 .
For j = 0, the claim holds trivially since S0 is the full v-star.
Assume that S โ โ Sjโ1 , and assume to the contrary that S โ * Sj . Note that both Sj and S โ
are contained in Sjโ1 by the induction hypothesis. Let j 0 be the iteration in which Sj is chosen.
Since S โ * Sj , we can write S โ = S1 โช S2 where S1 = S โ โฉ Sj and S2 = S โ \ Sj . It holds that
0
0
0
0
2 |+|C12 |
ฯ(S โ , Hvj ) โฅ ฯ(S โ , Hvi ) โฅ ฯ2 . We can write ฯ(S โ , Hvi ) = |C1 |+|C
where C1 are edges of Hvi
|S1 |+|S2 |
2-spanned by S1 , C2 are edges 2-spanned by S2 , and C12 are edges 2-spanned by S โ with one
0
endpoint in S1 and one endpoint in S2 . Since S โ is the densest star with respect to Hvi it follows
0
12 |
1|
โ
i0
that |C2 |+|C
โฅ ฯ(S โ , Hvi ) โฅ ฯ2 , as otherwise by Observation 1, |C
|S2 |
|S1 | > ฯ(S , Hv ), which shows that
S1 is a denser star than S โ . This shows that at least one of
0
0
In the first case, ฯ(S2 , Hvj ) โฅ ฯ(S2 , Hvi ) =
|C2 |
|S2 |
|C2 |
|S2 |
and
|C12 |
|S2 |
is at least ฯ4 .
โฅ ฯ4 , which shows that S2 is a disjoint star to
ฯ
12 |
Sj with density at least ฯ4 that is contained in Sjโ1 . In the second case, |C
|S2 | โฅ 4 . For an edge
e all the edges of C
e = {v, u} โ S2 , denote by C12
12 with endpoint u. It follows that there is an
ฯ
e
edge e โ S2 such that |C12 | โฅ 4 . By Observation 1 and since the density of Sj is at least ฯ4 we
|C |+|C e |
j
12
get ฯ(Sj โช {e}) โฅ |S
โฅ ฯ4 , where Cj are the edges 2-spanned by Sj . Either way we get a
j |+1
contradiction to the definition of Sj . This completes the proof.
The rest of the analysis is based on a potential function argument which is described in [43, 60]
for the set cover and minimum dominating set problems.
Let ฯ = maxvโV ฯv at the beginning of
P
iteration i. We define the potential function ฯ = v:ฯv =ฯ |Cv |, where Cv is the set of edges of Hv
that are 2-spanned by the star Sv which v chooses at iteration i. Note that the potential function
may increase between iterations if the value of ฯ changes. However, since we round the values ฯv
to powers of two, there may be only O(log โ) different values for ฯ. The obstacle is that ฯ may
increase between iterations even if the value of ฯ does not change, because a vertex v might change
the stars Sv in different iterations. However, by Claim 4.4, as long as the rounded density of the
vertex remains the same among iterations, it always chooses a star that is contained in the star that
it chooses in the previous iteration. Hence, the size of the set of edges Cv can only decrease between
the end of the last iteration to the beginning of the next one. It follows that as long as ฯ does not
change, the value of ฯ can only decrease between iterations. Our goal is to show that if the value of
ฯ does not change between iterations, the potential function ฯ decreases by a multiplicative factor
between iterations in expectation. Having this, we get a time complexity of O(log n log โ) rounds
w.h.p.
The following lemma shows that if the value of ฯ does not change between iterations, the
potential function ฯ decreases by a multiplicative factor between iterations in expectation. The
proof follows the lines of the proofs in [43, 60], and is included here for completeness.
We say that an iteration is legal if the random numbers rv chosen by the candidates in this
iteration are different.
Lemma 4.5. If ฯ and ฯ0 are the potentials at the beginning and end of a legal iteration, then
E[ฯ0 ] โค c ยท ฯ for some positive constant c < 1.
24
In order to prove Lemma 4.5 we need the following definitions. Let s(e) be the number of
candidates that 2-span the edge e. For a candidate v, we sort the edges in Cv according to s(e) in
non-increasing order. Let T (v) and B(v) be the sets of the first d|Cv |/2e edges, and the last d|Cv |/2e
edges in the sorted order, respectively. Indeed, if |Cv | is odd, the sets T (v) and B(v) share an edge.
For a pair (Sv , e), where Sv is a candidate star that 2-spans e, we say that (Sv , e) is good if
e โ T (v). We next show that if e โ T (v) chooses Sv in a legal iteration, then the star Sv is added
to the spanner with constant probability.
Claim 4.6. Let i be a legal iteration. If e, e0 are both 2-spanned by S in iteration i, and s(e) โฅ s(e0 ),
then P r[e0 chooses S|e chooses S] โฅ 12 .
Proof. Let Ne , Ne0 , Nb be the number of candidates that 2-span e but not e0 , e0 but not e, and both
e and e0 , respectively.
P r[e and e0 choose S]
P r[e chooses S|e chooses S] =
=
P r[e chooses S]
0
1
Ne +Ne0 +Nb
1
Ne +Nb
=
|Ne | + |Nb |
.
|Ne | + |Ne0 | + |Nb |
It holds that Ne โฅ Ne0 since s(e) โฅ s(e0 ). This gives,
P r[e0 chooses S|e chooses S] =
|Ne | + |Nb |
1
|Ne | + |Nb |
โฅ
โฅ .
|Ne | + |Ne0 | + |Nb |
2|Ne | + |Nb |
2
Claim 4.7. If (Sv , e) is a good pair in a legal iteration i, then P r[Sv is chosen|e chooses Sv ] โฅ 31 .
Proof. Assume that e chooses Sv . Denote by X the number of edges in B(v) that choose Sv , and
let X 0 = |B(v)| โ X. Note that e โ T (v) since (Sv , e) is good, therefore s(e) โฅ s(e0 ) for any
edge e0 โ B(v). By Claim 4.6, any edge e0 โ B(v) chooses Sv with probability at least 12 . Hence,
E[X] โฅ |B2v | . Equivalently, E[X 0 ] โค |B2v | . Using Markovโs inequality we get
P r[X <
|Bv |
3
3
2
] = P r[X 0 > |Bv |] โค P r[X 0 โฅ E[X 0 ]] โค .
4
4
2
3
Hence, we get P r[X โฅ |B4v | ] โฅ 13 . Since |Bv | โฅ |C2v | , it holds that X โฅ |C8v | with probability at least
|Cv |
1
3 . In this case, at least 8 edges choose Sv , and it is added to the spanner. This completes the
proof.
We can now bound the value of the potential function, by proving Lemma 4.5.
Proof of Lemma 4.5. Let ฯ and ฯ0 be the
potential function
at the beginning and end
Pvalues of the P
P
of a legal iteration i. It holds that ฯ = v:ฯv =ฯ |Cv | = (Sv ,e) 1 = e s(e), where we sum over all
the edges 2-spanned by candidates having rounded density ฯ, and over all the pairs (Sv , e) where
v is a candidate having rounded density ฯ that 2-spans e. Note that the rounded density of all
the candidates that 2-span an edge e is the same, since they have maximal rounded density in
their 2-neighborhood. If the edge e chooses the star Sv , and the star Sv is added to the spanner, ฯ
decreases by s(e). We ascribe this decrease to the pair (Sv , e). Since e chooses only one candidate,
25
any decrease in ฯ is ascribed only to one pair. Hence, we get
X
P r[e chooses Sv , Sv is chosen] ยท s(e)
E[ฯ โ ฯ0 ] โฅ
(Sv ,e)
โฅ
X
P r[e chooses Sv ] ยท P r[Sv is chosen|e chooses Sv ] ยท s(e)
(Sv ,e) is good
โฅ
X
(Sv ,e) is good
1
1
1
ยท ยท s(e) =
s(e) 3
3
X
1.
(Sv ,e) is good
Since at least half of the pairs are good, we get E[ฯ โ ฯ0 ] โฅ 16 ฯ, or equivalently E[ฯ0 ] โค 56 ฯ, which
completes the proof.
In conclusion, we get the following.
Lemma 4.8. The time complexity of the algorithm is O(log n log โ) rounds w.h.p.
Proof. It holds that the maximum density of a star of size k is at most O(k 2 ) and the algorithm
terminates when the maximum density is at most 1. Since densities are rounded to powers of 2,
ฯ = maxvโV ฯv may obtain at most O(log โ) values, where โ is the maximum degree. In addition,
by Lemma 4.5, if ฯ has the same value at iterations j and j + 1, and j is a legal iteration, then the
value of ฯ decreases between these iterations by a factor of at least 1/c in expectation. Since the
random numbers rv are chosen from {1, ..., n4 }, they are different w.h.p, giving that if ฯ has the same
value in any two consecutive iterations then the value of ฯ decreases between these iterations by a
constant factor in expectation. Since ฯ โค n3 , after O(log (n3 )) = O(log n) iterations in expectation,
the value of ฯ must decrease. This shows that the time complexity is O(log n log โ) rounds in
expectation. A Chernoff bound then gives that this also holds w.h.p.
Lemma 4.3 and Lemma 4.8 complete the proof of Theorem 1.3.
4.3
Additional 2-spanner approximations
Here we show that the algorithm extends easily to the following variants: the directed 2-spanner
problem, the weighted 2-spanner problem and the client-server 2-spanner problem. We describe the
differences in the algorithm and analysis in each of these cases.
4.3.1
Directed 2-spanner approximation
In the directed case we consider directed stars. A v-star 2-spans a directed edge (u, w) if it includes
the directed edges (u, v), (v, w). A v-star may include both ingoing and outgoing edges of v. The
definition of densities follows the definition in the undirected case.
In order to give an algorithm that requires only polynomial local computations for the directed
variant, we show how to approximate the rounded density and the densest star in the directed case.
The rest of the analysis follows the undirected case, and gives the following.
Theorem 4.9. There is a distributed algorithm for the directed 2-spanner problem in the Local
model that guarantees an approximation ratio of O(log m
n ), and takes O(log n log โ) rounds w.h.p.
To compute an approximation for the densest (directed) v-star, we look at all the edges between
neighbors of v, and remove all the directed edges (u, w) that cannot be 2-spanned by a v-star (such
an edge can be 2-spanned by a v-star, only if the two directed edges (u, v), (v, w) exist in the graph).
26
Now we ignore the directions of edges and compute the densest v-star as in the undirected case. Let
Sv be the star computed. Let ฯU = ฯU (Sv ) be the undirected density of v (when ignoring edges that
cannot be 2-spanned by a directed path), and let ฯD be the directed density of v. We will show that
ฯU
ฯU
2 โค ฯD โค ฯU , and that 2 โค ฯD (Sv ), which shows that Sv gives a 2-approximation for the densest
directed v-star. When computing ฯD (Sv ) we replace each undirected edge {v, u} in Sv by the two
directed edges (v, u), (u, v) if both of them exist in the graph, or by the one that exists otherwise.
Claim 4.10.
ฯU
2
โค ฯD (Sv ).
Proof. Let Cv be the edges 2-spanned by Sv in the undirected case. Since Sv is the densest
v|
undirected v-star, ฯU = ฯU (Sv ) = |C
|Sv | . The directed star Sv 2-spans all the edges in Cv (some of
them may be counted twice in the directed case, which only increases the density), and it contains
at most twice edges because we replaced each undirected edge by at most two edges, which gives
|Cv |
ฯD (Sv ) โฅ 2|S
= ฯ2U .
v|
Claim 4.11.
ฯU
2
โค ฯD โค ฯU .
Proof. By Claim 4.10, ฯ2U โค ฯD (Sv ) โค ฯD . We next show ฯD โค ฯU . Let SD be the densest directed
v-star, and let CD be the directed edges 2-spanned by SD . We write CD = C1 โช C2 where an edge
(u, w) โ CD is in C2 if and only if the edge (w, u) is also in CD . We write SD = S1 โช S2 where an
edge (v, u) โ SD is in S2 if and only if the edge (u, v) is also in SD . Now we look at the undirected
density of SD (if we have two directed edges (w, u), (u, w) they are replaced by one undirected edge).
ฯU (SD ) =
|C1 | +
|S1 | +
|C2 |
2
|S2 |
2
=
|C1 |
2
|S1 |
2
+
+
|C1 |+|C2 |
2
|S1 |+|S2 |
2
โฅ min
|C1 | |C1 | + |C2 |
,
|S1 | |S1 | + |S2 |
= min
|C1 |
, ฯD ,
|S1 |
where the second inequality follows from Observation 1, and the last equality follows since SD is the
1 |+|C2 |
densest directed v-star, and its directed density equals |C
|S1 |+|S2 | .
We next show that
|C1 |
|S1 |
โฅ ฯD . Since ฯD =
|C1 |+|C2 |
|S1 |+|S2 | ,
if
|C1 |
|S1 |
< ฯD , we get by Observation 1
2|
that |C
|S2 | > ฯD . Note that the directed star S2 2-spans all the directed edges in C2 (and it may
2-span additional edges), because all the edges in C2 appear in both directions, which means
that the paths that 2-span them also appear in both directions in SD , which means that all
the edges of these paths are in S2 . This shows that S2 is a directed star with density greater
1|
than ฯD , in contradiction to the definition of ฯD . In conclusion |C
|S1 | โฅ ฯD , which shows that
n
o
1|
ฯU โฅ ฯU (SD ) โฅ min |C
|S1 | , ฯD = ฯD .
Claims 4.10 and 4.11 show that we can approximate the directed density and the densest
directed star using polynomial local computations. Having this, we can adapt the algorithm to the
directed 2-spanner problem. We approximate the directed density of v with ฯD (Sv ), which gives a
2-approximation. Then, we round the value of it to the closest power of two that is greater than
ฯD (Sv ), and denote the rounded value by ฯv , this is a 2-approximation to the rounded density of
v.7 While the value of ฯv remains the same we choose stars similarly to the undirected case, the
only difference is that when we look for a dense disjoint star, we do not necessarily find the densest
directed disjoint star but a 2-approximation for it. For the analysis to work, we need to look for
7
Since we compute an approximation to the density, the value of ฯv may increase between iterations. To avoid
such cases, we always define it to be the minimum between the value in the last iteration and the value computed in
the current iteration. This is always a 2-approximation for the rounded density since the density can only decrease
between iterations.
27
disjoint stars with density at least ฯ8v and not ฯ4v as in the undirected case, and we add edges or
disjoint stars to the star S we choose as long as the density of S is at least ฯ8v . The rest of the
analysis is similar, the constants change sightly since we choose stars that are less dense, and work
with an approximation to the density.
4.3.2
Weighted 2-spanner approximation
In the weighted case, the cost of a spanner is w(H), rather than |H| as in the unweighted case.
This requires several changes in the algorithm and the analysis. Let W be the ratio between the
maximum and minimum positive weights of an edge. We show the following.
Theorem 4.12. There is a distributed algorithm for the weighted 2-spanner problem in the Local
model that guarantees an approximation ratio of O(log โ), and takes O(log n log (โW )) rounds
w.h.p.
P
We next describe the differences in the weighted case. For a star S, we define w(S) = eโS w(e).
|CS |
If w(S) 6= 0, we define ฯ(S, H) = w(S)
, where CS is the set of edges of H 2-spanned by the star S. If
w(S) = 0, we define ฯ(S, H) = 0. We emphasize that we take the number of potentially 2-spanned
edges and not the sum of their weights, since, intuitively, all edges need to be covered (as opposed
to taking the sum of weights of the edges of the star, which is due to the need to optimize the cost
of the spanner).
In the beginning of the algorithm we add all the edges of weight 0 to the spanner. By doing
this, all the edges covered by stars S of weight 0 are already covered. Hence, the algorithm should
only consider stars for which w(S) > 0. When we round the densities to the closest power of
two, we include also negative powers of two, since the density of a star may be smaller than 1,
depending on the weights. A slight difference is that now a vertex terminates if the density in its
1
2-neighborhood is at most wmax
where wmax is the maximal weight of an edge adjacent to a vertex
in its 2-neighborhood. In such case, it adds to the spanner all the edges adjacent to it that are still
not covered. We denote by H2 all these edges. The rest of the algorithm is the same, according to
the new definition of ฯ. As was observed in the sequential algorithm for the weighted case [45], we
can find the densest star in the weighted case using flow techniques as well.
We next describe the differences in the analysis. The cost of the solution obtained by the
algorithm is now w(H), and the cost of an optimal solution is w(H โ ). We give to edges e 6โ H2 a
cost as in the unweighted case, but depending on the new definition of the density ฯ. In addition,
for edges e โ H2 we define cost(e) = w(e). Our goal is to show that
X
w(H) โค 8
cost(e) โค O(log โ)w(H โ ).
eโE
P
The proof that w(H) โค 8 PeโE cost(e) is the same as the proof of Lemma
P 4.1 with minor
changes. Note that w(H2 ) =
eโH2 cost(e) by definition. Now w(H1 ) โค
SโStars w(S), for
the same P
reason as in the unweighted case. In addition, the new definition of ฯ, gives that
w(S) โค 8 eโV otes(S) cost(e), and the rest of the proof follows.
However, the difference from the unweighted case is that we can no longer show an approximation
ratio of O(log m
n ). This is because the density of stars added in the algorithm may now be smaller
than 1, and because the weight of an optimal 2-spanner may be smaller than n โ 1. Still, we show
an approximation ratio of O(log โ). Some elements of our analysis have similar analogues in the
classic analysis of the greedy set cover algorithm [16, 44, 53]. First, instead of Lemma 4.2 we show
the following.
28
cost(e) โค O(log โ)w(H โ ).
P
โ
0
Proof. First, we show that eโE 0 cost(e) โค O(log โ)w(H
P ), where E = E \ (H2 โฉ E0 ) and E0 are
edges with cost 0. Edges in E0 clearly do not affect eโE cost(e). All the edges not in E0 or H2
are 2-spanned in the algorithm, as in the unweighted case.
For each vertex v, let S โ (v) be the full v-star in H โ . We define Starsโ = {S โ (v)}vโV . Consider
a star S โ Starsโ and let (e1 , ..., e` ) be the sequence of edges 2-spanned by S according to the order
in which they are 2-spanned in the algorithm. Assume first that w(S) 6= 0. The density of S at the
`
beginning of the iteration in which e1 is 2-spanned is w(S)
. All the candidates that 2-span e1 have
the same rounded density since they all have maximal rounded density in their 2-neighborhood. In
`
particular, the density of the star that 2-spans e1 is at least 4w(S)
, as v chooses a star with density
Lemma 4.13.
at least
ฯv
4
โฅ
P
eโE
`
4w(S) .
Hence, cost(e1 ) โค
iteration in which ej is 2-spanned is at
`
X
cost(ej ) โค 4w(S) ยท
j=1
4w(S)
` . Similarly, the density of S at the beginning of
4w(S)
least `โj+1
w(S) , which gives cost(ej ) โค `โj+1 . This gives,
`
X
j=1
the
1
= O(log `)w(S) = O(log โ)w(S).
`โj+1
The last equality is because the number of edges ` 2-spanned by a star is at most โ2 .
For a star S โ Starsโ such that w(S) = 0, note that cost(e) = 0 for all the edges 2-spanned by
S, since they are all covered
P`at the beginning of the algorithm without voting for any candidate.
Hence, we get in this
case
j ) = 0 = O(log โ)w(S).P
j=1 cost(eP
P
eโE
eโE 0 โฉStarsโ cost(e)
P We now write
P0 cost(e) =
P + eโE 0 \Starsโ cost(e). It holds that
cost(e)
โค
w(S).
We
next
bound
0
โ
โ
eโE โฉStars
SโStars
eโE 0 \Starsโ cost(e).
Let CS be the set of edges 2-spanned by the star S. Since H โ is a 2-spanner, every edge
e โ E 0 \ Starsโ is 2-spanned by at least one star S โ Starsโ . Summing over all the stars in Starsโ
we get,
X
X X
X
cost(e) โค
cost(e) โค O(log โ)
w(S).
eโE 0 \Starsโ
SโStarsโ eโCS
SโStarsโ
P
P
In conclusion, eโE
P 0 cost(e) = O(log โ) โ SโStarsโ w(S).
It holds P
that SโStarsโ w(S) = 2w(H ) since each edge of H โ is included in exactly two stars.
โ
This gives, eโE 0 cost(e) = O(log โ)w(H
P ).
To complete the proof, we bound eโH2 cost(e). Let H2โ be an optimal spanner for H2 . We
define Starsโ as before, with respect to H2โ . Let S โ Starsโ and let (e1 , ..., e` ) be the sequence of
edges of H2 2-spanned by S according to the order in which they are added to H2 in the algorithm.
`
1
From the definition of H2 it must hold that w(S)
โค wmax
where wmax is the maximal weight in
the 2-neighborhood of e1 (which in particular contains
P the star S and
P all the edges 2-spanned by
it), as otherwise e1 was not added to H2 . This givesP `i=1 cost(e) = `i=1 w(e) โค ` ยท wmax โค w(S).
โ
โ
โ
Following
as before, this
2 )). Since |H2 | โค |H |,
Pthe same arguments
P
P gives eโH2 cost(e) โค O(w(H
โ
we get
eโE cost(e) =
eโE 0 cost(e) +
eโH2 cost(e) = O(log โ)w(H ). This completes the
proof.
P
In conclusion, we get w(H) โค 8 eโE cost(e) โค O(log โ)w(H โ ), which completes the proof of
the O(log โ)-approximation ratio, giving the following lemma.
Lemma 4.14. The approximation ratio of the algorithm is O(log โ).
To prove the round complexity, there are minor changes in the proof of Claim 4.4. First, we
replace the size of a star |S| by its cost w(S) in order to work with the new definition of ฯ. Note
29
that adding edges of weight 0 to a star can only increase its density, which shows that all the v-stars
chosen in the algorithm, and in particular the star Sj , contain all the edges of weight 0 adjacent
to v. This shows that the star S2 = S โ \ Sj includes only edges with positive weight. The proof
carries over if w(S1 ) 6= 0. If w(S1 ) = 0, then all the edges 2-spanned by S1 are already 2-spanned at
0
|+|C12 |
1 |+|C2 |+|C12 |
the beginning of the algorithm which shows ฯ2 โค ฯ(S โ , Hvi ) = |Cw(S
= |C2w(S
, as needed.
1 )+w(S2 )
2)
In addition, in the second case of the proof instead of showing that there is an edge e โ S2 with
e
e | โฅ ฯ , we show that |C12 | โฅ ฯ .
|C12
4
4
w(e)
The number of possible densities depends on the weights, in the following way. Let Wmax , Wmin
max
be the maximum and the minimum positive weights of an edge. Recall that W = W
Wmin . The
2
maximum density of a star is at most Wโmin since a star 2-spans at most โ2 edges. In addition, the
1
algorithm terminates when the maximum density is Wmax
. Since we round the densities to powers
of two, there may at most O(log โW ) different non-zero values for the densities. The rest of the
proof is exactly the same as in the unweighted case.
4.3.3
Client-server 2-spanner approximation
Recall that in the Client-Server 2-spanner problem, the edges of the graph are divided to two types:
clients and servers, and the goal is to cover all the client edges with server edges.
Let C be the set of client edges, let V (C) be all the vertices that touch client edges, and let
โS be the maximum degree in the subgraph of G that includes all the server edges. We show the
following.
Theorem 4.15. There is a distributed algorithm for the client-server 2-spanner problem in the
Local model that guarantees an approximation ratio of O(min{log |V|C|
(C)| , log โS }), and takes
O(log n log โS ) rounds w.h.p.
There are slight differences in the algorithm. First, throughout the algorithm and analysis,
S|
we consider only stars composed of server edges, and for each such star we define ฯ(S, H) = |C
|S| ,
where CS is the set of client edges of H 2-spanned by the star S. The set of edges Hv that a vertex
v maintains consists only of client edges 2-spanned by the star that includes all the server edges
adjacent to v. Now v terminates if the maximal density in its 2-neighborhood is below 12 and not at
most 1 as before (since not all the client edges are server edges, perhaps the best way to cover a
client edge is to take a path of length 2 that covers it, the density of the corresponding star is 12 ).
Now cost(e) โค 2 which changes slightly the constants in the analysis. When v terminates, it adds
an uncovered edge e to the spanner only if e is both a client and a server edge. These edges are the
edges of H2 .
Note that since not all the edges are server edges, there may be client edges that cannot be
covered by server edges, in which case there is no solution to the problem, and our algorithm covers
only all the edges that may be covered by server edges. When we analyze the algorithm, we assume
that there is a solution to the problem, otherwise H โ is not defined. For other cases, we can restrict
the client edges to be only edges that can be covered by server edges, and get a new problem that
has an optimal solution H โ , and the approximation ratio we get is w.r.t to H โ .
For the analysis, there are slight differences as follows. First, we give costs only to client edges,
since these are the only edges we need to cover. We give the costs as in the minimum 2-spanner
algorithm. In particular, cost(e) = 1 for e โ H2 . Our goal is to show that
X
|C|
|H| โค 8
cost(e) โค O log
|H โ |.
|V (C)|
eโC
30
P
The proof that |H| โค 8 eโC
cost(e) is exactly the same as the proof of Lemma 4.1. We next
P
|C|
โ
show that eโC cost(e) โค O log |V|C|
(C)| |H |. Let r = |V (C)| , and f = dlog re. We define the
sets Ej according to the new definition of r. Let E1 = {e โ C \ H2 : 0 < cost(e) โค 2r }, and for
jโ1
j
2 โค j โค f + 1, let Ej = {e โ C \ H2 : 2 r < cost(e) โค 2r }. We define E0 as before, and Ef +2 = H2 .
Since the stars added to H1 in the algorithm have density at least 12 , then cost(e) โค 2 for each edge
+2
e โ C. This gives, C = โชfj=0
Ej . We next show the following.
P
Lemma 4.16. For every 0 โค j โค f + 2, eโEj cost(e) = O(|H โ |).
Proof. For j = 0, 2 โค j โค f + 1, and j = f + 2 the proof follows
0, 2 โค j โค f and
P the cases j =
2
j = f + 1 in the proof of Lemma 4.2. For j = 1, it holds that eโE1 cost(e) โค r ยท |C| โค 2|V (C)| =
O(|H โ |). In the first inequality, we use the fact that we give costs only to edges of C. The last
edges, which we prove next.
equality follows from the fact that H โ includes at least |V (C)|
4
Let GC = (V (C), C), and let C1 , ..., C` be the connected components of GC . Note that each
connected component of GC includes at least two vertices (since it includes at least one edge of
C), which means that the number ` of connected components is at most |V (C)|
. For a connected
P` 2
component Ci , denote by ni the number of vertices in Ci , so that |V (C)| = i=1 ni . For a connected
component Ci , denote by Hi all the edges of H โ that cover the edges in Ci . It holds that |Hi | โฅ ni โ1
since Ci is connected, and the edges of Hi need to connect all the vertices in Ci , otherwise there
is an edge in Ci which is not covered in H โ . In addition, for each edge e โ Hi , at least one of the
vertices of e is in Ci , otherwise it cannot cover an edge in Ci . It follows that an edge e โ H โ can be
in at most two different subsets Hi , Hj . This gives
`
`
`
i=1
i=1
i=1
1X
|V (C)| |V (C)|
|V (C)|
1X
1X
1
|H | โฅ
โ
=
,
|Hi | โฅ
(ni โ 1) =
ni โ ` โฅ
2
2
2
2
2
4
4
โ
which completes the proof.
P
Pf +2 P
โ
By Lemma 4.16, we get
cost(e) =
eโC
eโEj cost(e) = O(log r)|H |. Since |H| โค
j=0
P
P
8 ยท eโC cost(e), we have |H| โค 8 eโC cost(e) โค O(log r)|H โ |, which shows an approximation ratio
of O(log |V|C|
(C)| ).
P
In addition, we can show that eโC cost(e) โค O(log โS ), following the proof of Lemma 4.13,
by replacing w(S) and w(H) by |S| and |H|. This shows an approximation ratio of O(log โS ) to
the problem.
Note that in the minimum 2-spanner problem, m
n is half of the average degree in G, and โ is the
maximum degree in G, hence an approximation ratio of O(log m
n ) is better than O(log โ). However,
|C|
in the client-server variant, it may be the case that โS โค |V (C)| depending on the client and server
edges in G. The time analysis is the same as in the minimum 2-spanner problem. Note that there
may be at most O(log โS ) different values for ฯ because we consider only stars composed of server
edges. This completes the proof of Theorem 4.15.
5
Distributed approximation for MDS
In this section, we show that our algorithm can be modified to give an efficient algorithm for the
minimum dominating set (MDS) problem, guaranteeing an approximation ratio of O(log โ). In the
MDS problem the goal is to find a minimum set of vertices D such that each vertex is either in D
or has a neighbor in D. Our algorithm for MDS has the same structure of the algorithm of Jia et
31
al. [43], but it differs from it in the mechanism for symmetry breaking. Our approach guarantees
an approximation ratio of O(log โ), where in [43] the O(log โ)-approximation ratio holds only in
expectation. The following states our results for MDS.
Theorem 5.1. There is a distributed algorithm for the minimum dominating set problem in the
Congest model that guarantees an approximation ratio of O(log โ), and takes O(log n log โ) rounds
w.h.p.
For MDS, we define the star Sv centered at the vertex v as the set of vertices that contains v
and all of its neighbors. Note that there is only one star centered at each vertex, which simplifies
both the algorithm and its analysis. The density of a star S with respect to a subset of vertices U ,
denoted by ฯ(S, U ), is defined as |S โฉ U |. The density of a vertex v with respect to U , denoted by
ฯ(v, U ), is defined as |Sv โฉ U |. The definition of the rounded density is the same as for our algorithm
for the minimum 2-spanner problem.
A vertex v maintains a set Uv that contains all the vertices in Sv that are still not covered by
the vertices that have already been added to the dominating set, where a vertex is covered by a set
if it is in that set or has a neighbor in that set. Our algorithm proceeds in iterations, where in each
iteration the following is computed:
1. Each vertex v computes its rounded density ฯv = ฯฬ(v, Uv ), and sends it to its 2-neighborhood.
2. Each vertex v such that ฯv โฅ ฯu for each u in its 2-neighborhood is a candidate. Vertex v
informs its neighbors that it is a candidate. Let Cv = Sv โฉ Uv .
3. Each candidate v chooses a random number rv โ {1, ..., n4 } and sends it to its neighbors.
4. Each uncovered vertex that is covered by at least one of the candidates, votes for the first
candidate that covers it according to the order of the values rv . If there is more than one
candidate with the same minimum value, it votes for the one with the minimum ID.
5. If v receives at least
|Cv |
8
votes from vertices it covers then it is added to the dominating set.
6. Each vertex updates the set Uv by removing from it vertices that are now covered. If Uv = โ
,
v outputs 1 if and only if it was added to the dominating set in the previous step.
A crucial difference from our spanner approximation algorithm is that the densities are now
based on the number of uncovered neighbors of v, and not the number of uncovered edges that
can be potentially covered by a star. For this reason, all the computations in the algorithm can be
implemented efficiently in the Congest model.
The analysis of our MDS algorithm follows the same lines as the analysis of our minimum
2-spanner algorithm. We denote by D the dominating set produced by the algorithm, and by Dโ
a minimum dominating set. We assign each vertex v with a value cost(v), which equals ฯ1 if v is
covered for the first timeP
by a candidate having density ฯ that v votes for, and otherwise, cost(v) = 0.
We show that |D| โค 8 vโV cost(v) โค O(log โ)|Dโ |, which implies our claimed approximation
ratio.
P
Lemma 5.2. |D| โค 8 ยท uโV cost(u).
Proof. The proof is similar to the proof of Lemma 4.1. For a vertex v โ D we denote by V otes(v)
the vertices that vote for v. If v is added to D then it holds that at least |C8v | vertices vote
32
1
ฯ,
where ฯ is the density of v, which is |Cv |, by
P
definition. Hence, for each vertex v โ D, it holds that uโV otes(v) cost(u) โฅ ฯ1 ยท |C8v | = 18 . Since
each vertex
otes(v), summing over all the vertices in D gives that
P u is
Pin at most one set V P
|D| โค 8 ยท vโD uโV otes(v) cost(u) โค 8 ยท uโV cost(u).
P
The proof that vโV cost(v) โค O(log โ)|Dโ | is similar to the proof of Lemma 4.13, where
Starsโ isPreplaced by Dโ , edges are replaced by vertices,
and w(S) is replaced by 1 (note that the
P
โ
equality SโStarsโ w(S) = 2w(H ) is replaced by vโDโ 1 = |Dโ |). Together with Lemma 5.2, this
proves the approximation ratio of O(log โ).
For the time analysis, the main difference is that for each vertex v there is only one star Sv ,
which simplifies the proof (Claim 4.4 is no longer required).
Let ฯ = maxvโV ฯv at the beginning of
P
iteration i. We define the potential function ฯ = v:ฯv =ฯ |Cv |. If the value of ฯ does not change
between iterations, the value of ฯ can only decrease between iterations. By the definition of the
densities, the density of a vertex v is a at most |Sv | which is at most โ + 1. Since we round the
densities there may be at most O(log โ) different values for ฯ. Following the same analysis as in
the analysis of our minimum 2-spanner algorithm (with the difference that edges are replaced by
vertices, and a candidate is a vertex and not a star) we can show that if the value of ฯ does not
change between iterations, then the potential function ฯ decreases by a multiplicative factor between
iterations in expectation. This gives a time complexity of O(log n log โ) rounds w.h.p. Together
with the approximation ratio, this proves Theorem 5.1.
for it. The cost of each of these vertices is
6
Distributed (1 + )-approximation for spanner problems
In this section, we show distributed (1 + )-approximation algorithms for spanner problems, following
the framework of a recent algorithm for covering problems [39] (see Section 7).8 In a nutshell, the
vertices invoke a network decomposition algorithm on the graph Gr , for a value of r = O(log n/)
that can be computed by all vertices locally, given and a polynomial bound on n. This decomposes
the graph into clusters of logarithmic diameter, colored by a logarithmic number of colors. Finally,
by increasing order of colors, the vertices of each color select edges for the spanner. We show that
indeed clusters of the same color can make their choices in parallel, and that the method of choosing
edges to the spanner results in a (1 + ) approximation factor, giving the following.
Theorem 1.2. There is a randomized algorithm with complexity O(poly(log n/)) in the Local
model that computes a (1 + )-approximation of the minimum k-spanner w.h.p, where k is a constant.
Proof. We start by describing a sequential (1 + )-approximation algorithm, and then explain how
to implement it in the Local model using network decomposition. In the algorithm, the vertices
start adding edges to the spanner H, which is initialized to be empty, while keeping track of all the
edges covered by edges of H. At the beginning, all the edges are uncovered. To describe how this is
done, we need the following notation. For a given integer d, denote by Bd (v) the subgraph of all the
vertices within distance at most d from v and all the edges between them. For a vertex v and d โฅ 1,
let g(v, d) be the size of an optimal spanner for all of the uncovered edges in Bd (v) (notice that the
spanner can use both covered or uncovered edges of the whole graph G).
We process the vertices according to a given order v1 , v2 , ..., vn . In step i, we look for the smallest
radius ri such that g(vi , ri + 2k) โค (1 + )g(vi , ri ). Since an optimal spanner has size at most n2 ,
increasing the radius without the condition being met can only happen at most ri = O(log n/)
times. We add to H an optimal spanner for all the uncovered edges in Bri +2k (vi ), and mark all
8
The presentation of the framework in [39] is slightly different and goes through an intermediate SLOCAL model.
33
the edges covered by the new edges of H as covered. In particular, all the edges of Bri +2k (vi ) are
covered after this step. Note that an optimal spanner for Bri +2k (vi ) is contained in Bri +3k (vi ),
which shows that step i depends only on a polylogarithmic neighborhood around vi .
We next prove the approximation ratio of the algorithm. Denote by Ei all the edges of Bri (vi )
that are uncovered before step i. Since all the edges of Bri +2k (vi ) are covered after step i, it follows
that Ei and Ej are at distance at least 2k + 1 for i 6= j. Let H โ be an optimal spanner, and let
Hiโ be the minimum set of edges in H โ that covers Ei . By the definition of a k-spanner, Hiโ is
contained in Bri +k (vi ), which shows that the subsets Hiโ are disjoint. In step i, we added to H at
most (1 + )g(vi , ri ) โค (1 + )|Hiโ | edges, where the inequality follows since g(vi , ri ) is the size of an
optimal spanner for Ei where Hiโ is a spanner for Ei . Since โชni=1 Hiโ โ H โ and the subsets Hiโ are
disjoint, summing over all i gives |H| โค (1 + )|H โ |, which completes the approximation ratio proof.
We now show how to implement the algorithm in the Local model (see also Proposition 3.2
in [38]). Let r = O(log n/) be such that r > ri + 4k for all i, and consider the graph Gr on the same
set of vertices, where two vertices are connected if they are at distance at most r in the network
graph G. Notice that in the Local model, any algorithm on Gr can be simulated by the vertices
of G with an overhead of r rounds. The vertices invoke the randomized network decomposition
algorithm of Linial and Saks [52] on the graph Gr . This algorithm decomposes a graph into clusters
of diameter O(log n) that are colored with O(log n) colors, within O(log2 n) rounds. Invoked on Gr ,
this completes in poly(log n/) rounds.
We assign a vertex v the label (qv , IDv ) where qv is the color of the cluster of v and IDv is the
id of v. The lexicographic increasing order of the labels provides the order of the vertices. The
distributed k-spanner algorithm runs in O(log n) phases, where in each phase `, the vertices of color
` are active, and collect all of the information of their cluster in Gr and its neighbors. Since the
diameter of each cluster is at most O(log n), this completes in poly(log n/) rounds. Each vertex of
the cluster then locally simulates the sequential algorithm for all the vertices in its cluster, according
to their order. It can do so, since the sequential algorithm depends only on r-neighborhoods of
vertices, and every two vertices in the same r-neighborhood are neighbors in Gr , which means they
are either in the same cluster or in two clusters with different colors. This guarantees that the
algorithm can indeed be executed in parallel for vertices of the same color. This completes the
proof.
The correctness of the algorithm relies only on the fact that the definition of k-spanners is
local: an optimal spanner for Bd (v) is contained in Bd+k (v). Hence, the algorithm can be adapted
similarly to the weighted, directed and client-server variants. In the weighted case the complexity is
O(poly(log (nW )/)), where W is the ratio between the maximum and minimum positive weights
of an edge.
Acknowledgment:
We would like to thank Seri Khoury for fruitful discussions.
References
[1] Amir Abboud, Keren Censor-Hillel, and Seri Khoury. Near-linear lower bounds for distributed
distance computations, even in sparse networks. In Proceedings of the 30th International
Symposium on Distributed Computing (DISC), pages 29โ42, 2016.
[2] Baruch Awerbuch, Boaz Patt-Shamir, David Peleg, and Michael Saks. Adapting to asynchronous
dynamic networks. In Proceedings of the twenty-fourth annual ACM symposium on Theory of
computing (STOC), pages 557โ570, 1992.
34
[3] Baruch Awerbuch and David Peleg. Network synchronization with polylogarithmic overhead.
In Proceedings of the 31st Annual Symposium on Foundations of Computer Science (FOCS),
pages 514โ522, 1990.
[4] Baruch Awerbuch and David Peleg. Routing with polynomial communication-space trade-off.
SIAM Journal on Discrete Mathematics, 5(2):151โ162, 1992.
[5] Leonid Barenboim, Michael Elkin, and Cyril Gavoille. A fast network-decomposition algorithm
and its applications to constant-time distributed computation. Theoretical Computer Science,
2016.
[6] Surender Baswana and Sandeep Sen. Approximate distance oracles for unweighted graphs in
expected O(n2 ) time. ACM Transactions on Algorithms (TALG), 2(4):557โ577, 2006.
[7] Surender Baswana and Sandeep Sen. A simple and linear time randomized algorithm for
computing sparse spanners in weighted graphs. Random Structures & Algorithms, 30(4):532โ
563, 2007.
[8] Piotr Berman, Arnab Bhattacharyya, Konstantin Makarychev, Sofya Raskhodnikova, and
Grigory Yaroslavtsev. Approximation algorithms for spanner problems and directed steiner
forest. Information and Computation, 222:93โ107, 2013.
[9] Piotr Berman, Sofya Raskhodnikova, and Ge Ruan. Finding sparser directed spanners. In
IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer
Science (FSTTCS), pages 424โ435, 2010.
[10] Keren Censor-Hillel, Telikepalli Kavitha, Ami Paz, and Amir Yehudayoff. Distributed construction of purely additive spanners. In International Symposium on Distributed Computing
(DISC), pages 129โ142, 2016.
[11] Keren Censor-Hillel, Seri Khoury, and Ami Paz. Quadratic and near-quadratic lower bounds
for the CONGEST model. In 31st International Symposium on Distributed Computing, DISC
2017, October 16-20, 2017, Vienna, Austria, pages 10:1โ10:16, 2017.
[12] Shiri Chechik. Compact routing schemes with improved stretch. In Proceedings of the 2013
ACM symposium on Principles of distributed computing (PODC), pages 33โ41, 2013.
[13] Eden Chlamtaฬc and Michael Dinitz. Lowest degree k-spanner: Approximation and hardness. In
Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques
(APPROX/RANDOM), pages 80โ95, 2014.
[14] Eden Chlamtaฬcฬ, Michael Dinitz, Guy Kortsarz, and Bundit Laekhanukit. Approximating
spanners and directed steiner forest: Upper and lower bounds. In Proceedings of the TwentyEighth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pages 534โ553, 2017.
[15] Eden Chlamtac, Michael Dinitz, and Robert Krauthgamer. Everywhere-sparse spanners via
dense subgraphs. In IEEE 53rd Annual Symposium on Foundations of Computer Science
(FOCS), pages 758โ767, 2012.
[16] Vasek Chvatal. A greedy heuristic for the set-covering problem. Mathematics of operations
research, 4(3):233โ235, 1979.
35
[17] Bilel Derbel, Cyril Gavoille, David Peleg, and Laurent Viennot. On the locality of distributed
sparse spanner construction. In Proceedings of the twenty-seventh ACM symposium on Principles
of distributed computing (PODC), pages 273โ282, 2008.
[18] Bilel Derbel, Mohamed Mosbah, and Akka Zemmari. Sublinear fully distributed partition with
applications. Theory of Computing Systems, 47(2):368โ404, 2010.
[19] Michael Dinitz, Guy Kortsarz, and Ran Raz. Label cover instances with large girth and
the hardness of approximating basic k-spanner. ACM Transactions on Algorithms (TALG),
12(2):25, 2016.
[20] Michael Dinitz and Robert Krauthgamer. Directed spanners via flow-based linear programs. In
Proceedings of the forty-third annual ACM symposium on Theory of computing (STOC), pages
323โ332, 2011.
[21] Michael Dinitz and Robert Krauthgamer. Fault-tolerant spanners: better and simpler. In
Proceedings of the 30th annual ACM SIGACT-SIGOPS symposium on Principles of distributed
computing (PODC), pages 169โ178, 2011.
[22] Michael Dinitz and Yasamin Nazari. Distributed distance-bounded network design through
distributed convex programming. In Proceedings of the The 21st International Conference on
Principles of Distributed Systems (OPODIS), 2017.
[23] Michael Dinitz and Zeyu Zhang. Approximating low-stretch spanners. In Proceedings of
the Twenty-Seventh Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pages
821โ840, 2016.
[24] Andrew Drucker, Fabian Kuhn, and Rotem Oshman. On the power of the congested clique
model. In Proceedings of the 2014 ACM symposium on Principles of distributed computing
(PODC), pages 367โ376, 2014.
[25] Michael Elkin. Computing almost shortest paths. ACM Transactions on Algorithms (TALG),
1(2):283โ323, 2005.
[26] Michael Elkin. An unconditional lower bound on the time-approximation trade-off for the
distributed minimum spanning tree problem. SIAM J. Comput., 36(2):433โ456, 2006.
[27] Michael Elkin. A near-optimal distributed fully dynamic algorithm for maintaining sparse
spanners. In Proceedings of the twenty-sixth annual ACM symposium on Principles of distributed
computing (PODC), pages 185โ194, 2007.
[28] Michael Elkin and Ofer Neiman. Efficient algorithms for constructing very sparse spanners and
emulators. In Proceedings of the Twenty-Eighth Annual ACM-SIAM Symposium on Discrete
Algorithms (SODA), pages 652โ669, 2017.
[29] Michael Elkin and David Peleg. The client-server 2-spanner problem with applications to
network design. In 8th International Colloquium on Structural Information and Communication
Complexity (SIROCCO), pages 117โ132, 2001.
[30] Michael Elkin and David Peleg. Approximating k-spanner problems for k > 2. Theoretical
Computer Science, 337(1):249โ277, 2005.
36
[31] Michael Elkin and David Peleg. The hardness of approximating spanner problems. Theory of
Computing Systems, 41(4):691โ729, 2007.
[32] Michael Elkin and Jian Zhang. Efficient algorithms for constructing (1+ฮต, ฮฒ)-spanners in the
distributed and streaming models. In Proceedings of the twenty-third annual ACM symposium
on Principles of distributed computing (PODC), pages 160โ168, 2004.
[33] Paul Erdoฬs. Extremal problems in graph theory. In Theory Of Graphs And Its Applications,
Proceedings of Symposium Smolenice, pages 29โ36. Publ. House Cszechoslovak Acad. Sci.,
Prague, 1964.
[34] Orr Fischer, Tzlil Gonen, and Rotem Oshman. Distributed property testing for subgraphfreeness revisited. CoRR, abs/1705.04033, 2017.
[35] Silvio Frischknecht, Stephan Holzer, and Roger Wattenhofer. Networks cannot compute their
diameter in sublinear time. In Proceedings of the twenty-third annual ACM-SIAM symposium
on Discrete Algorithms (SODA), pages 1150โ1162, 2012.
[36] Giorgio Gallo, Michael D Grigoriadis, and Robert E Tarjan. A fast parametric maximum flow
algorithm and applications. SIAM Journal on Computing, 18(1):30โ55, 1989.
[37] Mohsen Ghaffari. Near-optimal distributed approximation of minimum-weight connected
dominating set. In Proceedings of the 41st International Colloquium on Automata, Languages,
and Programming (ICALP), pages 483โ494, 2014.
[38] Mohsen Ghaffari, David G Harris, and Fabian Kuhn. On derandomizing local distributed
algorithms. arXiv preprint arXiv:1711.02194, 2017.
[39] Mohsen Ghaffari, Fabian Kuhn, and Yannic Maus. On the complexity of local distributed
graph problems. In Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of
Computing (STOC), pages 784โ797. ACM, 2017.
[40] Ofer Grossman and Merav Parter. Improved deterministic distributed construction of spanners.
In 31st International Symposium on Distributed Computing, DISC 2017, October 16-20, 2017,
Vienna, Austria, pages 24:1โ24:16, 2017.
[41] David G Harris, Johannes Schneider, and Hsin-Hao Su. Distributed (โ+1)-coloring in sublogarithmic rounds. In Proceedings of the 48th Annual ACM SIGACT Symposium on Theory of
Computing (STOC), pages 465โ478, 2016.
[42] Stephan Holzer and Roger Wattenhofer. Optimal distributed all pairs shortest paths and
applications. In Proceedings of the 2012 ACM symposium on Principles of distributed computing
(PODC), pages 355โ364. ACM, 2012.
[43] Lujun Jia, Rajmohan Rajaraman, and Torsten Suel. An efficient distributed algorithm for
constructing small dominating sets. Distributed Computing, 15(4):193โ205, 2002.
[44] David S Johnson. Approximation algorithms for combinatorial problems. Journal of computer
and system sciences, 9(3):256โ278, 1974.
[45] Guy Kortsarz. On the hardness of approximating spanners. Algorithmica, 30(3):432โ450, 2001.
[46] Guy Kortsarz and David Peleg. Generating sparse 2-spanners. Journal of Algorithms, 17(2):222โ
236, 1994.
37
[47] Guy Kortsarz and David Peleg. Generating low-degree 2-spanners. SIAM Journal on Computing,
27(5):1438โ1456, 1998.
[48] Fabian Kuhn, Thomas Moscibroda, and Roger Wattenhofer. Local computation: Lower and
upper bounds. Journal of the ACM (JACM), 63(2):17, 2016.
[49] Fabian Kuhn and Rogert Wattenhofer. Constant-time distributed dominating set approximation.
In Proceedings of the twenty-second annual symposium on Principles of distributed computing
(PODC), pages 25โ32, 2003.
[50] Eyal Kushilevitz and Noam Nisan. Communication Complexity. Cambridge University Press,
New York, NY, USA, 1997.
[51] Nathan Linial. Locality in distributed graph algorithms. SIAM J. Comput., 21(1):193โ201,
1992.
[52] Nathan Linial and Michael Saks. Low diameter graph decompositions. Combinatorica, 13(4):441โ
454, 1993.
[53] Laฬszloฬ Lovaฬsz. On the ratio of optimal integral and fractional covers. Discrete mathematics,
13(4):383โ390, 1975.
[54] David Peleg. Distributed Computing: A Locality-Sensitive Approach. SIAM, 2000.
[55] David Peleg and Vitaly Rubinovich. A near-tight lower bound on the time complexity of
distributed minimum-weight spanning tree construction. SIAM J. Comput., 30(5):1427โ1442,
2000.
[56] David Peleg and Alejandro A Schaฬffer. Graph spanners. Journal of graph theory, 13(1):99โ116,
1989.
[57] David Peleg and Jeffrey D Ullman. An optimal synchronizer for the hypercube. SIAM Journal
on computing, 18(4):740โ747, 1989.
[58] David Peleg and Eli Upfal. A trade-off between space and efficiency for routing tables. Journal
of the ACM (JACM), 36(3):510โ530, 1989.
[59] Seth Pettie. Distributed algorithms for ultrasparse spanners and linear size skeletons. Distributed
Computing, 22(3):147โ166, 2010.
[60] Sridhar Rajagopalan and Vijay V Vazirani. Primal-dual rnc approximation algorithms for set
cover and covering integer programs. SIAM Journal on Computing, 28(2):525โ540, 1998.
[61] Alexander A. Razborov. On the distributional complexity of disjointness. Theoretical Computer
Science, 106(2):385โ390, 1992.
[62] Liam Roditty, Mikkel Thorup, and Uri Zwick. Deterministic constructions of approximate
distance oracles and spanners. In International Colloquium on Automata, Languages, and
Programming (ICALP), pages 261โ272, 2005.
[63] Atish Das Sarma, Stephan Holzer, Liah Kor, Amos Korman, Danupon Nanongkai, Gopal
Pandurangan, David Peleg, and Roger Wattenhofer. Distributed verification and hardness of
distributed approximation. SIAM Journal on Computing, 41(5):1235โ1265, 2012.
38
[64] Mikkel Thorup and Uri Zwick. Compact routing schemes. In Proceedings of the thirteenth
annual ACM symposium on Parallel algorithms and architectures (SPAA), pages 1โ10, 2001.
[65] Mikkel Thorup and Uri Zwick. Approximate distance oracles. Journal of the ACM (JACM),
52(1):1โ24, 2005.
39
| 8cs.DS
|
arXiv:1704.04782v1 [cs.DC] 16 Apr 2017
A Security Monitoring Framework For Virtualization
Based HEP Infrastructures
A. Gomez Ramirez1 , M. Martinez Pedreira2 , C. Grigoras2 , L.
Betev2 , C. Lara1 and U. Kebschull1 for the ALICE Collaboration
1
2
Infrastructure and Computer Systems for Data Processing (IRI), Goethe-University Frankfurt
CERN, Geneva, Switzerland
E-mail: [email protected]
Abstract. High Energy Physics (HEP) distributed computing infrastructures require
automatic tools to monitor, analyze and react to potential security incidents. These tools
should collect and inspect data such as resource consumption, logs and sequence of system calls
for detecting anomalies that indicate the presence of a malicious agent. They should also be able
to perform automated reactions to attacks without administrator intervention. We describe a
novel framework that accomplishes these requirements, with a proof of concept implementation
for the ALICE experiment at CERN. We show how we achieve a fully virtualized environment
that improves the security by isolating services and Jobs without a significant performance
impact. We also describe a collected dataset for Machine Learning based Intrusion Prevention
and Detection Systems on Grid computing. This dataset is composed of resource consumption
measurements (such as CPU, RAM and network traffic), logfiles from operating system services,
and system call data collected from production Jobs running in an ALICE Grid test site and
a big set of malware. This malware was collected from security research sites. Based on this
dataset, we will proceed to develop Machine Learning algorithms able to detect malicious Jobs.
1. Introduction
Frequently in HEP computing, and also in general purpose Grid computing, user supplied
code and data are deployed and executed in farms around the world, while the exact location
is normally irrelevant. This allows scientists from many areas beyond physics to use huge
computational power to solve complicated scientific problems, such as weather modeling, brain
simulation, among others. However it also creates cyber-security challenges. Operators and
administrators need tools to monitor for security incidents. User code and data should be
isolated from different users, also from the physical computers and networks, in order to restrict
access to sensitive elements in the organizations.
We propose a novel paradigm and developed a framework that focus on protecting and
monitoring user payload execution. Moreover, it enforces isolation in the environment in such a
way that Jobs cannot access sensitive resources. This tool enables the Job behavior analysis in
order to detect possible intrusions. This is accomplished by collecting and processing data
generated by Jobs such as logs, system calls and resource consumption data. Traditional
Intrusion Detection and Prevention Systems (IDPS) perform attack detection by using fixed
rules based on signatures, identical to traditional monitoring systems. Therefore, we employ
Machine Learning (ML) to overcome the mentioned drawbacks, achieving generalization among
attack variants. Currently there is no tool that provides isolation, while monitoring security
incidents by ML algorithms in Grid computing [1].
The authors have defined a threat model that guides the design and implementation of the
described framework [1]. It is devised to detect attackers in the protected system trying actions
like the following:
โข
โข
โข
โข
โข
โข
Exploit unknown or unfixed software/hardware vulnerabilities.
Listen to user network traffic to gather sensitive clear text information.
Perform a โman in the middleโ attack.
Tamper other user Jobs.
Escalate privileges.
Access sensitive server configuration data.
As a proof of concept we are implementing the described framework for the ALICE Grid
at CERN. ALICE (A Large Ion Collider Experiment) is a dedicated PbโPb detector designed
to exploit the physics potential of nucleus-nucleus interactions at the Large Hadron Collider
at CERN [2, 3]. The ALICE experiment has developed the ALICE production environment
(AliEn) [4], which implements many components of the Grid technologies that are needed to
analyze HEP data. Through AliEn, the computing centers that participate in the ALICE Grid
can be seen and used as a single entity. Any available node executes Jobs and file access is
transparent to the user, wherever in the world a file might be [5]. Figure 1 shows a picture of
the ALICE Grid.
Figure 1. ALICE Grid computing farms aroud the world.
This document is organized as follows: section 2 introduces a security by isolation strategy
for a distributed system. Section 3 explains a method for collecting relevant data from the
isolated infrastructure. Section 4 shows how the collected data can be used to determine the
security status of the system. In section 5 we detail our Intrusion Detection and Prevention
model. Section 6 summarizes the current state of the project and the challenges faced in the
design and implementation of the desired methodology. Finally, section 7 gives conclusions on
the work done.
2. Security by isolation
Security by isolation enforces application space separation [8]. The idea is that, if one process
is compromised and utilized to attack the entire system, other components can stay untouched.
Several technologies provide secure isolation. Virtual Machines (VM) and Linux Containers
(LC) are very popular examples.
2.1. Linux containers
LC are an extension of the virtual memory concept to allow the isolation of network interfaces,
the PID tree and mount points [9]. Separation of containers from the rest of the system is
enforced by the Kernel, so they can not affect the host or other containers. LC technology
uses namespaces and Cgroups [10] to have a private view of the system and a limited resource
assignment.
Containers provide a set of advantages over VM. They are lightweight and fast, boot in
milliseconds and have just a few MB of intrinsic disk and memory usage. It has been shown
[11], that they provide a better performance than VMs. Commonly, VM are used in Grid and
Cloud computing to achieve isolation, however LC performance and comparable security features
make it a suitable alternative[6, 7].
2.2. Proposed isolation architecture
We propose the usage of LC to enforce HEP Grid site user isolation, also extensible to broader
scientific computing and clouds. To achieve this we require a batch Job orchestrator allowing
the execution of user processes in containers on computing clusters. Section 6 gives further
details about this requirement and the selected solution. As shown in Figure 2, we switch from
an environment without isolation, where Jobs have access to the server and other user Jobs,
to an environment where Jobs run in their one process space, without access to other Jobs or
sensitive components.
Pilot
Job
Bob's Grid Alice's Grid
Job
Job
Bob's Grid
Job
Container
Pilot
Job
Alice's Grid
Job
Pilot
Job
Container
Figure 2. Desired isolation scenario.
An isolated environment for Job execution is not enough. Jobs could still perform several
kind of attacks or not allowed activities such as, Distributed Denegation of Service (DDoS),
Bitcoin mining, malware/botnet hosting, among others. Consequently, we need to monitor the
activity and detect incidents inside the LC, as described in the next sections.
3. Monitoring data mining
HEP distributed computing systems use continuous automated monitoring to help
administrators to find and fix situations affecting the normal operation [12]. The resulting
monitoring data can be used to find or even predict software and hardware failures. It is a
valuable source of security information as well. In this document we focus on the measurement
of metrics related to the batch Jobs being submitted to the distributed system. There are several
relevant metrics that we can collect, for instance:
โข Job and system logs.
โข System call sequence.
โข Resource usage data (such as CPU, RAM and network traffic).
Furthermore our goal is to chose the best information about Job behavior without affecting
the habitual performance. We decided to employ data mining and intelligent algorithms, given
their ability to find correlations and analyze trends in big datasets [13], in order to provide a
better understanding of security related events.
4. Machine learning based security monitoring
Machine Learning is a set of mathematical models that simulate the human learning abilities[14,
15]. In the context of Intrusion Detection, ML helps analyzing big amounts of data by learning
the expected behavior and identifying abnormal situations. Traditional industrial IDS use rather
fixed rules and search for known attack signatures. However they have problems when unknown
or slightly different intrusion methods are used [13]. We have selected supervised training to
analyze the collected data. In supervised training, a set of already classified and tagged data
(training dataset) is used to model a function (for example a Neural Network) in order to make
it able to classify new unseen data (test dataset) [16].
Figure 3. Monitored data gathering and processing.
4.1. Training dataset
We have collected a training and testing dataset by gathering monitoring data from production
ALICE Grid Jobs (Figure 3). Additionally we have executed a big set of Linux malware samples.
The data on the first part is tagged as normal data and the second as malicious. This dataset
is utilized to compare several Machine Learning algorithms to find the one that gives the best
accuracy. Following is the list of ML algorithms selected. They will be tested to define which
one gives the best accurate results for our dataset:
โข Support Vector Machines.
โข Multilayer Neural Networks.
โข Recurrent Neural Networks.
Figure 4 shows a scheme of the proposed architecture for the ML usage.
Figure 4. Proposed architecture.
5. Intrusion prevention and detection
When analyzing Job monitoring data, our goal is finding security incidents. This security
incidents can be found by analyzing anomalies in the system, things that go beyond the common
state, probably caused by malicious software. Besides, even if our execution environment is
sandboxed, there are many possible attacks that can still affect the distributed infrastructure.
If a userโs Job is misbehaving, the proposed framework should raise an alarm and perform
predefined actions, for instance terminate the malicious processes. Figure 5 shows the desired
implementation of the proposed system regarding Intrusion Detection.
Intrusion
Detection
and
Prevention
โข Alerts for
Admins
โข Automated
Actions
Figure 5. Proposed Intrusion Detection in the worker nodes.
5.1. Challenges
Improving the provided security should not impact the system performance. This is especially
important in HEP computing. On the other hand, we also need innovative ways to analyze the
trace and log data in an efficient way. Another important challenge is to reduce the amount of
false positives and false negatives, since the system administrators rely on the accuracy of the
security monitoring framework.
6. Proof of concept and testing environtment
So far we have already deployed a testing ALICE Grid site based on AliEn [4] in a local Linux
cluster, with five Ubuntu 14.04 nodes. In order to orchestrate and run the Jobs inside Linux
Containers we have tested three different tools that offer such functionality:
โข Kubernetes [17].
โข Apache Mesos [18].
โข Docker Swarm [19].
At the end we have decided to work with Docker Swarm, because it allows to carry out
the simplest deployment, which is an important requirement for our research environment. We
use Docker [20] as LC engine, with Centos 6 [21] container images. We have developed AliEn
interfaces for the mentioned batch systems. CVMFS [22] is installed on the hosts and shared as
a volume inside the AliEn container to allow access to HEP libraries. Currently we execute one
Job per container. This is useful to increase the traceability between different Jobs. Also, this
is the natural micro service model for LC.
As a monitoring infrastructure for collecting data from normal Grid Jobs we have Prometheus
[23] and Sysdig [24]. Prometheus allows to take resource usage data directly from containers
and collect it via a RESTful interface. Sysdig enables to capture system calls in Linux OS in a
fast a reliable way. We have develop a custom Python library to integrate these tools and make
them fit our needs. This infrastructure has been utilized for the execution and measurement of
ALICE production Jobs, that are tagged as normal Jobs.
A network isolated machine was used for malware data collection. This machine has the same
setup as the Grid worker nodes. We have downloaded a set of 10000 Linux malware samples
from a security research web site [25]. We ran the samples and collected the same information
as for the normal Jobs (logs, sequence of system calls, resource usage data). Finally we obtained
a combined dataset that allows to train and test our selected Machine Learning algorithms. A
representation of the implemented components are shown in the Figure 6.
7. Conclusions
Distributed computing is a fundamental component of High Energy Physics collaborations.
Improving security in this kind of infrastructures requires innovative tools to automatically
detect security related incidents. Security by isolation is also necessary to protect sensitive
components allowing traceability on Job activities. We propose the usage of Linux Containers
in order to provide isolation without highly decreasing the expected performance. We use
Machine Learning techniques to provide generalization, overcoming common IDS difficulties on
finding even slightly different threats. We describe the ongoing development process of a new
security monitoring framework for Linux Containers based HEP infrastructures. This is being
tested as a proof of concept for the ALICE experiment at CERN. We have collected a dataset
of normal and malicious monitoring information from Grid Jobs and malware samples, that
will be utilized to train and test ML algorithms. These algorithms should enable autonomous
Intrusion Detection and Prevention as an important component of the proposed new framework.
As future work we plan to explore how our approach can be used to detect anomalies that go
beyond the security scope, for instance to find hardware failures or even human mistakes.
Acknowledgments
Authors acknowledge assistance from CERN security department specially Stefan Lueders and
Romain Wartel. This work is supported by the German Federal Ministry of Education and
Research.
SYSDIG
โข System calls
โข Connections
โข Resource
usage
Figure 6. Proof of concept implementation.
References
[1] Gomez Ramirez A, Lara C and Kebschull U 2015 JPCS. Intrusion Prevention and Detection in Grid Computing
- The ALICE Case.
[2] The ALICE collaboration 1995 ALICE - Technical Proposal for A Large Ion Collider Experiment at the CERN
LHC, CERN, Geneve, Rep. CERN-LHCC-95-71; LHCC-P-3.
[3] The ALICE collaboration 2008 JINST. The ALICE Experiment at the CERN LHC, , vol. 3, no. 08, Aug.
[4] Begnasco S et al. 2015 JPCS. AliEn: ALICE environment on the GRID. IOP Publishing.
[5] Christoph E et al. 2005 Technical Design Report LCG. LHC computing Grid: Technical Design Report. Version
1.06. 20 Jun 2005. CERN, Geneve. Available from: https://cds.cern.ch/record/840543.
[6] Abed A, Clancy C and Levy C 2015 Security and Trust Management, Lecture Notes in Computer Science.
Intrusion Detection System for Applications Using Linux Containers. Springer International Publishing.
[7] Modi C et al. 2013 JNCA. A survey of intrusion detection techniques in Cloud. Jan;36(1):42-57.
[8] Mansfield-Devine S 2010 Computer Fraud & Security. Security through isolation. 5, 8 - 11. 1361-3723.
[9] Graber S, 2014 Ubuntu Foundations Team, LXC 1.0: Blog post series. [updated 2014 Jan 17; cited 2015 May
11]. Available from: https://www.stgraber.org/2013/12/20/lxc-1-0-blog-post-series/
[10] Menage P 2007 Proceedings of the Linux Symposium. Adding Generic Process Containers to the Linux Kernel.
June 27.
[11] Shiseki A 2016 The 22nd International Conference on Computing in High Energy and Nuclear Physics, CHEP
2016. Cloud Computing as a Scientific and Technical Application Development and Execution Platform.
October 10-14.
[12] Lara C et al. 2011 JPCS. Autonomous System Management for the ALICE High-Level-Trigger Cluster using
the SysMES Framework. doi:10.1088/1742-6596/331/5/052003.
[13] Azad V 2013 IJITCS. Data Mining in Intrusion Detection: A Comparative Study of Methods, Types and
Data Sets. 75-90.
[14] Yuping L et al. 2012 IJACT. An Intrusion Detection Approach Using SVM and Multiple Kernel Method.
Jan 31;4(1):463-9.
[15] Gascon H et al. 2014 ACM Press; 2013. Structural detection of android malware using embedded call graphs.
[cited 2014 Nov 17]. p. 45-54. Available from: http://dl.acm.org/citation.cfm?doid=2517312.2517315
[16] Bishop C 2006 Library of Congress ISBN Pattern recognition and machine learning. New York. Springer.
[17] Google, Kubernetes. 2016 [updated 2016 Dec 1; cited 2016 Dec.1]. Available from: http://kubernetes.io/
[18] Apache foundation, Mesos 2016 [updated 2016 Dec 1; cited 2016 Dec.1]. Available from:
https://mesos.apache.org/
[19] Docker, Docker Swarm 2016 [updated 2016 Dec 1;
cited 2016 Dec.1]. Available from:
https://docs.docker.com/swarm/
[20] Docker, Docker 2016 [updated 2016 Dec 1; cited 2016 Dec.1]. Available from: https://docs.docker.com
[21] CentOS Project, Centos6 2016 [updated 2016 Dec 1; cited 2016 Dec.1]. Available from:
https://www.centos.org/
[22] Buncic P et al 2008 Proceedings of the XII. International Workshop on Advanced Computing and Analysis
Techniques in Physics Research (ACAT08). CernVM - a virtual appliance for LHC applications. Erice,
PoS(ACAT08)012.
[23] Prometheus 2016 [updated 2016 Dec 1; cited 2016 Dec.1]. Available from: https://prometheus.io/
[24] Draios, Sysdig 2016 [updated 2016 Dec 1; cited 2016 Dec.1]. Available from: http://www.sysdig.org/
[25] VirusShare 2016 [updated 2016 Dec 1; cited 2016 Dec.1]. Available from: https://virusshare.com/about.4n6
| 2cs.AI
|
Can Machines Think in Radio Language?
arXiv:1710.02648v3 [cs.AI] 15 December 2017
Yujian Li
College of Computer Science, Beijing University of Technology, Beijing 100124, China
Email: [email protected]
Abstract: People can think in auditory, visual and tactile forms of language, so can machines
principally. But is it possible for them to think in radio language? According to a first principle
presented for general intelligence, i.e. the principle of language's relativity, the answer may
give an exceptional solution for robot astronauts to talk with each other in space exploration.
Keywords: The principle of languageโs relativity; First principle; Radio language; Space exploration.
Figure 1. Two robonauts are talking about the earth in a Morse-code radio language on the moon. One says
โTHE EARTH IS OUR HOMEโ, the other โIT IS TRULY BEAUTIFULโ. This is a potential application of Morse
code to artificial intelligence in the future, beyond classical transmission of text information between people.
In computer science, one of the biggest unsolved problems is to develop intelligent machines. Since
a seminal paper by Turing on the topic of artificial intelligence [1], the central question โCan machines
think?โ began to excite interest in building systems that learn and think like people. That is a fascinating
dream! Recently, the interest has been renewed again because of impressive progress with deep learning
[2], in spite of great difficulties such as the Character Challenge and the Frostbite Challenge [3], to
perform a variety of tasks as rapidly and flexibly as people do.
What does it mean for a system to learn and think like a person? Lake et al. argued that this system
should build causal models of the world, ground learning in intuitive theories of physics and psychology,
and harness compositionality and learning-to-learn [3]. They claimed that these key ideas of core
ingredients would play an active and important role in producing human-like learning and thought.
Undoubtedly, their claim is attractive and promising for the ultimate dream of implementing machines
with human-level general intelligence. However, the claim says little about a personโs ability to
communicate and think in natural language, which is clearly vital for human intelligence [4]. The
question is, how to develop a capacity of language for machines?
Language is a basic tool in human society, playing an essential role in communication and thought.
People are accustomed to thinking in sound language (sound thinking). In different countries, people
generally speak different languages. There are about 5000๏พ7000 languages spoken all over the world,
90% of them used by less than 100000 people. As estimated by UNESCO (The United Nationsโ
Educational, Scientific and Cultural Organization), the most widely spoken languages are: Mandarin
Chinese, English, Spanish, Hindi, Arabic, Bengali, Russian, Portuguese, Japanese, German and French.
In practice, a language usually takes forms of speech and text, but can be encoded into whistle, sign or
braille. This may lead to an interesting question, can machines think in language with other forms, e.g.
radio?
To all appearance, a Chinese can think in Chinese, an American can think in English, a Spanish can
think in Spanish, and so on. From the viewpoint of daily life, all these forms of language, even including
other forms such as whistle, sign and braille, should be equivalent for people to think about the world.
In my opinion, this quite common point can be generalized as a first principle to establish a theory of
mind (and intelligence more broadly), termed the principle of languageโs relativity, or โthe principle
of symbolic relativityโ [5]. The principle is described as follows.
All admissible forms of language are equivalent for an intelligent system to think about the world.
In the principle of languageโs relativity, an admissible form means that the system can use it for
thinking, i.e. the formulation of thoughts about the world. Therefore, the principle can be stated in other
words,
All admissible forms of language are equivalent with respect to the formulation of thoughts about
the world.
Note that this principle is named with inspiration from the principle of relativity in physics [6],
namely,
All admissible frames of reference are equivalent with respect to the formulation of the fundamental
laws of physics.
That is, physic laws are the same in all reference frames - inertial or non-inertial. By analogy, it can
be stated that, thoughts about the world are the same in all language forms โ speech, text, whistle, sign
or braille. Therefore, in this sense a language form can also be regarded as a reference frame to formulate
thoughts.
If taken as the first postulate of intelligence theory, the principle of languageโs relativity implies that
language is independent of modality. This explains why any human language can be encoded into a lot
of different media such as using auditory, visual, and tactile stimuli. Moreover, it can give profound and
original insights to guide engineering future generations of intelligent machines. For example,
principally robots can think in radio language. Such robots would be tremendously useful in space
exploration, where radio language is much more convenient for them to talk with each other than sound
language for lack of air. Since no person have an inborn ability to receive and send radio waves, the
radio form of language is not admissible for human. Thus, radio language is a novel and creative idea
for robots to think, although radio itself is certainly very ordinary for information transmission and
remote control. Clearly, thinking in radio language (radio thinking), is a different way to implement
intelligence than people can. One may argue that, even without language, artificial intelligence (e.g. by
residual network [7], deep Q-network [8] and AlphoGo [9]) could equal or even beat human intelligence
in deep learning performance of some tasks such as object recognition, video games and board games.
In practical realization, it is still reasonable to require that an intelligent machine is able to communicate
through language. It goes without saying, language is an essential ability for general intelligence.
Yet nobody is quite sure of what intelligence is. Perhaps in most general purpose, intelligence
measures an agentโs ability to achieve goals in a wide range of environments [10]. Nonetheless, this
informal definition, together with the mathematic description [10], plays a limited role in design of
intelligent machines, albeit bringing together some key features from many expert definitions of human
intelligence. To understand the nature of intelligence, not only a far-reaching definition is further
expected, but also a comprehensive theory.
What does this theory look like? At the very least, it should contain just a few first principles at the
system level. The few principles must be fundamental and independent in all phenomena of intelligence,
and cannot be deduced from any other principles in physics, chemistry and biology. Although these
principles may not lead to anything like Maxwell equations or E=mc2, they should capture the essential
characteristics of intelligence comprehensively in perspectives between science and philosophy. More
importantly, they should be able to make a guide to engineering intelligent machines, especially with
some different intelligence from human. โHuman-likeโ implicates imitation before grasping the nature
of intelligence clearly, while โhuman-differentโ implicates creation after understanding genuinely.
One of such principles is the principle of languageโs relativity, others to be certain. Obviously, the
principle is independent of physics, chemistry and biology. Furthermore, it can account for modalityindependence of language, and give rise to a revolutionary idea of radio thinking. As a high-level
intelligence envisaged for future robot astronauts, the importance of radio thinking should be
emphasized again. It may overturn a public view of how robonauts talk with each other in space
exploration. Imagine two robonauts are talking about the earth on the moon (see Figure 1). Traditionally,
people think that they would talk in sound language, just as could be seen in some science fiction films.
Nevertheless, in reality they cannot do so at all without air. Alternatively, they can talk with each other
in a Morse-code radio language that lacks any neural mechanisms. This is an excellent thought
experiment to show that, although human language is an ability developed on the basis of neural
mechanisms in the brain, intelligent machines may have a capacity of radio language not based on these
mechanisms. Thereby, high-level intelligence may not be brain-like. The brain-like intelligence tries to
achieve intelligence as demonstrated by brains [11], preferably those of highly evolved creatures. But
the nature of intelligence can be understood in a brain-different way, just like the secret of how to fly.
Indeed, without flapping its wings, an airplane can fly in a bird-different way based on the theory of
aerodynamics, not the birdโs brain.
For space exploration, autonomous robonauts would be extremely helpful on the moon or the other
planets. Since the environments change, there are a lot of barriers to implement these robonauts. But
they should require certain kinds of human-different intelligence for high-level autonomy in actions.
For example, radio thinking helps them to plan, and radio talking helps them to collaborate. Kirobo is
the worldโs first talking robot sent into space [12]. However, Kirobo was tasked to be a companion, not
an explorer. It could talk in sound language only inside the spacecraft. Radio talking may be an
exceptional solution outside.
It is a terrific endeavor to engineer machines with general intelligence. A theory of intelligence
requires a few first principles, for example, the principle of languageโs relativity. Where are other
principles in the Universe? What are their implications in science? How do they play roles in
technology? These questions are the challenges set ahead for remarkable years of discovery.
References
[1] Turing, A. M. Computing Machinery and Intelligence. Mind 49, 433-460 (1950).
[2] LeCun, Y., Bengio, Y. & Hinton, G. E. Deep learning. Nature 521, 436-444 (2015).
[3] Lake, B. M., Ullman, T. D., Tenenbaum, J. B., Gershaman, S. J. Building machines that learn and think like
people. Behavioral and Brain Sciences, accepted for publication, https://doi.org/10.1017/S0140525X16001837.
[4] Mikolov, T., Joulin, A., & Baroni, M. A Roadmap towards Machine Intelligence. arXiv preprint: 1511.08130
(2016).
[5] Yujian Li. Reveal the secrets of consciousness ๏พ also on theory of cognitive relativity. In 100 Interdisciplinary
Science Puzzles of the 21st Century. Science Press, Beijing, 2005, edited by Xixian Li et al.
[6] https://en.wikipedia.org/wiki/Principle_of_relativity.
[7] He, K., Zhang, X., Ren, S., et al. Deep residual learning for image recognition. 2016 IEEE Conference on
Computer Vision and Pattern Recognition (CVPR 2016), 770-778.
[8] Mnih, V., Kavukcuoglu, K., Silver D., et al. Human-level control through deep reinforcement learning. Nature
518, 529-533 (2015).
[9] Silver, D., Huang, A., Maddison, C. J., et al. Mastering the game of Go with deep neural networks and tree
search. Nature 529, 484-489 (2016).
[10] Legg, S., Hutter, M. Universal Intelligence: A Definition of Machine Intelligence. Minds & Machines 17,
391-444 (2007).
[11] Sendhoff, B., Kรถrner, E., Sporns, O. Creating Brain-like Intelligence. LANAI 5436, 1-14 (2009).
[12] http://www.telegraph.co.uk/news/science/space/10221399/Talking-robot-astronaut-blasts-into-space.html.
| 2cs.AI
|
1
Interpreting Deep Visual Representations via
Network Dissection
arXiv:1711.05611v1 [cs.CV] 15 Nov 2017
Bolei Zhouโ , David Bauโ , Aude Oliva, and Antonio Torralba
AbstractโThe success of recent deep convolutional neural networks (CNNs) depends on learning hidden representations that can
summarize the important factors of variation behind the data. However, CNNs often criticized as being black boxes that lack
interpretability, since they have millions of unexplained model parameters. In this work, we describe Network Dissection, a method that
interprets networks by providing labels for the units of their deep visual representations. The proposed method quantifies the
interpretability of CNN representations by evaluating the alignment between individual hidden units and a set of visual semantic concepts.
By identifying the best alignments, units are given human interpretable labels across a range of objects, parts, scenes, textures, materials,
and colors. The method reveals that deep representations are more transparent and interpretable than expected: we find that
representations are significantly more interpretable than they would be under a random equivalently powerful basis. We apply the method
to interpret and compare the latent representations of various network architectures trained to solve different supervised and
self-supervised training tasks. We then examine factors affecting the network interpretability such as the number of the training iterations,
regularizations, different initializations, and the network depth and width. Finally we show that the interpreted units can be used to provide
explicit explanations of a prediction given by a CNN for an image. Our results highlight that interpretability is an important property of
deep neural networks that provides new insights into their hierarchical structure.
Index TermsโConvolutional Neural Networks, Network Interpretability, Visual Recognition, Interpretable Machine Learning.
F
1
I NTRODUCTION
BSERVATIONS of hidden units in large deep neural networks
have revealed that human-interpretable concepts sometimes
emerge as individual latent variables within those networks. For
example, object detector units emerge within networks trained to
recognize places [1]; part detectors emerge in object classifiers [2];
and object detectors emerge in generative video networks [3]. This
internal structure has appeared in situations where the networks are
not constrained to decompose problems in any interpretable way.
The emergence of interpretable structure suggests that deep
networks may be learning disentangled representations spontaneously. While it is commonly understood that a network can
learn an efficient encoding that makes economical use of hidden
variables to distinguish the input, the appearance of a disentangled
representation is not well understood. A disentangled representation
aligns its variables with a meaningful factorization of the underlying
problem structure, and encouraging disentangled representations
is a significant area of research [4]. If the internal representation
of a deep network is partly disentangled, one possible path for
understanding its mechanisms is to detect disentangled structure,
and simply read out the human interpretable factors.
We address the following three key issues about the deep visual
representations in this work:
โข What is a disentangled representation of neural networks, and
how can its factors be quantified and detected?
โข Do interpretable hidden units reflect a special alignment of
feature space, or are interpretations a chimera?
โข What differences in network architectures, data sources, and
training conditions lead to the internal representations with
greater or lesser entanglement?
O
โข
โข
B. Zhou and D.Bau contributed equally to this work.
B. Zhou, D. Bau, A.Oliva, and A. Torralba are with CSAIL, MIT, MA,
02139.
E-mail: {bzhou, davidbau, oliva, torralba}@csail.mit.edu
To examine these issues, we propose a general analytic
framework, Network Dissection, for interpreting deep visual
representations and quantifying their interpretability. Using Broden,
a broadly and densely labeled dataset, our framework identifies
hidden unitsโ semantics for any given CNN, then aligns them with
human-interpretable concepts.
Building upon the preliminary result published at [5], we
begin with a detailed description of the methodology of Network
Dissection. We use the method to interpret a variety of deep
visual representations trained with different network architectures
(AlexNet, VGG, GoogLeNet, ResNet, DenseNet) and supervisions
(supervsied training on ImageNet for object recognition and
on Places for scene recognition, along with various self-taught
supervision tasks). We show that interpretability is an axis-aligned
property of a representation that can be destroyed by rotation
without affecting discriminative power. We further examine how
interpretability is affected by different training datasets, training
regularizations such as dropout [6] and batch normalization [7],
and fine-tuning between different data sources. Our experiments
reveal that units emerge as semantic detectors in the intermediate
layers of most deep visual representations, while the degree of
interpretability can vary widely across changes in architecture
and training. We conclude that representations learned by deep
networks are more interpretable than previously thought, and
that measurements of interpretability provide insights about the
structure of deep visual representations that that are not revealed
by their classification power alone1 .
1.1
Related Work
Visualizing deep visual representations. Though CNN models
are notoriously known as black boxes, a growing number of
1. Code, data, and more dissection results are available at the project page
http://netdissect.csail.mit.edu/.
2
techniques have been developed to visualize the internal representations of convolutional neural networks. The behavior of a
CNN can be visualized by sampling image patches that maximize
activation of hidden units [1], [8], [9], or by using variants of
backpropagation to identify or generate salient image features [8],
[10], [11]. Back-propagation together with a natural image prior
can be used to invert a CNN layer activation [12], and an image
generation network can be trained to invert the deep features by
synthesizing the input images [13]. [14] further synthesizes the
prototypical images for individual units by learning a feature code
for the image generation network from [13].These visualizations
reveal the image patterns that have been learned in a deep visual
representation and provide a qualitative guide to the interpretation
and interpretability of units. In [1], a quantitative measure of
interpretability was introduced: human evaluation of visualizations
to determine which individual units behave as object detectors in
a network trained to classify scenes. However, human evaluation
is not scalable to increasingly large networks such as ResNet [15],
with more than 100 layers. Therefore the aim of the present work
is to develop a scalable method to go from qualitative visualization
to quantitative interpretation.
Analyzing the properties of deep visual representations.
Various intrinsic properties of deep visual representations have
been explored. Much research has focused on studying the power
of CNN layer activations to be used as generic visual features
for classification [16], [17]. The transferability of activations for
a variety of layers has been analyzed, and it has been found that
higher layer units are more specialized to the target task [18].
Susceptibility to adversarial input reveals that discriminative CNN
models are fooled by particular image patterns [19], [20]. Analysis
of correlation between different random initialized networks reveal
that many units converge to the same set of representations after
training [21]. The question of how representations generalize has
been investigated by showing that a CNN can easily fit a random
labeling of training data even under explicit regularization [22].
Our work focuses on another less explored property of deep visual
representations: interpretability.
Unsupervised learning of deep visual representations. Recent work on unsupervised learning or self-supervised learning
exploits the correspondence structure that comes for free from
unlabeled images to train networks from scratch [23], [24], [25],
[26], [27]. For example, CNN is trained by predicting image context
[23], by colorizing gray images [28], [29], by solving image puzzle
[24], and by associating the images with ambient sounds [30].
The resulting deep visual representations learned from different
unsupervised learning tasks are compared by evaluating them as
generic visual features on classification datasets such as Pascal
VOC. Our work provides an alternative approach to compare deep
visual representations in terms of their interpretability, beyond just
their discriminative power.
2
F RAMEWORK OF N ETWORK D ISSECTION
The notion of a disentangled representation rests on the human
perception of what it means for a concept to be mixed up. Therefore
we define the interpretability of deep visual representation in
terms of the degree of alignment with a set of human-interpretable
concepts.
Our quantitative measurement of interpretability for deep visual
representations proceeds in three steps:
1) Identify a broad set of human-labeled visual concepts.
TABLE 1
Statistics of each label type included in the dataset.
Category
scene
object
part
material
texture
color
Classes
468
584
234
32
47
11
Sources
ADE [32]
ADE [32], Pascal-Context [34]
ADE [32], Pascal-Part [35]
OpenSurfaces [33]
DTD [36]
Generated
Avg sample
38
491
854
1,703
140
59,250
2) Gather the response of the hidden variables to known concepts.
3) Quantify alignment of hidden variableโconcept pairs.
This three-step process of network dissection is reminiscent of
the procedures used by neuroscientists to understand similar
representation questions in biological neurons [31]. Since our
purpose is to measure the level to which a representation is
disentangled, we focus on quantifying the correspondence between
a single latent variable and a visual concept.
In a fully interpretable local coding such as a one-hot-encoding,
each variable will match exactly with one human-interpretable
concept. Although we expect a network to learn partially nonlocal
representations in interior layers [4], and past experience shows
that an emergent concept will often align with a combination of
a several hidden units [2], [17], our present aim is to assess how
well a representation is disentangled. Therefore we measure the
alignment between single units and single interpretable concepts.
This does not gauge the discriminative power of the representation;
rather it quantifies its disentangled interpretability. As we will
show in Sec. 3.2, it is possible for two representations of perfectly
equivalent discriminative power to have very different levels of
interpretability.
To assess the interpretability of any given CNN, we draw
concepts from a new broadly and densely labeled image dataset
that unifies labeled visual concepts from a heterogeneous collection
of labeled data sources, described in Sec. 2.1. We then measure
the alignment of each hidden unit of the CNN with each concept
by evaluating the feature activation of each individual unit as a
segmentation model for each concept. To quantify the interpretability of a layer as a whole, we count the number of distinct visual
concepts that are aligned with a unit in the layer, as detailed in
Sec. 2.2.
2.1
Broden: Broadly and Densely Labeled Dataset
To be able to ascertain alignment with both low-level concepts
such as colors and higher-level concepts such as objects, we have
assembled a new heterogeneous dataset.
The Broadly and Densely Labeled Dataset (Broden) unifies
several densely labeled image datasets: ADE [32], OpenSurfaces
[33], Pascal-Context [34], Pascal-Part [35], and the Describable
Textures Dataset [36]. These datasets contain examples of a broad
range of objects, scenes, object parts, textures, and materials in a
variety of contexts. Most examples are segmented down to the pixel
level except textures and scenes, which are given for full images.
In addition, every image pixel in the dataset is annotated with
one of the eleven common color names according to the human
perceptions classified by van de Weijer [37]. Samples of the types
of labels in the Broden dataset are shown in Fig. 1.
The purpose of Broden is to provide a ground truth set of
exemplars for a broad set of visual concepts. The concept labels in
Broden are normalized and merged from their original datasets so
3
red (color)
yellow (color)
wrinkled (texture)
meshed (texture)
wood (material)
fabric (material)
foot (part)
door (part)
airplane (object)
waterfall (object)
art studio (scene)
beach (scene)
Fig. 1. Samples from the Broden Dataset. The ground truth for each concept is a pixel-wise dense annotation.
Top activated images
Segmented images using the binarized unit activation map
Semantic segmentation annotations
Segmented annotations
Fig. 2. Scoring unit interpretability by evaluating the unit for semantic
segmentation.
that every class corresponds to an English word. Labels are merged
based on shared synonyms, disregarding positional distinctions such
as โleftโ and โtopโ and avoiding a blacklist of 29 overly general
synonyms (such as โmachineโ for โcarโ). Multiple Broden labels
can apply to the same pixel: for example, a black pixel that has
the Pascal-Part label โleft front cat legโ has three labels in Broden:
a unified โcatโ label representing cats across datasets; a similar
unified โlegโ label; and the color label โblackโ. Only labels with at
least 10 image samples are included. Table 1 shows the number of
classes per dataset and the average number of image samples per
label class. Totally there are 1197 visual concept classes included.
2.2
Scoring Unit Interpretability
The proposed network dissection method evaluates every individual
convolutional unit in a CNN as a solution to a binary segmentation
task to every visual concept in Broden, as illustrated in Fig. 3. Our
method can be applied to any CNN using a forward pass without
the need for training or backpropagation.
For every input image x in the Broden dataset, the activation
map Ak (x) of every internal convolutional unit k is collected.
Then the distribution of individual unit activations ak is computed.
For each unit k , the top quantile level Tk is determined such that
P (ak > Tk ) = 0.005 over every spatial location of the activation
map in the dataset.
To compare a low-resolution unitโs activation map to the inputresolution annotation mask Lc for some concept c, the activation
map is scaled up to the mask resolution Sk (x) from Ak (x) using
bilinear interpolation, anchoring interpolants at the center of each
unitโs receptive field.
Sk (x) is then thresholded into a binary segmentation: Mk (x) โก
Sk (x) โฅ Tk , selecting all regions for which the activation exceeds
the threshold Tk . These segmentations are evaluated against every
concept c in the dataset by computing intersections Mk (x)โฉLc (x),
for every (k, c) pair.
The score of each unit k as segmentation for concept c is
reported as a the intersection over union score across all the images
in the dataset,
P
|Mk (x) โฉ Lc (x)|
IoUk,c = P
,
(1)
|Mk (x) โช Lc (x)|
where | ยท | is the cardinality of a set. Because the dataset contains
some types of labels which are not present on some subsets of
inputs, the sums are computed only on the subset of images that
have at least one labeled concept of the same category as c. The
value of IoUk,c is the accuracy of unit k in detecting concept
c; we consider one unit k as a detector for concept c if IoUk,c
exceeds a threshold. Our qualitative results are insensitive to the
IoU threshold: different thresholds denote different numbers of
units as concept detectors across all the networks but relative
orderings remain stable. For our comparisons we report a detector
if IoUk,c > 0.04. Note that one unit might be the detector for
multiple concepts; for the purpose of our analysis, we choose the
top ranked label. To quantify the interpretability of a layer, we
count the number unique concepts aligned with units. We call this
the number of unique detectors.
Figure 2 summarizes the whole process of scoring unit interpretability: By segmenting the annotation mask using the receptive
field of units for the top activated images, we compute the IoU for
each concept. The IoU evaluating the quality of the segmentation
of a unit is an objective confidence score for interpretability that is
comparable across networks. Thus this score enables us to compare
interpretability of different representations and lays the basis for the
experiments below. Note that network dissection works only as well
as the underlying dataset: if a unit matches a human-understandable
concept that is absent in Broden, then it will not score well for
interpretability. Future versions of Broden will be expanded to
include more kinds of visual concepts.
3
INTERPRETING DEEP VISUAL REPRESENTATIONS
For testing we prepare a collection of CNN models with different
network architectures and supervision of primary tasks, as listed
in Table 2. The network architectures include AlexNet [38],
GoogLeNet [39], VGG [40], ResNet [15], and DenseNet [41].
For supervised training, the models are trained from scratch (i.e.,
not pretrained) on ImageNet [42], Places205 [43], and Places365
[44]. ImageNet is an object-centric dataset, which contains 1.2
million images from 1000 classes. Places205 and Places365 are
4
Freeze trained network weights
Upsample target layer
Car
Person
Grass
Door
t
Uni
e
n
O tion
va
Acti
Fabric
Pixel-wise segmentation
Blue
Conv
Conv
Conv
Conv
Network being probed
Conv
Input image
Evaluate on segmentation tasks
Fig. 3. Illustration of network dissection for measuring semantic alignment of units in a given CNN. Here one unit of the last convolutional layer of a
given CNN is probed by evaluating its performance on various segmentation tasks. Our method can probe any convolutional layer.
TABLE 2
Tested CNN Models
Training
none
Supervised
Self
Network
AlexNet
AlexNet
GoogLeNet
VGG-16
ResNet-152
DenseNet-161
AlexNet
dataset or task
random
ImageNet, Places205, Places365, Hybrid.
ImageNet, Places205, Places365.
ImageNet, Places205, Places365, Hybrid.
ImageNet, Places365.
ImageNet, Places365.
context, puzzle, egomotion,
tracking, moving, videoorder,
audio, crosschannel,colorization.
objectcentric, transinv.
two subsets of the Places Database, which is a scene-centric
dataset with categories such as kitchen, living room, and coast.
Places205 contains 2.4 million images from 205 scene categories,
while Places365 contains 1.6 million images from 365 scene
categories. โHybridโ refers to a combination of ImageNet and
Places365. For self-supervised training tasks, we select several
recent models trained on predicting context (context) [23], solving
puzzles (puzzle) [24], predicting ego-motion (egomotion) [25],
learning by moving (moving) [26], predicting video frame
order (videoorder) [45] or tracking (tracking) [27], detecting
object-centric alignment (objectcentric) [46], colorizing images
(colorization) [28], inpainting (contextencoder) [47], predicting cross-channel (crosschannel) [29], predicting ambient sound
from frames (audio) [30], and tracking invariant patterns in
videos (transinv) [48]. The self-supervised models we analyze are
comparable to each other in that they all use AlexNet or an AlexNetderived architecture, with one exception model transinv [48],
which uses VGG as the base network.
In the following experiments, we begin by validating our
method using human evaluation. Then, we use random unitary
rotations of a learned representation to test whether interpretability
of CNNs is an axis-independent property; we find that it is not,
and we conclude that interpretability is not an inevitable result
of the discriminative power of a representation. Next, we analyze
all the convolutional layers of AlexNet as trained on ImageNet
[38] and as trained on Places [43], and confirm that our method
reveals detectors for higher-level concepts at higher layers and
lower-level concepts at lower layers; and that more detectors for
higher-level concepts emerge under scene training. Then, we show
that different network architectures such as AlexNet, VGG, and
ResNet yield different interpretability, while differently supervised
training tasks and self-supervised training tasks also yield a variety
of levels of interpretability. Additionally we show the impact of
different training conditions, examine the relationship between
discriminative power and interpretability, and investigate a possible
way to improve the interpretability of CNNs by increasing their
width. Finally we utilize the interpretable units as explanatory
factors to the prediction given by a CNN.
3.1
Human Evaluation of Interpretations
Using network dissection, we analyze the interpretability of units
within all the convolutional layers of Places-AlexNet and ImageNetAlexNet, then compare with human interpretation. Places-AlexNet
is trained for scene classification on Places205 [43], while
ImageNet-AlexNet is the identical architecture trained for object
classification on ImageNet [38].
Our evaluation was done by raters on Amazon Mechanical
Turk (AMT). As a baseline description of unit semantics, we
used human-written descriptions of each unit from [1]. These
descriptions were collected by asking raters to write words or short
phrases to describe the common meaning or pattern selected by
each unit, based on a visualization of the top image patches. Three
descriptions and a confidence were collected for each unit. As a
canonical description we chose the most common description of a
unit (when raters agreed), and the highest-confidence description
(when raters did not agree). Some units may not be interpretable.
To identify these, raters were shown the canonical descriptions of
visualizations and asked whether they were descriptive. Units with
validated descriptions are taken as the set of interpretable units.
To compare these baseline descriptions to network-dissectionderived labels, we ran the following experiment. Raters were shown
a visualization of top images patches for an interpretable unit, along
with a word or short phrase description, and they were asked to
vote (yes/no) whether the given phrase was descriptive of most of
the image patches. The baseline human-written descriptions were
randomized with the labels derived using net dissection, and the
origin of the labels was not revealed to the raters.
Table 3 summarizes the results. The number of interpretable
units is shown for each layer, and average positive votes for
descriptions of interpretable units are shown, both for humanwritten labels and network-dissection-derived labels. Human labels
are most highly consistent for units of conv5, suggesting that
humans have no trouble identifying high-level visual concept
detectors, while lower-level detectors are more difficult to label.
5
Fig. 4. The annotation interface used by human raters on Amazon
Mechanical Turk. Raters are shown descriptive text in quotes together
with fifteen images, each with highlighted patches, and must evaluate
whether the quoted text is a good description for the highlighted patches.
TABLE 3
Human evaluation of our Network Dissection approach.
Interpretable units
Human consistency
Network Dissection
conv1
57/96
82%
37%
conv2
126/256
76%
56%
conv3
247/384
83%
54%
conv4
258/384
82%
59%
conv5
194/256
91%
71%
Similarly, labels given by network dissection are best at conv5,
and are found to be less descriptive for lower layers.
Comparison of the human interpretation and the labels predicted
by network dissection is plotted in Fig. 5. A sample of units is
shown together with both automatically inferred interpretations
and manually assigned interpretations taken from [1]. We can see
that the predicted labels match the human annotation well, though
sometimes they capture a different description of a visual concept,
such as the โcrosswalkโ predicted by the algorithm compared to
โhorizontal linesโ given by the human for the third unit in conv4 of
Places-AlexNet in Fig. 5. Confirming intuition, color and texture
concepts dominate at lower layers conv1 and conv2 while more
object and part detectors emerge in conv5.
3.2
Measurement of Axis-aligned Interpretability
We conduct an experiment to determine whether it is meaningful
to assign an interpretable concept to an individual unit. Two
possible hypotheses can explain the emergence of interpretability
in individual hidden layer units:
Hypothesis 1. Interpretability is a property of the representation
as a whole, and individual interpretable units emerge because
interpretability is a generic property of typical directions of
representation space. Under this hypothesis, projecting to any
direction would typically reveal an interpretable concept, and
interpretations of single units in the natural basis would not
be more meaningful than interpretations that can be found in
any other direction.
Hypothesis 2. Interpretable alignments are unusual, and interpretable units emerge because learning converges to a special
basis that aligns explanatory factors with individual units.
In this model, the natural basis represents a meaningful
decomposition learned by the network.
Hypothesis 1 is the default assumption: in the past it has been
found [19] that with respect to interpretability โthere is no
distinction between individual high level units and random linear
combinations of high level units.โ
Network dissection allows us to re-evaluate this hypothesis.
We apply random changes in basis to a representation learned by
AlexNet. Under hypothesis 1, the overall level of interpretability
should not be affected by a change in basis, even as rotations
cause the specific set of represented concepts to change. Under
hypothesis 2, the overall level of interpretability is expected to drop
under a change in basis.
We begin with the representation of the 256 convolutional units
of AlexNet conv5 trained on Places205 and examine the effect of a
change in basis. To avoid any issues of conditioning or degeneracy,
we change basis using a random orthogonal transformation Q.
The rotation Q is drawn uniformly from SO(256) by applying
2
Gram-Schmidt on a normally-distributed QR = A โ R256
with positive-diagonal right-triangular R, as described by [49].
Interpretability is summarized as the number of unique visual
concepts aligned with units, as defined in Sec. 2.2.
Denoting AlexNet conv5 as f (x), we find that the number of
unique detectors in Qf (x) is 80% fewer than the number of unique
detectors in f (x). Our finding is inconsistent with hypothesis 1
and consistent with hypothesis 2.
We also test smaller perturbations of basis using Qฮฑ for 0 โค
ฮฑ โค 1, where the fractional powers Qฮฑ โ SO(256) are chosen
to form a minimal geodesic gradually rotating from I to Q; these
intermediate rotations are computed using a Schur decomposition.
Fig. 6 shows that interpretability of Qฮฑ f (x) decreases as larger
rotations are applied. Fig. 7 shows some examples of the linearly
combined units.
Each rotated representation has exactly the same discriminative
power as the original layer. Writing the original network as
g(f (x)), note that g 0 (r) โก g(QT r) defines a neural network
that processes the rotated representation r = Qf (x) exactly as the
original g operates on f (x). We conclude that interpretability
is neither an inevitable result of discriminative power, nor is
it a prerequisite to discriminative power. Instead, we find that
interpretability is a different quality that must be measured
separately to be understood.
We repeat the complete rotation (ฮฑ = 1) on Places365 and
ImageNet 10 times, the result is shown in Fig. 8. We observe the
drop of interpretability for both of the network, while it drops
more for the AlexNet on Places365. It is because originally the
interpretability of AlexNet on Places365 is higher than AlexNet on
ImageNet thus the random rotation damages more.
3.3
Network Architectures with Supervised Learning
How do different network architectures affect disentangled interpretability of the learned representations? We apply network
dissection to evaluate a range of network architectures trained on
ImageNet and Places. For simplicity, the following experiments
focus on the last convolutional layer of each CNN, where semantic
detectors emerge most.
Results showing the number of unique detectors that emerge
from various network architectures trained on ImageNet and
Places are plotted in Fig. 9. In terms of network architecture,
we find that interpretability of ResNet > DenseNet > VGG >
6
h:green sky (object)
Places
veined (texture)
orange (color)
h:color yellow lacelike (texture)
ImageNet
red (color)
h:grid pattern perforated (texture)
h:yellow food (material)
h:red woven (texture)
h:yellow banded (texture)
yellow (color)
h:striped sky (object)
h:blue grid (texture)
sky (object)
conv1
h:corrugated tree (object)
h:black&white banded (texture)
h:pink or red lined (texture)
red (color)
h:grass chequered (texture)
h:sky grass (object)
h:bed
h:tree car (object)
h:car
h:pattern crosswalk (part)
h:horiz. lines mountain (scene)
h:orange muzzle (part)
h:animal face wheel (part)
h:blue sky swirly (texture)
h:round cat (object)
h:nosed head (part)
h:face leg (part)
h:mesh dotted (texture)
conv2
h:windows bed (object)
conv3
h:montain
h:wheels
h:animal faces
h:leg
conv5
conv4
Fig. 5. Comparison of the interpretability of all five convolutional layers of AlexNet, as trained on classification tasks for Places (top) and ImageNet
(bottom).Four examples of units in each layer are shown with identified semantics. The segmentation generated by each unit is shown on the three
Broden images with highest activation. Top-scoring labels are shown above to the left, and human-annotated labels are shown above to the right.
Some disagreement can be seen for the dominant judgment of meaning. For example, human annotators mark the first conv4 unit on Places as a
โwindowsโ detector, while the algorithm matches the โchequeredโ texture.
Rotation of Representation
20
30
20
10
0
10
rotate 0.4
rotate 0.6
rotate 0.8
rotate 1
Fig. 6. Interpretability over changes in basis of the representation of
AlexNet conv5 trained on Places. The vertical axis shows the number
of unique interpretable concepts that match a unit in the representation.
The horizontal axis shows ฮฑ, which quantifies the degree of rotation.
Baseline (individual units)
car (single unit 87)
skyscraper (single unit 94)
Rotate 1 (linear combinations)
IoU 0.16 car (combination, closest to unit 173)
IoU 0.16 skyscraper (combination, closest to unit 94)
IoU 0.06
IoU 0.05
tree (single unit 228)
IoU 0.10 tree (combination, closest to unit 228)
IoU 0.02
head (single unit 3)
IoU 0.09 head (combination, closest to unit 70)
IoU 0.02
closet (single unit 107)
IoU 0.06 closet (combination, closest to unit 34)
IoU 0.02
random combination
AlexNet on ImageNet
object
scene
part
material
texture
color
20
15
10
5
0
baseline
random combination
Fig. 8. Complete rotation (ฮฑ = 1) repeated on AlexNet trained on
Places365 and ImageNet respectively. Rotation reduces the interpretability significantly for both of the networks.
350
Number of unique detectors
rotate 0.2
baseline
25
300
250
200
object
scene
part
material
texture
color
150
100
50
0
R
es
N
en et
se 15
N 2-P
e
R t16 lac
es
N 1- es
D
en et Pla 36
se 15 ce 5
N 2-I s3
et
16 ma 65
1 g
VG -Im eNe
G ag t
-P eN
la
e
VG ces t
20
G
V
G
oo G
5
g G H
G LeN -Pla ybr
id
oo
c
e
gL t- es
G eN Pla 36
oo e ce 5
gL t-P s3
eN la 65
et ces
VG Ima 205
g
Al
ex G-I eN
N ma et
et
- ge
A Pla Ne
Al lex ces t
ex Ne 3
N
t- 65
Al et-P Hyb
ex
rid
l
a
N
e ce
Al t-Im s20
ex a
5
N ge
et
-ra Net
nd
om
0
baseline
object
scene
part
material
texture
color
Number of unique detectors
30
AlexNet on Places365
40
Number of unique detectors
object
scene
part
material
texture
color
D
Number of unique detectors
40
Fig. 9. Interpretability across different architectures trained on ImageNet
and Places.
Fig. 7. Visualizations of the best single-unit concept detectors of five
concepts taken from individual units of AlexNet conv5 trained on Places
(left), compared with the best linear-combination detectors of the same
concepts taken from the same representation under a random rotation
(right). For most concepts, both the IoU and the visualization of the top
activating image patches confirm that individual units match concepts
better than linear combinations. In other cases, (e.g. head detectors)
visualization of a linear combination appears highly consistent, but the
IoU reveals lower consistency when evaluated over the whole dataset.
GoogLeNet > AlexNet. Deeper architectures usually appear to
allow greater interpretability, though individual layer structure is
different across architecture. Comparing training datasets, we find
Places > ImageNet. As discussed in [1], one scene is composed of
multiple objects, so it may be beneficial for more object detectors
to emerge in CNNs trained to recognize scenes.
AlexNet
VGG-16
GoogLeNet
ResNet-152
DenseNet-161
bi ca
cy r
cl
e
po
ol ca
ai tab t
rp le
la
ho ne
us
m
e
ot bu
or s
bi
ke
be
to d
ile
s t
ho ky
rs
w e
at
e
do r
si g
bo nk
ttl
e
se
ch a
ai
bo r
o
co k
st w
ov
ro e
a
bo tr d
ok ack
bu cas
i
m ld e
o in
tv unt g
m ai
on n
ito
tra r
sn in
ow
bi
sh rd
e
la lf
sh mp
w
e
in g ep
do ra
w ss
p
ba an
e
pa thtu
in b
tin
g
s
cu of
sh a
sk cu ion
ys rta
cr in
a
pe pe
rs r
o
ta n
ce ble
ilin
se g
pl at
a
fe nt
w nc
si ash e
de e
st wa r
ai lk
rw
a
๏ฌ y
๏ฌo eld
w
pl er
at
bo e
a
ch
an tre t
si de e
gn li
bo er
ar
d
units
Densenet
(Imagenet)
26
13
Closet
57 objects
do
g
ca
t
ca
h
ai ors r
rp e
la
ne
bu
s
bi
rd
b
m t ed
ot ra
or in
b
bo ike
tt
to le
i
po wa let
ol te
ta r
bl
c e
sh ow
pe eep
r
b so
m icy n
ou cl
nt e
ho ain
u
gr se
as
ro s
a
pl d
ba an
th t
tu
b
se
bo a
ok
ch
po
a
tte si ir
n
tv dpl k
m an
on t
i
si st tor
w gn ov
in b e
do oa
w rd
pa
n
sh e
sn elf
ow
ro
c
๏ฌe k
ta ld
ce ble
il
๏ฌo ing
w
e
tre r
e
te
n
s t
sk fe ofa
ys n
cr ce
a
w pe
as r
he
bo r
bo pl at
ok at
si ca e
de se
w
be p alk
dc illo
lo w
th
e
ea s
ra rth
ilin
g
cu sea
sh t
io
n
pa
l
sa m
n
co ben d
m ch
pu
t
w la er
ar m
dr p
ob
e
86
43
62 objects
units
Resnetยญ152
(Imagenet)
ca
be r
d
ai bu
rp s
la
w ne
at
po d er
ol og
ta
bl
e
m
ou ca
t
pa nta
i
in n
ti
gr ng
as
ro s
a
bo d
o
to k
ce ile
ilin t
tra g
in
bi sk
cy y
c
ho le
sk h rse
ys ou
cr se
ap
po
e
tte so r
dp fa
la
n
si t
n
pl k
an
m bo t
ot tt
or le
bi
k
bo e
at
pe tree
rs
on
se
a
w tra
at ck
er
fa
la ll
m
p
te
n
bi t
rd
se
s at
w tove
as
he
si raili r
de n
w
w st a g
or ai lk
k rw
ch sur ay
gr andface
an e
ds lier
t
cu and
rta
ch in
๏ฌ ai
w bu ow r
in i er
do ld
in
tv wpa g
m n
on e
i
br tor
id
bo ge
ok ba
ca ll
s
ea e
r
sh th
el
ca f
sw
s
iv sno e
el w
ch
sh air
ee
pa p
l
pi m
t
p ch
gr illow
o
co un
un d
t
t er
ca able
bi
ne
๏ฌe t
si cra ld
be gnb dle
o
dc a
lo rd
th
fe es
nc
e
co
w
units
Densenet
(Places)
36
18
73 objects
la
n
tra e
in
ca
bu r
b s
ho ed
us
e
c
m d at
ou o
nt g
a
ho in
r
w se
at
gr er
a
bo ss
ttl
e
tre
bo e
at
bu sof
ild a
in
to g
il
pl et
an
m
ot bi t
o
po rb rd
ol ike
ta
bl
e
sk
y
te
nt
se
po
a
b
tte o
dp ok
la
fe nt
bi nce
cy
pa c
in le
tin
r g
pe oad
rs
cu on
rta
in
si
sn nk
ow
ta
bl
e
w b she
in at l
do ht f
ch wp ub
an an
e
s de
sk tai lier
ys rw
cr ay
ap
st er
ov
ro e
c
tra k
ck
w ๏ฌeld
si ash
de e
w r
a
ch lk
a
co ir
w
or ๏ฌ ur
k ow t
su e
w rfac r
at e
e
br rfal
id l
be ge
n
sh ch
ee
tv rai p
m lin
on g
i
m tor
irr
bo p or
ok alm
ca
se
rp
ai
37
19
61 objects
units
Resnetยญ152
(Places)
7
0
0
0
0
Fig. 10. Histogram of the object detectors from the ResNet and DenseNet trained on ImageNet and Places respectively.
layer161 unit 1639
IoU=0.225 layer161 unit 2035
IoU=0.199 layer161 unit 1126
IoU=0.076 layer161 unit 1492
IoU=0.282 layer161 unit 1518
IoU=0.205
layer161 unit 1788
IoU=0.201 layer161 unit 2028
IoU=0.113 layer161 unit 1356
IoU=0.067 layer161 unit 1519
IoU=0.155 layer161 unit 1512
IoU=0.125
res5c unit 2011
IoU=0.171 res5c unit 1573
IoU=0.217 res5c unit 264
IoU=0.125 res5c unit 674
IoU=0.265 res5c unit 1243
IoU=0.172
res5c unit 9
IoU=0.161 res5c unit 1718
IoU=0.195 res5c unit 766
IoU=0.094 res5c unit 74
IoU=0.256 res5c unit 963
IoU=0.156
inception_5b unit 758
IoU=0.159 inception_4e unit 750
IoU=0.203 inception_4e unit 56
IoU=0.139 inception_4e unit 824
IoU=0.168 inception_4e unit 92
IoU=0.164
inception_5b unit 235
IoU=0.136 inception_4e unit 225
IoU=0.152 inception_4e unit 714
IoU=0.105 inception_5b unit 603
IoU=0.154 inception_4e unit 759
IoU=0.144
conv5_3 unit 213
IoU=0.125 conv5_3 unit 142
IoU=0.205 conv5_3 unit 85
IoU=0.086 conv5_3 unit 191
IoU=0.153 conv5_3 unit 151
IoU=0.150
conv5_3 unit 107
IoU=0.065 conv5_3 unit 491
IoU=0.112 conv4_3 unit 336
IoU=0.068 conv5_3 unit 20
IoU=0.149 conv5_3 unit 204
IoU=0.077
conv5 unit 235
IoU=0.017 conv5 unit 180
IoU=0.090 conv5 unit 55
IoU=0.087 conv5 unit 10
IoU=0.040 conv5 unit 13
IoU=0.101
conv3 unit 255
IoU=0.015 conv5 unit 250
IoU=0.051 conv5 unit 16
IoU=0.062 conv5 unit 174
IoU=0.029 conv5 unit 28
IoU=0.049
Dog
Plant
Bus
Airplane
Fig. 11. Comparison of several visual concept detectors identified by network dissection in DenseNet, ResNet, GoogLeNet, VGG, and AlexNet. Each
network is trained on Places365. The two highest-IoU matches among convolutional units of each network is shown. The segmentation generated by
each unit is shown on the four maximally activating Broden images. Some units activate on concept generalizations, e.g., GoogLeNet 4eโs unit 225
on horses and dogs, and 759 on white ellipsoids and jets.
8
147
50
13
25 textures
1 color
39 textures
1 color
37
2 colors
units
airplane
train
car
bus
bed
house
cat
dog
mountain
horse
water
grass
bottle
tree
boat
sofa
building
toilet
plant
bird
motorbike
pool table
sky
tent
sea
book
pottedplant
fence
bicycle
painting
road
person
curtain
sink
snow
table
shelf
bathtub
windowpane
chandelier
stairway
skyscraper
stove
rock
track
๏ฌeld
washer
sidewalk
chair
court
๏ฌower
work surface
waterfall
bridge
bench
sheep
railing
tvmonitor
mirror
palm
bookcase
highway
closet
nursery
art gallery
skyscraper
corridor
reception
airport terminal
cockpit
shoe shop
attic
classroom
lighthouse
playground
bakery-shop
youth hostel
dining room
volleyball court-outdoor
jacuzzi-indoor
conference room
sauna
landing deck
of๏ฌce
mountain snowy
auditorium
alley
castle
bowling alley
laundromat
gas station
windmill
160 scenes
game room
subway interior
operating room
playroom
sandbox
staircase
pantry
escalator-indoor
๏ฌre escape
forest-broadleaf
parking garage-indoor
bathroom
carrousel
gymnasium-indoor
14 parts
badlands
cubicle-of๏ฌce
cemetery
butchers shop
4 materials
rope bridge
dinette-vehicle
beauty salon
amusement arcade
forest-needleleaf
street
waiting room
airplane cabin
dolmen
golf course
bus interior
corn ๏ฌeld
ice skating rink-indoor
beach
poolroom-home
elevator-door
home theater
greenhouse-indoor
zen garden
gazebo-exterior
art studio
park
theater-indoor procenium
martial arts gym
coast
๏ฌeld-cultivated
living room
bullring
slum
balcony-interior
television studio
catwalk
water tower
ice cream parlor
bank vault
creek
desert-sand
19
21 textures
139
10 textures
1 color
Resnetยญ152
(Places)
0
9
5
0
1 object
1 scene
8 parts
1 material
creek
desert-sand
vineyard
supermarket
kindergarden classroom
locker room
warehouse-indoor
building facade
bridge
aqueduct
pasture
river
29 objects
๏ฌorist shop-indoor
waterfall-block
car interior-backseat
orchard
boxing ring
music studio
crevasse
ball pit
amusement park
archive
galley
cloister-indoor
fountain
hay๏ฌeld
lobby
topiary garden
garage-indoor
jewelry shop
bar
temple-east asia
earth ๏ฌssure
amphitheater
home of๏ฌce
desert-vegetation
batters box
parlor
rubble
shopfront
clothing store
kasbah
kitchen
junkyard
bookstore
shopping mall-indoor
museum-indoor
cavern-indoor
swimming pool-outdoor
natural history museum
greenhouse-outdoor
dam
barn
doorway-outdoor
apartment building-outdoor
medina
๏ฌeld-wild
hot spring
mountain
campsite
ballroom
market-outdoor
arrival gate-outdoor
driveway
inn-indoor
excavation
window seat
construction site
library-indoor
clean room
utility room
hangar-indoor
artists loft
basketball court-outdoor
football ๏ฌeld
roundabout
screen
crosswalk
body
headboard
wheel
head
hair
roof
shop window
coach
back pillow
balcony
torso
monitor
food
tile
carpet
paper
dotted
83 scenes
cracked
strati๏ฌed
lined
cobwebbed
potholed
5 parts
chequered
1 material
spiralled
๏ฌecked
interlaced
zigzagged
freckled
polka-dotted
veined
frilly
banded
striped
perforated
grooved
๏ฌbrous
grid
lacelike
scaly
porous
meshed
swirly
pleated
gauzy
21 textures
crystalline
crosshatched
matted
paisley
studded
pitted
bubbly
sprinkled
bumpy
marbled
braided
red
Resnetยญ152 continued ...
units
17 objects
1 scene
44
14
Alexnet
(Egomotion)
8
8 textures
dog
cat
grass
tree
bicycle
sea
sky
water
road
car
painting
windowpane
mountain
motorbike
book
sidewalk
bus
mountain snowy
wheel
hair
head
ear
muzzle
arm
leg
screen
food
zigzagged
dotted
chequered
banded
cobwebbed
waf๏ฌed
perforated
striped
polka-dotted
frilly
spiralled
studded
honeycombed
grid
meshed
sprinkled
veined
porous
cracked
interlaced
crosshatched
red
yellow
4
4 objects
1 scene
1 part
92
units
0
6
0
sky
ceiling
grass
tree
forest-broadleaf
head
banded
lined
dotted
perforated
grid
chequered
crosshatched
spiralled
12
units
bus
airplane
bed
train
pool table
dog
car
horse
house
road
boat
motorbike
tree
grass
water
seat
cat
shelf
ground
sea
skyscraper
stove
fence
work surface
toilet
bottle
sofa
sink
building
cockpit
conference room
street
closet
poolroom-home
classroom
nursery
ball pit
highway
corridor
airport terminal
attic
bathroom
castle
art gallery
alley
dining room
of๏ฌce
kitchen
bar
mountain snowy
living room
staircase
shoe shop
skyscraper
lighthouse
water tower
gazebo-exterior
subway interior
bowling alley
60 objects
bakery-shop
waiting room
cathedral-indoor
landing deck
laundromat
auditorium
gas station
crevasse
ice skating rink-indoor
windmill
bus interior
pantry
greenhouse-indoor
amphitheater
supermarket
casino-indoor
utility room
cloister-indoor
building facade
bookstore
reception
viaduct
car interior-backseat
rope bridge
cubicle-of๏ฌce
airplane cabin
warehouse-indoor
gymnasium-indoor
bridge
park
sauna
escalator-outdoor
badlands
pagoda
waterfall-fan
playroom
galley
waterfall-block
lake-natural
apartment building-outdoor
jacuzzi-indoor
campsite
library-indoor
kindergarden classroom
artists loft
bullring
carrousel
47 scenes
junkyard
bow window-outdoor
creek
hay๏ฌeld
ski slope
mountain
crosswalk
screen
head
shop window
coach
food
12 parts
potholed
paisley
2 materials
striped
cobwebbed
lined
sprinkled
interlaced
studded
banded
dotted
frilly
strati๏ฌed
spiralled
woven
grooved
๏ฌbrous
meshed
crystalline
bumpy
scaly
braided
22
21
Alexnet
(Imagenet)
0
72
13 textures
Alexnet
(Puzzle Solving)
sky
ball pit
veined
chequered
meshed
striped
dotted
perforated
studded
lacelike
frilly
cobwebbed
red
units
8
2 parts
units
airplane
bus
car
road
grass
plant
windowpane
person
bed
train
motorbike
horse
tree
house
water
pool table
table
toilet
boat
mountain
dog
painting
book
curtain
๏ฌower
building
grandstand
bridge
railing
swimming pool
tent
signboard
chair
work surface
skyscraper
bottle
chandelier
seat
stove
shelf
track
cabinet
cushion
44 objects
sofa
snow
waterfall
pillow
sink
sea
rock
desk
sidewalk
plate
palm
ground
sky
13 scenes
swivel chair
๏ฌoor
fence
ceiling
ball pit
skyscraper
mountain snowy
bakery-shop
laundromat
closet
cockpit
shoe shop
corridor
13 parts conference room
1 material
castle
forest-needleleaf
๏ฌeld-cultivated
windmill
staircase
classroom
escalator-indoor
playground
pantry
of๏ฌce
bowling alley
cemetery
desert-sand
highway
street
amusement park
lighthouse
creek
nursery
corn ๏ฌeld
20 textures
wheat ๏ฌeld
1 colorshopping mall-indoor
attic
cavern-indoor
youth hostel
sandbox
bar
reception
childs room
casino-indoor
bookstore
pagoda
gymnasium-indoor
waterfall-fan
slum
art gallery
butchers shop
hair
wheel
drawer
screen
head
crosswalk
roof
balcony
seat cushion
pot
shop window
hand
carpet
food
chequered
striped
waf๏ฌed
meshed
paisley
dotted
banded
swirly
cracked
strati๏ฌed
lined
polka-dotted
perforated
grid
sprinkled
lacelike
๏ฌbrous
interlaced
frilly
spiralled
potholed
woven
freckled
studded
veined
red
4
9
5
0
5 objects
1 scene
units
car
grass
airplane
mountain
painting
tree
ceiling
dog
bus
road
pool table
water
horse
skyscraper
plant
motorbike
cat
bed
sea
track
sink
๏ฌeld
stairway
shelf
work surface
building
house
waterfall
ground
sidewalk
book
chair
32 objects
sky
windowpane
๏ฌoor
toilet
person
railing
6 scenes
washer
signboard
table
๏ฌower
chandelier
bird
6 parts
ball pit
skyscraper
2 materials
mountain snowy
closet
swimming pool-outdoor
stadium-baseball
coast
corridor
auditorium
creek
highway
conference room
jacuzzi-indoor
hair
head
screen
wheel
roof
headboard
crosswalk
seat cushion
drawer
leg
arm
body
shop window
food
25 textures
chequered
1 color
perforated
striped
grid
spiralled
dotted
swirly
lined
meshed
studded
paisley
banded
polka-dotted
cobwebbed
grooved
strati๏ฌed
porous
honeycombed
woven
interlaced
red
0
units
car
tree
grass
sea
mountain
highway
head
hair
banded
lined
chequered
studded
zigzagged
striped
perforated
๏ฌecked
grid
cracked
meshed
gauzy
dotted
units
10
35
Alexnet
(Ambient Sound)
Googlenet
(Places)
5
7 colors
VGGยญ16
(Places)
0
17 textures
AlexNetยญGAPWide
(Places)
6
5 scenes
water
grass
tree
car
plant
windowpane
road
mountain
airplane
skyscraper
dog
sea
ceiling
building
person
horse
bed
track
book
pool table
cabinet
chair
painting
waterfall
sidewalk
sink
shelf
sky
house
stove
๏ฌoor
bus
mountain snowy
ball pit
pantry
building facade
skyscraper
street
hair
wheel
head
screen
crosswalk
shop window
food
wood
lined
dotted
banded
studded
grid
honeycombed
paisley
zigzagged
waf๏ฌed
meshed
cracked
strati๏ฌed
chequered
perforated
sprinkled
potholed
grooved
pleated
matted
freckled
swirly
spiralled
woven
๏ฌbrous
cobwebbed
red
Alexnet
(Places)
3
6 objects
0
20
grass
road
sky
water
tree
dog
ball pit
forest-broadleaf
mountain snowy
building facade
highway
chequered
lined
banded
porous
lacelike
veined
grid
frilly
๏ฌecked
perforated
cracked
strati๏ฌed
potholed
freckled
studded
woven
polka-dotted
purple
orange
red
yellow
blue
pink
green
10
units
0
Fig. 12. Comparison of unique detectors of all types on a variety of architectures. More results are at the project page.
Alexnet
(Video Tracking)
61 objects
279
9
20
10
60
40
20
0
80
2
nv
co
3
nv
co
4
nv
co
nv
co
5
nv
co
3-3
co
nv
4-3
co
5-1
nv
-2
v5
n
co
60
40
20
0
c
e
a
2
b
b
-s2
n-4
n-4
n-5
n-5
n-3
orm
x7
tio
tio
tio
tio
tio
2-n
ep
ep
ep
ep
ep
nv
inc
inc
inc
inc
inc
co
-3
v5
n
co
c
ResNet152 on Places365
200
object
scene
part
material
texture
color
100
0
1
nv
co
GoogLeNet on Places365
120
object
scene
part
material
texture
color
Number of unique detectors
Number of unique detectors
Number of unique detectors
30
VGG16 on Places365
80
object
scene
part
material
texture
color
Number of unique detectors
AlexNet on Places365
40
object
scene
part
material
texture
color
150
100
50
0
-1
BN
-7
v1
on
16
-1
ise
w
Elt
8
-23
ise
8
5
e-3
wis
Elt
w
Elt
8
7
e-4
wis
Elt
Elt
10
e-5
wis
10
5
0
80
1
10
0
2
nv
co
3
nv
co
4
nv
co
nv
co
5
nv
co
3-3
co
nv
4-3
co
5-1
nv
-
v5
n
co
object
scene
part
material
texture
color
2
-3
40
scene
part
material
texture
color
80
60
colorization tracking
0.091 dotted (texture)
40
10
0.140 chequered (texture) 0.167
20
0.063 perforated (texture) 0.085 head (part)
0
a
e
c
2
2
b
b
7-s
n-5
n-4
n-4
n-5
n-3
orm
tio
tio
tio
tio
tio
-7x
2-n
ep
ep
ep
ep
ep
v1
nv
n
inc
inc
inc
inc
inc
co
co
head (part)
0.061 sky (object)
0.056 grass (object)
0
-1
16
BN
0.069 sky (object)
Elt
e-1
wis
8
Elt
3
e-2
wis
0.120
58
78
10
e-3
e-4
e-5
wis
wis
wis
Elt
Elt
Elt
0.048 red-c (color)
0.100
20
la
c
et es
-Im 36
ag 5
eN
e
t
ob rac t
je kin
ct
ce g
nt
r
tra ic
ns
in
v
au
di
o
m
co ovi
n
lo
riz g
at
io
n
p
cr
os uz
sc zle
ha
eg nn
om el
ot
io
co n
nt
f
r
e
a
Al
ex me xt
or
N
e
co t-r der
nt an
ex do
te
m
nc
od
er
et
-P
N
N
ex
Fig. 15. The top ranked concepts in the three top categories in four selfsupervised networks. Some object and part detectors emerge in audio.
Detectors for person heads also appear in puzzle and colorization. A
variety of texture concepts dominate models with self-supervised training.
Al
ex
Al
puzzle
20
car (object)
v5
n
co
scene
part
material
texture
color
chequered (texture) 0.102 head (part)
0
Fig. 14. Semantic detectors emerge across different supervision of the
primary training task. All these models use the AlexNet architecture and
are tested at conv5.
Fig. 10 shows the histogram of object detectors identified inside
ResNet and DenseNet trained on ImageNet and Places respectively.
DenseNet161-Places365 has the largest number of unique object
detectors among all the networks. The emergent detectors differ
across both training data source and architecture. The most frequent
object detectors in the two networks trained on ImageNet are dog
detectors, because there are more than 100 dog categories out of
the 1000 classes in the ImageNet training set.
Fig. 11 shows the examples of object detectors grouped
by object categories. For the same object category, the visual
appearance of the unit as detector varies not only within the same
network but also across different networks. DenseNet and ResNet
has such good detectors for bus and airplane with IoU > 0.25.
Fig. 12 showcases the unique interpretable units of all types on
a variety of networks.
Fig. 13 shows the unique interpretable detectors over different
layers for different network architectures trained on Places365. We
observe that more object and scene detectors emerge at the higher
layers across all architectures: AlexNet, VGG, GoogLeNet, and
ResNet. This suggests that representation ability increases over
layer depth. Because of the compositional structure of the CNN
layers, the deeper layers should have higher capacity to represent
concepts with larger visual complexity such as objects and scene
parts. Our measurements confirm this, and we conclude that higher
network depth encourages the emergence of visual concepts with
higher semantic complexity.
3.4
40
audio
30
20
60
nv
co
30
50
Number of unique detectors
100
scene
part
material
texture
color
40
Number of unique detectors
15
Number of unique detectors
scene
part
material
texture
color
20
Number of unique detectors
Number of unique detectors
AlexNet on ImageNet
VGG16 on ImageNet
GoogLeNet on ImageNet
ResNet152 on ImageNet
Fig.
and ResNet152 trained on Places365.
All five conv layers of
25 13. Comparison of interpretability of
50 the layers for AlexNet, VGG16, GoogLeNet,
100
60
object the selected layers of VGG, GoogLeNet,
object
object
object
AlexNet and
and ResNet are included.
CNNs to predict the neighborhoods of two image patches, while
[28] trains networks by colorizing images. Totally we investigate
12 networks trained for different self-supervised learning tasks.
How do different supervisions affect those internal representations?
Here we compare the interpretability of the deep visual representations resulting from self-supervised learning and supervised
learning. We keep the network architecture the same as AlexNet
for each model (one exception is the recent model transinv
which uses VGG as the base network). Results are shown in
Fig. 14. We observe that training on Places365 creates the largest
number of unique detectors. Self-supervised models create many
texture detectors but relatively few object detectors; apparently,
supervision from a self-taught primary task is much weaker at
inferring interpretable concepts than supervised training on a large
annotated dataset. The form of self-supervision makes a difference:
for example, the colorization model is trained on colorless images,
and almost no color detection units emerge. We hypothesize that
emergent units represent concepts required to solve the primary
task.
Fig. 15 shows some typical visual detectors identified in the
self-supervised CNN models. For the models audio and puzzle,
some object and part detectors emerge. Those detectors may be
useful for CNNs to solve the primary tasks: the audio model is
trained to associate objects with a sound source, so it may be useful
to recognize people and cars; while the puzzle model is trained
to align the different parts of objects and scenes in an image. For
colorization and tracking, recognizing textures might be good
enough for the CNN to solve primary tasks such as colorizing a
desaturated natural image; thus it is unsurprising that the texture
detectors dominate.
Representations from Self-supervised Learning
Recently many work have explored a novel paradigm for unsupervised learning of CNNs without using millions of annotated images,
namely self-supervised learning. For example, [23] trains deep
3.5
Representations from Captioning Images
To further compare the representations from supervised learning
and self-supervised learning, we train a CNN from scratch using
10
COCO captioning dataset:
AlexNet on Places205
Number of unique detectors
Train from
Scratch
40
30
20
object
scene
part
material
texture
color
10
0
10 0
10 2
10 4
10 6
10 4
10 6
Validation accuracy
0.6
Fig. 16. Example images in the COCO captioning dataset, the
CNN+LSTM image captioning model, and the network dissection result.
Training ResNet18 from scratch using the supervision from captioning
images leads to a lot of emergent object detectors.
Number of unique detectors
100
object
scene
part
material
texture
color
80
60
200
Number of detectors
object
scene
part
material
texture
color
150
100
0.4
0.2
0
10 0
10 2
Training iteration
Fig. 18. The evolution of the interpretability of conv5 of Places205AlexNet over 3,000,000 training iterations. The accuracy on the validation
at each iteration is also plotted. The baseline model is trained to 300,000
iterations (marked at the red line).
40
50
20
0
ba
se
lin
re e
pe
at
re 1
pe
at
re 2
pe
N
oD at3
ro
Ba po
u
tc
hN t
or
m
ba
se
lin
e
re
pe
at
1
re
pe
at
2
re
pe
a
N
oD t3
ro
Ba pou
t
tc
hN
or
m
0
Fig. 17. Effect of regularizations on the interpretability of CNNs.
the supervision of captioning images, which generates natural
language sentence to describe the image contents. Specially we
use the image captioning data from COCO dataset [50], where the
images in COCO dataset are annotated with five image captions.
Then we train a CNN plus LSTM as the image captioning model
similar to [51]. Features of ResNet18 are used as input to the LSTM
for generating image captions. The CNN+LSTM architecture and
the network dissection results on the last convolutional layer of
the ResNet18 are shown in Fig.16. We can see that many object
detectors emerge in the CNN, and conclude that supervision from
natural language captions contains high-level semantics to train the
CNN.
3.6
Training Conditions
Training conditions such as the number of training iterations,
dropout [6], batch normalization [7], and random initialization [21],
are known to affect the representation learning of neural networks.
To analyze the effect of training conditions on interpretability, we
take the Places205-AlexNet as the baseline model and prepare
several variants of it, all using the same AlexNet architecture. For
the variants Repeat1, Repeat2 and Repeat3, we randomly initialize
the weights and train them with the same number of iterations. For
the variant NoDropout, we remove the dropout in the FC layers
of the baseline model. For the variant BatchNorm, we apply batch
normalization at each convolutional layer of the baseline model.
Repeat1, Repeat2, Repeat3 all have nearly the same top-1 accuracy
50.0% on the validation set. The variant without dropout has top-1
accuracy 49.2%. The variant with batch norm has top-1 accuracy
50.5%.
Fig. 17 shows the interpretability of units in the CNNs over
different training conditions. We find several effects: 1) Comparing
different random initializations, the models converge to similar
levels of interpretability, both in terms of the unique detector
number and the total detector number; this matches observations
of convergent learning discussed in [21]. 2) For the network
without dropout, more texture detectors emerge but fewer object
detectors. 3) Batch normalization seems to decrease interpretability
significantly.
The batch normalization result serves as a caution that discriminative power is not the only property of a representation that
should be measured. Our intuition for the loss of interpretability
under batch normalization is that the batch normalization โwhitensโ
the activation at each layer, which smooths out scaling issues
and allows a network to easily rotate axes of intermediate
representations during training. While whitening apparently speeds
training, it may also have an effect similar to random rotations
analyzed in Sec. 3.2 which destroy interpretability. As discussed
in Sec. 3.2, however, interpretability is neither a prerequisite nor
an obstacle to discriminative power. Finding ways to capture the
benefits of batch normalization without destroying interpretability
is an important area for future work.
Fig. 18 plots the interpretability of snapshots of the baseline
model at different training iterations along with the accuracy on the
validation set. We can see that object detectors and part detectors
begin emerging at about 10,000 iterations (each iteration processes
a batch of 256 images). We do not find evidence of transitions
across different concept categories during training. For example,
units in conv5 do not turn into texture or material detectors before
becoming object or part detectors. In Fig. 19, we keep track of
six units over different training iteration. We observe that some
units start converging to the semantic concept at early stage. For
example, unit138 starts detecting mountain snowy as early as at
iteration 2446. We also observe that units evolve over time: unit74
and unit108 detect road first before they start detecting car and
airplane respectively.
11
Fig. 19. The interpretations of units change over iterations. Each row shows the interpretation of one unit.
Fine-tuning a pre-trained network to a target domain is commonly
used in transfer learning. The deep features from the pre-trained
network show good generalization across different domains. The
pre-trained network also makes the training converge faster and
results in better accuracy, especially if there is not enough training
data at the target domain. Here we analyze what happens inside
the representation and how the interpretation of the internal units
evolve during the transfer learning.
We run two sets of experiments: fine-tuning Places-AlexNet to
ImageNet and fine-tuning ImageNet-AlexNet to Places. We want to
see how individual units mutate across domains. The interpretability
results of the model checkpoints at different fine-tuning iteration
are plotted in Fig. 20. We can see that the training indeed converges
faster compared to the network trained from scratch on Places
in Fig. 18. The interpretations of the units also change over finetuning. For example, the number of unique object detectors first
drop then keep increasing for the network trained on ImageNet
being fine-tuned to Places365, while it is slowly dropping for the
network trained on Places being fine-tuned to ImageNet.
Fig. 21 shows some examples of the individual unit evolution
happening in the network trained from ImageNet to Places365 and
the network trained from Places365 to ImageNet. For each network,
we show six units with their interpretation at the beginning of finetuning and at the end of fine-tuning. For example, in the network
fine-tuned from ImageNet to Places365, unit15 which detects the
white dogs first, mutates to detect waterfall; unit136 and unit144
which detect dogs first, mutate to detect horse and cow respectively,
as a lot of scene categories in Places such as pasture and corral
contain such animals. On the other hand, in the network fine-tuned
from Places365 to ImageNet, a lot of units mutate to various kinds
of dog detectors. Interestingly though those units mutate to detect
different concepts, those concepts share low-level similarity such
as colors and textures.
In Fig. 22, we zoom into two units from each of the two finetuning processes and plot the history of concept evolution. We
can see that some units switch its top ranked label several times
before converging to some concept: unit15 in the fine-tuning of
ImageNet to Places365 flipped to white, crystalline, before reaches
the waterfall concept. On the other hand, some units switch faster,
for example unit132 in the fine-tuning of Places365 to ImageNet
switches from hair to dog at early stage of fine-tuning.
3.8
Layer Width vs. Interpretability
From AlexNet to ResNet, CNNs for visual recognition have grown
deeper in the quest for higher classification accuracy. Depth has
been shown to be important to high discrimination ability, and we
have seen in Sec. 3.3 that interpretability can increase with depth
as well. However, the width of layers (the number of units per
Number of unique detectors
Transfer Learning between Places and ImageNet
Validation accuracy
3.7
Places365 to ImageNet
50
ImageNet to Places365
40
object
scene
part
material 30
texture
color
40
30
20
20
10
10
0
10 0
10 2
10 4
10 6
0
10 0
0.6
0.6
0.4
0.4
0.2
0.2
0
0
10
10
2
10
4
10
6
10 2
0
0
10
10
Training iteration
2
10 4
10
4
10 6
10
6
Training iteration
Fig. 20. a) Fine-tune AlexNet from ImageNet to Places365. b) Fine-tune
AlexNet from Places365 to ImageNet.
ImageNet to Places365
Before
After
Places365 to ImageNet
Before
After
Fig. 21. Units mutate from a) the network fine-tuned from ImageNet to
Places365 and b) the network fine-tuned from Places365 to ImageNet.
Six units are shown with their semantics at the beginning of the finetuning and at the end of the fine-tuning.
layer) has been less explored. One reason is that increasing the
number of convolutional units in a layer significantly increases
computational cost while yielding only marginal improvements
in classification accuracy. Nevertheless, some recent work [52]
shows that a carefully designed wide residual network can achieve
classification accuracy superior to the commonly used thin and
deep counterparts.
To explore how the width of layers affects interpretability of
CNNs, we do a preliminary experiment to test how width affects
emergence of interpretable detectors. We remove the FC layers of
the AlexNet, then triple the number of units at the conv5, i.e., from
256 units to 768 units, as AlexNet-GAP-Wide. We further triple
the number of units for all the previous conv layers except conv1
for the standard AlexNet, as AlexNet-GAP-WideAll. Finally we put
a global average pooling layer after conv5 and fully connect the
12
ImageNet to Places365
before
before
after
unit15
after
unit100
Places365 to ImageNet
after
before
before
after
unit132
unit31
Fig. 22. The history of one unit mutation during the fine-tuning from
ImageNet to Places365 (top) and Places365 to ImageNet (low).
Number of unique detectors
140
object
scene
part
material
texture
color
120
100
80
60
40
3.10
20
AlexNet
AlexNet-GAP-Wide
nv
1
nv
2
co
nv
3
co
nv
4
co
nv
5
co
co
v3
nv
4
co
nv
5
co
v2
co
n
v1
co
n
co
n
co
co
nv
1
nv
2
co
nv
3
co
nv
4
co
nv
5
0
AlexNet-GAP-WideAll
Fig. 23. Comparison of the standard AlexNet, AlexNet-GAP-Wide, and
AlexNet-GAP-WideAll. Widening the layer brings the emergence of more
detectors. Networks are trained on Places365.
pooled 768-feature activations to the final class prediction.
After training on Places365, the AlexNet-GAP-Wide and the
AlexNet-GAP-WideAll obtain similar classification accuracy on
the validation set as the standard AlexNet (โผ 0.5% top1 accuracy
lower and higher), but it has many more emergent unique concept
detectors at conv5 for AlexNet-GAP-Wide and at all the conv
layers for AlexNet-GAL-WideAll, as shown in Fig. 23. We have
also increased the number of units to 1024 and 2048 at conv5,
but the number of unique concepts does not significantly increase
further. This may indicate a limit on the capacity of AlexNet to
separate explanatory factors; or it may indicate that a limit on
the number of disentangled concepts that are helpful to solve the
primary task of scene classification.
3.9
the performance on the test split. We compute the classification
accuracy averaged across classes. We include the event8 [53],
action40 [54], indoor67 [55], sun397 [56], caltech101 [57], and
caltech256 [58].
The classification accuracies on six image datasets using the
deep features are plotted in Fig. 24. We can see that the deep
features from supervised trained networks perform much better
than the ones from the self-supervised trained networks. Networks
trained on Places have better features for scene-centric datasets
such as sun397 and indoor67, while networks trained on ImageNet
have better features for object-centric datasets such as caltech101
and action40.
Fig. 25 plots the number of the unique object detectors for each
representation over that representationโs classification accuracy on
three selected datasets. We can see there is positive correlation
between them. Thus the supervision tasks that encourage the
emergence of more concept detectors may also improve the
discrimination ability of deep features. Interestingly, on some
of the object centric dataset, the best discriminative representation
is the representation from ResNet152-ImageNet, which has fewer
unique object detectors compared to the ResNet152-Places365. We
hypothesize that the accuracy on a representation when applied to
a task is dependent not only on the number of concept detectors in
the representation, but on how well the concept detectors captures
the characteristics of the hidden factors in the transferred dataset.
Discrimination vs. Interpretability
Activations from the higher layers of pre-trained CNNs are often
used as generic visual features (noted as deep features), generalizing
very well to other image datasets [16], [43]. It is interesting to
bridge the generalization of the deep visual representation as
generic visual features with their interpretability.
Here we first benchmark the deep features from several
networks on six image classification datasets for their discriminative
power. For each network, we feed in the images and extract the
activation at the last convolutional layer as the visual feature, then
train a linear SVM with C = 0.001 on the train split and evaluate
Explaining the Predictions for the Deep Features
After we interpret the units inside the deep visual representation,
we show that the unit activation along with the interpreted label
can be used to explain the prediction given by the deep features.
Previous work [59] uses the weighted sum of the unit activation
maps to highlight which image regions are most informative to
the prediction, here we further decouple at individual unit level to
segment the informative image regions.
We first plot the Class-specific units. After the linear SVM is
trained, we can rank the elements of the feature according to their
SVM weights to obtain the elements of the deep features which
contribute most to that class. Those elements are units that act as
explanatory factors, and we call those top ranked units associated
with each output class class-specific units. Fig. 27 shows the classspecific units of ResNet152-ImageNet and ResNet152-Places365
for one class from action40 and sun397 respectively. For example,
for the Walking the dog class from action40, the top three classspecific units from ResNet152-ImageNet are two dog detection unit
and one person detection unit; for the Picnic area class from sun397,
the top three class-specific units from ResNet152-Places365 are
plant detection unit, grass detection unit, and fence detection unit.
The intuitive match between visual detectors and the classes they
explain suggests that visual detectors from CNNs behave as the
bag-of-semantic-words visual features.
We further use the individual units identified as concept
detectors to build an explanation of the individual image prediction
given by a classifier. The procedure is as follows: Given any
image, let the unit activation of the deep feature (for ResNet the
GAP activation) be [x1 , x2 , ..., xN ], where each xn represents
the value summed up from the activation map
P of unit n. Let
the top predictionโs SVM response be s =
n wn xn , where
[w1 , w2 , ..., wN ] is the SVMโs learned weight. We get the top
ranked units in Figure 26 by ranking [w1 x1 , w2 x2 , ..., wN xN ],
which are the unit activations weighted by the SVM weight for the
event8
0.973
0.966
0.963
0.955
0.946
0.933
0.928
0.927
0.923
0.920
0.918
0.916
0.904
0.904
0.897
0.875
0.852
0.838
0.836
0.829
0.825
0.806
0.782
0.739
0.688
0.621
0.551
0.5
0.766
0.748
0.708
0.691
0.691
0.674
0.563
0.555
0.555
0.527
0.527
0.520
0.498
0.492
0.485
0.484
0.353
0.351
0.347
0.346
0.329
0.299
0.271
0.241
0.208
0.187
0.177
1
Accuracy
Accuracy
1
13
action40
0.8
0.6
0.4
0.2
0
R
es
R Net
es 1
N 52
e R
es t50 Ima
-Im g
N
e
et
15 VG ag Ne
e t
2
VG -P G-H Ne
G
la
t
o
G og VG G-I ce ybr
oo Le G m s3 id
gL N -P ag 65
e l e
Al
ex eNe t-Imace Ne
N V t-P a s3 t
et G l ge 6
-P G ac N 5
Al la -P e e
ex ce la s3 t
N s3 ce 65
e
G Al Al t-P 65- s20
oo ex ex la G 5
gL N Ne ce AP
s
e
Al Al eN t-I t-H 20
ex ex et ma yb 5
N N -P g rid
et et la eN
-P -P ce e
la la s2 t
ce ce 0
s2 s3 5
05 65
-B
co
cr lo au N
os riz d
sc at io
ha ion
tr nn
ob ack el
je co ing
ct nt
ce ex
n t
eg p tric
om uz
ot zle
Al
ex fra m ion
N m ov
et eo in
-ra rd g
nd er
om
R
es
R Ne
G esNt15
o
2
R og et5 -Im
es Le 0 a
N N -Im ge
et et a N
15 -I g e
2- ma eN t
Pl ge e
t
a
VG VG ce Ne
s t
G
VG - G-H 36
G
5
oo
G Im y
gL VG -P ag bri
eN G la eN d
G
et -Places et
oo
gL Ale -Pl ce 20
a
A A eN xN ce s3 5
Al lex lex et- et- s3 65
ex Ne N Pl Hy 65
N t-P et- ac br
et l Im es id
Al Pla ace ag 205
e c s e
Al xN es 20 Ne
ex et 36 5- t
N -P 5- BN
et la G
-P ce A
la s3 P
ce 6
s 5
co co 20
lo n 5
riz te
cr
at xt
os
io
sc au n
ha di
tra nn o
c el
ob
je p king
c u
eg tce zzl
n e
Al
ex om tric
N m oti
et
o
- o n
fra ran vin
m do g
eo m
rd
er
0
indoor67
0.4
Accuracy
0.6
1
0.8
0.6
0.4
0.2
0.2
0
0
R
es
R Net
e 1
G
15
oo sNe 52
Accuracy
gL t5 -Im
VG2-P
eN 0-I ag
l
G ac
G
et ma eN
-P es
oo
-Im g e
R
e t
es
G gL VG VGlac 36
oo e G G es 5
VG VG ag Ne
N
0.690
et G G eN t
R gL Ne -P -H 36
es e t- la y 5
Al 15 -I -H e
0.666
N P
b
ex 2- m y t
Al ReNet et- lacces rid
N Pl ag bri
0.657
ex s 15 P e 20
e a
Al Al t-Im ce eN d
N Ne 2- lac s3 5
0.655
ex ex a s3 et
et t5 Im e 65
A
-P 0 a s2
A
N
le le e Ne ge 65
0.649
G
la -Im ge 05
xN xN t-P t-H Ne
Al oog V ces ag Ne
0.629
et et la yb t
ex L GG 36 e t
-P -P ce ri
0.605
N eN - 5- Ne
la la s3 d
e
I
ce ce 6
0.597
Al t-P et-I ma GA t
s2 s2 5
ex la m ge P
05 05
a
0.515
Al N ce g N
A
e
ex et s2 eN t
co co -BN
l
e
0.513
N P 05 e
xN
cr lo n
et la - t
et VG os riz tex
0.513
Al Al -P ce BN
-P G sc at t
ex ex la s2
la -P ha ion
0.472
N Ne ce 05
ce la n
et t- s3
0.460
s3 ce ne
-Im H 6
VG 65 s3 l
ag ybr 5
G
0.454
-G 65
oo
eN id
cr
G
A
gL
0.447
os co e
eN Pla puz P
sc nt t
G
0.381
c
ha ex
es zle
e
oo
t
t
n
20
P
gL
Number of unique nobject
detectors 0.287
e
eN lac au 5
co tra aud l
0.271
es di
et
lo ck io
-P tr 36 o
0.268
r i
ob lacack 5
ob izat ng
0.250
je es ing
je p ion
ct 2
ct u
0.250
ce 05
c z
Al ego ent zle
n
0.208
ex
m ric
eg mo tric
o
A
N m ti
om vi
0.188
l
f
et
e
r
xN am o ng
-ra ov on
0.160
fra n in
et eo tion
-ra rd
m do g
0.142
eo m
nd er
rd
0.105
om
er
0.102
R
es
R
es
G N
o e
R Ne
G ogL t15
oo e 2
G es t15
oo Ne 2
Accuracy
gL Ne -Pl
gL t5 Im
eN t-P ac
eN 0- ag
e l es
I
et ma eN
VG t-P ace 36
R
5
l
g
e
I
m
es
eN t
VGG- aces20
a
V
0.827
V
N G G g e
R
G Pla s365
e
e t
-P ce 5
R esN
0.809
Al t15 G- G-H Ne
Al es e V la s
ex 2- Im y t
ex N t5 G ce 20
0.782
N Pl ag br
N et1 0- G s3 5
et 5 Im -H 6
Al et-I ace eN id
0.766
- 2
m
e
e
y 5
s3 t
Al
x
a
V
G Pla -Im age bri
0.754
N g 65
ex
G
o
e
e
N V G t- N
Al og V ces ag Ne d
0.732
et G -P H e
G
ex L G 36 eN t
t
Gunique
la yb object
N eN -I 5- e
Number
detectors
0.585
Al -Plof
e
t
e ac -P ce rid
Al t-P et-I ma GA
0.571
G Al xN es lac s36
e l m g P
oo ex et 36 es 5
Al xN ace ag eN
Al g N -P 5 2
0.519
ex et s2 eN et
e L e l - 0
N -P 05 e
0.515
G xN eN t-P ace GA 5
e la
t
oo et et la s P
Al Al t-P ce -BN
0.494
gL -P -P ce 20
ex ex lac s2
eN lac lac s3 5
0.493
N Ne es 05
et t- 3
et es2 es3 65
-Im H 6
-P 0 6
0.489
la 5- 5
a yb 5
ce B
0.483
cr geNrid
cr
s2 N
os co e
0.476
os co 0
sc nt t
5
co sch nte
0.433
ha ex
lo an xt
nn t
co
0.387
riz n
lo au el
at el
riz d
0.380
io
a
n
a
tr ti io
tr u
0.377
ob ack on
ob ack dio
0.343
je p ing
je p ing
c u
c u
0.322
eg tce zzl
eg tce zz
om ntr e
om ntr le
0.319
ic
ic
A
Al
o
0.255
le fra m otio
ex fra m tio
xN m o n
N m ov n
0.229
et eo vin
et eo in
-ra rd g
-ra rd g
0.221
nd er
nd er
om
om
0.190
0.148
Accuracy
1
0.8
0.827
0.797
0.792
0.788
0.785
0.768
0.756
0.750
0.674
0.672
0.664
0.615
0.607
0.580
0.574
0.510
0.430
0.424
0.402
0.392
0.362
0.339
0.335
0.285
0.259
0.206
0.178
0.934
0.926
0.919
0.918
0.889
0.862
0.861
0.854
0.798
0.785
0.750
0.743
0.737
0.728
0.713
0.704
0.678
0.669
0.650
0.649
0.622
0.576
0.546
0.517
0.511
0.466
0.343
caltech101
sun397
caltech256
0.8
1
0.8
0.6
0.6
0.4
80
0
60
AlexNet-Places365-GAP
et
20
frameorder
AlexNet-random
0.6
0.7
0.8
0.9
VGG-Places365
VGG-Hybrid
AlexNet-Places365
AlexNet-Places205
0
objectcentric tracking
puzzle
moving
audio
crosschannel
frameorder
context
0
egomotion
colorization
AlexNet-random
0.1
ResNet152-Places365
0.2
0.3
0.4
0.5
0.6
60
40
20
VGG-Hybrid
AlexNet-Places365-GAP
AlexNet-Places365
AlexNet-Hybrid
VGG-Places205
VGG-Places365
VGG-ImageNet
GoogLeNet-Places365
GoogLeNet-Places205
GoogLeNet-ImageNet
AlexNet-Places205
AlexNet-ImageNet
audio
tracking
moving
crosschannel
colorization
frameorder
puzzle
context
0
AlexNet-random
egomotion
0
0.2
0.4
0.6
objectcentric
AlexNet-Places205-BN
Accuracy on indoor67
0.8
1
0.7
0
0.3
0.8
ResNet50-ImageNet
60
VGG-ImageNet
GoogLeNet-Places365
GoogLeNet-Places205
GoogLeNet-ImageNet
AlexNet-Places205
AlexNet-Places365-GAP
AlexNet-Places365
40
AlexNet-Hybrid
AlexNet-ImageNet
objectcentric
tracking
puzzle
moving
audio
crosschannel
frameorder
context
0
AlexNet-random egomotion colorization
20
0
0.1
0.2
0.3
0.4
Accuracy on sun397
AlexNet-Places205-BN
0.5
0.6
VGG-Hybrid
VGG-ImageNet
AlexNet-Places365-GAP
GoogLeNet-ImageNet
AlexNet-Places365
AlexNet-Places205
AlexNet-Hybrid
AlexNet-Places205-BN
objectcentric
tracking audio
puzzle
crosschannel
context
egomotion
colorization
frameorder
AlexNet-ImageNet
moving
0.4
0.5
0.6
0.7
0.8
Accuracy on caltech101
100
ResNet152-ImageNet
VGG-Places205
VGG-Hybrid
VGG-Places365
80
ResNet50-ImageNet
ResNet152-ImageNet
GoogLeNet-Places365
GoogLeNet-Places205
20
ResNet152-Places365
100
Number of unique object detectors
Number of unique object detectors
80
ResNet152-ImageNet
ResNet50-ImageNet
40
AlexNet-random
Fig. 24. The classification
accuracy
datasets.
Accuracy
on event8 of deep features on the six image
Accuracy
on action40
100
60
AlexNet-Places205-BN
AlexNet-ImageNet
20
ResNet152-Places365
VGG-Places205
80
VGG-Places365
GoogLeNet-Places365
VGG-ImageNet
GoogLeNet-Places205
GoogLeNet-ImageNet
AlexNet-Hybrid
AlexNet-Places365-GAP
40
1
ResNet152-ImageNet
VGG-Places205
VGG-ImageNet
GoogLeNet-ImageNet
AlexNet-Places365
AlexNet-Places205
AlexNet-Hybrid
AlexNet-Places205-BN
AlexNet-ImageNet
objectcentric
tracking
moving
puzzle
audio
crosschannel
colorization
egomotion context
100
ResNet152-Places365
0.2ResNet50-ImageNet
60
GoogLeNet-Places365
GoogLeNet-Places205
40
0
0.5
0.4
100
ResNet50-ImageNet
VGG-Places205
ResNet152-ImageNet 80
VGG-Hybrid
VGG-Places365
es
N
Number
of unique object detectors
R
0.2
Number of unique object detectors
ResNet152-Places365
100
VGG-Places205
80
VGG-Places365
40
20
0.7
1
ResNet152-Places365
ResNet50-ImageNet
60
0.9
VGG-ImageNet
AlexNet-Places365-GAP
GoogLeNet-Places205
AlexNet-Places365
AlexNet-Places205
AlexNet-Places205-BN
ResNet152-ImageNet
VGG-Hybrid
GoogLeNet-Places365
GoogLeNet-ImageNet
AlexNet-Hybrid
objectcentric
AlexNet-ImageNet
tracking
moving
audio
crosschannel
frameorder
context
puzzle
0
egomotion
colorization
0 AlexNet-random
0.2
0.4
0.6
0.8
Accuracy on caltech256
1
Fig. 25. The number of unique object detectors in the last convolutional layer compared to each representations classification accuracy on three
datasets. Supervised (in red) and unsupervised (in green) representations clearly form two clusters.
top predicted class. Then we simply upsample the activation map
of the top ranked unit to segment the image.
Image segmentations using individual unit activation are plotted
in Fig. 26a. The unit segmentation explain the prediction explicitly.
For example, the prediction for the first image is Gardening, and the
explanatory units detect plant, grass, person, flower, and pot. The
prediction for the second image is Riding a horse, the explanatory
units detect horse, fence and dog. We also plot some incorrectly
predicted samples in Figure 26b. The segmentation gives the
intuition as to why the classifier made mistakes. For example,
for the first image the classifier predicts cutting vegetables rather
than the true label gardening, because the second unit incorrectly
considers the ground as table.
4
C ONCLUSION
Network Dissection translates qualitative visualizations of representation units into quantitative interpretations and measurements of
interpretability. We have found that the units of a deep representation are significantly more interpretable than expected for a basis of
the representation space. We have investigated the interpretability
of deep visual representations resulting from different architectures,
training supervisions, and training conditions. Furthermore, we
have shown that interpretability of deep visual representations is
14
relevant to the power of the representation as a generalizable visual
feature. We conclude that interpretability is an important property
of deep neural networks that provides new insights into their
hierarchical structure. Our work motivates future work towards
building more interpretable and explainable AI systems.
ACKNOWLEDGMENTS
This work was partially funded by DARPA XAI program to A.T.;
This work was also partly supported by the National Science
Foundation under Grants No. 1524817 to A.T., and No. 1532591
to A.T. and A.O.; the Vannevar Bush Faculty Fellowship program
sponsored by the Basic Research Office of the Assistant Secretary
of Defense for Research and Engineering and funded by the
Office of Naval Research through grant N00014-16-1-3116 to
A.O.; the MIT Big Data Initiative at CSAIL, the Toyota Research
Institute MIT CSAIL Joint Research Center, Google and Amazon
Awards, and a hardware donation from NVIDIA Corporation. B.Z.
is supported by a Facebook Fellowship.
R EFERENCES
B. Zhou, A. Khosla, A. Lapedriza, A. Oliva, and A. Torralba, โObject
detectors emerge in deep scene cnns,โ International Conference on
Learning Representations, 2015.
[2] A. Gonzalez-Garcia, D. Modolo, and V. Ferrari, โDo semantic parts
emerge in convolutional neural networks?โ arXiv:1607.03738, 2016.
[3] C. Vondrick, H. Pirsiavash, and A. Torralba, โGenerating videos with
scene dynamics,โ arXiv:1609.02612, 2016.
[4] Y. Bengio, A. Courville, and P. Vincent, โRepresentation learning: A
review and new perspectives,โ IEEE transactions on pattern analysis and
machine intelligence, vol. 35, no. 8, pp. 1798โ1828, 2013.
[5] D. Bau, B. Zhou, A. Khosla, A. Oliva, and A. Torralba, โNetwork
dissection: Quantifying interpretability of deep visual representations,โ in
Proc. CVPR, 2017.
[6] N. Srivastava, G. E. Hinton, A. Krizhevsky, I. Sutskever, and R. Salakhutdinov, โDropout: a simple way to prevent neural networks from overfitting.โ
Journal of Machine Learning Research, vol. 15, no. 1, pp. 1929โ1958,
2014.
[7] S. Ioffe and C. Szegedy, โBatch normalization: Accelerating deep network
training by reducing internal covariate shift,โ arXiv:1502.03167, 2015.
[8] M. D. Zeiler and R. Fergus, โVisualizing and understanding convolutional
networks,โ Proc. ECCV, 2014.
[9] R. Girshick, J. Donahue, T. Darrell, and J. Malik, โRegion-based
convolutional networks for accurate object detection and segmentation,โ
IEEE transactions on pattern analysis and machine intelligence, 2016.
[10] A. Mahendran and A. Vedaldi, โUnderstanding deep image representations
by inverting them,โ Proc. CVPR, 2015.
[1]
[11] K. Simonyan, A. Vedaldi, and A. Zisserman, โDeep inside convolutional
networks: Visualising image classification models and saliency maps,โ
International Conference on Learning Representations Workshop, 2014.
[12] A. Mahendran and A. Vedaldi, โUnderstanding deep image representations
by inverting them,โ in Proc. CVPR, 2015.
[13] A. Dosovitskiy and T. Brox, โGenerating images with perceptual similarity
metrics based on deep networks,โ in Advances in Neural Information
Processing Systems, 2016, pp. 658โ666.
[14] A. Nguyen, A. Dosovitskiy, J. Yosinski, T. Brox, and J. Clune, โSynthesizing the preferred inputs for neurons in neural networks via deep generator
networks,โ In Advances in Neural Information Processing Systems, 2016.
[15] K. He, X. Zhang, S. Ren, and J. Sun, โDeep residual learning for image
recognition,โ in Proc. CVPR, 2016.
[16] A. S. Razavian, H. Azizpour, J. Sullivan, and S. Carlsson, โCnn features
off-the-shelf: an astounding baseline for recognition,โ arXiv:1403.6382,
2014.
[17] P. Agrawal, R. Girshick, and J. Malik, โAnalyzing the performance of
multilayer neural networks for object recognition,โ Proc. ECCV, 2014.
[18] J. Yosinski, J. Clune, Y. Bengio, and H. Lipson, โHow transferable are
features in deep neural networks?โ In Advances in Neural Information
Processing Systems, 2014.
[19] C. Szegedy, W. Zaremba, I. Sutskever, J. Bruna, D. Erhan, I. Goodfellow, and R. Fergus, โIntriguing properties of neural networks,โ
arXiv:1312.6199, 2013.
[20] A. Nguyen, J. Yosinski, and J. Clune, โDeep neural networks are easily
fooled: High confidence predictions for unrecognizable images,โ in Proc.
CVPR, 2015.
[21] Y. Li, J. Yosinski, J. Clune, H. Lipson, and J. Hopcroft, โConvergent
learning: Do different neural networks learn the same representations?โ
arXiv:1511.07543, 2015.
[22] C. Zhang, S. Bengio, M. Hardt, B. Recht, and O. Vinyals, โUnderstanding
deep learning requires rethinking generalization,โ International Conference on Learning Representations, 2017.
[23] C. Doersch, A. Gupta, and A. A. Efros, โUnsupervised visual representation learning by context prediction,โ in Proc. CVPR, 2015.
[24] M. Noroozi and P. Favaro, โUnsupervised learning of visual representations by solving jigsaw puzzles,โ in Proc. ECCV, 2016.
[25] D. Jayaraman and K. Grauman, โLearning image representations tied to
ego-motion,โ in Proc. ICCV, 2015.
[26] P. Agrawal, J. Carreira, and J. Malik, โLearning to see by moving,โ in
Proc. ICCV, 2015.
[27] X. Wang and A. Gupta, โUnsupervised learning of visual representations
using videos,โ in Proc. CVPR, 2015.
[28] R. Zhang, P. Isola, and A. A. Efros, โColorful image colorization,โ in
Proc. ECCV. Springer, 2016.
[29] โโ, โSplit-brain autoencoders: Unsupervised learning by cross-channel
prediction,โ in Proc. CVPR, 2017.
[30] A. Owens, J. Wu, J. H. McDermott, W. T. Freeman, and A. Torralba,
โAmbient sound provides supervision for visual learning,โ in Proc. ECCV,
2016.
[31] R. Q. Quiroga, L. Reddy, G. Kreiman, C. Koch, and I. Fried, โInvariant
visual representation by single neurons in the human brain,โ Nature, vol.
435, no. 7045, pp. 1102โ1107, 2005.
a)
b)
Correct label: gardening
Correct label: brushing
Fig. 26. Segmenting images using top activated units weighted by the class label from ResNet152-Places365 deep feature. a) the correctly predicted
samples. b) the incorrectly predicted samples.
15
Images from Walking the dog (action40)
ResNet152-ImageNet
ResNet152-Places365
Images from Picnic area (sun397)
ResNet152-ImageNet
ResNet152-Places365
Fig. 27. Class-specific units from ResNet152-ImageNet and ResNet152Places365 on one class from action40 and sun397. For each class, we
show three sample images, followed by the top 3 units from ResNet152ImageNet and ResNet152-Places365 ranked by the class weight of linear
SVM to predict that class. SVM weight, detected concept name and the
IoU score are shown above each unit.
[32] B. Zhou, H. Zhao, X. Puig, S. Fidler, A. Barriuso, and A. Torralba, โScene
parsing through ade20k dataset,โ Proc. CVPR, 2017.
[33] S. Bell, K. Bala, and N. Snavely, โIntrinsic images in the wild,โ ACM
Trans. on Graphics (SIGGRAPH), 2014.
[34] R. Mottaghi, X. Chen, X. Liu, N.-G. Cho, S.-W. Lee, S. Fidler, R. Urtasun,
and A. Yuille, โThe role of context for object detection and semantic
segmentation in the wild,โ in Proc. CVPR, 2014.
[35] X. Chen, R. Mottaghi, X. Liu, S. Fidler, R. Urtasun, and A. Yuille, โDetect
what you can: Detecting and representing objects using holistic models
and body parts,โ in Proc. CVPR, 2014.
[36] M. Cimpoi, S. Maji, I. Kokkinos, S. Mohamed, and A. Vedaldi, โDescribing textures in the wild,โ in Proc. CVPR, 2014.
[37] J. Van De Weijer, C. Schmid, J. Verbeek, and D. Larlus, โLearning
color names for real-world applications,โ IEEE Transactions on Image
Processing, vol. 18, no. 7, pp. 1512โ1523, 2009.
[38] A. Krizhevsky, I. Sutskever, and G. E. Hinton, โImagenet classification
with deep convolutional neural networks,โ in Advances in neural information processing systems, 2012, pp. 1097โ1105.
[39] C. Szegedy, W. Liu, Y. Jia, P. Sermanet, S. Reed, D. Anguelov, D. Erhan,
V. Vanhoucke, and A. Rabinovich, โGoing deeper with convolutions,โ in
Proc. CVPR, 2015.
[40] K. Simonyan and A. Zisserman, โVery deep convolutional networks for
large-scale image recognition,โ arXiv:1409.1556, 2014.
[41] G. Huang, Z. Liu, K. Q. Weinberger, and L. van der Maaten, โDensely
connected convolutional networks,โ Proc. CVPR, 2017.
[42] O. Russakovsky, J. Deng, H. Su, J. Krause, S. Satheesh, S. Ma, Z. Huang,
A. Karpathy, A. Khosla, M. Bernstein et al., โImagenet large scale visual
recognition challenge,โ Intโl Journal of Computer Vision, 2015.
[43] B. Zhou, A. Lapedriza, J. Xiao, A. Torralba, and A. Oliva, โLearning
deep features for scene recognition using places database,โ In Advances
in Neural Information Processing Systems, 2014.
[44] B. Zhou, A. Lapedriza, A. Khosla, A. Oliva, and A. Torralba, โPlaces: A
10 million image database for scene recognition,โ IEEE Transactions on
Pattern Analysis and Machine Intelligence, 2017.
[45] I. Mikjjsra, C. L. Zitnick, and M. Hebert, โShuffle and learn: unsupervised
learning using temporal order verification,โ in Proc. ECCV, 2016.
[46] R. Gao, D. Jayaraman, and K. Grauman, โObject-centric representation
learning from unlabeled videos,โ arXiv:1612.00500, 2016.
[47] D. Pathak, P. Krahenbuhl, J. Donahue, T. Darrell, and A. A. Efros,
โContext encoders: Feature learning by inpainting,โ in Proc. CVPR, 2016.
[48] X. Wang, K. He, and A. Gupta, โTransitive invariance for self-supervised
visual representation learning,โ arXiv preprint arXiv:1708.02901, 2017.
[49] P. Diaconis, โWhat is a random matrix?โ Notices of the AMS, vol. 52,
no. 11, pp. 1348โ1349, 2005.
[50] T.-Y. Lin, M. Maire, S. Belongie, J. Hays, P. Perona, D. Ramanan, P. Dollaฬr,
and C. L. Zitnick, โMicrosoft coco: Common objects in context,โ in
European conference on computer vision. Springer, 2014, pp. 740โ755.
[51] O. Vinyals, A. Toshev, S. Bengio, and D. Erhan, โShow and tell: A neural
image caption generator,โ in Proceedings of the IEEE conference on
computer vision and pattern recognition, 2015, pp. 3156โ3164.
[52] S. Zagoruyko and N. Komodakis, โWide residual networks,โ
arXiv:1605.07146, 2016.
[53] L.-J. Li and L. Fei-Fei, โWhat, where and who? classifying events by
scene and object recognition,โ in Proc. ICCV, 2007.
[54] B. Yao, X. Jiang, A. Khosla, A. L. Lin, L. Guibas, and L. Fei-Fei, โHuman
action recognition by learning bases of action attributes and parts,โ in
Proc. ICCV, 2011.
[55] A. Quattoni and A. Torralba, โRecognizing indoor scenes,โ in Proc. CVPR,
2009.
[56] J. Xiao, J. Hays, K. A. Ehinger, A. Oliva, and A. Torralba, โSun database:
Large-scale scene recognition from abbey to zoo,โ in Proc. CVPR, 2010.
[57] L. Fei-Fei, R. Fergus, and P. Perona, โLearning generative visual models
from few training examples: An incremental bayesian approach tested on
101 object categories,โ Computer Vision and Image Understanding, 2007.
[58] G. Griffin, A. Holub, and P. Perona, โCaltech-256 object category dataset,โ
2007.
[59] B. Zhou, A. Khosla, A. Lapedriza, A. Oliva, and A. Torralba, โLearning
deep features for discriminative localization,โ in Proc. CVPR, 2016.
Bolei Zhou is a Ph.D. Candidate in Computer
Science and Artificial Intelligence Lab (CSAIL)
at the Massachusetts Institute of Technology. He
received M.Phil. degree in Information Engineering from the Chinese University of Hong Kong
and B.Eng. degree in Biomedical Engineering
from Shanghai Jiao Tong University in 2010.
His research interests are computer vision and
machine learning. He is an award recipient of
Facebook Fellowship, Microsoft Research Asia
Fellowship, and MIT Greater China Fellowship.
David Bau is a PhD student at the MIT Computer
Science and Artificial Intelligence Laboratory
(CSAIL). He received an A.B. in Mathematics
from Harvard in 1992 and an M.S. in Computer
Science from Cornell in 1994. He coauthored a
textbook on numerical linear algebra. He was a
software engineer at Microsoft and Google and
developed ranking algorithms for Google Image
Search. His research interest is interpretable
machine learning.
Aude Oliva is a Principal Research Scientist at
the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL). After a French baccalaureate in Physics and Mathematics, she received two M.Sc. degrees and a Ph.D in Cognitive
Science from the Institut National Polytechnique
of Grenoble, France. She joined the MIT faculty in
the Department of Brain and Cognitive Sciences
in 2004 and CSAIL in 2012. Her research on
vision and memory is cross-disciplinary, spanning
human perception and cognition, computer vision,
and human neuroscience. She received the 2006 National Science
Foundation (NSF) Career award, the 2014 Guggenheim and the 2016
Vannevar Bush fellowships.
Antonio Torralba received the degree in
telecommunications engineering from Telecom
BCN, Spain, in 1994 and the Ph.D. degree
in signal, image, and speech processing from
the Institut National Polytechnique de Grenoble,
France, in 2000. From 2000 to 2005, he spent
postdoctoral training at the Brain and Cognitive
Science Department and the Computer Science
and Artificial Intelligence Laboratory, MIT. He is
now a Professor of Electrical Engineering and
Computer Science at the Massachusetts Institute
of Technology (MIT). Prof. Torralba is an Associate Editor of the International Journal in Computer Vision, and has served as program chair for
the Computer Vision and Pattern Recognition conference in 2015. He
received the 2008 National Science Foundation (NSF) Career award, the
best student paper award at the IEEE Conference on Computer Vision
and Pattern Recognition (CVPR) in 2009, and the 2010 J. K. Aggarwal
Prize from the International Association for Pattern Recognition (IAPR).
| 1cs.CV
|
Semantic Photometric Bundle Adjustment on Natural Sequences
Rui Zhu, Chaoyang Wang, Chen-Hsuan Lin, Ziyan Wang, Simon Lucey
The Robotics Institute, Carnegie Mellon University
arXiv:1712.00110v1 [cs.CV] 30 Nov 2017
{rz1, chaoyanw, chenhsul, ziyanw1}@andrew.cmu.edu, [email protected]
Abstract
The problem of obtaining dense reconstruction of an object in a natural sequence of images has been long studied in computer vision. Classically this problem has been
solved through the application of bundle adjustment (BA).
More recently, excellent results have been attained through
the application of photometric bundle adjustment (PBA)
methods โ which directly minimize the photometric error
across frames. A fundamental drawback to BA & PBA, however, is: (i) their reliance on having to view all points on
the object, and (ii) for the object surface to be well textured. To circumvent these limitations we propose semantic PBA which incorporates a 3D object prior, obtained
through deep learning, within the photometric bundle adjustment problem. We demonstrate state of the art performance in comparison to leading methods for object reconstruction across numerous natural sequences.
Figure 1: Overview of the proposed method for semantic
object-centric photometric bundle adjustment. Given a
sequence of images with small motion (top row), we recover
a full 3D dense shape of the object, as well as the camera
poses w.r.t. the global coordinate system (middle row). Our
method enables reprojection to the image plane with the estimated cameras (bottom row) to optimize for the photometric consistency as well as silhouette and depth constraints.
1. Introduction
In this paper we are primarily concerned with the goal of
obtaining dense 3D object reconstructions from short natural image sequences. One obvious strategy is to employ
classical bundle adjustment (BA) [18] across the sequence
where we can simultaneously recover camera pose and 3D
points. Although reliable, this strategy is problematic as it:
(i) can only recover 3D points if they are observed in the image sequence, and (ii) the density of the reconstruction is dependent on how textured the surface of the object is across
the image sequence. Recently, photometric extensions to
bundle adjustment have been proposed [1, 4] that directly
minimize the photometric consistency between frames with
respect to pose and 3D points. Borrowing upon the terminology of [1] we shall refer to these methods collectively
herein as photometric bundle adjustment (PBA). PBA has
recently proved advantageous over classical BA for problems where dense reconstructions are required due to their
ability directly minimize for photometric consistency. Even
with these recent innovations PBA is still, however, fundamentally limited in performance by (i) and (ii).
There have been numerous efforts within the computer
vision community to bring semantic prior into the task of
object/scene 3D reconstruction. Convolutional Neural Networks (CNN) are proving remarkably useful for this task
when one is provided with scene [17, 24] or object category [25, 7] specific labels & priors. A powerful characteristic of these semantic CNN methods is their ability
to circumvent the fundamental limitations of (i) and (ii).
For example, [25, 7, 21, 6] offer strategies for inferring a
dense 3D reconstruction of an object from a single image
even when a substantial portion of the projected 3D points
are self-occluded. More recently, semantic CNN strategies have been proposed that attempt to incorporate multiple frames [3, 9]. Most of these previous efforts have been
1
trying to attack the problem of 3D reconstruction as a supervised learning problem โ where geometry is largely treated
as a label to be predicted.
Although attractive in its simplicity this strategy has
some inherent drawbacks. First, these geometric labels can
be problematic to obtain โ hand labeling can be error prone,
and rendering can lack the necessary realism. Second, the
predicted labels from these network models do not adhere
to geometric constraints โ such as photometric consistency
โ making the results unreliable. Recently, the application of
geometric constraints within the offline CNN learning process has been entertained including reprojected silhouette
matching [22, 25], depth matching [14], and even photometric consistency [19, 13, 12]. A fundamental problem
with these emerging methods, however, is that the geometric constraints are not enforced at test time โ dramatically
reducing their effectiveness.
Given these concerns, we argue that instead of incorporating geometric constraints into semantic CNN strategies offline, one should instead incorporate object semantics
within the PBA pipeline. As we demonstrate in Fig. 1 and
our results section this strategy gives the best of both worlds
โ semantic knowledge of the object with photometric consistency. In this paper, we propose an enhanced semantic
PBA method which works on natural sequences as the classic PBA does, and give extensive evaluations on both synthetic and natural sequence domains. We summarize our
contributions as follows:
โข We provide the first approach of its kind (to our knowledge) for semantic object-centric PBA on natural sequences โ which gives the global 6DoF camera poses
of each frame and the dense 3D shape, with PBA-like
accuracy but denser depth maps.
โข We systematically evaluate the local optimality of our
proposed optimization pipeline, as well as our enhanced objective which takes use of classic PBA results as off-the-shelf initialization or regularizer in our
method.
โข We collect a new dataset for the task of object-centric
shape reconstruction, consisting of rendered sequences
of full ground truth in cameras, depth maps, and
the shape in canonical pose, as well as natural sequences annotated with ShapeNet [2] models, making
the dataset feasible for evaluating both PBA methods
with camera estimations [11, 8], and methods which
only recover aligned shapes or depth maps [20, 13, 9]
by end-to-end learning on ShapeNet .
1.1. Related Work
Photometric Bundle Adjustment: Photometric bundle adjustment (PBA) which is an optimization based method sitting entirely upon the visual cue of photometric consistency
across all input frames [5, 15, 1, 11]. In PBA the shape is recovered by jointly optimizing for depth maps corresponding
to the visible pixels in template frames [5, 15, 1], as well as
camera motion. As a result the formulation of classic PBA
is solely to recover the geometry of the scene, completely
agnostic to semantics of the scene/object. Some works in
PBA aims for small motion videos in particular [11, 10].
Shape Reconstructing with Deep Learning: As previously mentioned, early deep learning methods [7, 21, 6, 3,
9] solve the task of object-centric (object shape only) reconstruction with supervision from shape labels. Recently,
an emerging school of thought seeks to bring in geometry
back to the task, including reprojected silhouette matching [22, 25], depth matching [14], and even photometric
consistency [19, 13, 12]. One issue of most of these methods is they assume known cameras, in global frame. This is
in fact a too strong assumption to hold for natural sequences
where global camera poses are not readily availabe. While
some others do not account for camera motion at all [20, 3],
which creates a gap from classic PBA where camera motions are instead the direct output.
Semantic PBA: Recent work of Zhu et al. [26] also proposed to apply shape priors within PBA for 3D object reconstruction. In spite of the similarity in the formulation of the
problem, Zhu et al.โs approach was problematic in a number
of ways. First, the performance of Zhu et al. relies heavily on the initialization point given by CNN pose/style predictors trained predominantly on rendered images, which
is suspicious for its reliability on natural sequences. Instead, we utilize a more reliable source โ relative camera
pose from PBA for initialization. Second, due to the limitations of the method, such as weak perspective camera
model assumption and unreliable initialization source, Zhu
et al.โs evaluation was restricted to rendered sequence. Thus
they did not conduct quantitative comparisons between actual PBA methods [11, 8] w.r.t. camera pose error or depth
error on real world sequences; while we give an extensive
evaluation of our method on real sequences. Third, Zhu
et al. did not give a proper analysis of the characteristics
of their objective function, which results in using inadequate optimization techniques for their approach; In this paper, through inspecting the property of different cost functions, we propose a more robust and efficient optimization
pipeline.
Notation: Vectors are represented with lower-case bold
font (e.g. a). Matrices are in upper-case bold (e.g. M) while
scalars are lower-cased (e.g. a). Italicized upper-cased characters represent sets (e.g. S ). To denote the lth sample in a
set (e.g. images, shapes), we use subscript (e.g. Ml ). Calligraphic symbols (e.g. ฯ) denote functions. Images are defined as sampling function over the pixel coordinates, i.e.
I(u) : R2 โ R3 .
Generator
Offline PBA Pipeline
& Initializers
Camera
Camera
Pipeline of our approach
Our camera model
Figure 2: (Left) Pipeline of the optimization. Given an input sequence, we first run it through offline PBA pipeline to
provide rough estimation for the depth maps as future depth map constraint, and camera motion as initialization to our
camera motion parameters. Our style & pose initializer is also called to initialize the global pose of the template frame,
as well as the style vector. Starting from the initialization, we optimize all variables until convergence through PBA-like
pipeline with combined objective from photometric consistency Lph , silhouette matching error Lcd and inverse depth error
Linvd . (Right) The perspective camera model. We adopt the camera model in BlenderTM by centering the object in the
world frame, and positioning the camera with identity pose (in grey) along the Z axis, looking at the origin point. We show
in this figure camera transformation from the identity camera can be parameterized with exponential twist โฯ (solid blue
arrow) and translation โt (red arrows) w.r.t. the camera local axes.
2. Approach
M
2.1. Preliminary
Camera model We assume a perspective camera with
known intrinsics K. The camera extrinsics are parameterized as concatenation of exponential coordinates (also
known as twist) of rotation and translation vector: p =
[ฯ; t] โ R6 . The camera projection function is written as
ฯ(x; p) = K(R(ฯ)x + t).
(1)
Given a short window of L frames as in PBA [11, 1],
we define the first frame as the target frame (frame 0), and
the subsequent L โ 1 frames as source frames. The relative
camera pose between the target frame and source frame is
denoted as โpl = [โฯl ; โtl ]. The global pose is thus computed as a composing of relative pose of the source frame
and the global pose of the target frame:
pl = [โฯl โฆ ฯ0 ; โtl + t0 ].
(2)
We define the pose composition rule as:
R(โฯ โฆ ฯ) = R(โฯ)R(ฯ), โt โฆ t = โt + t.
(3)
The reprojection of one point x onto frame l with the corresponding global pose is framed as sampling the image with
reprojected pixel location Il (ฯ(xj ; pl )).
Reprojection with pseudo-raytracing Reprojection from
a point set X given camera pose p can be viewed as first
reasoning the visible part of the point set with a masking
p
function Xp := M(X; p) where Xp = {xj }j=1
. The
mask function is implemented as pseudo-raytracing [14] by
projecting the points to a enlarged inverse depth plane by a
factor U , and then perform max pooling in a neighbourhood of U ร U to figure out the visible point with biggest
inverse depth. By doing so the mask function gives both the
indices of the Mp visible points, and an inverse depth map.
2.2. Overview
Our method takes in a RGB sequence taken by a calibrated camera moving around an object. The category(e.g.
cars, airplanes, chairs) of the object is assumed to be known,
and we have a rich repository of aligned CAD models (e.g.
ShapeNet [2]) for this category. We define the world coordinate system as one attached to the objects as chosen by the
CAD dataset, and the calibrated perspective camera model
is parametrized by full 6DoF rotation and translation (see
Fig.2). The goal of our method is to recover the full 3D
shape of the object in the world frame, as well as the 6DoF
parameters of the camera pose of each frame.
We adopt the category-specific shape prior from Zhu
et.al [26] to learn a shape space from the repository of
ShapeNet [2] CAD models. We use dense point cloud as the
shape parameterization in our work, considering learning
shape space of point clouds has been made possible by several works [6, 16, 26]. The shape prior is a learned categoryspecific point cloud generator, written as a function of a
style vector s โ RS which represents the sub-category object style. The output of the shape prior is the set of gener-
ated points defined as X := {xi }N
i=1 = G(s). For the 6DoF
poses of the total L frames, we break the pose parameters
into two sets: the global camera pose of the target frame
p0 โ R6 , and the relative camera pose between each source
Lโ1
frame and the corresponding target frame {โpl โ R6 }l=1
.
The overall pipeline of our method is illustrated in Fig. 2.
We formulate the inference of the style vector and camera pose parameters as optimization steps with geometric
objectives. The parameters are initialized with an off-theshelf initialization pipeline (see 2.4), and the optimization
steps are taken to minimize this objective over the parameter space. In this paper, we propose to take advantage of the
cheap and rough outputs from other methods to regularize
our optimization procedure. For each frame, we get cheap
segmentation masks (silhouettes) from recent state-of-theart instance segmentation method FCIS [23]. Considering
traditional PBA methods gives as results semi-dense inverse
depth and camera motion, we also borrow the readily available although error-prone outputs from PBA pipelines (e.g.
openMVS [8]) to add another inverse depth loss with the
estimated depth. We also take advantage of their camera
motion estimation to initialize the relative camera pose of
each source frame w.r.t. its target frame.
2.3. Optimization Objective
Photometric Consistency The basic objective is formulated as the photometric consistency between the corresponding pixel pairs from the target frame and each source
frame. Classic PBA methods usually track a set of sparse
points through all the frames in a window, while with our
formulation we are able to get dense correspondence automatically derived from reprojection. Considering that visible points may differ in each frame due to camera motion
and occlusion, in this work we formulate the bi-directional
photometric consistency as:
Lph (p0 , {โpl }Lโ1
(4)
l=1 , s) =
" Mp
Lโ1
X X0
Lฮด1 I0 ฯ(xj ; p0 ) โ Il ฯ(xj ; p0 โฆ โpl )
l=1
Mpl
+
X
k=1
j=1
Lฮด1 Il ฯ(xk ; p0 โฆ โpl ) โ I0 ฯ(xk ; p0 )
#
where Lฮด (ยท) is the Huber loss.
Silhouette Error and Inverse Depth Error as Extra Constraints In Zhu et al. [26] the silhouette error is utilized
as an extra constraint in the objective. We adopt the same
objective but with the estimated silhouette with FCIS [23]
that produce instance segmentation. We will show later that
this constraint is still effective although the masks are errorprone. We write the silhouette distance for frame l as the 2D
Chamfer distance between the set of pixel locations Ul1 in-
side the rough silhouette, and the ones projected down from
our camera model Ul2 .
Lโ1
Lcd (p0 , {โpl }l=1
, s) =
Lโ1
1 X X
min ||uk โ uj ||22
uj โUl2
L
uk โUl1
l=0
X
min ||uj โ uk ||22 .
+
uj โUl2
(5)
uk โUl1
Finally, apart from cheap camera motion, we are able to
get semi-dense depth map for each frame from the off-theshelf PBA pipeline. In this case we further formulate the
extra objective term of inverse depth error as:
Lโ1
Linvd (p0 , {โpl }l=1
, s) =
Lโ1
1 X
Lฮด2 (dโฒ l โ ฮฑdl )
L
(6)
l=0
where dl is given by our reprojection module. Note that
ฮฑ here should be updated on the fly. Considering we will
be getting confident camera poses for all frames in a few
optimization steps, ฮฑ can be robustly solved by finding a
scale that best aligns the estimated camera poses with the
ones from the offline estimator. Specifically, we can solve
for an ฮฑl for each source frame l:
๏ฃฑ
๏ฃฒR0 (ฯ0 )x + t0 = ฮฑl Rโฒ 0 x + tโฒ 0
(7)
๏ฃณRl (ฯl )x + tl = ฮฑl Rโฒ l x + tโฒ l .
Lโ1
The solution for ฮฑ is average over all {ฮฑl }l=1
:
ฮฑ=
Lโ1
1 X
arg min ||Rl (ฯl )x + tl
ฮฑ
Lโ1
(8)
l=1
T
โ Rโฒ l RT0 (R0 (ฯ0 )x + t0 ) โ ฮฑ(tโฒ l โ Rโฒ l Rโฒ 0 tโฒ 0 )||22 .
The combined objective is given by:
L = Lph + ฮป1 Lcd + ฮป2 Linvd ,
(9)
where ablative study about the weight factors ฮป1 and ฮป2 is
included the Appendix.
2.4. Initialization
Style and Pose Initialization We improve upon existing
learning-based pipeline to provide initialization for style
and template frame camera pose. For style, unlike [25, 26]
where a single-image based regressor is adopted, we use a
recurrent network architecture to leverage the sequential information in an effort to alleviate ambiguity in style from
a single viewpoint. Details about the architecture of our
regressor and the training process as well as dataset are included in the Appendix. To generate more accurate style
available to give an accurate estimation of the scale factor
ฮฑ. Instead we seek to bring the estimation of ฮฑ in the loop
by aligning the estimated inverse map dโฒ 0 to our reprojected
inverse depth d0 :
arg min ||dโฒ 0 โ ฮฑd0 ||22 .
ฮฑ
(11)
The camera motion is then initialized by solving:
๏ฃฑ
๏ฃฒR0 (ฯ0 )x + t0 = ฮฑ Rโฒ 0 x + tโฒ 0
๏ฃณโRl (โฯl )R0 (ฯ0 )x + โtl + t0 = ฮฑ Rโฒ l x + tโฒ l
(12)
where the solution for โฯl and โtl is:
Figure 3: Local cost surface of p0 and โpl . The yellow dot marks the optimum while the yellow line shows the
search space for p0 if โpl is initialized with offline camera
motion.
vectors, we exploit cheap silhouette from Li et al. [23] to
mask off the background.
To find a coarse pose initialization, we first utilize
BlenderTM to render templates under varying camera poses.
After that we retrieve a coarse pose by finding one template
which has the maximum IoU with the target silhouette.
Camera Motion Initialization One observation of ours is,
the photometric consistency error is problematic in our optimization of the objective. On the one hand Lph is locally
bi-linear with Gauss-Newton solvers, where in traditional
PBA the template term is fixed so that the residual is linear
and the problem is locally convex. The problem is worsened
in the way the variables are initialized as in Zhu et al. [26],
Lโ1
where {โpl }l=1
are initialized to all zeros when we have a
poorly-initialized p0 . To illustrate this we show in Fig. 3 by
plotting the cost surface over local perturbation of p0 and
โpl . We show that the cost surface is highly non-convex
between the initialization and the optimum if both variables
are initialized far from the ground truth (red arrows). However we show with the camera motion parameters initialized
correctly, the search space of p0 is constrained to the yellow line with better curvature for better convergence (green
arrows).
Inspired by this observation, at the beginning of our
pipeline we run an off-the-shelf PBA pipeline (e.g. [8]) to
Lโ1
acquire camera poses {pโฒl }l=0
for every frame, as well as
a semi-dense point cloud X โฒ . By formulation we have the
following relation between our camera model (left) and the
off-the-shelf estimator (right):
Rl (ฯl )x + tl = ฮฑ Rโฒl (ฯlโฒ )xโฒ + tโฒ l .
(10)
Unfortunately no correspondence between x and xโฒ is
(
T
โRl (โฯl ) = Rโฒ l Rโฒ 0
T
T
โtl = Rโฒ l Rโฒ 0 t0 + ฮฑ tโฒ 1 โ Rโฒ l Rโฒ 0 tโฒ 0 .
(13)
We use Equ. 13 for initializing the camera motion parameters before the optimization steps.
2.5. Optimization Pipeline
Given reasonable initialization from the above steps, we
solve our objective with gradient-descent based methods.
Particularly we found off-the-shelf L-BFGS solver gives efficient solution to our problem. We summarize our optimization pipeline in Algorithm 1.
Algorithm 1 Optimization of the objective
1:
2:
3:
4:
5:
6:
7:
8:
9:
Lโ1
procedure L(p0 , {โpl }l=1
, s)
p0 , s โ Initializer(I0 )
Lโ1
Lโ1
ฮฑ, {โpl }l=1
, {dโฒ l }l=0
โ openMVS [8], Equ. 13
while L > ฮดL or step < maximum iterations do
p0 โ L-BFGS update on p0
Lโ1
Lโ1
{โpl }l=1
โ L-BFGS update on {โpl }l=1
s โ L-BFGS update on s
ฮฑ โ Update on ฮฑ by Equ. 8
Lโ1
return {p0 , {โpl }l=1
, s}
3. Evaluation
3.1. Data Preparation
Rendered Data To enable evaluation of our methods
against Zhu et al. [26] which is only feasible on rendered
domain, we follow Zhu et al. by rendering small baseline
sequences from ShapeNet [2] cars. Please refer to Appendix
for the statistics which is inherently identical to Zhu et al.
apart from our perspective camera versus weak-perspective
by Zhu et al.
GT point
frame 16 cloud
frame 1 frame 2
frame 1 pred seg
init
โฆ
โฆ
โฆ
Figure 4: (Left) Examples of our test sequences. We show
on the left three examples of rendered sequence, natural sequence of model car and real car respectively. (Right) Visualization of style & pose initialization. We also show
some quantitative results on style and pose initialization for
some natural sequences. The three columns on the right
correspond to the first frame of a sequence, foreground segmentation of that first frame, and style & pose initialization
viewed in rendered image, respectively.
Natural Data In view of the absence of object-centric and
category-specific natural video dataset, we collect our own
test set with a mixture of sequences from toy model cars
and real cars. We carefully choose the models with ground
truth CAD available in ShapeNet [2]. Each video is shot
with iPhone 6s (30fps) with around 30 โฆ of rotational motion and moderate translation, and the images are scaled
down to 512 ร 512. There are 15 videos collected from
4 toy car models and 12 videos from 6 real cars for evaluation. For each sequence, we annotate the template frame
and last frame with ground truth CAD models and 6DoF
pose. Samples of our test data can be found in Fig. 4.
We also visualize some qualitative results of our initialization on natural sequences in Fig. 4. Although the style
retrieved from regressor is not very precise in color or details, our style regressor is able to yield style prediction that
are close in 3D shape.
3.2. Evaluation on Rendered Sequences
In this section, we give both qualitative and quantitative results of our methods against 1) classic PBA methods
of open-source openMVS [8], and Ham et al. [11] which
is a PBA pipeline specifically optimized for small motion
videos, 2) learning based methods [6, 3] which gives shapes
in canonical poses.
In our experiments, we set the weights in the optimization objective as ฮป1 = 0.1 with ฮด1 = 100 (we use unnormalized RGB values in range [0, 255]), and ฮป1 = 1000
with ฮด2 = 10. Ablative study on different settings of the
hyper-parameters is included in the Appendix.
Since we are evaluating on synthetic sequences from
BlenderTM , we have access to full ground truth for both the
camera pose of every frame (in world coordinate system), as
well as the ground truth dense depth map and dense shape.
However given our formulation is to output full 3D shape
in an object-centric manner, while openMVS and Ham et
al. give semi-dense point cloud of the entire scene by best
effort, we are not able to align three outputs to the ground
truth shape. Instead we choose to follow Ham et al. [11]
to measure the depth error of the recovered points by reprojecting the shape onto the image plane with the estimated cameras. To compare with openMVS [8] and Ham
et al. [11] which give only relative camera motion of every
source frames w.r.t. to the first frame, we offer ground truth
camera pose of the first frame to these two methods and
find a rigid-body transformation to align their camera pose
of the first frame to the ground truth. The scale ambiguity is solved by Equ.8. By doing this, the shape and camera
poses of all methods are ideally aligned to the world coordinate system, and we are able to measure the camera error by
calculating the camera position error as the distance of the
estimated camera center to its ground truth, and the camera
orientation error as the acute angle between the estimated
camera orientation and its ground truth.
We report the average error of depth maps and camera poses in Table 1 and the statistics in Fig. 6. The results show that our method achieves comparable camera
error as openMVS [8], but slightly worse than Ham et
al. [11] which is specifically optimized for small motion
videos for better camera tracking. For the depth map error we achieve SLAM-like performance by outperforming
both openMVS [8] and Ham et al. [11] in addition to much
denser results thanks to the shape prior which produces full
3D shapes.
Moreover, again thanks to the shape prior, we show in
Fig. 7 that we only need a few observations of the object
to give confident results, even at two frames, while classic
methods [8, 11] start at considerable amount of motion to
perform camera tracking.
Finally we experiment on all the rendered sequences by
perturbing upon their ground truth p0 and calculate the average p0 at convergence. We show in Fig. 8 that our method
achieves better convergence in face of large initialization error in pose.
3.3. Evaluation on Natural Sequences
We evaluate our methods against others on the objectcentric dataset we collected. The dataset includes sequences
of a mixture of toy cars and real cars. The sequences
are annotated with aligned CAD models retrieved from the
ShapeNet dataset [2]. Considering it is not possible to get
the 6DoF camera poses for all frames through human annotation, we evaluate on the depth error of the annotated first
frame of each sequence, as well as the density of the reprojected points against the ground truth. The quantitative
frame L-1
frame 0
frame L-1
frame 0
frame L-1
โ
โ
frame 0
frame L-1
โ
โ
[3, 6]
Ham et al. [11]
openMVS [8]
Ours
Input
frame 0
Figure 5: Results of our methods on natural sequences, and comparison with openMVS [8], Ham et al. [11], and
deep learning based methods [3, 6]. For openMVS [8] and Ham et al. [11] we align the cameras to the world coordinate
frame (note that our method automatically produces camera poses in world frame), and we draw the aligned shape, estimated
camera trajectory (blue) with orientation (red), annotated camera (black) of two frames (marked with black dot). We also
project the shape with the estimated camera, and color the reprojected points with their inverse depths (brighter is closer). In
the last row we show for each sample results from 3D-R2N2 [3] (left) and Fan et al. [6] (right).
results are reported in Table 1. We also show qualitative results on 4 natural sequences (2 model cars plus 2 real cars)
in Fig. 5. Each sequence consists of L = 91 frames with
roughly 30 degree of camera rotation and moderate translation. We show that we achieve comparable camera poses
and denser inverse depths against openMVS [8] and Ham
et al. [11]. Additionally ours recovers semantic information
including full 3D shape detached from the map, and again
global cameras. For sequence 3 and 4 Ham et al. [11] gives
degraded solution when it fails at camera tracking or deification due to little motion in frame 3 or significant lighting
change in sequence 4. We attempt to give part of its results
Zhu et al.
Ham et al.
openMVS
Ours
Depth Error
0.0732
0.0682
0.0731
0.0627
Density
0.8543
0.4732
0.5862
0.9342
Rendered Sequences
Cam. Location Error
0.0134
0.0045
0.0098
0.0102
Cam. Orientation Error
2.0254โฆ
0.9832โฆ
1.3220โฆ
1.2343โฆ
Natural Sequences
Depth Error Density
0.0804
0.6558
0.0798
0.6987
0.0756
0.9076
Table 1: Quantitative comparison on both rendered and natural sequences.
10 5
12
8
1
6
0.8
8
4
0.6
%
Pixel count
10
6
4
openMVS
Ham et. al
Zhu et. al
Ours
2
0
0
0.1
0.2
0.4
2
0.2
0
Zhu et. al
Ours
0
0
0.4
0.3
Depth error / Threshold of depth error
Figure 6: Depth error on the rendered test set. On the left
axis shows the histogram of depth error distribution, and
on the right axis gives the percentage of pixels under the
threshold.
1
openMVS
Ham et. al
Zhu et. al
Ours
0.2
0.15
0.1
0.8
Density
Average depth error
0.25
0.6
0
20
40
60
Number of views
80
100
4
6
8
10
Figure 8: Convergence analysis between ours and Zhu et
al. [26]. Ours is more robust against initialization error in
p0 .
evaluate our approach on both rendered and natural settings
against both classic PBA methods and deep learning based
methods, and prove that it is capable to produce dense full
3D shape in world coordinates, as well as depth maps of
PBA-like quality.
0.4
openMVS
Ham et. al
Zhu et. al
Ours
0.2
0.05
2
0
0
20
40
60
80
Number of views
Figure 7: Depth error on the rendered test set. On the left
axis shows the histogram of depth error distribution, and
on the right axis gives the percentage of pixels under the
threshold.
in the figure for readersโ reference.
We also notice that learning based methods [6, 3] which
are mostly trained on rendered images suffer from the domain gap in our test natural sequences.
4. Conclusion
In this paper we propose the method of semantic photometric bundle adjustment for object-centric shape reconstruction from natural sequence, which exerts geometric
constraints over the camera pose as well as the full 3D shape
generated by a learned semantic shape prior. We extensively
References
[1] H. Alismail, B. Browning, and S. Lucey. Photometric bundle
adjustment for vision-based slam. In Asian Conference on
Computer Vision, pages 324โ341. Springer, 2016. 1, 2, 3
[2] A. X. Chang, T. Funkhouser, L. Guibas, P. Hanrahan,
Q. Huang, Z. Li, S. Savarese, M. Savva, S. Song, H. Su,
J. Xiao, L. Yi, and F. Yu. ShapeNet: An Information-Rich
3D Model Repository. Technical Report arXiv:1512.03012
[cs.GR], Stanford University โ Princeton University โ
Toyota Technological Institute at Chicago, 2015. 2, 3, 5,
6
[3] C. B. Choy, D. Xu, J. Gwak, K. Chen, and S. Savarese. 3dr2n2: A unified approach for single and multi-view 3d object
reconstruction. arXiv preprint arXiv:1604.00449, 2016. 1,
2, 6, 7, 8
[4] J. Engel, V. Koltun, and D. Cremers. Direct sparse odometry. IEEE Transactions on Pattern Analysis and Machine
Intelligence, 2017. 1
[5] J. Engel, T. Schoฬps, and D. Cremers. Lsd-slam: Large-scale
direct monocular slam. In European Conference on Computer Vision, pages 834โ849. Springer, 2014. 2
[6] H. Fan, H. Su, and L. Guibas. A point set generation network for 3d object reconstruction from a single image. arXiv
preprint arXiv:1612.00603, 2016. 1, 2, 3, 6, 7, 8
[7] R. Girdhar, D. F. Fouhey, M. Rodriguez, and A. Gupta.
Learning a predictable and generative vector representation
for objects. In European Conference on Computer Vision,
pages 484โ499. Springer, 2016. 1, 2
[8] A. Goldberg, S. Hed, H. Kaplan, R. Tarjan, and R. Werneck. Maximum flows by incremental breadth-first search.
AlgorithmsโESA 2011, pages 457โ468, 2011. 2, 4, 5, 6, 7
[9] J. Gwak, C. B. Choy, M. Chandraker, A. Garg, and
S. Savarese. Weakly supervised 3d reconstruction with adversarial constraint. 1, 2
[10] H. Ha, S. Im, J. Park, H.-G. Jeon, and I. So Kweon. Highquality depth from uncalibrated small motion clip. In Proceedings of the IEEE Conference on Computer Vision and
Pattern Recognition, pages 5413โ5421, 2016. 2
[11] C. Ham, M.-F. Chang, S. Lucey, and S. Singh. Monocular
depth from small motion video accelerated. In 3D Vision
(3DV), 2017 Fifth International Conference on 3D Vision.
IEEE, 2017. 2, 3, 6, 7
[12] M. Ji, J. Gall, H. Zheng, Y. Liu, and L. Fang. Surfacenet:
An end-to-end 3d neural network for multiview stereopsis.
arXiv preprint arXiv:1708.01749, 2017. 2
[13] A. Kar, C. Haฬne, and J. Malik. Learning a multi-view stereo
machine. arXiv preprint arXiv:1708.05375, 2017. 2
[14] C.-H. Lin, C. Kong, and S. Lucey. Learning efficient point
cloud generation for dense 3d object reconstruction. arXiv
preprint arXiv:1706.07036, 2017. 2, 3
[15] R. A. Newcombe, S. J. Lovegrove, and A. J. Davison. Dtam:
Dense tracking and mapping in real-time. In Computer Vision (ICCV), 2011 IEEE International Conference on, pages
2320โ2327. IEEE, 2011. 2
[16] C. R. Qi, L. Yi, H. Su, and L. J. Guibas. Pointnet++: Deep
hierarchical feature learning on point sets in a metric space.
arXiv preprint arXiv:1706.02413, 2017. 3
[17] K. Tateno, F. Tombari, I. Laina, and N. Navab. Cnn-slam:
Real-time dense monocular slam with learned depth prediction. arXiv preprint arXiv:1704.03489, 2017. 1
[18] B. Triggs, P. F. McLauchlan, R. I. Hartley, and A. W. Fitzgibbon. Bundle adjustmenta modern synthesis. In International
workshop on vision algorithms, pages 298โ372. Springer,
1999. 1
[19] S. Tulsiani, T. Zhou, A. A. Efros, and J. Malik. Multi-view
supervision for single-view reconstruction via differentiable
ray consistency. arXiv preprint arXiv:1704.06254, 2017. 2
[20] J. Wu, Y. Wang, T. Xue, X. Sun, W. T. Freeman, and J. B.
Tenenbaum. MarrNet: 3D Shape Reconstruction via 2.5D
Sketches. In Advances In Neural Information Processing
Systems, 2017. 2
[21] J. Wu, C. Zhang, T. Xue, B. Freeman, and J. Tenenbaum.
Learning a probabilistic latent space of object shapes via 3d
generative-adversarial modeling. In Advances in Neural Information Processing Systems, pages 82โ90, 2016. 1, 2
[22] X. Yan, J. Yang, E. Yumer, Y. Guo, and H. Lee. Perspective
transformer nets: Learning single-view 3d object reconstruction without 3d supervision. In Advances in Neural Information Processing Systems, pages 1696โ1704, 2016. 2
[23] J. D. X. J. Yi Li, Haozhi Qi and Y. Wei. Fully convolutional
instance-aware semantic segmentation. 2017. 4, 5
[24] T. Zhou, M. Brown, N. Snavely, and D. G. Lowe. Unsupervised learning of depth and ego-motion from video. arXiv
preprint arXiv:1704.07813, 2017. 1
[25] R. Zhu, H. Kiani Galoogahi, C. Wang, and S. Lucey. Rethinking reprojection: Closing the loop for pose-aware shape
reconstruction from a single image. In The IEEE International Conference on Computer Vision (ICCV), Oct 2017. 1,
2, 4
[26] R. Zhu, C. Wang, C.-H. Lin, Z. Wang, and S. Lucey. Objectcentric photometric bundle adjustment with deep shape prior.
arXiv preprint arXiv:1711.01470, 2017. 2, 3, 4, 5, 8
| 1cs.CV
|
arXiv:1711.04969v2 [stat.ML] 22 Jan 2018
Straggler Mitigation in Distributed Optimization
Through Data Encoding
Can Karakus
UCLA
Los Angeles, CA
[email protected]
Yifan Sun
Technicolor Research
Los Altos, CA
[email protected]
Suhas Diggavi
UCLA
Los Angeles, CA
[email protected]
Wotao Yin
UCLA
Los Angeles, CA
[email protected]
Abstract
Slow running or straggler tasks can significantly reduce computation speed in
distributed computation. Recently, coding-theory-inspired approaches have been
applied to mitigate the effect of straggling, through embedding redundancy in
certain linear computational steps of the optimization algorithm, thus completing
the computation without waiting for the stragglers. In this paper, we propose an
alternate approach where we embed the redundancy directly in the data itself, and
allow the computation to proceed completely oblivious to encoding. We propose
several encoding schemes, and demonstrate that popular batch algorithms, such as
gradient descent and L-BFGS, applied in a coding-oblivious manner, deterministically achieve sample path linear convergence to an approximate solution of the
original problem, using an arbitrarily varying subset of the nodes at each iteration.
Moreover, this approximation can be controlled by the amount of redundancy
and the number of nodes used in each iteration. We provide experimental results
demonstrating the advantage of the approach over uncoded and data replication
strategies.
1
Introduction
Solving large-scale optimization problems has become feasible through distributed implementations.
However, the efficiency can be significantly hampered by slow processing nodes, network delays or
node failures. In this paper we develop an optimization framework based on encoding the dataset,
which mitigates the effect of straggler nodes in the distributed computing system. Our approach
can be readily adapted to the existing distributed computing infrastructure and software frameworks,
since the node computations are oblivious to the data encoding.
In this paper, we focus on problems of the form
min f (w) :=
wโRp
1
min kXw โ yk2 ,
2n wโRp
(1)
where X โ Rnรp , y โ Rnร1 represent the data matrix and vector respectively. The function f (w) is
mapped onto a distributed computing setup depicted in Figure 1, consisting of one central server and
m worker nodes, which collectively store the row-partitioned matrix X and vector y. We focus on
batch, synchronous optimization methods, where the delayed or failed nodes can significantly slow
down the overall computation. Note that asynchronous methods are inherently robust to delays caused
31st Conference on Neural Information Processing Systems (NIPS 2017), Long Beach, CA, USA.
by stragglers, although their convergence rates can be worse than their synchronous counterparts. Our
e = SX and ye = Sy,
approach consists of adding redundancy by encoding the data X and y into X
respectively, where S โ R(ฮฒn)รn is an encoding matrix with redundancy factor ฮฒ โฅ 1, and solving
the effective problem
1
1 e
min fe(w) := minp
kS (Xw โ y) k2 = minp
kXw โ yek2
wโR 2ฮฒn
wโR 2ฮฒn
wโRp
(2)
instead. In doing so, we proceed with the computation in each iteration without waiting for the
stragglers, with the idea that the inserted redundancy will compensate for the lost data. The goal is to
design the matrix S such that, when the nodes obliviously solve the problem (2) without waiting for
the slowest (m โ k) nodes (where k is a design parameter) the achieved solution approximates the
original solution wโ = arg minw f (w) sufficiently closely. Since in large-scale machine learning
and data analysis tasks one is typically not interested in the exact optimum, but rather a โsufficiently"
good solution that achieves a good generalization error, such an approximation could be acceptable
in many scenarios. Note also that the use of such a technique does not preclude the use of other,
non-coding straggler-mitigation strategies (e.g., [23, 21, 1] and references therein), which can still
be implemented on top of the redundancy embedded in the system, to potentially further improve
performance.
Focusing on gradient descent and L-BFGS algorithms, we show that under a spectral condition on
S, one can achieve an approximation of the solution of (1), by solving (2), without waiting for the
stragglers. We show that with sufficient redundancy embedded, and with updates from a sufficiently
large, yet strict subset of the nodes in each iteration, it is possible to deterministically achieve linear
convergence to a neighborhood of the solution, as opposed to convergence in expectation (see Fig.
4). Further, one can adjust the approximation guarantee by increasing the redundancy and number
of node updates waited for in each iteration. Another potential advantage of this strategy is privacy,
since the nodes do not have access to raw data itself, but can still perform the optimization task over
the jumbled data to achieve an approximate solution.
Although in this paper we focus on quadratic objectives and two specific algorithms, in principle
our approach can be generalized to more general, potentially non-smooth objectives and constrained
optimization problems, as we discuss in Section 4 ( adding a regularization term is also a simple
generalization).
Our main contributions are as follows. (i) We demonstrate that gradient descent (with constant
step size) and L-BFGS (with line search) applied in a coding-oblivious manner on the encoded
problem, achieves (universal) sample path linear convergence to an approximate solution of the
original problem, using only a fraction of the nodes at each iteration. (ii) We present three classes of
coding matrices; namely, equiangular tight frames (ETF), fast transforms, and random matrices, and
discuss their properties. (iii) We provide experimental results demonstrating the advantage of the
approach over uncoded (S = I) and data replication strategies, for ridge regression using synthetic
data on an AWS cluster, as well as matrix factorization for the Movielens 1-M recommendation task.
Related work. Use of data replication to aid with the straggler problem has been proposed and
studied in [21, 1], and references therein. Additionally, use of coding in distributed computing
has been explored in [12, 7]. However, these works exclusively focused on using coding at the
computation level, i.e., certain linear computational steps are performed in a coded manner, and
explicit encoding/decoding operations are performed at each step. Specifically, [12] used MDS-coded
distributed matrix multiplication and [7] focused on breaking up large dot products into shorter
dot products, and perform redundant copies of the short dot products to provide resilience against
stragglers. [20] considers a gradient descent method on an architecture where each data sample is
replicated across nodes, and designs a code such that the exact gradient can be recovered as long as
fewer than a certain number of nodes fail. However, in order to recover the exact gradient under any
potential set of stragglers, the required redundancy factor is on the order of the number of straggling
nodes, which could mean a large amount of overhead for a large-scale system. In contrast, we show
that one can converge to an approximate solution with a redundancy factor independent of network
size or problem dimensions (e.g., 2 as in Section 5).
Our technique is also closely related to randomized linear algebra and sketching techniques [13, 6, 16],
used for dimensionality reduction of large convex optimization problems. The main difference
between this literature and the proposed coding technique is that the former focuses on reducing the
2
M
N1
N2
2
kX1 w โ y1 k
M
Nm
2
kX2 w โ y2 k
N1
2
N2
2
kXm w โ ym k
Nm
2
kS1 (Xw โ y)k kS2 (Xw โ y)k
kSm (Xw โ y)k2
Figure 1: Left: Uncoded distributed optimization with partitioning, where X and y are partitioned as
> >
> >
X = X1> X2> . . . Xm
and y = y1> y2> . . . ym
. Right: Encoded distributed optimization,
where node i stores (Si X, Si y), instead of (Xi , yi ). The uncoded case corresponds to S = I.
problem dimensions to lighten the computational load, whereas coding increases the dimensionality
of the problem to provide robustness. As a result of the increased dimensions, coding can provide a
much closer approximation to the original solution compared to sketching techniques.
2
Encoded Optimization Framework
Figure 1 shows a typical data-distributed computational model in large-scale optimization (left), as
well as our proposed
network consists of m machines, where
encoded
model (right). Our computing
> >
> >
e
machine i stores Xi , yei = (Si X, Si y) and S = S1 S2 . . . Sm
. The optimization process
is oblivious to the encoding, i.e., once the data is stored at the nodes, the optimization algorithm
proceeds exactly as if the nodes contained uncoded, raw data (X, y). In each iteration t, the central
server broadcasts the current estimate wt , and each worker machine computes and sends to the server
e > (X
ei wt โ yei ).
the gradient terms corresponding to its own partition gi (wt ) := X
i
Note that this framework of distributed optimization is typically communication-bound, where
communication over a few slow links constitute a significant portion of the overall computation time.
We consider a strategy where at each iteration t, the server only uses the gradient updates from the
first k nodes to respond in that iteration, thereby preventing such slow links and straggler nodes from
stalling the overall computation:
1 X
1 e> e
X (XA wt โ yeA ),
get =
gi (wt ) =
2ฮฒฮทn
ฮฒฮทn A
iโAt
k
where At โ [m], |At | = k are the indices of the first k nodes to respond at iteration t, ฮท := m
e
and XA = [Si X]iโAt . (Similarly, SA = [Si ]iโAt .) Given the gradient approximation, the central
server then computes a descent direction dt through the history of gradients and parameter estimates.
For the remaining nodes i 6โ At , the server can either send an interrupt signal, or simply drop their
updates upon arrival, depending on the implementation.
Next, the central server chooses a step size ฮฑt , which can be chosen as constant, decaying, or through
e t that is needed to compute the step size. We
exact line search 1 by having the workers compute Xd
again assume the central server only hears from the fastest k nodes, denoted by Dt โ [m], where
Dt 6= At in general, to compute
ฮฑt = โฮฝ
d>
et
t g
,
>
>
e X
e D dt
dt X
(3)
D
eD = [Si X]
where X
iโDt , and 0 < ฮฝ < 1 is a back-off factor of choice.
Our goal is to especially focus on the case k < m, and design an encoding matrix S such that, for
any sequence of sets {At }, {Dt }, f (wt ) universally converges to a neighborhood of f (wโ ). Note
that in general, this scheme with k < m is not guaranteed to converge for traditionally batch methods
like L-BFGS. Additionally, although the algorithm only works with the encoded function fe, our goal
is to provide a convergence guarantee in terms of the original function f .
1
Note that exact line search is not more expensive than backtracking line search for a quadratic loss, since it
only requires a single matrix-vector multiplication.
3
3
Algorithms and Convergence Analysis
Let the smallest and largest eigenvalues of X > X be denoted by ยต > 0 and M > 0, respectively.
Let ฮท with ฮฒ1 < ฮท โค 1 be given. In order to prove convergence,we will consider a family of matrices
(ฮฒ)
S
where ฮฒ is the aspect ratio (redundancy factor), such that for any > 0, and any A โ [m]
with |A| = ฮทm,
>
(1 โ )I SA
SA (1 + )I,
(4)
for sufficiently large ฮฒ โฅ 1, where SA = [Si ]iโA is the submatrix associated with subset A (we drop
dependence on ฮฒ for brevity). Note that this is similar to the restricted isometry property (RIP) used
in compressed sensing [4], except that (4) is only required for submatrices of the form SA . Although
this condition is needed to prove worst-case convergence results, in practice the proposed encoding
scheme can work well even when it is not exactly satisfied, as long as the bulk of the eigenvalues of
>
SA
SA lie within a small interval [1 โ , 1 + ]. We will discuss several specific constructions and
their relation to property (4) in Section 4.
Gradient descent. We consider gradient descent with constant step size, i.e.,
wt+1 = wt + ฮฑdt = wt โ ฮฑe
gt .
The following theorem characterizes the convergence of the encoded problem under this algorithm.
Theorem 1. Let ft = f (wt ), where wt is computed using gradient descent with updates from a set
2ฮถ
of (fastest) workers At , with constant step size ฮฑt โก ฮฑ = M (1+)
for some 0 < ฮถ โค 1, for all t. If S
satisfies (4) with > 0, then for all sequences of {At } with cardinality |At | = k,
ฮบ2 (ฮบ โ ฮณ1 )
f (wโ ) , t = 1, 2, . . . ,
1 โ ฮบฮณ1
1+
, and ฮณ1 = 1 โ 4ยตฮถ(1โฮถ)
where ฮบ = 1โ
M (1+) , and f0 = f (w0 ) is the initial objective value.
t
ft โค (ฮบฮณ1 ) f0 +
The proof is provided in Appendix B, which relies on the fact that the solution to the effective
โinstantaneous" problem corresponding to the subset At lies in the set {w : f (w) โค ฮบ2 f (wโ )}, and
therefore each gradient descent step attracts the estimate towards a point in this set, which must
eventually converge to this set. Note that in order to guarantee linear convergence, we need ฮบฮณ1 < 1,
which can be ensured by property (4).
Theorem 1 shows that gradient descent over the encoded problem, based on updates from only k < m
nodes, results in deterministically linear convergence to a neighborhood of the true solution wโ ,
for sufficiently large k, as opposed to convergence in expectation. Note that by property (4), by
controlling the redundancy factor ฮฒ and the number of nodes k waited for in each iteration, one can
control the approximation guarantee. For k = m and S designed properly (see Section 4), then ฮบ = 1
and the optimum value of the original function f (wโ ) is reached.
Limited-memory-BFGS. Although L-BFGS is originally a batch method, requiring updates from
all nodes, its stochastic variants have also been proposed recently [14, 3]. The key modification to
ensure convergence is that the Hessian estimate must be computed via gradient components that are
common in two consecutive iterations, i.e., from the nodes in At โฉ Atโ1 . We adapt this technique to
our scenario. For t > 0, define ut := wt โ wtโ1 , and
X
m
rt :=
(gi (wt ) โ gi (wtโ1 )) .
2ฮฒn |At โฉ Atโ1 |
iโAt โฉAtโ1
Then once the gradient terms {gt }iโAt are collected, the descent direction is computed by dt =
โBt get , where Bt is the inverse Hessian estimate for iteration t, which is computed by
(`+1)
Bt
(`)
= Vj>
Bt Vj` + ฯj` uj` u>
j` ,
`
4
ฯk =
1
rk> uk
,
Vk = I โ ฯk rk u>
k
(0)
r> r
(e
ฯ)
t t
I, and Bt := Bt with ฯ
with j` = t โ ฯ
e + `, Bt = r>
e := min {t, ฯ}, where ฯ is the L-BFGS
t ut
memory length. Once the descent direction dt is computed, the step size is determined through exact
line search, using (3), with back-off factor ฮฝ = 1โ
1+ , where is as in (4).
For our convergence result for L-BFGS, we need another assumption on the matrix S, in addition to
(4). Defining Sฬt = [Si ]iโAt โฉAtโ1 for t > 0, we assume that for some ฮด > 0,
ฮดI Sฬt> Sฬt
(5)
for all t > 0. Note that this requires that one should wait for sufficiently many nodes to finish so
that the overlap set At โฉ Atโ1 has more than a fraction ฮฒ1 of all nodes, and thus the matrix Sฬt can
1
be full rank. This is satisfied if ฮท โฅ 21 + 2ฮฒ
in the worst-case, and under the assumption that node
delays are i.i.d., it is satisfied in expectation if ฮท โฅ โ1ฮฒ . However, this condition is only required for a
worst-case analysis, and the algorithm may perform well in practice even when this condition is not
satisfied. The following lemma shows the stability of the Hessian estimate.
Lemma 1. If (5) is satisfied, then there exist constants c1 , c2 > 0 such that for all t, the inverse
Hessian estimate Bt satisfies c1 I Bt c2 I.
The proof, provided in Appendix A, is based on the well-known trace-determinant method. Using
Lemma 1, we can show the following result.
Theorem 2. Let ft = f (wt ), where wt is computed using L-BFGS as described above, with gradient
updates from machines At , and line search updates from machines Dt . If S satisfies (4) and (5), for
all sequences of {At }, {Dt } with |At | = |Dt | = k,
t
ft โค (ฮบฮณ2 ) f0 +
where ฮบ =
1+
1โ ,
and ฮณ2 = 1 โ
4ยตc1 c2
M (c1 +c2 )2
ฮบ2 (ฮบ โ ฮณ2 )
f (wโ ) ,
1 โ ฮบฮณ2
, and f0 = f (w0 ) is the initial objective value.
The proof is provided in Appendix B. Similar to Theorem 1, the proof is based on the observation
that the solution of the effective problem at time t lies in a bounded set around the true solution wโ .
As in gradient descent, coding enables linear convergence deterministically, unlike the stochastic and
multi-batch variants of L-BFGS [14, 3].
Generalizations. Although we focus on quadratic cost functions and two specific algorithms, our
2
approach can potentially be generalized for objectives of the form kXw โ yk + h(w) for a simple
2
convex function h, e.g., LASSO; or constrained optimization minwโC kXw โ yk (see [11]); as
well as other first-order algorithms used for such problems, e.g., FISTA [2]. In the next section
we demonstrate that the codes we consider have desirable properties that readily extend to such
scenarios.
4
Code Design
We consider three classes of coding matrices: tight frames, fast transforms, and random matrices.
nฮฒ
Tight frames. A unit-norm frame for Rn is a set of vectors F = {ฯi }i=1 with kฯi k = 1, where
ฮฒ โฅ 1, such that there exist constants ฮพ1 โฅ ฮพ2 > 0 such that, for any u โ Rn ,
2
ฮพ1 kuk โค
nฮฒ
X
2
|hu, ฯi i| โค ฮพ2 kuk2 .
i=1
The frame is tight if the above satisfied with ฮพ1 = ฮพ2 . In this case, it can be shown that the constants
are equal to the redundancy factor of the frame, i.e., ฮพ1 = ฮพ2 = ฮฒ. If we form S โ R(ฮฒn)รn by rows
that are a tight frame, then we have S > S = ฮฒI, which ensures kXw โ yk2 = ฮฒ1 kSXw โ Syk2 .
Then for any solution w
eโ to the encoded problem (with k = m),
โfe(w
eโ ) = X > S > S(X w
eโ โ y) = ฮฒ(X w
eโ โ y)> X = ฮฒโf (w
eโ ).
5
>
Figure 3: Sample spectrum of SA
SA for various constructions with low redundancy, and
large k (normalized).
>
Figure 2: Sample spectrum of SA
SA for various constructions with high redundancy, and
relatively small k (normalized).
Therefore, the solution to the encoded problem satisfies the optimality condition for the original
problem as well:
โfe(w
eโ ) = 0, โ โf (w
eโ ) = 0,
and if f is also strongly convex, then w
eโ = wโ is the unique solution. Note that since the computation
is coding-oblivious, this is not true in general for an arbitrary full rank matrix, and this is, in addition
to property (4), a desired property of the encoding matrix. In fact, this equivalency extends beyond
smooth unconstrained optimization, in that
D
E
โfe(w
eโ ), w โ w
eโ โฅ 0, โw โ C โ hโf (w
eโ ), w โ w
eโ i โฅ 0, โw โ C
for any convex constraint set C, as well as
โโfe(w
eโ ) โ โh(w
eโ ),
โ โโf (w
eโ ) โ โh(w
eโ ),
for any non-smooth convex objective term h(x), where โh is the subdifferential of h. This means
that tight frames can be promising encoding matrix candidates for non-smooth and constrained
optimization too. In [11], it was shown that when {At } is static, equiangular tight frames allow for a
close approximation of the solution for constrained problems.
A tight frame is equiangular if |hฯi , ฯj i| is constant across all pairs (i, j) with i 6= j.
nฮฒ
Proposition 1 (Welch bound [22]). Let F = {ฯi }i=1 be a tight frame. Then ฯ(F ) โฅ
Moreover, equality is satisfied if and only if F is an equiangular tight frame.
q
ฮฒโ1
2nฮฒโ1 .
Therefore, an ETF minimizes the correlation between its individual elements, making each submatrix
>
SA
SA as close to orthogonal as possible, which is promising in light of property (4). We specifically
evaluate Paley [15, 10] and Hadamard ETFs [19] (not to be confused with Hadamard matrix, which
is discussed next) in our experiments. We also discuss Steiner ETFs [8] in Appendix D, which enable
efficient implementation.
Fast transforms. Another computationally efficient method for encoding is to use fast transforms:
Fast Fourier Transform (FFT), if S is chosen as a subsampled DFT matrix, and the Fast WalshHadamard Transform (FWHT), if S is chosen as a subsampled real Hadamard matrix. In particular,
one can insert rows of zeroes at random locations into the data pair (X, y), and then take the FFT
or FWHT of each column of the augmented matrix. This is equivalent to a randomized Fourier or
Hadamard ensemble, which is known to satisfy the RIP with high probability [5].
Random matrices. A natural choice of encoding is using i.i.d. random matrices. Although such
random matrices do not have the computational advantages of fast transforms or the optimalitypreservation property of tight frames, their eigenvalue behavior can be characterized analytically. In
particular, using the existing results on the eigenvalue scaling of large i.i.d. Gaussian matrices [9, 18]
and union bound, it can be shown that
r 2 !
1 >
1
P
max ฮปmax
SA SA > 1 +
โ 0,
(6)
ฮฒฮทn
ฮฒฮท
A:|A|=k
r 2 !
1 >
1
P
min ฮปmin
S SA < 1 โ
โ 0,
(7)
ฮฒฮทn A
ฮฒฮท
A:|A|=k
6
Figure 4: Left: Sample evolution of uncoded, replication, and Hadamard (FWHT)-coded cases, for
k = 12, m = 32. Right: Runtimes of the schemes for different values of ฮท, for the same number of
iterations for each scheme. Note that this essentially captures the delay profile of the network, and
does not reflect the relative convergence rates of different methods.
as n โ โ, where ฯi denotes the ith singular value. Hence, for sufficiently large redundancy and
problem dimension, i.i.d. random matrices are good candidates for encoding as well. However, for
finite ฮฒ, even if k = m, in general for this encoding scheme the optimum of the original problem is
not recovered exactly.
Property (4) and redundancy requirements. Using the analytical
(6)โ(7) on i.i.d. Gaus bounds
1
โ
sian matrices, one can see that such matrices satisfy (4) with = O
, independent of problem
ฮฒฮท
dimensions or number of nodes m. Although we do not have tight eigenvalue bounds for subsampled
ETFs, numerical evidence (Figure 2) suggests that they may satisfy (4) with smaller than random
matrices, and thus we believe that the required redundancy in practice is even smaller for ETFs.
Note that our theoretical results focus on the extreme eigenvalues due to a worst-case analysis; in
practice, most of the energy of the gradient will be on the eigen-space associated with the bulk of the
eigenvalues, which the following proposition suggests can be mostly 1 (also see Figure 3), which
means even if (4) is not satisfied, the gradient (and the solution) can be approximated closely for a
modest redundancy, such as ฮฒ = 2. The following result is a consequence of the Cauchy interlacing
theorem, and the definition of tight frames.
Proposition 2. If the rows of S are chosen to form an ETF with redundancy ฮฒ, then for ฮท โฅ 1 โ ฮฒ1 ,
1 >
ฮฒ SA SA has n(1 โ ฮฒฮท) eigenvalues equal to 1.
5
Numerical Results
Ridge regression with synthetic data on AWS EC2 cluster. We generate the elements of matrix
X i.i.d. โผ N (0, 1), the elements of y i.i.d. โผ N (0, p), for dimensions (n, p) = (4096, 6000), and
2
e โ ye + ฮป kwk2 , for regularization parameter ฮป = 0.05. We
solve the problem minw 1 Xw
2ฮฒn
2
evaluate column-subsampled Hadamard matrix with redundancy ฮฒ = 2 (encoded using FWHT
for fast encoding), data replication with ฮฒ = 2, and uncoded schemes. We implement distributed
L-BFGS as described in Section 3 on an Amazon EC2 cluster using the mpi4py Python package,
over m = 32 m1.small worker node instances, and a single c3.8xlarge central server instance.
We assume the central server encodes and sends the data variables to the worker nodes (see Appendix
D for a discussion of how to implement this more efficiently).
Figure 4 shows the result of our experiments, which are aggregated over 20 trials. As baselines,
we consider the uncoded scheme, as well as a replication scheme, where each uncoded partition is
replicated ฮฒ = 2 times across nodes, and the server uses the faster copy in each iteration. It can be
seen from the right figure that one can speed up computation by reducing ฮท from 1 to, for instance,
0.375, resulting in more than 40% reduction in the runtime. Note that in this case, uncoded L-BFGS
fails to converge, whereas the Hadamard-coded case stably converges. We also observe that the data
replication scheme converges on average, but in the worst case, the convergence is much less smooth,
since the performance may deteriorate if both copies of a partition are delayed.
7
Figure 5: Test RMSE for m = 8 (left) and m = 24 (right) nodes,
where the server waits for k = m/8 (top) and k = m/2 (bottom)
responses. โPerfect" refers to the case where k = m.
Figure 6: Total runtime with m =
8 and m = 24 nodes for different
values of k, under fixed 100 iterations for each scheme.
Matrix factorization on Movielens 1-M dataset. We next apply matrix factorization on the
MovieLens-1M dataset [17] for the movie recommendation task. We are given R, a sparse matrix of movie ratings 1โ5, of dimension #users ร #movies, where Rij is specified if user i has
rated movie j. We withhold randomly 20% of these ratings to form an 80/20 train/test split. The
goal is to recover user vectors xi โ Rp and movie vectors yi โ Rp (where p is the embedding
dimension) such that Rij โ xTi yj + ui + vj + ยต, where ui , vj , and ยต are user, movie, and global
biases, respectively. The optimization problem is given by
๏ฃซ
๏ฃถ
X
X
X
min
(Rij โ ui โ vj โ xTi yj โ ยต)2 + ฮป ๏ฃญ
kxi k22 + kuk22 +
kyj k22 + kvk22 ๏ฃธ .
xi ,yj ,ui ,vj
i
i,j: observed
j
(8)
We choose ยต = 3, p = 15, and ฮป = 10, which achieves a test RMSE 0.861, close to the current best
test RMSE on this dataset using matrix factorization2 .
Problem (8) is often solved using alternating minimization, minimizing first over all (xi , ui ), and
then all (yj , vj ), in repetition. Each such step further decomposes by row and column, made smaller
by the sparsity of R. To solve for (xi , ui ), we first extract Ii = {j | rij is observed}, and solve the
>
resulting sequence of regularized least squares problems in the variables wi = [x>
i , ui ] distributedly
>
>
using coded L-BFGS; and repeat for w = [yj , vj ] , for all j. As in the first experiment, distributed
coded L-BFGS is solved by having the master node encoding the data locally, and distributing the
encoded data to the worker nodes (Appendix D discusses how to implement this step more efficiently).
The overhead associated with this initial step is included in the overall runtime in Figure 6.
The Movielens experiment is run on a single 32-core machine with 256 GB RAM. In order to simulate
network latency, an artificial delay of โ โผ exp(10 ms) is imposed each time the worker completes a
task. Small problem instances (n < 500) are solved locally at the central server, using the built-in
function numpy.linalg.solve. Additionally, parallelization is only done for the ridge regression
instances, in order to isolate speedup gains in the L-BFGS distribution. To reduce overhead, we create
a bank of encoding matrices {Sn } for Paley ETF and Hadamard ETF, for n = 100, 200, . . . , 3500,
and then given a problem instance, subsample the columns of the appropriate matrix Sn to match
the dimensions. Overall, we observe that encoding overhead is amortized by the speed-up of the
distributed optimization.
Figure 5 gives the final performance of our distributed L-BFGS for various encoding schemes, for
each of the 5 epochs, which shows that coded schemes are most robust for small k. A full table of
results is given in Appendix C.
2
http://www.mymedialite.net/examples/datasets.html
8
Acknowledgments
This work was supported in part by NSF grants 1314937 and 1423271.
References
[1] G. Ananthanarayanan, A. Ghodsi, S. Shenker, and I. Stoica. Effective straggler mitigation: Attack of the
clones. In NSDI, volume 13, pages 185โ198, 2013.
[2] A. Beck and M. Teboulle. A fast iterative shrinkage-thresholding algorithm for linear inverse problems.
SIAM Journal on Imaging Sciences, 2(1):183โ202, 2009.
[3] A. S. Berahas, J. Nocedal, and M. Takรกc. A multi-batch l-bfgs method for machine learning. In Advances
in Neural Information Processing Systems, pages 1055โ1063, 2016.
[4] E. J. Candes and T. Tao. Decoding by linear programming. IEEE Transactions on Information Theory, 51
(12):4203โ4215, 2005.
[5] E. J. Candes and T. Tao. Near-optimal signal recovery from random projections: Universal encoding
strategies? IEEE Transactions on Information Theory, 52(12):5406โ5425, 2006.
[6] P. Drineas, M. W. Mahoney, S. Muthukrishnan, and T. Sarlรณs. Faster least squares approximation.
Numerische mathematik, 117(2):219โ249, 2011.
[7] S. Dutta, V. Cadambe, and P. Grover. Short-dot: Computing large linear transforms distributedly using
coded short dot products. In Advances In Neural Information Processing Systems, pages 2092โ2100, 2016.
[8] M. Fickus, D. G. Mixon, and J. C. Tremain. Steiner equiangular tight frames. Linear Algebra and Its
Applications, 436(5):1014โ1027, 2012.
[9] S. Geman. A limit theorem for the norm of random matrices. The Annals of Probability, pages 252โ261,
1980.
[10] J. Goethals and J. J. Seidel. Orthogonal matrices with zero diagonal. Canad. J. Math, 1967.
[11] C. Karakus, Y. Sun, and S. Diggavi. Encoded distributed optimization. In 2017 IEEE International
Symposium on Information Theory (ISIT), pages 2890โ2894. IEEE, 2017.
[12] K. Lee, M. Lam, R. Pedarsani, D. Papailiopoulos, and K. Ramchandran. Speeding up distributed machine
learning using codes. In Information Theory (ISIT), 2016 IEEE International Symposium on, pages
1143โ1147. IEEE, 2016.
[13] M. W. Mahoney et al. Randomized algorithms for matrices and data. Foundations and Trends R in
Machine Learning, 3(2):123โ224, 2011.
[14] A. Mokhtari and A. Ribeiro. Global convergence of online limited memory BFGS. Journal of Machine
Learning Research, 16:3151โ3181, 2015.
[15] R. E. Paley. On orthogonal matrices. Studies in Applied Mathematics, 12(1-4):311โ320, 1933.
[16] M. Pilanci and M. J. Wainwright. Randomized sketches of convex programs with sharp guarantees. IEEE
Transactions on Information Theory, 61(9):5096โ5115, 2015.
[17] J. Riedl and J. Konstan. Movielens dataset, 1998.
[18] J. W. Silverstein. The smallest eigenvalue of a large dimensional wishart matrix. The Annals of Probability,
pages 1364โ1368, 1985.
[19] F. Szรถlloฬsi. Complex hadamard matrices and equiangular tight frames. Linear Algebra and its Applications,
438(4):1962โ1967, 2013.
[20] R. Tandon, Q. Lei, A. G. Dimakis, and N. Karampatziakis. Gradient coding. ML Systems Workshop
(MLSyS), NIPS, 2016.
[21] D. Wang, G. Joshi, and G. Wornell. Using straggler replication to reduce latency in large-scale parallel
computing. ACM SIGMETRICS Performance Evaluation Review, 43(3):7โ11, 2015.
[22] L. Welch. Lower bounds on the maximum cross correlation of signals (corresp.). IEEE Transactions on
Information theory, 20(3):397โ399, 1974.
[23] N. J. Yadwadkar, B. Hariharan, J. Gonzalez, and R. H. Katz. Multi-task learning for straggler avoiding
predictive job scheduling. Journal of Machine Learning Research, 17(4):1โ37, 2016.
9
A
Lemmas
In the proofs, we will ignore the normalization constants on the objective functions for brevity. Let ftA :=
eA w โ yeA k2 (we set A โก At ). Let w
eA wt โ yeA k2 , and fA (w) := kX
kX
etโ denote the solution to the effective
โ
eA w โ yeA k2 .
โinstantaneous" problem at iteration t, i.e., w
et = arg min kX
w
Stronger versions of the following lemma has been proved in [11, 16], but we include a weakened version of this
result here for completeness.
Lemma 2. For any t and {At },
f (w
etโ ) โค ฮบ2 f (wโ )
Proof. Define e = w
etโ โ wโ and note that
kX w
etโ โ yk = kXwโ โ y + Xek โค kXwโ โ yk + kXek
by triangle inequality, which implies
โ
โ
2
f (w
et ) = kX w
et โ yk โค 1 +
kXek
kXwโ โ yk
2
kXw โ yk = 1 +
โ
2
kXek
kXwโ โ yk
2
f (wโ ).
(9)
Now, for any c > 0, consider
>
SA (Xwโ โ y)
e> X > SA
kSA Xek2 (a)
โค โ2
ฮปmin
ฮปmin
>
> >
e X SA SA โ cI (Xwโ โ y)
2c > >
= โ2
โ
e X (Xwโ โ y)
ฮปmin
ฮปmin
>
SA โ cI (Xwโ โ y)
e> X > SA
(b)
= โ2
ฮปmin
>
(c)
SA
e> X > cI โ SA
kXwโ โ yk
โค2
ฮปmin
>
(d)
SA
cI โ SA
โค 2
kXwโ โ ykkXek,
ฮปmin
kXek2 โค
eA w
where (a) follows by expanding and re-arranging X
etโ โ yeA
2
eA wโ โ yeA
โค X
2
, which is since w
etโ is
the minimizer of this function; (b) follows by the fact that โf (wโ ) = X > (Xwโ โ y) = 0 by optimality of wโ
for f ; (c) follows by Cauchy-Schwarz inequality; and (d) follows by the definition of matrix norm.
Since this is true for any c > 0, we choose c =
ฮปmax +ฮปmin
,
2
which gives
kXek
ฮปmax โ ฮปmin
โค
= ฮบ โ 1.
kX w
etโ โ yk
ฮปmin
Plugging this back in (9), we get f (w
eโ ) โค ฮบ2 f (wโ ), which completes the proof.
Lemma 3. If
A
fet+1
โ feA (wฬ) โค ฮณ fetA โ feA (wฬ)
for all t > 0, for some wฬ โ Rp , and for some 0 < ฮณ < 1, then
ft โค (ฮบฮณ)t f0 +
ฮบโฮณ
f (wฬ) .
1 โ ฮบฮณ
Proof. Since for any w,
>e
ฮปmin f (w) = ฮปmin kXw โ yk2 โค (Xw โ y)> SA
SA (Xw โ y) = feA (w),
and similarly feA (w) โค ฮปmax f (w), we have
ฮปmin ft+1 โ ฮปmax f (wฬ) โค ฮณ (ฮปmax ft โ ฮปmin f (wฬ)) ,
which can be re-arranged into the linear recursive inequality
ft+1 โค ฮบฮณft + (ฮบ โ ฮณ)f (wฬ) ,
10
where ฮบ =
we get
ฮปmax
.
ฮปmin
By considering such inequalities for 0 โค ฯ โค t, multiplying each by (ฮบฮณ)tโฯ and summing,
ft โค (ฮบฮณ)t f0 + (ฮบ โ ฮณ)f (wฬ)
tโ1
X
(ฮบฮณ)ฯ
ฯ =0
ฮบโฮณ
f (wฬ) .
โค (ฮบฮณ) f0 +
1 โ ฮบฮณ
t
Lemma 4. feA (w) is ฮปmin ยต-strongly convex.
> e
eA
Proof. It is sufficient to show that the minimum eigenvalue of X
XA is bounded away from zero. This can
easily be shown by the fact that
> e
>
eA
u> X
XA u = u> X > SA
SA Xu โฅ ฮปmin kXuk2 โฅ ฮปmin ยตkuk2 ,
for any unit vector u.
Lemma 5. Let M โ Rpรp be a positive definite matrix, with the condition number (ratio of maximum eigenvalue
to the minimum eigenvalue) given by ฮบ. Then, for any unit vector u,
โ
u> M u
2 ฮบ
โฅ
.
kM uk
ฮบ+1
Proof. Let W be the subspace spanned by {u, M u}, and let W โ Rpร2 be a matrix whose columns form an
orthonormal basis for W. Then u and M u can be represented as
u = W r1
M u = W r2
for some r1 , r2 โ R2 , which implies
r2 = W > M W r1 = Q> DQr1 ,
where since W > M W is still a positive definite matrix it has the 2 ร 2 eigen-decomposition Q> DQ. Defining
qi = Qri for i = 1, 2, note that the quantity we are interested in can be equivalently represented as
u> M u
r > r2
q > q2
= 1
= 1 ,
kM uk
kr2 k
kq2 k
where q2 = Dq1 . Further note that for any unit vector v,
v > Dv = v > Q> DQv = v > W > M W v,
and since kW vk = 1, the condition number of D (the ratio of the two non-zero elements of D) cannot be larger
than that of M , which is ฮบ (since otherwise once could find unit vectors u1 = W v1 and u2 = W v2 such that
u>
1 M u1
> ฮบ, which is a contradiction). Representing q1 = [cos ฯ sin ฯ]> for some angle ฯ, kqq22 k can then be
u>
2 M u2
>
>
q1
q2
written as q2 = โ d21 2 cos ฯ โ d22 2 sin ฯ . Note that minimizing the inner product kq
is equivalent
2k
d1 +d2
d1 +d2
to maximizing the function
d2
โ 1 tan ฯ
d1
d2
โ1
tan tan
tan ฯ โ ฯ =
d1
1 + dd21 tan2 ฯ
1
over ฯ. By setting the derivative to zero, we find that the maximizing ฯ is given by cosโ1 dd22 โd
. Therefore
+d1
q
โ
2 dd21
u> M u
q1> q2
d1
d2
2 ฮบ
2
2
=
= p
cos ฯ + p
sin ฯ โฅ
โฅ
,
kM uk
kq2 k
1+ฮบ
1 + dd2
d21 + d22
d21 + d22
1
which is the desired result.
11
Proof of Lemma 1. First note that
>
rt> ut = X > Sฬt> Sฬt [(Xwt โ y) โ (Xwtโ1 โ y)] (wt โ wtโ1 )
= (wt โ wtโ1 )> X > Sฬt> Sฬt X (w โ wtโ1 )
โฅ ยตkut k2 ,
(10)
by (5) Also consider
2
(wt โ wtโ1 )> X > Sฬt> Sฬt X (wt โ wtโ1 )
krt k2
,
=
rt> ut
(wt โ wtโ1 )> X > Sฬt> Sฬt X (wt โ wtโ1 )
which implies
ยต โค
krt k2
โค (1 + )M,
rt> ut
again by (4). Now, setting j` = t โ ฯ
e + `, consider the trace
tr
(`+1)
Bt
= tr
(`)
Bt
(`)
โ tr
(`)
+ tr
โค tr Bt
(`)
Bt uj` u>
j` Bt
!
(`)
u>
j` Bt uj`
!
rj` rj>`
rj>` uj`
+ tr
rj` rj>`
rj>` uj`
!
kr k2
j
(`)
+ >`
= tr Bt
rj` uj`
(`)
+ (1 + )M,
โค tr Bt
which implies tr (Bt ) โค (1 + )M (e
ฯ + d). It can also be shown (similar to [3]) that
(`)
(`+1)
ยท
= det Bt
det Bt
rj>` uj`
(`)
u>
j` Bt uj`
r > uj
kuj` k2
j
(`)
ยท ` `2 ยท
= det Bt
(`)
kuj` k u>
j` Bt uj`
ยต
(`)
โฅ det Bt
,
(1 + )M (e
ฯ + d)
ฯe
(0)
ยต
which implies det (Bt ) โฅ det Bt
. Since Bt โฅ 0, its trace is bounded above, and its
(1+)M (e
ฯ +d)
determinant is bounded away from zero, there must exist 0 < c1 โค c2 such that
c1 I Bt c2 I.
B
Proofs of Theorem 1 and Theorem 2
Throughout the section, we will consider a particular iteration t, and denote
n
o
>
>
ฮปmin := min ฮปmin SA
SA , ฮปmin SD
SD
n
o
>
>
ฮปmax := max ฮปmax SA
SA , ฮปmax SD
SD
,
where ฮปmin (ยท) and ฮปmax (ยท) denote the minimum and maximum eigenvalues of a matrix.
We will also denote with w
etโ the solution to the effective โinstantaneous" problem at iteration t, i.e., w
etโ =
2
eA w โ yeA , where A โก At , and we ignore the normalization constants on the objective functions
arg min X
w
eA w โ yeA k2 , and fetA := kX
eA wt โ yeA k2 .
for. Finally, we define feA (w) := kX
12
B.1
Proof of Theorem 1
Using convexity, and the choices that dt = โe
gt and ฮฑt = ฮฑ, we have
1
> >
feA (wt โ ฮฑt dt ) โ feA (wt ) โค ฮฑt get> dt + ฮฑt2 d>
t X SA SA Xdt
2
(a)
1
ฮปmax 2 > >
>
= โฮฑke
gt k2 + ฮฑ2 get> X > SA
SA Xe
gt โค โฮฑke
gt k2 +
ฮฑ get X Xe
gt
2
2
(b)
2ฮถ (1 โ ฮถ)
ฮปmax M
โค โฮฑ 1 โ
ฮฑ ke
g t k2 = โ
ke
gt k2
2
M ฮปmax
(c)
4ยตฮถ (1 โ ฮถ) eA
โคโ
f (wt ) โ feA (w
etโ ) ,
M ฮปmax
>
where (a) follows by the fact that SA
SA ฮปmax I; (b) follows since X > X M I; and (c) follows by strong
convexity. Re-arranging this inequality, and using the definition of ฮณ1 , we get
A
fet+1
โ feA (w
etโ ) โค ฮณ1 fetA โ feA (w
etโ ) .
Then, Lemma 3 with wฬ = w
et implies
ft โค (ฮบฮณ1 )t f0 +
ฮบ โ ฮณ1
f (w
etโ ) .
1 โ ฮบฮณ1
Finally, Lemma 2 implies f (w
etโ ) โค ฮบ2 f (wโ ), which concludes the proof.
B.2
Proof of Theorem 2
Using convexity and the closed-form expression for the step size, we have
1
> >
feA (wt + ฮฑt dt ) โ feA (wt ) โค ฮฑt get> dt + ฮฑt2 d>
t X SA SA Xdt
2
2
2
> >
ฮฝ 2 get> dt
ฮฝ get> dt
1
d>
t X SA SA Xdt
+
ยท
=โ > > >
>
>
>
>
2 dt X > SD SD Xdt dt X > SD
SD Xdt
dt X SD SD Xdt
!
! > 2
>
2 >
>
> >
>
2 (a)
SD โ ฮฝ2 SA
dt X ฮฝ SA SA โ 2ฮฝSD SD Xdt
z > SD
SA z
dt get
>
=
dt get
= โฮฝ
2
2
2
> > >
>
>
kXd
tk
2 dt X SD SD Xdt
z SD SD z
> 2 (c)
> 2
(b)
dt get
dt get
ฮปmin โ ฮฝ2 ฮปmax
ฮปmin โ ฮฝ2 ฮปmax
ฮฝ
โค
โ
โค โฮฝ
2
2
ฮปmin
kXdt k2
M
ฮปmin
kdt k2
2
>
ฮฝ
get Bt get
ฮปmin โ 2 ฮปmax
(d)
ฮฝ
= โ
M
ฮป2min
kBt get k2
ฮฝ
ฮฝ
(e)
(f)
4ฮฝ ฮปmin โ 2 ฮปmax
c1 c2
c1 c2
8ยตฮฝ ฮปmin โ 2 ฮปmax
2
e
e etโ )
โคโ
ke
g
k
โค
โ
t
2
2 f (wt ) โ f (w
2
2
M
ฮปmin
M
ฮปmin
(c1 + c2 )
(c1 + c2 )
(h)
(g)
4ยตc1 c2
etโ ) .
= โ
fe(wt ) โ fe(w
etโ ) = โ (1 โ ฮณ2 ) feA (wt ) โ feA (w
M (c1 + c2 )2
Xdt
; (b) follows by the fact that the term in parenthesis is an increasing
kXdt k
>
Sฬt Sฬt z and by Assumption 1; (c) follows by the assumption that X > X M I;
where (a) follows by defining z =
>
function of the quadratic form z
e
(d) follows by the definition of dt ; (e)follows by Lemmas
5 and 1; (f) follows by strong convexity of f (by
min
Lemma 4), which implies ke
gt k2 โฅ 2ยต fe(ฮธt ) โ fe(w
etโ ) ; (g) follows by choosing ฮฝ = ฮปฮปmax
; and (h) follows
using the definition of ฮณ2 .
Re-arranging the inequality, we obtain
A
fet+1
โ feA (w
etโ ) โค ฮณ2 fetA โ feA (w
etโ ) ,
and hence applying first Lemma 3 with wฬ = w
et , and then Lemma 2, we get the desired result.
C
Full results of Movielens 1-M experiment
Tables 1 and 2 give the test and train RMSE for the Movielens 1-M recommendation task, with a random 80/20
train/test split.
13
uncoded
replication gaussian paley hadamard
m = 8, k = 1
train RMSE
0.804
0.783
0.781
0.775
0.779
test RMSE
0.898
0.889
0.877
0.873
0.874
runtime
1.60
1.76
2.24
1.82
1.82
m = 8, k = 4
train RMSE
0.770
0.766
0.765
0.763
0.765
test RMSE
0.872
0.872
0.866
0.868
0.870
runtime
2.96
3.13
3.64
3.34
3.18
m = 8, k = 6
train RMSE
0.762
0.760
0.762
0.758
0.760
test RMSE
0.866
0.871
0.864
0.860
0.864
runtime
5.11
4.59
5.70
5.50
5.33
Table 1: Full results for Movielens 1-M, distributed over m = 8 nodes total. Runtime is in hours. An
uncoded scheme running full batch L-BFGS has a train/test RMSE of 0.756 / 0.861, and a runtime of
9.58 hours.
uncoded
replication gaussian paley hadamard
m = 24, k = 3
train RMSE
0.805
0.791
0.783
0.780
0.782
test RMSE
0.902
0.893
0.880
0.879
0.882
runtime
2.60
3.22
3.98
3.49
3.49
m = 24, k = 12
train RMSE
0.770
0.764
0.767
0.764
0.765
test RMSE
0.872
0.870
0.866
0.868
0.868
runtime
4.24
4.38
4.92
4.50
4.61
Table 2: Full results for Movielens 1-M, distributed over m = 24 nodes total. Runtime is in hours.
An uncoded scheme running full batch L-BFGS has a train/test RMSE of 0.757 / 0.862, and a runtime
of 14.11 hours.
D
Efficient encoding using Steiner ETF
We first describe Steiner ETF, based on the construction proposed in [8].
Steiner equiangular tight frames. Let v be a power of 2, let H โ Rvรv be a real Hadamard matrix, and
let hi be the ith column of H, for i = 1, . . . , v. Consider the matrix V โ {0, 1}vรv(vโ1)/2 , where each column
is the incidence vector of a distinct two-element subset of {1, . . . , v}. For instance, for v = 4,
๏ฃฎ
๏ฃน
1 1 1 0 0 0
๏ฃฏ 1 0 0 1 1 0 ๏ฃบ
V =๏ฃฐ
.
0 1 0 1 0 1 ๏ฃป
0 0 1 0 1 1
Note that each of the v rows have exactly v โ 1 non-zero elements. We construct Steiner ETF S as a v 2 ร v(vโ1)
2
โ
matrix by replacing each 1 in a row with a distinct column of H, and normalizing by v โ 1. For instance, for
the above example, we have
๏ฃฎ
๏ฃน
h2 h3 h4 0
0
0
1 ๏ฃฏ h2 0
0 h3 h4 0 ๏ฃบ
S= โ ๏ฃฐ
.
0 h2 0 h3 0 h4 ๏ฃป
3
0
0 h2 0 h3 h4
v
In general, this procedure results in a matrix S with redundancy factor ฮฒ = 2 vโ1
. In full generality, Steiner
ETFs can be constructed for larger redundancy levels; we refer the reader to [8] for a full discussion of these
constructions.
Efficient distributed encoding. Steiner ETF allows for a distributed and efficient implementation for
encoding a given matrix X. Note that the encoding matrix S consists of v blocks, each corresponding to a row
of V . Consider the following partition for S:
>
S = S1> S2> . . . Sv>
,
14
where Si โ Rvรv(vโ1)/2 is a horizontal block. Note that multiplication with a block Si X can be computed by
directly finding the non-zero column indices for the block Si , which is given by B1,i โช B2,i , where
1
B1,i =
j(2v โ 1 โ j) + (i โ 1 โ j), for j = 0, . . . , i โ 2
2
1
B2,i =
(i โ 1)(2v โ 1 โ i) + j, for j = 1, . . . , v โ i
2
Multiplication can then be implemented by simply taking a Hadamard transform of the corresponding rows of
X, whose indices are given by B1,i โช B2,i . In the case of dimension mismatch, one can append zero rows to X,
or remove some rows from S to make the multiplication well-defined.
Therefore, one can partition the blocks {SiS
} across worker nodes, and worker node k can read the corresponding
rows of X from the pool of data, given by iinIk B1,i โช B2,i , where Ik is the blocks assigned to worker k, and
then apply Fast Hadamard Transform for each block. Note that processing of blocks can be further parallelized
within each node, using multiple cores.
In practice, we have observed that the performance of Steiner ETF significantly improves if the rows of SX are
shuffled after encoding. This can be implemented by having the nodes exchange rows of SX after encoding;
however, this incurs a significant communication cost. A more practical approach could be one where each block
is assigned to multiple nodes at random, i.e., each block is encoded by multiple nodes. The worker nodes can
then drop a subset of their encoded rows such that each row is retained by exactly one node, based on some
pre-defined row-allocation rule. Note that this has the same effect as having the nodes randomly exchange
encoded rows with each other.
Space complexity. One might raise the point that many large-scale datasets are sparse, and this sparsity is
lost after encoding, significantly increasing the memory usage. To address this issue, first consider the case where
each node has access to the entire dataset (X, y), for the sake of argument. Then a worker node would compute
the gradient corresponding to block i using the order of operations represented by the following parenthesization:
gi (wt ) = X > Si> (Si (Xw โ y)) ,
since this would only require matrix-vector multiplications. Now, note that for a given block Si , there are only
v โ 1 non-zero rows, out of v(v โ 1)/2. Therefore, in order to compute gi (wt ) in the above order of operations,
one would only need to store the rows of X and y corresponding to these non-zero rows, and then apply the
v
transformation corresponding to Si whenever needed. If each node is assigned m
blocks, this would require
v(vโ1)
storing at most m sparse rows, which means that the memory usage would only increase by a constant
factor (on the order of redundancy factor).
15
| 7cs.IT
|
An Effective AHP based Metaheuristic Approach to Solve
Supplier Selection Problem
Tamal Ghosh1, Tanmoy Chakraborty, Pranab K Dan
Department of Industrial Engineering & Management,
West Bengal University of Technology.
BF 142, Sector 1, Salt Lake City, Kolkata 700064, India.
Email: [email protected], [email protected], [email protected].
Abstract
The supplier selection problem is based on electing the best supplier from a group of prespecified candidates, is identified as a Multi Criteria Decision Making (MCDM), is
proportionately significant in terms of qualitative and quantitative attributes. It is a
fundamental issue to achieve a trade-off between such quantifiable and unquantifiable
attributes with an aim to accomplish the best solution to the abovementioned problem. This
article portrays a metaheuristic based optimization model to solve this NP-Complete problem.
Initially the Analytic Hierarchy Process (AHP) is implemented to generate an initial feasible
solution of the problem. Thereafter a Simulated Annealing (SA) algorithm is exploited to
improve the quality of the obtained solution. The Taguchi robust design method is exploited
to solve the critical issues on the subject of the parameter selection of the SA technique. In
order to verify the proposed methodology the numerical results are demonstrated based on
tangible industry data.
Keywords: supplier rating; vendor section; AHP; simulated annealing; metaheuristic;
Taguchi method.
1. Introduction
Over the decades the supplier selection problem has been dragging the attention of the researchers and
practitioners in the vicinity of Supply Chain Management study. Therefore several techniques have
been proposed by the academicians and professionals to solve this Multi Criteria Decision Making
(MCDM) problem. As Dickson (1966) stated that contemporary firms have the alternatives to select a
suitable technique to decipher the complicated job of selecting suppliers. These techniques varies
from the adoption of uncomplicated methods such as the selection of the vendor offering lowermost
tender to the effective complicated methods which exploit the unquantifiable attributes of the supplier
selection problem. Although many empirical studies are already contributed in the proposed area of
research, yet the researchers and practitioners are involved in improving the solution methodologies
due to the involvement of growing complexities of technology innovation. In manufacturing industry
the procurement cost of raw materials from the outside suppliers and the other unquantifiable
attributes such as quality of the materials delivered and the time of delivery are substantially crucial
and nearly 70% to 80% of the total cost involved in the whole product development phase (Weber,
1
Corresponding Author: Email: [email protected], Phone: +91-33-2334-1014, Fax: +91-33-2334-1031.
1
Current and Benton, 1991). Since the early 1990โs a set of hard to estimate unquantifiable attributes
have turned out to be the key components of the supplier selection problem which further helped in
developing novel and complicated methodologies (Ellram, 1990). Selecting an optimal set of
suppliers on this basis certainly increase the sustainability of the firms in present global competition
(Thompson, 1990). Traditionally the supplier selection problem is based on the purchasing cost,
quality and delivery functionality of the raw materials. Consideration of the above aspects enhances
the complexities of the problem in polynomial time. The selection decision becomes extensively
significant for any person-in-charge of the procurement department due to the several different levels
of success of the rival suppliers under these stated circumstances (Aissaoui, Haouari and Hassini,
2007). The vendor with the lowermost tender might not be the best in delivering the material of
proper quality. In case of the government bodies, the practice of decision-making optimization model
in vendor selection processes would be extremely helpful than the private firms. In the government
framework, there is a legal need to obey the formal rules and procedures that control vendor selection
processes. Therefore such decision models could be immensely supportive in maintaining
transparency and doing fair business (Schooner, 2003). It is evident from the past literature that the
precise and sophisticated methodologies are urgently required to solve the supplier selection problems
(Scott, 1995). For that matter Kanagaraj and Jawahar (2009) have implemented a Simulated
Annealing Algorithm (SAA) tool for supplier selection problems to obtain the optimal or near-optimal
solutions quickly. Saen (2009) introduced a technique based on Data Envelopment Analysis (DEA) to
rank the suppliers in the presence of nondiscretionary factors. An integrated model of Fuzzy-AHP and
decision support system was proposed by Gnanasekaran, Velappan and Manimaran (2010) for
supplier selection to reduce the cost and enhance the product quality with the help of the ReliabilityBased Total Cost of Ownership (RBTCO) model. This integrates purchasing, maintenance and
stoppage costs along with the realistic constraints based on product reliability and weight restraint.
Nonlinear Integer Programming (NLIP) is used to develop the mathematical formulation of the
RBTCO model.
In present article a multiobjective supplier selection problem has been introduced which has
incorporated faulty materials and delay in delivery cost as decisive factors. Thereafter a Simulated
Annealing (SA) based optimization model is implemented to solve this problem. The initial solution
to the SA procedure is generated using Analytic Hierarchy Process (AHP). In order to select the
optimal set of parameters to the SA, Taguchiโs Design of Experiments (DOE) technique is exploited.
The rest of the article is structured in following manner, section 2 presents a brief literature survey of
the proposed area of study, section 3 demonstrates the formulation of the proposed multiobjective
problem model, section 4 elaborates the proposed solution methodology and numerical results are
depicted in section 5 followed by the managerial implications and conclusion of this research.
2. Literature Survey
Li, Fun and Hung (1997) reported that the supplier selection methodologies are practiced to facilitate
the selection process which further have a substantial impact on the selection outcomes. Numerous
supplier selection methods have been established and categorized over the decades. Petroni and
Braglia (2000) proposed linear weighting method using supplier rating based on different attributes
which is a faster and inexpensive method to instigate. Although various drawbacks and limitations are
also indicated in their study. Cost proportion (Timmerman, 1986) and aggregate cost of proprietorship
(Ellram, 1990) based on aggregate cost approaches assemble all the cost components of the supplier
selection process in fiscal units which are very flexible methods. These are exact methods and due to
the complexities and time involvement these methods are moderately expensive to implement.
Mathematical programming approaches primarily exploit the quantifiable factors; these approaches
2
comprise the Principal Component Analysis (PCA) (Petroni and Braglia, 2000) and the Artificial
Neural Network (ANN) (Choy, Lee and Low, 2002). Bello (2003) stated in his research that the PCA
approach is advantageous in terms of its competency in managing various differing aspects. The ANN
approaches are also useful in cost minimization and time reduction.
Multiple Attribute Utility Theory method is practiced for global vendor selection problems, in which
the surroundings are more complex and uncertain (Zhao and Bross, 2004). Chen, Lin and Huang
(2006) demonstrated that the Fuzzy set theory technique controls such situations for supplier
performance evaluation. The approach is helpful to the managers to purchase from the suppliers
according to their own choice. a fuzzy weighted additive and mixed integer linear programming is
developed. The model aggregates weighted membership functions of objectives to construct the
relevant decision functions, in which objectives have different relative importance. Ng (2008)
proposed a weighted linear program for the supplier selection problem. This paper demonstrates a
transformation technique with the mathematical model which can solve the problem without an
optimizer. Amid, Ghodsypour and OโBrien (2009) demonstrated fuzzy multiobjective and additive
model to consider the imprecision of information along with the order quantities to each supplier
using price breaks. The objective functions used are, minimizing the net cost, rejected items and late
deliveries, while satisfying other constraints such as capacity and demand requirement. Authors
further stated weighted maxโmin model in the similar problem environment (Amid, Ghodsypour and
OโBrien, 2010) with the help of Analytic Hierarchy Process (AHP). The proposed model could be
utilized to find out the appropriate order to each supplier. Saen and Zohrehbandian (2008) proposed
DEA approach with quantity discount policy to select the best supplier. Wu (2009) stated a hybrid
model using data envelopment analysis (DEA), decision trees (DT) and neural networks (NNs) to
evaluate supplier performance. The model comprised of two parts. The first part utilized DEA and
categorizes the suppliers into several clusters thereafter the second part used the performance-related
data of the company to train decision trees and intelligent neuro model, the precised results are
obtained. However Saen (2008) stated an approach based on super-efficiency analysis based on DEA
to rank the suppliers in presence of volume discounts. Author further proposed another DEA based
method to rank the suppliers in the presence of weight limitations and dual-role factors (Saen, 2010).
The Analytical Hierarchical Process (AHP) is the most exploited method in supplier selection
problems, which is a Multi Criteria Decision Making technique. It is implemented to rank the
alternatives when several criteria are believed to be considered and it permits the managers to
formulate complicated problems in the form of a hierarchical relationship (Saaty, 1980). The AHP is
comparatively straightforward method to practice. This technique integrates tangible and intangible
attribute of the problems. A detail survey (Tahriri et al., 2008) of the supplier selection methods
portrays that the AHP is the most frequently employed method in supplier selection. The AHP
hierarchy typically contains three distinct levels, which are objectives, factors, and alternatives. AHP
suggests an way to rank the alternative choices based on the managerโs decisions relating the
significance of the criteria. Due to this fact AHP is preferably appropriate for the abovementioned
problem. The problem hierarchy provides itself to an analysis based on the impact of a given level on
the next higher level (Saaty, 1980). Managerial judgments are stated in terms of the pair-wise
comparisons of entries on a specified level of the hierarchy based on their influences on the next
higher level. Each of the pair-wise comparisons signifies an approximation of the proportion of the
weights of the two criteria being compared. Since AHP exploits a proportionate scale for personal
decisions, the relative weights reflect the relative importance of the norms in attaining the objective of
the hierarchy (Tam and Tummala, 2001). Yahya and Kingsman (1990) used Saatyโs AHP method to
determine primacy in selecting suppliers. The authors employed vendor rating in determining how to
allot business and where inadequate progress work is utilized. Akarte (2001); Handfield, Walton and
3
Sroufe (2002); Yu and Jing (2004); Liu and Hai (2005); Rajkumar, Kannan and Jayabalan (2009) also
utilized AHP technique in their study as an integral part.
Most of the supplier selection literature generally used traditional methods. Traditional techniques are
not efficient when the solution state space is large and various constraints cause the vendor selection
problem more complicated. Very few articles utilized state-of-the-art methods such as metaheuristics.
Recently Arunkumar, Karunamoorthy and Makeshwaraa, (2007); Rezaei and Davoodi (2008); Kubat,
and Yuce, (2006); Ding, Benyoucef and Xie (2003) have proposed Genetic Algorithm based
metaheuristic approach to solve supplier selection problems in multiobjective environment.
This present research introduces an efficient metaheuristic approach based on Simulated Annealing to
solve the supplier selection problem.
3. Problem Formulation
Supplier selection processes are primarily reliant on the specific objectives being solved with the
problem and the relevant constraints related to the objectives. In this article a case of a Leading
construction firm of India has been considered to derive the multiobjective optimization model. This
firm constructs commercial buildings as well as residential units in large scale such as IT/ITeS SEZ,
Shopping malls, hospitality and retail units, logistics and industrial squares etc. Due to the heavy
construction approach, this company requires various raw materials such as steel beams, cement, light
weight bricks, cast iron etc.
The proposed model is articulated considering the constrictions which are managed rationally by this
firm to select suppliers. Each raw material supplied by the supplier would have different constraints
and characteristics such as percentage of faulty materials supplied, percentage delay in delivery and
unit purchasing cost of the materials. Each supplier certainly has its own capacity to supply. The firm
has specific requirements of material in certain period. If raw material j is being supplied by supplier
k, then the initial procurement cost is defined as,
๐
๐
๐๐ = โ โ ๐๐๐ ๐๐๐
(1)
๐=1 ๐=1
where
ฯjk is the unit cost of jth material supplied by kth supplier.
qjk is the amount of material type j procured by ith supplier.
The total substandard delivery is defined as,
๐
๐
๐๐ = โ โ ๐ฟ๐๐ ๐๐๐
(2)
๐=1 ๐=1
where
ฮดjk is the percentage of faulty items of jth material supplied by kth supplier.
qjk is the amount of material type j procured by ith supplier.
The total delay in delivery is defined as,
4
๐
๐
๐ท๐ = โ โ ๐๐๐ ๐๐๐
(3)
๐=1 ๐=1
where
ฮธjk is the delay percentage in delivery of jth material supplied by kth supplier.
qjk is the amount of material type j, procured by ith supplier.
In this supplier selection problem three objectives are simultaneously considered, (i) to minimize the
total procurement cost, (ii) to minimize the total number of faulty items supplied and (iii) to minimize
the total number of delay days in delivery in procuring various raw materials from various suppliers.
The quality function (2) demonstrates the number of faulty items supplied by the suppliers. The faulty
items are generally detected by the receiving firm while relocating the raw materials to the inventory.
The firmโs strategy is to return back the substandard items to the suppliers and request them to replace
those items within stipulated time which is substantially one week. Therefore in a project under fixed
schedule, supply of substandard material could incur the total cost in terms of one week delay time.
Thus the quality function of equation (2) and total delay in delivery of equation (3) could be
transformed into a non-compliance cost component using,
๐๐ = (7 + ๐ท๐ ) ร ๐ถ๐
(4)
Hence the proposed multiobjective model aims in minimizing the total cost function f(x),
๐๐๐๐๐๐๐ง๐ ๐(๐ฅ) = ๐๐ + ๐๐
(5)
subject to
๐๐๐ โค ๐๐๐
(6)
โ ๐๐๐ โฅ ๐๐
(7)
๐
๐=1
where
Xjk is the capacity of supplier k while supplying material j
Yjk is the demand of material j to the firm in certain period
Constraint (6) confirms that each supplier supplies according to its capacity. Constraint (7) confirms
that total raw material procured should harmonize the firmโs demand. This proposed multiobjective
model is validated using simulated annealing (SA) approach by considering these abovementioned
objectives and constraints which further gives the optimal selection results of suppliers. In order to
define the SA approach, a quick solution generation method is believed to be identified and the
generated feasible solution is assumed to be used as the initial solution to the SA algorithm. Therefore
in this research Analytic Hierarchy Process (AHP) is utilized to serve the purpose. The next section
would demonstrate the details of the solution methodologies involved in this approach.
5
4. Research Methodology
To facilitate the present research work authors have visited an eminent construction firm operating in
Kolkata, India. Currently the firm is involved in a big project based on development of an IT/ITeS
Special Economic Zone (SEZ) in sector V, Rajarhat, Newtown in Salt Lake City Kolkata. Authors
have prepared the questionnaires based on the information gathered from the professionals of the
abovementioned firm. On the basis of the experts opinion the AHP analysis has been carried out in
this study.
The proposed optimization methodology is developed using Simulated Annealing (SA) algorithm to
achieve the optimal solutions. The SA algorithm simulates the natural annealing process, where
particles of a solid organize themselves into a thermal equilibrium. An introduction to SA can be
obtained from the book by Aarts and Korst (1990). The general applications concerns combinatorial
optimization problems of the following form where S is a predetermined set of feasible solutions.
minxโS g(x)
(8)
The algorithm exploits a pre-defined neighbourhood structure on โSโ. A control parameter called
temperature in resemblance to the natural annealing process governs the search behaviour. In each
iteration, a neighbour solution y to the current solution x is figured out. If y has an improved objective
function value than x, the solution y is accepted, that is, the current solution x is swapped by y.
Alternatively if y does not attain a better objective function value than x, the solution y is only
recognized with a specific probability depending on (i) the difference of the objective function values
in x and y, and (ii) the temperature parameter. The pseudocode below exhibits the general SA method.
Pseudocode (SA)
initialize;
repeat
generate a candidate solution;
evaluate the candidate;
determine the current solution;
reduce the temperature;
until termination condition is met;
In this article, factors which affect the decision makersโ strength are analysed. The process follows
these steps,
๏ Using the AHP method, the weight of the factors are obtained from qualitative expressions
and each supplierโs weight is also achieved and final composite criteria weights are
determined by AHP. This further rank the suppliers according to their composite scores.
Therefore according to the ranks the suppliers could be selected.
๏ Simulated Annealing (SA) takes the ranks obtained from previous step and attempts to search
for optimal set of suppliers based on the objectives defined in section 3.
4.1. Initial Solution Generation
In this article AHP is exploited to select initial set of suppliers. This solution is an initial feasible
solution to the SA method based optimization model.
6
4.2. Analytical Hierarchy Process (AHP)
The AHP is a multi-criteria decision technique that exploits hierarchical relationships to represent a
problem. Primacies for substitutes are acquired based on the opinion of the experts (Saaty, 1980). The
method consists of several important steps: outlining the shapeless problem into shape, obtaining the
AHP hierarchical relationships, forming pairwise comparison matrices, approximating the relative
weights, examining the consistency and finally attaining the overall ranking (Lee, Chen and Chang,
2008). AHP can empower managers to represent the interface of several factors in complicated and
shapeless circumstances. The technique is based on the pairwise comparison of decision variables
with respect to the factors or substitutes. A pairwise comparison matrix is obtained of size nรn, where
n is the number of criteria to be compared. The AHP method is adopted in this article is stated as,
Step 1: The hierarchical relationship of the problem is obtained and presented in Figure 1. The
proposed AHP method decomposes the problem into three levels (Saaty, 1980): (i)The first level
demonstrates the main objective: the selection of suppliers, the second level depicts the criteria and
the last level reports the six suppliers to be compared.
Figure 1. Hierarchical relationship of the supplier selection problem
Step 2: Calculation of the pairwise comparison matrix for each level is required. For the pairwise
comparison, a ranking scale is used for the criteria evaluation (Saaty, 1980). The scale is a crisp scale
ranging from 1 to 9, as presented in Table 1. This scale values are assigned to the criteria based on the
experts opinion of the AHP questionnaire sheet prepared by the authors. The pairwise comparison
matrix for all the criteria is presented in Table 2. The last column of table 2 depicts the overall
importance of the criteria over each other.
The AHP procedure is presented as,
Consider [Ax = ฮปmaxx] where
A is the comparison matrix of size nรn, for n criteria.
x is the Eigenvector of size nร1
ฮปmax is the Eigenvalue, ฮปmax ๏๏ > n.
To find the ranking of priorities, namely the Eigen Vector X:
1.
1.1.
1.2.
1.3.
Initialization:
Take the squared power of matrix A, i.e., A2=AรA
Find the row sums of A2 and normalize this array to find E0.
Set A:=A2
7
2.
2.1.
2.2.
2.3.
2.4.
2.5.
2.6.
Main:
Take the squared power of matrix A, i.e., A2=AรA
Find the row sums of A2 and normalize this array to find E1.
Find D= E1 - E0.
If the elements of D are close to zero, then X= E1
else set A:=A2 , set E0:=E1 and go to Step 2.1.
STOP.
Table 1. Saatyโs 9 point scale
Importance Value
1
3
5
7
9
2, 4, 6, 8
Definition
Equal Strong
Moderate Strong
Fairly Strong
Very Strong
Absolute Strong
Intermediate Values
Description
Two factors are equally Contributing to objective
One factor is marginally superior over other
One factor is strongly superior over other
One factor is very stongly superior over other
The highest level of superiority of one factor over other
According to the negotiation required
Table 2. Comparison matrix of main attributes
Cost
Quality
Delivery
Cost
1
5
9
Quality
1/5
1
3
Delivery
1/9
1/3
1
Relative Weight (PV)
0.062941
0.265433
0.671625
Table 3 to Table 5 present the pairwise comparison matrices of the suppliers with each of the criteria
selected in this research. The last columns of pairwise matrices present the calculated relative weights
of the suppliers over each other.
Table 3. Pairwise comparison matrix of suppliers with respect to cost
S1
S2
S3
S4
S5
S1
1
1/3
1/2
1/7
1/6
S2
3
1
2
1/5
1/4
S3
2
1/2
1
1/3
1/3
S4
7
5
4
1
2
S5
6
4
3
1/2
1
S6
5
3
2
1/4
1/3
Relative Weight
0.40201
0.18549
0.21024
0.03831
0.05611
S6
1/5
1/3
1/2
4
3
1
0.10786
Table 4. Pairwise comparison matrix of suppliers with respect to quality
S1
S2
S3
S4
S5
S6
S1
1
1/3
1/5
3
1/7
1/8
S2
3
1
1/4
4
1/5
1/7
S3
5
4
1
5
1/3
1/4
S4
1/3
1/4
1/5
1
1/8
1/9
S5
7
5
3
8
1
1/3
S6
8
7
4
9
3
1
Relative Weight
0.26949
0.15914
0.07354
0.43202
0.04087
0.02493
8
Table 5. Pairwise comparison matrix of suppliers with respect to delivery
S1
S2
S3
S4
S5
S6
S1
1
1/5
1/2
3
1/6
1/7
S2
5
1
1/2
4
1/3
1/4
S3
2
2
1
5
1/3
1/5
S4
1/3
1/4
1/5
1
1/7
1/9
S5
6
3
3
7
1
1/4
S6
7
4
5
9
4
1
Relative Weight
O.26324
0.11631
0.10426
0.43627
0.05268
0.02723
The overall rating of each supplier is computed by adding the product of the relative weight of each
criterion and the relative weights of the suppliers considering the corresponding criteria (Table 6).
Table 6 demonstrates that supplier 4 (overall ranking is 1 and composite score is 0.4099) is the best
supplier followed by supplier 1, 2, 3, 5 and 6.
4.3 Computation of consistency index and consistency ratio
AHP procedure requires the computation of consistency ratio to ensure the precision of the obtained
solution. The consistency index (CI) of pairwise comparison matrix is calculated using,
๐ถ๐ผ =
๐๐๐๐ฅ โ ๐
๐โ1
(9)
and the random consistency index (RI) is computed as,
๐
๐ผ = 1.98
๐โ2
๐
(10)
where ฮปmax is the maximum eigenvalue and n is the size of pairwise comparison matrix. Thus the
consistency ratio (CR) is obtained using,
๐ถ๐ผ
๐ถ๐
=
(11)
๐
๐ผ
CI and CR are computed to understand the consistency of the solution obtained. In general CI and CR
are believed to be < 0.1. Table 7 provides the computed values of the CI and CR for all the pairwise
comparison matrices. All the computed values are < 0.1. Therefore the computed results are
acceptable.
Table 6. Composite score matrix from above four matrices
S1
S2
S3
S4
S5
S6
Cost (PV=0.0629)
0.402014
0.18549
0.210246
0.0383076
0.0561086
0.107865
Quality (PV=0.2654)
0.26949
0.159145
0.0735405
0.432023
0.0408689
0.0249321
Delivery (PV=0.6716)
0.263243
0.11631
0.104265
0.436267
0.0526848
0.0272297
Composite Score (Rank)
0.2733 (2)
0.1319 (3)
0.1026 (4)
0.4099 (1)
0.0496 (5)
0.0315 (6)
Table 7. CI, RI, CR values for all the pairwise comparison matrices
CI
RI
CR
Cost
0.055157
1.32
0.0417
Quality
0.0944284
1.32
0.07153
Delivery
0.095729
1.32
0.07252
Between criteria
0.0145319
0.66
0.022
9
4.4. Fitness function of SA procedure
SA procedure examines the fitness score of each solution generated in the solution neighbourhood.
Fitness calculation is one of the most significant steps of the metaheuristic method because it decides
which solution is to be stored and which one is to be eliminated. The multiobjective function f(x) is
required to compute the fitness score. In order to facilitate the computation, the f(x) is transformed
into F(x) and expressed in equation (12). Two weights weight1 and weight2 are also assigned in the
equation.
It is considered that weight1+weight2=1.
๐น(๐ฅ) =
๐ก๐๐ก๐๐ ๐๐๐ ๐ก
๐ก๐๐ก๐๐ ๐๐๐ ๐ก + ๐๐ข๐๐๐๐ก๐ฆ ๐๐๐ ๐ก
ร ๐ค๐๐๐โ๐ก1 +
๐ก๐๐ก๐๐ ๐๐๐ ๐ก
๐ก๐๐ก๐๐ ๐๐๐ ๐ก + ๐๐๐๐๐ฆ ๐๐๐ ๐ก
ร ๐ค๐๐๐โ๐ก2
(12)
where total cost is computed by summing up total procurement cost and non-compliance cost. Since
the firm gives more importance to the delivery issues rather than the quality or cost issues, thus
Weight1 and weight2, are assigned with prefixed values of 0.3 and 0.7 respectively.
The Proposed Simulated Annealing Algorithm
This subsection describes the proposed SA algorithm in depth. The initial input is a solution string
which is generated from AHP technique. Therefore the initial input string S0 which is obtained from
Table 6 using the ranks of the suppliers,
S0 = [2, 3, 4, 1, 5, 6]
The size of the solution string is 6 which is the total number of suppliers to be evaluated. Each bit of
the string represents the rank of the corresponding supplier (string index). Therefore S0 states supplier
1 to 6 retain the ranks 2, 3, 4, 1, 5 and 6 respectively.
Thereafter this multiobjective SA procedure is set to maximize F(x) of equation (12). Some
symbolizations used in the algorithm are introduced as,
Scur ๏ข current solution
Si๏ข neighbourhood solution
Sbest๏ข best solution found so far
Tinit ๏ข initial temperature
Tfinal ๏ข freezing temperature
T ๏ข current temperature
ฮฑ ๏ข temperature reducing factor
M ๏ข Markov chain length
iter ๏ข iteration number
fi ๏ข current fitness value
fbest ๏ข best fitness value
The steps of the proposed algorithm can be summarized as follows.
Step 1. Obtain an initial solution S0 by using Analytic Hierarchy Process method
Step 2. Evaluate S0 and Calculate corresponding fitness value F0; F0 = F(S0)
Step 3. Set Fbest= F0, Set Sbest = S0= Scur.
Step 4. Initialize SA Heuristic and its parameters: Tinit, Tfinal, ฮฑ, M, iter = 0, count=0, count1=0.
Step 5. If count < M, then repeat Steps 5.1 to 5.9.
Step 5.1. Generate a new supplier rank configuration neighbourhood searching by performing
exchange-move (randomly selecting two suppliers and interchanging their ranks).
Step 5.2. Read suppliers rank configuration from above steps and generate corresponding
neighbourhood solution Si.
Step 5.3. If F(Si) > Fbest, then Sbest = Si, Scur = Si, count = count + 1, go to Step 5.
10
Step 5.4. If F(Si) = Fbest, then S = Si, count1= count1 + 1, count = count + 1, go to Step 5.
Step 5.5. Compute ฮด = F(Si)- F(Scur). Obtain a random variable r in the range of U(0,1).
Step 5.6. If eฮด/T > r,
Step 5.7. set Scur = Si,
Step 5.8. count1= 0;
Step 5.9. else count1 = count1 + 1.
Step 5.10. iter = iter + 1.
Step 5.11. until freezing temperature (Tfinal) is reached;
Step 5.12. reduce the temperature using Ti = ฮฑรTi-1 function;
The SA procedure is repetitively employed until a solution is achieved which attains the highest
fitness score. All the parameters and counters are initialized in step 4. A special move, namely
exchange-move, is utilized in the proposed algorithm to guide the solution searching procedure. It is
spotted that exchange-move ordinarily leads to the improved solutions effortlessly and competently
which is practiced as a principle component for finding better neighbourhood solution in step 5.1. The
algorithm also verifies the number of instances when neighbourhood solutions become static. If this
number attains a pre-fixed constant value, the fitness value of current configuration is compared to the
optimal solution obtained thus far to conclude whether to prolong the iterations or stop with the best
solution achieved.
5. Experiments and Verifications
In order to apply the proposed SA algorithm as a solution methodology the effects of changing the
values of the various parameters are studied. Determining the optimal set of parameters are crucial in
this respect. Therefore in this article Taguchiโs robust design method (Taguchi, 1994) is employed to
determine the optimal parameters set.
5.1 Taguchi Method for Parameters Selection
The parameters are Initial temperature (Tinit), temperature reducing factor (ฮฑ) and Markov chain
length (M) (final temperature (Tfinal) is taken as constant value = -โ) and termed as factors, and each
factor has three discrete levels (Table 8). Hence an L9 orthogonal array is used, and this recommends
that 9 sets of Taguchi experiments are prerequisite and the results are evaluated by using an analysis
of variance (ANOVA) technique. The parameter settings for each experiment are shown in Table 9.
Table 8. Levels of parameters tested
levels
Parameters
M
ฮฑ
Tinit
20
0.75 10
1
30
0.85 20
2
40
0.95 30
3
Table 10 presents the results of the corresponding ANOVA analysis with Signal-to-Noise ratio
(Larger-the-better). In Table 10, the variance ratios (F ratios) of the factors are determined. A test of
significance at 95% confidence level is employed to spot the significance of these factors. The P
values of the factors Tinit , ฮฑ, M are investigated and all the values of the parameters are seen to be less
than the critical level with degrees of freedom at (2, 8). This suggests that all the parameters are
significant factors in the proposed approach. The response table (Table 11) depicts the average of
each response characteristic for each level of each of the factors. Table 11 include the ranks based on
Delta (ฮด) statistic, which compares the relative magnitude of effects. Ranks are assigned based on ฮด
values. Using the level averages in the response table optimal set of levels of the factors could be
determined which yields the best result.
11
Table 9. The Experimental Settings of the Taguchi Experiments
Experiments
1
2
3
4
5
6
7
8
9
Tinit
10
10
10
20
20
20
30
30
30
ฮฑ
0.75
0.85
0.95
0.75
0.85
0.95
0.75
0.85
0.95
M
20
30
40
30
40
20
40
20
30
responses
0.962364
0.923400
0.945652
0.956225
0.945652
0.932652
0.947348
0.962652
0.959657
Table 10. ANOVA table
Factors
Tinit
ฮฑ
M
Residual Error
Total
Degrees
of
Freedom
2
2
2
2
8
Factor
Sum of
squares
0.000301
0.000222
0.000078
0.000875
0.001475
Mean
Square
(Variance)
F Ratio
0.000150
0.34
0.000111
0.25
0.000039
0.09
0.000438
P Value
0.744
0.798
0.918
The ranks indicate that Initial temperature (Tinit) has the greatest influence followed by temperature
reducing factor (ฮฑ) and Markov chain length (M). Each factor level should be fixed in such a way that
the highest response could be achieved. Table 11 and the main effects plot of Figure 2 show that the
optimal solution is obtained when Tinit, ฮฑ and M are set to 30, 0.75 and 20 respectively.
Table 11. Response table
Levels
1
2
3
ฮด
Rank
Tinit
0.9438
0.9448
0.9566
0.0127
1
ฮฑ
0.9553
0.9439
0.9460
0.0114
2
M
0.9526
0.9464
0.9462
0.0063
3
5.2 Convergence Analysis
Convergence analysis of the SA procedure is quite simple for the supplier selection problem. The
convergence curve during iterations of the proposed metaheuristic technique is presented in Figure 3.
For the first iteration the fitness score attained a value of 0.9622. Since the SA procedure is designed
to maximize the fitness function with the iteration counts therefore at 4th iteration it attained the value
of 0.9633, an increase of 0.1% which is the final optimal solution. Based on the experimentation
reported in this article, it is observed that the fitness score is increased with the iteration counts till it
reaches the best fitness score at some iteration and thereafter the fitness score continues to remain
constant even if the number of iterations is increased. Therefore the convergence property is
established. For the test problem in hand the proposed approach is executed for 63 iterations and took
1.9281 CPU seconds to attain the best solution which proves its computational efficiency.
12
Figure 2. Main effects plot
Figure 3. Convergence curve of SA algorithm
5.3 Computational Results
Data for six vendors are collected from the construction firm for a periodic demand of 600 metric ton
TMT steel bar and depicted in Table 12. The strategy of the procurement department is to distribute
the order among the best three vendors to avoid the biasness. Each supplier has certain capacity to
supply materials as given in table 12. Each supplier supply faulty materials according to the
percentage of defective items calculated and each of them supply according to their own pace and the
percentages of delays in delivery are also provided in the table 12 for each supplier. The firmโs project
schedule is moderately rigid and therefore delay in delivery incurs the overall cost of the project.
Delay cost is calculated by the experts of the firm, which is closely 2.5 Lacs INR per day. The cost
incurs due to substandard supply are generally converted into delay cost as stated by the firmโs
manager and calculated using the first component of equation (4).
The AHP method depicts that supplier 4, 1, 2 are the best three suppliers. The total procurement cost
is obtained for these three vendors are outlined in Table 13. Thereafter the SA procedure is executed
and different result is obtained which states that supplier 3, 1, 4 are the best. The total procurement
cost computed for SA method is found to be less than the AHP result and shown in Table 13.
Although total faulty materials supplied and total delay days are almost identical for both the methods
but the SA method attains closely 0.3% better solution than that of the AHP method. In monetary term
SA recovers 1.25 Lacs INR for the firm. This observation indicates that the SA technique is efficient
and less complex because of its simplicity in simulation. The solution is obtained with negligible
13
computational time (< 2 seconds). Thus the proposed SA method is shown to outperform the AHP
technique.
Table 12. Collected vendor details data from the firm
Vendors
v1
v2
v3
v4
v5
v6
max order quantity
(metric ton)
150
300
250
200
750
450
unit cost
(INR)/kg
58.75
62
61.5
65
64.5
63.5
Percent defective/metric
ton
3.2
3.8
4.5
2
5.7
6.2
percent delay
delivery
2.28
2.92
3.12
1.16
3.29
4.5
Table 13. Comparison of SA result with AHP result
AHP result
SA result
vendor
v4
v1
v2
order
200
150
250
600
defective
4
5
10
19
late delivery
3
4
8
15
quality cost
delay cost
Total procurement Cost
cost (INR)
13000000
8812500
15500000
37312500
1750000
3750000
43812500
vendor
v3
v1
v4
order
250
150
200
600
defective
11
5
4
20
late delivery
8
4
3
15
quality cost
delay cost
Total procurement Cost
cost (INR)
15375000
8812500
13000000
37187500
1750000
3750000
43687500
6. Managerial Implications
The study accomplished in this research has significant managerial implications. The soft computing
approach proposed in this article can be exploited as a critical managerial decision making tool. This
is beneficial in optimizing the vendor network, successful resource allocation for vendor improvement
curriculums.
In optimizing the vendor network, managers can employ the method to choose vendors without
having any biasness for any particular vendor. This further reduces the chance of failure in supplier
network. By doing this it would help every supplier to grow evenly. The management of the firm can
deliver these suppliers with possible standards for enhancement and target time could be anticipated
in complementing them.
Another managerial insight of this study affirms that, an already recognized supplier selection
methodology (AHP) may not be the best methodology and other state-of-the-art techniques
(metaheuristics) can substantially attain better solution and maximize the profit of the firm which is
the firmsโ main objective.
14
7. Conclusions
This article portrays a novel SA based metaheuristic algorithm to select the supplier for a particular
Indian firm which is an NP-complete problem in nature. The problem is formulated using
multiobjective mathematical model which reflects the essential optimization criteria of this research.
The initial feasible solution to the proposed SA based technique is obtained using AHP technique in
order to quicken the computation. This work further exploits Taguchiโs robust design approach to
select optimal set of parameters to SA algorithm which is crucial in influencing the performance of
the technique. The uniqueness of this work lies in practicing two different decision making techniques
in solving this MCDM problem model. In past literature such metaheuristic approach to evaluate and
enhance the AHP ranking of vendors has never been carried out. To perform the said analysis authors
have collected industrial data from a national construction firm. Computational results presented in
Section 5 demonstrate that the SA method outperforms the AHP technique performing better than the
AHP method for the supplier selection problem. The proposed SA procedure produces nearly 0.3%
improved solution. This work is an experimental study which considered the main criteria of the
problem such as cost, delivery and delay. However many other intricate sub-criteria could also be
considered to make this work more realistic. Future work can be accomplished by utilizing this
technique in more complex supplier selection problems incorporating more conflicting criteria and
sub-criteria by considering risk factors or suppliers profiles and other related issues and that is the
possible extension of this research.
Acknowledgement
The authors are grateful to the anonymous reviewers for their valuable comments and suggestions in
improving the quality of the paper.
References
Aarts, E., and Korst, J. (1990) Simulated Annealing and the Boltzmann Machine, John Wiley & Sons,
New York, USA.
Aissaoui, N., Haouari, M., and Hassini, E. (2007) โSupplier selection and order lot sizing modeling: A
reviewโ, Computers & Operations Research, Vol. 34, No. 12, pp. 3516-3540.
Akarte, M.M. (2001) โWeb based casting supplier evaluation using analytic hierarchy processโ,
Journal of the Operational Research Society, Vol. 52, No. 5, pp. 511-522.
Amid, A. Ghodsypour, S.H., and OโBrien, C. (2009) โA weighted additive fuzzy multiobjective model
for the supplier selection problem under price breaks in a supply Chainโ, International Journal of
Production Economics, Vol. 121, No. 2, pp. 323-332.
Amid, A. Ghodsypour, S.H., and OโBrien, C. (2010) โA weighted maxโmin model for fuzzy multiobjective supplier selection in a supply chainโ, International Journal of Production Economics,
doi:10.1016/j.ijpe.2010.04.044 (article in press).
Arunkumar, N., Karunamoorthy, L., and Makeshwaraa, N.U. (2007) An optimization technique for
vendor selection with quantity discounts using genetic algorithmโ, Journal of Industrial
Engineering International, Vol. 3, No. 4, pp. 1-13.
Bello, M.J.S. (2003) A case study approach to the supplier selection process, M.Sc. thesis, submitted
to University of the Puerto Rico Mayaguez.
Zhao, G., and Bross, M.E. (2004) Supplier selection process in emerging markets - The Case Study of
Volvo Bus Corporation in China, M.Sc. thesis, submitted to Gรถteborg University, Sweden.
Chen, C.T., Lin, C.T., and Huang, S.F. (2006) โA fuzzy approach for supplier evaluation and selection
in supply chain managementโ, International Journal of Production Economics, Vol. 102, No. 2,
pp. 289โ301.
15
Choy, K.L., Lee, W.B., and Lo, V. (2002) โAn intelligent supplier management tool for benchmarking
suppliers in outsource manufacturingโ, Expert Systems with Applications, Vol. 22, No, 3, pp. 213224.
Dickson, G.W. (1966) โAn Analysis of Vendor Selection: Systems and Decisionsโ, Journal of
Purchasing, Vol. 1, No. 2, pp. 5-17.
Ding, H., Benyoucef, L., and Xie, X. (2003) โA simulation-optimization approach using genetic
search for supplier selectionโ, Proceedings of the 2003 Winter Simulation Conference, pp. 12601267.
Ellram, L.M. (1990) โThe Supplier Selection Decision in Strategic Partnershipsโ, Journal of
Purchasing and Materials Management, Vol. 26, No. 4, pp. 8-14.
Gnanasekaran, S., Velappan S., and Manimaran, P. (2010) โAn integrated model for supplier selection
using fuzzy analytical hierarchy process: a steel plant case studyโ, International Journal of
Procurement Management, Vol. 3, No. 3, pp. 292-315.
Handfield, R., Walton, S.V., and Sroufe, R. (2002) โApplying environmental criteria to supplier
assessment: A study in the application of the Analytical Hierarchy Processโ, European Journal of
Operational Research, Vol. 141, No. 1, pp. 70-87.
Kanagaraj, G., and Jawahar, N. (2009) โA simulated annealing algorithm for optimal supplier
selection using the reliability-based total cost of ownership modelโ, International Journal of
Procurement Management, Vol. 2, No. 3, pp. 244-266.
Kubat, C., and Yuce, B. (2006) โSupplier Selection with Genetic Algorithm and Fuzzy AHPโ,
Proceedings of 5th International Symposium on Intelligent Manufacturing Systems, pp. 13821401.
Lee, A.H.I, Chen, W.C., and Chang, C. J. (2008) โA fuzzy AHP and BSC approach for evaluating
performance of IT department in the manufacturing industry in Taiwanโ, Expert Systems with
Applications, Vol. 34, No. 1, pp. 96-107.
Li, C.C., Fun, Y.P., and Hung, J.S. (1997) โA new measure for supplier performance evaluationโ, IIE
Transactions, Vol. 29, No. 9, pp. 753-758.
Liu, F.H.F., and Hai, H.L. (2005) โThe voting analytic hierarchy process method for selecting
supplierโ, International Journal of Production Economics, Vol. 97, No. 3, pp. 308-317.
Ng, W.L. (2008) โAn efficient and simple model for multiple criteria supplier selection problemโ,
European Journal of Operational Research, Vol. 186, No. 3, pp. 1059โ1067.
Petroni, A., and Braglia, M. (2000) โVendor selection using principal component analysisโ, Journal of
Supply Chain Management, Vol. 36, No. 2, pp. 63-69.
Rajkumar, C.J., Kannan, S.M., Jayabalan, V. (2009) โMulticriteria-based customer-focused vendor
selection through the analytic hierarchy processโ, International Journal of Procurement
Management, Vol. 2, No. 2, pp. 143-162.
Rezaei, J., and Davoodi, M. (2008) โA deterministic, multi-item inventory model with supplier
selection and imperfect qualityโ, Applied Mathematical Modelling, Vol. 32, No. 10, pp. 2106โ
2116.
Saaty, T.L. (1980) The Analytic Hierarchy Process: Planning, Priority Setting, Resource Allocation.
New York: McGraw-Hill.
Saen, R.F. (2008) โUsing super-efficiency analysis for ranking suppliers in the presence of volume
discount offersโ, International Journal of Physical Distribution & Logistics Management, Vol. 38,
No. 8, pp. 637-651.
Saen, R.F., and Zohrehbandian, M. (2008) โA data envelopment analysis approach to supplier
selection in volume discount environmentsโ, International Journal of Procurement Management,
Vol. 1, No. 4, pp. 472-488.
Saen, R.F. (2009) โUsing data envelopment analysis for ranking suppliers in the presence of
nondiscretionary factorsโ, International Journal of Procurement Management, Vol. 2, No. 3, pp.
229-243.
Saen, R.F. (2010) โRestricting weights in supplier selection decisions in the presence of dual-role
factorsโ, Applied Mathematical Modelling, Vol. 34, No. 10, pp. 2820โ2830.
Schooner, S. (2003) โCommercial Purchasing: The Chasm between the United State Governmentโs
Evolving Policy and Practiceโ, In: Arrowsmith, S., and Trybus, M. (Eds.), Public Procurement:
The Continuing Revolution, (pp. 137-169), Kluwer Law International, The Hague.
16
Scott, S. (1995) โBest Value Contracts: Lessons Learned in Paving the Road to Qualityโ, National
Contract Management Journal, Vol. 26, No. 2, pp. 1-11.
Taguchi, G. (1994) โTaguchi on Robust Technology Development: Bringing Quality Engineering
Upstreamโ, Journal of Electronic Packaging, Vol. 116, No. 2, pp. 161.
Tahriri, F., Osman, M.R., Ali, A., and Yusuff, R.M. (2008) โA Review of Supplier Selection Methods
in Manufacturing Industriesโ, Suranaree Journal of Science and Technology, Vol. 15, No. 3, pp.
201-208.
Tam, M.C.Y, and Tummala, V.M.R. (2001) โAn application of the AHP in vendor selection of a
telecommunications systemโ, Omega, Vol. 29, No. 2, pp. 171-182.
Thompson K.N. (1990) โVendor Profile Analysisโ, Journal of Purchasing and Materials
Management, Vol. 26, No. 1, pp. 11-18.
Timmerman, M. (1986) โAn approach to vendor performance evaluationโ, Engineering Management
Review, IEEE, Vol. 15, No. 3, pp. 14-20.
Weber C., Current, J.R., and Benton, W.C. (1991) โVendor Selection Criteria and Methodsโ,
European Journal of Operational Research, Vol. 50, No. 1, pp. 2-18.
Wu, D. (2009) โSupplier selection: A hybrid model using DEA, decision tree and neural networkโ,
Expert Systems with Applications, Vol. 36, No. 5, pp. 9105โ9112.
Yahya, S., and Kingsman, B. (1999) โVendor rating for an entrepreneur development programme: a
case study using the analytic hierarchy process methodโ, Journal of the Operational Research
Society, Vol. 50, No. 5, pp. 916-930.
Yu, X., and Jing. S. (2004) โA Decision Model for Supplier Selection Considering Trustโ, Chinese
Business Review, Vol. 3, No. 6, pp. 15-20.
17
| 9cs.NE
|
TRIPLE MASSEY PRODUCTS VANISH OVER ALL FIELDS
arXiv:1412.7611v3 [math.NT] 23 Aug 2016
JรN MINรCฬ AND NGUYแปN DUY TรN
A BSTRACT. We show that the absolute Galois group of any field has the vanishing triple
Massey product property. Several corollaries for the structure of maximal pro-p-quotient
of absolute Galois groups are deduced. Furthermore, the vanishing of some higher
Massey products is proved.
1. I NTRODUCTION
Let F be a field and Fs a separable closure of F. The Galois group GF := Gal( Fs /F) is
called the absolute Galois group of F. Every such Galois group is a profinite group.
One may ask what special properties absolute Galois groups have among all profinite groups. This is a difficult problem, and at this moment only few properties have
been found. However those discovered properties are of great interest and considerable
depth.
In the classical papers [AS1, AS2] published in 1927, E. Artin and O. Schreier developed a theory of real fields, and they showed in particular that the only non-trivial finite
subgroups of absolute Galois groups are groups of order 2. More recently, in some remarkable work M. Rost and V. Voevodsky proved the Bloch-Kato conjecture, thereby
establishing a very special property of Galois cohomology of absolute Galois groups.
Relatively recently, two new conjectures, the Vanishing n-Massey Conjecture and the
Kernel n-Unipotent Conjecture were proposed ( see [MT1] and [MT2]). These conjectures are based on a number of previous considerations. One motivation is coming
from topological considerations. (See [DGMS] and [HW].) Another motivation is a program to describe various n-central series of absolute Galois groups as kernels of simple
Galois representations. (See [Ef, EM1, EM2, MSp, Vi].)
In this paper we shall consider only the special case of the Vanishing n-Massey Conjecture when n = 3 with the exception of Section 5 when we consider n > 3 as well.
In the papers [MT1, MT2], the Vanishing n-Massey Conjecture was formulated only in
the case when the base field F contains a primitive p-th root of unity. In this paper we
consider a stronger version of this conjecture when there is no condition on the field F.
For the sake of simplicity we shall recall below the definition of n-Massey products only
in the case n = 3, and we refer the reader to [MT1, Sections 2 and 3] for the more general
case. See [MT1, Definition 3.3] for a definition of the vanishing n-fold Massey product
JM is partially supported by the Natural Sciences and Engineering Research Council of Canada
(NSERC) grant R0370A01. NDT is partially supported by the National Foundation for Science and Technology Development (NAFOSTED) grant 101.04-2014.34.
1
2
JรN MINรCฬ AND NGUYแปN DUY TรN
property. Also see Section 5 for reviews of some basic definitions and facts related to
n-fold Massey products.
Conjecture 1.1 (Vanishing n-Massey Conjecture). Let p be a prime number and n โฅ 3 an
integer. Let F be a field. Then the absolute Galois group GF of F has the vanishing n-fold Massey
product property with respect to F p .
In this paper we show that the conjecture is true when n = 3. We will use the word
โtripleโ instead of โ3-foldโ.
Theorem 1.2 (= Theorem 4.15). Let F be any field and p a prime number. Then the absolute
Galois group GF of F has the vanishing triple Massey product property with respect to F p
Below, we briefly recall the definition of triple Massey products and the corresponding vanishing property. Let G be a profinite group and p a prime number. We consider the finite field F p as a trivial discrete G-module. Let C โข = (Cโข (G, F p ), โ, โช) be
the differential graded algebra of inhomogeneous continuous cochains of G with coefficients in F p (see [NSW, Ch. I, ยง2] and [MT1, Section 3]). We write H i (G, F p ) for the
corresponding cohomology groups. We denote by Z1 (G, F p ) the subgroup of C1 (G, F p )
consisting of all 1-cocycles. Because we use trivial action on the coefficients F p , we
have Z1 (G, F p ) = H 1 (G, F p ) = Hom(G, F p ). Let ฯ1 , ฯ2 , ฯ3 be elements in H 1 (G, F p ).
Assume that
ฯ1 โช ฯ2 = ฯ2 โช ฯ3 = 0 โ H 2 (G, F p ).
In this case we say that the triple Massey product hฯ1 , ฯ2 , ฯ3 i is defined. Then there
exist cochains D12 and D23 in C1 (G, F p ) such that
โD12 = ฯ1 โช ฯ2 and โD23 = ฯ2 โช ฯ3
in C2 (G, F p ). Then we say that D := {ฯ1 , ฯ2 , ฯ3 , D12 , D23 } (or sometimes for simplicity
{ D12 , D23 }) is a defining system for the triple Massey product hฯ1 , ฯ2 , ฯ3 i. Observe that
โ(ฯ1 โช D23 + D12 โช ฯ3 ) = 0,
hence ฯ1 โช D23 + D12 โช ฯ3 is a 2-cocycle. We define the value hฯ1 , ฯ2 , ฯ3 iD of the triple
Massey product hฯ1 , ฯ2 , ฯ3 i with respect to the defining system D to be the cohomology
class of ฯ1 โช D23 + ฯ3 โช D12 in H 2 (G, F p ). The set of all values hฯ1 , ฯ2 , ฯ3 iD when D runs
over the set of all defining systems, is called the triple Massey product hฯ1 , ฯ2 , ฯ3 i โ
H 2 (G, F p ). If 0 โ hฯ1 , ฯ2 , ฯ3 i, then we say that our triple Massey product vanishes.
Definition 1.3. We say that G has the vanishing triple Massey product property (with respect
to F p ) if every triple Massey product hฯ1 , ฯ2 , ฯ3 i, where ฯ1 , ฯ2 , ฯ3 โ H 1 (G, F p ), vanishes
whenever it is defined.
The Vanishing 3-Massey Conjecture then claims that for any field F and any prime p,
the absolute Galois group GF has the vanishing triple Massey product property. It was
proved by M. Hopkins and K. Wickelgren in [HW] that if F is a global field of characteristic not 2 and p = 2, then GF has the vanishing triple Massey product property. In
TRIPLE MASSEY PRODUCTS VANISH OVER ALL FIELDS
3
[MT1] it was proved that the result of [HW] is valid for any field F. In [MT3] it was
proved that GF has the vanishing triple Massey product property with respect to F p for
any global field F containing a primitive p-th root of unity. In [EMa1], I. Efrat and E.
Matzri provided alternative proofs for the above mentioned results in [MT1] and [MT3].
In [Ma], E. Matzri proved that for any prime p and for any field F containing a primitive
p-th root of unity, GF has the vanishing triple Massey product property. In this paper
we shall provide a cohomological proof to the main result in [Ma] (see Theorem 4.10).
We also remove the assumption that F contains a primitive p-th root of unity (see Theorem 4.15). Thus every absolute Galois group has the vanishing triple Massey product
property. This is a fundamental new restriction on absolute Galois groups. See Subsection 4.3 for some significant consequences on the structure of quotients of absolute
Galois groups. Indeed in Subsection 4.3 we are able to describe some strong restrictions
on the shape of relations in Zassenhaus filtration S(2) modulo S(4) for any maximal
pro-p-quotient of any absolute Galois group GF . This shape of relations excludes the
possibility of certain triple commutators occurring in these relations. These are new
significant restrictions on the shape of relations in canonical quotients of absolute Galois groups. This description of relations in S(2) modulo S(4) appears to be close to an
optimal description.
The structure of our paper is as follows. In Section 2 we recall basic material on the cohomology of bicyclic groups. In Section 3 we discuss Heisenberg extensions. In Section
4, by using the material developed in Sections 2 and 3, we provide an alternative cohomological proof of the main result of [Ma] on the vanishing of triple Massey products
with respect to F p when F contains a primitive p-th root of unity. Before we received a
very nice preprint [Ma] from E. Matzri, we planned to make such a proof but we completed this proof only after we received his preprint. We also want to notice that by
referring directly to some results in [Ti] (see Remark 4.6 for a brief explanation), one can
avoid using material in Section 2. However we think that Section 2 might be of independent interest. E.Matzri used in his work tools from the theory of central simple algebras.
In our paper we use cohomological techniques instead. In Remark 4.11 we provide yet
another short direct variant of the key part of the proof of Theorem 4.10. Considering the
details of our proof makes it possible to prove the vanishing of triple Massey products
in a more general setting. Consider a formation { G, { G (K )}, N }, where G is a profinite
group, { G (K )} is a collection of open subgroups of G indexed by a set ฮฃ = {K }, and N
is a discrete G-module. (See [Se1, Chapter XI, ยง1] or [We, Chapter VI, Section 6.1] for a
definition of a formation.) We shall call such a formation { G, { G (K )}, N } a p-Kummer
field formation if it satisfies two axioms:
(1) For each open normal subgroup G (K ) of G, H 1 (G/G (K ), N G (K ) ) = {1}. (Here
N G (K ) is the set of elements of N which are fixed under the action of every element ฯ in G (K ).)
(2) There is a short exact sequence of G-module
x 7โ x p
1 โโ Z/pZ โโ N โโ N โโ 1,
4
JรN MINรCฬ AND NGUYแปN DUY TรN
where G acts trivially on Z/pZ, and N is written in a multiplicative way.
Recall that axiom (1) above guarantees that each p-Kummer field formation is also a
field formation. (See [We, Chapter 6, Section 6.2].) Our main interest is when G = GF ,
the absolute Galois group of F, and ฮฃ is the set of all finite separable extensions of F,
and N = Fsร . But our approach is valid in this more general setting which may have
applications in anabelian geometry. Also this approach clarifies the key properties of G
which are sufficient for our proofs to go through. Nearly simultaneously with our arXiv
posting of the first version of our paper, I. Efrat and E. Matzri posted [EMa2] on arXiv.
The paper [EMa2] is a replacement of [Ma]. In [EMa2], I. Efrat and E. Matzri also provide a cohomological approach to Theorem 4.10. Their approach has a similar flavor to
our proofs in this paper, but it is still different. We feel that both papers taken together
provide a definite complementary insight to the new fundamental property of absolute
Galois groups. As we mentioned above, in Remark 4.11 we provide the second alternative proof of the vanishing of triple Massey products. In this proof we are able to show a
specific element of the triple Massey product which vanishes. Some results of this paper
(e.g. the results on Heisenberg extensions in Subsection 3.2, Lemma 4.2) have already
been used in the construction of important Galois groups. Namely in [MT4] we succeeded in extending the crucial ideas in this paper together with further ideas in Galois
theory to find explicit constructions of Galois extensions L/F with Gal( L/F) โ U4 (F p ),
for all fields F and all primes p. For example Theorem 4.12 and its proof play
anโimโ
ร
ร
p
p
portant role in finding a crucial submodule of the E /(E ) where E := F( a, p c),
which is needed in our construction of a required Galois extension L/F containing E/F
and having Galois group isomorphic to U4 (F p ). In Section 5 we prove the vanishing of
(k + 1)-fold Massey products of the form hฯb , ฯa , . . . , ฯa i (k copies of ฯa ) and the vanishing of (k + 2)-fold Massey products of the form hฯ a , ฯb , ฯ a , . . . , ฯ a i (k + 1 copies of
ฯ a ), where k < p. (See Theorem 5.9.) The first vanishing can be deduced also from the
results in [Sha2], but the second vanishing appears to be new. (See also [Wic, Corollary
3.17] for another result on the vanishing of some n-fold Massey products.)
Acknowledgements: We are grateful to Jochen Gรคrtner and Adam Topaz with whom
we initially began correspondence on the vanishing triple Massey products pursuing
a different strategy. We are also grateful to Eliyahu Matzri for sending us his beautiful preprint [Ma] shortly before his arXiv posting. Although we did not yet discuss
details of our paper with Ido Efrat, Eliyahu Matzri, Danny Neftin and Kirsten Wickelgren, we thank them for their interest and great encouragement. We are grateful to an
anonymous referee for his/her careful reading of our paper and for providing us with
insightful comments and valuable suggestions which we used to improve our exposition.
TRIPLE MASSEY PRODUCTS VANISH OVER ALL FIELDS
2. C OHOMOLOGY
5
OF BICYCLIC GROUPS
In this section we study the cohomology of cyclic and bicyclic groups. A number of
basic results which we will need subsequently in this paper, are recalled here. Our main
references are [CKM, pages 16-19] and [Me, pages 694-697].
2.1. Cohomology of cylic groups. If G is abelian group and g โ G is an element of
order n, we denote
D g := g โ 1 and Ng := 1 + g + ยท ยท ยท + gnโ1 โ Z [ G ].
Let G be a cyclic group of order n. We choose a generator s of G. Recall that วซ : Z [ G ] โ
Z is the augmentation homomorphism with วซ( g) = 1 for all g โ G. Then we have the
following resolution of the trivial G-module Z:
d
d
วซ
0
1
ยท ยท ยท โโ Z[ G] โโ
Z [ G ] โโ Z [ G ] โโ Z โโ 0,
where di is multiplication by Ds (resp. Ns ) if i is even (resp. odd). For any G-module M,
the above resolution determines a complex
dโ
dโ
0
1
Hom G (Z [ G ], M) โโ
HomG (Z [ G ], M) โโ
HomG (Z [ G ], M) โโ ยท ยท ยท
We make the natural identification HomG (Z [ G ], M) = M. Then the above complex
becomes
โ
โ
โ
d0
d
d
1
2
M โโ M โโ
M โโ
M โโ ยท ยท ยท
This implies in particular that
H 2 (G, M) โ Hฬ 0 (G, M) := ker Ds /imNs = Ms /Ms A.
As explained in [Se1, Chapter VIII, ยง4], the above isomorphism does depend on the
choice of generator s and can be described as below. The choice of s defines a homomorphism ฯs : G โ Q/Z such that ฯs (s) = 1/n. The coboundary ฮด : H 1 (G, Q/Z ) โ
H 2 (G, Z ) associated to the short exact sequence of trivial G-modules
0 โ Z โ Q โ Q/Z โ 0,
sends ฯs to an element ฮธs = ฮดฯs โ H 2 (G, Z ). Then the isomorphism
Ms /Ns M โ H 2 (G, M),
is the map which sends x โ M to x โช ฮดฯs .
2.2. Cohomology of bicyclic groups. Let G be a bicyclic group. We choose two generators s, of order m, and t, of order n.
JรN MINรCฬ AND NGUYแปN DUY TรN
6
We define a chain complex Lโข = ( Li ) as follows: Li = Z [ G ]i +1 for all i โฅ 0, and
di : Li +1 โ Li are defined by the following conditions
d2i e2j
d2i e2j+1
d2i +1 e2j
d2i +1 e2j+1
= Ns e2jโ1 + Dt e2j ,
= Ds e2j โ Nt e2j+1,
= Ns e2jโ1 + Nt e2j ,
= Ds e2j โ Dt e2j+1,
here, for convenience, we put eโ1 = 0 and (e0 , . . . , ei ) is the canonical basis of Li =
Z [ G ]i +1 . Then we obtain a free resolution of the trivial G-module Z:
(1)
d
d
d
วซ
0
2
1
ยท ยท ยท โโ Z[ G]4 โโ
Z [ G ]3 โโ
Z [ G ]2 โโ Z [ G ] โโ Z โโ 0.
We define I := ker วซ, the augmentation ideal of Z [ G ]; and J := ker d0 . Then we obtain
the following exact sequence of Z [ G ]-modules
f
0 โโ J โโ Z [ G ]2 โโ I โโ 0,
(2)
where f ( x, y) = d0 ( x, y) = Dt x + Ds y. We also consider the following exact sequence
g
h
0 โโ Z [ G ]/ZNG โโ J โโ Z2 โโ 0,
(3)
where NG = โฯโ G ฯ, g( x + ZNG ) = ( Dt x, โ Ds x ) and h( x, y) = (วซ( x )/n, วซ(y)/m).
Now let M be any G-module. The resolution (1) yields the following complex
d0โ
d2โ
d1โ
HomG (Z [ G ], M) โ Hom G (Z [ G ]2 , M) โ HomG (Z [ G ]3 , M) โ HomG (Z [ G ]4 , M) โ ยท ยท ยท
We make the natural identifications Hom G (Z [ G ]i , M) = Mi . Then the above complex
becomes
โ
โ
โ
d0
d
d
1
2
M โโ M2 โโ
M3 โโ
M4 โโ ยท ยท ยท
The explicit descriptions of some maps diโ in matrix form are given below:
๏ฃน
๏ฃฎ
๏ฃฎ
๏ฃน
Dt
0
0
Nt
0
๏ฃฏ Ds โ Nt 0 ๏ฃบ
Dt
๏ฃบ.
d0โ =
, d1โ = ๏ฃฐ Ds โ Dt ๏ฃป , d2โ = ๏ฃฏ
๏ฃฐ0
Ns Dt ๏ฃป
Ds
0
Ns
0
0
Ds
In particular we have
Z2 (G, M) := ker d2โ = {( x, y, z) โ M3 | Dt ( x ) = 0, Ds (z) = 0, Ds ( x ) = Nt (y), Dt (z) = โ Ns (z)},
B2 (G, M) :=imd1โ = {( x, y, z) โ A3 | โ(c, d) โ A2 : x = Nt (c), y = Ds (c) โ Dt (d), z = Ns (d)},
H 2 (G, M) โ Z2 (G, M)/B2 (G, M).
TRIPLE MASSEY PRODUCTS VANISH OVER ALL FIELDS
7
The exact sequences (2) and (3) yield the following commutative diagram
(*)
HomG (Z2 , M)
โโโ
โโโ u
โโโ
โโโ
โโ)
/ Ext1 ( I, M )
( J, M)
HomG (Z [ G ]2 , M)
/ Hom
G
โฏโฏโฏโฏ
โฏโฏโฏโฏ v
โฏโฏโฏโฏ
โฏโฏโฏโฏ
โฏ*
/
G
0 = Ext1G (Z [ G ]2 , M)
HomG (Z [ G ]/ZNG , M)
Ext1G (Z2 , M)
This diagram implies that we have a natural injection
ฮท : coker(u) ึโ coker(v).
Note that ฮท is an isomorphism if and only if H 1 (G, M) = 0 since Ext1G (Z2 , M) =
H 1 (G, M)2 . Under the natural identifications
HomG (Z2 , M) = ( M G )2 and HomG (Z [ G ]i , M) = Mi ,
we shall describe explicitly all objects and maps in the diagram.
First we have
HomG (Z [ G ]/ZNG , M) = { x โ M | NG x = 0} =:
NG M.
The map v becomes v : M2 โโ NG M, which sends ( x, y) to Dt x โ Ds y. This follows
from the observation that the map v is obtained by applying the functor HomG (ยท, M) to
the composite Z [ G ]/ZNG โ J โ Z [ G ]2 , which maps x mod ZNG to ( Dt x, โ Ds x ).
On the other hand, the surjection d1 : Z [ G ]3 ึ J yields an injection Hom G ( J, M) ึโ
HomG (Z [ G ]3 , M) = M3 . If we identify Hom G ( J, M) with its image in M3 , then
HomG ( J, M) = ker d2โ =: Z2 (G, M), and Ext1G ( I, M) = ker d2โ /imd1โ = H 2 (G, M).
The map u becomes u : ( M G )2 โโ H 2 (G, M), which can be described explicitly as follows. We consider the composite
d
Then
h
1
ฯ : Z [ G ]3 โโ
J โโ Z2 .
ฯ( x, y, z) = h( Nt x + Ds y, โ Dt y + Ns z)
= (วซ( Nt x + Ds y)/n, วซ(โ Dt y + Ns z)/m)
= (วซ( x ), วซ(z)).
The Hom-dual of ฯ is the map
ฯโ : ( M G )2 = HomG (Z2 , M) โโ HomG ( J, M) ึโ Hom G (Z [ G ]3 , M) = M3 ,
.
JรN MINรCฬ AND NGUYแปN DUY TรN
8
which is given by ฯโ ( x, z) = ( x, 0, z). The map u is then given by
u( x, z) = [( x, 0, z)],
where [( x, 0, z)] is the class of ( x, 0, z) in H 2 (G, M).
Let ฯ โ G/hti denote the class of s modulo hti. Then G/hti = hฯi is of order m.
We have the natural identification Hฬ 0 (G/hti, Mt ) = M G /Nฯ ( Mt ) = H 2 (G/hti, M) by
identifying a with the cup product a โช ฮธฯ . (See Subsection 2.1.) Let ฯs : G โ Q/Z be a
homomorphism such that ฯs (s) = 1/n, ฯs (t) = 0, and set ฮธs := ฮดฯs โ H 2 (G, Z ). Then
we have
[(0, 0, z)] = z โช ฮธs = z โช ฮดฯs โ H 2 (G, M).
This follows from an observation in [CKM, page 18] that the inflation map
infG/hti : H 2 (G/hti, M) ึโ H 2 (G, M),
is given by
ฯs
(Note also that
= infG/hti
Similarly, we have
infG/hti (z) = [(0, 0, z)].
(ฯฯ )
and ฮธs = infG/hti ฮธฯ .)
[( x, 0, 0)] = x โช ฮธt = x โช ฮดฯt โ H 2 (G, M).
Here ฯt : G โ Q/Z is a homomorphism such that ฯt (t) = 1/n, ฯt (s) = 0, and ฮธt :=
ฮดฯt โ H 2 (G, Z ). Therefore
u( x, z) = x โช ฮดฯt + z โช ฮดฯs .
Observe that we have the following commutative diagram
Z[G]
x 7โ(0,x,0)
Z [ G ]3
/
g
Z [ G ]/Z [ G ] NG
/
d1
J.
This induces the following commutative diagram
HomG (Z [ G ]3 , M) = M3
( x,y,z)7โy
O
?
HomG ( J, M) =
Z2 (G, M)
/
/
HomG (Z [ G ], M) = M
O
?
HomG (Z [ G ]/ZNG , M) =
NG M
TRIPLE MASSEY PRODUCTS VANISH OVER ALL FIELDS
9
In summary, under the identifications HomG (Z [ G ]i , M) = Mi , HomG ( J, M) = Z2 (G, M),
Ext1G ( I, M) = Z2 (G, M)/B2 (G, M) = H 2 (G, M), etc., the diagram (*) becomes
( M G )2
(**)
M2 โ
.
โโโ
โโโu
โโโ
โโ'
2
/ Z ( G, M )
/ H 2 ( G, M )
โโ
โโ v
โโ
โโ
โโ
%
/
0
NG M
H 1 (G, M)2
Here
v( x, y) = Dt x โ Ds y.
u( x, z) = x โช ฮดฯt + z โช ฮดฯs .
The natural injection ฮท : coker(u) ึโ coker(v) is given by
ฮท ([( x, y, z)]) = [y].
3. H EISENBERG
EXTENSIONS
3.1. Norm residue symbols. Let F be a field containing a primitive p-th root of unity
ฮพ. For any element a in Fร , we shall write ฯ a for the character corresponding to a via
the Kummer map Fร โ H 1 (GF , Z/pZ )โ= Hom(GF , Z/pZ). From now on we assume
is a Galois extension with Galois group
that a is not in ( Fร ) p . The extensionโF( p a)/F
โ
p
p
hฯa i โ Z/pZ, where ฯa satisfies ฯa ( a) = ฮพ a.
The character ฯ a defines a homomorphism ฯ a โ Hom(GF , 1p Z/Z ) โ Hom(GF , Q/Z )
by the formula
1
ฯa = ฯa .
p
ร
Let b be any element in F . Then the norm residue symbol can be defined to be
(a, b) := (ฯa , b) := b โช ฮดฯa .
The cup product ฯ a โช ฯb โ H 2 (GF , Z/pZ ) can be interpreted as the norm residue
symbol (a, b). More precisely, we consider the exact sequence
x 7โ x p
0 โโ Z/pZ โโ Fsร โโ Fsร โโ 1,
where Z/pZ has been identified with the group of p-th roots of unity ยต p via the choice
of ฮพ. As H 1 (GF , Fsร ) = 0, we obtain
i
รp
0โโ H 2 (GF , Z/pZ ) โโ H 2 (GF , Fsร ) โโ H 2 (GF , Fsร ).
JรN MINรCฬ AND NGUYแปN DUY TรN
10
Then one has i (ฯ a โช ฯb ) = (a, b) โ H 2 (GF , Fsร ). (See [Se1, Chapter XIV, Proposition 5].)
The following fact ([Se1, Chapter XIV, Proposition 2]) will also be used frequently in the
sequel.
Proposition 3.1. We have
2
ร res ker ฯ a
2
ร
โ
ker H (GF , Fs ) โโ H (GF ( p a) , Fs ) = {(a, b) | b โ Fร }.
3.2. Heisenberg extensions. In this subsection we provide a short alternative version
of some material in [Ma, Section 5]. (See also [Sha1, Chapter 2, Section 2.4].)
Assume that a,
b are elements in Fร , which are linearly independent modulo ( Fร ) p .
โ
โ
p
K/F
is a Galois extension whose Galois โ
group isโ
generated
Let K = F( p a, b). Then
โ
โ
โ
โ
โ
โ
p
p
p
p
p
p
p
p
by ฯa and ฯb . Here ฯa ( b) = b, ฯa ( a) = ฮพ a; ฯb ( a) = a, ฯb ( b) = ฮพ b.
Let U3 (Z/pZ ) be the group of all upper-triangular unipotent 3 ร 3-matrix
๏ฃฎ with๏ฃนen1 x z
tries in Z/pZ. We consider a map U3 (Z/pZ ) โ (Z/pZ )2 which sends ๏ฃฐ0 1 y ๏ฃป to
0 0 1
( x, y). Then we have the following embedding problem
GF
ฯฬ
0
/
Z/pZ
/
U3 (Z/pZ )
/
(Z/pZ)2
/
1,
where ฯฬ is the map (ฯ a , ฯb ) : GF โ Gal(K/F) โ (Z/pZ )2 . (The last isomorphism
Gal(K/F) โ (Z/pZ )2 is the one which sends ฯa to (1, 0) and ฯb to (0, 1).)
Assume that
โ ฯa โช ฯb = 0. Then the norm residue symbol (a, b) is trivial. Hence there
exists ฮฑ in F( p a) such that NF ( โ
p a ) /F (ฮฑ ) = b (see [Se1, Chapter XIV, Proposition 4 (iii)]).
We set
pโ2
โ
pโ2
pโ1
pโ2
A0 = ฮฑ ฯa (ฮฑ
) ยท ยท ยท ฯa (ฮฑ) = โ ฯai (ฮฑ pโi โ1 ) โ F( p a).
i =0
Lemma 3.2. Let f a be an element in Fร . Let A = f a A0 . Then we have
NF ( โ
p a ) /F (ฮฑ )
b
ฯa ( A)
=
= p.
p
A
ฮฑ
ฮฑ
ฯa ( A)
ฯa ( A0 )
Proof. Observe that
=
. The lemma then follows from the identity
A
A0
( s โ 1)
pโ2
โ ( p โ i โ 1) s
i =0
i
=
pโ1
โ si โ ps0 .
i =0
For any representation ฯ : GF โ U3 (Z/pZ ) and 1 โค i < j โค 3, let ฯij : GF โ Z/pZ
be the composition of ฯ with the projection from U3 (Z/pZ ) to its (i, j)-coordinate.
TRIPLE MASSEY PRODUCTS VANISH OVER ALL FIELDS
11
Proposition 3.3. Assume that ฯ a โช ฯb = 0. Let f a be an element in Fร . Let A = f a A0 be
defined as above. Then the homomorphism ฯฬ := (ฯ a , ฯb ) : GF โ Z/pZ ร Z/pZ lifts to a
Heisenberg extension ฯ : GF โ U3 (Z/pZ ) with resker ฯ a (ฯ13 ) = ฯ A .
Proof. From ฯa ( A)/A = b/ฮฑ p โ (K ร ) p , and ฯb ( A) = A, we see that
ฯ( A)/A โ (K ร ) p
โ
p
for every ฯ โ Gal(K/F). This implies that the extension L := K ( A)/F is Galois. Let
ฯฬa โ Gal( L/F
) (resp. ฯฬโ
ฯa (resp.
ฯb ). Since ฯb ( A) = A,
b โ Gal( L/F )) be an extension of
โ
โ
p โ
p
p
p
p
j
we have ฯฬb ( A ) = ฮพ A, for some j โ Z. Hence ฯฬb ( A ) = A. This implies that ฯฬb
is of order p.
On the other hand, we have
โ
b
p
ฯฬa ( A ) p = ฯa ( A) = A p .
ฮฑ
โ
โ
โ
p
p
p
Hence ฯฬa ( A) = ฮพ i A ฮฑb , for some i โ Z. Then
โ
โ
b
p
p
p
p โ
=
ฯฬa ( A) = A
A.
โ
NF ( p a)/F (ฮฑ)
This implies that ฯฬa is also of order p. We have
โ
โ
โ pb
โ
p
j p
i+ j p
A
ฯฬa ฯฬb ( A ) = ฯฬa (ฮพ A ) = ฮพ
,
ฮฑ
โ
โ
โ ฮพpb
โ pb
โ
p
i+ j p
i p
)=ฮพ
.
A
ฯฬb ฯฬa ( A ) = ฯฬb (ฮพ A
ฮฑ
ฮฑ
We set ฯฬA := ฯฬa ฯฬb ฯฬaโ1 ฯฬbโ1 . Then
โ
โ
p
p
ฯฬA ( A) = ฮพ A.
This implies that ฯฬA is of order p and that Gal( L/F) is generated by ฯฬa and ฯฬb . We also
have
ฯฬa ฯฬA = ฯฬA ฯฬa , and ฯฬb ฯฬA = ฯฬA ฯฬb .
We can define an isomorphism ฯ : Gal( L/F) โ U3 (Z/pZ ) by letting
๏ฃฎ
๏ฃน
๏ฃฎ
๏ฃน
๏ฃฎ
๏ฃน
1 1 0
1 0 0
1 0 1
ฯฬa 7โ x := ๏ฃฐ0 1 0๏ฃป , ฯฬb 7โ y := ๏ฃฐ0 1 1๏ฃป , ฯฬA 7โ z := ๏ฃฐ0 1 0๏ฃป .
0 0 1
0 0 1
0 0 1
ฯ
Then the composition ฯ : GF โ Gal( L/F) โ U3 (Z/pZ ) is the desired lifting of ฯฬ.
Corollary 3.4. Let the notation be as in Proposition 3.3. Let ฯ ab be the map โฯ13 : GF โ
Z/pZ. Then
dฯ ab = ฯ a โช ฯb and res ker ฯ a ( ฯ ab ) = โฯ A .
Proof. Since ฯ : GF โ U3 (Z/pZ ) is a homomorphism, we obtain
dฯ ab (ฯ, ฯ ) = ฯ13 (ฯฯ ) โ ฯ13 (ฯ) โ ฯ13 (ฯ ) = ฯ12 (ฯ)ฯ23 (ฯ ) = (ฯ a โช ฯb )(ฯ, ฯ ).
Therefore dฯ ab = ฯ a โช ฯb , as desired.
JรN MINรCฬ AND NGUYแปN DUY TรN
12
4. T RIPLE M ASSEY
PRODUCTS
4.1. Triple Massey products over fields containing primitive p-th roots of unity. In
this subsection we assume that F is a field containing a primitive p-th root of unity. Let
a, b and c be elements in Fร . Assume further that the triple Massey product hฯ a , ฯb , ฯc i
is defined, i.e., we have ฯ a โช ฯb = 0 = ฯb โช ฯc . Until Theorem 4.10, we always assume
further that a and c are linearly independent modulo ( Fร ) p , and that a and b are linearly
independent modulo ( Fร ) p . We also fix two elements f a and f c in Fร . Let A0 be the
element defined right before Lemma 3.2. Let A = f a A0 .
By Corollary 3.4, there is a map ฯ ab : GF โ Z/pZ such that
dฯ ab = ฯ a โช ฯb โ C2 (GF , Z/pZ ) and res ker ฯ a ( ฯ ab ) = โฯ A .
Since ฯb โช ฯc = 0 in H 2 (GF , Z/pZ ), there exists a map ฯbc : GF โ Z/pZ such that
Then
dฯbc = ฯb โช ฯc โ C2 (GF , Z/pZ ).
hฯa , ฯb , ฯc i ฯ := ฯa โช ฯbc + ฯ ab โช ฯc
is an element in the triple Massey product hฯ a , ฯb , ฯc i.
We consider the following commutative diagram
H 2 (GF , Z/pZ )
i
/
H 2 (GF , Fsร )
res ker ฯ a
H 2 ( GF ( โ
p a ) , Z/pZ )
res ker ฯ a
i
/
ร
H 2 ( GF ( โ
p a ) , Fs ).
Lemma 4.1. We have
(1) resker ฯ a (hฯ a , ฯb , ฯc i ฯ ) = res ker ฯ a (ฯc ) โช ฯ A โ H 2 (GF ( โ
p a ) , Z/pZ ).
2
ร
โ
(2) resker ฯ a (i (hฯ a , ฯb , ฯc i ฯ )) = (c, A) โ H (GF ( p a) , Fs ).
Proof. (1) We have
resker ฯ a (hฯ a , ฯb , ฯc i ฯ ) = res ker ฯ a (ฯ a โช ฯbc + ฯ ab โช ฯc )
= res ker ฯa (ฯa ) โช res ker ฯa ( ฯbc ) + res ker ฯa ( ฯ ab ) โช res ker ฯa (ฯc )
= โฯ A โช res ker ฯa (ฯc )
= res ker ฯa (ฯc ) โช ฯ A .
(2) This follows from (1) and the commutativity of the above diagram.
โ
โ
p
c). Since ฯ a โช
ฯb = 0 = ฯb โช ฯc , we have (a, b) = (b, c) = 0. Thus
Let E = F( p a,
โ
โ
p
p
there are ฮฑ in F( a ) and ฮณ in F( c) such that
โ
NE/F ( โ
p a ) (ฮฑ ) = b = NE/F ( p c) (ฮณ ).
TRIPLE MASSEY PRODUCTS VANISH OVER ALL FIELDS
13
Let G be the Galois group Gal(E/F).โThen G = hฯa , ฯc i, where ฯa โ G โ
(respectively
p
ฯc โ G) is an extension of ฯa โ Gal( F( a )/F) (respectively ฯc โ Gal( F( p c)/F)). We
define
pโ2
โ
C0 = โ ฯci (ฮณ pโi โ1 ) โ F( p a),
i =0
C := f c C0 , and define B := ฮณ/ฮฑ.
Lemma 4.2. We have
ฯa ( A)
= Nฯc ( B).
(1)
A
ฯc (C)
= Nฯa ( B)โ1 .
(2)
C
Proof. (1) From Lemma 3.2, we have
b
Nฯc (ฮณ)
ฯa ( A)
= p =
= Nฯc ( B).
A
ฮฑ
Nฯc (ฮฑ)
(2) From Lemma 3.2, we have
ฯc (C)
b
Nฯa (ฮฑ)
= p =
= Nฯa ( B)โ1 .
C
ฮณ
Nฯa (ฮณ)
We consider Eร as a G-module under the Galois action. The diagram (**) in Subsection 2.2 becomes
( F ร )2
(***)
( E ร )2
โโโ
โโโu
โโโ
โโ'
/ Z2 ( G, Eร )
/ H 2 ( G, Eร )
โฒโฒโฒ
โฒโฒโฒv
โฒโฒโฒ
โฒ%
NG E
ร
0
Here
ฯc ( x ) y
,
x ฯa (y)
u( x, z) = x โช ฮดฯฯc + z โช ฮดฯฯa .
The natural isomorphism ฮท : coker(u) ึโ coker(v) is given by
v( x, y) =
ฮท [( x, y, z)] = [y].
/
.
0
14
JรN MINรCฬ AND NGUYแปN DUY TรN
In the following results in this subsection (except in Theorem 4.10) we use the presentation of cohomology classes as in Section 2.
Corollary 4.3. The triple ( A, B, C) is an element in Z2 (G, Eร ).
Proof. This follows immediately from the previous lemma.
Lemma 4.4. The element [( A, B, C)] is in the image of u.
Proof. Since ฮท is an isomorphism, it suffices to show that ฮท [( A, B, C)] is in the image of
v.
We have
Nฯa (ฮฑ)
b
Nฯa ฯc (ฮฑ)
=
= = 1.
Nฯa ฯc ( B) =
Nฯa ฯc (ฮณ)
Nฯc (ฮณ)
b
ร
Hence by Hilbertโs Theorem 90, there exists e โ E such that
ฯa ฯc (e)
ฯc (ฯa (e)) eโ1
.
=
e
ฯa (e) ฯa (eโ1 )
Therefore B is in imv, as desired.
B=
Corollary 4.5. There exists x, y โ Fร such that
inf([( A, B, C)]) = (a, x ) + (c, y) โ H 2 (GF , Fsร ).
Proof. Since [( A, B, C)] is in the image of u, there exist x and y in Fร such that
This implies that
[( A, B, C)] = x โช ฮดฯฯa + y โช ฯฯc .
inf([( A, B, C)]) = x โช ฮด(inf(ฯฯa )) + y โช ฮด(inf(ฯฯc ))
= x โช ฮดฯa + y โช ฮดฯc
= ( x, a) + (y, b),
as desired.
Hฬ โ1 (G, Eร ).
Remark 4.6. Observe that coker(v) =
We can identify naturally the group
coker(v) with group Ub (G, Eร ) (the notation being as in [Ti]). (See [Ti, Remark after
Corollary 1.6].) Then the composition map
ฮท
H 2 (G, Eร ) โ coker(u) โ coker(v) = Ub (G, Eร ),
is exactly the map which was denoted by วซ in [Ti, page 423], วซ : H 2 (G, Eร ) โ Ub (G, Eร ).
The proof of Lemma 4.4 shows that the element [( A, B, C)] is in the kernel of วซ.
We have the following exact sequence
inf
res
0 โโ H 2 (G, Eร ) โโ H 2 (GF , Fsร ) โโ H 2 (GE , Fsร ).
If we make the natural identification H 2 (GF , Fsร ) = Br(F) and H 2 (GE , Fsร ) = Br(E),
then one can check the map
โ
inf : H 2 (G, Eร ) โโ Br(E/F) := ker(Br( F) โ Br(E)),
TRIPLE MASSEY PRODUCTS VANISH OVER ALL FIELDS
15
is the natural isomorphism ฯ : H 2 (G, Eร ) โโ Br(E/F) mentioned in [Ti, page 427].
Then Corollary 4.5 follows from [Ti, Proposition 1.5].
We consider the following commutative diagram
H 2 (G, Eร )
res G/h ฯai
inf
/
H 2 (GF , Fsร )
res
/
H 2 (GE , Fsร )
res ker ฯ a
H 2 (hฯc i, Eร )
inf /
ร
H 2 ( GF ( โ
p a ) , Fs )
res
/
H 2 (GE , Fsร ).
Lemma 4.7. We have
(1) res G/hฯa i ([ A, B, C]) = A โช ฮดฯฯc โ H 2 (hฯc i, Eร ).
ร
(2) res ker ฯ a (inf([ A, B, C])) = (c, A) in H 2 (GF ( โ
p a ) , Fs ).
Proof. (1) By [CKM, page 17] and under the identification (Eร )ฯc /Nฯc (Eร ) = H 2 (hฯc i, Eร )
via identifying x with the cup product x โช ฮด(ฯฯc ), we have
res G/hฯa i ([ A, B, C]) = [ A] = A โช ฮดฯฯc .
(2) From the commutativity of the above diagram, we obtain
res ker ฯ a (inf([ A, B, C])) = inf(res G/hฯa i ([ A, B, C]))
= inf( A โช ฮด(ฯฯc ))
= A โช ฮด(inf(ฯฯc ))
= A โช ฮดฯc
= (c, A),
as desired.
Corollary 4.8. There exists x โ Fร such that
i (hฯ a , ฯb , ฯc i ฯ ) = inf([ A, B, C]) + (a, x ) โ H 2 (GF , Fsร ).
Proof. From Lemma 4.1 and Lemma 4.7 we have
ร
res ker ฯ a (i (hฯ a , ฯb , ฯc i ฯ )) = res ker ฯ a (inf([ A, B, C])) โ H 2 (GF ( โ
p a ), Fs )).
The statement then follows from Proposition 3.1.
Corollary 4.9. There exist x and y in Fร such that
hฯa , ฯb , ฯc i ฯ = ฯa โช ฯx + ฯc โช ฯy โ H 2 (GF , Z/pZ).
In particular, the triple Massey product hฯ a , ฯb , ฯc i contains 0.
Proof. By Corollaries 4.5 and 4.8, there are x1 , x2 and y in Fร such that
i (hฯ a , ฯb , ฯc i ฯ ) = inf([ A, B, C]) + (a, x2 ) = (a, x1 ) + (c, y) + (a, x2 ) โ H 2 (GF , Fsร ).
16
JรN MINรCฬ AND NGUYแปN DUY TรN
Let x := x1 x2 . Since i : H 2 (GF , Z/pZ ) โ H 2 (GF , Fsร ) is injective, we obtain
hฯ a , ฯb , ฯc i ฯ = ฯ a โช ฯ x + ฯc โช ฯy ,
as desired.
For the last statement, we replace ฯ ab by ฯโฒab = ฯ ab + ฯy , and ฯbc by ฯโฒbc = ฯbc โ ฯ x .
(Here we consider ฯ x and ฯy as elements in Z1 (GF , Z/pZ ).) Then ฯโฒ = { ฯโฒab , ฯโฒbc } is also
a defining system for the triple Massey product hฯ a , ฯb , ฯc i. Hence hฯ a , ฯb , ฯc i contains
hฯa , ฯb , ฯc i ฯโฒ = hฯa , ฯb , ฯc i ฯ โ ฯa โช ฯx โ ฯc โช ฯy = 0.
Theorem 4.10. Let F be a field containing a primitive p-th root of unity. Let a, b and c be
elements in Fร . The triple Massey product hฯ a , ฯb , ฯc i contains 0 whenever it is defined.
Proof. Assume that hฯ a , ฯb , ฯc i is defined. We can also assume that a, b and c are not in
( Fร ) p .
Case 1: Assume that a and c are linearly dependent modulo ( Fร ) p . Let ฯ = { ฯ ab , ฯbc }
be a defining system for hฯ a , ฯb , ฯc i. We have
resker ฯ a (hฯ a , ฯb , ฯc i ฯ ) = res ker ฯ a (ฯ a โช ฯbc + ฯ ab โช ฯc )
= res ker ฯa (ฯa ) โช res ker ฯa ( ฯbc ) + res ker ฯa ( ฯ ab ) โช res ker ฯa (ฯc )
= 0 โช res ker ฯa ( ฯbc ) + res ker ฯa ( ฯ ab ) โช 0
= 0.
By Proposition 3.1, hฯ a , ฯb , ฯc i ฯ = ฯ a โช ฯ x for some x โ Fร . We replace ฯbc by ฯโฒbc =
ฯbc โ ฯ x . (Here we consider ฯ x as an element in Z1 (GF , Z/pZ ).) Then ฯโฒ = { ฯ ab , ฯโฒbc }
is also a defining system for the triple Massey product hฯ a , ฯb , ฯc i. Hence hฯ a , ฯb , ฯc i
contains
hฯa , ฯb , ฯc i ฯโฒ = hฯa , ฯb , ฯc i ฯ โ ฯa โช ฯx = 0.
Case 2: Assume that a and b are linearly dependent modulo ( Fร ) p . Then ฯb = ฮปฯ a ,
for some ฮป โ Z/pZ. By the linearity of Massey products, we have
ฮปhฯ a , ฯ a , ฯc i โ hฯ a , ฮปฯ a , ฯc i = hฯ a , ฯb , ฯc i.
(See [Fe, Lemma 6.2.4 (ii)].) So it is enough to show that hฯ a , ฯ a , ฯc i contains 0. If p = 2
then hฯ a , ฯb , ฯc i contains 0 by [MT1, Theorem 1.2]. So we may and shall assume that
p > 2. Since then our coefficients are F p of characteristic not 2, we can divide by 2 and
define
ฯ2
ฯ aa := โ a .
2
Then it is straightforward to check that
dฯ aa (ฯ, ฯ ) = ฯ aa (ฯ) + ฯ aa (ฯ ) โ ฯ aa (ฯฯ ) = ฯ a (ฯ)ฯ a (ฯ ) = ฯ a โช ฯ a (ฯ, ฯ ).
TRIPLE MASSEY PRODUCTS VANISH OVER ALL FIELDS
17
We pick any map ฯ ac : GF โ Z/pZ such that dฯ ac = ฯ a โช ฯc . Then { ฯ aa , ฯ ac } is a
defining system for hฯ a , ฯ a , ฯc i. We have
resker ฯ a (hฯ a , ฯ a , ฯc i ฯ ) = res ker ฯ a (ฯ a โช ฯ ac + ฯ aa โช ฯc )
= res ker ฯa (ฯa ) โช res ker ฯa ( ฯ ac ) + res ker ฯa ( ฯ aa ) โช res ker ฯa (ฯc )
= 0 โช res ker ฯa ( ฯ ac ) + 0 โช res ker ฯa (ฯc )
= 0.
By Proposition 3.1, hฯ a , ฯ a , ฯc i ฯ = ฯ a โช ฯ x for some x โ Fร . Use the same argument as
in Case 1, this implies that hฯ a , ฯ a , ฯc i contains 0. (This also follows from a more general
result [Sha2, Proposition 4.2]. See also Theorem 5.9.)
Case 3: Assume that a and c are linearly independent and that a and b are linearly independent. Then Corollary 4.9 says that the triple Massey product hฯ a , ฯb , ฯc i contains
0.
Remark 4.11. In Case 3 in the above proof, we can show that a specific element of the
Massey triple product vanishes. This leads to another proof for this case and hence for
Theorem 4.10, which avoids using Corollary 4.5.
Theorem 4.12. There exists f a , f c in Fร such that ( f a A0 , B, f c C0 ) is a coboundary.
Proof. As in the proof of Lemma 4.4, there exists e โ Eร such that B =
By Lemma 4.2, we have
ฯa ( A0 )
= Nฯc ( B) = Nฯc
A0
ฯa ฯc (e)
e
=
ฯa ฯc (e)
.
e
ฯa ( Nฯc (e))
.
Nฯc (e)
This implies that
Hence
Nฯc (e)
= ฯa
A0
Nฯc (e)
A0
.
โ
โ
Nฯc (e)
โ F ( p c )ร โฉ F ( p a )ร = F ร .
A0
Therefore, there exists f a โ Fร such that Nฯc (e) = A0 f a .
Similarly, by Lemma 4.2, we have
ฯc (C0 )
ฯa ฯc (eโ1 )
ฯc ( Nฯa (eโ1 ))
โ1
= Nฯa ( B ) = Nฯa
.
=
C0
e โ1
Nฯa (eโ1 )
This implies that
Nฯa (eโ1 )
Nฯa (eโ1 )
= ฯc
.
C0
C0
Hence
โ
โ
Nฯa (eโ1 )
โ F ( p a )ร โฉ F ( p c )ร = F ร .
C0
JรN MINรCฬ AND NGUYแปN DUY TรN
18
Therefore, there exists f c โ Fร such that Nฯa (eโ1 ) = C0 f c .
Let C1 = ฯc (e) and C2 = eโ1 . Then we have
ฯa (ฯc (e)) eโ1
ฯa (C1 ) C2
ฯa ฯc (e)
=
,
=
e
ฯc (e) ฯc (eโ1 )
C1 ฯc (C2 )
Nฯc (C1 ) = Nฯc (ฯc (e)) = Nฯc (e) = A0 f a ,
B=
Nฯa (C2 ) = Nฯa (eโ1 ) = C0 f c .
This implies that ( A0 f a , B, C0 f c ) is in B2 (G, Eร ).
As a consequence of Theorem 4.12, we obtain another proof for Case 3 in the proof of
Theorem 4.10.
Another proof for Case 3 in Proof of Theorem 4.10. Let A = f a A0 and C = f c C0 so that we
use the same notation as before. We replace ฯbc by ฯโฒbc = ฯbc โ ฯ x . Then ฯโฒ = { ฯ ab , ฯโฒbc }
is also a defining system for the triple Massey product hฯ a , ฯb , ฯc i. Corollary 4.8 implies
that i (hฯ a , ฯb , ฯc i) contains
i (hฯ a , ฯb , ฯc i ฯโฒ ) = i (hฯ a , ฯb , ฯc i ฯ ) โ i (ฯ a โช ฯ x )
= inf([ A, B, C]) + (a, x ) โ (a, x ) = inf([ A, B, C]).
Hence hฯ a , ฯb , ฯc i contains i โ1 (inf([ A, B, C])) = 0.
4.2. Embedding problems and triple Massey products over an arbitrary field. A weak
embedding problem E for a profinite group ฮ is a diagram
E :=
ฮ
ฮฑ
U
f
/
Uฬ
which consists of profinite groups U and Uฬ and homomorphisms ฮฑ : ฮ โ Uฬ, f : U โ Uฬ
with f being surjective. (All homomorphisms of profinite groups considered in this
paper are assumed to be continuous.) If in addition ฮฑ is also surjective, we call E an
embedding problem.
A weak solution of E is a homomorphism ฮฒ : ฮ โ U such that f ฮฒ = ฮฑ. We call E
a finite weak embedding problem if group U is finite. The kernel of E is defined to be
N := ker( f ).
Let U4 (F p ) be the group of all upper-triangular unipotent 4 ร 4-matrices with entries in F p . Let Z be the subgroup of all such matrices with all off-diagonal entries
being 0 except at position (1, 4). We may identify U4 (F p )/Z with the group Uฬ4 (F p ) of
all upper-triangular unipotent 4 ร 4-matrices with entries over F p with the (1, 4)-entry
omitted. For any representation ฯ : G โ U4 (F p ) and 1 โค i < j โค 4, let ฯij : G โ F p
be the composition of ฯ with the projection from U4 (F p ) to its (i, j)-coordinate. We use
similar notation for representations ฯฬ : G โ Uฬ4 (F p ). Note that for each i = 1, 2, 3, ฯi,i +1
(resp., ฯฬi,i +1) is a group homomorphism.
TRIPLE MASSEY PRODUCTS VANISH OVER ALL FIELDS
19
Recall that we have the following result ([MT2, Lemma 3.1]), which is a direct consequence of [Dwy, Theorem 2.4].
Lemma 4.13. Let G be a profinite group, and p a prime number. Then the following statements
are equivalent:
(1) G has the vanishing triple Massey product property with respect to F p .
(2) For every homomorphism ฯฬ : G โ Uฬ4 (F p ), the finite weak embedding problem
0
M
/
t
yt t
(ฯฬ12 ,ฯฬ23 ,ฯฬ34 )
U 4 (F p )
/
tG
tt
(F p )3
/
1,
/
has a weak solution, i.e., (ฯฬ12 , ฯฬ23 , ฯฬ34 ) can be lifted to a homomorphism ฯ : G โ U4 (F p ).
Proposition 4.14. Let G be a profinite group, and p a prime number. Let H be an open subgroup
of G whose index is coprime to p. Assume that H has the vanishing triple Massey product
property with respect to F p , then G also has the vanishing triple Massey product property with
respect to F p .
Proof. We shall prove the condition (2) in Lemma 4.13 for the group G.
Let ฯฬ : G โ Uฬ4 (F p ) be any homomorphism. We consider the weak embedding problem
(E )
G
0
/
M
/
U 4 (F p )
/
(ฯฬ12 ,ฯฬ23 ,ฯฬ34 )= :ฯ
(F p )3
/
1.
Then by the assumption and by Lemma 4.13, the weak embedding problem (E | H )
(E | H )
0
/
M
/
yt t
t
t
tt
H
U 4 (F p )
/
ฯ| H
(F p )3
/
1,
which is induced from (E ), has a weak solution. Let วซ be the cohomology class in
H 2 ((F p )3 , M) which corresponds to the extension
( a12 ,a23 ,a34 )
1 โโ M โโ U4 (F p ) โโโโโโโ (F p )3 โโ 1.
We have the following commutative diagram
H 2 ((F p )3 , M)
ฯโ
/
H 2 (G, M)
res
H 2 ((F
p
)3 , M )
(ฯ| H
)โ
/
H 2 ( H, M).
JรN MINรCฬ AND NGUYแปN DUY TรN
20
In particular, (ฯ | H )โ (วซ) = res(ฯโ (วซ)). Since the weak embedding problem (E | H ) has
a weak solution, we see that (ฯ | H )โ (วซ) = 0 by Hoechsmannโs lemma ([NSW, Chapter
3, ยง5, Proposition 3.5.9]). (Note that the statement of Hoechsmannโs lemma in [NSW]
deals with embedding problems, but its proof goes well with weak embedding problems.) Since [ G : H ] is coprime to p and the order of M is a p-power, we see that the
restriction map res : H 2 (G, M) โโ H 2 ( H, M) is injective by [Se2, Chapter I, ยง2, Corollary to Proposition 9]. Hence ฯโ (วซ) = 0. Hoechsmannโs lemma implies that the weak
embedding problem (E ) has a weak solution, and we are done.
Theorem 4.15. Let F be any field and p a prime number. Then the absolute Galois group GF of
F has the vanishing triple Massey product property with respect to F p
Proof. If charF = p, then the maximal pro-p-quotient GF ( p) of GF is a free pro-p-group.
Therefore GF ( p) and GF has the vanishing triple Massey product property with respect
to F p .
Now we assume that charF 6= p. Let ฮพ be a primitive p-th root of unity, and let
K = F(ฮพ ). Then K/F is a finite extension of degree d, and d divides p โ 1. This implies
that [ GF : GK ] = d is coprime to p. Since GK has the vanishing triple Massey product property by Theorem 4.10, it follows that GF also has the vanishing triple Massey
product property by Proposition 4.14.
4.3. Some consequences. In this subsection we assume that p is an odd prime number.
The case when p = 2 is treated in [MT1, Theorem 1.3 and Theorem 1.4].
Recall that for a profinite group G and a prime number p, the Zassenhaus (p-)filtration
(G(n) ) of G is defined inductively by
G(1) = G,
p
G(n) = G(โn/pโ)
โ
[ G( i ) , G( j ) ] ,
i + j=n
where โn/pโ is the least integer which is greater than or equal to n/p. (Here for two
closed subgroups H and K of G, [ H, K ] means the smallest closed subgroup of G containing the commutators [ x, y] = x โ1 yโ1 xy, x โ H, y โ K. Similarly, H p means the
smallest closed subgroup of G containing the p-th powers x p , x โ H.)
Let ( I, <) be a well-ordered set. Let S be a free pro-p-group on a set of generators
xi , i โ I (see [NSW, Definition 3.5.14]). Let S(i ) , i = 1, 2, . . . be the p-Zassenhaus filtration
of S. Then any element r in S(2) may be written uniquely as
๏ฃฑ
3ai
bij
๏ฃด
๏ฃด
โ [[ xi , x j ], xk ]]cijk ยท rโฒ , if p = 3,
๏ฃฒ โ [ xi , x j ] โ xi
iโ I
i< j
i < j,kโค j
(1)
r=
b
ij
๏ฃด
โ [[ xi , x j ], xk ]]cijk ยท rโฒ , if p 6= 3,
๏ฃด
๏ฃณ โ [ xi , x j ]
i< j
i < j,kโค j
where ai , bij , cijk โ {0, 1, . . . , p โ 1} and r โฒ โ S(4) . For convenience we call (1) the canonical decomposition modulo S(4) of r (with respect to the basis ( xi )) and we also set
uij = bij if i < j, and uij = b ji if j < i.
TRIPLE MASSEY PRODUCTS VANISH OVER ALL FIELDS
21
We denote by GF ( p) the maximal pro-p-quotient of an absolute Galois group GF of a
given field F.
Theorem 4.16. Let R be a set of elements in S(2) . Assume that there exists an element r in R
and distinct indices i, j, k with i < j, k < j such that:
(i) In (1) the canonical decomposition modulo S(4) of r, uij = ukj = uki = ukl = u jl = 0
for all l 6= i, j, k, and cijk 6= 0; and
(ii) for every s โ R which is different from r, the factors [ xk , xi ], [ xi , xk ] and [ xi , x j ] do not
occur in the canonical decomposition modulo S(4) of s.
Then G = S/hRi is not realizable as GF ( p) for any field F.
Proof. This follows immediately from Theorem 4.15, [MT1, Theorem 7.8] and [MT1,
Corollary 3.5].
Theorem 4.17. Let R be a set of elements in S(2) . Assume that there exists an element r in R
and distinct indices i < j such that:
(i) In (1) the canonical decomposition modulo S(4) of r, uij = uil = u jl = 0, for all l 6= i, j
and ciji 6= 0 (respectively, cijj 6= 0); and
(ii) for every s โ R which is different from r, the factor [ xi , x j ] does not occur in the canonical
decomposition modulo S(4) of s.
Then G = S/hRi is not realizable as GF ( p) for any field F.
Proof. This follows immediately from Theorem 4.15, [MT1, Theorem 7.12] and [MT1,
Corollary 3.5].
5. VANISHING
OF SOME HIGHER
M ASSEY
PRODUCTS
5.1. Massey products. Let G be a profinite group and p a prime number. We consider
the finite field F p as a trivial discrete G-module. Let C โข = (Cโข (G, F p ), โ, โช) be the differential graded algebra of inhomogeneous continuous cochains of G with coefficients
in F p [NSW, Ch. I, ยง2]. We write H i (G, F p ) for the corresponding cohomology groups.
We denote by Z1 (G, F p ) the subgroup of C1 (G, F p ) consisting of all 1-cocycles. Because
we use trivial action on the coefficients F p , Z1 (G, F p ) = H 1 (G, F p ) = Hom(G, F p ). (See
[MT1, MT2] and references therein for more general setups.)
Let n โฅ 3 be an integer. Let a1 , . . . , an be elements in H 1 (G, F p ) = Z1 (G, F p ) โ
C1 (G, F p ).
Definition 5.1. A collection M = { aij | 1 โค i < j โค n + 1, (i, j) 6= (1, n + 1)} of elements
aij of C 1 (G, F p ) is called a defining system for the n-fold Massey product ha1 , . . . , an i if the
following conditions are fulfilled:
(1) ai,i +1 = ai for all i = 1, 2 . . . , n.
j โ1
(2) โaij = โl =i +1 ail โช al j for all i + 1 < j.
22
JรN MINรCฬ AND NGUYแปN DUY TรN
Then โnk=2 a1k โช ak,n+1 is a 2-cocycle. Its cohomology class in H 2 is called the value of
the product relative to the defining system M, and is denoted by ha1 , . . . , an iM . The nfold Massey product ha1 , . . . , an i itself is the subset of H 2 (G, F p ) consisting of all elements
which can be written in the form ha1 , . . . , an iM for some defining system M.
When n = 3 we will speak about a triple Massey product. Note that in this case
the triple Massey product ha1 , a2 , a3 i is defined if and only if a1 โช a2 = a2 โช a3 = 0 in
H 2 (G, F p ).
For some convenience, we introduce the following definition.
Definition 5.2. Let n โฅ 1 be an integer. Let a1 , . . . , an be elements in H 1 (G, F p ). A
collection M = { aij | 1 โค i < j โค n + 1} of elements aij of C 1 (G, F p ) is called a complete
defining system for the n-tuple (a1 , . . . , an ) if the following conditions are fulfilled:
(1) ai,i +1 = ai for all i = 1, 2 . . . , n.
j โ1
(2) โaij = โl =i +1 ail โช al j for all i + 1 < j.
Note that for n = 1, M = { a12 := a1 } is a complete defining system for (a1 ). For
n = 2, (a1 , a2 ) has a complete defining system if and only if a1 โช a2 = 0. For n โฅ 3,
(a1 , . . . , an ) has a complete defining system if and only if the n-fold Massey product
ha1 , . . . , an i is defined and contains 0.
5.2. Vanishing of some higher Massey products. Let A be a unital commutative ring.
Let n be a positive integer. Assume that every integer 1 โค k โค n is invertible in A.
We have the following binomial polynomials in the ring A[ X ] of polynomials in one
variable X and with coefficients in A:
X ( X โ 1) ยท ยท ยท ( X โ k + 1)
X
X
=
= 1 and
, 1 โค k โค n.
k
0
k!
We have the following elementary lemma.
Lemma 5.3. Let the notation be as above. For 1 โค k โค n, one has
k
Y
X
X+Y
โ A[ X, Y ].
=โ
kโl
l
k
l =0
Here A[ X, Y ] is the ring of polynomials with coefficients A in two variables X and Y.
Remark 5.4. Let the notation be as above. Then for 1 โค k โค n, one also has
k
X l Y kโ l
( X + Y )k
=โ
โ A[ X, Y ].
k!
l!
(
k
โ
l
)
!
l =0
Xk
And all results presented below can be stated and proved by using
(with some obk!
X
.
vious modifications) instead of using
k
TRIPLE MASSEY PRODUCTS VANISH OVER ALL FIELDS
23
1
1
For any element ฯ in
(G, F p ) = Z (G, F p ) = Hom(G, F p ) and for each k =
H
ฯ
โ C1 (G, F p ) by
0, . . . , p โ 1, we define
k
ฯ(ฯ )
ฯ
, โฯ โ G.
(ฯ ) =
k
k
Corollary 5.5. Let ฯ be an element in Hom(G, F p ). Let k be an integer with 1 โค k < p. Then
kโ1
ฯ
ฯ
ฯ
โ C2 (G, F p ).
โช
=โโ
d
k
โ
l
l
k
l =1
Proof. By Lemma 5.3, we have
ฯ
ฯ
ฯ
ฯ
(ฯฯ )
(ฯ ) โ
(ฯ ) +
(ฯ, ฯ ) =
d
k
k
k
k
ฯ(ฯฯ )
ฯ(ฯ )
ฯ(ฯ )
โ
+
=
k
k
k
ฯ(ฯ ) + ฯ(ฯ )
ฯ(ฯ )
ฯ(ฯ )
โ
+
=
k
k
k
k
ฯ(ฯ )
ฯ(ฯ )
ฯ(ฯ )
ฯ(ฯ )
โโ
+
=
kโl
l
k
k
l =0
kโ1
ฯ
ฯ
=โโ
(ฯ, ฯ ), โฯ, ฯ โ G,
โช
kโl
l
l =1
as desired.
Corollary 5.6. Let ฯ be an element in H 1 (G, F p ) = Hom(G, F p ). Let k < p be a positive
integer. Then the system
ฯ
| 1 โค i < j โค k+1
M= โ
jโi
is a complete defining system for the n-tuple (โฯ, โฯ, . . . , โฯ) (k copies of โฯ).
Proof. This follows immediately from Corollary 5.5.
Proposition 5.7. Let F be a field containing a primitive p-th root of unity. Let a and b be
elements which are linearly independent modulo ( Fร ) p . Let k < p be a positive integer. Assume
that ฯ a โช ฯb = 0. Then the (k + 1)-fold Massey product hโฯb , โฯ a , . . . , โฯ a i (k copies of
โฯa ) is defined and has a complete defining system of the form M = {aij โ C1 (G, F p ) | 1 โค
i < j โค k + 2}, where
ฯa
, for all 2 โค i < j โค k + 2.
aij = โ
jโi
JรN MINรCฬ AND NGUYแปN DUY TรN
24
Proof. By Corollary 5.6, the system { aij := โ( jฯโai) | 2 โค i < j โค k + 2} is a complete
defining system for the k-tuple (โฯ a , . . . , โฯ a ). We set a1,2 = โฯb . We shall prove by
induction on j = 3, 4, . . . , k + 2 that there exist a13 , a14 , . . . , a1j โ C1 (GF , F p ) such that
da1r =
r โ1
โ a2l โช alr , โr = 3, 4, . . . , j.
l =2
Then this will imply immediately that the system { aij | 1 โค i < j โค k + 2} is a complete
defining sytem for the (k + 1)-tuple (โฯb , โฯ a , . . . , โฯ a ).
If j = 3, then since ฯ a โช ฯb = 0, there exists ฯba โ C1 (GF , F p ) such that dฯba = ฯb โช ฯ a .
We set a1,3 := ฯba . Then
da1,3 = ฯb โช ฯ a = a1,2 โช a2,3 .
Now assume that j > 3. By induction hypothesis there exist b13 , b14 , . . . , b1j โ C1 (GF , F p )
such that
db1r =
Then the system
r โ1
โ a1l โช alr , โr = 3, 4, . . . , j.
l =2
N := {a12 , b13 , . . . , b1j , and aยตฮฝ with 2 โค ยต < ฮฝ โค j + 1}
is a defining system for the j-fold Massey product hโฯb , โฯ a , . . . , โฯ a i. Then the value
of this Massey product with respect to N is
hฯb , ฯa , . . . , ฯa iN = a12 โช a2,j+1 + b13 โช a3,j+1 + ยท ยท ยท + b1j โช a j,j+1
ฯa
ฯa
ฯa
.
+ ยท ยท ยท + b1j โช โ
+ b13 โช โ
= โฯb โช โ
1
jโ2
jโ1
For the ease of notation, we denote res ker ฯ a just by res a . Then we have
res a (hโฯb , โฯ a , . . . , โฯ a iN )
ฯa
ฯa
ฯa
)
) + ยท ยท ยท + res a (b1j ) โช res a (โ
) + res a (b13 ) โช res a (โ
= res a (โฯb ) โช res a (โ
1
jโ2
jโ1
= res a (โฯb ) โช 0 + res a (b13 ) โช 0 + ยท ยท ยท + res a (b1j ) โช 0 = 0.
Then by Proposition 3.1, there exists x โ Fร such that
ฯa
ฯa
ฯa
ฯa
โ H 2 (G, F p ).
= โฯx โช โ
+ ยท ยท ยท + b1j โช โ
+ b13 โช โ
โฯb โช โ
1
1
jโ2
jโ1
Hence there exists a1,j+1 in C1 (G, F p ) such that
ฯa
ฯa
ฯa
ฯa
= da1,j+1 .
+ (b1j + ฯx ) โช โ
+ ยท ยท ยท + b1,jโ1 โช โ
+ b13 โช โ
ฯb โช โ
1
2
jโ2
jโ1
TRIPLE MASSEY PRODUCTS VANISH OVER ALL FIELDS
25
We set a1r := b1r for r = 3, 4, . . . , j โ 1, and a1j := b1j + ฯ x . Then we have
da1r = db1r =
r โ1
โ a1l โช alr , โr = 3, 4, . . . , j,
l =2
and
j
da1,j+1 =
โ a1l โช al,j+1,
l =2
as desired.
Proposition 5.8. Let F be a field containing a primitive p-th root of unity. Let a and b be
elements which are linearly independent modulo ( Fร ) p . Let k < p be a positive integer. Assume that ฯ a โช ฯb = 0. Then the (k + 2)-fold Massey product hโฯ a , โฯb , โฯ a , . . . , โฯ a i
(k + 1 copies of โฯ a ) is defined and has a complete defining system of the form M = { aij โ
C1 (G, F p ) | 1 โค i < j โค k + 3}, where
ฯa
, for all 3 โค i < j โค k + 3.
aij = โ
jโi
Proof. By Proposition 5.7, there exists a system { aij โ C1 (G, F p ) | 2 โค i < j โค k + 3}
such that it is a complete defining system for the k + 1-tuple (โฯb , โฯ a , . . . , โฯ a ) and
that
ฯa
, for all 3 โค i < j โค k + 3.
aij = โ
jโi
We set a1,2 = โฯ a . We shall prove by induction on j = 3, 4, . . . , k + 3 that there exist
a13 , a14 , . . . , a1j โ C1 (GF , F p ) such that
da1r =
r โ1
โ a2l โช alr , โr = 3, 4, . . . , j.
l =2
Then this will imply immediately that the system { aij | 1 โค i < j โค k + 3} is a complete
defining system for the (k + 2)-tuple (โฯ a , โฯb , โฯ a , . . . , โฯ a ).
If j = 3, then since ฯ a โช ฯb = 0, there exists ฯ ab โ C1 (GF , F p ) such that dฯ ab = ฯ a โช ฯb .
We set a1,3 := ฯ ab . Then
da1,3 = ฯ a โช ฯb = a1,2 โช a2,3 .
Now assume that j > 3. By induction hypothesis there exist b13 , b14 , . . . , b1j โ C1 (GF , F p )
such that
db1r =
Then the system
r โ1
โ a1l โช alr , โr = 3, 4, . . . , j.
l =2
N := {a12 , b13 , . . . , b1j , and aยตฮฝ with 2 โค ยต < ฮฝ โค j + 1}
JรN MINรCฬ AND NGUYแปN DUY TรN
26
is a defining system for the j-fold Massey product hโฯb , โฯ a , . . . , โฯ a i. Then the value
of this Massey product with respect to N is
hโฯa , โฯb , โฯa , . . . , โฯa iN
= a12 โช a2,j+1 + b13 โช a3,j+1 + ยท ยท ยท + b1j โช a j,j+1
ฯa
ฯa
ฯa
.
+ ยท ยท ยท + b1j โช โ
+ b13 โช โ
= โฯa โช a2,j+1 + b13 โช โ
1
jโ2
jโ1
For the ease of notation, we denote res ker ฯ a just by res a . Then we have
res a (hโฯ a , โฯb , โฯ a , . . . , โฯ a iN )
ฯa
ฯa
)
) + ยท ยท ยท + res a (b1j ) โช res a (โ
= res a (โฯa ) โช res a (a2,j+1 ) + res a (b13 ) โช res a (โ
1
jโ2
= 0 โช res a (a2,j+1 ) + res a (b13 ) โช 0 + ยท ยท ยท + res a (b1j ) โช 0 = 0.
By Proposition 3.1, there exists x โ Fร such that
ฯa
ฯa
ฯa
โ H 2 (G, F p ).
= โฯx โช โ
+ ยท ยท ยท + b1j โช โ
โฯa โช a2,j+1 + b13 โช โ
1
1
jโ2
Hence there exists a1,j+1 in C1 (G, F p ) such that
ฯa
ฯa
ฯa
= da1,j+1 .
+ (b1j + ฯx ) โช โ
+ ยท ยท ยท + b1,jโ1 โช โ
โฯa โช a2,j+1 + b13 โช โ
1
2
jโ2
We set a1r := b1r for r = 3, 4, . . . , j โ 1, and a1j := b1j + ฯ x . Then we have
da1r = db1r =
r โ1
โ a1l โช alr , โr = 3, 4, . . . , j,
l =2
and
j
da1,j+1 =
as desired.
โ a1l โช al,j+1,
l =2
Theorem 5.9. Let F be a field containing a primitive p-th root of unity. Let a and b be elements
which are linearly independent modulo ( Fร ) p . Let k < p be a positive integer. Assume that
ฯ a โช ฯb = 0. Then we have
(1) The (k + 1)-fold Massey products hฯb , ฯ a , . . . , ฯ a i and hฯ a , . . . , ฯ a , ฯb i (k copies of ฯ a )
are defined and contain 0.
(2) The (k + 2)-fold Massey products hฯ a , ฯb , ฯ a , . . . , ฯ a i and hฯ a , . . . , ฯ a , ฯb , ฯ a i (k + 1
copies of ฯ a ) are defined and contain 0.
Proof. We recall the following formal property of Massey products. If ha1 , a2 , . . . , an i is
defined, then han , anโ1 , . . . , a1 i is defined and
ha1 , a2 , . . . , an i = ยฑhan , anโ1 , . . . , a1 i.
TRIPLE MASSEY PRODUCTS VANISH OVER ALL FIELDS
27
(See [Kra, Theorem 8].) Observe also that โฯ a = ฯ aโ1 for every a โ Fร . The statement
then follows from the two previous propositions.
R EFERENCES
[AS1]
[AS2]
[CKM]
[Dwy]
[Ef]
[EMa1]
[EMa2]
[EM1]
[EM2]
[Fe]
[DGMS]
[HW]
[Kra]
[Ma]
[Me]
[MSp]
[MT1]
[MT2]
[MT3]
[MT4]
[NSW]
[Se1]
[Se2]
E. Artin and O. Schreier, Algebraische Konstruktion reeller Kรถrper, Abh. Math. Sem. Univ. Hamburg 5 (1927) pp. 85-99. Reprinted in: Artinโs Collected Papers (Eds. S. Lang and J. Tate),
Springer-Verlag, New York, 1965, pp. 258-272.
E. Artin and O. Schreier, Eine Kennzeichnung der reell abgeschlossenen Kรถrper, Abh. Math. Sem.
Univ. Hamburg 5 (1927) pp. 225-231. Reprinted in: Artinโs Collected Papers (Eds. S. Lang
and J. Tate), Springer-Verlag, New York, 1965, pp. 289-295.
J.-P. Colliot-Thรฉlรจne, D. Kanevsky, J.P. Sansuc, Arithmรฉtique des surfaces cubiques diagonales,
Diophantine approximation and transcendence theory (Bonn, 1985), 1-108, Lecture Notes in
Math., 1290, Springer, Berlin, 1987.
W. G. Dwyer, Homology, Massey products and maps between groups, J. Pure Appl. Algebra 6
(1975), no. 2, 177-190.
I. Efrat, The Zassenhaus filtration, Massey products, and representations of profinite groups, Adv.
Math. 263 (2014), 389-411.
I. Efrat and E. Matzri, Vanishing of Massey products and Brauer groups, Can. Math. Bull. 58
(2015), 730-740.
I. Efrat and E. Matzri, Triple Massey products and absolute Galois groups, to appear in J. Eur.
Math. Soc., arXiv:1412.7265.
I. Efrat and J. Minรกcฬ, On the descending central sequence of absolute Galois groups, Amer. J. Math.
133 (2011), no. 6, 1503-1532.
I. Efrat and J. Minรกcฬ, Galois groups and cohomological functors, to appear in Trans. Amer. Math.
Soc., arXiv:1103.1508.
R. Fenn, Techniques of Geometric Topology, London Math. Soc. Lect. Notes 57 Cambridge 1983.
P. Deligne, P. Griffiths, J. Morgan and D. Sullivan, Real homotopy theory of Kรคhler manifolds,
Invent. Math. 29 (1975), 245-274.
M. Hopkins and K. Wickelgren, Splitting varieties for triple Massey products, J. Pure Appl.
Algebra 219 (2015), 1304-1319.
D. Kraines, Massey higher products, Trans. Amer. Math. Soc. 124 (1996), 431-449.
E. Matzri, Triple Massey products in Galois cohomology, preprint (2014), arXiv:1411.4146.
A. Merkurjev, Essential p-dimension of PGL( p2 ), J. Amer. Math. Soc. 23 (2010), no. 3, 693-712.
J. Minรกcฬ and M. Spira, Witt rings and Galois groups, Ann. of Math. (2) 144 (1996), no. 1, 35-60.
J. Minรกcฬ and N. D. Tรขn, Triple Massey products and Galois theory, to appear in J. Eur. Math.
Soc., arXiv:1307.6624.
J. Minรกcฬ and N. D. Tรขn, The Kernel Unipotent Conjecture and Massey products on an odd rigid
field (with an appendix by I. Efrat, J. Minรกcฬ and N. D. Tรขn), Adv. Math. 273 (2015), 242-270.
J. Minรกcฬ and N. D. Tรขn, Triple Massey products over global fields, Doc. Math 20 (2015) 1467-1480.
J. Minรกcฬ and N. D. Tรขn, Construction of unipotent Galois extensions and Massey products,
preprint (2015) arXiv:1501.01346.
J. Neukirch, A. Schmidt and K. Wingberg, Cohomology of number fields, Grundlehren der
Mathematischen Wissenschaften [Fundamental Principles of Mathematical Sciences], 323,
Springer-Verlag, Berlin, 2000.
J.-P. Serre, Local fields, translated from the French by M. J. Greenberg, Graduate Texts in
Mathematics, 67, Springer-Verlag, New York-Berlin, 1979.
J.-P. Serre, Galois cohomology, translated from the French by P. Ion and revised by the author, corrected reprint of the 1997 English edition, Springer Monographs in Mathematics,
Springer-Verlag, Berlin, 2002.
JรN MINรCฬ AND NGUYแปN DUY TรN
28
[Sha1]
[Sha2]
[Ti]
[Vi]
[We]
[Wic]
R. Sharifi, Twisted Heisenberg representations and local conductors, Ph.D. thesis, The University
of Chicago (1999).
R. Sharifi, Massey products and ideal class groups, J. Reine Angew. Math. 603 (2007), 1-33.
J.-P. Tignol, Produits croisรฉs abรฉliens, J. Algebra 70 (1981), no. 2, 420-436.
F. R. Villegas, Relations between quadratic forms and certain Galois extensions, a manuscript, Ohio
State University, 1988, http://www.math.utexas.edu/users/villegas/osu.pdf.
E. Weiss, Cohomology of groups, Pure and Applied Mathematics, Vol. 34 Academic Press, New
York-London, 1969.
K. Wickelgren, n-nilpotent obstruction to ฯ1 sections of P1Q โ {0, 1, โ} and Massey products,
Galois Teichmรผller Theory and Arithmetic Geometry, proceedings for conferences in Kyoto
(October 2010) (H. Nakamura, F. Pop, L. Schneps and A. Tamagawa, eds.), Advanced Studies
in Pure Mathematics, vol. 63, Mathematical Society of Japan, 2012, 579-600.
D EPARTMENT OF M ATHEMATICS , W ESTERN U NIVERSITY, L ONDON , O NTARIO , C ANADA N6A 5B7
E-mail address: [email protected]
D EPARTMENT
M ATHEMATICS , W ESTERN U NIVERSITY, L ONDON , O NTARIO , C ANADA N6A 5B7
M ATHEMATICS , V IETNAM A CADEMY OF S CIENCE AND T ECHNOLOGY, 18 H OANG
Q UOC V IET, 10307, H ANOI - V IETNAM
E-mail address: [email protected]
OF
AND I NSTITUTE OF
| 4math.GR
|
1
Energy Storage Arbitrage in Real-Time
Markets via Reinforcement Learning
Hao Wang, Baosen Zhang
Department of Electrical Engineering, University of Washington, Seattle, WA 98195
arXiv:1711.03127v2 [cs.SY] 23 Feb 2018
Email: {hwang16,zhangbao}@uw.edu
Abstract
In this paper, we derive a temporal arbitrage policy for storage via reinforcement learning. Real-time price
arbitrage is an important source of revenue for storage units, but designing good strategies have proven to be difficult
because of the highly uncertain nature of the prices. Instead of current model predictive or dynamic programming
approaches, we use reinforcement learning to design an optimal arbitrage policy. This policy is learned through
repeated charge and discharge actions performed by the storage unit through updating a value matrix. We design a
reward function that does not only reflect the instant profit of charge/discharge decisions but also incorporate the
history information. Simulation results demonstrate that our designed reward function leads to significant performance
improvement compared with existing algorithms.
I. I NTRODUCTION
Energy storage can provide various services (e.g., load shifting, energy management, frequency regulation, and
grid stabilization) [1] to the power grid and its economic viability is receiving increasing attention. One of the
most discussed revenue sources for energy storage is real-time temporal arbitrage (i.e., charging at low prices
and discharging at higher prices), where storage units take advantage of the price spreads in real-time electricity
market prices to make profits over time [2]. This application has received significant attention from the research
community, especially since the growing penetration of intermittent renewable generations are resulting in more
volatile real-time electricity market prices [3]. However, even with this increase in price spread, it remains nontrivial
to design arbitrage policies that make significant (or even positive) profit [4]. The difficulties come from the fact
that future prices are unknown, difficult to forecast and may even be non-stationary [5, 6]. In this paper, we aim
to develop an arbitrage policy for energy storage in a data-driven framework by using reinforcement learning [7].
For example, arbitrage using energy storage has been studied in [2, 8โ11] (and see the references within). The
authors in [8] studied using sodium-sulfur batteries and flywheels for arbitrage in NYISO found the batteries can
be potentially profitable using data from 2001 to 2004. The authors in [2] analyzed a generic storage system in the
PJM real-time market and discovered that the arbitrage value was nearly doubled from 2002 to 2007 due to higher
price variations. The authors in [9] formulated a linear optimization problem to compare the arbitrage profits of 14
energy storage technologies in several major U.S. real-time electric markets. Similar studies have also been carried
out in different markets, e.g., Australian national electricity market [10] and European electricity markets [11].
February 27, 2018
DRAFT
2
Crucially, all of these studies assumed perfect knowledge of electricity prices and therefore cannot be implemented
as real-time arbitrage strategies.
Some recent works [12โ15] have started to explicitly take the electricity price uncertainty into account when
designing arbitrage strategies. The authors in [12] proposed a stochastic dynamic program to optimally operate an
energy storage system using available forecast. The authors in [13] formulated a stochastic optimization problem for
a storage owner to maximize the arbitrage profit under uncertainty of market prices. Both studies need to forecast
electricity prices and their performances heavily rely on the quality of the forecast. However, real-time market prices
are highly stochastic and notoriously difficult to forecast well [16]. To overcome the reliance on price predictions, the
authors in [14] employed approximate dynamic programming to derive biding strategy for energy storage in NYISO
real-time market without requiring prior knowledge of the price distribution. However, this strategy is often highly
computationally expensive. The authors in [15] proposed an online modified greedy algorithm for arbitrage which
is computationally straightforward to implement and does not require the full knowledge of price distributions. But
it needs to estimate the bounds of prices and assume that storages are โbig enoughโ, which is not always true in
practice.
The aforementioned challenges motivate us to develop an easily implementable arbitrage policy using reinforcement learning (RL). This policy is both price-distribution-free and outperforms existing ones. Without explicitly
assuming a distribution, our policy is able to operate under constantly changing prices that may be non-stationary.
Over time, by repeatedly performing charge and discharge actions under different real-time prices, the proposed
RL-based policy learns the best strategy that maximizes the cumulative reward. The key technical challenge turns
out to be the design of a good reward function that will guide the storage to make the correct decisions. Specifically,
we make the following two contributions in this paper:
1) We formulate the energy storage operation as a Markov decision process (MDP) and derive a Q-learning
policy [17] to optimally control the charge/discharge of the energy storage for temporal arbitrage in the
real-time market.
2) We design a reward function that does not only reflect the instant profit of charge/discharge decisions but also
incorporate historical information. Simulation results demonstrate that the designed reward function leads to
significant performance improvements compared to the natural instant reward function. In addition, using real
historical data, we show the proposed algorithm also leads to much higher profits than existing algorithms.
The remainder of the paper is ordered as follows. In Section II, we present the optimization problem for energy
storage arbitrage. In Section III, we provide a reinforcement learning approach to obtain the arbitrage policy.
Numerical simulations using real data are discussed in Section IV. Section V concludes this paper.
II. A RBITRAGE M ODEL AND O PTIMIZATION P ROBLEM
We consider an energy storage (e.g., a battery) operating in a real-time electricity market over a finite operational
horizon T = {1, ..., T }. The objective of the energy storage is to maximize its arbitrage profit by charging at low
prices and discharging when prices are high. We assume the energy storage is a price taker, and its operation will
not affect the market prices. We denote dt as the discharged power from the storage at time t and ct as the charged
February 27, 2018
DRAFT
3
power into the storage at time t. Let the real-time prices be denoted as pt . We formulate the Arbitrage Maximization
Problem (AMP) as follows:
max
T
X
1
pt ฮทd dt โ ct
ฮทc
t=1
subject to Et = Etโ1 + ct โ dt , โt โ T
(AMP)
(1)
Emin โค Et โค Emax , โt โ T
(2)
0 โค ct โค Cmax , t โ T
(3)
0 โค dt โค Dmax , t โ T
(4)
variables: ct , dt , โt โ T ,
where ฮทc โ (0, 1) and ฮทd โ (0, 1) denote the charge/discharge efficiencies. The constraint in (1) specifies the
dynamics of energy level Et over time, (2) constraints the amount of energy in the storage to be between Emin
and Emax , (3) and (4) bounds the maximum charge and discharge rates (denoted by Cmax and Dmax , respectively)
of the storage.
The optimization problem in AMP is a linear program, and we characterize its optimal solution in the next
lemma.
Lemma 1. The optimal charge and discharge profiles {c?t , d?t , โt โ T } satisfy
1) At least one of c?t or d?t is 0 at any time t;
2) c?t = {0, min{Cmax , Emax โ Etโ1 }},
d?t = {0, min{Dmax , Etโ1 โ Emin }}.
Lemma 1 states that the energy storage will not charge and discharge at the same time. Also, the optimal charge
and discharge power will hit the boundary per the operational constraints (1)-(4). Specifically, when the storage
decides to charge, it will charge either at the maximum charge rate Cmax or reaching the maximum energy level
Emax . Similarly, the discharge power will be either the maximum discharge rate Dmax or the amount to reach
the minimum energy level Emin . This binary charging/discharging structure will be important when we design the
reinforcement learning algorithm in the next section.
If the future prices are known, the optimization problem in AMP can be easily solved to provide an offline optimal
strategy for the charge/discharge decisions. However, the offline solution is only practical if a good price forecast is
available. In reality, future prices are not known in advance and the energy storage needs to make decisions based
on only the current and historical data. In other words, the charge/discharge decisions {cฬt , dหt } are functions of
price information up to the current time slot t, denoted by {p1 , ..., pt }:
{cฬt , dหt } = ฯ(p1 , ..., pt ),
(5)
where ฯ(ยท) is the arbitrage policy for maximizing the profit. Therefore, AMP is a constrained sequential decision
problem and can be solved by dynamic programming [18]. But the potentially high dimensionality the state space
February 27, 2018
DRAFT
4
makes dynamic programming computationally expensive, and potentially unsuitable for applications like real-time
price arbitrage. Moreover, price forecast in real-time markets is extremely challenging, as the mismatch between
power supply and demand can be attributed to many different causes.
III. R EINFORCEMENT L EARNING A LGORITHM
To solve the online version of AMP, we use reinforcement learning (RL). Reinforcement learning is a general
framework to solve problems in which [7]: (i) actions taken depend on the system states; (ii) a cumulative reward
is optimized; (iii) only the current state and past actions are known; (iv) the system might be non-stationary. The
energy storage arbitrage problem has all of the four properties: (i) different electricity prices lead to different actions
(e.g., charge/discharge), and the future energy storage level depends on past actions; (ii) the energy storage aims
at maximizing the total arbitrage profit; (iii) the energy storage does not have a priori knowledge of the prices,
while it knows the past history; (iv) the actual price profiles are non-stationary. In the following, we describe the
RL setup for AMP in more detail.
A. State Space
We define the state space of the energy arbitrage problem as a finite number of states. To be specific, the systemโs
state can be fully described by the current price pt and previous energy level Etโ1 . We discretize the price into M
intervals, and energy level into N intervals.
S = {1, ..., M } ร {1, ..., N },
where {1, ..., M } represents M even price intervals from the lowest to the highest, and {1, ..., N } denotes N energy
level intervals ranging from Emin to Emax .
B. Action Space
Per Lemma 1, the energy storage will not charge and discharge at the same time. Moreover, the optimal charge and
discharge power always reach their maximum allowable rates. We denote the maximum allowable charge/discharge
rates as Dฬmax = min{Dmax , Etโ1 โ Emin } and Cฬmax = min{Cmax , Emax โ Etโ1 }. Therefore, the action space
of the energy storage consists of three actions: charge at full rate, hold on, and discharge at full rate:
A = {โDฬmax , 0, Cฬmax },
where action a = โDฬmax denotes discharge either at maximum rate Dmax or unitl the storage hits the minimum
level Emin . Action a = Cฬmax denotes charge at maximum rate Cmax or until the storage reaches the maximum
level Emax .
C. Reward
At time t, after taking an action a โ A at state s โ S, the energy storage will receive a reward, such that the
energy storage knows how good its action is. According to the objective function of AMP, the energy storage aims
February 27, 2018
DRAFT
5
to maximize the arbitrage profit by charging at low prices and discharge at high prices. Therefore, we can define
the reward as
๏ฃฑ
๏ฃด
๏ฃด
โpt Cฬmax
๏ฃด
๏ฃด
๏ฃฒ
rt1 = 0
๏ฃด
๏ฃด
๏ฃด
๏ฃด
๏ฃณp Dฬ
t max
if charge
(Reward 1)
if hold on
if discharge
which is the instant reward of charge or discharge. If the energy storage charges at the rate of Cฬmax at time t, it
will pay at the spot price and reward is negative, i.e., โpt Cฬmax . In contrast, the energy storage discharges at the
rate of Dฬmax and will earn a revenue of pt Dฬmax .
Reward 1 is a straightforward and natural design, but is actually not very effective. The reason is that the negative
reward for charge makes the energy storage perform conservatively in the learning process and thus the arbitrage
opportunity is under explored. This motivates us to develop a more effective reward. To avoid conservative actions,
we introduce an average price in the reward. The idea comes from the basic principle of arbitrage: to charge at
low prices and discharge at high prices. The average price works as a simple indicator to determine whether the
current price is low or high compared to the historical values.
๏ฃฑ
๏ฃด
๏ฃด
(pt โ pt )Cฬmax
๏ฃด
๏ฃด
๏ฃฒ
rt2 = 0
๏ฃด
๏ฃด
๏ฃด
๏ฃด
๏ฃณ(p โ p )Dฬ
t
max
t
Specifically, the new reward is defined as
if charge
if hold on
(Reward 2)
if discharge
where the average price pt is calculated by
pt = (1 โ ฮท)ptโ1 + ฮทpt ,
(6)
in which ฮท is the smoothing parameter. Note that pt is not a simple average that weighs all past prices equally.
Instead, we use moving average in (6), such that we not only leverage the past price information but also adapt to
the current price change.
We see from Reward 2 that when the energy storage charges at a price lower than the average price (i.e.,
pt < pt ), it will get a positive reward (pt โ pt )Cฬmax > 0, otherwise it will receive a loss if the spot price is
greater. Similarly, Reward 2 encourages the energy storage to discharge at high price by giving a positive reward,
i.e., (pt โ pt )Dฬmax > 0. Reward 2 outperforms Reward 1 in exploring more arbitrage opportunities and achieving
higher profits. It also mitigates the non-stationarity of prices, since it weights the current price much heavier than
prices in the more distant past. We will show the numerical comparisons in Section IV.
D. Q-Learning Algorithm
With the state, action and reward defined, we obtain the real-time charge and discharge policy using Q-learning (a
popular subclass of RL algorithms [7]). Here the energy storage maintains a state-action value matrix Q, where
each entry Q(s, a) is defined for each pair of state s and action a. When the energy storage takes a charge/discharge
action under a spot price, the value matrix is updated as follows:
Q(s, a)t = (1 โ ฮฑ)Q(s, a)tโ1 + ฮฑ[rt + ฮณ max
Q(s0 , a0 )],
0
a
February 27, 2018
(7)
DRAFT
6
where the parameter ฮฑ โ (0, 1] is the learning rate weighting the past value and new reward. ฮณ โ [0, 1] is the
discount rate determining the importance of future rewards. After taking an action a, the state transits from s to s0 ,
and the energy storage updates the value matrix incorporating the instant reward rt (e.g., Reward 1 or 2) and the
future value maxa0 Q(s0 , a0 ) in state s0 . Over time, the energy storage can learn the value each action in all states.
When Q(s, a) converges to the optimal state-action values, we obtain the optimal arbitrage policy. Specifically, the
Q-learning algorithm can derive an arbitrage policy for (5) as
a? = ฯ(s) = arg max Q(s, a),
a
(8)
which is the optimal arbitrage policy guranteed for finite MDP [17]. For any state s, the energy storage always
chooses the best action a? which maximizes the value matrix Q(s, a).
Algorithm 1 Q-learning for energy storage arbitrage
1:
Initialization: In each time slot t โ {1, ..., T }, set the iteration count k = 1, ฮฑ = 0.5, ฮฑ = 0.9, and = 0.9.
Initialize the Q-matrix, i.e., Q = 0.
2:
repeat
3:
Step1: Observe state s based on price and energy level;
4:
Step2: Decide the best action a (using -greedy method) based on Q(s, a);
5:
Step3: Calculate the reward (using Reward 1 or 2);
6:
Step4: Update Q(s, a) according to (7) and energy level in (1);
7:
s โ s0 and k โ k + 1;
8:
until end of operation, i.e., t = T .
9:
end
The step-by-step Q-learning algorithm for energy arbitrage is presented in Algorithm 1. To avoid the learning
algorithm getting stuck at sub-optimal solutions, we employ -greedy [17]. The algorithm not only exploits the best
action following (8) but also explores other actions, which could be potentially better. Specifically, using -greedy,
the algorithm will randomly choose actions with probability โ [0, 1], and choose the best action in (8) with
probability 1 โ .
IV. N UMERICAL R ESULTS
In this section, we evaluate two reward functions and also compare our algorithm to a baseline in [15] under both
synthetic prices and realistic prices. For synthetic prices, we generate i.i.d. (independent and identically distributed)
prices, and for the realistic price, we use hourly prices from ISO New England real-time market [19] from January
1, 2016 to December 31, 2017. The realistic price is depicted in Figure 1. We see that the averaged price is flat
but the instantaneous prices fluctuate significantly with periodic spikes.
February 27, 2018
DRAFT
7
1200
Real-time price
Average price
Price ($/MW)
1000
800
600
400
200
0
-200
0
1000
2000
3000
4000
5000
6000
7000
8000 8784
Time (hour)
Fig. 1: PJM Real-time price.
A. Synthetic Price
We first evaluate the two reward functions under synthetic price, which is uniformly distributed in [0, 1] over
1500 hours. We set Cmax = Dmax = 1, Emin = 0 and Emax = 1. The cumulative profits for both rewards are
depicted in Figure 2. Both profits stay flat over the first 300 hours, as the algorithm is exploring the environment
with different prices. Afterwards, the algorithm using Reward 2 starts to make profit and achieves 166% more than
Reward 1 in the end.
To further understand the how Reward 1 and Reward 2 affect the storage operation, we plot the evolution of
energy level over a 48 hour horizon in Fig. 3. We see that algorithm using Reward 1 performs conservatively while
Reward 2 makes the algorithm actively charge and discharge to take advantage of price spread. Therefore, Reward
2 leads to a more profitable arbitrage strategy.
B. Real Historical Price
We evaluate the two reward functions using realistic prices from ISO New England real-time market in 2016.
We plot the cummulative profits of two rewards during training in Figure 4. We see that Reward 1 fails to make
profit while using Reward 2 produces a high profit. This demonstrates the effectiveness of our designed reward: it
is able to adapt to price changes and makes profit continuously.
Cumulative profit ($)
150
100
50
Reward 1
Reward 2
0
0
500
1000
1500
Time (hour)
Fig. 2: Cumulative profits under synthetic prices.
February 27, 2018
DRAFT
8
Price ($/MW)
1
0.5
0
0
6
12
18
24
30
36
42
48
36
42
48
Time (hour)
Energy level (MWh)
(a) Synthetic price.
1
0.5
0
0
6
12
18
24
30
Time (hour)
Energy level (MWh)
(b) Energy level of algorithm using Reward 1.
1
0.5
0
0
6
12
18
24
30
36
42
48
Time (hour)
(c) Energy level of algorithm using Reward 2.
Fig. 3: Price and energy levels over a 48 hour period using reward 1 and reward 2 under synthetic prices.
We also plot the evolution of energy levels over a 48-hours operational horizon in Figure 5. We see that algorithm
using Reward 1 cannot capture the price differences but makes charge/discharge when the real-time price is flat.
In contrast, our algorithm using Reward 2 is able to charge at low prices at hours 2 and 29, hold the energy when
prices are low, and discharge at hours 12 and 44, respectively, when the price reaches a relatively high point.
Cumulative profit ($)
8000
Reward 1
Reward 2
6000
4000
2000
0
-2000
0
1000
2000
3000
4000
5000
6000
7000
8000 8784
Time (hour)
Fig. 4: Cumulative profits under real-time prices.
February 27, 2018
DRAFT
9
Price ($/MW)
100
50
0
0
6
12
18
24
30
36
42
48
36
42
48
Time (hour)
Energy level (MWh)
(a) Real-time price.
1
0.5
0
0
6
12
18
24
30
Time (hour)
Energy level (MWh)
(b) Energy level of algorithm using Reward 1.
1
0.5
0
0
6
12
18
24
30
36
42
48
Time (hour)
(c) Energy level of algorithm using Reward 2.
Fig. 5: Price and energy levels over a 48 hour horizon for reward 1 and reward 2 under historical data.
C. Comparison with baseline algorithm
Above discussion demonstrates that Reward 2 performs much better than Reward 1, and thus we stick to Reward
2 and compare our algorithm with a baseline algorithm called online modified greedy algorithm in [15]. This
algorithm uses a thresholding strategy to control charge and discharge in an online fashion. We configure the
parameters for the baseline according to [15]. The arbitrage profits of two algorithms are simulated on an 8โMWh
battery, with a charge/discharge rate of 1MW as depicted in Figure 6. The baseline algorithm can only get $5, 845,
while our algorithm earns $28, 027 that is 4.8 times of the baseline profit. The profit of the baseline decreases when
the charge/discharge rate increases to 2MW. But our algorithm achieves even a higher profit, i.e., $39, 690, which
is 8.6 times of the baseline profit $4, 603. The reason is that the baseline algorithm relies on the off-line estimate
of the price information and lacks adaptability to the real-time prices. Our algorithm updates the average price to
adapt to the price changes and thus performs better.
February 27, 2018
DRAFT
10
10 4
3
Baseline algorithm
Our algorithm
Cumulative profit ($)
Cumulative profit ($)
2.5
2
1.5
1
0.5
0
-0.5
0
10 4
4
1000 2000 3000 4000 5000 6000 7000
8760
Baseline algorithm
Our algorithm
3
2
1
0
-1
Time (hour)
0
1000 2000 3000 4000 5000 6000 7000
8760
Time (hour)
(a) 8MWh-1MW battery.
(b) 8MWh-2MW battery.
Fig. 6: Cumulative profits of the baseline algorithm in [15] and our algorithm.
V. C ONCLUSION
In this paper, we derive an arbitrage policy for energy storage operation in real-time markets via reinforcement
learning. Specifically, we model the energy storage arbitrage problem as an MDP and derive a Q-learning policy to
control the charge/discharge of the energy storage. We design a reward function that does not only reflect the instant
profit of charge/discharge decisions but also incorporate the history information. Simulation results demonstrate our
designed reward function leads to significant performance improvement and our algorithm achieves much more
profit compared with existing baseline method. We will consider self-discharge and degradation of battery in our
future work.
ACKNOWLEDGMENT
This work was partially supported by the University of Washington Clean Energy Institute.
R EFERENCES
[1] J. Eyer and G. Corey, โEnergy storage for the electricity grid: Benefits and market potential assessment guide,โ Sandia
National Laboratories, vol. 20, no. 10, p. 5, 2010.
[2] R. Sioshansi, P. Denholm, T. Jenkin, and J. Weiss, โEstimating the value of electricity storage in pjm: Arbitrage and some
welfare effects,โ Energy economics, vol. 31, no. 2, pp. 269โ277, 2009.
[3] C.-K. Woo, I. Horowitz, J. Moore, and A. Pacheco, โThe impact of wind generation on the electricity spot-market price
level and variance: The texas experience,โ Energy Policy, vol. 39, no. 7, pp. 3939โ3944, 2011.
[4] R. H. Byrne and C. A. Silva-Monroy, โEstimating the maximum potential revenue for grid connected electricity storage:
Arbitrage and regulation,โ Sandia National Laboratories, 2012.
[5] T. T. Kim and H. V. Poor, โScheduling power consumption with price uncertainty,โ IEEE Transactions on Smart Grid,
vol. 2, no. 3, pp. 519โ527, 2011.
[6] S. Borenstein, โThe long-run efficiency of real-time electricity pricing,โ The Energy Journal, pp. 93โ116, 2005.
[7] R. S. Sutton and A. G. Barto, โReinforcement learning: An introduction,โ 2011.
February 27, 2018
DRAFT
11
[8] R. Walawalkar, J. Apt, and R. Mancini, โEconomics of electric energy storage for energy arbitrage and regulation in new
york,โ Energy Policy, vol. 35, no. 4, pp. 2558โ2568, 2007.
[9] K. Bradbury, L. Pratson, and D. Patinฬo-Echeverri, โEconomic viability of energy storage systems based on price arbitrage
potential in real-time us electricity markets,โ Applied Energy, vol. 114, pp. 512โ519, 2014.
[10] D. McConnell, T. Forcey, and M. Sandiford, โEstimating the value of electricity storage in an energy-only wholesale
market,โ Applied Energy, vol. 159, pp. 422โ432, 2015.
[11] D. Zafirakis, K. J. Chalvatzis, G. Baiocchi, and G. Daskalakis, โThe value of arbitrage for energy storage: Evidence from
european electricity markets,โ Applied Energy, vol. 184, pp. 971โ986, 2016.
[12] K. Abdulla, J. De Hoog, V. Muenzel, F. Suits, K. Steer, A. Wirth, and S. Halgamuge, โOptimal operation of energy storage
systems considering forecasts and battery degradation,โ IEEE Transactions on Smart Grid, 2016.
[13] D. Krishnamurthy, C. Uckun, Z. Zhou, P. Thimmapuram, and A. Botterud, โEnergy storage arbitrage under day-ahead and
real-time price uncertainty,โ IEEE Transactions on Power Systems, 2017.
[14] D. R. Jiang and W. B. Powell, โOptimal hour-ahead bidding in the real-time electricity market with battery storage using
approximate dynamic programming,โ INFORMS Journal on Computing, vol. 27, no. 3, pp. 525โ543, 2015.
[15] J. Qin, Y. Chow, J. Yang, and R. Rajagopal, โOnline modified greedy algorithm for storage control under uncertainty,โ
IEEE Transactions on Power Systems, vol. 31, no. 3, pp. 1729โ1743, 2016.
[16] R. Weron, โElectricity price forecasting: A review of the state-of-the-art with a look into the future,โ International Journal
of Forecasting, vol. 30, no. 4, pp. 1030 โ 1081, 2014.
[17] C. J. Watkins and P. Dayan, โQ-learning,โ Machine learning, vol. 8, no. 3-4, pp. 279โ292, 1992.
[18] R. A. Howard, Dynamic programming and markov processes. Oxford, England: John Wiley, 1960.
[19] โHourly real-time lmp.โ [Online]. Available: https://www.iso-ne.com
February 27, 2018
DRAFT
| 3cs.SY
|
Interdependent Security Games on Networks
under Behavioral Probability Weightingโ
arXiv:1510.09106v3 [cs.GT] 12 Aug 2016
Ashish R. Hota and Shreyas Sundaramโ
Abstract
We consider a class of interdependent security games on networks where each node chooses
a personal level of security investment. The attack probability experienced by a node is a
function of her own investment and the investment by her neighbors in the network. Most of
the existing work in these settings considers players who are risk-neutral. In contrast, studies in
behavioral decision theory have shown that individuals often deviate from risk-neutral behavior
while making decisions under uncertainty. In particular, the true probabilities associated with
uncertain outcomes are often transformed into perceived probabilities in a highly nonlinear
fashion by the users, which then influence their decisions. In this paper, we investigate the effects
of such behavioral probability weightings by the nodes on their optimal investment strategies
and the resulting security risk profiles that arise at the Nash equilibria of interdependent network
security games. We characterize graph topologies that achieve the largest and smallest worst
case average attack probabilities at Nash equilibria in Total Effort games, and equilibrium
investments in Weakest Link and Best Shot games.
1
Introduction
Interdependent security games are a class of strategic games where the security risk faced by a player
(often manifested as the probability of a successful attack) depends on her personal investment in
security and the investments by other interacting players [Laszka et al., 2014, Kunreuther and
Heal, 2003]. This is a broad framework to capture security interdependencies between independent
stakeholders in (networked) cyber-physical systems. There is a large literature on this class of
problems [Laszka et al., 2014, Kunreuther and Heal, 2003, Varian, 2004, Manshaei et al., 2013]
motivated by applications in cybersecurity, airline security and epidemic risks.
Much of the work in interdependent security games considers players who are risk-neutral, or
are risk averse in the sense of classical expected utility theory [Laszka et al., 2014]. On the other
hand, there is a rich literature in decision theory and behavioral economics showing that human
behavior consistently and significantly deviates from the predictions of classical expected utility
theory [Camerer et al., 2011]. While there have been some studies highlighting the significance
of biases and irrationalities in human decision-making in information security domains [Christin,
2011, Schneier, 2008, Garg and Camp, 2013], theoretical analyses of deviations from classical notions of rational behavior are scarce in the literature on interdependent security games. Empirical
investigations are also limited [Christin et al., 2011].
The goal of this paper is to initiate a rigorous investigation of the impact of behavioral decisiontheoretic models in interdependent security games. In the context of security games, one of the
โ
A preliminary version of this work appeared in the proceedings of GameSec 2015 [Hota and Sundaram, 2015].
The authors are with the School of Electrical and Computer Engineering, Purdue University. E-mail:
{ahota,sundara2}@purdue.edu. This work is supported by a grant from the Purdue Research Foundation.
โ
1
most important behavioral deviations from the classical expected utility framework is the way
individuals perceive the probability of an uncertain outcome (e.g., cyber attack).1 In particular,
empirical studies show that individuals tend to overweight small probabilities and underweight large
probabilities. Thus, the true probabilities are typically transformed in a highly nonlinear fashion
into perceived probabilities, which are then used for decision-making [Tversky and Kahneman, 1992,
Gonzalez and Wu, 1999]. These transformations are captured in the form of probability weighting
functions.
In this paper, we analyze the effects of behavioral probability weighting on playersโ equilibrium
strategies in interdependent security games on networks. We consider three canonical manifestations of the security risk in the forms of Total Effort, Weakest Link and Best Shot games. These
game-theoretic models were first introduced in [Varian, 2004] and have been studied extensively in
the literature to model several scenarios in the cybersecurity domain, as described below.
In Total Effort games on networks, the probability of a successful attack on a node is an (affine)
decreasing function of the average of the security investments by the node and her neighbors.
The total effort externality has been studied as an abstraction of several cybersecurity problems
[Grossklags et al., 2008, Grossklags and Johnson, 2009]. For instance, when an attacker tries
to slow down file transfers in peer-to-peer networks, the success of the attack depends on the
aggregate effort of all the participating agents [Grossklags et al., 2008]. Similar externalities arise
when underinvestment in security by a user potentially causes increasing spam activity for others
who communicate with her [Laszka et al., 2014]. In [Miura-Ko et al., 2008, Nguyen et al., 2009],
the authors consider a similar formulation, where the security risk faced by a node is a weighted
linear combination of her own investment and the investments by her neighbors. The authors
discuss multiple settings where such externalities arise, such as in web authentication and spam
verification. Amin et. al [Amin et al., 2013] study a related setting, where a set of independent
control systems interact over a shared communication network, and the failure probability is a
function of the number of controllers who have invested in security.2
In the Weakest Link game, a node is only as secure as the least secure node in her neighborhood,
while in the Best Shot game, the player with the maximum investment in the neighborhood must
be successfully attacked for the attack on a node to be successful. Weakest link externalities
are prevalent in cybersecurity domains; successful breach of one subsystem often increases the
vulnerability of connected subsystems by giving the attacker increased access to otherwise restricted
parts. Best shot externalities arise in cyber-physical systems that have built-in redundancies.
The attacker must breach the most secure subsystem for the attack to be successful. Best shot
externalities also arise in censorship resilient communication, where information is available to a
node as long as one of her neighbors possesses that information [Johnson et al., 2010]. We summarize
our main findings on the effects of network structure and probability weighting on playersโ strategies
and equilibrium attack probabilities for all three games in Table 1.
Security investments often exhibit characteristics of a public good [Varian, 2004], and the different risk externalities described above have indeed been studied in the context of public good
games [Hirshleifer, 1983]. There is also a growing interest in networked public goods in recent years
1
There are also various behavioral characteristics that affect the perceived values of gains and losses [Tversky and
Kahneman, 1992, Hota et al., 2016].
2
Security externalities similar to the Total Effort formulation have also been studied in the broader interdependent
security game literature in the context of inefficiency of equilibria [Jiang et al., 2011], incomplete information about
the network topology [Pal and Hui, 2011] and cyber insurance [Schwartz et al., 2013]. In all these settings, the
security risk faced by a node is determined by the actions of the node and her immediate neighbors. This is different
from the line of work that models epidemic risks and cascading failures spreading over the network [Nowzari et al.,
2016].
2
Externality
Weakest
Link
Impact of Network Structure
The expected fraction of nodes that are
successfully attacked at a PNE is highest
in degree-regular graphs, among
all graphs with a given average degree.
In a connected graph, all
nodes have identical
investments at a PNE.
Best
Shot
Nodes with nonzero investments
at a PNE form a
maximal independent set.
Total
Effort
Impact of Weighting Function
In degree-regular graphs, the
interior PNE is more secure under
probability weighting when the
graph is sufficiently dense.
The attack probabilities that
arise at a PNE have values
close to 1 and/or 0, depending
on the game parameters.
Under probability weighting,
the PNE is never fully insecure,
i.e., there always exist node(s)
with nonzero investment(s).
Table 1: Summary of main results of the pure Nash equilibrium (PNE) characteristics for
different attack probability functions.
[Galeotti et al., 2010, Bramoulleฬ et al., 2014]. Our analysis of behavioral probability weighting
complements this line of research.
2
Probability Weighting
As discussed in the previous section, our focus in this paper will be on understanding the effects
of nonlinear weighting of true probabilities by individuals while making decisions under risk. Such
weightings have been comprehensively studied in the behavioral economics and psychology literature [Camerer et al., 2011], and more recently in wireless communications [Li and Mandayam, 2014]
and the smart grid [Saad et al., 2016]. Behavioral perception of probabilities by human decision
makers have certain fundamental characteristics, including (i) possibility effect: overweighting of
probabilities very close to 0, (ii) certainty effect: underweighting of probabilities very close to 1,
and (iii) diminishing sensitivity from the end points 0 and 1. These characteristics are usually
captured by an inverse S-shaped weighting function w : [0, 1] โ [0, 1]; prominent parametric forms
of such weighting functions were proposed by Kahneman and Tversky [Tversky and Kahneman,
1992], Gonzalez and Wu [Gonzalez and Wu, 1999], and Prelec [Prelec, 1998], and are illustrated in
Figure 1.
For our general analysis of the Nash equilibrium in Total Effort games in Section 4 and Weakest
Link and Best Shot games in Section 7, we will assume that the derivative of the weighting function
satisfies the following properties.
Assumption 1. The probability weighting function w(x) has the following properties.
1. wโฒ (x) has a unique minimum for x โ (0, 1) denoted as xmin,w := argminxโ[0,1] wโฒ (x), and
wโฒโฒ (xmin,w ) = 0.
2. w(x) is strictly concave for x โ [0, xmin,w ), and is strictly convex for x โ (xmin,w , 1].
3. wโฒ (วซ) โ โ as วซ โ 0, and wโฒ (1 โ วซ) โ โ as วซ โ 0.
We impose the following additional requirements on the weighting functions in order to obtain
certain results on the effects of network structure on the equilibria in Section 5.
3
Perceived Probability (w(x))
1
GW
Pr
KT
0.8
0.6
0.4
0.2
0
0
0.2
0.4
0.6
0.8
1
True Probability (x)
Figure 1: Shape of the probability weighting function for different parametric forms proposed by
Gonzalez and Wu (GW) [Gonzalez and Wu, 1999], Prelec (Pr) [Prelec, 1998] and Kahneman and
Tversky (KT) [Tversky and Kahneman, 1992].
Assumption 2. The probability weighting function w(x) has the following properties.
1.
w โฒโฒ (x)
w โฒ (x)
<
1
1โx
for x โ (xmin,w , 1).
2. wโฒ (x) is strictly convex for x โ (xmin,w , 1).
Remark 1. Assumption 1 and 2 hold true for the parametric forms of the weighting functions
proposed by Kahneman and Tversky [Tversky and Kahneman, 1992], Gonzalez and Wu [Gonzalez
and Wu, 1999], and Prelec [Prelec, 1998] for the ranges of parameter values under which these
functions have an inverse-S shape (Figure 1). In particular, the assumptions hold for the ranges of
parameter values estimated from empirical studies on human subjects; [Booij et al., 2010] contains
a review of several such studies.
For our results on the effect of the intensity of overweighting and underweighting of the weighting
functions on the equilibrium attack probabilities in Section 6, we will need to consider a specific
parametric form of the weighting function. For that purpose, we use the single-parameter Prelec
weighting function from [Prelec, 1998] due to its analytical tractability. In particular, if the true
probability of an outcome is x, the Prelec weighting function is given by
w(x) = exp(โ(โ ln(x))ฮฑ ),
x โ [0, 1],
(1)
where exp(ยท) is the exponential function. The parameter ฮฑ โ (0, 1) controls the curvature of the
weighting function. For ฮฑ = 1, we have w(x) = x, i.e., the weighting function is linear. For smaller
ฮฑ, the function w(x) has a sharper overweighting of low probabilities and underweighting of high
probabilities. A useful property of this function is that regardless of the value of ฮฑ, xmin,w = 1e ,
and w( 1e ) = 1e . In other words, wโฒโฒ (x) = 0 at x = 1e . The minimum value of wโฒ (x) is wโฒ ( 1e ) = ฮฑ.
3
Interdependent Security Games
In this paper, we consider interdependent security games on networks. Let G = {V, E} denote an
undirected network (or graph) with V being the set of nodes with |V| = n. Each node is an independent decision-maker (player of the game) representing, for instance, an entity in a cyber-physical
system. The security investment by node i is denoted as si , with si โ [0, 1]. The security risk or
attack probability experienced by a node is a function of her investment si , and the investment
by her direct neighbors. We denote the set of neighbors of node i as N (i), and the investment
4
profile of all nodes in N (i) as the vector sN (i) . The true probability of a successful attack on node
i is given by fi (si , sN (i) ) โ [0, 1], for some function fi . Node i incurs a cost-per-unit of security
investment of ci โ Rโฅ0 , and if the attack is successful, she incurs a loss of Li โ R>0 . Her expected
utility (under the true probability of successful attack) is then
Eui (si , sN (i) ) = โLi fi (si , sN (i) ) โ ci si .
(2)
For ease of notation, we define the extended neighborhood of node i, denoted Nฬ (i), as the set of
nodes including herself and her neighboring nodes, i.e., Nฬ (i) , N (i) โช {i}. We denote the size of
the extended neighborhood of a node i as,
di , 1 + |N (i)|.
(3)
In this work, we consider three canonical models of interdependent security games initially presented in [Grossklags et al., 2008]. The models differ in the attack probability function fi (si , sN (i) )
as described below.
P
โข Total Effort: fi (si , sN (i) ) = 1 โ d1i ( jโNฬ (i) sj ).
โข Weakest Link: fi (si , sN (i) ) = 1 โ minjโNฬ (i) sj .
โข Best Shot: fi (si , sN (i) ) = 1 โ maxjโNฬ (i) sj .
Note that in prior works (e.g. [Grossklags et al., 2008]), the games were defined over complete
graphs, i.e., Nฬ (i) = V, while we consider more general graph topologies. Most of our analysis
will focus on the Total Effort attack probability function, since the results also have potential
implications for other classes of security games considered in the literature [Miura-Ko et al., 2008,
Nguyen et al., 2009]. Since the focus of the present work is to understand the effects of behavioral
probability weighting functions and node degrees on the Nash equilibrium security levels, we only
focus on the case where the security risk of a node is influenced in an identical way by all of her
neighborsโ investments.
We formally define the notion of an equilibrium and best response in interdependent security
games as follows.
Definition 1. A strategy profile {sโ1 , sโ2 , . . . , sโn } is a pure Nash equilibrium (PNE) if for every
player i โ {1, 2, . . . , n}, Eui (sโฒi , sโN (i) ) โค Eui (sโi , sโN (i) ), โsโฒi โ [0, 1].
Definition 2. The best response of player i at a given investment profile sN (i) by her neighbors
is the set bi (sN (i) ) , argmaxsi โ[0,1] Eui (si , sN (i) ). A strategy profile {sโ1 , sโ2 , . . . , sโn } is a pure Nash
equilibrium if and only if sโi โ bi (sโN (i) ) for every player i โ {1, 2, . . . , n}.
In other words, a PNE exists if the vector of best response mappings [b1 (ยท), b2 (ยท), . . . , bn (ยท)]
possesses a fixed point [Osborne and Rubinstein, 1994].
3.1
Equilibria without probability weighting
To establish a baseline, we present the following proposition that describes the main results
from [Grossklags et al., 2008] regarding the properties of the best response of a player with w(x) = x
in a Total Effort game; while that paper only considered complete graphs, the result extends directly to general graphs. We refer to a player with w(x) = x as a true expectation maximizer as
she maximizes her expected utility (2) without any behavioral probability weighing.
5
Proposition 1. Consider a player i with wi (x) = x in a Total Effort game with extended neighborhood size di . Then, her best response is sโi = 1 when dLi cii < 1, and sโi = 0 if dLi cii > 1. In the
special case where dLi cii = 1, any investment si โ [0, 1] is an optimal strategy.
Note that, except for the pathological case where dLi cii = 1, the best response of a player is
to either fully protect herself or remain completely unprotected. As the size of her neighborhood
increases, her best response jumps from investing 1 to investing 0. Such behavior arises since the
marginal utility of a true expectation maximizer in (2) is independent of her strategy and the
strategies of the players in her neighborhood.
When the cost parameters ci and Li are homogeneous across players, only a set of nodes with
small enough degrees make an investment of 1, while the high degree nodes invest zero in any Nash
equilibrium of the Total Effort game. Furthermore, in degree regular graphs, the only equilibrium
that arises has all players investing 0 or investing 1, i.e., all players are either fully secure or fully
unprotected.
In our analysis, we will show that under behavioral probability weighting, both the best responses and the equilibria have much richer structural properties and vary more smoothly with the
weighting parameters and the network structure.
4
Pure Nash Equilibria in Total Effort Games with Behavioral
Probability Weighting
In this section, we consider Total Effort games on networks with player-specific probability weighting
functions wi (ยท) (satisfying Assumption 1) and cost parameters ci and Li . We first prove the existence
of a PNE in this class of games by establishing the existence of a fixed point of the best response
mapping (see Definition 2).
With probability weighting, the expected utility of player i with investment si โ [0, 1] is given
by
si + sฬโi
โ ci si ,
(4)
Eui (si , sN (i) ) = โLi wi 1 โ
di
P
where sฬโi = jโN (i) sj is the total investment in security by the neighbors of i. The quantity di
is the size of the extended neighborhood of player i as defined in (3). The marginal utility is given
by
Li โฒ
si + sฬโi
โEui
= wi 1 โ
โ ci .
(5)
โsi
di
di
The solutions of
โEui
โsi
= 0 (if any) satisfy the first order necessary condition of optimality, and are
โi
is the true attack
therefore candidate solutions for player iโs best response. Note that 1 โ si +sฬ
di
probability faced by player i (without probability weighting).
We illustrate the nature of solutions of the first order condition (5) in Figure 2 for a Prelec
weighting function with parameter ฮฑ = 0.4. One can see from the figure and (5) that if dLi cii โค
i
wiโฒ (xmin,wi ) = minxโ[0,1] wiโฒ (x), we have โEu
โsi โฅ 0 for si โ [0, 1], and investing 1 is the only best
response of a player irrespective of the strategies of her neighbors.3
Now suppose dLi cii > wiโฒ (xmin,wi ). In this case, the first order condition wiโฒ (x) = dLi cii has two
distinct interior solutions corresponding to true attack probabilities Vi < xmin,w and Xi > xmin,w ,
as illustrated in Figure 2. Note that as the degree of the node increases, Xi โ Vi increases as well.
Eui = 0 at x
โ Eui
When dLi cii = wiโฒ (xmin,wi ), there is a unique solution to โโs
> 0 for all other si . The
min,wi , and โs
i
i
player prefers to invest 1 in this case. The proof is similar to Case 4 in the proof of Lemma 1.
3
6
2
dw(x)/dx
1.5
1
0.5
V
0
0
X
0.2
0.4
0.6
0.8
1
x
Figure 2: Interior solutions of wโฒ (x) = dc
are denoted by V and X. In this example,
L
is shown by the horizontal line. The Prelec weighting parameter is ฮฑ = 0.4.
dc
L
= 0.8 and
When sฬโi is the total investment by the neighbors of player i, player iโs strategy can change
her true attack probability in the interval
sฬโi
1 + sฬโi
,1 โ
.
(6)
X (sฬโi ) , 1 โ
di
di
In other words, when the extended neighborhood size is di , each player can directly change the
probability of successful attack by at most d1i . We will make the following assumptions.
Assumption 3. For any player i with dLi cii > wiโฒ (xmin,wi ), let the size of the extended neighborhood
(di ), and the cost parameters (ci and Li ) be such that, (1) Xi โ Vi > d1i , (2) Vi < d1i and (3)
wi ( d1i ) < Lcii .
The first condition implies that at a given sฬโi , player i does not contain both Vi and Xi in
X (sฬโi ). This is required for maintaining continuity of the best response as sฬโi varies. We will
discuss the implications of the last two assumptions later in the analysis. Unless otherwise stated,
the results of this section hold under Assumption 1 for the probability weighting functions and
Assumption 3 for the neighborhood sizes and the cost parameters.
We start with the following characterization of the best response of a player. In particular, we
show that under Assumptions 1 and 3, the best response of a player is unique, continuous, and
monotonically decreasing in the aggregate investment by other nodes in her neighborhood. The
proof is presented in Appendix A.
Lemma 1. Suppose dLi cii > minxโ[0,1] wiโฒ (x) for a player i. Then, for a given aggregate investment
sฬโi by the neighboring nodes, the best response of player i is given by,
๏ฃฑ
๏ฃด
when sฬโi โค di (1 โ Xi ) โ 1
๏ฃฒ1
bi (sฬโi ) = 0
when sฬโi โฅ di (1 โ Xi ),
๏ฃด
๏ฃณ
di (1 โ Xi ) โ sฬโi otherwise.
where Xi is the solution to wiโฒ (x) =
di ci
Li
for x โ (xmin,wi , 1].
We use the properties of the best response proven in the above lemma to establish the existence
of PNE in Total Effort games on networks under behavioral probability weighting.
Theorem 1. Consider a Total Effort game on a graph where the weighting functions of the players
satisfy Assumption 1 and the cost parameters and neighborhood sizes satisfy Assumption 3. Then
this game admits a pure Nash equilibrium.
7
Proof. For a player i, if dLi cii โค wiโฒ (xmin,wi ), her best response is to invest 1 regardless of the investments by her neighbors. Otherwise, the best response is unique and continuous in the strategies
of her neighbors (from Lemma 1). In addition, the strategy space of each player is [0, 1], which is
compact and convex. Thus, according to Brouwerโs fixed point theorem [Ok, 2007], there exists a
fixed point of the best response mapping, which corresponds to a PNE.
As a consequence of Lemma 1, at a PNE, the investments in the extended neighborhood of any
player i for whom dLi cii > wโฒ (xmin,wi ) can be expressed as,
sโi = min(max(di (1 โ Xi ) โ sฬโโi , 0), 1).
(7)
In particular, we have
1 + sฬโโi < di (1 โ Xi ) =โ sโi = 1
sโi + sฬโโi = di (1 โ Xi ) =โ sโi โ [0, 1]
sฬโโi
where wiโฒ (Xi ) =
sโi โ (0, 1).
di ci
Li
> di (1 โ Xi ) =โ
sโi
(8)
= 0,
with Xi โ (xmin,w , 1). The converse of the second identity above holds when
Remark 2 (Equilibrium computation). Recently, the authors in [Gharesifard et al., 2016] showed
that when the best responses of the players are given by Lemma 1, continuous best response dynamics
converge to a PNE strategy profile. Furthermore, a strategy profile that satisfies (8) can be computed
by solving a Linear Complementarity Program; a similar result was obtained in [Miura-Ko et al.,
2008]. We present an expanded discussion in Appendix B.
In general, strategy profiles that satisfy equation (7) need not be unique, and therefore, we
need not have a unique PNE. However, in the special case of complete graphs (the classical setting
for Total Effort games [Grossklags et al., 2008]), we show that the strategy profiles at the Nash
equilibria are unique up to the true equilibrium attack probability experienced by the players.
Proposition 2. Consider a Total Effort game on a complete graph where each player i has a playerspecific weighting function wi (ยท) satisfying Assumption 1, and cost ratio Lcii satisfying Assumption 3.
Then all Nash equilibria have the same (true) probability of successful attack at the nodes.
The proof is presented in Appendix A.
If the strategy profile at each neighborhood satisfies the second identity of (8), then we refer
to such a PNE as an interior equilibrium. In other words, at an interior equilibrium, the strategy
profile sโ satisfies,
(A + In )sโ = d โฆ (1 โ X),
(9)
where A is the adjacency matrix of the graph, d is the vector of neighborhood sizes, 1 is the allones vector, X is the vector of Xi โs of the players, and โโฆโ denotes the Hadamard (element-wise)
product. Thus, at every interior equilibrium, the true attack probability faced by each node i is Xi .
The existence of an interior equilibrium is not always guaranteed, except in certain special cases,
such as when players are homogeneous and all nodes in the graph have identical degrees (i.e., the
graph is degree-regular).
Proposition 3. Consider a degree-regular graph with degree d โ 1 and homogeneous players such
โฒ
that dc
L > w (xmin,w ). Then the symmetric strategy profile where each node invests 1โ X constitutes
an interior PNE, where wโฒ (X) = dc
L , X โ (xmin,w , 1].
The proof is straightforward by substituting sโ = 1 โ X for every player in equation (8).
8
4.1
Existence of secure equilibrium
Assumption 3 ensures that the best response of a player remains continuous in the strategies of
other players, which helps us establish the existence of PNE in Theorem 1. It is possible to also
show the existence of a PNE where all players invest 1 at equilibrium, when the second and third
conditions of Assumption 3 do not hold for all the players.
Proposition 4. Suppose that for every player i in a Total Effort game, either Vi โฅ
ci
Li . Then there exists a PNE where all players invest 1.
Proof. Consider a player i with Vi โฅ
โEui
โsi
1
di
or wi ( d1i ) >
1
di ,
and assume that all of her neighboring nodes are investing
h
i
of player i is nonnegative over the interval X = 0, d1i , and her
1. Then, the marginal utility
best response is to invest 1.
Similarly, when Vi < d1i , and wi ( d1i ) > Lcii for player i, then her optimal investment is 1 when
sฬโi = di โ 1. This follows from Case 4 of in the proof of Lemma 1 as substituting sฬi = di โ 1 yields
Eui (1, sN (i) ) โ Eui (0, sN (i) ) > 0 when wi ( d1i ) > Lcii .
Both Vi โฅ d1i and wi ( d1i ) > Lcii occur when the weighting function sufficiently overweights very
small attack probabilities. Overweighting of small attack probabilities discourages a player from
reducing her investment, even when all other players are fully secure, as it would lead to a large
perceived increase in attack probabilities from a relatively secure state. This results in a fully secure
equilibrium.
While such a fully secure PNE possibly coexists with other equilibria, identifying conditions
under which such a PNE exists has potential implications for designing incentive mechanisms to
encourage users to achieve a secure PNE.
5
Effects of Network Structure
In this section, we focus on understanding the effect of network structure, vis-a-vis the degrees
of the nodes, on the security investments and attack probabilities at the PNE of Total Effort
games. We consider players with homogeneous weighting functions and cost parameters in order
to isolate the effects of their degrees on their investments. We will use the characterization of the
PNE strategy profile given in equation (8). For the analysis in this section, we assume that the
weighting functions satisfy both Assumptions 1 and 2.
When the weighting functions and the cost parameters are homogeneous across the players,
then the quantity di (1 โ Xi ) is only a function of the size of the extended neighborhood di . Recall
that wโฒ (Xi ) = dLi c , and Xi > xmin,w . The properties of Xi as a function of di are the basis of the
analytical results of this section.
Remark 3. Note that Xi is an increasing function of di , as wโฒ (x) is strictly increasing in x for
x โ (xmin,w , 1], as illustrated in Figure 2.
5.1
Investments by nodes with overlapping neighborhoods
Without probability weighting, Proposition 1 indicated that a lower degree node always invests at
least as much as a higher degree node. This monotonicity does not hold in general under behavioral
probability weighting. Nonetheless, we can prove certain monotonicity properties when d(1 โ X)
is a monotonically decreasing function of d, which holds under Assumption 2 as shown below.
9
Lemma 2. Let
c
L
> minxโ[0,1] wโฒ (x) so that the quantity X is defined for d โฅ 1. If the probabil-
ity weighting function satisfies
decreasing in d.
w โฒโฒ (x)
w โฒ (x)
<
1
1โx
for x โ (xmin,w , 1), then d(1 โ X) is monotonically
The proof of Lemma 2 is presented in Appendix C. We now prove the following result using
Lemma 2. Recall that Nฬ (i) denotes the extended neighborhood of node i.
Proposition 5. Consider a Total Effort game on a network with homogeneous players whose
weighting functions satisfy Assumptions 1 and 2. Let the cost parameters satisfy Assumption 3,
and let Lc > minxโ[0,1] wโฒ (x). If Nฬ (i) โ Nฬ (j), then at any PNE, sโi โฅ sโj .
Proof. Consider any equilibrium strategy profile where player j invests sโj > 0, for otherwise, the
result holds trivially. Then from equation (8), and from the fact that Nฬ (i) โ Nฬ (j), we obtain
X
X
sโk โค
sโk โค dj (1 โ Xj ) < di (1 โ Xi ),
kโNฬ (i)
kโNฬ (j)
which follows from the monotonicity of d(1 โ X) shown in Lemma 2. As a result, from (8), we
must have sโi = 1.
From Lemma 2, we know that d(1 โ X) is a decreasing function of d. From the PNE characterization in (8), node i invests such that the aggregate investment in her extended neighborhood is
di (1โXi ) subject to her investment being within [0, 1]. For a node with a few neighbors, the desired
investment d(1 โ X) is larger, and therefore, the node has to increase her personal investment. On
the other hand, for a node with large degree, d(1 โ X) is smaller and she has a large number of
neighbors to rely on to meet the target investment.
5.2
Upper bound on average probability of successful attack at equilibrium
For a PNE strategy profile sโ , we denote the average (true) probability of successful attack as
!
P
n
โ
X
s
1
j
jโ
Nฬ
(j)
1โ
.
(10)
ฮฆ(sโ ) :=
n
di
i=1
Note that ฮฆ(sโ ) is also equal to the expected fraction of nodes that are successfully attacked under
the PNE strategy profile sโ . We obtain an upper bound on ฮฆ(sโ ) when 1 โ Xi < d1i for every player
i, with the proof presented in Appendix C.
Proposition 6. Consider a Total Effort game on a graph with homogeneous players who satisfy
Assumptions 1, 2 and 3. In addition, suppose dLi c > minxโ[0,1] wโฒ (x) and 1 โ Xi < d1i for every
player i. Then at any PNE with strategy profile sโ ,
1. the attack probability at node i is at most Xi , and
P
2. ฮฆ(sโ ) โค n1 ni=1 Xi .
Furthermore, if there exists an interior PNE with strategy profile sโI , then ฮฆ(sโI ) =
1
n
Pn
i=1 Xi .
Remark 4. If there is a leaf node i with di = 2 that satisfies Assumption 3, then we must have
1โXi < 21 ; otherwise Xi โVi < 12 , which violates the first condition of Assumption 3. Since d(1โX)
is decreasing in d (according to Lemma 2 under Assumption 2), this implies that 1 โ Xj < d1j holds
for every node j in the graph.
10
We now
state the main result of this section. We show that degree-regular graphs achieve the
1 Pn
highest n i=1 Xi over all graph topologies with the same average degree.
Theorem 2. Consider a Total Effort game on a graph under Assumptions 1, 2 and 3. Let dLi c >
P
wโฒ (xmin,w ) for every player i, and let davg , n1 ni=1 di be the average of all extended neighborhood
sizes. Then,
n
1X
ฮฆ(sโ ) โค
Xi โค Xavg ,
n
i=1
where sโ is a PNE strategy profile and Xavg โ (xmin,w , 1] is such that wโฒ (Xavg ) =
davg b
L .
Proof. Let the function h : R+ โ [xmin,w , โ) be defined as the inverse of wโฒ (ยท), i.e., h( dLi c ) , Xi .
From Assumptions 1 and 2, we know that wโฒ (x) is strictly increasing and is strictly convex for
x โ (xmin,w , 1]. Therefore, the inverse function h(ยท) is strictly increasing
concave in di
and strictly
davg c
di c
1 Pn
, which yields
for di โ R. From the strict concavity of h(ยท), we have n i=1 h L โค h
L
1 Pn
i=1 Xi โค Xavg . Equality holds when di = davg for every node i.
n
The above result states that graphs with identical node degrees have a larger worst case ฮฆ(sโ ).
Furthermore, as a graph becomes more dense, the bound on ฮฆ(sโ ) grows with the average degree
of the nodes.
5.3
Graphs with smallest average attack probability bound
In this subsection, we answer the complementary question regarding graph topologies that have
the smallest upper bound on ฮฆ(sโ ).
In order to highlight the dependence of Xi on di , we will use a slightly modified notation in the
proof of the following result. In particular, we denote Xi as Xdi for player i.
Proposition 7. Consider Total Effort games with n homogeneous players that satisfy Assumpโฒ
) for d = 2. Then, among all connected graphs with n nodes,
tions 1, 2 and 3. Let dc
L > w (xmin,wP
the star graph achieves the smallest ni=1 Xdi .
Proof. Recall from Remark 3 that Xdi is an increasing function of di . If the graph is not a tree, then
we can remove a setP
of edges until the resulting subgraph is a tree. This reduces the neighborhood
sizes and decreases ni=1 Xdi .
P
It remains to show that among all trees, the star graph minimizes ni=1 Xdi . Consider a tree that
is not a star graph. Then, maxni=1 di < n. Consider a node u with highest extended neighborhood
size du < n. Since the graph is not a star, there must exist a leaf node l which is connected to a
node other P
than u. Let the neighbor of l be denoted as v, with neighborhood size dv โค du . We
argue that ni=1 Xdi decreases if we remove the edge between l and v, and add an edge between l
and u. Under this operation, Xdu increases to Xdu +1 for node u and Xdv decreases
Pn to Xdv โ1 for
node v. For all other nodes, Xdi remains unchanged. We compute the change in i=1 Xdi as,
Xdu +1 โ Xdu + Xdv โ1 โ Xdv
<(Xdu โ Xdu โ1 ) โ (Xdv โ Xdv โ1 )
โค(Xdv โ Xdv โ1 ) โ (Xdv โ Xdv โ1 ) = 0.
(11)
The first inequality follows from Theorem 2 with two players having extended neighborhood sizes
du โ 1 and du + 1, i.e., Xdu +1 + Xdu โ1 < 2Xdu for du โฅ 3. The second inequality holds for dv โค du
2. Therefore, for
following the strict concavity of h(ยท) (where h( dc
L ) = Xd ) as shown in Theorem P
any tree which is not a star graph, we can construct another tree which reduces ni=1 Xdi .
11
2
ฮฑ=0.8
ฮฑ=0.4
dw(x)/dx
1.5
1
0.5
0
Xฬ
0
0.2
0.4
0.6
0.8
1
x
Figure 3: wiโฒ (x) for Prelec weighting functions with parameters ฮฑ1 = 0.4 and ฮฑ2 = 0.8. At x = Xฬ,
w1โฒ (x) = w2โฒ (x).
The proof of Proposition 7 relies on the properties of the quantities Xi which arise due to the
nature of the behavioral weighting functions. In addition, the result that star graphs achieve the
smallest security risk upper bound is an artifact of the Total Effort risk externalities, which assume
that the attack on each node only depends on the average security investment in her neighborhood.
In other words, the attacks are not targeted (in the sense of trying to disconnect the network).
An interesting avenue for future work is to characterize network topologies that maximize more
complex network value functions (such as those considered in [Gueye et al., 2010, Schwartz et al.,
2011, Cerdeiro et al., 2015]) under behavioral probability weighting and targeted attacks.
6
Comparative Statics in Weighting Functions
In this section, we compare the effect of the intensity of probability weighting on ฮฆ(sโ ) (the average
equilibrium probability of successful attack) in degree-regular graphs. Analyzing degree-regular
graphs not only isolates the effects of heterogeneity in degrees from the effects of the weighting
function, but as we showed in the previous section, such graphs possess an interior equilibrium that
upper bounds the ฮฆ(sโ ) that arise in a broader class of graphs.
In order to compare two different weighting functions, we use the parametric form (1) proposed
by Prelec with parameter ฮฑ โ (0, 1]. When ฮฑ = 1, the weighting function is linear; as ฮฑ decreases
from 1, the magnitudes of overweighting and underweighting increase.
We consider two Total Effort games on a (d โ 1)โregular graph, i.e., the size of the extended
neighborhood of the nodes is d. Let the cost parameters c and L be the same among the players
across the two games. The first game has homogeneous players with weighting parameter ฮฑ1 , and
the second game has homogeneous players with weighting parameter ฮฑ2 , with ฮฑ1 < ฮฑ2 < dc
L . In
other words, the players in the first game have a more significant overweighting and underweighting
of the true probabilities compared to the players in the second game. Let X1 and X2 be the solutions
to the equations wiโฒ (x) = dc
L , i โ {1, 2}, such that Xi > xmin,w . Here wi (x) is the Prelec weighting
function (1) with weighting parameter ฮฑi . From Proposition 3, the attack probability at each node
is equal to Xi at the respective interior PNEs and ฮฆi (sโ ) = Xi .
As we illustrate in Figure 3 for ฮฑ1 = 0.4 and ฮฑ2 = 0.8, w1โฒ (x) is initially smaller than w2โฒ (x) as x
starts to increase from 1e , until the quantity x = Xฬ (which depends on the values of ฮฑ1 and ฮฑ2 ) at
which w1โฒ (x) = w2โฒ (x). For x > Xฬ, w1โฒ (x) > w2โฒ (x). We state this formally in the following lemma.
The proof is presented in Appendix D.
Lemma 3. Consider two Prelec weighting functions w1 (ยท) and w2 (ยท) with parameters ฮฑ1 and ฮฑ2 ,
respectively and let ฮฑ1 < ฮฑ2 . Then there exists a unique Xฬ > 1e such that (1) w1โฒ (Xฬ) = w2โฒ (Xฬ), (2)
for x โ ( 1e , Xฬ), w1โฒ (x) < w2โฒ (x), and (3) for x โ (Xฬ, 1), w1โฒ (x) > w2โฒ (x).
12
Now we present the main result of this section, which follows from the above lemma.
Theorem 3. Let Xi , i โ {1, 2} be the true probability of successful attack at a node at the interior
PNE of a (d โ 1)-regular graph where the nodes have a Prelec weighting function with parameter
ฮฑi , i โ {1, 2}, with ฮฑ1 < ฮฑ2 . Let Xฬ be the intersection point defined in Lemma 3 for ฮฑ1 and ฮฑ2 .
Then,
1. if
dc
L
> wโฒ (Xฬ), we have Xฬ < X1 < X2 ,
2. otherwise, if ฮฑ2 <
3. if
dc
L
dc
L
< wโฒ (Xฬ), we have Xฬ > X1 > X2 , and
= wโฒ (Xฬ), we have Xฬ = X1 = X2 .
The above result shows that when dc
L is such that the attack probability at a node at PNE is
high enough (greater than Xฬ), the players with substantial underweighting of probabilities (i.e.,
with smaller ฮฑ) view increased security investments to be highly beneficial in terms of reducing the
perceived attack probabilities. As a result, the attack probability at a node at the PNE is smaller
in the game with weighting parameter ฮฑ1 .
On the other hand, when the attack probability is less than Xฬ, the players with smaller ฮฑ do
not find the perceived reduction in attack probabilities to be sufficient to make a high investment.
However players with weighting functions closer to linear observe greater perceived reduction in
probability due to increased investment, and as a result, these players have smaller average attack
probability at the interior equilibria.
When we keep Lc fixed and increase the neighborhood size d, then we eventually end up in the
regime where the equilibrium attack probability is greater than Xฬ. Thus, the expected fraction of
nodes that are successfully attacked at equilibrium (ฮฆi (sโ )) is smaller under behavioral probability
weighting when the graph is sufficiently dense (i.e., has a large number of edges for a given number
of nodes), and vice versa.
7
Weakest Link and Best Shot Games
The Nash equilibrium strategies in Weakest Link and Best Shot games have very special properties,
as the security level at each neighborhood is determined by the investment of a single player (the
one with the smallest and largest investment, respectively). Therefore, we first state the following
results that characterize the security investment by an isolated player (i.e., d = 1). The proofs of
the following results are in Appendix E.
Lemma 4. Consider a weighting function that satisfies Assumption 1. Let z > xmin,w be such that
w(x)
โฒ
wโฒ (z) = w(z)
z . Then i) z exists and is unique, and ii) for x > z, w (x) > x .
Proposition 8. Let z be as defined in Lemma 4. If Lc < wโฒ (z), the optimal investment of a
single player is sโ = 1. Otherwise, the optimal investment is sโ = 1 โ X, where wโฒ (X) = Lc , X โ
(xmin,w , 1].
We now analyze the PNE in Weakest Link games.
Proposition 9. Consider a Weakest Link game on a connected graph with homogeneous players.
Then at any PNE, all nodes make identical investments. If Lc โฅ wโฒ (z), where z is as defined in
Lemma 4, then there is a continuum of pure Nash equilibria where the successful attack probabilities
at the nodes are greater than or equal to X. When wโฒ (xmin,w ) < Lc < wโฒ (z), then there are additional
equilibria (including the ones in the previous case) with attack probabilities close to 0.
13
Proof. Consider a node v1 with security investment s1 , and let sฬ < s1 be the smallest investment
in her neighborhood. Then the attack probability on node v1 is fi (si , sN (i) ) = 1 โ sฬ > 1 โ s1 .
If node v1 reduces her investment to sฬ, then her cost of investment decreases, while the attack
probability remains unchanged. Therefore, at a PNE, the investment by any node must be equal
to the minimum investment in her extended neighborhood. As a result, in connected graphs, all
nodes must make identical security investments at a PNE.
When Lc โฅ wโฒ (z), Proposition 8 states that a single node investing in isolation would prefer to
invest sโ = 1 โ X. Now suppose all nodes have identical security investment s โค sโ , i.e., the true
attack probability at any node is 1 โ s โฅ X. Since for each player wโฒ (x) > Lc for x > X (i.e., the
marginal utility is positive), no player would unilaterally deviate to make a smaller investment.
Therefore, any investment s โค 1 โ X by all the nodes would result in a PNE.
When wโฒ (xmin,w ) < Lc < wโฒ (z), the optimal investment of a single player is to invest 1. Therefore, a strategy profile where each node invests s = 1 โ วซ for sufficiently small วซ > 0 such that
Eu(s) > Eu(1 โ X), is a PNE, with attack probability วซ at every node. For this strategy profile, all
players have positive marginal utility, and prefer to invest 1 โ วซ over 1 โ X due to the continuity
of the utility functions. These equilibria exist in addition to the set of equilibria with attack probabilities at least X. Note that any investment s โ (V, X) by the nodes is not a PNE since โEu
โs < 0
for s โ (V, X).
Note that as long as the graph remains connected, its structure plays no role on the equilibrium
investments and attack probabilities. The first part of the above result (i.e., identical investments
by all players) holds for true expectation maximizers (players with w(x) = x) as well. The main
differences with weighting functions are twofold. First, for large enough Lc , the only possible
equilibrium with true expectation maximizers is when all players invest 0 (Proposition 1 with
d = 1), while with probability weighting, there is a range of possible equilibrium investments, with
resulting attack probabilities greater than X. Second, for wโฒ (xmin,w ) < Lc < 1, any investment
by the players can give rise to a PNE for true expectation maximizers, while with probability
weighting, there exist attack probabilities that can be supported at a PNE are either close to 0 or
at least X. Finally, when Lc โค wโฒ (xmin,w ), X is not defined, though the optimal investment by a
single player is still 1. In this case, any investment by the players can give rise to a PNE.
We finally discuss the PNEs that arise in Best Shot games.
Proposition 10. Consider a Best Shot network security game with homogeneous players. Then a
strategy profile is a PNE if and only if there is a set of nodes who form a maximal independent set
and invest according to Proposition 8, and all other nodes invest 0.
Proof. In a Best Shot game, the attack probability on a node is a function of the highest investment
in her extended neighborhood. Suppose at a neighborhood there is a player making an investment
in accordance with Proposition 8. Since this is the optimal investment a single node can make, her
neighbors do not find investing more than this level (and thereby reducing their attack probabilities)
profitable. Therefore, their optimal strategy is to invest 0, as it eliminates their security investment
cost csi , while the attack probability is unchanged. Therefore, any two nodes who make a nonzero
investment must not be adjacent to each other. Furthermore, every node that is making a zero
investment must have a neighbor who invests a nonzero amount. Therefore, the set of nodes
making a nonzero investment must belong to a maximal independent set. The converse is also true;
any maximal independent set with investments determined by Proposition 8, and all other nodes
investing 0 constitute a PNE.
The independent set characterization holds for true expectation maximizers as well; nonlinear
weighting functions change the level of investment. With true expectation maximizers, the nonzero
14
1
4
2
3
9
5
7
6
8
10
Figure 4: Graph topology analyzed in Example 1
investment level is at one of the boundary points, either 0 or 1 (Proposition 1 with d = 1).
With probability weighting, there are no equilibria that are entirely unprotected, and the nonzero
equilibrium investment is at one of the interior solutions when Lc > wโฒ (z).
8
Numerical Examples
We illustrate our theoretical characterizations of the impacts of network structure and probability
weighting on the equilibrium investments in two numerical examples presented below.
Example 1. Consider the graph shown in Figure 4 with n = 10 nodes. Each node is a decision
maker with a Prelec weighting function with parameter ฮฑ = 0.6 and Lc = 0.45. The extended
neighborhood sizes range from 2 to 5. These parameters satisfy Assumptions 1, 2 and 3.
Under the Total Effort externalities, sequential best response dynamics converged to a PNE
strategy profile in this example. In this PNE, the leaf nodes, 1, 2, 3, 9, 10 have an investment 0.4095,
node 7 invests 0.1442 and nodes 4, 5, 6, 8 invest 0. These investments satisfy (8). Note that node
7 has a larger neighborhood size compared to node 8, yet it invests more than node 8 at the PNE.
This is in contrast with the equilibria that arise without probability weighting (Proposition 1), where
the equilibrium investments were either 0 or 1 and the investment of a node was at most that of
a node with a smaller degree. Furthermore, the investments of the leaf nodes are larger than their
neighbors, as shown in Proposition 5.
Under the Best Shot externality, a set of nodes which form a maximal independent set have a
nonzero investment (Proposition 9). In the graph shown in Figure 4, nodes 1, 2, 3, 7, 9, 10 form a
maximal independent set. Another such set consists of nodes 4, 2, 3, 8. For the Prelec weighting
function with ฮฑ = 0.6, wโฒ (z) = 0.8304 for the value of z defined in Lemma 4. Accordingly, if
c
L โค 0.8304, an equilibrium investment profile is when the nodes in a maximal independent set
invest 1, while other nodes invest 0. On the other hand, if Lc > 0.8304, the equilibrium investment
by the nodes is 1 โ X, where wโฒ (X) = Lc , X โ ( 1e , 1].
In the above example, we discussed the effects of network structure on PNE investments in Total
Effort and Best Shot games. The impact of the intensity of overweighting and underweighting of
probabilities in degree-regular graphs is illustrated in the following example and corroborates our
theoretical findings in Section 6.
Example 2. We consider two degree-regular graphs on n = 6 nodes as shown in Figure 5. The
nodes in the graph in Figure 5a (respectively, Figure 5b) have extended neighborhood sizes d =
3 (respectively, d = 5). We consider two types of players with Prelec weighting functions with
parameters ฮฑ1 = 0.4 and ฮฑ2 = 0.8, respectively. The derivative of the weighting functions for such
players was shown in Figure 3. Let Lc = 0.3 for all players.
First we consider the 2-regular graph shown in Figure 5a. When all the players have weighting functions with parameter ฮฑ1 = 0.4, then the attack probability at every node at the interior
15
1
2
6
1
3
5
2
6
4
3
5
(a) 2-regular graph on 6 nodes
4
(b) 4-regular graph on 6 nodes
Figure 5: Graph topologies analyzed in Example 2
equilibrium is equal to 0.8588, while for players with parameter ฮฑ2 = 0.8, the corresponding attack
probability is 0.6912. In this case, the equilibrium is more secure for the players whose weighting
functions are closer to linear. In contrast, in the 4-regular graph shown in Figure 5b, the attack
probabilities at every node at the interior PNEs are equal to 0.9325 and 0.9643 for players with
weighting function parameters ฮฑ1 and ฮฑ2 , respectively.
As we noted in Theorem 3 and the succeeding discussion, the above example illustrates that the
equilibrium is more secure for players with a substantial degree of overweighting and underweighting
(captured by a smaller parameter value ฮฑ) when the graph is sufficiently dense.
9
Discussion and Conclusion
We studied a class of interdependent security games on networks where the players exhibit certain behavioral attributes vis-a-vis their perception of attack probabilities, while making security
investment decisions. We analyzed three canonical interdependent security game models, (i) Total
Effort, (ii) Weakest Link, and (iii) Best Shot games.
The Nash equilibria in Total Effort games have much richer structural properties under behavioral probability weighting than the corresponding equilibria with players that are true expectation
maximizers. A sharper overweighting of small probabilities may disincentivize a node from reducing
her investment when her neighbors make high investments. Underweighting of large probabilities
leads to equilibria where the nodes are not completely unprotected, as opposed to equilibria without
probability weighting. The effect of behavioral probability weighting is most beneficial (in terms
of reducing the security risk) when the probability of successful attack is sufficiently high at the
PNE. On the other hand, if the attack probability is only moderately high, players with weighting
functions that are closer to linear have a more secure equilibrium. We obtained an upper bound on
the expected fraction of nodes that are successfully attacked at any PNE, in terms of the average
degree of the nodes. Furthermore, among the class of graphs with a given average degree davg , the
davg -regular graph has a PNE which achieves this upper bound. Conversely, star graphs achieve
the smallest average security risk upper bound among all connected graphs.
When the graph is connected, all nodes make identical investments in a Weakest Link game, and
there is a continuum of attack probabilities, independent of the graph structure, that can arise at
a PNE. On the other hand, a strategy profile is a PNE in a Best Shot game if and only if the nodes
making nonzero security investments form a maximal independent set. In both cases, equilibria are
never completely unprotected under behavioral probability weighting.
References
Saurabh Amin, Galina A Schwartz, and S Shankar Sastry. Security of interdependent and identical networked control
systems. Automatica, 49(1):186โ192, 2013.
16
Adam S Booij, Bernard MS Van Praag, and Gijs Van De Kuilen. A parametric analysis of prospect theoryโs functionals
for the general population. Theory and Decision, 68(1-2):115โ148, 2010.
Yann Bramoulleฬ, Rachel Kranton, and Martin Dโamours. Strategic interaction and networks. The American Economic
Review, 104(3):898โ930, 2014.
Colin F Camerer, George Loewenstein, and Matthew Rabin. Advances in behavioral economics. Princeton University
Press, 2011.
Diego Cerdeiro, Marcin Dziubinski, and Sanjeev Goyal. Contagion risk and network design. Working paper, 2015.
Nicolas Christin. Network security games: combining game theory, behavioral economics, and network measurements.
In Decision and Game Theory for Security, pages 4โ6. Springer, 2011.
Nicolas Christin, Serge Egelman, Timothy Vidas, and Jens Grossklags. Its all about the Benjamins: An empirical
study on incentivizing users to ignore security advice. In Financial Cryptography and Data Security, pages 16โ30.
Springer, 2011.
Richard W Cottle, Jong-Shi Pang, and Richard E Stone. The linear complementarity problem, volume 60. SIAM,
1992.
Andrea Galeotti, Sanjeev Goyal, Matthew O Jackson, Fernando Vega-Redondo, and Leeat Yariv. Network games.
The Review of Economic Studies, 77(1):218โ244, 2010.
Vaibhav Garg and Joseph Camp. Heuristics and biases: Implications for security design. IEEE Technology and
Society Magazine, 32(1):73โ79, 2013.
Bahman Gharesifard, Behrouz Touri, Tamer Basฬงar, and Jeff Shamma. On the convergence of piecewise linear strategic
interaction dynamics on networks. IEEE Transactions on Automatic Control, 61(6):1682โ1687, 2016.
Richard Gonzalez and George Wu. On the shape of the probability weighting function. Cognitive Psychology, 38(1):
129โ166, 1999.
Jens Grossklags and Benjamin Johnson. Uncertainty in the weakest-link security game. In Game Theory for Networks,
pages 673โ682, 2009.
Jens Grossklags, Nicolas Christin, and John Chuang. Security and insurance management in networks with heterogeneous agents. In 9th ACM Conference on Electronic Commerce, pages 160โ169, 2008.
Assane Gueye, Jean C Walrand, and Venkat Anantharam. Design of network topology in an adversarial environment.
In Decision and Game Theory for Security, pages 1โ20. Springer, 2010.
Jack Hirshleifer. From weakest-link to best-shot: The voluntary provision of public goods. Public Choice, 41(3):
371โ386, 1983.
Ashish R Hota and Shreyas Sundaram. Interdependent security games under behavioral probability weighting. In
Decision and Game Theory for Security, pages 150โ169. Springer, 2015.
Ashish R Hota, Siddharth Garg, and Shreyas Sundaram. Fragility of the commons under prospect-theoretic risk
attitudes. Games and Economic Behavior, 98:135โ164, 2016.
Libin Jiang, Venkat Anantharam, and Jean Walrand. How bad are selfish investments in network security?
IEEE/ACM Transactions on Networking, 19(2):549โ560, 2011.
Benjamin Johnson, Jens Grossklags, Nicolas Christin, and John Chuang. Are security experts useful? Bayesian Nash
equilibria for network security games with limited information. In ESORICS, pages 588โ606. Springer, 2010.
Howard Kunreuther and Geoffrey Heal. Interdependent security. Journal of Risk and Uncertainty, 26(2-3):231โ249,
2003.
Aron Laszka, Mark Felegyhazi, and Levente Buttyan. A survey of interdependent information security games. ACM
Computing Surveys (CSUR), 47(2):23, 2014.
17
Tianming Li and Narayan B Mandayam. When users interfere with protocols: Prospect theory in wireless networks
using random access and data pricing as an example. IEEE Transactions on Wireless Communications, 13(4):
1888โ1907, 2014.
Mohammad Hossein Manshaei, Quanyan Zhu, Tansu Alpcan, Tamer Basฬงar, and Jean-Pierre Hubaux. Game theory
meets network security and privacy. ACM Computing Surveys (CSUR), 45(3):25, 2013.
R Miura-Ko, Benjamin Yolken, John Mitchell, and Nicholas Bambos. Security decision-making among interdependent
organizations. In 21st Computer Security Foundations Symposium, pages 66โ80. IEEE, 2008.
Kien C Nguyen, Tansu Alpcan, and Tamer Basฬงar. Stochastic games for security in networks with interdependent
nodes. In International Conference on Game Theory for Networks, pages 697โ703. IEEE, 2009.
Cameron Nowzari, Victor M Preciado, and George J Pappas. Analysis and control of epidemics: A survey of spreading
processes on complex networks. IEEE Control Systems Magazine, 36(1):26โ46, 2016.
Efe A Ok. Real analysis with economic applications, volume 10. Princeton University Press, 2007.
Martin J Osborne and Ariel Rubinstein. A course in game theory. MIT press, 1994.
Ranjan Pal and Pan Hui. Modeling internet security investments: Tackling topological information uncertainty. In
Decision and Game Theory for Security, pages 239โ257. Springer, 2011.
Drazen Prelec. The probability weighting function. Econometrica, pages 497โ527, 1998.
Walid Saad, Arnold L Glass, Narayan B Mandayam, and H Vincent Poor. Toward a consumer-centric grid: A
behavioral perspective. Proceedings of the IEEE, 104(4):865โ882, 2016.
Bruce Schneier. The psychology of security. In Progress in CryptologyโAFRICACRYPT 2008, pages 50โ79. Springer,
2008.
Galina Schwartz, Saurabh Amin, Assane Gueye, and Jean Walrand. Network design game with both reliability and
security failures. In Allerton Conference on Communication, Control, and Computing, pages 675โ681, 2011.
Galina Schwartz, Nikhil Shetty, and Jean Walrand. Why cyber-insurance contracts fail to reflect cyber-risks. In
Allerton Conference on Communication, Control, and Computing, pages 781โ787. IEEE, 2013.
Amos Tversky and Daniel Kahneman. Advances in prospect theory: Cumulative representation of uncertainty.
Journal of Risk and Uncertainty, 5(4):297โ323, 1992.
Hal Varian. System reliability and free riding. In Economics of Information Security, pages 1โ15. Springer, 2004.
A
Proofs Pertaining to Equilibrium Characterization
Proof of Lemma 1:
Proof. For ease of notation, we will drop the subscript i since the proof holds for every player.
Let sฬ โ [0, d โ 1] be the total security investment by the neighbors and d be the size of the
extended neighborhood of the player. Under Assumption 3, the interval X (sฬ) in (6) falls into one
of four different cases.
Case 1: X < 1 โ 1+sฬ
d (i.e., sฬ < d(1 โ X) โ 1)
In this case, the interval X (sฬ) lies to the right of X. Therefore, at any attack probability
x โ X (sฬ), Ld wโฒ (x) > c (from Figure 2). Thus, โEu
โs |s=x > 0 and consequently, b(sฬ) = 1.
sฬ
1+sฬ
Case 2: 1 โ d โค X โค 1 โ d
In this case, X โ X (sฬ), and therefore, the player has a feasible investment strategy sโ =
d(1 โ X) โ sฬ at which the first order condition is satisfied with equality. For any investment y < sโ ,
โEu
L โฒ
we have the resulting attack probability 1 โ y+sฬ
d > X and โs = d w (X) โ c > 0. As a result, no
18
value of y < sโ would satisfy the first order necessary condition of optimality. On the other hand,
1
for any y > sโ , we have 1 โ y+sฬ
d < X. However, from our assumption that X > d + V , we would
y+sฬ
โEu
โ
โ
have 1 โ d > V . Therefore, โs < 0 for any y > s . As a result, x = s is the only candidate
for optimal investment, and it also satisfies the second order sufficient condition since wโฒโฒ (X) > 0
โ
as X > xmin,w . Since the optimal solution sโ must have the property that 1 โ s d+sฬ = X, it is
continuous and linearly decreasing in sฬ, with boundary values at 1 and 0 for sฬ = d(1 โ X) โ 1 and
sฬ = d(1 โ X), respectively.
In the remaining two cases, we have sฬ > d(1 โ X).
sฬ
Case 3: V < 1 โ 1+sฬ
d and X > 1 โ d
In this case, the interval X (sฬ) lies in the region between V and X. Therefore, for any true
attack probability x โ X (sฬ), โEu
โs < 0. As a result, b(sฬ) = 0.
1+sฬ
Case 4: 1 โ d โค V โค 1 โ dsฬ
In this case, there are three candidate solutions for utility maximization, s = 1, s = d(1 โ V ) โ sฬ
and s = 0. We have 1 โ s+sฬ
d as the true attack probability resulting from the strategies of the
players.
First we show that the player would always prefer to invest 1 over investing sโ = d(1 โ V ) โ sฬ.
We denote the resulting attack probability while investing 1 as Y1 = 1 โ 1+sฬ
d . Note that V โ Y1 =
1
โ ). Now using (4) we compute
(1
โ
s
d
Eu(1, sN ) โ Eu(sโ , sN )
=L(w(V ) โ w(Y1 )) โ c(1 โ sโ )
=L(w(V ) โ w(Y1 )) โ cd(V โ Y1 )
w(V ) โ w(Y1 ) dc
=L(V โ Y1 )
โ
(V โ Y1 )
L
dc
>L(V โ Y1 ) wโฒ (V ) โ
= 0,
L
where the inequality is due to the fact that w(x) is strictly concave for x โ [0, xmin,w ), and Y1 <
V < xmin,w . Therefore, the player will always prefer the boundary solution s = 1 to the potential
interior solution sโ .
This leads to the possibility that the best response might have a discontinuous jump from 0 to
1 at some value of sฬ in this region. However, we show that under the second and third conditions
of Assumption 3, the player would always prefer to invest 0 over investing 1. We compute
Eu(1, sN ) โ Eu(0, sN )
1 + sฬ
sฬ
โw 1โ
โc
=L w 1 โ
d
d
1
1
=L w ฮป +
โ w(ฮป) โ c โค L w
โ w(0) โ c,
d
d
1
where ฮป = 1 โ 1+sฬ
d . The last inequality follows because the function l1 (ฮป) , w(ฮป + d ) โ w(ฮป)
is a strictly decreasing function of ฮป for ฮป โ [0, V ]. Indeed, l1โฒ (ฮป) = wโฒ (ฮป + d1 ) โ wโฒ (ฮป) < 0, as
1
dc
1
1
c
โฒ
wโฒ (ฮป) โฅ wโฒ (V ) = dc
L , and w (ฮป + d ) < L , as V โค ฮป + d < X. Therefore, if w( d ) < L , the
player would always prefer to invest 0 over investing 1, regardless of the value of sฬ (including when
sฬ = d โ 1).
Proof of Proposition 2:
19
Proof. Without loss of generality, let players be ordered such that X1 โค X2 โค X3 โค . . . โค Xn ,
nci
โฒ
i
where Xi is the largest solution to wiโฒ (x) = nc
Li . When there is no solution to wi (x) = Li , i.e.,
i
minxโ[0,1] wโฒ (x) > nc
Li for a player, then we define Xi = 0 for that player. When Xn = 0, then all
players investing 1 is the only PNE.
The true attack probability at the PNE must be at least 0. When X1 > 0, no objective attack
probability 0 โค X < X1 would be a PNE, since there would always exist a player with positive
investment who would prefer to invest 0.
Now suppose there are two PNEs with different probabilities of successful attack X โ and Y โ ,
with X โ < Y โ . Consider the strategy profile with the smaller attack probability X โ . Note that
we have ruled out the possibility of X โ < X1 above. There are two exhaustive cases: either
Xl < X โ < Xl+1 for some player l, or Xl = X โ for some player l.
Let Xl < X โ < Xl+1 for some player l. By the definition of the quantities Xi , we have
โฒ
โ
i
wi (X โ ) < nc
Li for i โ {l + 1, . . . , n}, and therefore, si = 0 for i โ {l + 1, . . . , n}. Similarly,
l
โ
โ
i
wiโฒ (X โ ) > nc
Li and si = 1 for i โ {1, . . . , l}. In this case, X = 1 โ n . Now at the second PNE
โ
โ
with true attack probability Y > X , the players in {1, . . . , l} would continue to invest 1, with
the possibility of more players investing nonzero amounts if Y โ โฅ Xl+1 . But then the true attack
probability would decrease from X โ , contradicting the assumption that Y โ > X โ . The proof of the
case where X โ = Xl for some player l follows identical arguments.
B
Linear Complementarity Problem Formulation
We can exploit the structure of the best response as presented in (8) to represent the Nash equilibrium strategy profile as a solution to a Linear Complementarity Problem (LCP).4
Proposition 11. Consider a total effort game on a graph with n vertices with adjacency matrix A,
and let dLi cii > wiโฒ (xmin,wi ) for every player i. Then, under Assumptions 1 and 3, a strategy profile
is a Nash equilibrium of this game if and only if it is a solution of the LCP (q, M), where q โ R2n
and M โ R2nร2n are given by
โd(1 โ X2 )
A + In In
q=
,
and M =
โIn
0nรn
1nร1
where the jth entry of q is dj (1 โ X2j ) for j โ {1, 2, . . . , n}.
s
Proof. The solution to the LCP (q, M) is a vector z โ
which we can write as z =
, where
ยต
s is the vector of investments by the players (strategy profile) and ยต is a set of variables which
assume nonzero values when a corresponding investment si = 1.
From the definition of a LCP, the solution z โฅ 0, i.e., s โฅ 0 and ยต โฅ 0. Secondly, from
q + Mz โฅ 0, for each player i, we have
X
si +
sj + ยตi โฅ di (1 โ X2i ), and
R2n
jโN (i)
โ si + 1 โฅ 0.
The second inequality ensures that si โค 1. Therefore, the investment by any player at any solution
of the LCP is feasible, i.e., si โ [0, 1].
4
Formally, given a vector q โ R n , and a matrix M โ R nรn , the LCP (q, M ) is the problem of finding a solution
vector z โ R n such that i) z โฅ 0, ii) q + M z โฅ 0, and iii) z T (q + M z) = 0.
20
Finally, zT (q + Mz) = 0 gives us
X
si (si +
sj + ยตi โ di (1 โ X2i )) = 0,
and
jโN (i)
ยตi (โsi + 1) = 0,
for every node i. As a result, when si โ (0, 1), we have ยตi = 0, and therefore, the investments satisfy
the second part of equation (8). When si = 0, we also have ยตi = 0, and the resulting investments
satisfy the third part of equation (8). Finally, when si = 1, we have ยตi > 0 such that the first part
of equation (8) holds. This concludes the proof.
A comprehensive discussion on LCPs and different solutions algorithms can be found in [Cottle
et al., 1992]. The structure of the LCP often determines the performance of different algorithms. We
show that the LCP defined in Proposition 11 satisfies certain properties, as proven in Proposition 12,
that guarantee the convergence of the Lemkeโs pivotal method to converge to a solution (i.e., a PNE
strategy profile), if the problem is non degenerate. The convergence result is due to [Cottle et al.,
1992].
Proposition 12. For the LCP (q, M) defined in Proposition 11,
1. the matrix M is copositive and
2. q โ SOL(0, M)โ .
Proof. For the proof of the first statement, consider any vector xT = [x1
i = 1, 2. Then we have,
T
T Ax1 + x1 + x2
x Mx = [x1 x2 ]
โx1
x2 ]T where xi โฅ 0, for
T
= xT
1 Ax1 + x1 x1 โฅ 0.
y1
For the second part, consider any solution y =
of the LCP (0, M). Then, we must have
y2
(A + In )y1 + y2
y โฅ 0, and My =
โฅ 0. As a result, we must have y1 = 0.
โy1
For any vector yT = y1T y2T , with y1 = 0 and y2 โฅ 0, we have qT y = 1T
nร1 y โฅ 0. Thus,
q โ SOL(0, M)โ .
C
Proofs Pertaining to the Effects of Network Structure
Proof of Lemma 2:
Proof. We denote the inverse of wโฒ (ยท) as the function h(ยท), i.e., h : R+ โ [xmin,w , โ) such that
21
h( dc
L ) = X. Now, consider the function
dc
ฯ(d) , d(1 โ X) = d 1 โ h
L
โฒ
dc
dc
โd h
=โ ฯโฒ (d) = 1 โ h
L
L
dc
1
dc
= 1โh
โ
โฒโฒ
L
L w (h dc
L )
dc 1
= 1โX โ
.
L wโฒโฒ (X)
The second inequality follows from differentiating the inverse of the wโฒ function. Now for x โ
(xmin,w , 1), the weighting function w satisfies
1
wโฒโฒ (x)
<
wโฒ (x)
1โx
dc 1
wโฒ (X)
=
=โ ฯโฒ (d) < 0.
=โ (1 โ X) < โฒโฒ
w (X)
L wโฒโฒ (X)
Since ฯ(d) is strictly decreasing in d, we have d(1 โ X) strictly decreasing when d is interpreted as
the size of the extended neighborhood of a node.
Proof of Proposition 6:
Proof. We first show that when di (1 โ Xi ) < 1, the attack probability at node i is at most Xi at
a PNE. Recall from Lemma 1 that the best response of player i is bi (sฬโi ) = 1 when the aggregate
investment by her neighbors sฬโi โค di (1 โ Xi ) โ 1. When di (1 โ Xi ) < 1, the above condition is
not satisfied since sฬโi โฅ 0. As a result, the investment of player i at any PNE lies in [0, 1). When
sฬโi โฅ di (1 โ Xi ), the investment by node i is 0, and the resulting attack probability is at most Xi .
Otherwise, the sum of the investments by node i and her neighbors satisfy the first order condition
(5) with equality, in which case the resulting attack probability is exactly Xi .
The upper bound on average attack probability follows by averaging Xi โs over all nodes. At an
interior PNE, each player experiences an attack probability exactly equal to Xi and therefore the
bound holds with equality.
D
Proofs Pertaining to the Impact of Weighting Function
We first state and prove the following lemma whose result will be useful in the proof of Lemma 3.
Lemma 5. The function
g(x) , (โ ln(x))ฮฑ2 โฮฑ1 exp((โ ln(x))ฮฑ1 โ (โ ln(x))ฮฑ2 ),
with ฮฑ1 < ฮฑ2 < 1 is strictly decreasing for x โ [ 1e , 1].
22
Proof. We compute
gโฒ (x) = exp((โ ln(x))ฮฑ1 โ (โ ln(x))ฮฑ2 )ร
โ1
(ฮฑ1 (โ ln(x))ฮฑ1 โ1 โ ฮฑ2 (โ ln(x))ฮฑ2 โ1 ) ร
x
ฮฑ2 โฮฑ1
(โ ln(x))
ฮฑ2 โฮฑ1 โ1 1
โ (ฮฑ2 โ ฮฑ1 )(โ ln(x))
x
1
= exp((โ ln(x))ฮฑ1 โ (โ ln(x))ฮฑ2 )(โ ln(x))ฮฑ2 โฮฑ1 โ1
x
ร [โ(ฮฑ1 (โ ln(x))ฮฑ1 + ฮฑ1 + ฮฑ2 (โ ln(x))ฮฑ2 โ ฮฑ2 ] .
When x > 1e , (โ ln(x)) < 1 and thus 1 > (โ ln(x))ฮฑ1 > (โ ln(x))ฮฑ2 . As a result, 1 โ (โ ln(x))ฮฑ1 <
1 โ (โ ln(x))ฮฑ2 . Since ฮฑ1 < ฮฑ2 , this implies ฮฑ1 (โ ln(x))ฮฑ1 โ ฮฑ1 > ฮฑ2 (โ ln(x))ฮฑ2 โ ฮฑ2 . Therefore,
gโฒ (x) < 0 for x โ [ 1e , 1].
Proof of Lemma 3:
Proof. The first derivative of the Prelec weighting function is given by wโฒ (x) = w(x) ฮฑx (โ ln(x))ฮฑโ1 .
Therefore, if at a given x, w1โฒ (x) = w2โฒ (x), we have
w1 (x)ฮฑ1 (โ ln(x))ฮฑ1 = w2 (x)ฮฑ2 (โ ln(x))ฮฑ2
w2 (x)(โ ln(x))ฮฑ2
ฮฑ1
=
=โ
ฮฑ2
w1 (x)(โ ln(x))ฮฑ1
ฮฑ1
= (โ ln(x))ฮฑ2 โฮฑ1 exp((โ ln(x))ฮฑ1 โ (โ ln(x))ฮฑ2 )
=โ
ฮฑ2
ฮฑ1
= g(x).
=โ
ฮฑ2
From the definition of g(x), g( 1e ) = 1 > ฮฑฮฑ12 . Furthermore, as x โ 1, g โฒ (x) โ โโ. As a result,
g(x) becomes smaller than ฮฑฮฑ12 for some x < 1. Thus there exists Xฬ at which w1โฒ (x) = w2โฒ (x). The
uniqueness of Xฬ follows from the strict monotonicity of g(x) as proved in Lemma 5.
In order to prove the second and third parts of the lemma, it suffices to show that w1โฒโฒ (Xฬ) >
w2โฒโฒ (Xฬ). Therefore, we compute
wโฒโฒ (x) =
wโฒ (x)
[1 + ln(x) + ฮฑ((โ ln(x))ฮฑ โ 1)].
โx ln(x)
From the previous discussion in Lemma 5, ฮฑ1 (โ ln(x))ฮฑ1 โ ฮฑ1 > ฮฑ2 (โ ln(x))ฮฑ2 โ ฮฑ2 , and wโฒโฒ (x) > 0
for x > 1e . Therefore at Xฬ, w1โฒโฒ (Xฬ) > w2โฒโฒ (Xฬ). This concludes the proof.
E
Proofs Pertaining to Weakest Link and Best Shot Games
Proof of Lemma 4:
Proof. Consider the function l2 (x) , wโฒ (x) โ
w(xmin,w )
โ xmin,w
w(x)
x
for x โ [xmin,w , 1). At x = xmin,w , l2 (x) =
< 0. Furthermore, l2 (1 โ วซ) โ โ as วซ โ 0. Therefore, l2 (x) must have a root for
x โ [xmin,w , 1).
23
Suppose there exist z1 , z2 with z1 < z2 such that wโฒ (zi ) =
convex for x โ (xmin,w , 1], we have
w(zi )
zi , i
โ {1, 2}. Since w(x) is strictly
w(z1 ) > w(z2 ) + wโฒ (z2 )(z1 โ z2 ) = z1 wโฒ (z2 )
w(z1 )
> wโฒ (z2 ) > wโฒ (z1 ),
=โ
z1
which is a contradiction. Thus, z is unique.
For the second part, suppose that there exists an x > z at which wโฒ (x) โค
convexity of w, we have
w(x)
x .
Again from the
w(z) > w(x) + wโฒ (x)(z โ x) โฅ zwโฒ (x)
w(z)
> wโฒ (x) > wโฒ (z),
=โ
z
which contradicts the definition of z.
Proof of Proposition 8:
Proof. When there is a single player investing in isolation, we have three candidate solutions for
utility maximization, s1 = 1 โ V , s2 = 1 โ X or s3 = 1. Here X and V are solutions to wโฒ (x) = Lc ,
as defined in Section 4. Note that since Lc is finite, we have โEu
โs > 0 at s = 0, so investing 0 in
security is not a utility maximizer.
From the analysis in Case 4 of Lemma 1 with sฬ = 0 and d = 1, we have Eu(1) > Eu(1 โ V ).
Therefore, between the potential interior solution s1 = 1 โ V that satisfies the first order condition,
and the boundary solution s3 = 1, the player always prefers the boundary solution.
Now, to compare the utilities at the solutions s2 and 1, we compute
Eu(1) โ Eu(s2 ) = Lw(1 โ s2 ) โ c(1 โ s2 )
w(1 โ s2 )
โฒ
โ w (1 โ s2 ) ,
= L(1 โ s2 )
1 โ s2
where Lc = wโฒ (1 โ s2 ). Thus, from Lemma 4, when wโฒ (1 โ s2 ) = Lc > wโฒ (z), then, 1 โ s2 > z and
the player prefers to invest s2 . Otherwise, the optimal investment is 1.
24
| 3cs.SY
|
1
Link Selection in Hybrid RF/VLC Systems
under Statistical Queueing Constraints
Marwan Hammouda, Sami Akฤฑnโ , Anna Maria Vegni, Harald Haas, and Juฬrgen
arXiv:1711.08175v1 [cs.IT] 22 Nov 2017
Peissig
Abstract
The co-deployment of radio frequency (RF) and visible light communications (VLC) technologies
has been investigated in indoor environments to enhance network performances and to address specific
quality-of-service (QoS) constraints. In this paper, we explore the benefits of employing both technologies when the QoS requirements are imposed as limits on the buffer overflow and delay violation
probabilities, which are important metrics in designing low latency wireless networks. Particularly, we
consider a multi-mechanism scenario that utilizes RF and VLC links for data transmission in an indoor
environment, and then propose a link selection process through which the transmitter sends data over
the link that sustains the desired QoS guarantees the most. Considering an ON-OFF data source, we
employ the maximum average data arrival rate at the transmitter buffer and the non-asymptotic bounds
on data buffering delay as the main performance measures. We formulate the performance measures
under the assumption that both links are subject to average and peak power constraints. Furthermore,
we investigate the performance levels when either one of the two links is used for data transmission, or
when both are used simultaneously. Finally, we show the impacts of different physical layer parameters
on the system performance through numerical analysis.
Index Terms
Visible light communications, quality-of-service constraints, buffering delay bound, link selection,
multi-mechanisms.
M. Hammouda, S. Akฤฑn, and J. Peissig are with the Institute of Communications Technology, Leibniz Universitaฬt Hannover,
30167 Hanover, Germany. E-mails: {marwan.hammouda, sami.akin, and peissig}@ikt.uni-hannover.de.
A. M. Vegni is with COMLAB laboratory, Department of Engineering, Roma TRE University, 00146 Roma, Italy. E-mail:
[email protected].
H. Haas is with the Institute for Digital Communications, Li-Fi Research and Development Centre, the University of Edinburgh,
Edinburgh, UK, EH9 3JL. E-mail: [email protected].
โ This work was supported by the European Research Council under Starting Grantโ306644.
2
I. I NTRODUCTION
The ever-growing demand for mobile communications triggered a quest for technical solutions
that will support stringent quality-of-service (QoS) constraints. Thanks to the significant advances
in white light emitting diodes (LEDs) research, and the availability of an extensive unregulated
spectrum, visible light communication (VLC) has emerged as a promising technology. We can
utilize LEDs simultaneously for data transmission and illumination, since they have many unique
aspects compared to the other communication technologies [1]. Moreover, we can improve
data security because light does not penetrate the surrounding walls. We can also sustain an
all-important green agenda and minimize the installation costs because we do not require an
extensive infrastructure. Nevertheless, attention must be paid to certain limitations and challenges
in VLC systems, e.g., smaller coverage, strong dependence on line-of-sight components and
achievable rates that vary with spatial fluctuations [2]. In order to overcome these constraints,
researchers proposed hybrid RF/VLC systems [1], [3]โ[13], where end users can benefit from
the wide coverage area that RF systems support and the stable rates that VLC systems provide.
Such networks are practically feasible as RF and VLC systems can coexist without causing
interference on each other and operate in the same environment, such as offices and rooms.
Comparing hybrid RF/VLC systems with systems that employ either RF or VLC only, the
authors in [1], [3], [4], [7], [14] demonstrated a remarkable increase in data transmission
throughput, energy efficiency and delay performance in hybrid RF/VLC systems. Moreover,
the authors in [5], [6] projected a hybrid system in which they use VLC links for down-link
communication and RF links for up-link communication. In such a system, the authors in [8]โ
[10] and the ones in [12], [13], [15] investigated handover and load balancing mechanisms,
respectively. Alternatively, considering an outdoor environment, the authors in [16] studied a
point-to-point transmission scenario in which the system can switch between RF links and VLC
links after comparing the signal-to-noise ratio levels in each link. Regarding the same system
setting, the authors in [17] assumed that both RF and VLC links have the same transmission
rates, and then proposed a diversity-based transmission scheme such that the transmitter sends
data by employing both links simultaneously.
The aforementioned studies analyzed the hybrid RF/VLC systems mostly from the physical
layer perspective, i.e., they did not concentrate on the data link layer metrics, such as limits on
the buffer overflow and buffering delay probabilities, as much as needed. Noting the dramatic
3
increase in the demand for reliable delay-sensitive services in recent years (mobile video traffic
making up 55% of the total global data traffic at the end of 2014 [18]), in addition to the
physical layer performance metrics, we need QoS metrics that can be a cross-layer analysis tool
between the physical layer features and the performance levels in data-link layer. In this context,
the authors in [19]โ[25] performed cross-layer analysis between physical and data-link layers
in many different RF scenarios. Regarding a Markovian data arrival process at a transmitter
buffer and a statistically varying data service process in a wireless channel, the authors in [25]
characterized the maximum average data arrival rate at the transmitter buffer with the presence
of statistical constraints on the buffer overflow probability. On the other hand, to the best of
our knowledge, there are only a few studies that investigated cross-layer performance levels in
VLC systems. For example, the authors employed effective capacity as a performance measure
in resource allocation schemes in VLC systems [26] and heterogeneous networks composed of
VLC and RF links [27]. Here, we note that the authors in [27] concentrated on the case of
constant data arrival rates at the transmitter buffer, which is not realistic in certain practical
settings. For more details in effective capacity, we refer to [20].
In this paper, assuming an ON-OFF modeled data arrival process at the transmitter buffer and
that the transmitter can use both RF and VLC channels for data transmission, we investigate the
performance gains achieved by a hybrid RF/VLC system. This operates under statistical QoS
constraints, which are inflicted as limits on the buffer overflow and delay violation probabilities.
We perform a cross-layer analysis of these hybrid systems in physical and data-link layers. We
employ first the maximum average data arrival rate at the transmitter buffer considering the
asymptotic buffer overflow probability approximation, and then non-asymptotic buffering delay
violation probability as the main performance measures. We propose a mathematical toolbox
to system designers for performance analysis in hybrid RF/VLC systems that work under low
latency conditions. To summarize, the main contributions of this paper are as follows:
1) Assuming that both RF and VLC links are subject to average and peak power constraints,
we express the maximum average data arrival rate at the transmitter that the data service
process from the transmitter to the receiver can support under QoS constraints when either
the RF or VLC link is used, or both links are simultaneously used for data transmission.
2) We propose three different link usage strategies. We base two of the proposed strategies
on the assumption that the receiver does not have a multihoming capability, thus data
transmission is possible over only one link, either the RF or VLC link. In the third strategy,
4
we assume that link aggregation is possible and data can be transmitted over both links
simultaneously following a power sharing policy.
3) We obtain the non-asymptotic data backlog and buffering delay violation probability bounds
considering the proposed link usage strategies.
Particularly, we provide a rudimentary model for multi-mechanisms in communication systems
that operate under QoS constraints. We employ RF and VLC links as two different mechanisms.
Our model can be easily invoked in settings with more than two different mechanisms as well.
The reason behind multi-mechanisms in communications is to boost performance levels through
the increased degree of freedom. Therefore, in order to introduce our model smoothly and make
it easier for readers to understand our objective, we also benefit from the existing literature in
RF and VLC studies. However, to the best of our knowledge, the analytical framework provided
in this paper, in which we investigate the QoS performance, is not addressed in other studies.
One aspect of this hybrid system is that VLC links provide time-invariant transmission rates,
while RF links provide rates that vary over time. A communication setting that depends solely
on an RF link may suffer low transmission rates, and have longer data backlogs in the transmitter
buffer. However, a communication setting that can utilize both RF and VLC links, for instance,
can take advantage of the constant transmission rate in the VLC link when the transmission rate
in the RF link falls below a certain level. The rest of the paper is organized as follows. We
introduce the hybrid RF/VLC system in Section II. We provide detailed descriptions of both RF
and VLC channels. In Section III, we provide the performance analysis and the link selection
process. In Section IV, we substantiate our results with numerical demonstrations. We conclude
the paper in Section V and relegate the proofs to the Appendix.
II. S YSTEM M ODEL
We consider a network access controller that provides a connection to a user1 , through either an
RF access point or a VLC access point, which are positioned at different locations in an indoor
environment as seen in Figure 1. Herein, we assume a down-link scenario, i.e., the network
access controller acts as a transmitter and the user acts as a receiver. In the sequel, we use
transmitter and receiver instead of network access controller and user, respectively. Initially,
1
The analytical framework provided in this paper can easily be extended to a multi-user scenario. For more details, we refer
to Remark 4 in Section III.
5
Fig. 1. Hybrid RF/VLC system.
the transmitter receives data from a source (or sources) and stores it as packets in its buffer.
Subsequently, it sends the data packets in frames of T seconds to the receiver following a given
transmission strategy. The receiver is considered to be equipped with an RF front-end and a
photo-diode. We also note that the VLC coverage area is generally smaller than the RF coverage
area, and that they overlap2 . Finally, we consider a power-limited system and assume that the
network controller is constrained by a fixed average power budget, denoted as Pavg , for data
transmission. In the sequel, we initially introduce the RF and VLC channels, and then describe
the data source model.
A. RF Channel Model
During the data transmission in the flat-fading RF channel, the input-output relation at time
instant t is expressed as
yr (t) = xr (t)h(t) + wr (t),
(1)
where xr (t) and yr (t) are the complex channel input and output at the RF access point of
the transmitter and the RF front-end of the receiver, respectively. The complex channel input
is subject to an average power constraint, Pavg,r , i.e., E{|xr (t)|2 } โค Pavg,r , and a peak power
constraint, Ppeak,r , i.e., |xr (t)|2 โค Ppeak,r . Above, h(t) is the complex channel fading gain with
an arbitrary distribution having a finite average power, i.e., E{|h(t)|2 } < โ. Furthermore, we
consider a block-fading channel and assume that the fading gain stays constant during one
transmission frame (T seconds), i.e., h(lT ) = h(lT + B1r ) = ยท ยท ยท = h((l + 1)T โ B1r ) = hl , where
the available bandwidth is Br Hz in the channel and hl is the channel fading gain in the lth time
frame. Note that there are T Br symbols transmitted in one time frame. Moreover, the fading
gain changes independently from one frame to another. Meanwhile, wr (t) is the additive noise at
2
This model is also considered in [9].
6
the RF front-end of the receiver, which is a zero-mean, circularly symmetric complex Gaussian
random variable with variance ฯr2 , i.e., E{|wr (t)|2 } = ฯr2 < โ. The noise samples {wr (t)} are
assumed to be independent and identically distributed.
We assume that a reliable data transmission exists as long as the transmission rate in the
channel is lower than or equal to the instantaneous mutual information between the channel
input and output3 . In particular, when the transmission rate in the lth time frame (i.e., Rl bits per
frame) is lower than or equal to the instantaneous mutual information (i.e., Cr,l bits per frame)
between the channel input [xr (lT ), xr (lT + B1r ), ยท ยท ยท , xr ((l + 1)T โ B1r )] and the channel output
[yr (lT ), yr (lT +
1
), ยท ยท ยท
Br
, yr ((l + 1)T โ
1
)],
Br
a reliable data transmission occurs and Rl bits
are decoded correctly by the receiver. Here, we assume that T Br is large enough so that the
decoding error probability is negligible when Rl โค Cr,l . In [30], a lower bound on the maximum
mutual information (or channel capacity) is provided, where the input has a two-dimensional
circularly truncated Gaussian distribution. Therefore, we set the instantaneous data transmission
rate to the lower bound and assume that the input has a two-dimensional circularly truncated
Gaussian distribution. Specifically, we have a reliable transmission in the lth time frame when
bPavg,r
2|hl |2
exp
โ1
โค Cr,l bits per frame,
(2)
Rl = T Br log2 1 +
aฯr2
2
where a and b are the solutions of the following equations:
bPpeak,r
a
1 โ exp โ
= 1,
b
2
(2a)
and
bPpeak,r
bPpeak,r
Pavg,r
a
โ1
2 (bPpeak,r )
1 โ exp โ
1+
=
.
b
2
2
Ppeak,r
(2b)
Above, Cr,l is time-dependent and changes from one time frame to another because the maximum
instantaneous mutual information in each frame is a function of the channel fading gain.
B. VLC Channel Model
We assume that the transmitter employs intensity modulation/direct detection. Principally, the
VLC access point of the transmitter is equipped with an LED and the data is modulated on the
intensity of the emitted light. The receiver that collects light using a photo-diode generates an
3
This assumption is based on the known result in the literature that transmitting data at rates less than or equal to the
instantaneous mutual information has a high reliability, thus the decoding error is negligible [28, Eq. (10)] [29].
7
electrical current or voltage proportional to the intensity of the received light. Besides, we know
that VLC channels are typically composed of line-of-sight as well as multi-path components.
However, the majority of the collected energy at photo-diodes (more than 95%) comes from the
line-of-sight components in typical indoor scenarios [31]. Therefore, we can assume that the
VLC channel is flat with a dominant line-of-sight component [32]โ[34], and the channel gain
does not vary during the data transmission as long as the receiver is stationary4 . Accordingly,
the input-output relation in the VLC channel between the VLC access point of the transmitter
and the photo-diode of the receiver at time instant t is given as follows:
yv (t) = โฆxv (t)g + wv (t),
(3)
where xv (t) and yv (t) are the real-valued channel input and output, respectively. Above, โฆ is the
optical-to-electrical conversion efficiency (or detector responsivity) of the photo-diode in amperes
per watt and wv (t) is the additive noise at the photo-diode of the receiver, which is a zero-mean,
real Gaussian random variable with variance ฯv2 , i.e., E{wv2 } = ฯv2 . The noise samples {wv } are
independent and identically distributed. Moreover, g is the time-invariant optical channel gain.
Recall that the data transmitted over the VLC link is modulated on the light that illuminates the
environment. Hence, assuming that the operation range of the radiated optical power is limited
between Pmin and Pmax when the light is on, we modulate the data between the power levels Pmin
and Pmax , i.e., Pmin โค xv (t) โค Pmax . As a result, the data bearing symbol, xฬv = xv (t) โ Pmin
is limited as follows: xฬv โค Pmax โ Pmin = Ppeak,v . Hence, we can re-express the input-output
relation in (3) as
yฬv (t) = yv (t) โ โฆPmin g = โฆxฬv (t)g + wv (t).
(4)
Now, assuming that the expected value of xฬv (t) is bounded by Pavg,v , i.e., E{xฬv (t)} โค Pavg,v ,
and that the available bandwidth in the optical channel is Bv Hz, we set the transmission rate
in the channel in bits per frame to the lower bound on the channel capacity, which is defined
as follows [36]:
V =
4
T Bv
log2
2
(
)
โยต? 2
Pavg,v ?
โฆg
1โe
2
exp 2
โค Cv ,
1 + Ppeak,v
ยต โ1
2
2ฯฯv
Ppeak,v
ยต?
2 2
(5)
Small-scale variations in VLC channels (i.e., fading) is mitigated since the area of a photo-diode is much larger than the
light wavelength [35, Sec. 2.5]. Thus, VLC channels are known as time-invariant. This fact is almost true regardless of the
frame duration or the user being stationary or mobile in indoor environments, because the users are either stationary or move
very slowly.
8
Fig. 2. State transition model of the data arrival process.
when 0 โค
Pavg,v
Ppeak,v
< 21 , and
T Bv
ฯ 2 g 2 โ1
2
V =
โค Cv ,
log2 1 + Ppeak,v
e
2
2ฯฯv2
when
1
2
โค
Pavg,v
Ppeak,v
(6)
โค 1, where ยต? is the unique solution to
Pavg,v
1
eโยต
= โ
.
Ppeak,v
ยต 1 โ eโยต
(7)
Above, Cv and V are constant values, because the mutual information in the VLC link does
not change by time, i.e., due to the strong line-of-sight channel component, the channel gain, g,
does not change. As for the input distribution, we refer to [36, Eq. 42].
C. Source Model
Regarding the data arrival process at the transmitter buffer, we consider a two-state discretetime Markov process5 with ON and OFF states in each time frame. When the source is in the
ON state in one time frame, the data from a source (or sources) arrives at the transmitter buffer.
In the ON state, we consider a constant data arrival rate, i.e., ฮป bits per frame. The number of
bits arriving at the transmitter buffer is zero in the OFF state. As shown in Fig. 2, the transition
probability from the ON state to the OFF state is denoted by ฮฑ and the transition from the OFF
state to the ON state is denoted by ฮฒ. The probability of staying in the ON state is 1 โ ฮฑ and
the probability of staying in the OFF state is 1 โ ฮฒ. Hence, the state transition matrix becomes
๏ฃฎ
๏ฃน
1โฮฑ
ฮฑ
๏ฃป.
J =๏ฃฐ
(8)
ฮฒ
1โฮฒ
Now, let pON and pOFF be the steady-state probabilities of the data arrival process being in the
ON and OFF states, respectively, where pON + pOFF = 1. Then, we have the following equality:
5
We can project certain data arrival models on ON-OFF Markov processes. For instance, voice sources are generally modeled
with ON and OFF states [37].
9
[pON pOFF ] = [pON pOFF ]J. Subsequently, we have pON =
average data arrival rate at the transmitter buffer is
ฮฒฮป
ฮฑ+ฮฒ
ฮฒ
ฮฑ+ฮฒ
and pOFF =
ฮฑ
,
ฮฑ+ฮฒ
and hence, the
bits per frame. We finally note that the
following analysis can easily be extended to other source models.
III. P ERFORMANCE A NALYSIS
In this section, we investigate the performance levels that the aforementioned system achieves
by opportunistically exploiting the RF and VLC channels for data transmission. Herein, because
the data is initially stored in the transmitter buffer before transmission, we assume that certain
constraints are applied on the amount of the data in the buffer and the buffering delays. Therefore,
we examine the system under QoS constraints that are associated with buffer overflow (data
backlog) and buffering delay, and express the decay rate of the tail distribution of the queue
length as [19, Eq. (63)]
loge Pr{Q โฅ q}
,
qโโ
q
ฮธ = โ lim
(9)
where Q is the stationary queue length, Q(t) (see Fig. 1), and q is the buffer overflow threshold.
Above, ฮธ > 0 denotes the decay rate of the tail distribution of the data backlog, Q. Accordingly,
we can approximate the buffer overflow probability for a large threshold, qmax , as Pr{Q โฅ
qmax } โ eโฮธqmax . Notice that the buffer overflow probability decays exponentially with a rate
controlled by ฮธ, which is also defined as the QoS exponent. Basically, larger ฮธ implies stricter
QoS constraints, whereas smaller ฮธ corresponds to looser constraints.
Recall that the outgoing service from the transmitter queue is Rl , given in (2), when the data
is sent through the RF channel and it is V , given in (5) and (6), when the data is sent through
the VLC channel, while the data arrival is ON-OFF Markov process with ฮป bits per frame in
the ON state and zero bits in the OFF state. Hence, assuming that the buffer size is infinite
and considering independent data arrival and work-conserving data service processes, there exist
unique ฮธr? > 0 and ฮธv? > 0 such that ฮa (ฮธr? ) = โฮr (โฮธr? ) and ฮa (ฮธv? ) = โฮv (โฮธv? ), respectively,
where ฮa (ฮธ), ฮr (ฮธ) and ฮv (ฮธ) are the asymptotic log-moment generating functions of the total
amount of bits arriving at the transmitter buffer, the total service from the transmitter in the RF
channel and the total service from the transmitter in the VLC channel, respectively [38, Theorem
10
2.1]. In particular, the asymptotic log-moment generating functions for any ฮธ are
q
๏ฃฑ
๏ฃผ
๏ฃฒ 1 โ ฮฒ + (1 โ ฮฑ)eฮธฮป + [1 โ ฮฒ + (1 โ ฮฑ)eฮธฮป ]2 โ 4(1 โ ฮฑ โ ฮฒ)eฮธฮป ๏ฃฝ
ฮa (ฮธ) = loge
,
๏ฃณ
๏ฃพ
2
ฮr (ฮธ) = loge Eh eฮธRl
and ฮv (ฮธ) = ฮธV.
(10)
(11)
We refer to [39, Example 7.2.7] for obtaining the log-moment generating functions. Using
ฮa (ฮธr? ) = โฮr (โฮธr? ), we can express the maximum average data arrival rate at the transmitter
buffer that the service process in the RF channel can sustain for any ฮธ > 0 as
โ2ฮr (โฮธ)
e
โ (1 โ ฮฒ)eโฮr (โฮธ)
ฮฒ
ฯr (ฮธ) =
loge
(ฮฑ + ฮฒ)ฮธ
(1 โ ฮฑ)eโฮr (โฮธ) โ (1 โ ฮฑ โ ฮฒ)
(
)
1 โ (1 โ ฮฒ)Eh eโฮธRl
ฮฒ
=
loge
,
(ฮฑ + ฮฒ)ฮธ
(1 โ ฮฑ)Eh {eโฮธRl } โ (1 โ ฮฑ โ ฮฒ)E2h {eโฮธRl }
(12)
where Rl is given in (2). For the derivation of ฯr (ฮธ), we refer to Appendix A. Likewise, using
ฮa (ฮธv? ) = โฮv (โฮธv? ) and following the steps in Appendix A, we can also express the maximum
average data arrival rate at the transmitter buffer that the service process in the VLC channel
can sustain for any ฮธ > 0 as
eโ2ฮv (โฮธ) โ (1 โ ฮฒ)eโฮv (โฮธ)
(1 โ ฮฑ)eโฮv (โฮธ) โ (1 โ ฮฑ โ ฮฒ)
ฮฒ
e2ฮธV โ (1 โ ฮฒ)eฮธV
=
loge
,
(ฮฑ + ฮฒ)ฮธ
(1 โ ฮฑ)eฮธV โ (1 โ ฮฑ โ ฮฒ)
ฮฒ
ฯv (ฮธ) =
loge
(ฮฑ + ฮฒ)ฮธ
(13)
where V is given in (5) and (6) accordingly with the relation between Pavg and Ppeak . Moreover,
in the special case where ฮฑ = 0 and ฮฒ = 1, the expressions in (12) and (13) provide the effective
capacity, which is the maximum sustainable constant data arrival rate by the channel process
given the QoS constraints [20]. In another special case where ฮฑ +ฮฒ = 1, i.e., the state-transitions
are independent of the past and current states, we have
)
(
2ฮธVl
1 โ ฮฑEh eโฮธRl
ฮฒ
e
โ ฮฑeฮธVl
ฮฒ
and ฯv (ฮธ) = loge
.
ฯr (ฮธ) = loge
ฮธ
ฮฒEh {eโฮธRl }
ฮธ
ฮฒeฮธVl
(14)
A. Link Selection Policy
In this section, we focus on the channel selection process that the transmitter employs. We
set the maximum average data arrival rate under QoS constraints as the objective in the channel
selection process. In particular, the transmitter chooses the channel in which the service process
maximizes the average data arrival rate at the transmitter buffer. Notice that the transmission
11
rate in the VLC channel is constant, whereas the transmission rate in the RF channel varies due
to the changes in the channel fading gain. Now, due to the fact that the channel fading gains
are known by the receiver as well as the transmitter, we provide the following proposition.
Proposition 1: In the aforementioned RF/VLC system, the transmitter sends data to the receiver
over the VLC link when the following condition for a given QoS exponent, ฮธ, holds:
q
๏ฃฑ
๏ฃผ
2
๏ฃฒ
๏ฃฝ
[1
โ
ฮฒ
+
(1
โ
ฮฑ)ฮพ]
โ
4(1
โ
ฮฑ
โ
ฮฒ)ฮพ
1
โ
ฮฒ
+
(1
โ
ฮฑ)ฮพ
+
1
V โฅ loge
,
๏ฃณ
๏ฃพ
ฮธ
2
where
1 โ (1 โ ฮฒ)Eh eโฮธRl
.
ฮพ=
(1 โ ฮฑ)Eh {eโฮธRl } โ (1 โ ฮฑ โ ฮฒ)E2h {eโฮธRl }
(15)
(16)
Proof: See Appendix B.
Proposition 1 states that if the maximum attainable transmission rate in the VLC channel is
greater than the right-hand side of (15), the transmitter should perform transmission over the
VLC link because the statistical variations in the RF channel deteriorates the buffer stability.
Meanwhile, in the special case when ฮฑ + ฮฒ = 1, we re-express (15) as
1
V โฅ โ loge Eh eโฮธRl
ฮธ
.
(17)
Specifically, the constant rate in the VLC channel should be greater than the effective capacity
of the RF channel such that the VLC channel is chosen for data transmission. In the following,
we present two transmission strategies, such that (i) the data is transmitted over the link with
the highest instantaneous transmission rate in one time frame, and (ii) the data is transmitted
over both links simultaneously.
Hybrid-Type I Transmission Strategy: In the above analysis, we obtain the performance
levels when the transmitter chooses either of these two channels for data transmission following
a link selection process based on the maximum average data arrival rates that the service processes
in the channel can support. On the other hand, if there exists a fast and stable handover mechanism
between the transmitter and the receiver, the transmitter will forward the data to the receiver
over the link that provides the maximum lower bound on the instantaneous mutual information
in the corresponding channel. For instance, when the lower bound on the instantaneous mutual
information in the RF channel in the lth time frame, Rl , is greater than the lower bound on the
instantaneous mutual information in the VLC channel, V , i.e., Rl > V , the transmitter sends the
data over the RF link in the corresponding time frame only. Otherwise, it prefers sending the
12
data over the VLC link. Respectively, we can establish the channel selection criterion as follows:
The transmitter sends the data over the RF link when
bPavg,r
aฯr2 TVB
2
|hl | >
2 r โ 1 exp 1 โ
= ฮบ.
2
2
(18)
Otherwise, it sends the data over the VLC link. The aforementioned selection test can also
be considered as the outage condition in the RF channel, i.e., the RF link is in outage when
|hl |2 โค ฮบ. Noting that the channel fading gain changes independently from one time frame to
another in the RF channel, the log-moment generating function of the service process becomes
ฮrv (ฮธ) = loge E|h|2 >ฮบ eฮธRl + Pr{|hl |2 โค ฮบ}eฮธV ,
(19)
where E|h|2 >ฮบ {eฮธRl } is the conditional expectation given that |h|2 > ฮบ, i.e., E|h|2 >ฮบ {eฮธRl } =
R โ ฮธR
1
e l f|h|2 (|h|2 )d|h|2 , where f|h|2 (|h|2 ) is the probability density function of |h|2 .
Pr{|hl |2 >ฮบ} ฮบ
Hence, the maximum average data arrival rate at the transmitter buffer that the hybrid service
process can sustain under the QoS constraints specified by ฮธ > 0 becomes
ฮฒ
1 โ (1 โ ฮฒ)D
loge
ฯrv (ฮธ) =
,
(ฮฑ + ฮฒ)ฮธ
(1 โ ฮฑ)D โ (1 โ ฮฑ โ ฮฒ)D2
where D = E|h|2 >ฮบ eโฮธRl + Pr{|hl |2 โค ฮบ}eโฮธV .
(20)
Hybrid-Type II Transmission Strategy: Different than the aforementioned protocols, we consider a transmitter that sends data over both links simultaneously in each frame. We assume that
the receiver has a multihoming capability. We further assume a multiplexing-based transmission
scheme such that the data streams transmitted over the RF and VLC links are different and
independent from each other. Indeed, this scenario is feasible since the light and RF waves do
not cause interference on each other. We further assume a power allocation policy between the
two links, i.e., the average power constraint in the RF link is set to Pavg,r = ฮณl Pavg , and the one
in the VLC link is set to Pavg,v = (1 โ ฮณl )Pavg , where Pavg is the total average power constraint,
and 0 < ฮณl < 1. Then, the instantaneous transmission rate in the RF channel in the lth time frame
becomes
bฮณl Pavg
2|hl |2
exp
โ1
Rl = T Br log2 1 +
aฯr2
2
bits per frame,
(21)
where a and b are the solutions of (2a) and (2b). Similarly following (5)โ(6), the transmission
rate in the VLC channel becomes
(
)
2 2
โยต? 2
(1
โ
ฮณ
)P
โฆ
g
1
โ
e
T Bv
l
avg ?
2
V =
log2 1 + Ppeak,v
exp 2
ยต โ1
,
2
2ฯฯv2
Ppeak,v
ยต?
(22)
13
when 0 โค
(1โฮณl )Pavg
Ppeak,v
< 12 , and
T Bv
โฆ2 g 2 โ1
2
V =
log2 1 + Ppeak,v
,
e
2
2ฯฯv2
when
1
2
โค
(1โฮณl )Pavg
Ppeak,v
(23)
โค 1, where ยต? is the unique solution of (7). It follows that the total
transmission rate in each frame is the sum of the transmission rates in both links, i.e., Rl + V .
Then, the log-moment generating function can be readily expressed as
ฮsrv (ฮธ) = loge E{eฮธ(Rl +V ) } = ฮธV + loge E{eฮธRl },
and the maximum average data arrival rate is equal to
1 โ (1 โ ฮฒ)D
ฮฒ
loge
,
ฯsrv (ฮธ) =
(ฮฑ + ฮฒ)ฮธ
(1 โ ฮฑ)D โ (1 โ ฮฑ โ ฮฒ)D2
(24)
(25)
where D = eโฮธV Eh {eโฮธRl }. We finally remark that the optimal value of ฮณl that maximizes the
sum transmission rate, i.e., maxฮณl {Rl + V }, can be obtained numerically.
Remark 1: Employing the aforementioned strategies requires the perfect knowledge of both RF
and VLC channels at the transmitter side in each frame. We assume that the channel estimation is
performed at the receiver, and forwarded to the transmitter in a delay-free and error-free feedback
channel. This increases the signaling overhead. Moreover, applying Hybrid-Type II Transmission
Strategy increases the implementation complexity because power sharing should be performed
in each transmission frame. From the implementation perspective, exploiting Hybrid-Type II
Transmission Strategy is limited because the receiver should have a multihoming capability that
enables it to perform link aggregation and receive data from different transmission technologies
simultaneously. On the other hand, the maximum average data arrival rate is a steady-state
performance measure. Thus, the selection process explained in Proposition 1 is considered as a
large-timescale operation, which can be performed over periods of multiple transmission frames,
and therefore, the implementation complexity decreases. Such a large-timescale operation is also
proposed in [40].
Remark 2: The selection process can also be employed in cases the access point controller has
to choose between more than two transmission links. For example, let there be N transmission
links, and let {ฯ1 (ฮธ), . . . , ฯN (ฮธ)} be the maximum average data arrival rates at the transmitter
buffer sustained by these links. Then, Proposition 1 in the paper will be updated with the solution
of the following maximization problem:
Transmission Link = max {i : ฯi (ฮธ)} .
(26)
14
Similarly, let {R1 (l), ยท ยท ยท , RN (l)} be the instantaneous transmission rates provided by each link
in the lth time frame. Then, the link selection criterion in Hybrid-Type I Transmission Strategy
will be updated with the solution of the following maximization problem:
Transmission Link = max {i : Ri } .
(27)
Subsequently, the log-moment generating function of the service process will be
ฮ1,...,N (ฮธ) = loge Pri EeฮธRi (l) ,
(28)
where Pri is the probability that the transmitter chooses link i for data transmission. Finally, if
the receiver has a multihoming capability, Hybrid-Type II Transmission Strategy can be applied
with power sharing to maximize the total transmission rate in each frame.
B. Impacts of Handover Delay
Handover delay occurs when the transmitter moves from one link to the other, which is the
case in Hybrid-Type I Transmission Strategy. In this strategy, data transmission in one time frame
is performed over the link that provides the maximum instantaneous transmission rate in that
frame. Particularly, the transmitter switches from one link to the other or stay in the same link
at the end of any time frame after comparing the instantaneous transmission rates in both links.
Now, given that TH denotes the duration of one single handover phase, let us initially assume
that the frame duration is larger than the handover phase, i.e., T > TH . For the sake of simplicity,
we divide the frame duration into n sub-frames that are equal to TH , i.e., T = n ร TH , where
n โ N and n > 1. Particularly, a series of n sub-frames of data transmission phase is followed
by one sub-frame of handover process if the transmitter changes the transmission link, or by
another series of n sub-frames of data transmission phase if the transmitter stays in the same
transmission link. For an analytical representation, we model the buffer activity at the end of
each sub-frame as a discrete-time Markov process. As shown in Fig. 3, we have 2n + 2 states.
The first n states, i.e., {State 1,ยท ยท ยท ,State n}, represent the data transmission sub-frames in the
VLC link, and State (n + 1) represents the handover process from the VLC link to the RF link.
Similarly, the subsequent n states, i.e., {State (n + 2),ยท ยท ยท ,State (2n + 1)}, represent the data
transmission sub-frames in the RF link, and State (2n + 2) represents the handover process from
the RF link to the VLC link. Notice that the state transition probability from State i to State
15
i + 1 is 1 for i โ {1, ยท ยท ยท , n โ 1} and for i โ {n + 2, ยท ยท ยท , 2n} because the data transmission
in each link is completed in n sub-frames and the link change may occur at the end of the nth
and (2n + 1)th sub-frames. On the other hand, in State n, either the transmitter changes the link
and the system enters State n + 1 with probability 1 โ ฮดฮฝ , or the transmitter stays in the same
link and the system enters State 1 with probability ฮดฮฝ . Similarly, in State (2n + 1), either the
transmitter changes the link and the system enters State (2n + 2) with probability 1 โ ฮดr , or the
transmitter stays in the same link and the system enters State (n + 2) with probability ฮดr . Finally,
the system moves from State (n + 1) to State (n + 2) and from State (2n + 2) to State 1 with
probability 1 because at the end of one handover phase, the transmitter starts data transmission.
As seen in (18), if |hl |2 > ฮบ, the transmitter sends the data over the RF link. Otherwise, it sends
the data over the VLC link. Therefore, for this specific case, we have ฮดr = Pr{|hl |2 > ฮบ} = ฮด
and ฮดv = 1 โ ฮด. Then, we can express
๏ฃฑ
๏ฃด
๏ฃด
1,
๏ฃด
๏ฃด
๏ฃด
๏ฃด
๏ฃด
๏ฃด
๏ฃด
1,
๏ฃด
๏ฃด
๏ฃฒ
ฮ = [pji ], where pji = ฮด,
๏ฃด
๏ฃด
๏ฃด
๏ฃด
๏ฃด
๏ฃด
1 โ ฮด,
๏ฃด
๏ฃด
๏ฃด
๏ฃด
๏ฃด
๏ฃณ0,
the (2n + 2) ร (2n + 2) transition matrix as
for j = i + 1
and 1 โค i โค n โ 1 or n + 2 โค i โค 2n,
for (i, j) = (n + 1, n + 2) or (i, j) = (2n + 2, 1),
for (i, j) = (n, n + 1) or (i, j) = (2n + 1, n + 2),
for (i, j) = (n, 1) or (i, j) = (2n + 1, 2n + 2),
otherwise,
(29)
where pji is the state transition probability from State i to State j. Then, we can re-characterize
the log-moment generating function of the hybrid system for any ฮธ > 0, which is provided in
(19), as follows [41, Chap. 7, Example 7.2.7]:
ฮrv (ฮธ) = loge sp(ฮฆ(ฮธ)ฮ),
(30)
where sp(ฮฆ(ฮธ)ฮ) is the spectral radius of the matrix ฮฆ(ฮธ)ฮ, and ฮฆ(ฮธ) is a diagonal matrix whose
components are the moment generating functions of the processes in 2n+2 states. Notice that the
transmitted bits are removed from the transmitter buffer only at the ends of the nth and (2n + 1)th
frames. Therefore, the moment generating functions are eฮธV and E|h|2 >ฮบ {eฮธRl } in the nth and
(2n + 1)th frames, respectively. However, there are no bits removed in the other states, i.e., the
service rates in the other states are effectively zero. Hence, the moment generating functions are 1
16
Fig. 3. State transition model of the hybrid scenario with handover.
in other states. Moreover, the unique QoS exponent, ฮธ? , is obtained when ฮa (ฮธ? ) = โnฮrv (โฮธ? ).
C. Non-asymptotic Bounds
The aforementioned results provide the performance analysis in the steady-state. Particularly,
the analysis is obtained when the number of time frames is very large. On the other hand, nonasymptotic bounds regarding the statistical queueing and delay characterizations at the transmitter
buffer are of interest for system designers as well. Therefore, we address the framework of
Network Calculus [39], [42], [43], and consider [44, Theorem 2], which states that a minimal
bound on the queue length can be found for a given buffer overflow probability. Particularly,
given the RF-based data service process in Section II-A and the two-state Markov modeled data
arrival process in Section II-C, the buffer threshold, q, is expressed as
q = inf {qr + qa },
(31)
c>0
for a given buffer overflow probability, Pr{Q โฅ q} = ฮต, where
1
ฮr (โฮธ)
loge {โฮตr [ฮr (โฮธ) + ฮธc]}
for max 0, โ
โ
< ฮธ,
qr = โ sup
ฮธ
cฮตr
c
ฮธ
(32)
and
qa = โ sup
ฮธ
loge {ฮตa [ฮธc โ supt>0 {ฮa (ฮธ, t)}]}
ฮธ
for 0 < ฮธ <
1
supt>0 {ฮa (ฮธ, t)}
+
, (33)
cฮตa
c
with
๏ฃฑ
๏ฃซ๏ฃฎ
๏ฃน๏ฃฎ
๏ฃน๏ฃถ(tโ1) ๏ฃฎ
๏ฃน ๏ฃฎ ๏ฃน๏ฃผ
๏ฃด
๏ฃด
๏ฃฒ
eฮธฮป 0 1 โ ฮฑ
ฮฑ
eฮธฮป 0 1 ๏ฃฝ
1
๏ฃญ
๏ฃฐ
๏ฃป
๏ฃฐ
๏ฃป
๏ฃธ
๏ฃฐ
๏ฃป
๏ฃฐ
๏ฃป
.
ฮa (ฮธ, t) = loge [pON pOFF ]
๏ฃด
t
๏ฃณ
๏ฃพ
0 1
ฮฒ
1โฮฒ
0 1 1 ๏ฃด
(34)
Above, the buffer violation probability is ฮต = ฮตr + ฮตa , and ฮธ and c are free parameters. Notice
also that the log-moment generating function in (32), i.e., ฮr (โฮธ), is time-invariant because
the service process is memory-less, whereas the log-moment generating function in (33), i.e.,
17
ฮa (ฮธ, t), is time-variant because the arrival process depends on its current state. Moreover, we
remark that when t goes to infinity, we have limtโโ ฮa (ฮธ, t) = ฮa (ฮธ), where ฮa (ฮธ) is expressed
in (10). Herein, we refer to [44] for further calculation details in (32) and (33).
Likewise, when the VLC-based data service process in Section II-B is employed, we have
q = inf {qv + qa },
(35)
c>0
and
qv = โ sup
ฮธ
loge {โฮตr [ฮv (โฮธ) + ฮธc]}
loge {โฮตr [โฮธV + ฮธc]}
= โ sup
.
ฮธ
ฮธ
ฮธ
(36)
Notice that q in (35) is minimized when c = V . Moreover, because qv cannot be smaller than
zero, we have q = qa and c = V . Therefore, when the VLC-based service channel is chosen as
the service process, we have
q = qa = โ sup
ฮธ
loge {ฮตa [ฮธV โ supt>0 {ฮa (ฮธ, t)}]}
ฮธ
and ฮต = ฮตa .
(37)
Now, assuming a fast and stable handover mechanism between the transmitter and the receiver,
and a service channel selection process as described in Hybrid-Type I Transmission Strategy, we
can characterize the delay bound as follows: q = inf c>0 {qa + qrv } where
loge {โฮตr [ฮrv (โฮธ) + ฮธc]}
1
ฮrv (โฮธ)
qrv = โ sup
for max 0, โ
โ
< ฮธ,
ฮธ
cฮตr
c
ฮธ
(38)
and ฮrv (ฮธ) is given in (19).
Remark 3: Let us assume a first-come first-served protocol exists at the transmitter buffer.
Then, the minimal bound on the buffering delay is expressed as follows [44, Theorem 1]:
qr + qa
qv + qa
qrv + qa
, or d = inf
, or d = inf
,
(39)
d = inf
c>0
c>0
c>0
c
c
c
when the RF-based service process, or the VLC-based service process, or Hybrid-Type I Transmission Strategy is employed.
Remark 4: We consider a user-related performance measure, i.e., the maximum average data
arrival rate at the data buffer, and formulate the link selection by employing the transmission rates
provided by the RF and VLC links. Our analytical framework can easily be extended to a more
general multi-user scenario by regarding the rate allocations for each user in the transmission
links and the receiver-oriented data arrival processes at the transmitter buffer. In this regard,
we refer to Fig. 7 in Section IV, where we employ frequency-division multiple access (FDMA)
and time-division multiple access (TDMA) protocols for numerical illustrations. Moreover, our
18
Fig. 4. The VLC channel model.
paper is different than [13], [27], [40], [45]. The system sum throughput is maximized in [13],
[27], and the system average power consumption is minimized in [40], [45]. In these studies,
a framework in which a joint resource allocation and link assignment process is employed
is not provided, and the optimization problems are in principle mixed integer and non-linear
programming problems, which are mathematically intractable. Therefore, the main optimization
problems are decomposed into solvable sub-problems, and iterative algorithms are provided.
Remark 5: The link selection process can easily be adopted into scenarios where the receiver
is mobile. All that one needs is to consider the log-moment generating function in the VLC link
for changing transmission rates, i.e., ฮv (ฮธ) = loge Ev {eฮธVl } , and base the channel selection
process on the link that increases the maximum average data arrival rate at the transmitter buffer.
In Hybrid-Type I Transmission Strategy and Hybrid-Type II Transmission Strategy, because the
channel fading gains in the RF and VLC links are instantaneously known at the transmitter in
each time frame, the aforementioned analysis will not be different than what we currently have
in the paper even if the transmission rates vary due to mobility. We also note that the user
mobility is normally low in indoor scenarios. In this regard, we refer to [46].
IV. N UMERICAL R ESULTS
In this section, we present numerical results that substantiate our theoretical findings. Unless
otherwise specified, we set the transmission time frame to 0.1 milliseconds, i.e., T = 10โ4 . We
assume that the LED at the VLC access point of the transmitter has a Lambertian radiation
pattern, and that the transmitter and receiver planes are parallel to each other. We further assume
that the transmitter is directed downwards, while the receiver is directed upwards, as depicted in
Fig. 4. However, our theoretical results can easily be adopted into different positional settings.
19
TABLE I
S IMULATION PARAMETERS
VLC System
โฆ
LED half intensity viewing angle, ฯ1/2
{30 , 45โฆ , 60โฆ }
PD field of view (FOV), ฯC
90โฆ
PD physical area, A
1 cm2
Channel bandwidth, Bv
10 MHz
PD opt.-to-elect. conversion efficiency, โฆ
0.53 A/W
PD optical concentrator gain, u(ฯ)
2.5 m
Vertical distance, dv
Noise power spectral density, Nv
1
โ21
10
A2 / Hz
RF System
Channel bandwidth, Br
10 MHz
Path loss exponent, q
1.8
Rician factor, K
10 dB
Log-normal standard deviation, ฯ
3.6 dB
Ambient Temperature, Tt
โฆ
280 K
Herein, the line-of-sight channel gain, i.e., g, is given as follows [47]:
(s + 1)Au(ฯ)ds+1
v
g=
rect(ฯ/ฯC ),
s+3
2ฯd1
(40)
where A is the surface area of the photo-diode, d1 is the distance between the LED at the
transmitter and the photo-diode at the receiver, and dv is the normal distance between the
transmitting and receiving planes. Moreover, u(ฯ) is the optical concentrator gain at the photodiode, ฯ is the angle of incidence, and ฯC is the field of view, i.e., the maximum angle at which
the light emitted by the LED is detected by the photo-diode. In addition, s =
โ1
log2 (cos(ฯ1/2 ))
is the
Lambertian index, where ฯ1/2 is the LED half intensity viewing angle, and rect(x) = 1 if |x| โค 1
and rect(x) = 0 otherwise. Finally, the thermal noise power at the photo-diode is ฯv2 = Nv Bv ,
where Nv is the noise power spectral density.
Regarding the RF channel, we consider a Rician fading distribution with the Rician factor,
K, where the channel realizations, {hl }, are independent and identically distributed, circularly
q
โL(d0 )/10 K
symmetric complex Gaussian random variables with mean ยต = e K+1
and variance ฯh2 =
eโL(d0 )/10
.
K+1
Setting K to a reasonable value, we can reflect the channel characteristics in millimeter
wave range communications as well [2]. Here, L(d0 ) is the large-scale path loss in decibels as
a function of the distance between the RF access point at the transmitter and the RF front-end
at the receiver, d0 , and it is given by [48]
L(d0 ) = L(dref ) + 10q loge
d0
dref
+ Xฯ ,
(41)
where L(dref ) = 40 dB is the path loss at a reference distance, dref = 1 m, and an operating
frequency of 2.4 GHz. In addition, q is the path loss exponent and Xฯ represents the shadowing
20
(a) ฮธ = 0.01
(b) ฮธ = 0.1
Fig. 5. Maximum average arrival rates of VLC and RF links as a function of the average power limit, Pavg , for different values
of the average-to-peak power ratio ฮฝ and the QoS exponent, ฮธ. Here, d0 = 15 m, d1 = 3 m, ฯ1/2 = 60โฆ , ฮฑ = 0.3, and ฮฒ = 0.7.
{bpf : bits per frame}.
effect, which is assumed to be a zero-mean Gaussian random variable with a standard deviation
ฯ expressed in decibels6 . Finally, the thermal noise power at the RF front-end of the receiver is
ฯr2 = ฮบB Tt Br , where ฮบB is the Boltzmann constant and Tt is the ambient temperature [14]. Table
I summarizes the simulation parameters, unless otherwise stated. Finally, setting the average
transmission power constraint to Pavg in all the transmission strategies, we define ฮฝ as the
average-to-peak power ratio in the RF and VLC links, i.e., ฮฝ =
Pavg
Ppeak,r
=
Pavg
.
Ppeak,v
A. Transmission Strategies
We consider the scenario in which a transmitter has a VLC access point and an RF access
point, as shown in Fig. 1. The receiver is located at a distance d1 = 3 m from the VLC access
point, i.e., the user is located at a horizontal distance dh โ 1.6 m from the cell center, where
ฯ1/2 = 60โฆ and dv = 2.5 m, and at a distance d0 = 15 m from the RF access point. In Fig. 5,
we plot the maximum average data arrival rates at the transmitter buffer, ฯv (ฮธ) and ฯr (ฮธ), as
functions of the average power constraint, Pavg , with different average-to-peak power ratios, i.e,
ฮฝ โ {0.1, 0.3, 0.7, 1}, when the VLC and RF links are employed, respectively. We have the
results for ฮธ = 0.01 in Fig. 5(a) and for ฮธ = 0.1 in Fig. 5(b). We observe that the maximum
average data arrival rates increase faster with the increasing average power constraint in the VLC
6
Empirical values of K, q, and ฯ 2 in different indoor scenarios were provided in [48]โ[50]. For instance, the value of q
ranges from 1.2 to 1.7, while ฯ varies between 3.6 dB and 4.0 dB inside buildings [48].
21
(a) Pavg = 24 dBm
(b) Pavg = 30 dBm
Fig. 6. Maximum average arrival rates of VLC and RF links as a function of the QoS exponent, ฮธ, for different values of the
average power limit Pavg and the source statistics, ฮฑ and ฮฒ. Here, d0 = 15 m, d1 = 3 m, ฮฑ = 0.3, ฯ1/2 = 60โฆ , and ฮฝ = 0.7.
{bpf : bits per frame}.
link than they do in the RF link. For instance, when ฮฝ = 0.3 and ฮธ = 0.01, the maximum average
data arrival rate increases more than 145 bits per frame with Pavg increasing from 27 dBm to
28 dBm in the VLC link, whereas it increases 2 bits per frame in the RF link. We observe the
same behavior when the peak power constraint increases. We can explain this result with the
stochastic nature of the transmission rates in the RF channel. Particularly, when the instantaneous
transmission rate in the RF channel becomes very low, more data packets are accumulated in
the transmitter buffer. Therefore, in order to sustain the QoS constraints, the transmitter buffer
should accept data at lower arrival rates. On the other hand, because the transmission rate in the
VLC channel is constant, the maximum average data arrival rate increases almost linearly with
the increasing transmission rate in the VLC channel. Moreover, the performance in the RF link
is better than the VLC link when the average power constraint is lower, and the performance in
the VLC link is better than the RF link when the average power constraint is higher.
In Fig. 6, we plot ฯr (ฮธ) and ฯv (ฮธ) as functions of the QoS exponent, ฮธ, for different values
of ฮฑ and ฮฒ when ฮฝ = 0.7. We have Pavg = 24 dBm in Fig. 6(a) and Pavg = 30 dBm in
Fig. 6(b). The performance in the RF link is better than the VLC link when ฮธ is low, whereas
the performance in the RF link decreases faster with increasing ฮธ and becomes less than the
performance in the VLC link. In other words, the stochastic nature of the RF channel prevents
the RF link from supporting data arrival rates at the transmitter buffer when the QoS constraints
are stringent. Indeed, the maximum average data arrival rate that the RF link supports approaches
zero exponentially with increasing ฮธ regardless of the average power constraint and the source
statistics, i.e., ฮฑ and ฮฒ. However, the RF link can support higher data arrival rates if the QoS
22
(a) FDMA (i.e., power and bandwidth)
(b) TDMA (i.e., time)
Fig. 7. Per-user maximum average arrival rates of VLC and RF links as a function of the number of served receivers (or
equivalently the receiver allocated resources) and for different values of the LED viewing angle, ฯ1/2 . Here, ฮฑ = 0.3, ฮฒ = 0.7,
ฮฝ = 1, and Pavg = 24 dBm. {bpf : bits per frame}.
constraints are looser. We further observe that increasing ฮฒ (or decreasing ฮฑ), results in better
performance values in the VLC and RF links because the steady-state probability of the ON
state, i.e., PON =
ฮฒ
,
ฮฑ+ฮฒ
and the average arrival rate at the transmitter buffer increase. However,
the effect of the source statistics on the performance values is much less than that of the QoS
constraints, especially in the RF link. In other words, the randomness in the service process has
a higher impact on the system performance than the randomness in the arrival process has.
In typical indoor scenarios, VLC and RF access points serve multiple receivers. This is
applied by sharing available resources (i.e., power, time, and bandwidth) among the served
receivers. Herein, we assume that the transmitter employs the commonly known FDMA and
TDMA schemes in both links. In Fig. 7, we plot the maximum average data arrival rate per user
given that all the users are uniformly positioned within the coverage area of the VLC access
point. We observe that the performance per user in the RF link is generally much higher than
the performance per user in the VLC link when the number of receivers is above 4. Basically,
the system can serve more users in the RF link than the VLC link when the QoS constraints
are of interest. In addition, the results in Fig. 7 agree with the results in Fig. 5, where the
performance of the VLC link is highly affected by the decreasing average power constraint.
We finally see that with the decreasing LED viewing angle, the performance in the VLC link
becomes better because the transmission power is concentrated in smaller areas. Notice also that
the VLC channel gain is affected by ฯ1/2 through the Lambertian index. Herein, we show the
performance sensitivity of the RF and VLC links to the allocated transmission resources such
as power, time, and bandwidth, given that the available resources are equally shared among the
23
users. We also show that our framework can easily be invoked in a multi-user scenario.
We further explore the system performance with respect to the receiver location. We set
(xv , yv , zv ) = (0, 0, 0) as the Cartesian coordinates of the VLC access point, (xr , yr , zr ) =
(10, 0, 0) as the coordinates of the RF access point, and (xu , yu , zu ) as the coordinates of the
receiver, where zu = โdv . Particularly, we consider the following strategies:
1) RF-only Strategy: The transmitter sends data over the RF link only, and the maximum
average arrival rate, ฯr (ฮธ), is expressed in (12).
2) VLC-only Strategy: The transmitter sends data over the VLC link only, and the maximum
average arrival rate, ฯv (ฮธ), is expressed in (13).
3) Hybrid-type I Transmission Strategy: The transmitter sends data over the link that provides
the highest transmission rate, and the maximum average arrival rate, ฯrv (ฮธ), is expressed
in (20).
4) Hybrid-type II Transmission Strategy: The transmitter sends data over both links simultaneously following a power allocation policy to maximize the transmission rate, and the
maximum rate, ฯsrv (ฮธ), is expressed in (25).
In Fig. 8, we plot the maximum average arrival rate as a function of the xu and yu coordinates of
the receiver location for different QoS constraints, where xu โ [โ5, 5] and yu โ [โ5, 5]. As seen
in Fig. 8(a) and Fig. 8(e), the position of the receiver does not impact the performance levels in
the RF link necessarily, i.e., the performance level stays almost constant when the receiver stays
in the defined range. However, the performance levels in the other strategies are affected by the
position of the receiver, and the maximum average data arrival rate increases as the receiver gets
closer to the point (xv , yv , zv ) = (0, 0, โdv ) because the constant transmission rate from the VLC
access point to the receiver increases and the stochastic nature of the RF link is mitigated more
with the increasing rate in the VLC link. As seen in Fig. 8(b) and Fig. 8(f), the maximum average
data arrival rate goes to zero in VLC-only Strategy as the receiver goes out of the coverage area
of the VLC access point. Similarly, as seen in Fig. 8(c), Fig. 8(d), Fig. 8(g) and Fig. 8(h),
the maximum average data arrival rate becomes equal to the one in RF-only Strategy as the
receiver goes out of the the coverage area of the VLC access point. Furthermore, Hybrid-type
I Transmission Strategy provides higher performance levels than RF-only Strategy and VLConly Strategy do because the transmitter, employing Hybrid-type I Transmission Strategy, sends
the data over the RF link when the instantaneous transmission rate in the RF link is higher
than the rate in the VLC link, and mitigates the lower transmission rates in the RF link by
24
(a) RF-only,, ฮธ = 0.01
(b) VLC-only, ฮธ = 0.01
(c) Hybrid-type I, ฮธ = 0.01
(d) Hybrid-type II, ฮธ = 0.01
(e) RF-only,, ฮธ = 0.1
(f) VLC-only, ฮธ = 0.1
(g) Hybrid-type I, ฮธ = 0.1
(h) Hybrid-type II, ฮธ = 0.1
Fig. 8. Maximum average arrival rates for different selection strategies as a function of the receiver position in terms of xu and
yu and for different values of ฮธ. Here, Pavg = 24 dBm, ฮฝ = 0.7, ฮฑ = 0.3, ฮฒ = 0.7 and ฯ1/2 = 60โฆ . {bpf : bits per frame}.
25
(a) (xu , yu , zu ) = (0, 0, โdv ) i.e., cell center (b) (xu , yu , zu ) = (dc , 0, โdv ) i.e., cell edge
Fig. 9. Maximum average arrival rate as a function of n and for different values of the QoS exponent ฮธ and user
position in terms of xu . Here, ฯ1/2 = 60โฆ , ฮฑ = 0.3, ฮฒ = 0.7, Pavg = 24 dBm, and ฮฝ = 1.
sending the data in the VLC link. Finally, Hybrid-type II Transmission Strategy outperforms all
the other strategies. However, the performance gap between Hybrid-type I Transmission Strategy
and Hybrid-type II Transmission Strategy is not necessarily large. Hence, it is more advantageous
to employ Hybrid-type I Transmission Strategy in order to avoid the hardware complexity that
follows the addition of multihoming capability in Hybrid-type II Transmission Strategy.
In Fig. 9, assuming that the handover process causes a transmission delay, where the handover
process takes TH = n1 T seconds for n โ N and n > 1, we plot the maximum average data arrival
rate in Hybrid-type I Transmission Strategy, ฯrv (ฮธ), as a function of n considering different
user locations. Noting that smaller n means a longer handover period, we observe that the
transmission performance is highly affected by the handover process. With increasing n, the
performance levels approach the values that are obtained when there is no handover delay.
Moreover, the maximum average data arrival rates are higher in Fig. 9(a) than in Fig. 9(b),
because the constant transmission rate in the VLC link is higher when the user is at the center.
Subsequently in Fig. 10, we plot the maximum average data arrival rates as functions of the
vertical distance between the VLC access point and the receiver. We set the position of the
receiver to (xu , yu , zu ) = (0.8, 0, โdv ), i.e., the horizontal distance to the VLC cell center is
dh = 0.8 m. When dv โค 0.6 m, the performance level in the VLC link is zero because the cell
area is very small and does not cover the point where the user stands, i.e., dc = dv tan(ฮธ1/2 ) <
dh = 0.8 m, and dc is the cell radius. The performance levels in all strategies except RF-only
Strategy increase up to a value, and then decrease with increasing dv . This is because the increase
in the LED viewing angle is relatively less than the increase in dv at the beginning. Therefore,
26
(a) Pavg = 24 dBm
(b) Pavg = 30 dBm
Fig. 10. Maximum average arrival rate of different transmission strategies as a function of the vertical distance and
for different average power limit Pavg . Here, ฯ1/2 = 60โฆ , (xu , yu , zu ) = (0.8, 0, โdv ), ฮฑ = 0.3, ฮฒ = 0.7, ฮธ = 0.1,
and ฮฝ = 1. {bpf : bits per frame}.
the user is effectively getting closer to the cell center and having more rate in the VLC link. In
other words, the gain achieved by getting closer to the cell center is higher than the expected
degradation due to the increasing cell radius. However, with dv increasing beyond a certain value,
the user gets far away from the VLC access point, and hence, the radiated power spreads over
more area, which eventually leads to decreased transmission rates in the VLC link. Therefore,
the gain in the VLC link vanishes as the distance to the VLC access point becomes larger.
B. Non-asymptotic Delay Bounds
In the aforementioned results, we analyze the system performance in the steady-state. In
the following, we provide results regarding the non-asymptotic bounds, i.e., the bounds on the
buffering delay experienced by the data in the transmitter buffer. Particularly, we plot the delay
bound as a function of the state transition probability from the OFF state to the ON state in the
data arrival process, ฮฒ, for different ฮฑ values, where ฮฑ is the state transition probability from
the ON state to the OFF state in the data arrival process. We set the average data arrival rate,
ฮปpON , to a value very close to the average data service (transmission) rate in the transmission
channel. We note that the average data service rate in the transmission channel depends on the
chosen transmission strategy. The delay bound is the highest in RF-only Strategy as seen in
Fig. 11(a), whereas it is the lowest in VLC-only Strategy as seen in Fig. 11(b). However, the
arrival rate that RF-only Strategy supports is higher than the rate that VLC-only Strategy supports.
More interestingly, the hybrid strategies can support higher arrival rates with less delay bounds,
and Hybrid-type II Transmission Strategy outperforms all the others. Herein, the system takes
27
(a) RF-only Transmission, ฮป = 21 kbpf
(b) VLC-only Transmission, ฮป = 7 kbpf
(c) Hybrid-Type I Transmission, ฮป = 24 kbpf
(d) Hybrid-Type II Transmission, ฮป = 26 kbpf
Fig. 11. Delay Bounds for different transmission strategies as a function of the transition probability ฮฒ and for different values
of ฮฑ. Here, d0 = 10 m, d1 = 3 m, Pavg = 30 dBm, ฮฝ = 0.7, and ฯ1/2 = 60โฆ . {bpf : bits per frame}
advantage of the occasional higher rates in the RF links, and mitigates the lower rates in the RF
link by the constant transmission rate in the VLC link. Moreover, increasing ฮฒ and decreasing
ฮฑ cause the delay bound to increase.
Finally, we explore the effects of the data arrival rate, ฮป, on the delay bound performance in
Fig. 12. We set ฮฑ = 0.3 and ฮฒ = 0.7, and consider different average power constraints, i.e.,
Pavg = 24, 30, and 35 dBm. The delay bounds increase asymptotically as the average arrival rate
approaches the average data service rates in the channels, because when the average data arrival
rate is greater than the average data service rate in one channel, the system becomes unstable,
and long buffering periods are expected. Moreover, as seen in Fig. 12(b), the delay bounds are
the minimum in VLC-only Strategy but the ranges of the average data arrival rates are smaller
than the other strategies, and as seen in Fig. 12(a), the delay bounds are the maximum in RF-only
Strategy. However, the hybrid strategies again outperform the others i.e., the hybrid strategies
take advantage of the VLC link when the rate in the RF link goes down drastically, and utilize
the RF link when the channel conditions are better again. While the VLC link provides stability
28
(a) RF-only Transmission
(b) VLC-only Transmission
(c) Hybrid-Type I transmission
(d) Hybrid-Type II transmission
Fig. 12. Delay Bounds for different transmission strategies as a function of the arrival rate ฮป and for different values of Pavg .
Here, ฮฑ = 0.3, ฮฒ = 0.7, d0 = 10 m, d1 = 3 m, ฮฝ = 0.7, and ฯ1/2 = 60โฆ .
and decreases the delay bounds, the RF link increases the range of average data arrival rate that
can be supported. Finally, in Fig. 12 we see that increasing the average power can potentially
improve the system performance in terms of the buffering delay.
V. C ONCLUSIONS
In this paper, we have analyzed the performance of a hybrid RF/VLC system when statistical
QoS constraints are inflicted as limits on the buffer overflow and delay violation probabilities.
We have provided a cross-layer analysis regarding physical and data-link layers by employing
the maximum average arrival rate at the transmitter buffer and the non-asymptotic delay bounds
as the main performance measures. We have proposed and analyzed three strategies in which RF
and VLC links are utilized for data transmission. We have further formulated the performance
levels achieved by each of the proposed strategies. Through numerical results, we have shown
that RF technology can be beneficial when there are lower average power constraints and/or
looser QoS requirements. Moreover, we have shown that utilizing the VLC technology for data
29
transmission, either alone or in a hybrid transmission strategy, can potentially enhance the system
performance in terms of delay performance. It lowers the buffering delay bounds, when compared
to the RF technology. Particularly, when data arrival rates at the transmitter buffer is low, VLC
links provide lower queueing delays than RF links do, but RF links support higher data arrival
rates at the transmitter buffer.
A PPENDIX
A. Derivation of ฯr (ฮธ) in (12)
Recall that ฮป is the data arrival rate at the buffer when the data source is in the ON state, and
that pON =
ฮฒ
ฮฑ+ฮฒ
is the steady-state probability of the ON state. Thus, the average data arrival
ฮฒ
ฮป. Moreover, we have ฮa (ฮธr? ) = โฮr (โฮธr? ) in steady-state, i.e.,
rate is ฮปpON = ฮฑ+ฮฒ
q
๏ฃฑ
๏ฃผ
๏ฃฒ 1 โ ฮฒ + (1 โ ฮฑ)eฮธr? ฮป + [1 โ ฮฒ + (1 โ ฮฑ)eฮธr? ฮป ]2 โ 4(1 โ ฮฑ โ ฮฒ)eฮธr? ฮป ๏ฃฝ
?
loge
= โ loge Eh eโฮธr Rl .
๏ฃณ
๏ฃพ
2
(42)
Solving the aforementioned equation for ฮป with any given ฮธ > 0, we obtain
(
)
1 โ (1 โ ฮฒ)Eh eโฮธRl
1
.
ฮป = loge
ฮธ
(1 โ ฮฑ)Eh {eโฮธRl } โ (1 โ ฮฑ โ ฮฒ)E2h {eโฮธRl }
As a result, we formulate the maximum average data arrival rate as ฯr (ฮธ) =
ฮฒ
ฮป
ฮฑ+ฮฒ
(43)
for any ฮธ > 0.
As for ฯv (ฮธ), we set ฮa (ฮธv? ) = โฮv (โฮธv? ) and follow the same steps.
B. Proof of Proposition 1
Based on the link selection process, the VLC link is selected only when ฯv (ฮธ) > ฯr (ฮธ), where
ฯv (ฮธ) is the maximum average arrival rate supported by the VLC link given in (13) and ฯr (ฮธ)
is the maximum average arrival rate supported by the RF link given in (12). Since logarithm is
a monotonic increasing function, this condition is satisfied when we have
1 โ (1 โ ฮฒ)Eh eโฮธRl
e2ฮธV โ (1 โ ฮฒ)eฮธV
>
,
(1 โ ฮฑ)eฮธV โ (1 โ ฮฑ โ ฮฒ)
(1 โ ฮฑ)Eh {eโฮธRl } โ (1 โ ฮฑ โ ฮฒ)E2h {eโฮธRl }
(44)
Now, let ฯ = Eh {eโฮธRl } and O = eฮธV . Then, (44) can be expressed by the following quadratic
inequality:
O2 โ (1 โ ฮฒ + (1 โ ฮฑ)ฮพ)O + ฮพ(1 โ ฮฑ โ ฮฒ) > 0.
(45)
30
where ฮพ =
1โ(1โฮฒ)ฯ
.
(1โฮฑ)ฯโ(1โฮฑโฮฒ)ฯ2
O1 =
and
O2 =
Solving the above equation results in two solutions:
q
1 โ ฮฒ + (1 โ ฮฑ)ฮพ โ [1 โ ฮฒ + (1 โ ฮฑ)ฮพ]2 โ 4(1 โ ฮฑ โ ฮฒ)ฮพ
(46)
2
q
1 โ ฮฒ + (1 โ ฮฑ)ฮพ + [1 โ ฮฒ + (1 โ ฮฑ)ฮพ]2 โ 4(1 โ ฮฑ โ ฮฒ)ฮพ
(47)
2
where O2 > O1 . V has two ranges 0 < V < loge {O1 } and V โฅ loge {O2 }. Setting O = 1 in
(45), we have ฮฒ(1 โ ฮพ) > 0. Note that ฮพ > 1 because ฯr (ฮธ) =
ฮฒ
(ฮฑ+ฮฒ)ฮธ
loge {ฮพ} > 0. Hence, we
have ฮฒ(1 โ ฮพ) < 0, which implies that O1 < 1 and loge {O1 } < 0. Therefore, we have only
V โฅ loge {O2 } as the solution region, which completes the proof.
R EFERENCES
[1] M. B. Rahaim, A. M. Vegni, and T. D. Little, โA hybrid radio frequency and broadcast visible light communication system,โ
in Proc. IEEE Global Telecommun. (GLOBECOM) Workshops, 2011, pp. 792โ796.
[2] D. A. Basnayaka and H. Haas, โDesign and analysis of a hybrid radio frequency and visible light communication system,โ
IEEE Trans. Commun., 2017.
[3] H. Chowdhury and M. Katz, โCooperative data download on the move in indoor hybrid (radio-optical) WLAN-VLC hotspot
coverage,โ Trans. on Emerging Telecommun. Technol., vol. 25, no. 6, pp. 666โ677, 2014.
[4] D. A. Basnayaka and H. Haas, โHybrid RF and VLC systems: Improving user data rate performance of VLC systems,โ
in Proc. IEEE Veh. Technol. Conf. Spring (VTC-Spring), 2015, pp. 1โ5.
[5] X. Bao, X. Zhu, T. Song, and Y. Ou, โProtocol design and capacity analysis in hybrid network of visible light communication
and OFDMA systems,โ IEEE Trans. Veh. Technol., vol. 63, no. 4, pp. 1770โ1778, 2014.
[6] S. Shao, A. Khreishah, M. B. Rahaim, H. Elgala, M. Ayyash, T. D. Little, and J. Wu, โAn indoor hybrid WiFi-VLC internet
access system,โ in Proc. IEEE Int. Conf. on Mobile Ad Hoc and Sensor Sys., 2014, pp. 569โ574.
[7] M. Kashef, M. Ismail, M. Abdallah, K. A. Qaraqe, and E. Serpedin, โEnergy efficient resource allocation for mixed
RF/VLC heterogeneous wireless networks,โ IEEE J. Sel. Areas Commun, vol. 34, no. 4, pp. 883โ893, 2016.
[8] A. M. Vegni and T. D. Little, โHandover in VLC systems with cooperating mobile devices,โ in Proc. Int. Conf. Computing,
Netw. Commun. (ICNC), 2012, pp. 126โ130.
[9] F. Wang, Z. Wang, C. Qian, L. Dai, and Z. Yang, โEfficient vertical handover scheme for heterogeneous VLC-RF systems,โ
J. Opt. Commun. and Netw., vol. 7, no. 12, pp. 1172โ1180, 2015.
[10] S. Liang, H. Tian, B. Fan, and R. Bai, โA novel vertical handover algorithm in a hybrid visible light communication and
LTE system,โ in Proc. IEEE Veh. Technol. Conf. Fall (VTC-FALL), 2015, pp. 1โ5.
[11] S. Shao and A. Khreishah, โDelay analysis of unsaturated heterogeneous omnidirectional-directional small cell wireless
networks: The case of RF-VLC coexistence,โ IEEE Trans. on Wireless Commun., vol. 15, no. 12, pp. 8406โ8421, 2016.
[12] X. Li, R. Zhang, and L. Hanzo, โCooperative load balancing in hybrid visible light communications and WiFi,โ IEEE
Trans. Commun., vol. 63, no. 4, pp. 1319โ1329, 2015.
[13] Y. Wang and H. Haas, โDynamic load balancing with handover in hybrid Li-Fi and Wi-Fi networks,โ IEEE J. of Lightwave
Tech., vol. 33, no. 22, pp. 4671โ4682, 2015.
31
[14] I. Stefan, H. Burchardt, and H. Haas, โArea spectral efficiency performance comparison between VLC and RF femtocell
networks,โ in Proc. IEEE Int. Conf. Commun. (ICC), 2013, pp. 3825โ3829.
[15] Y. Wang, D. A. Basnayaka, X. Wu, and H. Haas, โOptimization of load balancing in hybrid LiFi/RF networks,โ IEEE
Trans. Commun., vol. 65, no. 4, pp. 1708โ1720, 2017.
[16] H. Kazemi, M. Uysal, and F. Touati, โOutage analysis of hybrid FSO/RF systems based on finite-state markov chain
modeling,โ in Proc. IEEE Int. Workshop Opt. Wireless Commun. (IWOW), 2014, pp. 11โ15.
[17] N. D. Chatzidiamantis, G. K. Karagiannidis, E. E. Kriezis, and M. Matthaiou, โDiversity combining in hybrid RF/FSO
systems with PSK modulation,โ in Proc. IEEE Int. Conf. Commun. (ICC), 2011, pp. 1โ6.
[18] โCisco visual networking index: Global mobile data traffic forecast update 20142019 white paper,โ http://www.cisco.com/
c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/white paper c11-520862.html.
[19] C.-S. Chang, โStability, queue length, and delay of deterministic and stochastic queueing networks,โ IEEE Trans. Autom.
Control, vol. 39, no. 5, pp. 913โ931, 1994.
[20] D. Wu and R. Negi, โEffective capacity: a wireless link model for support of quality of service,โ IEEE Trans. Wireless
Commun., vol. 2, no. 4, pp. 630โ643, 2003.
[21] G. L. Choudhury, D. M. Lucantoni, and W. Whitt, โSqueezing the most out of ATM,โ IEEE Trans. Commun., vol. 44,
no. 2, pp. 203โ217, 1996.
[22] F. Kelly, โNotes on e ective bandwidths,โ Stochastic networks: theory and applications, pp. 141โ168, 1996.
[23] S. Akin and M. C. Gursoy, โEffective capacity analysis of cognitive radio channels for quality of service provisioning,โ
IEEE Trans. Wireless Commun., vol. 9, no. 11, pp. 3354โ3364, 2010.
[24] M. Hammouda, S. Akin, and J. Peissig, โEffective capacity in cognitive radio broadcast channels,โ in Proc. IEEE Global
Telecommun. Conf. (GLOBECOM), 2014, pp. 1071โ1077.
[25] M. Ozmen and M. C. Gursoy, โWireless throughput and energy efficiency with random arrivals and statistical queuing
constraints,โ IEEE Trans. Inf. Theory, vol. 62, no. 3, pp. 1375โ1395, 2016.
[26] F. Jin, X. Li, R. Zhang, C. Dong, and L. Hanzo, โResource allocation under delay-guarantee constraints for visible-light
communication,โ IEEE Access, vol. 4, pp. 7301โ7312, 2016.
[27] F. Jin, R. Zhang, and L. Hanzo, โResource allocation under delay-guarantee constraints for heterogeneous visible-light and
rf femtocell,โ IEEE Transactions on Wireless Communications, vol. 14, no. 2, pp. 1020โ1034, 2015.
[28] N. Letzepis and A. G. I. Fabregas, โOutage probability of the Gaussian MIMO free-space optical channel with PPM,โ
IEEE Trans. on Commun., vol. 57, no. 12, 2009.
[29] L. H. Ozarow, S. Shamai, and A. D. Wyner, โInformation theoretic considerations for cellular mobile radio,โ IEEE trans.
Veh. Technol., vol. 43, no. 2, pp. 359โ378, 1994.
[30] S. Shamai and I. Bar-David, โThe capacity of average and peak-power-limited quadrature Gaussian channels,โ IEEE Trans.
Inf. Theory, vol. 41, no. 4, pp. 1060โ1071, 1995.
[31] T. Komine and M. Nakagawa, โFundamental analysis for visible-light communication system using LED lights,โ IEEE
Trans. on Consumer Electronics, vol. 50, no. 1, pp. 100โ107, 2004.
[32] J. M. Kahn and J. R. Barry, โWireless infrared communications,โ Proceedings of the IEEE, vol. 85, no. 2, pp. 265โ298,
1997.
[33] V. Pohl, V. Jungnickel, and C. Von Helmolt, โA channel model for wireless infrared communication.โ in PIMRC, 2000,
pp. 297โ303.
[34] V. Jungnickel et al., โA European view on the next generation optical wireless communication standard,โ in Proc. IEEE
Conf. Standards for Commun. and Networking (CSCN), Oct 2015, pp. 106โ111.
32
[35] S. Dimitrov and H. Haas, Principles of LED Light Communications: Towards Networked Li-Fi.
Cambridge University
Press, 2015.
[36] A. Lapidoth, S. M. Moser, and M. A. Wigger, โOn the capacity of free-space optical intensity channels,โ IEEE Trans. Inf.
Theory, vol. 55, no. 10, pp. 4449โ4461, 2009.
[37] H. Heffes and D. Lucantoni, โA Markov modulated characterization of packetized voice and data traffic and related
statistical multiplexer performance,โ IEEE J. Sel. Areas Commun., vol. 4, no. 6, pp. 856โ868, 1986.
[38] C.-S. Chang and T. Zajic, โEffective bandwidths of departure processes from queues with time varying capacities,โ in
Proc. IEEE INFOCOM, vol. 3, 1995, pp. 1001โ1009.
[39] C.-S. Chang, Performance Guarantees in Communication Networks.
Springer Science & Business Media, 2000.
[40] H. Yu, M. H. Cheung, L. Huang, and J. Huang, โPower-delay tradeoff with predictive scheduling in integrated cellular
and Wi-Fi networks,โ IEEE J. Sel. Areas Commun., vol. 34, no. 4, pp. 735โ742, 2016.
[41] C.-S. Chang, Performance guarantees in communication networks.
Springer Science & Business Media, 2012.
[42] M. Fidler and A. Rizk, โA guide to the stochastic network calculus,โ IEEE Commun. Surveys & Tutorials, vol. 17, no. 1,
pp. 92โ105, 2015.
[43] F. Ciucu, A. Burchard, and J. Liebeherr, โScaling properties of statistical end-to-end bounds in the network calculus,โ
IEEE Trans. Inf. Theory, vol. 52, no. 6, pp. 2300โ2312, 2006.
[44] M. Fidler, R. Luฬbben, and N. Becker, โCapacityโdelayโerror boundaries: A composable model of sources and systems,โ
IEEE Trans. Wireless Commun., vol. 14, no. 3, pp. 1280โ1294, 2015.
[45] W. Wu, F. Zhou, and Q. Yang, โDynamic network resource optimization in hybrid VLC and radio frequency networks,โ
in Selected Topics in Mobile and Wireless Networking (MoWNeT), 2017 International Conference on, 2017, pp. 1โ7.
[46] M. Dehghani Soltani, X. Wu, M. Safari, and H. Haas, โOn limited feedback resource allocation for visible light
communication networks,โ in Proceedings of the 2nd International Workshop on Visible Light Communications Systems.
ACM, 2015, pp. 27โ32.
[47] J. R. Barry, J. M. Kahn, W. J. Krause, E. Lee, D. G. Messerschmitt et al., โSimulation of multipath impulse response for
indoor wireless optical channels,โ IEEE J. Sel. Areas Commun., vol. 11, no. 3, pp. 367โ379, 1993.
[48] R. G. Akl, D. Tummala, and X. Li, Indoor propagation modeling at 2.4 GHz for IEEE 802.11 networks.
International
Association of Science and Technology for Development, 2006.
[49] T. S. Rappaport and C. D. McGillem, โUHF fading in factories,โ IEEE J. Sel. Areas Commun., vol. 7, no. 1, pp. 40โ48,
1989.
[50] A. Neskovic, N. Neskovic, and G. Paunovic, โModern approaches in modeling of mobile radio systems propagation
environment.โ IEEE Communications Surveys and Tutorials, vol. 3, no. 3, pp. 2โ12, 2000.
| 7cs.IT
|
Developing Bug-Free Machine Learning Systems With Formal Mathematics
Daniel Selsam 1 Percy Liang 1 David L. Dill 1
arXiv:1706.08605v1 [cs.SE] 26 Jun 2017
Abstract
Noisy data, non-convex objectives, model misspecification, and numerical instability can all
cause undesired behaviors in machine learning
systems. As a result, detecting actual implementation errors can be extremely difficult. We
demonstrate a methodology in which developers
use an interactive proof assistant to both implement their system and to state a formal theorem
defining what it means for their system to be correct. The process of proving this theorem interactively in the proof assistant exposes all implementation errors since any error in the program
would cause the proof to fail. As a case study,
we implement a new system, Certigrad, for optimizing over stochastic computation graphs, and
we generate a formal (i.e. machine-checkable)
proof that the gradients sampled by the system
are unbiased estimates of the true mathematical
gradients. We train a variational autoencoder using Certigrad and find the performance comparable to training the same model in TensorFlow.
1. Introduction
Machine learning systems are difficult to engineer for many
fundamental reasons. First and foremost, implementation
errors can be extremely difficult to detectโlet alone to localize and addressโsince there are many other potential
causes of undesired behavior in a machine learning system.
For example, an implementation error may lead to incorrect gradients and so cause a learning algorithm to stall, but
such a symptom may also be caused by noise in the training
data, a poor choice of model, an unfavorable optimization
landscape, an inadequate search strategy, or numerical instability. These other issues are so common that it is often
assumed that any undesired behavior is caused by one of
them. As a result, actual implementation errors can persist
1
Stanford University, Stanford, CA. Correspondence to:
Daniel Selsam <[email protected]>.
Proceedings of the 34 th International Conference on Machine
Learning, Sydney, Australia, PMLR 70, 2017. Copyright 2017
by the author(s).
Standard methodology: test it empirically
Debug
Program
Test
Our methodology: verify it mathematically
Debug
Specify
Program
Prove
Figure 1. A high-level comparison of our methodology with the
standard methodology for developing machine learning systems.
Instead of relying on empirical testing to expose implementation
errors, we first formally specify what our system is required to
do in terms of the underlying mathematics, and then try to formally prove that our system satisfies its specification. The process
of proving exposes implementation errors systematically and the
(program โ prove โ debug) loop eventually terminates with a
bug-free system and a machine-checkable proof of correctness.
indefinitely without detection.1 Errors are even more difficult to detect in stochastic programs, since some errors may
only distort the distributions of random variables and may
require writing custom statistical tests to detect.
Machine learning systems are also difficult to engineer because it can require substantial expertise in mathematics
(e.g. linear algebra, statistics, multivariate analysis, measure theory, differential geometry, topology) to even understand what a machine learning algorithm is supposed to do
and why it is thought to do it correctly. Even simple algorithms such as gradient descent can have intricate justifications, and there can be a large gap between the mechanics of an implementationโespecially a highly-optimized
oneโand its intended mathematical semantics.
1
Theano (Bergstra et al., 2010) has been under development for almost a decade and yet there is a recent GitHub issue (https://github.com/Theano/Theano/issues/4770) reporting a
model for which the loss continually diverges in the middle of
training. Only after various experiments and comparing the behavior to other systems did the team agree that it is most likely an
implementation error. As of this writing, neither the cause of this
error nor the set of models it affects have been determined.
Developing Bug-Free Machine Learning Systems With Formal Mathematics
In this paper, we demonstrate a practical methodology for
building machine learning systems that addresses these
challenges by enabling developers to find and eliminate implementation errors systematically without recourse to empirical testing. Our approach makes use of a tool called
an interactive proof assistant (Gordon, 1979; Gordon &
Melham, 1993; Harrison, 1996; Nipkow et al., 2002; Owre
et al., 1992; Coq Development Team, 2015-2016; de Moura
et al., 2015), which consists of (a) a programming language, (b) a language to state mathematical theorems, and
(c) a set of tools for constructing formal proofs of such theorems. Note: we use the term formal proof to mean a proof
that is in a formal system and so can be checked by a machine.
In our approach, developers use the theorem language (b)
to state a formal mathematical theorem that defines what it
means for their implementation to be error-free in terms
of the underlying mathematics (e.g. multivariate analysis). Upon implementing the system using the programming language (a), developers use the proof tools (c) to
construct a formal proof of the theorem stating that their
implementation is correct. The first draft of any implementation will often have errors, and the process of interactive
proving will expose these errors systematically by yielding impossible proof obligations. Once all implementation
errors have been fixed, the developers will be able to complete the formal proof and be certain that the implementation has no errors with respect to its specification. Moreover, the proof assistant can check the formal proof automatically so no human needs to understand why the proof
is correct in order to trust that it is. Figure 1 illustrates this
process.
Proving correctness of machine learning systems requires
building on the tools and insights from two distinct fields:
program verification (Leroy, 2009; Klein et al., 2009; Chlipala, 2013; Chen et al., 2015), which has aimed to prove
properties of computer programs, and formal mathematics (Rudnicki, 1992; Gonthier, 2008; Gonthier et al., 2013;
Hales et al., 2015), which has aimed to formally represent and generate machine-checkable proofs of mathematical theorems. Both of these fields make use of interactive
proof assistants, but the tools, libraries and design patterns
developed by the two fields focus on different problems and
have remained largely incompatible. While the methodology we have outlined will be familiar to the program verification community, and while reasoning formally about
the mathematics that underlies machine learning will be familiar to the formal mathematics community, proving such
sophisticated mathematical properties of large (stochastic)
software systems is a new goal and poses many new challenges.
To explore these challenges and to demonstrate the prac-
W1
โ
x
W2
softplus
N (ยท, I)
โ
sigmoid
cost
L(W1 , W2 ) = EzโผN (softplus(W1 x),I) [cost(x, ฯ(W2 z))]
Figure 2. An example stochastic computation graph representing
a simple variational autoencoder. Stochastic nodes are indicated
by rounded rectangles. The loss function for the graph is the expected value of the cost node over the stochastic choices, which
in this case is a single sample from a Gaussian distribution.
ticality of our approach, we implemented a new machine
learning system, Certigrad, for optimizing over stochastic computation graphs (Schulman et al., 2015). Stochastic computation graphs extend the computation graphs that
underly systems like TensorFlow (Abadi et al., 2015) and
Theano (Bergstra et al., 2010) by allowing nodes to represent random variables and by defining the loss function for
a graph to be the expected value of the sum of the leaf nodes
over the stochastic choices. See Figure 2 for an example of
a stochastic computation graph. We implement our system
in the Lean Theorem Prover (de Moura et al., 2015), a new
interactive proof assistant still under active development for
which the integration of programming and mathematical
reasoning is an ongoing design goal. We formally state and
prove functional correctness for the stochastic backpropagation algorithm: that the sampled gradients are indeed unbiased estimates of the gradients of the loss function with
respect to the parameters.
We note that provable correctness need not come at the
expense of computational efficiency: proofs need only be
checked once during development and they introduce no
runtime overhead. Although the algorithms we verify in
this work lack many optimizations, most of the running
time when training machine learning systems is spent multiplying matrices, and we are able to achieve competitive performance simply by linking with an optimized library for matrix operations (we used Eigen (Guennebaud
et al., 2010)).2 To demonstrate practical feasibility empirically, we trained an Auto-Encoding Variational Bayes
(AEVB) model (Kingma & Welling, 2014) on MNIST using ADAM (Kingma & Ba, 2014) and found the performance comparable to training the same model in TensorFlow.
2
Note that the validity of our theorem becomes contingent on
Eigenโs matrix operations being functionally equivalent to the versions we formally proved correct.
Developing Bug-Free Machine Learning Systems With Formal Mathematics
Informal
R
R f (x, y) dx
f (x, y)
โฮธ f (g(ฮธ))|ฮธ0
โf (g(ฮธ))
We summarize our contributions:
1. We present the first application of formal (i.e.
machine-checkable) proof techniques to developing
machine learning systems.
2. We describe a methodology that can detect implementation errors systematically in machine learning systems.
3. We demonstrate that our approach is practical by developing a performant implementation of a sophisticated machine learning system along with a machinecheckable proof of correctness.
2. Motivation
When developing machine learning systems, many program optimizations involve extensive algebraic derivations
to put mathematical expressions in closed-form . For example, suppose you want to compute the following quantity
efficiently:
Z
2
N (x; ยต, Diag(ฯ )) log N (x; 0, Inรn ).
(1)
x
You expand the density functions, grind through the algebra
by hand and eventually derive the following closed form
expression:
" n
#
1 X 2
2
ฯ โ ยตi + n log 2ฯ
โ
2 i=1 i
Formal
R
(ฮป x, f x y)
?
โ (ฮป ฮธ, f (g ฮธ)) ฮธ0
?
Figure 3. Translating informal usages of the integral and gradient
to our formal representation. Note that whereas some of the informal examples are too ambiguous to interpret without additional
information, the Lean representation is always unambiguous.
language. All three capabilities are provided by the new interactive proof assistant Lean (de Moura et al., 2015). Lean
is an implementation of a logical system known as the Calculus of Inductive Constructions (Coquand & Huet, 1988),
and its design is inspired by the better-known Coq Proof
Assistant (Coq Development Team, 2015-2016). Our development makes use of certain features that are unique to
Lean, but most of what we present is equally applicable
to Coq, and to a lesser extent, other interactive theorem
provers such as Isabelle/HOL (Nipkow et al., 2002).
To explain and motivate the relevant features of Lean, we
will walk through applying our methodology to a toy problem: writing a program to compute the gradient of the softplus function. We can write standard functional programs
in Lean, such as softplus:
def splus (x : R) : R := log (1 + exp x)
We can also represent more abstract operations such as integrals and gradients:
(2)
You implement a procedure to compute this quantity and
include it as part of a larger program, but when you run
your first experiment, your plots are not as encouraging as
you hoped. After ruling out many other possible explanations, you eventually decide to scrutinize this procedure
more closely. You implement a naฤฑฬve Monte Carlo estimator for the quantity above, compare it against your procedure on a few random inputs and find that its estimates
are systematically biased. What do you do now? If you
re-check your algebra carefully, you might notice that the
sign of ยต2i is wrong, but wouldnโt it be easier if the compiler checked your algebra for you and found the erroneous
step? Or better yet, if it did the algebra for you in the first
place and could guarantee the result was error-free?
3. Background: The Lean Theorem Prover
To develop software systems with no implementation errors, we need a way to write computer programs, mathematical theorems, and mathematical proofs all in the same
R
(f : R โ R) : R
โ (f : R โ R) (ฮธ : R) : R
R
Here the intended meaning of f is the integral of the
function f over all of R, while the intended meaning of
โ f ฮธ is the gradient (i.e. the derivative) of the function f
at the point ฮธ. Figure 3 shows how to represent common
idioms of informal mathematics in our formal representation; note that whereas some of the informal examples are
too ambiguous to interpret without additional information,
the Lean representation is always unambiguous.
We can represent mathematical theorems in Lean as well.
For example, we can use the following predicate to state
that a particular function f is differentiable at a point ฮธ:
is_diff (f : R โ R) (ฮธ : R) : Prop
The fact that the return type of is_diff is Prop indicates
that it is not a computer program to be executed but rather
that it represents a mathematical theorem.
We can also state and assume basic properties about the
gradient, such as linearity:
โ (f g : R โ R) (ฮธ : R), is_diff f ฮธ โง is_diff g ฮธ โ
โ (f + g) ฮธ = โ f ฮธ + โ g ฮธ
Developing Bug-Free Machine Learning Systems With Formal Mathematics
Returning to our running example, we can state the theorem
that a particular function f computes the gradient of the
softplus function:
def gsplus_spec (f : R โ R) : Prop :=
โ x, f x = โ splus x
Suppose we try to write a program to compute the gradient
of the softplus function as follows:
why a proof is correct in order to trust that it is.3
Although we cannot execute functions such as gsplus directly in the core logic of Lean (since a real number is an
infinite object that cannot be stored in a computer), we can
execute the floating-point approximation inside Leanโs virtual machine:
vm_eval gsplus ฯ โโ answer: 0.958576
def gsplus (x : R) : R := 1 / (1 + exp x)
The application gsplus_spec gsplus represents the
proposition that our implementation gsplus is correct, i.e.
that it indeed computes the gradient of the softplus function
for all inputs.
We can try to formally prove theorems in Lean interactively:
theorem gsplus_correct : gsplus_spec gsplus :=
lean: ` gsplus_spec gsplus
user: expand_def gsplus_spec,
lean: ` โ x, gsplus x = โ splus x
user: introduce x,
lean: x : R ` gsplus x = โ splus x
user: expand_defs [gsplus, splus],
lean: x : R ` 1 / (1 + exp x) = โ (ฮป x, log (1 + exp x)) x
user: simplify_grad,
lean: x : R ` 1 / (1 + exp x) = exp x / (1 + exp x)
The lines beginning with lean show the current state of
the proof as displayed by Lean, which at any time consists of a collection of goals of the form assumptions
` conclusion. Every line beginning with user invokes a
tactic, which is a command that modifies the proof state
in some way such that Lean can automatically construct
proofs of the original goals given proofs of the new ones.
Here the simplify_grad tactic rewrites exhaustively with
known gradient rulesโin this case it uses the rules for log,
exp, addition, constants, and the identity function. The final
goal is clearly not provable, which means we have found an
implementation error in gsplus. Luckily the goal tells us
exactly what gsplus x needs to return: gsplus x = exp x
/ (1 + exp x). Once we fix the implementation of gsplus,
the proof script that failed before now succeeds and generates a machine-checkable proof that the revised gsplus
is bug-free. Note that we need not have even attempted
to implement gsplus before starting the proof, since the
process itself revealed what the program needs to compute.
We will revisit this phenomenon in ยง4.5.
In the process of proving the theorem, Lean constructs
a formal proof certificate that can be automatically verified by a small stand-alone executable, whose soundness is
based on a well-established meta-theoretic argument embedding the core logic of Lean into set theory, and whose
implementation has been heavily scrutinized by many developers. Thus no human needs to be able to understand
4. Case Study: Certified Stochastic
Computation Graphs
Stochastic computation graphs are directed acyclic graphs
in which each node represents a specific computational operation that may be deterministic or stochastic (Schulman
et al., 2015). The loss function for a graph is defined to
be the expected value of the sum of the leaf nodes over the
stochastic choices. Figure 2 shows the stochastic computation graph for a simple variational autoencoder.
Using our methodology, we developed a system, Certigrad,
which allows users to construct arbitrary stochastic computation graphs out of the primitives that we provide. The
main purpose of the system is to take a program describing
a stochastic computation graph and to run a randomized algorithm (stochastic backpropagation) that, in expectation,
provably generates unbiased samples of the gradients of the
loss function with respect to the parameters.
4.1. Overview of Certigrad
We now briefly describe the components of Certigrad,
some of which have no analogues in traditional software
systems.4
Mathematics libraries. There is a type that represents tensors of a particular shape, along with basic functions (e.g.
exp, log) and operations (e.g. the gradient, the integral).
There are assumptions about tensors (e.g. gradient rules
for exp and log), and facts that are proved in terms of those
assumptions (e.g. the gradient rule for softplus). There
is also a type that represents probability distributions over
vectors of tensors, that can be reasoned about mathematically and that can also be executed procedurally using a
pseudo-random number generator.
Implementation. There is a data structure that represents
stochastic computation graphs, as well as an implementation of stochastic backpropagation. There are also functions that optimize stochastic computation graphs in various ways (e.g. by integrating out parts of the objective
3
This appealing property can be lost when an axiom is assumed that is not true. We discuss this issue further in ยง4.3.
4
The complete development can be found at www.github.com/
dselsam/certigrad.
Developing Bug-Free Machine Learning Systems With Formal Mathematics
function), as well as basic utilities for training models (e.g.
stochastic gradient descent).
Specification. There is a collection of theorem statements
that collectively define what it means for the implementation to be correct. For Certigrad, there is one main theorem
that states that the stochastic backpropagation procedure
yields unbiased estimates of the true mathematical gradients. There are also other theorems that state that individual
graph optimizations are sound.
Proof. There are many helper lemmas to decompose the
proofs into more manageable chunks, and there are tactic
scripts to generate machine-checkable proofs for each of
the lemmas and theorems appearing in the system. There
are also tactic programs to automate certain types of reasoning, such as computing gradients or proving that functions are continuous.
Optimized libraries. While the stochastic backpropagation
function is written in Lean and proved correct, we execute
the primitive tensor operations with the Eigen library for
linear algebra. There is a small amount of C++ code to
wrap Eigen operations for use inside Leanโs virtual machine.
The rest of this section describes the steps we took to develop Certigrad, which include sketching the high-level
architecture, designing the mathematics libraries, stating
the main correctness theorem and constructing the formal
proof. Though many details are specific to Certigrad, this
case study is designed to illustrate our methodology and we
expect other projects will follow a similar process. Note:
Certigrad supports arbitrarily-shaped tensors, but doing so
introduces more notational complexity than conceptual difficulty and so we simplify the presentation that follows by
assuming that all values are scalars.
4.2. Informal specification
The first step of applying our methodology is to write down
informally what the system is required to do. Suppose g is a
stochastic computation graph with n nodes and (to simplify
the notation) that it only takes a single parameter ฮธ. Then
g, ฮธ together define a distribution over the values at the n
nodes (X1 , . . . , Xn ). Let cost(g, X1:n ) be the function that
sums the values of the leaf nodes. Our primary goal is to
write a (stochastic) backpropagation algorithm bprop such
that for any graph g,
Eg,ฮธ [bprop(g, ฮธ, X1:n )] = โฮธ (Eg,ฮธ [cost(g, X1:n )])
(3)
While this equation may seem sufficient to communicate
the specification to a human with a mathematical background, more precision is needed to communicate it to a
computer. The next step is to formalize the background
mathematics, such as real numbers (tensors) and probability distributions, so that we can state a formal analogue of
Equation 3 that the computer can understand. Although we
believe it will be possible to develop standard libraries of
mathematics that future developers can use off-the-shelf,
we needed to develop the mathematics libraries for Certigrad from scratch.
4.3. Designing the mathematics libraries
Whereas in traditional formal mathematics the goal is to
construct mathematics from first principles (Gonthier et al.,
2013; Hales et al., 2015), we need not concern ourselves
with foundational issues and can simply assume that standard mathematical properties hold. For example, we can
assume that there is a type R of real numbers without needing to construct them (e.g. from Cauchy sequences), and
likewise
can assume there is an integration operator on the
R
reals (f : R โ R) : R that satisfies the well-known properties without needing to construct it either (e.g. from Riemann sums).
Note that axioms must be chosen with great care since even
a single false axiom (perhaps caused by a single missing
precondition) can in principle allow proving any false theorem and so would invalidate the property that all formal
proofs can be trusted without inspection.5 However, there
are many preconditions that appear in mathematical theorems, such as integrability, that are almost always satisfied
in machine learning contexts and which most developers
ignore. Using axioms that omit such preconditions will
necessarily lead to proving theorems that are themselves
missing the corresponding preconditions, but in practice a
non-adversarial developer is extremely unlikely to accidentally construct vacuous proofs by exploiting these axioms.
For the first draft of our system, we purposely omitted integrability preconditions in our axioms to simplify the development. Only later did we make our axioms sound and
propagate the additional preconditions throughout the system so that we could fully trust our formal proofs.
Despite the convenience of axiomatizing the mathematics,
designing the libraries was still challenging for two reasons. First, there were many different ways to formally represent the mathematical objects in question, and we needed
to experiment to understand the tradeoffs between the different representations. Second, we needed to extend several traditional mathematical concepts to support reasoning
about executable computer programs. The rest of this sub5
For example, the seemingly harmless axiom โx, x/x = 1
without the precondition x 6= 0 can be used to prove the absurdity (0 = 0 โ 1 = 0 โ (0/0) = (0 โ 0)/0 = 0/0 = 1). If a system
assumes this axiom, then a formal proof of correctness could not
be trusted without inspection since the proof may exploit this contradiction.
Developing Bug-Free Machine Learning Systems With Formal Mathematics
section illustrates these challenges by considering the problem we faced of designing a representation of probability
distributions for Certigrad.
Representing probability distributions. Our challenge is to
devise a sufficiently abstract representation of probability
distributions that satisfies the following desiderata: we can
reason about the probability density functions of continuous random variables, we have a way to reason about arbitrary deterministic functions applied to random variables,
we can execute a distribution procedurally using a pseudorandom number generator (RNG), the mathematical and
procedural representations of a distribution are guaranteed
to correspond, and the mathematics will be recognizable to
somebody familiar with the informal math behind stochastic computation graphs.
We first define types to represent the mathematical and procedural notions of probability distribution. For mathematics, we define a Func n to be a functional that takes a realvalued function on Rn to a scalar:
def Func (n : N) : Type := โ (f : Rn โ R), R
The intended semantics is that if p : Func n represents a
distribution on Rn , then p f is the expected value of f over
p, i.e. Exโผp [f (x)].
For sampling, we define an Prog n to be a procedure that
takes an RNG and returns a vector in Rn along with an
updated RNG:
def Prog (n : N) : Type := RNG โ Rn ร RNG
We also assume that there are primitive (continuous) distributions (PrimDist := Func 1 ร Prog 1) that consist of a
probability density function and a corresponding sampling
procedure. In principle, we could construct all distributions from uniform variates, but for expediency, we treat
other well-understood distributions as primitive, such as the
Gaussian (gauss ยต ฯ : PrimDist).
Finally, we define a type of distributions (Dist n) that abstractly represents programs that may mix sampling from
primitive distributions with arbitrary deterministic computations. A Dist n can be denoted to a Func n (with the
function E) to reason about mathematically, and to an Prog
n (with the function run) to execute with an RNG.
For readers familiar with functional programming, our construction is similar to a monad. We allow three ways of
constructing a Dist n, corresponding to sampling from
a primitive distribution (sample), returning a value deterministically (det), and composing two distributions
(compose):
sample ((pdf, prog) : PrimDist) : Dist 1
det (xs : Rn ) : Dist n
compose (d1 : Dist m) (d2 : Rm โ Dist n) : Dist n
Dist n : Type
E {n : N} (d : Dist n) (f : Rn โ R) : R
SCG n : Type
SCG.to_dist {n : N} (g : SCG n) (ฮธ : R) : Dist n
cost {n : N} (g : SCG n) (xs : Rn ) : R
Figure 4. The basic types and functions we will need to formally
state the specification. Dist n represents a distribution over Rn ,
E is the expected value function, SCG n represents a computation
graph on n nodes, SCG.to dist is the function that samples
from an SCG n and yields a distribution over the values at the
nodes, and cost sums the values at the leaf nodes of a graph.
Curly braces around an argument indicates that it can be inferred
from context and need not be passed explicitly.
The mathematical semantics of all three constructors are
straightforward:
R
E (sample (pdf, prog)) f = (ฮป x, pdf x * f x)
E (det xs) f = f xs
E (compose d1 d2 ) f = E d1 (ฮป x, (E (d2 x) f))
as are the procedural semantics:
run (sample (pdf, prog)) rng = prog rng
run (det xs) rng = (xs, rng)
run (compose d1 d2 ) rng =
let (x, rngโ) := run d1 rng in run (d2 x) rngโ
We have defined E and run to correspond; we consider a
stochastic program correct if we can prove the relevant theorems about its Func denotation, and we sample from it by
passing an RNG to its Prog denotation.
4.4. Formal specification
With the background mathematics in place, the next step
is to write down the formal specification itself. First, we
design types for every other object and function appearing
in the informal description. To start, we need a type SCG n
to represent stochastic computation graphs on n nodes, and
a function SCG.to_dist that takes an SCG n and a scalar
parameter ฮธ to a distribution over n real numbers (Dist n).
We also need a function cost that takes a graph and the
values at each of its nodes and sums the values at the leaf
nodes. Figure 4 provides the full types of all objects that
will appear in the specification.
Now we can write down a type-correct analogue of the informal specification presented in Equation 3:
def bprop_spec (bprop : โ {n}, SCG n โ R โ Rn โ R)
: Prop :=
โ (n : N) (g : SCG n) (ฮธ : R),
E (SCG.to_dist g ฮธ) (ฮป xs, bprop g ฮธ xs)
=
โ (ฮป ฮธ, E (SCG.to_dist g ฮธ) (ฮป xs, cost g xs)) ฮธ
Given the mathematics libraries, implementing the other
Developing Bug-Free Machine Learning Systems With Formal Mathematics
objects and functions appearing in the specification such
as SCG n and SCG.to_dist is straightforward functional
programming.
4.5. Interactive proof
While conventional wisdom is that one would write their
program before trying to prove it correct, the interactive
proof process provides so much helpful information about
what the system needs to do that we began working on the
proof immediately after drafting the specification. We split
the proof into two steps. First, we implemented the simplest possible function that satisfied the specification (that
only computed the gradient for a single parameter at a time
and did not memoize at all) and proved that correct. Second, we implemented a more performant version (that computed the gradient for multiple parameters simultaneously
using memoization) and proved it equivalent to the first
one.
For the first step, we started with a placeholder implementation that immediately returned zero and let the interactive proof process guide the implementation. Whenever
the proof seemed to require induction on a particular data
structure, we extended the program to recurse on that data
structure; whenever the proof showed that a branch of the
program needed to return a value with a given expectation, we worked backwards from that to determine what
value to return. Proving the first step also exposed errors in
our specification in the form of missing preconditions. For
the specification to hold, we needed to make additional assumptions about the graph, e.g. that the identifier for each
node in the graph is unique, and that each leaf node is a
scalar (WellFormed g). We also needed to assume a generalization of the differentiability requirement mentioned
in Schulman et al. (2015), that a subset of the nodes determined by the structure of the graph must be differentiable
no matter the result of any stochastic choices (GradsExist
g ฮธ).
For the second step, we wrote the memoizing implementation before starting the proof and used the process of proving to test and debug it. Although the code for memoizing was simple and short, we still managed to make two
implementation errors, one conceptual and one syntactic.
Luckily the process of proving necessarily exposes all implementation errors, and in this case made it clear how to
fix both of them.
We completed the main proof of correctness before proving
most of the lemmas that the proof depends on, but the lemmas turned out to be true (except for a few missing preconditions) and so proving them did not expose any additional
implementation errors. We also completed the main proof
while our axioms were still unsound (see ยง4.3). When we
made our axioms sound and propagated the changes we
def bprop_spec (bprop : โ {n}, SCG n โ R โ Rn โ R)
: Prop :=
โ (n : N) (g : SCG n) (ฮธ : R),
WellFormed g โง GradsExist g ฮธ
โง IntegralsExist g ฮธ โง CanDiffUnderInts g ฮธ โ
E (SCG.to_dist g ฮธ) (ฮป xs, bprop g ฮธ xs)
=
โ (ฮป ฮธ, E (SCG.to_dist g ฮธ) (ฮป xs, cost g xs)) ฮธ
Figure 5. The final specification for the simplified problem with
only scalars (as opposed to tensors) and only a single parameter
ฮธ. Our actual system supports arbitrarily-shaped tensors and differentiating with respect to multiple parameters at once.
found that our specification required two additional preconditions: that all functions that are integrated over in the theorem statement are indeed integrable (IntegralsExist
g ฮธ), and that the many preconditions needed for pushing
the gradient over each integral in the expected loss are satisfied (CanDiffUnderInts g ฮธ). However, tracking these
additional preconditions did not lead to any changes in our
actual implementation. Figure 5 shows the final specification.
4.6. Optimizations
We can also use our methodology to verify optimizations
that involve mathematical reasoning. When developing
machine learning models, one often starts with an easyto-understand model that induces a gradient estimator with
unacceptably high variance, and does informal mathematics by hand to derive a new model that has the same objective function but that induces a better gradient estimator. In
our approach, the user can write both models and use the
process of interactive proving to confirm that they induce
the same objective function. Common transformations can
be written once and proved correct so that users need only
write the first model and the second can be derived and
proved equivalent automatically.
As part of Certigrad, we wrote a program optimization
that integrates out the KL-divergence of the multivariate
isotropic Gaussian distribution and we proved once and
for all that the optimization is sound. We also verified an
optimization that reparameterizes a model so that random
variables do not depend on parameters (and so need not
be backpropagated through). Specifically, the optimization
replaces a node that samples from N (ยต, Diag(ฯ 2 )) with a
graph of three nodes that first samples from N (0, Inรn )
and then scales and shifts the result according to ฯ and
ยต respectively. We applied these two transformations
in sequence to a naฤฑฬve variational-autoencoder to yield
the Auto-Encoding Variational Bayes (AEVB) estimator (Kingma & Welling, 2014).
Developing Bug-Free Machine Learning Systems With Formal Mathematics
at each epoch against the same model and optimization procedure in TensorFlow, both running on 2 CPU cores. We
found that the expected losses decrease at the same rate,
and that Certigrad takes only 7% longer per epoch (Figure 6).
(a) Expected loss vs epoch (b) Running time vs epoch
Figure 6. Results of running our certified procedure on an AEVB
model, compared to TensorFlow. Our system trains just as well
and takes only 7% longer per epoch.
4.7. Verifying backpropagation for specific models
Even though we proved that bprop satisfies its formal
specification (bprop_spec), we cannot be sure that it will
compute the correct gradients for a particular model unless we prove that the model satisfies the preconditions of
the specification. Although some of the preconditions are
technically undecidable, in practice most machine learning
models will satisfy them all for simple reasons. We wrote a
(heuristic) tactic program to prove that specific models satisfy all the preconditions and used it to verify that bprop
computes the correct gradients for the AEVB model derived in ยง4.6.
4.8. Running the system
We have proved that our system is correct in an idealized
mathematical context with infinite-precision real numbers.
To actually execute the system we need to replace all real
numbers in the program with floating-point numbers. Although doing so technically invalidates the specification
and can introduce numerical instability in some cases, this
class of errors is well understood (Higham, 2002), could
be ruled out as well in principle (Harrison, 2006; Boldo
et al., 2015; Ramananandro et al., 2016) and is conceptually distinct from the algorithmic and mathematical errors
that our methodology is designed to eliminate. To improve
performance, we also replace all tensors with an optimized
tensor library (Eigen). This approximation could introduce
errors into our system if for whatever reason the Eigen
methods we use are not functionally equivalent to ones we
formally reason about; of course developers could achieve
even higher assurance by verifying their optimized tensor
code as well.
4.9. Experiments
Certigrad is efficient. As an experiment, we trained an
AEVB model with a 2-layer encoding network and a 2layer decoding network on MNIST using the optimization
procedure ADAM (Kingma & Ba, 2014), and compared
both the expected loss and the running time of our system
5. Discussion
Our primary motivation is to develop bug-free machine
learning systems, but our approach may provide significant
benefits even when building systems that need not be perfect. Perhaps the greatest burden software developers must
bear is needing to fully understand how and why their system works, and we found that by formally specifying the
system requirements we were able to relegate much of this
burden to the computer. Not only were we able to synthesize some fragments of the system (ยง4.5), we were able
to achieve extremely high confidence that our system was
bug-free without needing to think about how all the pieces
of the system fit together. In our approach, the computerโ
not the humanโis responsible for ensuring that all the local properties that the developer establishes imply that the
overall system is correct. Although using our methodology
to develop Certigrad imposed many new requirements and
increased the overall workload substantially, we found that
on the whole it made the development process less cognitively demanding.
There are many ways that our methodology can be adopted
incrementally. For example, specifications need not cover
functional correctness, not all theorems need to be proved,
unsound axioms can be used that omit certain preconditions, and more traditional code can be wrapped and
axiomatized (as we did with Eigen). When developing
Certigrad we pursued the ideal of a complete, machinecheckable proof of functional correctness, and achieved
an extremely high level of confidence that the system was
correct. However, we realized many of the benefits of
our methodologyโincluding partial synthesis and reduced
cognitive demandโearly in the process before proving
most of the lemmas. Although we could not be certain
that we had found all of the bugs before we made our axioms sound and filled in the gaps in the formal proofs, in
hindsight we had eliminated all bugs early in the process
as well. While a pure version of our methodology may already be cost-effective for high-assurance applications, we
expect that pragmatic use of our methodology could yield
many of the benefits for relatively little cost and could be
useful for developing a wide range of machine learning systems to varying standards of correctness.
Developing Bug-Free Machine Learning Systems With Formal Mathematics
Acknowledgments
We thank Jacob Steinhardt, Alexander Ratner, Cristina
White, William Hamilton, Nathaniel Thomas, and Vatsal
Sharan for providing valuable feedback on early drafts.
We also thank Leonardo de Moura, Tatsu Hashimoto, and
Joseph Helfer for helpful discussions. This work was supported by Future of Life Institute grant 2016-158712.
References
Abadi, Martฤฑฬn, Agarwal, Ashish, Barham, Paul, Brevdo,
Eugene, Chen, Zhifeng, Citro, Craig, Corrado, Greg S.,
Davis, Andy, Dean, Jeffrey, Devin, Matthieu, Ghemawat, Sanjay, Goodfellow, Ian, Harp, Andrew, Irving, Geoffrey, Isard, Michael, Jia, Yangqing, Jozefowicz,
Rafal, Kaiser, Lukasz, Kudlur, Manjunath, Levenberg,
Josh, Maneฬ, Dan, Monga, Rajat, Moore, Sherry, Murray,
Derek, Olah, Chris, Schuster, Mike, Shlens, Jonathon,
Steiner, Benoit, Sutskever, Ilya, Talwar, Kunal, Tucker,
Paul, Vanhoucke, Vincent, Vasudevan, Vijay, Vieฬgas,
Fernanda, Vinyals, Oriol, Warden, Pete, Wattenberg,
Martin, Wicke, Martin, Yu, Yuan, and Zheng, Xiaoqiang.
TensorFlow: Large-scale machine learning on heterogeneous systems, 2015. URL http://tensorflow.
org/. Software available from tensorflow.org.
Bergstra, J., Breuleux, O., Bastien, F., Lamblin, P., Pascanu, R., Desjardins, G., Turian, J., Warde-Farley, D.,
and Bengio, Y. Theano: a CPU and GPU math expression compiler. In Python for Scientific Computing Conference, 2010.
de Moura, Leonardo, Kong, Soonho, Avigad, Jeremy,
Van Doorn, Floris, and von Raumer, Jakob. The Lean
theorem prover (system description). In Automated
Deduction-CADE-25, pp. 378โ388. Springer, 2015.
Gonthier, Georges. Formal proofโthe four-color theorem.
Notices of the AMS, 55(11):1382โ1393, 2008.
Gonthier, Georges, Asperti, Andrea, Avigad, Jeremy,
Bertot, Yves, Cohen, Cyril, Garillot, Francฬงois, Le Roux,
Steฬphane, Mahboubi, Assia, OโConnor, Russell, Biha,
Sidi Ould, et al. A machine-checked proof of the odd order theorem. In Interactive Theorem Proving, pp. 163โ
179. Springer, 2013.
Gordon, Michael JC. Edinburgh lcf: a mechanised logic of
computation. 1979.
Gordon, Michael JC and Melham, Tom F. Introduction
to hol a theorem proving environment for higher order
logic. 1993.
Guennebaud, Gaeฬl, Jacob, Benoฤฑฬt, et al.
http://eigen.tuxfamily.org, 2010.
Eigen v3.
Hales, Thomas, Adams, Mark, Bauer, Gertrud, Dang,
Dat Tat, Harrison, John, Hoang, Truong Le, Kaliszyk,
Cezary, Magron, Victor, McLaughlin, Sean, Nguyen,
Thang Tat, et al. A formal proof of the kepler conjecture. arXiv preprint arXiv:1501.02155, 2015.
Harrison, John. Hol light: A tutorial introduction. In International Conference on Formal Methods in ComputerAided Design, pp. 265โ269. Springer, 1996.
Boldo, Sylvie, Jourdan, Jacques-Henri, Leroy, Xavier, and
Melquiond, Guillaume. Verified compilation of floatingpoint computations. Journal of Automated Reasoning,
54(2):135โ163, 2015.
Harrison, John. Floating-point verification using theorem
proving. In International School on Formal Methods for
the Design of Computer, Communication and Software
Systems, pp. 211โ242. Springer, 2006.
Chen, Haogang, Ziegler, Daniel, Chajed, Tej, Chlipala,
Adam, Kaashoek, M Frans, and Zeldovich, Nickolai.
Using crash hoare logic for certifying the fscq file system. In Proceedings of the 25th Symposium on Operating Systems Principles, pp. 18โ37. ACM, 2015.
Higham, Nicholas J. Accuracy and stability of numerical
algorithms. SIAM, 2002.
Chlipala, Adam. The bedrock structured programming
system: Combining generative metaprogramming and
hoare logic in an extensible program verifier. In ACM
SIGPLAN Notices, volume 48, pp. 391โ402. ACM,
2013.
Coq Development Team. The Coq proof assistant reference
manual: Version 8.5. INRIA, 2015-2016.
Coquand, Thierry and Huet, Geฬrard. The calculus of constructions. Information and computation, 76(2-3):95โ
120, 1988.
Kingma, D. P. and Welling, M. Auto-encoding variational
Bayes. arXiv, 2014.
Kingma, Diederik and Ba, Jimmy.
method for stochastic optimization.
arXiv:1412.6980, 2014.
Adam: A
arXiv preprint
Klein, Gerwin, Elphinstone, Kevin, Heiser, Gernot, Andronick, June, Cock, David, Derrin, Philip, Elkaduwe,
Dhammika, Engelhardt, Kai, Kolanski, Rafal, Norrish,
Michael, et al. sel4: Formal verification of an os kernel.
In Proceedings of the ACM SIGOPS 22nd symposium on
Operating systems principles, pp. 207โ220. ACM, 2009.
Leroy, Xavier. Formal verification of a realistic compiler.
Communications of the ACM, 52(7):107โ115, 2009.
Developing Bug-Free Machine Learning Systems With Formal Mathematics
Nipkow, Tobias, Paulson, Lawrence C, and Wenzel,
Markus. Isabelle/HOL: a proof assistant for higherorder logic, volume 2283. Springer, 2002.
Owre, Sam, Rushby, John M, and Shankar, Natarajan.
Pvs: A prototype verification system. In Automated
DeductionโCADE-11, pp. 748โ752. Springer, 1992.
Ramananandro, Tahina, Mountcastle, Paul, Meister,
Benoฤฑฬt, and Lethin, Richard. A unified coq framework
for verifying c programs with floating-point computations. In Proceedings of the 5th ACM SIGPLAN Conference on Certified Programs and Proofs, pp. 15โ26.
ACM, 2016.
Rudnicki, Piotr. An overview of the mizar project. In Proceedings of the 1992 Workshop on Types for Proofs and
Programs, pp. 311โ330, 1992.
Schulman, John, Heess, Nicolas, Weber, Theophane, and
Abbeel, Pieter. Gradient estimation using stochastic
computation graphs. In Advances in Neural Information
Processing Systems, pp. 3528โ3536, 2015.
| 2cs.AI
|
arXiv:1512.05999v1 [math.AC] 18 Dec 2015
ON DING INJECTIVE, DING PROJECTIVE, AND DING FLAT
MODULES AND COMPLEXES
JAMES GILLESPIE
Abstract. We characterize Ding modules and complexes over Ding-Chen
rings. We show that over a Ding-Chen ring R, the Ding projective (resp.
Ding injective, resp. Ding flat) R-modules coincide with the Gorenstein projective (resp. Gorenstein injective, resp. Gorenstein flat) modules, which in
turn are nothing more than modules appearing as a cycle of an exact complex
of projective (resp. injective, resp. flat) modules. We prove a similar characterization for chain complexes of R-modules: A complex X is Ding projective
(resp. Ding injective, resp. Ding flat) if and only if each component Xn is Ding
projective (resp. Ding injective, resp. Ding flat). Along the way, we generalize
some results of Stovicek and Bravo-Gillespie-Hovey to obtain other interesting
corollaries. For example, we show that over any Noetherian ring, any exact
chain complex with Gorenstein injective components must have all cotorsion
cycle modules. That is, Ext1R (F, Zn I) = 0 for any such complex I and flat
module F . On the other hand, over any coherent ring, the cycles of any exact
complex P with projective components must satisfy Ext1R (Zn P, A) = 0 for any
absolutely pure module A.
1. introduction
Let R be a Gorenstein ring in the sense of [Iwa79, Iwa80]. This is a left and
right Noetherian ring R having finite injective dimension as both a left and right
module over itself. Over such rings, exact chain complexes of projective, injective,
and flat R-modules each have very nice homological properties. In particular, for
an exact complex P of projectives, the complex HomR (P, Q) is also exact for any
projective module Q. In general, such complexes are called totally acyclic complexes of projectives and the modules appearing as a cycle Zn P of such a complex
are called Gorenstein projective. So over Gorenstein rings, any exact complex of
projectives is totally acyclic and their cycles are all Gorenstein projective. Similar
statements hold for exact complexes of injectives and flats, and the corresponding
Gorenstein injective and Gorenstein flat modules. Gorenstein homological algebra
is the study of these modules and complexes and the theory is particularly satisfying over Gorenstein rings. In this case, most results from traditional homological
algebra have an analog in Gorenstein homological algebra. The book [EJ00] is a
standard reference, but many authors have studied the subject.
Stovicek recently proved the coherent analog of the above result concerning totally acyclic complexes of injectives [Sto14, Prop. 7.9]. It raises the same question
for the projective and flat analogs, which is answered in this paper. Before explaining further, first recall that a (left) coherent ring is one in which all finitely
Date: December 21, 2015.
1
2
JAMES GILLESPIE
generated (left) ideals are finitely presented. A ring that is both left and right coherent is called coherent and these include all Noetherian and Von Neumann regular
rings. A lesson learned from [Ste70] is that many results in homological algebra
extend from Noetherian to coherent rings by replacing finitely generated modules
with finitely presented modules. In the process, injective modules are replaced with
FP-injective (i.e. absolutely pure) modules. In this way, a Ding-Chen ring is a coherent ring R which has finite absolutely pure (i.e. FP-injective) dimension as both
a left and right module over itself. They were introduced in [DC93, DC96]. Since
a coherent ring is Noetherian if and only if the FP-injective modules coincide with
the injective modules, the Ding-Chen rings are nothing more than Gorenstein rings
whenever R is Noetherian.
In [Gil10], the author noted that the work of Ding, Mao and Li, see especially [DM05, DM07, DM08, DLM09], provides a natural way to extend notions
from Gorenstein homological algebra from Noetherian to coherent rings. In the
process, the Gorenstein modules are replaced by Dingโs modules. For example, we
say a module is Ding projective if it is a cycle module of some exact complex P of
projectives such that HomR (P, F ) remains exact for all flat modules F . See Definitions 4.1, 6.1, and 7.1. It admittedly seems strange to require that HomR (P, F )
remain exact for all flat modules F rather than just all projectives. After all, it feels
like we are requiring too much. However, it was shown in [BGH13] that the Ding
projectives are the cofibrant objects of an especially nice Quillen model structure
on R-Mod, the category of (left) R-modules, whenever R is coherent. It implies
that every module M can be approximated by a Ding projective and that the full
subcategory of all Ding projective modules naturally form a Frobenius category.
We think of the associated stable category as the (projective) stable module category of R. The analog of this for the usual Gorenstein projectives over Noetherian
rings simply doesnโt seem to be true, in general.
The first result of this paper is an extension, to Ding-Chen rings, of the well
known result concerning Gorenstein rings described in the first paragraph. Part (2)
is the result of Stovicek which motivated the analogous question for Ding projectives
and Ding flats.
Theorem 1.1. Let R be a Ding-Chen ring. That is, a left and right coherent ring
R such that R R and RR each have finite absolutely pure dimension. Let X be an
exact chain complex. Then
(1) If each component Xn is projective, then each cycle Zn X is Ding projective.
Indeed HomR (X, F ) remains exact for all flat modules F .
(2) If each component Xn is injective, then each cycle Zn X is Ding injective.
Indeed HomR (A, X) remains exact for all absolutely pure A.
(3) If each component Xn is flat, then each cycle Zn X is Ding flat. Indeed
A โR X remains exact for all absolutely pure A.
Consequently, the Gorenstein modules coincide with the Ding modules whenever R
is a Ding-Chen ring.
Before discussing the proof methods we note that Gorenstein chain complexes
have also been studied quite a bit. For example, it has been known for some
time that over Gorenstein rings, a chain complex X is Gorenstein injective (resp.
Gorenstein projective) if and only if each component is Gorenstein injective (resp.
Gorenstein projective). See [GR99, EE05, YL11]. In [YLL11, YLL13], Yang, Liu,
DING MODULES AND COMPLEXES
3
and Liang characterize the Ding complexes over a Ding-Chen ring. The next result
is a surprising refinement of their characterization.
Theorem 1.2. Let R be a Ding-Chen ring and X a chain complex of R-modules.
(1) X is Ding projective in Ch(R) if and only if each component Xn is a Ding
projective R-module.
(2) X is Ding injective in Ch(R) if and only if each component Xn is a Ding
injective R-module.
(3) X is Ding flat in Ch(R) if and only if each component Xn is a Ding flat
R-module.
Consequently, the Gorenstein complexes coincide with the Ding complexes whenever
R is a Ding-Chen ring.
We now briefly describe our methods used and highlight other results in the
paper. First, the injective cases are proved in a completely different fashion than
their projective analogs, (while the flat analogs are relatively easy). For the injective case, we generalize the approach of Stovicek to record a useful result concerning
cotorsion pairs and direct limits. If (W, F ) is a cotorsion pair, then W is closed under direct limits whenever W satisfies the two out of three property on short exact
sequences; see Proposition 3.1. The injective cases of Theorems 1.1 and 1.2 follow
as corollaries, but the approach leads to a string of other interesting corollaries appearing in Sections 3 and 4. Perhaps the most interesting is Corollary 3.5. It implies
that over any Noetherian ring, any exact chain complex with Gorenstein injective
components must have all cotorsion cycle modules. That is, Ext1R (F, Zn I) = 0 for
any such complex I and flat module F .
The projective case requires a completely different approach than the injective
one. Our proof of the projective part of Theorem 1.1 relies on a result proved
in [BGH13, Theorem A.6]. To obtain the projective statement in Theorem 1.2 we
in fact need to generalize this result to the category of chain complexes. Section 5
is devoted to this, with Theorem 5.9 being the main result. Finally, the following
interesting result is proved in Theorem 3.6.
Theorem 1.3. Let R be a coherent ring and P any exact complex of projectives.
Then Ext1R (Zn P, A) = 0 for any absolutely pure module A.
Regarding the structure of the paper, after some preliminaries in Section 2, we
first address the injective cases in Sections 3 and 4. Sections 5 and 6 are devoted
to the projective case, and Section 7 to the flat case.
2. preliminaries
Throughout the paper R denotes a general ring with identity. An R-module will
mean a left R-module, unless stated otherwise. The category of R-modules will be
denoted R-Mod. It is an abelian category.
2.1. Chain complexes on abelian categories. Let A be an abelian category.
We denote the corresponding category of chain complexes by Ch(A). In the case
A = R-Mod, we denote it by Ch(R). Our convention is that the differentials of
dn+1
d
n
Xnโ1 โ
โ ยท ยท ยท is a
our chain complexes lower degree, so ยท ยท ยท โ
โ Xn+1 โโโโ Xn โโ
chain complex. We also have the chain homotopy category of A, denoted K(A).
Its objects are also chain complexes but its morphisms are chain homotopy classes
4
JAMES GILLESPIE
of chain maps. Given a chain complex X, the nth suspension of X, denoted ฮฃn X,
is the complex given by (ฮฃn X)k = Xkโn and (dฮฃn X )k = (โ1)n dkโn . For a given
object A โ A, we denote the n-disk on A by Dn (A). This is the complex consisting
1A
A concentrated in degrees n and n โ 1, and 0 elsewhere. We denote
only of A โโโ
the n-sphere on A by S n (A), and this is the complex consisting only of A in degree
n and 0 elsewhere.
Given two chain complexes X, Y โ Ch(A) we define Hom(X, Y ) to be the comQ
ฮดn Q
โ
plex of abelian groups ยท ยท ยท โ
โ kโZ Hom(Xk , Yk+n ) โโ
kโZ Hom(Xk , Yk+nโ1 ) โ
ยท ยท ยท , where (ฮดn f )k = dk+n fk โ(โ1)n fkโ1 dk . We get a functor Hom(X, โ) : Ch(A) โ
โ
Ch(Z). Note that this functor takes exact sequences to left exact sequences, and it is
exact if each Xn is projective. Similarly the contravariant functor Hom(โ, Y ) sends
exact sequences to left exact sequences and is exact if each Yn is injective. It is an
exercise to check that the homology satisfies Hn [Hom(X, Y )] = K(A)(X, ฮฃโn Y ).
Being an abelian category, Ch(A) comes with Yoneda Ext groups. In particular, Ext1Ch(A) (X, Y ) will denote the group of (equivalences classes) of short exact
sequences 0 โ
โ Y โ
โ Z โ
โ X โ
โ 0 under the Baer sum operation. There is a
subgroup Ext1dw (X, Y ) โ Ext1Ch(A) (X, Y ) consisting of the โdegreewise splitโ short
exact sequences. That is, those for which each 0 โ
โ Yn โ
โ Zn โ
โ Xn โ
โ 0 is split
exact. The following lemma gives a well-known connection between Ext1dw and the
above hom-complex Hom.
Lemma 2.1. For chain complexes X and Y , we have isomorphisms:
Ext1 (X, ฮฃ(โnโ1) Y ) โผ
= Hn Hom(X, Y ) = K(A)(X, ฮฃโn Y )
dw
In particular, for chain complexes X and Y , Hom(X, Y ) is exact iff for any n โ Z,
any chain map f : ฮฃn X โ
โ Y is homotopic to 0 (or iff any chain map f : X โ
โ ฮฃn Y
is homotopic to 0).
In the case of A = R-Mod, we recall the usual tensor product of chain complexes.
Given that X (resp. Y ) is a complex of right (resp. left) R-modules, the tensor
product X โY is defined by (X โY )n = โi+j=n (Xi โYj ) in degree n. The boundary
map ฮดn is defined on the generators by ฮดn (x โ y) = dx โ y + (โ1)|x| x โ dy, where
|x| is the degree of the element x.
2.2. The modified Hom and Tensor complexes. Here again, Ch(R) denotes
the category of chain complexes of R-modules. The above Hom is often referred
to as the internal hom, for in the case that R is commutative, Hom(X, Y ) is again
an object of Ch(R). Note that the cycles in degree 0 of the internal hom coincide
with the external hom functor: Z0 [Hom(X, Y )] โผ
= HomCh(R) (X, Y ). This idea in
fact is useful to define an alternate internal hom as follows. Given X, Y โ Ch(R),
we define Hom(X, Y ) to be the complex
Hom(X, Y )n = Zn Hom(X, Y )
with differential
ฮปn : Hom(X, Y )n โ
โ Hom(X, Y )nโ1
defined by (ฮปf )k = (โ1)n dk+n fk . Notice that the degree n component of Hom(X, Y )
is exactly HomCh(R) (X, ฮฃโn Y ). In this way we get an internal hom Hom which is
useful for categorical considerations in Ch(R). For example, Hom(X, โ) is a left
exact functor, and is exact if and only if X is projective in the category Ch(R). On
DING MODULES AND COMPLEXES
5
the other hand, Hom(โ, Y ) is exact if and only if Y is injective in Ch(R). There
i
are corresponding derived functors which we denote by Ext . They satisfy that
i
Ext (X, Y ) is a complex whose degree n is ExtiCh(R) (X, ฮฃโn Y ).
Similarly, the usual tensor product of chain complexes does not characterize
categorical flatness. For this we need the modified tensor product and its left
derived torsion functor from [EGR97] and [GR99]. We will denote it by โ, and
it is defined in terms of the usual tensor product โ as follows. Given a complex
X of right R-modules and a complex Y of left R-modules, we define XโY to
be the complex whose nth entry is (X โ Y )n /Bn (X โ Y ) with boundary map
(X โ Y )n /Bn (X โ Y ) โ (X โ Y )nโ1 /Bnโ1 (X โ Y ) given by
x โ y 7โ dx โ y.
This defines a complex and we get a bifunctor โโโ which is right exact in each
variable. We denote the corresponding left derived functors by Tori . We refer the
reader to [GR99] for more details.
2.3. Finitely generated projective complexes. A standard characterization of
projective objects in Ch(R) is the following: A complex P is projective if and only
if it is an exact complex with each cycle Zn P a projective R-module. We also recall
that, by definition, a chain complex X is finitely generated if whenever X = ฮฃiโI Si ,
for some collection {Si }iโI of subcomplexes of X, then there exists a finite subset
J โ I for which X = ฮฃiโJ Si . It is a standard fact that X is finitely generated if
and only if it is bounded (above and below) and each Xn is finitely generated. We
say that a chain complex X is of type F Pโ if it has a projective resolution by
finitely generated projective complexes. Certainly any such X is finitely presented
and hence finitely generated.
2.4. Absolutely clean and level complexes; character duality. The so-called
level and absolutely clean modules were introduced in [BGH13] as generalizations
of flat modules over coherent rings and injective modules over Noetherian rings.
The same notions in the category Ch(R) were also studied in [BG15]. Here we
recall some definitions and results from [BG15].
Definition 2.2. We call a chain complex A absolutely clean if Ext1Ch(R) (X, A) =
1
0 for all chain complexes X of type F Pโ . Equivalently, if Ext (X, A) = 0 for all
complexes X of right R-modules of type F Pโ . On the other hand, we call a chain
complex L level if Tor1 (X, L) = 0 for all chain complexes X of right R-modules of
type F Pโ .
We refer to [BG15, Prop. 2.6/4.6] for proof of the following.
Proposition 2.3. A chain complex A is absolutely clean if and only if A is exact
and each Zn A is an absolutely clean R-module. A chain complex L is level if and
only if L is exact and each Zn L is a level R-module.
Recall that the character module of M is defined as M + = HomZ (M, Q/Z), and
that M + is a right (resp. left) R-module whenever M is a left (resp. right) Rmodule. The construction extends to chain complexes: Given a chain complex X,
we have X + = HomZ (X, Q/Z). Since Q/Z is an injective cogenerator for the category of abelian groups, the functor HomZ (โ, Q/Z) preserves and reflects exactness.
6
JAMES GILLESPIE
So Proposition 2.3 immediately gives us the following corollary due to the perfect character module duality between absolutely clean and level modules [BGH13,
Theorem 2.10].
Corollary 2.4. A chain complex L of left (resp. right) modules is level if and only
if L+ = HomZ (L, Q/Z) is an absolutely clean complex of right (resp. left) modules.
And, a chain complex A of left (resp. right) modules is absolutely clean if and only
if A+ = HomZ (A, Q/Z) is a level complex of right (resp. left) modules.
2.5. Cotorsion pairs. Let A be an abelian category. By definition, a pair of
classes (X , Y) in A is called a cotorsion pair if Y = X โฅ and X = โฅ Y. Here, given
a class of objects C in A, the right orthogonal C โฅ is defined to be the class of all
objects X such that Ext1A (C, X) = 0 for all C โ C. Similarly, we define the left
orthogonal โฅ C. We call the cotorsion pair hereditary if ExtiA (X, Y ) = 0 for all
X โ X , Y โ Y, and i โฅ 1. The cotorsion pair is complete if it has enough injectives
and enough projectives. This means that for each A โ A there exist short exact
sequences 0 โ
โAโ
โY โ
โX โ
โ 0 and 0 โ
โ Yโฒ โ
โ Xโฒ โ
โAโ
โ 0 with X, X โฒ โ X
โฒ
and Y, Y โ Y. Standard references include [EJ00] and [GT06] and connections to
abelian model categories can be found in [Hov02] and [Gil15].
Recall that a Grothendieck category is a cocomplete abelian category with a set
of generators and such that direct limits are exact. By an injective cotorsion pair
(W, F ) in a Grothendieck category G we mean a complete cotorsion pair for which
W is thick and W โฉF is the class of injective objects. Since Grothendieck categories
have enough injectives it turns out that such a cotorsion pair is equivalent to an
injective model structure on G. By this we mean the model structure is abelian
in the sense of [Hov02] and all objects are cofibrant. The fibrant objects in this
case are exactly F and the trivial objects are exactly W. See [Gil12] for more on
injective cotorsion pairs. We also have the dual notion of projective cotorsion pairs
(C, W) which give us projective model structures on abelian categories with enough
projectives.
3. Injective cotorsion pairs and direct limits
Let (W, F ) be a cotorsion pair in R-Mod, or Ch(R), or some other Grothendieck
category. Assume that W is thick; that is, assume W satisfies the two out of three
property on short exact sequences. In this section we show that W must be closed
under direct limits. This leads to several interesting corollaries. The proof of the
proposition below is adapted from Stovicekโs [Sto14, Prop. 5.3]. After studying the
proof, the author simply realized that it can be reinterpreted to yield the following
convenient result.
Proposition 3.1. Let (W, F ) be a cotorsion pair in R-Mod with W thick. Then
W is closed under direct limits.
Proof. As a first step we show that W is closed under direct unions. It is in fact
enough to prove this for well-ordered continuous direct unions. So assume that we
have a ฮป-sequence of module monomorphisms
X0 ึโ X1 ึโ X2 ึโ ยท ยท ยท ึโ Xi ึโ Xi+1 ึโ ยท ยท ยท
with Xi โ W for each i < ฮป. Then each Xi+1 /Xi โ W by the thickness hypothesis.
Since the diagram of modules is assumed continuous we see that its colimit is the
same thing as the transfinite extension of the X0 , Xi+1 /Xi . Thus its colimit is
DING MODULES AND COMPLEXES
7
in W by Eklofโs lemma (assuming ฮป is a limit ordinal; if it is a successor ordinal
ฮป = ฮฑ + 1, then the colimit coincides with Xฮฑ โ W).
Step two: We show that W is closed under direct limits. Again, it is enough
to prove this for well-ordered continuous direct limits. (See [AR94, Section 1.6],
especially Corollary 1.7 and the Remark that follows it where well-ordered direct
limits are referred to as chains and continuous well-ordered direct limits as smooth
chains.) So we consider a ฮป-diagram
f0,1
f1,2
f2,3
fi,i+1
โ ยทยทยท
X0 โโโ X1 โโโ X2 โโโ ยท ยท ยท Xi โโโโโ Xi+1 โ
with each Xi โ W and Xฮณ = limi<ฮณ {Xi , fi,i+1 } for each limit ordinal ฮณ < ฮป. Our
โโ
job is to show that limi<ฮป Xi โ W. We will assume ฮป is a limit ordinal, for otherwise
โโ
the direct limit just equals Xฮปโ1 โ W. Following a standard way for defining direct
limits (for example, see [Sten75, Prop IV.8.4, p.100]), limi<ฮป Xi is the cokernel of
โโ
L
L
โ i<ฮป Xi where the first direct sum is
the following homomorphism:
i<j Xij โ
taken over all pairs i < j < ฮป, and Xij = Xi is just a copy of the domain of the map
fij
Xi โโโ Xj , and the map is defined on the ith coordinate by xi 7โ ei xi โ ej fij xi
where the ei denotes
L the canonical injection into the coproduct. In other words,
the direct limit is ( i<ฮป Xi )/K where K is the image of this map:
K = < ei xi โ ej fij xi | xi โ Xi and i < j < ฮป >
Note that since the maps ei and fij are linear we have that K is the set of all finite
sums of the form ei xi โ ej fij xi where the xi range through Xi and i < j ranges
through all i < j < ฮป. There is a short exact sequence
โ M
0โ
โKโ
โ
โ 0,
Xi โ
โ lim Xi โ
โโ
i<ฮป
i<ฮป
and since W is closed under direct sums and is thick, it is enough to show that
K โ W. We now show that K is a direct union (not well ordered, but still a direct
union) of modules in W. So the proof will follow from the above Step 1.
Thinking of ฮป as the set of all its smaller ordinals we define, for each finite subset
J โ ฮป with |J| > 1, the mapping
M
M
Xi โ
โ
Xi
ฯJ :
iโJ\{j}
i<ฮป
where j denotes the maximum element of the finite subset J, and the map is defined
on the ith coordinate via xi 7โ ei xi โej fij xi . One now verifies each of the following:
(1) S = {J โ ฮป | 1 < |J| < ฯ} is a directedLposet and there is a functor
D:Sโ
โ R-Mod defined on objects by J 7โ iโJ\{j} Xi , and on arrows by
taking an inclusion J โ J โฒ to the map DJJ โฒ defined on the ith coordinate
as follows: xi 7โ ei xi if j = j โฒ (that is, just a natural inclusion if J and J โฒ
have the same maximal element), but via xi 7โ ei xi โ ej fij xi if j < j โฒ .
(2) Each DJJ โฒ is a monomorphism. In fact it is a split monomorphism with
retraction map the canonical projection.
(3) Each ฯJ is also L
a split monomorphism with similar retraction. The image
of ฯJ identifies iโJ\{j} Xi with the submodule
KJ = < ei xi โ ej fij xi | xi โ Xi and i โ J\{j} > .
8
JAMES GILLESPIE
That is KJ is the set of all finite sums of elements of the form ei xi โ ej fij xi
as i ranges through J\{j} and xi ranges through Xi .
(4) The direct system of monomorphisms D : S โ
โ R-Mod is isomorphic via
the natural transformation {ฯJ } to the direct system of submodules KJ .
The direct limit limi<ฮป D identifies with the direct union of submodules
L โโ
S
KJ โ i<ฮป Xi .
JโSS
(5) K = JโS KJ .
L
Now since each iโJ\{j} Xi โ W, we conclude from (3), (4), (5) and Step 1 that
K โ W. This completes the proof.
Of course generalizations of Proposition 3.1 to categories beyond R-Mod are
possible and will be important for applications. The reader will note that the above
proof holds in any Grothendieck category, giving the following generalization.
Proposition 3.2. Let (W, F ) be a cotorsion pair in a Grothendieck category G with
W thick. Then W is closed under direct limits. In particular, the class W of trivial
objects is closed under direct limits whenever (W, F ) be an injective cotorsion pair.
Proposition 3.2 has some interesting consequences that apply to each of the injective cotorsion pairs recently appearing in [BGH13, Gil12]. For example, it is
shown in [BGH13] that for any ring R we have an injective cotorsion pair (W, GI)
in R-Mod where GI is the class of Gorenstein AC-injective modules. The next
corollary says that all modules of finite flat dimension are sent to zero in the corresponding stable homotopy category. Consequently, any Gorenstein AC-injective
module is cotorsion and must be injective if it has finite flat dimension.
Corollary 3.3. Let (W, F ) be an injective cotorsion pair in R-Mod or Ch(R).
Then W contains all objects of finite flat dimension. Consequently, any fibrant
object is cotorsion and must be injective whenever it is of finite flat dimension.
Proof. Certainly W contains all projectives and hence all flat objects since these are
precisely direct limits of projectives. Since W is thick and contains the flat objects
it also contains all objects of finite flat dimension. The final statement follows since
W โฉ F coincides with the class of injective objects.
Recall that a chain complex is flat if it is exact and each cycle module is a flat
R-module. These complexes are categorically flat in Ch(R); they are direct limits
of finitely generated projective complexes [GR99, Theorem 4.1.3]. A complex X
is called DG-flat if each Xn is flat and E โ X is exact whenever E is an exact
chain complex of (right) R-modules. E โ X is the usual tensor product of chain
complexes recalled in Section 2.1. Again, the book [GR99] is a standard reference
for DG-flat complexes.
Corollary 3.4. Let (W, F ) be an injective cotorsion pair in Ch(R). Then each of
the following hold:
(1) Any exact complex Y โ F has all cotorsion cycle modules. That is, each
Zn Y , and hence each Yn , is a cotorsion module.
(2) If every complex in F is exact, then each DG-flat complex is in W.
Here we will use the notation from [Gil04] where dg Ce denotes the class of all
complexes C with each Cn cotorsion and with the property that all chain maps
F โ
โ C are null homotopic whenever F is a flat chain complex. It turns out that
DING MODULES AND COMPLEXES
9
dg Ce is precisely the right Ext orthogonal to the class of flat complexes. That is,
dg Ce is really the class of cotorsion objects in the category of complexes.
e
Proof. For (1), we have that Y is cotorsion by Corollary 3.3. That is, Y โ dg C.
The result now follows from [Gil04, Theorem 3.12] which tells us that the exact
complexes in dg Ce are precisely the ones with cotorsion cycle modules.
For (2), in the case that every complex Y โ F is exact we have
Ext1Ch(R) (S n (P ), Y ) โผ
= Ext1R (P, Zn Y ) = 0
for each projective module P . So S n (P ) โ W for each projective P , and hence
S n (F ) โ W for each flat module F . But it follows from [Gil07, Prop. 3.8] that each
DG-flat complex is a retract of a transfinite extension of complexes of the form
S n (F ) with F flat. Applying the well known Eklofโs lemma, we conclude that all
DG-flat complexes are in W, proving (2).
Going back to the Gorenstein AC-injective modules appearing before Corollary 3.3, we get the following corollary.
Corollary 3.5. Any chain complex X of Gorenstein AC-injective modules is in
e Consequently, any exact complex of Gorenstein AC-injectives must have codg C.
torsion cycle modules.
Proof. We refer to [Gil12, Proposition 7.2]. It shows that there is an injective
cotorsion pair in Ch(R) whose right side consists of the class of all complexes of
Gorenstein AC-injective modules. The rest follows from what we already observed
above.
Note that Corollary 3.5 implies Stovicekโs original result that any exact complex of injectives must have cotorsion cycle modules. However, the reader familiar
with [Sto14] will realize that our methods are just a generalization of those employed by Stovicek. These methods however donโt dualize. So the following result
is quite interesting. It is the dual of Stovicekโs result, assuming R is a coherent
ring.
Theorem 3.6. Let R be a coherent ring and P an exact complex of projectives.
Then Ext1R (Zn P, A) = 0 for any absolutely pure module A. Consequently, any cycle
Zn P must be a retract of a transfinite extension of finitely presented modules.
Proof. Since P is exact, we have Ext1R (Zn P, A) = Ext1Ch(R) (P, S 0 (A)), and so we
can instead show that Ext1Ch(R) (P, S 0 (A)) = 0 for all absolutely pure A. But it
is enough to show Hom(P, S 0 (A)) = HomR (P, A) is exact whenever P is an exact
complex of projectives and A is absolutely pure. Let D denote the class of all
absolutely pure R-modules, and C denote the class of all flat (right) R-modules.
Since R is coherent we have that (C, D) forms a perfect duality pair with respect
to the character modules of Section 2.4. Therefore, by [BGH13, Theorem A.6],
HomR (P, A) is exact for all absolutely pure A if and only if F โR P is exact for all
flat F . But certainly this is true.
The last statement holds since the โsetโ S, of all finitely presented modules,
cogenerates the complete cotorsion pair (โฅ (S โฅ ), S โฅ ) and S โฅ is precisely the class
of all absolutely pure modules.
10
JAMES GILLESPIE
Remark. Suppose R is any ring in which all level modules have finite flat dimension. Then the above argument will extend to show Ext1R (Zn P, A) = 0 for all
absolutely clean modules A and exact complexes of projectives P .
4. Applications to Ding injective modules and complexes
This section is devoted to studying Ding injective modules and chain complexes
over Ding-Chen rings. As in [Gil10], a Ding-Chen ring is a (left and right) coherent
ring with R R and RR each of finite FP-injective (absolutely pure) dimension. We
refer to [Gil10] for more on Ding-Chen rings and Ding injective modules although
the definitions below should suffice for our purposes.
Definition 4.1. We call an R-module M Ding injective if there exists an exact
complex of injectives
ยท ยท ยท โ I1 โ I0 โ I 0 โ I 1 โ ยท ยท ยท
with M = ker (I 0 โ I 1 ) and which remains exact after applying HomR (A, โ) for
any absolutely pure module A.
In the same way, we call a chain complex X Ding injective if there exists an
exact complex of injective complexes
ยท ยท ยท โ I1 โ I0 โ I 0 โ I 1 โ ยท ยท ยท
with X = ker (I 0 โ I 1 ) and which remains exact after applying HomCh(R) (A, โ)
for any absolutely pure chain complex A. Recall that a chain complex I is injective
(resp. absolutely pure) in Ch(R) if and only if it is exact and each cycle Zn I is an
injective (resp. absolutely pure) module.
The content of Corollaries 4.3 and 4.4 is that the Hom condition in the above
definitions come automatically when R is a Ding-Chen ring. In fact, for the module
case, we have the following stronger statement.
Theorem 4.2. Let R be a Ding-Chen ring. Then M is Ding injective if and only
if M = Z0 I for some exact complex I of Ding injective R-modules. That is, any
exact complex of Ding injectives automatically has Ding injective cycles.
Proof. Since R is Ding-Chen, the modules of finite flat dimension coincide with
the modules of finite absolutely pure dimension [DC93]. Denote this class by W.
We have that (W, DI) is an injective cotorsion pair, where DI is the class of
all Ding injective modules; see [DM07, Theorem 3.4] and [Gil10, Corollary 4.5].
f exDI)
f
By [Gil12, Prop. 7.2] it lifts to another injective cotorsion pair (โฅ exDI,
f is the class of all exact complexes of Ding injectives. By
on Ch(R), where exDI
f for each flat module F and hence
Corollary 3.4 (2) we have that S n (F ) โ โฅ exDI
f we have
for each F of finite flat dimension. Thus for all W โ W and I โ exDI
1
1
n
0 = Ext (S (W ), I) = ExtR (W, Zn I). Hence each Zn I must be Ding injective.
Since injective modules are Ding injective we deduce the following corollary.
Corollary 4.3. [Sto14, Prop. 7.9] Let R be a Ding-Chen ring. Then M is Ding
injective if and only if M = Z0 I for some exact complex I of injective R-modules.
Therefore, for any absolutely pure A, any exact complex I of injectives will remain
exact after applying HomR (A, โ).
DING MODULES AND COMPLEXES
11
It was shown by Yang, Liu, and Liang in [YLL13] that the Ding injective complexes are precisely the complexes X for which each Xn is Ding injective and all
chain maps A โ
โ X are null homotopic whenever A is an absolutely pure (FPinjective) chain complex. We now show that the null homotopy condition is automatic when R is a Ding-Chen ring.
Corollary 4.4. Let R be a Ding-Chen ring. Then a complex X is Ding injective
if and only if each Xn is a Ding injective R-module.
Proof. The โonly ifโ part is easy from the definition of Ding injective. For the
converse, we use that for any coherent ring R, the Ding injective cotorsion pair
f dwDI)
f on Ch(R),
(W, DI) on R-Mod lifts to an injective model structure (โฅ dwDI,
f
by [Gil12, Proposition 7.2]. Here, dwDI is the class of all complexes of Ding
injective modules. From Corollary 3.3 we have that each complex of finite flat
f But in the case that R is Ding-Chen, it is easy to see that
dimension is in โฅ dwDI.
any absolutely pure complex A has finite flat dimension. Indeed such an A is an
exact complex with each cycle module Zn A absolutely pure. Thus each Zn A has
finite flat dimension. Now taking a flat resolution of A, the upper bound on the
f
flat dimensions implies that A itself has finite flat dimension. Hence A โ โฅ dwDI
for each absolutely pure A. It follows that Hom(A, X) is exact for any absolutely
f whenever R is Ding-Chen.
pure A and any complex X โ dwDI,
Remark. It was shown by Yang, Liu, and Liang in [YLL13] that the class of Ding
f whenever R is Ding-Chen. So we now have
injective complexes is precisely dg DI
f
f
f = DI,
f whenever R is a Ding-Chen ring.
shown that both dg DI = dwDI and exDI
(Again, we are using the notation from [Gil04].)
5. Complexes of projective complexes
Our main purpose here is to prove Theorem 5.9, which will be our tool in Section 6 for characterizing Ding projective complexes. We get this by generalizing
results in [BGH13, Appendix A], from modules to chain complexes.
Since Ch(R) is itself an abelian category we can of course consider Ch(Ch(R)),
the category of chain complexes of chain complexes. Using [Wei94, Sign Trick 1.2.5],
the category Ch(Ch(R)) can be identified with the category of bicomplexes. However, for our purpose here it is somewhat easier to stick with the category Ch(Ch(R)).
5.1. Free chain complexes. A free R-module is one that is isomorphic to a direct
sum of copies of R. Analogously, we say a chain complex F โ Ch(R) is free if it
is isomorphic to a direct sum โiโI Dni (R) where each ni is some integer. Clearly
this is equivalent to saying F is isomorphic to โnโZ Dn (Fn ) where each Fn is some
free R-module. It is also equivalent to define F to be an exact complex with each
Zn F a free R-module. However, it will be sufficient and most convenient for us to
use the representations โiโI Dni (R).
Evidently free complexes are closed under arbitrary direct sums. It is also easy to
check that free complexes are projective objects in Ch(R), and that each projective
complex P is a retract of a free complex.
Lemma 5.1 (Eilenbergโs swindle). Given any projective chain complex P , there
exists a free chain complex F such that P โ F โผ
= F.
12
JAMES GILLESPIE
Proof. We follow [Lam99, Corollary 2.7]. Since P is projective, as noted above we
can find another (projective) complex Q such that P โ Q is a free complex. Setting
F = (P โ Q) โ (P โ Q) โ (P โ Q) โ ยท ยท ยท
will produce a free complex as desired. Indeed
โผ P โ (Q โ P ) โ (Q โ P ) โ (Q โ P ) ยท ยท ยท โผ
F =
= P โ F.
We now need to study chain complexes of projective chain complexes. That is,
objects of Ch(Ch(R)) with each component a projective complex.
Lemma 5.2. Let R be any ring, and P โ Ch(Ch(R)) a complex of projective chain
complexes. Then P is a direct summand of a complex F of free chain complexes.
Furthermore, if P is exact then F can be taken to be exact.
Proof. By Lemma 5.1 we may, for each Pn , find a free chain complex F n such that
Pn โ F n โผ
= F n . We form F = P โ (โnโZ Dn (F n )). This is a complex of complexes
which in degree n is the chain complex Pn โ F n โ F n+1 โผ
= F n โ F n+1 , and so a free
chain complex. We are done since P is a direct summand of P โ (โnโZ Dn (F n )).
Moreover, P โ (โnโZ Dn (F n )) is exact whenever P is exact.
Theorem 5.3. Let R be any ring, and let S be the set of all bounded above
complexes of finitely generated free complexes. The cotorsion pair (โฅ (S โฅ ), S โฅ ) in
Ch(Ch(R)), cogenerated by S, is functorially complete. Moreover, C = โฅ (S โฅ ) is
the class of all complexes of projective complexes.
Proof. Since Ch(Ch(R)) is a Grothendieck category with enough projectives it follows from [Hov02, Corollary 6.8] that S cogenerates a functorially complete cotorsion pair (โฅ (S โฅ ), S โฅ ) in Ch(Ch(R)). Setting C = โฅ (S โฅ ), our aim is to show
that this is precisely the class of all complexes of projective complexes. We note
that S contains a set of projective generators for Ch(Ch(R)); for example, the set
{Dn (Dm (R))}n,mโZ . So it follows from [Hov02, Corollary 6.9/Proof of 6.5] that
โฅ
(S โฅ ) is precisely the class of all direct summands of transfinite extensions of objects in S. By Lemma 5.2 we only need to show that a complex of free complexes is
a transfinite extension of bounded above complexes of finitely generated free complexes. So let F be a complex of free complexes and write each Fn = โiโIn Dni (Ri )
for some indexing set In with each Ri = R. We assume that F is not (isomorphic
to) a complex in S, so we can certainly find a nonzero Fn , and we then take just one
summand Dnj (Rj ) for some j โ In . We start to build a bounded above subcomplex X โ F by setting Xn = Dnj (Rj ) and setting Xi = 0 for all i > n. Now note
d(Dnj (Rj )) โ โiโInโ1 Dni (Ri ) and that we can find a finite subset Lnโ1 โ Inโ1
such that d(Dnj (Rj )) โ โiโLnโ1 Dni (Ri ). We set Xnโ1 = โiโLnโ1 Dni (Ri ). We
can continue down in the same way finding Lnโ2 โ Inโ2 with |Lnโ2 | finite and
with d(โiโLnโ1 Dni (Ri )) โ โiโLnโ2 Dni (Ri ). In this way we can construct the
subcomplex
โ ยทยทยท
โ โiโLnโ2 Dni (Ri ) โ
โ โiโLnโ1 Dni (Ri ) โ
X = ยทยทยท โ
โ0โ
โ Dnj (Rj ) โ
Note that X is a nonzero bounded above complex of finitely generated free complexes. That is, X โ S.
We set X0 = X. To finish the proof we will argue that we can write F as the union
of a continuous chain 0 6= X0 ( X1 ( ยท ยท ยท ( Xฮฑ ( Xฮฑ+1 ( ยท ยท ยท with each Xฮฑ+1 /Xฮฑ โ
DING MODULES AND COMPLEXES
13
S. So we consider F/X0 , and in the same way as above we find a bounded above
subcomplex X1 /X0 โ F/X0 consisting of finitely generated free complexes in each
degree. However, we are careful to construct X1 as follows: Let L0n denote the
indexing sets of the previously constructed complex X0n = โiโL0n Dni (Ri ). Note
that we can identify the quotient F/X0 with a complex whose degree n entry is
โiโIn โL0n Dni (Ri ). And so we may take X1 so that X1n = โiโL1n Dni (Ri ) with each
L1n finite and L0n โ L1n โ In for each n. Continuing this process, we continue
to construct an increasing union 0 6= X0 ( X1 ( X2 ( ยท ยท ยท corresponding to a
nested union of subsets L0n โ L1n โ L2n โ ยท ยท ยท for each n. Assuming this process
doesnโt terminate we set Xฯ = โชฮฑ<ฯ Xฮฑ and note that Xฯ
Dni (Ri ) where
n = โiโLฯ
n
ฯ
ฮฑ
ฯ
ฯ
Ln = โชฮฑ<ฯ Ln . Of course X and F/X are complexes of free complexes and
continuing this process we can obtain an ordinal ฮป and a continuous chain 0 6=
X0 ( X1 ( ยท ยท ยท ( Xฮฑ ( Xฮฑ+1 ( ยท ยท ยท with F = โชฮฑ<ฮป Xฮฑ and X0 , Xฮฑ+1 /Xฮฑ โ S.
5.2. Pure exact complexes of complexes. Let E : 0 โ
โX โ
โY โ
โZโ
โ 0 be a
short exact sequence in Ch(R). We say that E is pure if for each finitely presented
complex F , the sequence of abelian groups HomCh(R) (F, E), that is
0โ
โ HomCh(R) (F, X) โ
โ HomCh(R) (F, Y ) โ
โ HomCh(R) (F, Z) โ
โ 0,
is also exact. Pure exact sequences of complexes can be characterized in terms of
the functors Hom and โ from Section 2.2. In particular, E is pure exact if and
only if Hom(F, E) is a short exact sequence of complexes for each finitely presented
complex F if and only if F โE is a short exact sequence of complexes for each
finitely presented complex F (or just any complex F ). See [GR99, Theorem 5.1.3].
This leads us to the following notion of a pure exact complex of complexes.
Definition 5.4. Let X โ Ch(Ch(R)). We say that X is a pure exact complex
of complexes if the following equivalent conditions are satisfied:
(1) HomCh(R) (F, X) = Hom(S 0 (F ), X) is an exact complex of abelian groups
for each finitely presented chain complex F .
(2) Hom(F, X) is an exact complex (of complexes of abelian groups) for each
finitely presented chain complex F .
(3) F โX is an exact complex (of complexes of abelian groups) for each finitely
presented chain complex F .
(4) F โX is an exact complex (of complexes of abelian groups) for each chain
complex F .
Lemma 5.5. Suppose X is a bounded complex of finitely presented complexes and
Y is a pure exact complex of complexes. Then every chain map f : X โ
โ Y is chain
homotopic to 0.
Proof. Note that it is equivalent to show Hom(X, Y) is exact, where Hom is the
usual hom-complex of Section 2.1 (but applied to the case of A = Ch(R) instead
of the more typical application of A = R-Mod).
Let m be the largest degree i for which Xi is nonzero, and let A be the subcomplex
of X with Ai = Xi for i < m and Am = 0. We have a degreewise split short exact
sequence
0โ
โAโ
โXโ
โ S m (Xm ) โ
โ0
which for the given Y induces the short exact sequence
0โ
โ Hom(S m (Xm ), Y) โ
โ Hom(X, Y) โ
โ Hom(A, Y) โ
โ 0.
14
JAMES GILLESPIE
Now Hom(S m (Xm ), Y) is exact by condition (1) of Definition 5.4. The long exact
sequence in homology now gives us the result by induction on m.
Let (C, W) denote the cotorsion pair of Theorem 5.3. The result below tells us
that pure exact complexes of complexes are in W.
Theorem 5.6. Let R be any ring and let C be a complex of projective complexes.
If Y is a pure exact complex of complexes, then Hom(C, Y) is exact, or, equivalently
Y โ W = C โฅ.
Proof. In view of Theorem 5.3, it suffices to assume that C is a bounded above complex of finitely generated free complexes and to show that any chain map f : C โ
โY
is chain homotopic to 0. We construct a chain homotopy Dn : Cn โ
โ Yn+1 with
dDn + Dnโ1 d = fn by downwards induction on n. Since C is bounded above, we
can take Dn = 0 for large n to begin the induction. So we suppose that Di has
been defined for i โฅ n and that dDn+1 + Dn d = fn+1 .
e n still having dDn+1 + D
e n d = fn+1 ,
The idea is to replace Dn with a new map D
e
and to also find a map Dnโ1 such that dDn + Dnโ1 d = fn . First note that
(fn โ dDn )d = d(fn+1 โ Dn d) = d2 Dn+1 = 0,
ฯ
โ
so there is an induced map gn : Cn /Bn C โ
โ Yn , such that the composite Cn โ
gn
Cn /Bn C โโ Yn equals fn โ dDn . Now consider the bounded complex X of finitely
presented complexes with Xn = Cn /Bn C, Xnโ1 = Cnโ1 , Xnโ2 = Cnโ1 /Bnโ1 C,
and Xi = 0 for all other i. There is a chain map g : X โ
โ Y that is gn in degree
n, fnโ1 in degree n โ 1, and fnโ2 dยฏ in degree n โ 2. By Lemma 5.5, this chain
โ Yn+1
map must be chain homotopic to 0. This gives us maps Dnโฒ : Cn /Bn C โ
and Dnโ1 : Cnโ1 โ
โ Yn such that dDnโฒ + Dnโ1 dยฏ = gn . Upon composing with
ฯ
en =
Cn โ
โ Cn /Bn C this becomes dDnโฒ ฯ + Dnโ1 d = fn โ dDn . Now setting D
โฒ
e
Dn +Dn ฯ, we still have the required relation dDn+1 + Dn d = fn+1 because dDn+1 +
(Dn + Dnโฒ ฯ)d = dDn+1 + Dn d + 0 = fn+1 . Moreover, we have the other promised
e n + Dnโ1 d = fn . Indeed dD
e n + Dnโ1 d = d(Dn + Dโฒ ฯ) + Dnโ1 d =
relation: dD
n
โฒ
dDn + (dDn ฯ + Dnโ1 d) = dDn + (fn โ dDn ) = fn .
Recall that for a complex X we have its character dual X + = HomZ (X, Q/Z).
See Section 2.4.
Lemma 5.7. Let C be a complex of complexes, and X a complex of right R-modules.
Then XโC is exact if and only if Hom(C, X + ) is exact.
Proof. XโC is exact if and only if (XโC)+ is exact. But also using parts (1) and
(6) b) of [GR99, Proposition 4.2.1] we get
(XโC)+ = HomZ (XโC, Q/Z) = Hom(XโC, D1 (Q/Z))
โผ
= Hom(C, X + ).
= Hom(C, Hom(X, D1 (Q/Z))) โผ
We need just one more lemma before proving the main theorem.
Lemma 5.8. Let Y โ Ch(R) be a complex, and C โ Ch(Ch(R)) be a complex of
complexes . Then Hom(C, Y ) is exact if and only if Hom(C, S n (Y )) is exact for
each n.
DING MODULES AND COMPLEXES
15
Proof. Pondering definitions, we see Hom(C, Y ) is the cochain complex, of complexes of abelian groups, whose degree zero entry is the complex of abelian groups
ยทยทยท โ
โ HomCh(R) (ฮฃnโ1 C0 , Y ) โ
โ HomCh(R) (ฮฃn C0 , Y ) โ
โ ยทยทยท
(where HomCh(R) (ฮฃn C0 , Y ) is the degree n component of this complex). So to say
that the overall complex is exact means that the cochain complex of abelian groups,
HomCh(R) (ฮฃn C, Y ), is exact for each n.
On the other hand, by again following definitions, Hom(C, S n (Y )) is isomorphic
to the cochain complex, HomCh(R) (ฮฃโn C, Y ), of abelian groups. So exactness of
Hom(C, S n (Y )) for all n is equivalent to exactness of Hom(C, Y ).
Now if C is a collection of chain complexes of right R-modules, and D is a
collection of chain complexes of left R-modules, we say that (C, D) is a duality
pair if X โ C if and only if X + โ D, and Y โ D if and only if Y + โ C. It is
immediate from Corollary 2.4 that the absolutely clean and level complexes give
rise to two duality pairs. One where C is the class of all absolutely clean complexes
of right R-modules, and another where C is the class of all level complexes of right
R-modules.
Theorem 5.9. Suppose (C, D) is a duality pair in Ch(R) such that D is closed
under pure quotients. Let C be a complex of projective complexes. Then XโC is
exact for all X โ C if and only if Hom(C, Y ) is exact for all Y โ D. In particular,
(1) AโC is exact for all absolutely clean complexes A if and only if Hom(C, L)
is exact for all level complexes L.
(2) LโC is exact for all level complexes L if and only if Hom(C, A) is exact
for all absolutely clean complexes A.
Proof. In view of Lemma 5.7, if Hom(C, Y ) is exact for all Y โ D, then XโC is
exact for all X โ C. Conversely, suppose XโC is exact for all X โ C. Then if
Y โ D, Y + โC is exact, and so Lemma 5.7 tells us that Hom(C, Y ++ ) is exact. We
conclude that Hom(C, D) is exact for all D โ D++ , and we note that D++ โ D
since (C, D) is a duality pair.
Now, for any complex Y , the natural map Y โ
โ Y ++ is a pure monomorphism of
complexes [GR99, Proposition 5.1.4.(4)]. So if Y โ D, the quotient Y ++ /Y is also
in D since D is closed under pure quotients. We can therefore create a resolution
of Y โ D by elements of D++ . That is, we can find a pure exact resolution of Y
by complexes of complexes in D++ . This gives us a short exact sequence
0โ
โ S n (Y ) โ
โDโ
โPโ
โ0
in which P is pure exact and D is a bounded above complex with entries in D++ .
Theorem 5.6 tells us that Hom(C, P) is exact. Hence Hom(C, D) โผ
= Hom(C, S n (Y )).
So by Lemma 5.8, it only remains to show that Hom(C, D) is exact whenever D is
bounded above with components in D++ .
But showing Hom(C, X) is exact for all complexes of projective complexes C, is
equivalent to showing Ext1 (C, X) = 0 for all such C. By Lemma 5.8 and the first
paragraph we conclude Ext1 (C, S n (D)) = 0 whenever D โ D++ . Now any bounded
above complex D with entries in D++ can be seen to be an inverse transfinite extension of spheres S n (D) for some D โ D++ . By the dual of the Eklof Lemma,
16
JAMES GILLESPIE
we know that Ext1 (C, โ) is closed under inverse transfinite extensions [EIJ07, Theorem 1.6]. So Ext1 (C, D) = 0, whence Hom(C, D) is exact for all complexes of
projective complexes C. This completes the proof.
As noted above, the absolutely clean complexes and level complexes give rise to
two duality pairs. Moreover, each class is closed under pure quotients by [BG15,
Propositions 2.7/4.7].
6. Applications to Ding projective modules and complexes
We now wish to prove the duals to Corollaries 4.3 and 4.4. They are Theorem 6.2
and Corollary 6.3 below.
Definition 6.1. We call an R-module M Ding projective if there exists an exact
complex of projectives
ยท ยท ยท โ P1 โ P0 โ P 0 โ P 1 โ ยท ยท ยท
with M = ker (P 0 โ P 1 ) and which remains exact after applying HomR (โ, F ) for
any flat module F .
In the same way, we call a chain complex X Ding projective if there exists an
exact complex of projective complexes
ยท ยท ยท โ P1 โ P0 โ P 0 โ P 1 โ ยท ยท ยท
with X = ker (P 0 โ P 1 ) and which remains exact after applying HomCh(R) (โ, F )
for any flat chain complex F . Recall that a chain complex P is projective (resp.
flat) in Ch(R) if and only if it is exact and each cycle Zn P is a projective (resp.
flat) module.
Theorem 6.2. Let R be a Ding-Chen ring. Then a module M is Ding projective
if and only if M = Z0 P for some exact complex P of projective R-modules. In the
same way, a chain complex X is Ding projective if and only if X = Z0 P for some
exact complex P of projective complexes.
Proof. First, we look at the R-module case. Let P be any exact complex of projectives. We need to show that HomR (P, F ) remains exact for any flat (left) module
F . But by [BGH13, Theorem 6.7], and since R is coherent, it is enough to show
A โR P is exact for all absolutely pure (right) modules A. Note that clearly F โR P
is exact for any flat (right) module F . It follows that M โR P is exact for all M of
finite flat dimension. But since R is a Ding-Chen ring, any absolutely pure module
A does have finite flat dimension. So we are done. We note that a similar but
alternate proof could be given, using Theorem 3.6 instead.
Next, we see that the proof holds for chain complexes due to the work of Section 5.
So now let P be any exact complex of projective complexes. We need to show that
HomCh(R) (P, F ) remains exact for any flat (left) chain complex F . However, looking
at the definition of Hom it is clear that this is equivalent to the statement that
Hom(P, F ) remains exact for any flat complex F . Now by Theorem 5.9, and since
R is coherent, this is equivalent to the statement that AโP is exact for all absolutely
pure (right) complexes A. We note that F โP is exact for any flat (right) complex
F by [GR99, Proposition 5.1.2]. It follows that XโP is exact for all complexes X of
finite flat dimension. But since R is a Ding-Chen ring, any absolutely pure complex
A is an exact complex with an upper bound on the flat dimensions of the Zn A. It
follows that A itself is a complex of finite flat dimension. So we are done.
DING MODULES AND COMPLEXES
17
Corollary 6.3. Let R be a Ding-Chen ring. Then a complex X is Ding projective
if and only if each Xn is a Ding projective R-module.
Proof. The โonly ifโ part is easy to show. For the converse, Theorem 6.2 assures
us that we only need to show X equals the zero cycles of some exact complex
d2
d3
P2 โโ
of projective complexes. Certainly we can find an exact complex ยท ยท ยท โโ
d1
วซ
โX โ
โ 0 with each Pi a projective complex. So it is left to extend this
P1 โโ P0 โ
complex to the right. First note that there is an obvious (degreewise split) short
exact sequence
(1,d) M n+1
โd+1
0 โ X โโโโ
D
(Xn ) โโโโโ ฮฃX โ 0.
nโZ
Now each Xn is Ding projective. So we certainly can find a short exact sequence
ฮฒn
ฮฑn
Qn โโโ Yn โ 0 where Qn is projective and Yn is also Ding projective.
0 โ Xn โโโ
This gives us another short exact sequence
L
L
n+1
n+1
M
(ฮฑn ) M n+1
(ฮฒn ) M n+1
nโZ D
nโZ D
Dn+1 (Xn ) โโโโโโโโโโโโ
D
(Qn ) โโโโโโโโโโโ
D
(Yn ).
nโZ
L
nโZ
nโZ
(Qn ) is a projective complex and we will denote it by P 0 .
Notice that nโZ D
Furthermore, let ฮท : X โ P 0 be the composite
L
n+1
(ฮฑn ) M n+1
(1,d) M n+1
nโZ D
X โโโโ
D
(Xn ) โโโโโโโโโโโโ
D
(Qn ).
n+1
nโZ
nโZ
Then ฮท is an monomorphism since it is the composite of two monomorphisms.
Moreover, setting C 0 = cok ฮท, it follows from
snake lemma that C 0 sits in the
L the n+1
0
(Yn ) โ 0. In particular, C 0
short exact sequence 0 โ ฮฃX โ
โC โ
โ nโZ D
L
n+1
0
is an extension of
nโZ D L(Yn ) and ฮฃX, and so C must be Ding projective
n+1
in each degree since both of nโZ D
(Yn ) and ฮฃX are such. Since C 0 has the
same properties as X, we may continue inductively to obtain the desired resolution
ฮท
d0
d1
d2
0โ
โXโ
โ P 0 โโ P 1 โโ P 2 โโ ยท ยท ยท
d
d
วซ
1
2
โ X โ 0 by
P0 โ
P1 โโ
Finally, we paste the resolution together with ยท ยท ยท โ
โ P2 โโ
setting d0 = ฮทวซ and we are done.
7. Ding flat modules and complexes
As pointed out in [Gil10], there is also a natural notion of a Ding flat module,
but it turns out to be equivalent to the notion of a Gorenstein flat module. We
recall the definition.
Definition 7.1. We call an R-module M Ding flat if there exists an exact complex
of flat modules
ยท ยท ยท โ F1 โ F0 โ F 0 โ F 1 โ ยท ยท ยท
with M = ker (F 0 โ F 1 ) and which remains exact after applying A โR โ for any
absolutely pure (right) R-module A.
In the same way, we call a chain complex X Ding flat if there exists an exact
complex of flat complexes
ยท ยท ยท โ F1 โ F0 โ F 0 โ F 1 โ ยท ยท ยท
18
JAMES GILLESPIE
with X = ker (F 0 โ F 1 ) and which remains exact after applying Aโโ for any
absolutely pure complex A.
Proposition 7.2. Let R be any ring. A Ding flat module is nothing more than a
Gorenstein flat module. Similarly, a chain complex X is Ding flat if and only if it
is Gorenstein flat.
A proof of the above proposition, for modules, goes back to [DM08, Lemma 2.8].
We provide a new proof which is very quick and easy.
Proof. We give the proof for complexes but the same proof works for modules.
Note that Ding flat complexes are clearly Gorenstein flat since injective complexes
are absolutely pure. Conversely, suppose that X is a Gorenstein flat complex. By
definition, this means there exists an exact complex
F = ยท ยท ยท โ F1 โ F0 โ F 0 โ F 1 โ ยท ยท ยท
of flat complexes with X = ker (F 0 โ F 1 ) which remains exact after applying I โโ
for any injective complex I. We will show that this complex does in fact remain
exact after applying Aโโ for any absolutely pure (right) chain complex A. So let
such an A be given and note that it is equivalent to show that the map of complexes
AโZn F โ
โ AโFn is a monomorphism for each n. Now let A ึโ I be an embedding
into an injective complex I and note that this must be a pure monomorphism since
A is an absolutely pure complex. For each n we have the commutative diagram:
AโZn F โโโโโ IโZn F
๏ฃฆ
๏ฃฆ
๏ฃฆ
๏ฃฆ
y
y
AโFn โโโโโ IโFn
The two horizontal arrows are monomorphisms since A ึโ I is pure. The right
vertical arrow is also a monomorphism since IโF is exact. It follows that the left
vertical arrow must also be a monomorphism.
Proposition 7.3. Let R be a Ding-Chen ring. Then a module M is Ding flat if
and only if M = Z0 F for some exact complex F of flat R-modules. In the same
way, a chain complex X is Ding flat if and only if X = Zn F for some exact complex
F of flat complexes.
Proof. The proof is easy and very similar to the last few sentences of the proof of
Theorem 6.2. Briefly, say F is an exact complex of flat complexes; we wish to show
that Aโ F is exact for any absolutely pure complex A. Certainly F โ F is exact for
any flat complex F , and, since R is a Ding-Chen ring, any absolutely pure complex
A has finite flat dimension. We argue that AโF is exact for any such A.
Corollary 7.4. Let R be a Ding-Chen ring. Then a complex X is Ding flat if and
only if each Xn is a Ding flat R-module.
Proof. Using the above proposition, the proof of Corollary 6.3 carries over. Just
replace the word projective with the word flat throughout the proof.
DING MODULES AND COMPLEXES
19
References
[AR94]
J. Adaฬmek and J. Rosickyฬ, Locally presentable and accessible categories, Number 189 in
London Mathematical Society Lecture Note Series, Cambridge University Press, 1994.
[BG15] Daniel Bravo and James Gillespie, Absolutely clean, level, and Gorenstein AC-injective
complexes, preprint; arXiv:1408.7089
[BGH13] Daniel Bravo, James Gillespie and Mark Hovey, The stable module category of a general
ring, submitted.
[DC93] N. Ding and J. Chen, The flat dimensions of injective modules, Manuscripta Math.
vol. 78, no. 2, 1993, pp. 165-177.
[DC96] N. Ding and J. Chen, Coherent rings with finite self-FP-injective dimension, Comm.
Algebra, vol. 24, no. 9, 1996, pp. 2963-2980.
[DM05] N. Ding and L. Mao, Reletive FP-projective modules, Comm. Algebra, vol. 33, no. 5,
2005, pp. 1587-1602.
[DM07] N. Ding and L. Mao, Envelopes and covers by modules of finite FP-injective and flat
dimensions, Comm. Algebra, vol. 35, no. 3, 2007, pp. 833โ849.
[DM08] N. Ding and L. Mao, Gorenstein FP-injective and Gorenstein flat modules, J. Algebra
Appl. 7 (2008), no. 4, 491โ506.
[DLM09] N. Ding and Y. Li and L. Mao, Strongly Gorenstein flat modules, J. Aust. Math. Soc.
vol. 86, no. 3, 2009, pp. 323-338.
[EGR97] E. Enochs and J.R. Garcฤฑฬa-Rozas, Tensor products of chain complexes, Math J.
Okayama Univ. 39, 1997, pp. 19โ42.
[EE05] E. Enochs, S. Estrada, and A. Iacob, Gorenstein projective and flat complexes over
noetherian rings, Mathematische Nachrichten vol. 285, no. 7, 2012, pp. 834โ851.
[EJ00] Edgar E. Enochs and Overtoun M. G. Jenda, Relative homological algebra, de
Gruyter Expositions in Mathematics, vol. 30, Walter de Gruyter & Co., Berlin, 2000.
MR 2001h:16013
[EIJ07] E. Enochs, A. Iacob, and O.M.G. Jenda, Closure under Transfinite Extensions, Illinois
Journal of Mathematics vol. 51, no. 2, 2007, pp.561โ569.
[GR99] J. R. Garcฤฑฬa-Rozas, Covers and envelopes in the category of complexes of modules, Research Notes in Mathematics no. 407, Chapman & Hall/CRC, Boca Raton, FL, 1999.
[Gil04] James Gillespie, The flat model structure on Ch(R), Trans. Amer. Math. Soc. vol. 356,
no. 8, 2004, pp. 3369โ3390.
[Gil07] James Gillespie, Kaplansky classes and derived categories, Math. Zeit. vol. 257, no. 4,
2007, pp.811โ843.
[Gil10] James Gillespie, Model structures on modules over Ding-Chen rings, Homology, Homotopy Appl. 12 (2010), no. 1, 61โ73. MR 2607410 (2011e:18027)
[Gil12] James Gillespie, Gorenstein complexes and recollements from cotorsion pairs, preprint;
arXiv 1210.0196, 2012.
[Gil15] James Gillespie, How to construct a Hovey triple from two cotorsion pairs, Fundamenta
Mathematicae, Vol. 230, no.3, 2015, pp. 281โ289.
[GT06] Ruฬdiger Goฬbel and Jan Trlifaj, Approximations and Endomorphism Algebras of Modules,
de Gruyter Expositions in Mathematics, vol. 41, Walter de Gruyter & Co., Berlin, 2006.
[Hov02] Mark Hovey, Cotorsion pairs, model category structures, and representation theory,
Mathematische Zeitschrift, vol. 241, 2002, pp.553โ592.
[Iwa79] Y. Iwanaga, On rings with finite self-injective dimension, Comm. Algebra, vol. 7, no. 4,
1979, pp. 393-414.
[Iwa80] Y. Iwanaga, On rings with finite self-injective dimension II, Tsukuba J. Math. vol. 4,
no. 1, 1980, pp. 107-113.
[Lam99] T. Y. Lam, Lectures on modules and rings, Graduate Texts in Mathematics, vol. 189,
Springer-Verlag, New York, 1999. MR MR1653294 (99i:16001)
[Sto14] Jan Sฬtฬovฤฑฬcฬek,, On purity and applications to coderived and singularity categories,
arXiv:1412.1615.
[Ste70] Bo Stenstroฬm, Coherent rings and F P -injective modules, J. London Math. Soc. (2) 2
(1970), 323โ329. MR MR0258888 (41 #3533)
[Sten75] Bo Stenstroฬm, Rings of Quotients, Die Grundlehren der mathematischen Wissenschaften
in Einzeldarstellungen Band 217, Springer-Verlag, New York 1975.
20
JAMES GILLESPIE
[Wei94] Charles A. Weibel, An Introduction to Homological Algebra, Cambridge Studies in Advanced Mathematics vol. 38, Cambridge University Press, 1994.
[YLL11] Gang Yang, Zhongkui Liu, Li Liang, Ding Projective and Ding Injective Modules, Algebra Colloquium 20 (2013), no. 04, 601โ612.
[YLL13] Gang Yang, Zhongkui Liu, and Li Liang, Model structures on categories of complexes
over Ding-Chen rings, Communications in Algebra, vol. 41, 2013, pp. 50โ69.
[YL11] Gang Yang and Zhongkui Liu, Cotorsion pairs and model structures on Ch(R), Proc.
Edinb. Math. Soc. (2) vol. 54, no. 3, 2011, pp. 783โ797.
Ramapo College of New Jersey, School of Theoretical and Applied Science, 505
Ramapo Valley Road, Mahwah, NJ 07430
E-mail address, Jim Gillespie: [email protected]
URL: http://pages.ramapo.edu/~jgillesp/
| 0math.AC
|
Beyond Highway Dimension:
Small Distance Labels Using Tree Skeletonsโ
Adrian Kosowski and Laurent Viennot
arXiv:1609.00512v2 [cs.DS] 12 Dec 2016
Inria Paris and IRIF, Universiteฬ Paris Diderot, France
Abstract
The goal of a hub-based distance labeling scheme for a network G = (V, E) is to assign a small
subset S(u) โ V to each node u โ V , in such a way that for any pair of nodes u, v, the intersection
of hub sets S(u) โฉ S(v) contains a node on the shortest uv-path.
The existence of small hub sets, and consequently efficient shortest path processing algorithms,
for road networks is an empirical observation. A theoretical explanation for this phenomenon was
proposed by Abraham et al. (SODA 2010) through a network parameter they called highway dimension, which captures the size of a hitting set for a collection of shortest paths of length at least r
intersecting a given ball of radius 2r. In this work, we revisit this explanation, introducing a more
tractable (and directly comparable) parameter based solely on the structure of shortest-path spanning
trees, which we call skeleton dimension. We show that skeleton dimension admits an intuitive definition for both directed and undirected graphs, provides a way of computing labels more efficiently
than by using highway dimension, and leads to comparable or stronger theoretical bounds on hub
set size.
Key Words: Distance Labeling, Highway Dimension, Shortest Path Tree, Skeleton Dimension
1
Introduction
The task of efficiently processing shortest path queries to a graph has been studied in a plethora of settings. One interesting observation is that for many real-world graphs of small degree in a geometric or
geographical setting, such as road networks, it is possible to design compact data structures and schemes
for efficiently answering shortest path queries. The general principle of operation of this approach consists in detecting and storing subsets of so-called transit nodes, which appear on shortest paths between
many node pairs.
In an attempt to explain the efficiency of variants of the transit node routing (TNR) algorithm [13,14],
Abraham et al. [7] introduced the concept of highway dimension h. This parameter captures the intuition
that when a map is partitioned into regions, all significantly long shortest paths out of each region can
be hit by a small number of transit node vertices. The value of h is presumed to be a small constant e.g.
for road networks. However, the definition of highway dimension relies on the notion of a hitting set of
shortest path sets within network neighborhoods, and hence, e.g., exact computation of the parameter is
known to be NP-hard even for unweighted networks [20]. This motivates us to look at other measures,
which are both more locally defined and computationally tractable, while capturing essentially the same
(or more) characteristics of the networkโs amenability to shortest path queries.
โ
Supported by Inria project GANG, ANR project DESCARTES, and NCN grant 2015/17/B/ST6/01897.
1
Looking more precisely at the TNR algorithm, one observes that it is built around the idea that for
every source node, the set of transit nodes which are the first to be encountered when going a long
way from the source, is small. This is a weaker assumption than the existence of a small hitting set
for the set of shortest paths in a given network neighborhood, since different source nodes could use
different transit nodes resulting in an overall large number of transit nodes around a given region. This
source-centered approach leads us to the definition of skeleton dimension k , to which we devote the
remainder of this paper. Informally, the skeleton dimension is the maximum, taken over all nodes u
of the graph and all radii r > 0, of the number of distinct nodes at distance r from u in the set of all
shortest paths originating at u and having length at least 3r/2.1 In transit node parlance, it states that the
paths from u that extend by r/2 at least outside the disk of radius r pass through at most k transit nodes
at the disk border. This property ensures that each shortest-path spanning tree is built around a core
skeleton with at most k branches at a given distance range while the rest of the branches are relatively
short. Bounding tree skeletons turns out to encompass a larger class of constant-degree graphs than
the shortest path cover approach used in the definition of highway dimension, while still ensuring the
existence of efficient labeling schemes.
Motivated by applications in distributed algorithms and distributed data representation, we will display the link between small skeleton dimension of a graph and efficient processing of shortest path
queries using the framework of distance labeling. Distance labeling schemes, popularized by Gavoille
et al. [21], are among the most fundamental distributed data structures for graph data. Within distance
labeling, we work with the most basic framework of transit-node based schemes, namely so-called hub
labelings, cf. [5] (this framework was first described in [18] under the name of 2-hop covers, and is also
referred to as landmark labelings [8]). In this setting, each node u โ U stores the set of its distances to
some subset S(u) โ V of other nodes of the graph. Then, the computed distance value d0 (u, v) for a
queried pair of nodes u, v โ V is returned as:
d0 (u, v) :=
min
d(u, w) + d(w, v),
wโS(u)โฉS(v)
(1)
where d denotes the shortest path distance function between a pair of nodes. The computed distance
between all pairs of nodes u and v is exact if set S(u) โฉ S(v) contains at least one node on some shortest
u โ v path. This property of the family of sets (S(u) : u โ V ) is known as shortest path cover.
The hub-based method of distance computation is in practice effective for two reasons. First of all, for
transportation-type networks it is possible to show bounds on the sizes of sets S, which follow from the
network structure. Notably, considering networks of bounded highway dimension h, Abraham et al. [7]
show that an appropriate cover of all shortest paths in the graph can be achieved using sets S of size
e
e
O(h),
where the O-notation
conceals logarithmic factors in the studied graph parameters.
Moreover, the order in which elements of sets S(u) and S(v) is browsed when performing the minimum operation is relevant, and in some schemes, the operation can be interrupted once it is certain that
the minimum has been found, before probing all elements of the set. This is the principle of numerous
heuristics for the exact shortest-path problem, such as contraction hierarchies and algorithms with arc
flags [15, 25].
1.1
Results and Organization of the Paper
In Section 2, we formally define skeleton dimension k , and show that in the so-called continuous representation of the graph, the skeleton dimension is at most highway dimension, i.e. it satisfies the bound
k โค h. In all cases, k = O(h) for graphs of bounded maximum degree. On the other hand, we show that
1
One may also define skeleton dimension with a different choice of constants, considering the set of shortest paths having
length at least ฮฑr, where ฮฑ โ (1, 2) is an absolute constant. The choice of ฮฑ = 3/2 is subsequently necessary only for
establishing relations with highway dimension.
2
skeleton dimension provides a better explanation for small hub set size in Manhattan-type networks than
highway dimension. In particular, we provide a natural example of a weighted grid with k = O(log n)
โ
and h = โฆ( n).
In Section 3, we show how to construct efficient hub labelings for networks of small skeleton dimension. The hub set sizes we obtain for a graph of weighted diameter D are bounded by O(k log D) on
average and O(k log log k log D) in the worst case (cf. Corollaries 1 and 3, respectively), as compared
to previous best bounds of O(h log h log D) for labels computable in polynomial time based on highway
dimension.
Our labeling technique, based on picking hubs through a random selection process on a subtree of
the shortest-path tree, allows each node to compute its hub set independently in almost-linear time, and
appears to be of independent interest. In particular, as an extension of our technique, we provide in
Section 4 improved bounds on label size (in general unweighted graphs) for the so-called ฮด-preserving
distance labeling problem, in which the considered distance queries are restricted to nodes at distance at
least ฮด from each other. The hub sets constructed using the hub-based method have average size O(n/ฮด).
e โn), and bounded by
Their worst-case size is also bounded by O(n/ฮด) up to some threshold ฮด = O(
O(log ฮด + (n/ฮด) log log ฮด) in general (Theorem 2). This improves upon previous ฮด-preserving schemes,
including the previously best result from [10], where hub sets of worst-case size O((n/ฮด) log ฮด) are
constructed by a more direct application of the probabilistic method to sets of randomly sampled vertices.
Finally, in Sections 5, 6, and 7 we provide some concluding remarks on the computability of the
proposed parameter of skeleton dimension, as well as its possible generalizations and applications.
1.2
Other Related Work
Distance Labelings. The distance labeling problem in undirected graphs was first investigated by
Graham and Pollak [23], who provided the first labeling scheme with labels of size O(n). The decoding
time for labels of size O(n) was subsequently improved to O(log log n) by Gavoille et al. [21] and to
O(logโ n) by Weimann and Peleg [29]. Finally, Alstrup et al. [11] present a scheme for general graphs
with decoding in O(1) time using labels of size log2 3 n + o(n) bits. This matches up to low order terms
the space of the currently best know distance oracle with O(1) time and log2 3 n2 + o(n2 ) total space in a
centralized memory model, due to Nitto and Venturini [27]. For specific classes of graphs, Gavoille et
โ
al. [21] described a O( n log n) distance labeling for planar graphs, together with โฆ(n1/3 ) lower bound
โ
for the same class of graphs. Additionally, O(log2 n) upper bound for trees and โฆ( n) lower bound for
sparse graphs were given.
Distance Labeling with Hub Sets. For a given graph G, the computational task of minimizing the
sizes of hub sets (S(u) : u โ V ) for exact distance decoding is relatively well understood. A O(log n)approximation algorithm for minimizing the average size of a hub set having the sought shortest path
cover property was presented in Cohen et al. [18], whereas a O(log n)-approximation for minimizing
the largest hub set at a node was given more recently in Babenko et al. [12]. Rather surprisingly, the
structural question of obtaining bounds on the size of such hub sets for specific graph classes, such as
graphs of bounded degree or unweighted planar graphs, is wide open.
ฮด-preserving Labeling. The notion of ฮด-preserving distance labeling, first introduced by Bollobaฬs et
al. [16], describes a labeling scheme correctly encoding every distance that is at least ฮด. [16] presents
such a ฮด-preserving scheme of size O( nฮด log2 n). This was recently improved by Alstrup et al. [10] to
a ฮด-preserving scheme of size O( nฮด log2 ฮด). Together with an observation that all distances smaller than
n
ฮด can be stored directly, this results in a labeling scheme of size O( nx log2 x), where x = loglogm+n
. For
n
sparse graphs, this is o(n).
3
Road networks. Highway dimension h guarantees the existence of distance labels of size O(h log D)
where D is the weighted diameter of the graph [7]. However, when restricting to polynomial time
algorithms, such labels can only be approximated within a log n factor using shortest path cover algorithms [7] or a log h factor with a more involved procedure based on VC-dimension [3]. In any case, this
requires an all-pair shortest path computation. For large networks, labels can be practically computed
when classical heuristics such as contraction hierarchies (CH) can be performed [4, 6, 7]. Low highway
dimension guarantees that there exists an elimination ordering for CH such that the graph produced has
bounded size [7]. However, it does not ensure running time faster than all pair shortest path computation.
Besides highway dimension, skeleton dimension is also related to the notion of reach introduced
in [24] and also used in the RE algorithm [22]. The reach of a node v on a path P is the minimum distance
to an extremity of P , and the reach of v is its maximum reach over all shortest paths P containing v.
Efficient algorithms are obtained by pruning nodes with small reach during Dijkstra search. Similarly,
we obtain the skeleton of a tree by pruning nodes whose reach (in the tree) is less than half of their
distance to the root.
1.3
Notation and Parameters
We consider a connected undirected graph G and a non-negative length function ` : E(G) โ R+ . Let n
denote the number of nodes in V (G). We let `(P ) denote the length of a path P under the given length
function. Given two nodes u and v, we assume that there is a unique shortest path Puv between them.
This common assumption can be made without loss of generality, as one can perturb the input to ensure
uniqueness. Given two nodes u and v, their distance is dG (u, v) = `(Puv ). Let D = maxu,v dG (u, v)
denote the diameter of G. For u โ V (G) and r > 0, the ball BG (u, r) of radius r centered at u is
the set of nodes v with dG (u, v) โค r. In this paper, we assume that ` is non-negative and integral. The
notions presented here easily extend to non-negative real lengths, but we use integer lengths for a cleaner
exposition of algorithms and theorems.
We also recall two structural parameters, which have application to networks in a geometric setting
or low-dimensional topological embedding: highway dimension and doubling dimension.
For r > 0, let PG (r) denote the collection of all shortest paths P with 2r < `(P ) โค r in G. For
u โ V (G), we consider the collection PG (u, r) = {P โ Pr (G) | P โฉ BG (u, r) 6= โ
} of shortest paths
around u. A hitting set for PG (u, r) is a set H of nodes such that any path in PG (u, r) contains a node
in H. In [3], the highway dimension of G is defined as the smallest h such that PG (u, r) has a hitting set
of size at most h for all u, r. (This definition is slightly less restrictive than that of [7] while allowing to
prove similar results with improved bounds.)
The notion of highway dimension is related to that of doubling dimension. Recall that a graph is
h-doubling if any ball can be covered by at most h balls of half the radius. That is, for all u, r, there
exists H with |H| โค h such that BG (u, r) โ โชvโH BG (v, 2r ). It is shown in [7] that if the geometric
realization of a graph G has highway dimension h, then G is h-doubling. Informally, the geometric
e can be seen as the โcontinuousโ graph where each edge is seen as infinitely many vertices
realization G
of degree two with infinitely small edges, such that for any uv โ E(G) and t โ [0, 1], there is a node in
e at distance t`(u, v) from u on edge uv. (The proof in [7] consists in proving that any node in BG (u, r)
G
e and holds also for the highway dimension
is at distance at most 2r from any hitting set of PGe (u, r) in G
definition of [3].)
2
A Presentation of Skeleton Dimension
We start by providing a standalone definition of skeleton dimension based on size of cuts in shortest
path trees, and then show its relation to the previously considered parameters of highway and doubling
dimension.
4
2.1
Definition of the Parameter
Tree skeleton. Given a tree T rooted at node u with length function ` : E(T ) โ R+ , we treat it as
directed from root to leaves and consider the geometric realization Te of this directed graph. We define
the reach of v โ V (Te) as Reach Te (v) := maxxโV (Te) dTe (v, x). We then define the skeleton T โ of T as
the subtree of Te induced by nodes with reach at least half their distance from the root. More precisely,
T โ is the subtree of Te induced by {v โ V (Te) | Reach Te (v) โฅ 12 dTe (u, v)}.
Width of a tree. The width of a tree T with root u is defined as the maximum number of nodes (points)
in Te at a given distance from its root. More precisely, the width of T is Width(T ) = maxr>0 | Cut r (Te)|
where Cut r (Te) is the set of nodes v โ V (Te) with dTe (u, v) = r.
Skeleton dimension. The skeleton dimension k of a graph G is defined as the maximum width of the
skeleton of a shortest path tree, that is k = maxuโV (G) Width(Tuโ ), where Tu denotes the shortest path
tree of u obtained as the union of shortest paths from u to all v โ V (G).
We remark that, under the assumption of scale-invariance of the graph, different cuts of the tree
skeleton have similar width, and the definition of the skeleton dimension is a meaningful measure of the
structure of the tree. A smoothed (integrated) variant of skeleton dimension is also discussed further on,
cf. Eq. (2).
2.2
Skeleton Dimension is at most (Geometric) Highway Dimension
e of a graph G has highway dimension hฬ, then G has skeleton
Claim 1. If the geometric realization G
dimension k โค hฬ.
Proof. Consider a node u and the skeleton Tuโ of its shortest path tree Tu . For r > 0, consider the
cut Cut r (Tuโ ). For ฮต > 0 sufficiently small, Cut r (Tuโ ) and Cut rโฮต (Tuโ ) have same size. Now, for
v โ Cut rโฮต (Tuโ ), consider a node x in Tu such that dTu (v, x) = Reach Tu (v). The shortest path Pvx
intersects BG (u, r) and has length `(Pvx ) = Reach Tu (v) โฅ r/2+ฮต > r/2. Pvw is thus in PGe (u, r). For
each node in Cut rโฮต (Tuโ ), we get a similar path in PGe (u, r). All these paths are pairwise node-disjoint
as they belong to disjoint sub-branches of Tu . Their number is thus upper-bounded by the size of any
hitting set of PGe (u, r). We then get |Cut r (Tuโ )| โค hฬ for all u, r and the skeleton dimension of G is at
most hฬ.
Note that a (discrete) graph G has highway dimension h โค hฬ, where hฬ is the highway dimension of
e In road networks it is expected that the continuous and the discrete versions
its geometric realization G.
of highway dimension coincide almost exactly, in particular due to the constant maximum degree and
bounded length of edges in these graphs. In a more general setting, one can easily show hฬ โค (โ + 1)h
where โ is the maximum degree of G, with a star being a worst-case example. (Indeed, a hitting set H
of PG (u, r) may miss some shortest path P โ PGe (u, r). Making P longer to have extremities in V (G)
transforms it into a path of PG (u, r) that is hit by H. It is thus possible to hit all PGe (u, r) by adding at
most one node per edge adjacent to a node in H.)
We remark that the extended tech-report version [2] of [7] introduces a modified notion of highway
dimension, in a way more closely related to its geometric variant, which we can denote here as hโ . For
this modified parameter, we have: k โค hโ โค hฬ โค 2hโ , where the first inequality follows from an
analysis similar to the proof of Claim 1, while the latter two are shown in [2][Section 11].
5
2.3
Low Skeleton Dimension Implies Low Doubling Dimension
It is known [7] that a graph having a geometric realization with highway dimension hฬ is at most hฬdoubling. However, the relation k โค hฬ need not be tight, and it turns out that the link between skeleton
dimension and doubling dimension holds in a slightly weaker form.
Proposition 1. If a graph G has skeleton dimension k , then G is (2 k +1)-doubling.
Proof. We show the stronger requirement that each ball of radius 19r/9 can be covered by 2 k +1 balls
of radius r. For u โ V (G), consider the shortest path tree Tu of u. For r0 > 0, consider the set Cr0 of
the edges containing a node in Cut r0 (Tuโ ) and let Ir0 = {w | vw โ Cr0 and dG (u, w) โฅ r0 } be the (at
most k ) far extremities of edges cutting distance r0 in the skeleton of Tu . Each node v at distance greater
than 23 r0 from u is descendant in Tu of a node x โ Ir0 by skeleton definition and is thus in BG (x, r) if
dG (u, v) โค r0 + r. Considering r0 = 2r/3, we obtain that any node v with r < dG (u, v) โค 35 r is at
distance at most r from a node in I2r/3 . Similarly any node v with 53 r < dG (u, v) โค 19
9 r is at distance
at most r from a node in I10r/9 . The ball BG (u, 19r/9) is thus covered by balls of radius r centered at
the at most 2 k +1 nodes in {u} โช I2r/3 โช I10r/9 .
2.4
Separating Skeleton Dimension and Highway Dimension
We now provide a family of graphs which exhibit an exponential gap between skeleton and highway
dimensions, in a setting directly inspired by Manhattan-type road networks. The idea is to consider
the usual square grid and define edge lengths, which give priority to certain transit โarteriesโ. In our
example, paths using edges whose coordinates are multiples of high powers of 2 have slightly lower
transit times.
For L > 0, let GL denote the 2L ร 2L grid with length function ` defined as follows. We identify a node with its coordinates (x, y) with 1 โค x โค 2L and 1 โค y โค 2L . We consider small
length perturbations pxy for every horizontal edge {(x, y), (x + 1, y)} and qxy for every vertical edge
{(x, y), (x, y + 1)}, and define Q = 1 + maxx,y max{pxy , qxy }. These non-negative integers will be
chosen to ensure uniqueness of shortest paths. For x = 2i x0 with 0 โค i โค L and x0 odd, we define
`((x, y), (x + 1, y)) = Q((D + 2)L โ i) โ qxy for all y where D = 2L+3 . For y = 2j y 0 with 0 โค j โค L
and y 0 odd, we define `((x, y), (x, y + 1)) = Q((D + 2)L โ j) โ pxy for all x. A possible choice for
perturbations ensuring uniqueness of shortest paths is pxy = 0 and qxy = x for all x, y as will be clear
later on.
โ
Proposition 2. For any L > 0, grid GL has highway dimension โฆ( n) and skeleton dimension
O(log n), where n = 22L is the number of nodes in GL .
Proof. We first prove that the shortest paths of GL are also shortest path of the 2L ร 2L grid UL with
unit edge lengths, that is those paths that use a minimum number of edges. Any path P with p edges has
length at most pQ(D + 2)L and at least pQ((D + 2)L โ L โ 1) โฅ pQDL. Given two nodes u and v, let
p denote the minimum number of edges of a path from u to v and let q denote the number of edges of the
shortest path Puv from u to v in GL . We then have p โค q โค p(D+2)L
โค p + 12 since p โค 2L+1 = D/4.
DL
This implies q = p. Puv is thus a shortest path of the grid UL . Note that balls must then also be almost
identical: for all u, p, we have BGL (u, pQ(D + 2)L) = BUL (u, p).
โ
โ
This implies that the highway dimension of GL is โฆ( n) since the ball of radius r = Q(D +2)L n
โ
โ
centered at (1, 1) intersects at least n horizontal shortest paths of length QDL n > r/2 at least.
We define the 2i ร 2j rectangle R at (x, y) with odd x and y as the set of nodes with coordinates
(x0 , y 0 ) such that 2i x โค x0 โค 2i (x+1) and 2j y โค y 0 โค 2j (y +1). Its border is the set of nodes for which
one inequality at least is indeed an equality. Other nodes are said to be interior. The main argument for
bounding skeleton dimension is that a shortest path from u = (x0 , y 0 ) with x0 < 2i x and y 0 < 2j y cannot
6
traverse the interior of R: a shortest path passing through an inner node of R necessarily ends inside
R. The reason is that such a path necessarily passes through the lower left corner at (2i x, 2j y). It is
then shorter to reach a border node by following the border rather than using edges inside the rectangle.
Note that two possible choices of shortest paths could be possible when going from a corner of a 2i ร 2i
rectangle to the corner diagonally opposed. However the choice of perturbing lengths by decreasing the
length of any vertical edge in position (x, y) by qxy = x ensures that the path through the rightmost side
is preferred.
j
k
r
Now consider a node u = (x, y) and a radius r with 2i QDL โค r < 2i+1 QDL. Set p = QDL
.
According to the first part of the proof, the ball BGL (u, r) is in sandwich between the balls of radius p
and p + 1 in UL : BUL (u, p) โ BGL (u, r) โ BUL (u, p + 1). We first consider the upper right quadrant
of BUL (u, p) and the border set SU R of nodes v = (x + a, y + b) with a, b โฅ 0 and a + b = p. We now
bound the number of nodes v โ SU R such that Reach Tu (v) > 2r where Tu denote the shortest path tree
of u in GL . As 2r โฅ 2iโ1 QDL, such a node v cannot be interior to a 2iโ2 ร 2iโ2 rectangle as shortest
paths interior to the rectangle have length at most (2iโ1 โ 4)Q(D + 2)L. The number of nodes in SU R
whose x coordinate is a multiple of 2iโ2 is bounded by 8 as p < 2i+1 . Similarly, the number of nodes
whose y coordinate is a multiple of 2iโ2 is also bounded by 8. Apart from these 16 nodes, we have to
consider nodes v = (x0 , y 0 ) where x0 (resp. y 0 ) is less than the smallest multiple of 2iโ2 greater than
x (resp. y). Such a node cannot be interior to a 2j ร 2iโ2 (resp. 2iโ2 ร 2j ) rectangle for j โค i โ 3.
For j = i โ 3, we obtain at most two nodes whose x coordinate is a multiple of 2j . By repeating the
argument for j = i โ 4..1, we can finally bound the number of nodes v โ SU R with reach greater than
fu
r/2 by 4(i โ 3) + 16 = 4(i + 1). Nodes in the upper right quadrant that are at distance r from u in T
โ
must be on edges outgoing from nodes in SU R and Cut r (Tu ) has thus size at most 8(i + 1) = O(log n).
By symmetry, the bound holds for other quadrants and the skeleton dimension of GL is O(log n).
We remark that there exist different lengths functions on the grid for which the skeleton dimension
โ
is also as large as ฮ( n). This is the case, for example, for a grid with unit lengths of all edges except
for edges intersecting its major diagonal, which is configured to be a fast transit artery (it suffices to set
`((x, y), (x + 1, y)) = 0.5 for all x = y).
We complement this result with experimental observation in real grid like networks such as encountered in Brooklyn. We computed the skeleton dimension of the New York travel-time graph proposed in
the 9th DIMACS challenge [1] which turns out to be k = 73. (Average skeleton tree width is 30, but a
maximum width of 73 is encountered for a skeleton tree rooted in Manhattan.) In order to estimate the
highway dimension of this graph, we have implemented a heuristic for finding a large packing of paths
near a given ball, that is a set of disjoint paths intersecting the ball and having length greater than half
radius. We could find a packing of 172 paths in Brooklyn. This proves that the highway dimension of
this graph is 172 at least (h โฅ 172). In comparison the skeleton tree of the center of the corresponding
ball has width 48, and 42 branches are cut at radius distance (see Figure 1).
3
Hub Labeling using Tree Skeletons
In this section, we assign shortest-path-intersecting hub sets to a set of (terminal) nodes V of the considered network. We will assume that the length function ` on edges is integer weighted. To emulate
the geometric realization of the graph, we subdivide edges into sufficiently short fragments by inserting
a set of additional nodes V + into the network. For convenience of subsequent analysis, we assume that
an edge vw, for v, w โ V , of integer length `(vw) is subdivided into 12`(vw) edges of length 1/12
each. After this, all edges have the same length, and we subsequently treat the graph as unweighted. All
the parameter definitions carry over directly from the geometric setting; for the sake of precision, we
formally state the assumptions on the studied setting below.
7
Figure 1: An OpenStreetMap view of Brooklyn, with a packing of 172 paths (in black) intersecting a
ball of radius 720 seconds (with white border) on the left, and the skeleton tree (in black) of the center
of the ball on the right.
We consider an unweighted graph G = (V โช V + , E), with a distinguished set of terminal nodes V
and where all nodes from V + have degree 2. We denote n := |V |. We assume that every node u โ V is
associated with a fixed (unweighted) tree Tu โ G. Throughout the section, we will denote by Pu (v, w)
the unique path between the pair of nodes v and w in tree Tu , and more concisely Pu (v) := Pu (u, v).
Where this does not lead to confusion, we will identify a path with its edge set, and we will also use
the symbol |P | to denote the length of path P , i.e., the number of edges belonging to P . We write
du (v) := |Pu (v)|. We require that the collection of trees {Tu }uโV satisfies the following property: For
any pair of nodes u, v โ V , we have Pu (v) = Pv (u). We will also assume that for all u, v, w โ V , we
have that |Pu (v, w)| is an integer multiple of 12.
We remark that if the graph G was obtained by a distance-preserving subdivision of nodes of an
edge-weighted graph on node set V under some distance metric `, then each tree Tu โ G corresponds to
the shortest path tree of node u under the original distance metric, and the assumption Pu (v) = Pv (u)
corresponds to the assumption of uniqueness of shortest paths under the original metric `.
An edge hub labeling is an assignment of a set of edges S(u) โ E to each node u โ V , such that the
following property is fulfilled: for every pair of nodes u, v โ V , there exists an edge ฮท โ S(u) โฉ S(v)
such that ฮท โ Pu (v). The set S(u) is known as the edge hub set of u. We remark that this edge-based
notion of hub sets is slightly stronger than an analogous vertex-based notion: indeed, knowing that an
edge ฮท โ Pu (v), we also conclude that both of the endpoints of edge ฮท belong to Pu (v). We choose to
work with edge hub sets rather than node hub sets in this Section for compactness of arguments.
We restate in the setting of the family of trees {Tu }uโV the notion of the skeleton Tuโ = Tu [Vuโ ] โ Tu
as the subtree of Tu induced by node set Vuโ = {v โ V (Tu ) : Reach Tu (v) โฅ 21 du (v)}. For u โ V , the
โ(r)
width Width(Tuโ ) of the skeleton Tuโ may be written as Width(Tuโ ) = maxrโN | Cut u
|, where:
Cut โ(r)
:= {v โ Vuโ : du (v) = r}.
u
Finally, we note that the skeleton dimension of graph G may be written as k = maxuโV Width(Tuโ ).
8
3.1
Construction of the Hub Sets
The edge hub sets S(u), u โ V , are obtained by the following randomized construction. Assign to
each edge e โ E a real value ฯ(e) โ [0, 1], uniformly and independently at random. We condition all
subsequent considerations on the event that all values ฯ are distinct, |ฯ(E)| = |E|, which holds with
probability 1.
For all u, v โ V , we define the central subpath Pu0 (v) โ Pu (v) as the subpath of Pu (v) consisting
of its middle du6(v) edges; formally, Pu0 (v) := Pu (u0 , v 0 ), where u0 , v 0 โ Pu (v) are nodes given by:
5
7
du (u0 ) = 12
du (v) and du (v 0 ) = 12
du (v). Next, for all u, v โ V , v 6= u, we define the hub edge
ฮทu (v) โ Pu (v) as the edge with minimum value of ฯ on the central subpath between u and v:
ฮทu (v) = arg min ฯ(e).
eโPu0 (v)
Finally, for each node u โ V , we adopt the natural definition of edge hub set S(u) as the set of all edge
hubs of node u on paths to all other nodes:
S(u) := {ฮทu (v) : v โ V, v 6= u} .
Proof of Correctness. Taking into account that for all u, v โ V , Pu (v) = Pv (u), we observe that
by symmetry of the central subpath with respect to its two endpoints, we also have Pu0 (v) = Pv0 (u). It
follows directly that ฮทu (v) = ฮทv (u). Hence, we have ฮทu (v) โ S(u) โฉ S(v), and also ฮทu (v) โ Pu (v),
which completes the proof of correctness of the edge hub labeling.
We devote the rest of this Section to bounding the size of hub sets S(u).
3.2
Bounding Average Hub Set Size
In subsequent considerations we will fix a node u โ V , and restrict considerations to the tree Tu . We
will assume that tree Tu is oriented from its root u towards its leaves, and we will call a path P โ Tu a
descending path in Tu if one of its endpoints is a descendant of the other in Tu . In particular, every path
Pu (v) is a descending path. For an edge e โ Tu , we will denote by e+ and eโ the two endpoints of e, with
eโ being the one further away from the root (du (eโ ) = du (e+ ) + 1). Likewise, for a descending path
P , we denote by P + and P โ its two extremal vertices, closest and furthest from the root u, respectively.
We also denote by du (e) := du (eโ ) the distance of edge e from the root.
In order to bound the expected size of the hub set S(u), we will observe that elements of S(u) necessarily belong to the skeleton Tuโ and satisfy certain minimality constraints with respect to descending
paths of sufficiently large length, contained entirely within the skeleton Tuโ .
Lemma 1. Let ฮท โ S(u), for some u โ V . Then, the following claims hold:
(1) ฮท โ E(Tuโ ).
(2) Reach Tuโ (ฮท โ ) โฅ 71 du (ฮท).
(3) There exists a descending path P โ Tuโ , such that ฮท = arg mineโP ฯ(e) and |P | โฅ 72 du (ฮท).
Furthermore, the following claims hold for any edge ฮท โ E satisfying Claims (1) and (3):
(4) There exists a descending path P โ Tuโ , such that ฮท = argmineโPฯ(e), ฮท is one of the two
extremal edges of P (i.e., P + = ฮท + or P โ = ฮท โ ), and |P | = 71 du (ฮท) .
โ
โ
(5) There
exists
7
a descending path Pu (x, y), for some y โ Vu and x โ Vu satisfying du (x) =
8 du (y) , such that ฮท = arg mineโPu (x,y) ฯ(e) and ฮท is one of the two extremal edges of Pu (x, y).
9
Proof. Select ฮท โ S(u) arbitrarily. Let v โ V be any node such that ฮท = ฮทu (v). We recall that for the
5
descending path Pu (u0 , v 0 ) โ Pu (v), we have ฮท = arg mineโPu (u0 ,v0 ) ฯ(e), where du (u0 ) = 12
du (v)
7
2
0
00
00
and du (v ) = 12 du (v). Let v โ Pu (v) be a node such that du (v ) = 3 du (v) (we recall that 12|du (v)
by assumption). By the definition of skeleton Tuโ , we have v 00 โ Vuโ , and clearly Pu (v 00 ) โ Tuโ . We note
that ฮท โ Pu (v 00 ) and moreover:
2
7
1
1
1
Reach Tuโ (ฮท โ ) โฅ |Pu (ฮท โ , v 00 )| โฅ |Pu (v 0 , v 00 )| = du (v) โ du (v) = du (v) = du (v 0 ) โฅ du (ฮท),
3
12
12
7
7
hence Claims (1) and (2) follow. To show Claim (3), we put P = Pu (u0 , v 0 ) and observe that ฮท =
arg mineโP ฯ(e) by definition, and:
|P | = |Pu (u0 , v 0 )| =
5
1
2
2
7
du (v) โ du (v) = du (v) = du (v 0 ) โฅ du (ฮท).
12
12
6
7
7
Next, to show Claim (4), we observe that by Claim (3), ฮท = arg mineโPu (u0 ,ฮทโ ) ฯ(e) and ฮท = arg mineโPu (ฮท+ ,v0 ) ฯ(e).
+ , v 0 )| โฅ 1+ 2 d (ฮท) โฅ 2 1 d (ฮท) ,
Moreover, since |Pu (u0, v 0 )| โฅ 27 du (ฮท), we have |Pu(u0 , ฮท โ )|+|P
(ฮท
u
u
u
7
7
and so |Pu (u0 , ฮท โ )| โฅ 71 du (ฮท) or |Pu (ฮท + , v 0 )| โฅ 17 du (ฮท) . Claim (4) thus follows for anappropriate
choice of descending path P โ |Pu (u0 , ฮท โ )| or P โ |Pu (ฮท + , v 0 )|, respectively, with |P | = 17 du (ฮท) .
Finally, to show Claim (5), we consider separately the two cases from the proof of Claim (4).
If P โ Pu (u0 , ฮท โ ), then we set y = ฮท โ , and choose x โ Pu (ฮท โ ) so that du (x) = b 87 du (ฮท โ )c. We
have du (x, y) = d 81 du (ฮท โ )e โค d 71 du (ฮท โ )e = |P |, hence Pu (x, y) โ P , ฮท = arg mineโPu (x,y) ฯ(e), and
the claim follows.
If P โ Pu (ฮท + , v 0 ), then we set x = ฮท + , and choose y โ Pu (x, v 0 ) so that du (x) = b 78 du (y)c. Such
a choice of y is always possible since, when moving with y along the path P , the value of b 78 du (y)c
increases by at most 1 in every step; moreover, for the lower end node v โ of path P we have du (v โ ) >
du (x) + 17 du (x), and so du (x) โค b 78 du (v โ )c. We again obtain ฮท = arg mineโPu (x,y) ฯ(e), and the claim
follows.
We remark that the remainder of our analysis is valid for any construction of hub sets S which
satisfies Claims (1), (2), and (3) of Lemma 1.2
To bound the average hub set size precisely, we introduce for each node u a parameter called integrated skeleton dimension kฬ (u), defined through a sum of inverse distances to u over nodes of its tree
skeleton:
X 1
X | Cut uโ(r) |
kฬ (u) :=
=
,
(2)
du (v)
r
โ
vโVu
rโN
โ(r)
where the equivalence of the two definitions follows directly from the definition of cuts, Cut u = {v โ
V โ (u) : du (v) = r}.
โ(r)
Taking into account that | Cut u | โค Width(Tuโ ), we have kฬ (u) = O(Width(Tuโ ) log D(Tuโ )), and
even more roughly, we have for all u โ V :
kฬ (u) = O(k log D),
(3)
where we recall that D = maxuโV D(Tu ).
One may, in particular consider an alternative construction of a hub set S + (u), defined as the set of all edges ฮท โ E(Tu )
which satisfy Claims (1), (2), and (3) of the Lemma. All of our bounds on hub set size also hold in the case of {S + (u)}uโV .
The definition results in larger labels in practice: we always have S(u) โ S + (u) (correctness results from this observation).
On the other hand, hub sets S + (u) may sometimes be constructed more efficiently than S(u): the definition of S(u) requires
a scan of the entire tree T (u), whereas hub set S + (u) may be constructed based only on the smaller skeleton T โ (u).
2
10
Lemma 2. The expected hub set size of a node u โ V satisfies the bound:
E|S(u)| โค 16 kฬ (u).
Proof. Fixu โ V arbitrarily.
For y โ Vuโ , we define xy as the unique node on the path Pu (y) such that
7
du (xy ) = 8 du (y) . We define random variable Qu (y) โ {0, 1} as the number of extreme edges e of
the path Pu (xy , y) (i.e., e+ = xy or eโ = y), which satisfy e = arg min ฯ(Pu (xy , y)). We have:
Pr[Qu (y) = 1] =
2
2
16
.
=
โค
7
|Pu (xy , y)|
du (y)
du (y) โ 8 du (y)
By Claim (5) of Lemma 1, it follows that by summing random variables Qu (y) exhaustively over all
vertices y we count each element ฮท โ S(u) at least once, hence:
X
|S(u)| โค
Qu (y).
yโVuโ
By linearity of expectation, it follows that:
E|S(u)| โค
X
yโVuโ
EQu (y) =
X
Pr[Qu (y) = 1] โค
yโVuโ
X
yโVuโ
16
.
du (y)
A direct application of Markovโs inequality to the bound from Lemma 2, combined with Eq. (3),
gives the following Corollary.
P
P
Corollary 1. The average hub set size satisfies n1 uโV |S(u)| = O( n1 uโV kฬ (u)) โค O(k log D),
with probability at least 1/2 w.r.t. choice of random values ฯ.
Obtaining concentration bounds on the maximal size of a hub set, maxuโV |S(u)|, requires some
more care, and we proceed with the analysis in the following subsection.
3.3
Concentration Bounds on Hub Set Size
For fixed u โ V , we consider the size of the hub set of u given by the random variable:
X
|S(u)| =
X(ฮท),
(4)
ฮทโE(Tuโ )
where X(ฮท) โ {0, 1} is the indicator variable for the event โฮท โ S(u)โ. The random variables
{X(ฮท)}ฮทโE(Tuโ ) need not, in general, be independent or negatively correlated. In the subsequent analysis, for fixed ฮท, we make use of Claim (4) of Lemma 1 to bound random variable X(ฮท). By the Claim of
the Lemma, we can decompose X(ฮท) into the contributions from descending paths located towards the
root and away from the root with respect to ฮท:
X(ฮท) โค X + (ฮท) + X โ (ฮท),
where we define:
โข X + (ฮท) โ {0, 1} is the indicator variable for the event: โfor the unique descending subpath
P โ Pu (ฮท โ ) of length |P | = 71 du (ฮท) ending in edge ฮท (i.e., P โ = ฮท โ ), it holds that
ฮท = arg min ฯ(P )โ,
โข X โ (ฮท) โ {0, 1} is theindicator variable for the event: โthere exists a descending path P โ Tuโ of
length |P | = 71 du (ฮท) starting in edge ฮท (i.e., P + = ฮท + ), such that ฮท = arg min ฯ(P )โ.
11
Moreover, by Claim (2) of Lemma 1, we may have X(ฮท) 6= 0 only for those edges ฮท for which
Reach Tuโ (ฮท โ ) โฅ 71 du (ฮท). We denote Vuโโ = {v โ Vuโ : Reach Tuโ (v) โฅ 17 du (v)} and Tuโโ = Tu [Vuโโ ].
We can now rewrite Eq. (4) as:
X
X
X โ (ฮท),
(5)
X + (ฮท) +
|S(u)| โค
ฮทโE(Tuโโ )
ฮทโE(Tuโโ )
and proceed to bound both of these sums separately. In order to be able to manipulate the sums more
conveniently, we first introduce a partition of the tree according to geometrically increasing scales of
distance.
Partition of Tuโ into lLayers. mWe consider a sequence of increasing integer radii (r[i] )iโN , given as
16 i
r[0] = 0 and r[i] = 15 15
, for i โฅ 1. The last non-empty layer corresponds to index imax <
log16/15 D < 16 ln D. Cutting the edge set of tree Tuโ at vertices located at distances {r[i] }iโN from the
root u yields the following partition into layers:
[
E(Tuโ ) =
Lโ[i] , where: Lโ[i] := {e โ E(Tuโ ) : r[i] < du (e) โค r[i+1] }.
iโN
We further denote the subset of each layer restricted to edges from Tuโโ as Lโโ[i] := Lโ[i] โฉ E(Tuโโ ),
i โ N.
Si
P [i,j] , such that
Lemma 3. For all i โฅ 1, edge set Lโโ[i] admits a partition into paths, Lโโ[i] = lj=1
โ(r)
li < 2 minrโ[r[i+1] ,r[i+2] ] | Cut u | โค 2 k , each P [i,j] is a descending path, and all internal nodes of all
paths P [i,j] have degree exactly 2 in Tuโโ .
Si
P [i,j] of the edge set of the considered layer so that each path
Proof. Define partition Lโโ[i] = lj=1
P [i,j] , 1 โค j โค li , is a maximal descending path whose internal nodes all have degree exactly 2 in Tuโโ .
Let F = Tu (Lโโ[i] ) be the oriented sub-forest of Tu induced by the edges of Lโโ[i] . Let l be the number
of leaves of F and c be the number of its connected components. An elementary relation between the
number of leaves and the number of nodes of degree more than 2 in a forest gives li โค 2l โ c <
2l. Moreover, by the definition of Tuโโ , we have that for each ฮท โ Lโโ[i] , we have Reach Tuโ (ฮท โ ) โฅ
1
โ
[i,j] , such that P [i,j]โ is a leaf of F , can be extended along
7 du (ฮท ). It follows that each of the l paths P
a descending path in Tuโ by a distance of 17 du (P [i,j]โ ) โฅ 17 r[i] โฅ r[i+2] โ r[i] โ 1. It follows that each
of the l leaves of F can be extended along a (independent) descending path until radius r[i+2] inclusive.
โ(r)
Thus, l < minrโ[r[i+1] ,r[i+2] ] | Cut u | โค k , which completes the proof.
Bounding the Sum of X + (ฮท). Denote by P [i] the set of descending paths P in Tu which stretch
precisely between the endpoints of the i-th layer: du (P + ) = r[i] , du (P โ ) = r[i+1] . For a fixed path
P [i,j] โ Lโโ[i] , i โฅ 1, we denote by Q[i,j] the unique path in P [iโ1] which extends to P [i,j] , i.e.,
Q[i,j] โ P [iโ1] and Q[i,j] โ Pu (P [i,j]+ ).
Consider now an arbitrary edge ฮท which does not belong to layers 0 or 1 of the tree partition, ฮท โ
E(Tuโโ ) \ (Lโโ[0] โช Lโโ[1] ). Taking into account the above decomposition of set Tuโโ into layers, and of
layers into paths, there exists a unique path P [i,j] , such that ฮท โ P [i,j] . Then, we observe that for the
event X + (ฮท) = 1 to hold, it is necessary that two conditions are jointly fulfilled: ฮท must satisfy the
prefix minimum condition on the path P [i,j] :
ฮท = arg
min
eโP [i,j] โฉPu (ฮท โ )
12
ฯ(e),
(6)
and moreover, we must have ฯ(ฮท) < min ฯ(Q[i,j] ). Indeed,
considering
the definition of X + (ฮท), the
unique descending subpath P โ Pu (ฮท โ ) of length |P | = 17 du (ฮท) which ends with edge ฮท has its other
endpoint in Lโ[iโ2] . We have ฮท = arg min ฯ(P ), and path P includes as subpaths both the entire prefix
P [i,j] โฉ Pu (ฮท + ), and the path Q[i,j] .
We denote by M +[i,j] โ P [i,j] the set of all edges ฮท โ P [i,j] satisfying ฯ(ฮท) < min ฯ(Q[i,j] ).
We further denote by ฮท +[i,j,k] the k-th edge in M +[i,j] , when ordering edges of M +[i,j] by increasing
distance from the root u, 1 โค k โค |M +[i,j] |. Finally, we denote by Z +[i,j,k] โ {0, 1} the indicator
random variable for the event that โedge ฮท +[i,j,k] satisfies the prefix minimum condition (6) on path
P [i,j] โ. It follows that:
|M +[i,j] |
X
X
X + (ฮท) โค
ฮทโE(Tuโโ )
X
X
i=2,3,4,...
1โคjโคli
k=1
X + (ฮท) +
ฮทโLโโ[0] โชLโโ[1]
Z +[i,j,k] ,
where we note that the ranges of sum indices i, j do not depend on the random choice of ฯ in our setting.
We further rewrite the above expression, roughly bounding the first sum by cardinality, and splitting the
second double sum according to even and odd values of i:
X
+
X (ฮท) โค
ฮทโE(Tuโโ )
19
X
|M +[i,j] |
| Cut โ(r)
|
u
r=0
X
X
i=2,4,6,...
1โคjโคli
k=1
+
|M +[i,j] |
Z
+[i,j,k]
{z
|
}
:=A+
even
X
X
i=3,5,7,...
1โคjโคli
k=1
+
|
Z +[i,j,k] .
{z
:=A+
odd
(7)
}
We subsequently consider only bounds on the summed expression A+
even for 2|i (bounds on the expression A+
follow
by
identical
arguments).
odd
We observe that for fixed i, i = 2a for some a โ N + , the random variables |M +[i,j] | depend only
on the choice of random values ฯ(e) for e โ Lโ[iโ1] . Now, conditioning on a choice ฯodd of random
values ฯ(e) for e โ Lโ[2aโ1] , for all a โ N+ , we observe that {Z +[i,j,k] }2|i,j,1โคkโค|M +[i,j] | is a set of
independent random variables, with:
Pr[Z +[i,j,k] = 1|ฯodd ] = 1/k.
The above probability and independence follows directly from a well-known characterization of the
probability that the k-th element of a uniformly random permutation (ordering) is its prefix minimum.
We have:
|M +[i,j] |
E[A+
even |ฯodd ]
=
X
X
i=2,4,6,...
1โคjโคli
k=1
1
<
k
X
(1 + lnโฆ |M +[i,j] |)
+
=: Neven
,
(8)
i=2,4,6,...
1โคjโคli
where lnโฆ x = ln x for x > 0 and lnโฆ 0 = 0. By an application of a simple Chernoff bound for the sum
of variables {Z +[i,j,k] }i,j,k , we have:
+
โc
Pr[A+
even < Neven + 3c ln n] > 1 โ n ,
for c > 1.
(9)
+
It now remains to provide bounds on the concentration of random variable Neven
in its upper tail.
If our only goal is to bound the hub set size as O(k log D log log n + log n), then obtaining such
bounds becomes a relatively straightforward exercise in Chernoff bounds over individual paths P [i,j] .
In this work, we go for a more pedestrian approach through a type of balls-into-bins process, optimizing
bounds over larger path sets, which will eventually give us slightly tighter bounds, including a bound of
O(k log D log log k ).P
i
Denote Mi+ := lj=1
|M +[i,j] |, for i โฅ 2. Then, we have the following bound.
13
L*[i+1]
L*[i]
L*[i-1]
P[i, 2]
P[i, 1]
Q[i, j={1,2,3,4,5}]
P[i, 4]
P[i, 3]
P[i, 5]
Q[i, 6]
u
P[i, 6]
Q[i, 7]
r
[i-1]
P[i, 7]
r
[i]
r [i+1]
r [i+2]
Figure 2: Illustration of paths P [i,j] and Q[i,j] . Edges from Tuโโ are marked with solid lines, remaining
edges from Tuโ are marked with dashed lines.
Lemma 4. Fix i โฅ 2. Then, for any c โฅ 1:
Pr Mi+ > 12cli < 2โc .
Si
Si
Q[i,j] (forming a subforest of Tuโ ,
P [i,j] โช lj=1
Proof. For fixed i, we consider the edge set F := lj=1
contained entirely within layers Lโ[iโ1] and Lโ[i] ). See Figure 3.3 for an illustration.
Choose arbitrarily the set I of (necessarily distinct) values of ฯ which appear within F , I = ฯ(F ).
Let I = {i1 , i2 , . . . , i|F | }, with i1 โค i2 โค . . . โค i|F | .
We couple the sampling of values ฯ on F with the following two-stage process. First, we fix set
I. Then, given a choice of I, we select a uniformly random permutation to perform the assignment of
values from I to edges in F (|I| = |F |). The latter permutation is defined iteratively, by assigning to
successive values it , 1 โค t โค |F |, an as yet unoccupied edge (site) from F . The value of |M +[i,j] |
is given as the number of elements of I which are placed in sites from P [i,j] before the smallest index
tj โ N, such that itj โ ฯ(Q[i,j] ). We will refer to the index t as representing moments of time, and we
will then say that path P [i,j] was cut off at time tj .
For successive moments of time t โ N , we denote by Jt the set of surviving path indices at time t,
0
i.e., Jt = {j
it0 โ
/S
ฯ(Q[i,j] )}. We then obtain subforest Ft โ F by restricting F to its surviving
S : โt โคt[i,j]
part, Ft = jโJt P
โช jโJt Q[i,j] .
To prove the claim, we will consider how the random variable Mi+ increases over time, until Ft = โ
.
We again couple our sampling process by first deciding in each time step whether to place it in forest
F \ Ftโ1 or in forest Ftโ1 , and only afterwards fixing for it a specific free site with uniform probability
within the chosen subforest. Observe that if it is placed F \Ftโ1 , then in the given step of the considered
process, the value of Mi+ remains unchanged at time t. We will thus eliminate from the process all time
steps t such that it โ F \ Ftโ1 , and by a slight abuse of notation, we will relabel time indices as if these
steps never occurred. Thus, in each time step t, we assume that a free site is picked for it from Ftโ1
uniformly at random.
Consider now the random variable ฯt = |Jtโ1 | โ |Jt |, representing the number of paths cut off in
time step t. The expectation of ฯt can be lower-bounded, regardless of the history of the process.
Claim (*). E[ฯt |Ftโ1 ] > 1/3, for any Ftโ1 6= โ
.
S
Proof (of Claim). Fix forest Ftโ1 . We assign to each edge e โ jโJtโ1 Q[i,j] a weight w(e) โ N+ ,
given as the
j โ Jtโ1 such that P [i,j] can be reached from e by a descending path. For all
S number of
[i,j]
edges e โ jโJtโ1 P , we put w(e) = 0. Now, if e is chosen as the t-th edge in the process, we have
14
ฯt = |Jtโ1 | โ |Jt | = w(e). It follows that:
P
P
1
|Jtโ1 |(r[i] โ r[iโ1] )
eโFtโ1 w(e)
eโFtโ1 w(e)
>
E[ฯt |Ftโ1 ] =
โฅ
โฅ
,
|Ftโ1 \ {e โ F : ฯ(e) < it }|
|Ftโ1 |
3
|Jtโ1 |(r[i+1] โ r[iโ1] )
which completes the proof of the claim.
P
Moreover, taking into that ฯt has bounded range ฯt โ [0, li ], and that tโN ฯt = li , we obtain a
concentration result on the number of steps until the stopping of the process (Ft = โ
); for completeness,
we provide a standalone proof.
Claim (**). For T = 12cli , we have: Pr[FT 6= โ
] < 2โc .
PT
0
Proof (of Claim). We define the non-negative submartingale ฮฆ0T =
t=1 ฯt as follows. When
0
0
0
Ftโ1 6= โ
, we choose ฯt โ [0, li ] to be dominated by ฯt , so that ฯt โค ฯt and E[ฯt |Ftโ1 ] = 1/3. (The
latter condition can always be satisfied by Claim (*)). When Ftโ1 = โ
, we put ฯ0t = 1/3. Observe that
when ฮฆ0T > li for some T , we necessarily have ฯ0t > ฯt for some t โค T , hence FT = โ
. To lower-bound
the probability of the event ฮฆ0T > li , we remark that the bounds ฯ0t โ [0, li ] and E[ฯ0t |Ftโ1 ] = 1/3 imply
the following bound on variance of the process: ฯ 2 [ฯ0t |Ftโ1 ] โค li /3. Now, using a standard martingale
bound (cf. e.g. [17][Thm. 18] applied to the process Xt = ฮฆ0t โ t/3), we obtain for any ฮป > 0:
โฮป2 /2
0
.
Pr[ฮฆT โค T /3 โ ฮป] โค exp
T li /3 + ฮปli /3
Substituting T = 12cli and ฮป = 3cli , we obtain:
Pr[ฮฆ0T โค cli ] โค eโ0.9c < 2โc .
Taking into account that c โฅ 1 by assumption, the claim follows directly.
Recalling that in each time step t with Ft 6= โ
, the value of random variable Mi+ increases by at most
1, we obtain directly from Claim (**) that Pr[Mi+ > 12cli ] < 2โc , which completes the proof.
Next, for 2|i, let Ci โ N+ be a random variable defined as the smallest integer such that Mi+ โค
12Ci li . Since Ci depends only on random values ฯ chosen with Lโ[iโ1] โช Lโ[i] , the random variables
{Ci }2|i are independent. Moreover, by Lemma 4, each Ci may be stochastically dominated by a (independent) geometrically distributed random variable ฮi with parameter p = 1/2. It follows that:
X
X
Ci โค
ฮi โผ NB(bimax /2c, 1/2),
2|i,
iโคimax
2|i,
iโคimax
where the parameters of the negative binomial distribution NB(r, p) represent the number of trials
with success probability p until r successes are reached. An application of a rough tail bound for
NB(bimax /2c, 1/2) gives:
๏ฃฎ
๏ฃน
X
Pr ๏ฃฐ
Ci < 2imax + 4c ln n๏ฃป > 1 โ nโc , for any c > 1.
(10)
2|i
Recalling that Mi+ =
Pli
j=1 |M
+[i,j] |
โค 12Ci li , we may write by concavity of the logarithm function:
๏ฃซ
๏ฃถ
li
li
X
X
1
(1 + lnโฆ |M +[i,j] |) โค li + li lnโฆ ๏ฃญ
|M +[i,j] |๏ฃธ โค li + li ln(12Ci ) < li ln(33Ci ).
li
j=1
j=1
15
+ , taking into account its definition (8):
We can therefore bound variable Neven
X
X
+
li ln(33Ci ).
Neven
=
(1 + ln |M +[i,j] |) โค
2|i
1โคjโคli
(11)
2|i
We now apply a union bound over the two events given by (9) and (10), which hold w.h.p., From Eq. (9),
(10), and (11), we have that for any c > 1, the following event holds w.p. at least 1 โ 2nโc :
X
+
Neven
โค 3c ln n + max
li ln(33ci ),
(12)
(ci )
2|i
iโคimax
P
where (ci )iโคimax ,2|i are positive integers satisfying the condition: 2|i ci < 2imax + 4c ln n.
+
Returning to Eq. (7), with respect to Nodd
an analogous technique gives us that w.p. at least 1โ2nโc :
X
+
Nodd
โค 3c ln n + max
(ci )
li ln(33ci ),
(13)
26=i
iโคimax
P
where (ci )iโคimax ,26| i are likewise positive integers satisfying the condition: 26| i ci < 2imax + 4c ln n.
Combining Eq. (7) with Eq. (12) and (13) through a union bound (and substituting ฮณi := 33ci ), we
eventually obtain that w.p. at least 1 โ 4nโc :
X
X + (ฮท) โค
ฮทโE(Tuโโ )
19
X
| Cut โ(r)
| + 6c ln n + max
u
(ฮณi )
r=0
X
li ln ฮณi ,
(14)
iโคimax
where (ฮณi )iโคimax satisfy the condition:
โi ฮณi โ N+
and
X
ฮณi < 132imax + 264c ln n.
(15)
Bounding the Sum of X โ (ฮท). For the random variables X โ (ฮท), the main arguments required to
establish the bound are similar to those in the case of X + (ฮท); we confine ourselves to an exposition of
the differences. The main difference is that for a path P [i,j] , instead of a unique predecessor path Q[i,j]
in layer Lโ[iโ1] , we now have to deal with multiple possible descendant paths in layer Lโ[i+1] ; on the
other hand, the outward-branching structure of the tree means that we can show tighter concentration
bounds in this case.
We recall that P [i] is the set of descending paths P in Tu which stretch precisely between the endpoints of the i-th layer, and for 1 โค j โค li , we denote by R[i,j] the set of all paths in P [i+1] which are
extensions of P [i,j] , i.e., R[i,j] โ P [i+1] and for all R โ R[i,j] , we have P [i,j] โ Pu (R+ ). For the event
X โ (ฮท) = 1 to hold, it is now necessary that two conditions are jointly fulfilled: ฮท must satisfy the suffix
minimum condition on the path P [i,j] :
ฮท = arg
min
eโP [i,j] \Pu (ฮท + )
ฯ(e),
(16)
and moreover, ฯ(ฮท) < maxRโR[i,j] min ฯ(R). We next denote by M โ[i,j] โ P [i,j] the set of all edges
ฮท โ P [i,j] satisfying ฯ(ฮท) < maxRโR[i,j] min ฯ(R). We further denote by ฮท โ[i,j,k] the k-th edge in
M โ[i,j] , when ordering edges of M โ[i,j] by decreasing distance to the root u, 1 โค k โค |M โ[i,j] |.
Finally, we denote by Z โ[i,j,k] โ {0, 1} the indicator random variable for the event that โedge ฮท โ[i,j,k]
satisfies the suffix minimum condition (16) on path P [i,j] โ.
The subsequent analysis proceeds as before, and we obtain direct analogues of Eq. (7), (8), and (9),
replacing superscripts โ+โ ofPall random variables by โโโ.
i
We next denote Miโ := lj=1
|M โ[i,j] |, for i โฅ 2, and obtain the following analogue of Lemma 4.
16
Lemma 5. Fix i โฅ 2. Then, for any c โฅ 1:
Pr Miโ > 12cli < eโ4cli < 2โc .
Proof. The proof follows along
lines as that of Lemma 4.
Sli similar
Si
[i]
[i,j]
For fixed i, let R := j=1 R . We consider the edge set F := lj=1
P [i,j] โช R[i] (forming
a subforest of Tuโ , contained entirely within layers Lโ[i] and Lโ[i+1] ). Choose arbitrarily the set I of
(necessarily distinct) values of ฯ which appear within F , I = ฯ(F ). Let I = {i1 , i2 , . . . , i|F | }, with
i1 โค i2 โค . . . โค i|F | .
As in the proof of Lemma 4, we couple the sampling of values ฯ on F with the following two-stage
process. First, we fix set I. Then, given a choice of I, we select a uniformly random permutation to
perform the assignment of values from I to edges in F (|I| = |F |). The latter permutation is defined
iteratively, by assigning to successive values it , 1 โค t โค |F |, an as yet unoccupied edge (site) from F .
The value of |M โ[i,j] | is given as the number of elements of I which are placed in sites from P [i,j] before
the smallest index t โ N, such that for all paths R โ R[i,j] , there exists t0 < t such that it0 โ ฯ(R). We
will refer to the index t as representing moments of time.
Let R[i] = {R1 , . . . , R|R[i] | . We say that a path Rk โ R[i] was cut off at time t if t is the smallest
time such that it โ ฯ(Rk ). For successive moments of time t โ N , we denote by Kt the set of surviving
indices k of paths Rk which have not been cut off at time t. We obtain subforest Ft โ F by restricting
F to its surviving part, where we treat a path P [i,j] if it extends to at least one surviving path Rk :
[
[
Ft =
Rk โช
P [i,j] .
kโKt
j:
โkโKt P [i,j] โPu (Rk+ )
Exactly as in the proof of Lemma 4, we will consider how the random variable Miโ increases over time,
until Ft = โ
. We again couple our sampling process by first deciding in each time step whether to place
it in forest F \ Ftโ1 or in forest Ftโ1 , and only afterwards fixing for it a specific free site with uniform
probability within the chosen subforest. Observe that if it is placed F \ Ftโ1 , then in the given step of
the considered process, the value of Miโ remains unchanged at time t. We will thus eliminate from the
process all time steps t such that it โ F \ Ftโ1 , and by a slight abuse of notation, we will relabel time
indices as if these steps never occurred. Thus, in each time step t, we assume that a free site is picked
for it from Ftโ1 uniformly at random.
Consider now the random variable ฯt = |Ktโ1 | โ |Kt |, representing the number of paths R cut off
in time step t. The expectation of ฯt can be lower-bounded, regardless of the history of the process.
Claim (*). E[ฯt |Ftโ1 ] โฅ 1/2, for any Ftโ1 6= โ
.
Proof (of Claim). Fix forest Ftโ1 . When inserting it , the number of free sites in layer Lโ[i+1] is at
least:
X
|Rk | โฅ |Ktโ1 |(r[i+1] โ r[i] ).
kโKtโ1
On the other hand, since each surviving path P [i,j] extends to some surviving path Rk , the total number
of free sites for insertion of it is upper-bounded by |Ktโ1 |(r[i+1] โ r[iโ1] . Since insertion of it into layer
Lโ[i] means that |Kt | = |Ktโ1 |, and insertion of it into layer Lโ[i+1] means that |Kt | = |Ktโ1 | โ 1, we
obtain:
|Ktโ1 |(r[i+1] โ r[i] )
1
E[ฯt |Ftโ1 ] โฅ
โฅ ,
[i+1]
[iโ1]
2
|Ktโ1 |(r
โr
)
which completes the proof of the claim.
P
Moreover, taking into that ฯt has bounded range ฯt โ {0, 1}, and that tโN ฯt โค li , we obtain a
concentration result on the number of steps until the stopping of the process (Ft = โ
) directly from the
17
Azuma-McDiarmid martingale inequality (cf. e.g. [17][Thm. 16], [26]). For parameter T = 12cli , we
obtain after some transformations:
Pr[F12cli 6= โ
] < eโ4cli .
Recalling that in each time step t with Ft 6= โ
, the value of random variable Miโ increases by at most 1,
we obtain directly that Pr[Miโ > 12cli ] < eโ4cli , which completes the proof.
The rest of the argument proceeds as for the case of X + , applying Lemma (5) in place of Lemma (4).
We eventually obtain the following analogue of Eq. (7): for any c > 1, w.p. at least 1 โ 4nโc :
X
X โ (ฮท) โค
ฮทโE(Tuโโ )
19
X
X
| Cut โ(r)
| + 6c ln n + max
u
(ฮณi )
r=0
li ln ฮณi ,
(17)
iโคimax
where (ฮณi )iโคimax satisfy condition (15).
Combining Bounds. Introducing the bounds of Eq. (14) and (17) into Eq. (5) through a union bound
we obtain the following statement: For any c > 1, w.p. at least 1 โ 8nโc :
|S(u)| โค 2
19
X
| Cut uโ(r) | + 12c ln n + 2 max
(ฮณi )
r=0
X
li ln ฮณi ,
(18)
iโคimax
where (ฮณi )iโคimax satisfy condition (15).
Now, recalling the bounds on li from Lemma 3, the bound imax < 16 ln D, setting c = 2, and
applying a union bound over all vertices u, we obtain the main technical result of the Section. We
present it first in its strongest form, and then provide two more useful corollaries.
Theorem 1. With probability at least 1 โ 8/n, all nodes u โ V satisfy the following bound on hub set
size:
19
X
X
S(u) โค 2
| Cut โ(r)
|
+
24
ln
n
+
2
max
li ln ฮณi ,
(19)
u
(ฮณi )
r=0
i=1,2,...,b16 ln Dc
l
i m
โ(r)
where li โค 2 minrโ[r[i+1] ,r[i+2] ] | Cut u | with r[i] = 15 16
, and the maximum is taken over posi15
P
tive integers (ฮณi ) satisfying the condition:
ฮณi < 2112 ln D +528 ln n.
We provide two more convenient corollaries of Theorem 1. For the case when the considered trees
โ(r)
Tu are close to scale-free, we simply bound the size of all cuts Cut u through skeleton dimension:
โ(r)
| Cut u | โค k . Bound (19) then takes the asymptotic form, for imax = b16 ln Dc:
X
S(u) โค O(k ) + O(log n) + O(k ) max
ln ฮณi ,
(20)
(ฮณi )
iโคimax
where the latter sum can be bounded using the concavity of the logarithm function as:
๏ฃซ
๏ฃถ
X
X
1
log n
๏ฃธ
๏ฃญ
ฮณi โค imax O max 1, log
โค
max
ln ฮณi โค imax max ln
imax
log D
(ฮณi )
(ฮณi )
iโคimax
iโคimax
log n
โค O log D max 1, log
.
log D
18
We also observe the following link between the parameters k , D, and n. Since by Proposition 1 graph
G has doubling dimension bounded by 2 k +1, it follows that a radius-D ball in G may only contain at
most (2 k +1)dlog2 De nodes from V . Hence, (2 k +1)dlog2 De โฅ n, and we obtain:
log n = O(log k ยท log D).
(21)
Thus, the O(log n) additive factor in the bound (20) on S(u) is dominated in notation by the last factor
of the sum, which is stated as at least O(k log D).
Combining the above, we obtain the following corollary.
Corollary 2. With probability at least 1 โ O(1/n), the hub set size of every node is bounded by:
log n
.
O k log D max 1, log
log D
In particular, when the graph has sufficiently large diameter, D = nโฆ(1) , we have that the hub set size
of all nodes is bounded by O(k log D). For the general case, by introducing Eq. (21) into Corollary 2,
we obtain the following statement.
Corollary 3. With probability at least 1 โ O(1/n), the hub set size of every node is bounded by:
O (k log log k log D) .
When considering the case of trees in which the width of tree Tuโ is far from uniform over different
scales of distance, tighter bounds are obtained by relating the size of S(u) toP
the integrated skeleton
dimension kฬ (u). To do this, we apply in Eq. (19) the rough bound: ln ฮณi < ln i ฮณi = O(log log n +
log log D). This leaves us with an expression of the form:
X
S(u) โค O(kฬ (u))+O(log n)+O(log log n+log log D)
li โค O(log n+kฬ (u)(log log n+log log D)),
iโคimax
where we used the bound
rameter kฬ .
P
iโคimax li
โค O(kฬ (u)), which follows easily from the definition of the pa-
Corollary 4. With probability at least 1 โ O(1/n), the hub set size of every node u โ V is bounded by
O(log n + kฬ (u)(log log n + log log D)).
4
An Application to ฮด-preserving Distance Labeling
As a slight extension of our results, we note that our technique based on analyzing tree skeletons for
shortest path trees has direct application the ฮด-preserving distance labeling problem in unweighted
graphs, for some parameter ฮด > 0. We recall that a scheme is called ฮด-preserving if for any queried
pair of nodes (u, v) with ฮด(u, v) > ฮด, the value returned by the decoder is equal to ฮด(u, v).
By analogy to the integrated skeleton dimension given by (2), we introduce a variant for this parameter which only considers cuts at distance more than ฮด/6.
kฬ ฮด (u) :=
X
vโVuโ :d(u,v)>ฮด/6
1
=
du (v)
โ(r)
X
rโN,r>ฮด/6
| Cut u
r
|
.
(22)
The claims of Lemma 2 and Corollary 4, which give bounds on average hub size of O(kฬ (u)) and
O(log n + kฬ (u)(log log n)) in the unweighted setting, naturally translate to ฮด-preserving labeling. For
our techniques to be directly applicable, it suffices to subdivide each edge of the graph into a path of 12
19
vertices so that all distances between u โ v pairs are divisible by 12, and to choose shortest path trees
so that for any pair of nodes u, v, the intersection Tu โฉ Tv contains a shortest u โ v path (this may be
achieved, for example, by enforcing a unique choice of shortest paths between any node pair, e.g., by
choosing i.a.r. the length of each edge in the range [1 โ 1/n, 1]). Then, the entire analysis holds, and we
can eventually replace kฬ (u) by kฬ ฮด (u) in the statement of the claims.
โ(r)
We remark that it is an elementary property of the tree skeleton that | Cut u | = O(n/r), since any
node at distance r from u continues in Tu along an independent path of length at least r/2. By performing the latter sum in (22), we obtain kฬ ฮด (u) = O(n/ฮด). Thus, we obtain the following Proposition.
Proposition 3. There exists a hub labeling scheme for the ฮด-preserving distance labeling problem with
hubs of average size O(n/ฮด) and worst case size O(log n+(n/ฮด) log log n). The size of the bit representations of the corresponding labels is O((n/ฮด) log n) and O(log2 n+(n/ฮด) log n log log n), respectively.
The size of the obtained ฮด-preserving hub-based labeling scheme is (almost) optimal, since there
holds a lower bound of โฆ(n/ฮด) on both the average and worst-case size of hub sets [10]. In fact, our
scheme can be modified slightly to obtain hub sets of worst-case size O(n/ฮด) up to a certain threshold
e โn). We present the details of this modified scheme in the following Subsection.
value ฮด = O(
4.1
A Modified ฮด-preserving Labeling Scheme
In this section we present an independent family of distance labeling schemes, which have the ฮดpreserving property. Whereas the scheme and the presented analysis are valid for any value of parameter
ฮด > 0, we obtain an improvement on the previously discussed scheme only up to some threshold value
e โn).
ฮด = O(
Construction of the Labeling. Fix the value of parameter ฮด > 0, with 12|ฮด. The basic building block
of our labeling is a construction of hub sets Sฮด (u) for each node u โ V , which allow us to handle
distance queries for pairs of nodes whose distance is in the range [ฮด, 5ฮด/4].
Before providing the details of the constructions of sets Sฮด (u), we first introduce some auxiliary
notation. As before, for a pair of nodes u, v โ V , we denote by P (u, v) a fixed shortest path between u
and v. In the definition of P (u, v), ties between different shortest paths should be broken in a consistent
manner
S over the whole graph, so that P (u, v) = P (v, u), and the set of shortest paths rooted at a node
u, vโV P (u, v), is a spanning tree of G.
For a node u โ V , we denote by Tu the shortest path subtree of G, rooted at u, leading from u to
nodes at distance in the range [ฮด, 5ฮด/4]:
[
Tu =
P (u, v).
vโV : d(u,v)โ[ฮด,5ฮด/4]
We denote by Tuโ the subtree (skeleton) of tree Tu , also rooted at u and truncated to its first 3ฮด/4 levels
from the root: Tuโ = Tu [{v โ V (Tu ) : d(u, v) โค 3ฮด/4}]. We remark that all descending paths in Tuโ
have reach of at least ฮด/4 in Tu .
The set Sฮด (u) will be constructed similarly as before, to include vertices from the central part of any
u โ v path in the tree, for vertices v with d(u, v) โ [ฮด, 5ฮด/4]. However, we wish to control the number of
possible bad events in which a descending path in the tree Tuโ branches out at some level into too many
subpaths, from each of which some representative node will need be chosen into Sฮด (u). To do this, we
will partition the vertex set of tree Tuโ into two subsets, Hu โช Lu , known as heavy and light vertices,
respectively. A vertex w of Tuโ belongs to Hu if the subtree of Tuโ rooted at w has at least ฮด leaves (all in
the last level 3ฮด/4), and belongs to Lu otherwise. We remark that Tuโ [Hu ] is a (possibly empty) subtree
of Tuโ , whereas Tuโ [Lu ] is a sub-forest of Tuโ , in which each connected component is a tree with less than
20
Hu
u
3
4ฮด
ฮด
5
4ฮด
Figure 3: Hub set selection for distance range [ฮด, 5ฮด/4]. The corresponding shortest path tree Tu for some
vertex u is shown in the figure. The set of heavy vertices Hu is shaded around vertex u; all remaining
vertices up to distance 34 ฮด belong to Lu . Vertices of L0u โ Lu are also marked, with corresponding
descending paths Pd shaded.
ฮด leaves. In all the considered trees, we maintain the same ancestry relation. In particular, we speak of
a descending subpath in a tree if one of its endpoints is an ancestor of the other with respect to the tree
Tuโ rooted at u.
We are now ready to define the hub sets Sฮด (u), u โ V by the following randomized construction.
Assign to each node v โ V a real value ฯ(v) โ [0, 1], uniformly and independently at random. We now
put for all u โ V :
Sฮด (u) := Hu โช L0u ,
(23)
where L0u โ Lu is defined as the set of all vertices v โ Lu , such that there exists a descending subpath
Pd in Tuโ [Lu ], such that v โ Pd , |Pd | = ฮด/12, and v has the minimal value of ฯ along path Pd , v =
arg minwโPd ฯ(w) โก arg min ฯ(Pd ). See Fig. 3 for an illustration.
Correctness. We start by showing that sets Sฮด have the desired hub property, regardless of the choice
of random values ฯ (which may only affect the size of these sets).
Lemma 6. For any pair of nodes u, v โ V such that d(u, v) โ [ฮด, 5ฮด/4], we have:
d(u, v) =
(d(u, w) + d(w, v)) .
min
wโSฮด (u)โฉSฮด (v)
Proof. Consider the path P = P (u, v) = P (v, u). We have P โ Tu and P โ Tv . Moreover, |P | โค
5ฮด/4 and |P โฉ Tuโ | = |P โฉ Tvโ | = 3ฮด/4. Denoting by P โ the subpath of P which belongs to both trees
Tuโ and Tvโ , P โ = P โฉ Tuโ โฉ Tvโ , it follows that |P โ | โฅ ฮด/4. We now prove the claim of the lemma
by showing that at least one vertex from P โ has to belong to Sฮด (u) โฉ Sฮด (v). We achieve this by a case
analysis, depending on the portions of path P โ which belong to the sets Lu , Hu , Lv , and Hv .
โข If |P โ โฉHu โฉHv | > 0, then there exists at least one vertex w โ P โ โฉHu โฉHv โ P โ โฉSฮด (u)โฉSฮด (v),
which completes the proof.
โข If |P โ โฉ Lu โฉ Hv | โฅ ฮด/12, then there exists at least one descending subpath Pd of length ฮด/12 in
Tuโ [Lu ] which is completely contained in P โ โฉ Hv . Setting w = arg min ฯ(Pd ), we have w โ L0u ,
and so it follows that w โ P โ โฉ L0u โฉ Hv โ P โ โฉ Sฮด (u) โฉ Sฮด (v).
โข If |P โ โฉ Hu โฉ Lv | โฅ ฮด/12, we obtain the result by applying analogous considerations as in the
previous case.
21
โข Finally, in all other cases we must have |P โ โฉ Lu โฉ Lv | โฅ ฮด/12. It follows that there exists at
least one subpath Pd โ P โ of length ฮด/12, which is a descending subpath in both Tuโ [Lu ] and
Tvโ [Lv ]. Setting w = arg min ฯ(Pd ), we obtain w โ L0u and w โ L0v , hence w โ P โ โฉ L0u โฉ L0v โ
P โ โฉ Sฮด (u) โฉ Sฮด (v).
Analysis. We now consider the size of sets Sฮด (u). The size of set Hu is independent of the choice of
random variables ฯ; it can easily be bounded, taking into account that tree Tuโ has O(n/ฮด) leaves.
Lemma 7. For all u โ V , |Hu | โค 3n/ฮด.
Proof. Let l โ Hu be a leaf node of Tuโ [Hu ]. By definition of Hu , we have that the subtree of Tuโ rooted
at l has at least ฮด leaves. As every leaf of Tuโ is at depth 3ฮด/4, and all leaves in tree Tu are at depth at
least ฮด, it follows that the subtree of l in Tu contains at least ฮด disjoint descending paths of length ฮด/4
each, and so it has at least ฮด 2 /4 nodes. Since the size of tree Tu is at most n, we obtain that tree Tuโ [Hu ]
has at most 4n/ฮด 2 leaves. Moreover, the distance of each node of Tuโ [Hu ] from its root u is at most
3ฮด/4. Hence, |Tuโ [Hu ]| โค (3ฮด/4)(4n/ฮด 2 ) = 3n/ฮด.
The size of set L0u depends on the choice of random variables ฯ. We start by bounding the expected
number of elements of L0u , belonging to specific connected components of Tuโ [Lu ]. Suppose Tuโ [Lu ] be
(1)
(k )
a forest consisting of ku trees, and let Lu = Lu โช . . . โช Lu u be the partition of its vertex set such that
(i)
(i)
(i)
Tuโ [Lu ] represents its i-th connected component. Let lu denote the number of leaves of tree Tuโ [Lu ].
0(i)
(i)
0(1)
0(k )
Finally, let Lu = L0u โฉ Lu . Clearly, Lu โช . . . โช Lu u is a partition of L0u . In the following, we
P
0(i)
u
|Lu |, showing that it has an expectation of O(n/ฮด), and
consider the random variable |L0u | = ki=1
obtaining concentration results around this expectation.
First, we remark that each descending path of tree Tuโ contributes O(1) elements in expectation to set
0(i)
Tuโ . Consequently, the expected size of set |Lu | can be related to the number of leaves in the considered
connected component.
0(i)
(i)
Lemma 8. For all u โ V and all 1 โค i โค ku , E|Lu | โค 36lu .
(i)
(i)
Proof. Let Pu be the set of (inclusion-wise) maximal descending paths in the tree Tuโ [Lu ]. We remark
(i)
(i)
that |Pu | โค lu .
(i)
For a path P โ Pu , let MP (v) be the event that there exists a subpath Pd โ P , with |Pd | = ฮด/12,
such that v = arg min ฯ(Pd ). We have Pr[MP (v)] = 0 for v โ
/ P . If v โ P , then we use the following
folklore probability estimation: for MP (v) to hold, one of the two (at most) descending subpaths P 0 of
P of length ฮด/24, having v as one of their endpoints, must satisfy v = arg min ฯ(P 0 ). It follows that for
0(i)
v โ P , we have Pr[MP (v)] โค 48/ฮด. By linearity of expectation we now obtain a bound on E|Lu |:
E|L0(i)
u |=
X
vโV
Pr[v โ L0(i)
u ]โค
X X
Pr[MP (v)] โค |Pu(i) | ยท max |P | ยท
(i)
P โPu
(i)
P โPu vโP
48
3ฮด 48
โค lu(i) ยท ยท
= 36lu(i) .
ฮด
4 ฮด
By linearity of expectation, we can apply the claim of Lemma 8 over all connected components,
obtaining the following result.
Lemma 9. For all u โ V , E|L0u | โค 144n/ฮด.
22
Proof. By Lemma 8 we have:
E|L0u |
=E
ku
X
|L0(i)
u |
โค 36
i=1
ku
X
lu(i) .
i=1
P u (i)
lu โค 4n/ฮด. Indeed, this sum represents the total number
The claim follows when we observe that ki=1
โ
of leaves in Tu [Lu ]. Each such leaf (located at distance 3ฮด/4 from u) is the upper endpoint of a distinct
descending path of length at least ฮด/4 in the tree Tu , and |Tu | โค n, hence we obtain the bound.
In order to apply Chernoff bounds to the sum of random variables |L0u |, we start by bounding the
range of these variables.
0(i)
(i)
Lemma 10. For all u โ V and all 1 โค i โค ku , |Lu | โค |Lu | < ฮด 2 .
0(i)
(i)
(i)
Proof. We have Lu โ Lu . By the definition of set Lu , tree Tuโ [Lu ] has less than ฮด leaves and all its
(i)
nodes are at distance at most 3ฮด/4 from its root. It follows that |Lu | < ฮด ยท 3ฮด/4 < ฮด 2 .
0(i)
The above upper bound provides an estimate on the maximum value of each random variable |Lu |.
However, in order to be able to perform a concentration analysis in a range of fairly large ฮด (roughly,
0(i)
for n1/3 < ฮด < n0.5 ), we also need to bound more tightly the concentration of each |Lu | around its
expected value.
Let V0 = {v โ V : ฯ(v) < 50 lnฮดn }. We start by showing that with high probability, all elements of
the sets |L0u | belong to V0 .
Lemma 11. Denote by X the โbadโ event that there exists a node u โ V , such that L0u 6โ V0 . We have:
Pr[X] < 1/n.
Proof. Consider first the probability pv that a fixed node v โ V \ V0 satisfies v = arg min ฯ(P ), where
P is any fixed path of ฮด/12 nodes in G which contains v. We have (with the last inequality holding when
ฮด โฅ 300):
Y
pv =
(1 โ ฯ(v)) = (1 โ ฯ(v))ฮด/12โ1 < (1 โ 50 ln n/ฮด)ฮด/12โ1 < nโ4 .
wโP \{v}
The probability of event X occurring can be upper-bounded by performing a union bound over all
nodes u, all descending paths P in Tuโ [Lu ], and all nodes v โ P of the event [v = arg min ฯ(P )โฉv โ
/ V0 ]
occurring. For each node u, there are at most n such paths to consider, and less than ฮด possible nodes v
in each path. Overall, we obtain:
Pr[X] โค n ยท n ยท ฮด ยท pv < n3 ยท nโ4 = 1/n.
(i)
Next, we show that with high probability, each connected component Lu contains at most O(ฮด log n)
nodes from V0 .
Lemma 12. Denote by Y the โbadโ event that there exists a node u โ V and 1 โค i โค ku , such that
(i)
|Lu โฉ V0 | > 100ฮด ln n. We have: Pr[Y ] < 1/n.
23
Proof. Let Z(v) denote the indicator variable for node v and set V0 , i.e., Z(v) = 1 if v โ V0 and
Z(v) = 0 otherwise. Clearly, Pr[Z(v) = 1] = 50 ln n/ฮด, and all random variables Z(v), v โ V are
(i)
independent. For any fixed |Lu |, we have:
X
E
Z(v) โค |L(i)
u | ยท 50 ln n/ฮด โค 50ฮด ln n,
(i)
vโLu
(i)
where we used 10 to bound |Lu |. Next, we proceed by apply a simple multiplicative Chernoff bound
for the considered random variable:
X
Pr[|L(i)
Z(v) > 100ฮด ln n] โค eโ50ฮด ln n/3 < nโ16 .
u โฉ V0 | > 100ฮด ln n] = Pr[
(i)
vโLu
(i)
Applying a union bound over Lu , for all u โ V and 1 โค i โค ku , gives the claim.
We are now ready to apply a Chernoff-bound type analysis to the random variable |L0u |.
โ
Lemma 13. Let ฮด โค n/ ln n. Then: Pr[โuโV |L0u | < 800n/ฮด] = 1 โ O(1/n).
0(i)
0(i)
0(i)
(i)
(i)
Proof. Define the random variable ฮปu as |Lu | when Lu โ Lu โฉ V0 and |Lu โฉ V0 | โค 100ฮด ln n,
0(i)
and fix ฮปu = 0 otherwise.
Pku 0(i)
0(i)
Define ฮป0u =
i=1 ฮปu . All ฮปu are independent random variables, since they are functions of
(i)
0(i)
disjoint sets of random variables (ฯ(v) : v โ Lu ). Moreover, we have 0 โค ฮปu โค 100ฮด ln n. An
application of a simple multiplicative Chernoff bound gives for any A > 0:
Pr[ฮป0u
144en/ฮด A/(100ฮด ln n)
400n/ฮด A/(100ฮด ln n)
Eฮป0u A/(100ฮด ln n)
โค
<
,
โฅ A] < e
A
A
A
where we used the bound Eฮป0u โค E|L0u | โค 144n/ฮด following from Lemma 9. Putting A = 800n/ฮด and
โ
taking into account that ฮด โค n/ ln n, we get for sufficiently large n:
Pr[ฮป0u โฅ 800n/ฮด] < 2โ8n/(ฮด
2
ln n)
<
1
.
n2
By applying a union bound over all nodes, we obtain that Pr[โuโV ฮป0u < 800n/ฮด] > 1 โ 1/n. Taking
into account Lemmas 11 and 12, we also have:
Pr[โuโV ฮป0u = |L0u |] > 1 โ 2/n.
Overall, we obtain:
Pr[โuโV |L0u | < 800n/ฮด] > 1 โ 3/n.
In view of the definition of the proposed hub set labeling (Eq. (23)), Lemmas 7 and 13 complete
โ
the analysis of the case of ฮด โค n/ ln n, showing that our randomized construction yields with high
probability hub sets of size O(n/ฮด) for all nodes of the graph.
โ
Proposition 4. For any 0 < ฮด โค n/ ln n, 12|ฮด, there exists a hub labeling scheme which correctly
decodes the distance between any pair of nodes lying at a distance in the range [ฮด, 5ฮด/4], using hubs of
size at most O(n/ฮด).
24
4.2
Improved ฮด-preserving Distance Labeling for Arbitrary Distance
For an arbitrary instance of the ฮด-preserving distance labeling problem, we can now construct a hub
set S + (u) by combining the results of Propositions 4 and 3, for large and small scales of distance,
respectively. Formally, we put:
[
Sฮดi (u),
S + (u) := Sฮดmax (u) โช
(24)
i=0,1,2,...
ฮดi <ฮดmax
where in the first part of the expression, the value
โ
ฮดmax = max{ฮด, b n/ ln nc}
is a suitably chosen threshold parameter, and the hub set Sฮดmax (u) is constructed following Proposition 4,
thus providing a ฮดmax -preserving distance labeling. In the second part of the expression, we take care of
smaller distances from the range [ฮด, ฮดmax ), by applying Proposition 3 over a specifically chosen distance
sequence {ฮดi }i , to obtain hub sets Sฮดi (u), such that each set Sฮดi (u) intersects with a shortest u โ v path,
for all nodes v such that d(u, v) โ [ฮดi , 5ฮดi /4]. To obtain a coverage of the entire distance range [ฮด, ฮดmax ),
we put ฮด0 = 12bฮด/12c < ฮด, and choose ฮดi+1 as the largest integer such that 12|ฮดi+1 and ฮดi+1 < 5ฮดi /4.
Since the sequence {ฮดi }i is geometrically increasing, in view of Proposition 3, we obtain the following
bound:
|S + (u)| = O(n/ฮด + |Sฮดmax (u)|).
(25)
Now, taking into account the definition of ฮดmax and bounding |Sฮดmax (u)| by Proposition 4, we directly
obtain the main result of this Section.
Theorem 2. There exists a ฮด-preserving distance labeling scheme based on hub sets, such that:
โ
(i) When ฮด โค n/(ln n ln ln n), the hub sets of all nodes are of size O(n/ฮด), which corresponds to
distance labels of size O(n log ฮด/ฮด) per node.
(ii) For any ฮด > 0, the hub sets of all nodes are of size O(log
ฮด + n log log ฮด/ฮด), which corresponds
2
to distance labels of size O log ฮด + n log ฮด log log ฮด/ฮด per node.
(iii) For any ฮด > 0, the average size of a hub set, taken over all nodes, is O(n/ฮด), which corresponds
to distance labels of average size O(n log ฮด/ฮด) per node.
Furthermore, the corresponding labels can be constructed in expected polynomial time.
5
Computing Skeleton Dimension and Distance Labels
Discrete skeleton representation. Given a tree T rooted at node u with length function `, a discrete
representation of its skeleton T โ can be obtained as the sub-tree with edges vw โ E(T ) such that
Reach T (v) โฅ 21 dT (u, v) equipped with length function `0 defined by `0 (vw) = `(vw) if Reach T (w) โฅ
1
2
0
2 dT (u, w) and ` (vw) = r โ dT (u, v) with r = 3 (dT (u, w) + Reach T (w)) otherwise. The idea is that
โ
node w is a leaf of T that corresponds to the point w0 of edge vw in Te that satisfies Reach Te (w0 ) =
1
0
2 dTe (u, w ). To see this, let x be a descendant of w such dT (w, x) = Reach T (w). We then have
2
r = 3 dT (u, x). We thus get Reach Te (w0 ) = dT (v, x) โ `0 (vw) = dT (u, x) โ r = 31 dT (u, x) = 2r
whereas dTe (u, w0 ) = dT (u, v) + `0 (vw) = r.
25
Skeleton dimension computation. Given a tree T , the reach of each node can be computed by a scan
of vertices in reverse topological order. Obtaining the discrete skeleton representation is then straightforward. Its width k can be computed by scanning vertices by non-decreasing distance from the root
using a priority queue for storing edges containing nodes in Cut r (T ). This can be done in O(n log log k )
time using a dedicated integer priority queue [28].
The skeleton of a graph can thus be simply obtained from an all pair shortest path computation. With
integer lengths and dedicated priority queues [28], this can be done in O(nm + n2 log log n) time.
We remark that faster computation of tree skeletons could be obtained in practice by using classical heuristics for bounding reach of nodes [22, 24]. The algorithm proposed in [24] alternates partial
shortest-path tree computation with introduction of shortcuts to obtain efficiently reach bounds on the
graph plus the added shortcuts. The computation of partial trees up to a given radius 2r allows to prune
nodes with reach less than r. Shortcuts allow to reduce reach of nodes with degree 2: if a node v has two
neighbors u, w, a shortcut uw with length `(uv) + `(vw) is added to by-pass v. The algorithm results
in reach bounds on the graph with shortcuts. Reach bounds on the original graph can then be obtained
by removing shortcuts in reverse order and updating the reach bound R(v) of a node v by-passed by
shortcut uw as R(v) := max(R(v), min(R(u) + `(uv), `(vw) + R(w))) where R(u) and R(w) denote
the reach bounds obtained for u and w respectively. A subtree containing the tree skeleton of a node u
can then be obtained through a partial Dijkstra from u where we prune nodes whose reach is known to
be less than half of the current distance from u. In practice, we believe that this would allow to compute
each skeleton tree in time comparable to an RE query. Our labeling algorithm can then be adapted to
take the resulting family of trees as input.
Distance label computation. Computing the hub set of a tree T is more intricate as we have to emulate the subdivision of each edge of length a into 12a unweighted edges to conform to the analysis of
Section 3. For the sake of notation, we number these unweighted edges of the subdivision from 1 to
12a, and let ฯi , 1 โค i โค 12a, denote the associated random number which is generated for each of the
edges of the subdivision. Given a sample {ฯi | 1 โค i โค 12a}, let M denote the set of indices of edges
which are prefix minima or suffix minima in the sequence (ฯ1 , . . . , ฯ12a ). For the purpose of our selection algorithm, we only need to generate set M and the ฯi -values associated with i โ M . We start by
generating those elements of M which are prefix minima. By a slight abuse of notation, to initialise the
process, we set i0 = 1 and generate ฯ1 uniformly at random in [0, 1], ฯ1 := rand(0, 1). For successive
j = 0, 1, 2, . . ., we then generate the index ij+1 of the first edge of M after the edge with index ij (which
is also the first index of M having value less than ฯij ). As ij+1 โ ij follows a geometric
distribution
j
k
rand(0,1)
with parameter p = ฯij , this can be done in constant time by setting ij+1 := ij + loglog(1โp)
(see
e.g. [19]). We then generate ฯij+1 uniformly in [0, ฯij ]. We generate in this way indices i1 , . . . , ix , until
for some x โ N we reach the 12a bound (i.e. ix+1 > 12a). We then proceed similarly in reverse order
for edges with index greater than ix , to generate those edges with suffix minimal value (note that this
time we have to sample values greater than ฯix , rather than greater than 0, and adapt all ranges accordingly, for consistency with the choice of prefix minima). In this way, we perform O(log a) constant-time
sampling operations per edge of length a, obtaining O(log a) values (together with their positions) per
edge, in expectation (and also w.h.p. with respect to a). Since random choices made for all edges of the
original graph are independent, by a quick Chernoff bound, the total amortized sampling time over the
whole graph is O(m log C), w.h.p., where C denotes the maximum length of an edge. We remark that
when constructing a hub set for a subset of nodes, each node only relies on the random choices made in
its shortest-path tree, which can be evaluated in time O(n log C), w.h.p.
Our selection algorithm of the edge with minimal value in the middle window for a pair u, v will
necessarily select an edge that we have generated when the window contains a (real) edge extremity.
Each time a virtual unweighted edge is selected as a hub, we indeed select the real edge it belongs to.
26
We also have to manage the special case where the middle window entirely falls inside a long edge. In
that case, the long edge is selected as hub.
The computation of the hub set is then a matter of scanning the tree by non-decreasing distance r
of generated vertices while maintaining a sliding middle window for each branch reaching distance r.
Using a balanced binary search tree per window for storing the virtual edges it contains, we obtain the
hub set in O(n log C log(n log C)) time. Distance labels can thus be computed in expected O(nm +
n2 log C(log n + log log C)) time. Note that each of the n labels can be computed independently (e.g.
in parallel) in O(m + n log C(log n + log log C)) time per label, as long as randomness is shared (e.g.
using random generators with same seeds).
6
Generalizing the Definition of a Skeleton
The definition of a skeleton, and the corresponding notion of skeleton dimension can be generalized in
two ways, by using a different distinct distance metric to compute reach of a point in a tree, as well as
by modifying the threshold value of reach required to retain a point in the skeleton.
Using two metrics. Suppose the graph G is associated with two non-negative length functions, ` and
`0 , of its edges. For example, in road networks, one can typically consider travel time `t and geographic
distance `d , resulting in time and distance metrics, respectively. Another metric which may be of interest
is hop count, corresponding to the constant function `h = 1 (i.e. `h (uv) = 1 for each edge uv). Once
a shortest path tree Tu for node u and its geometric realization Teu has been computed according to
length function `, distance and reach within Teu can be computed according to `0 . Formally, extending
0
the definition from Section 2.1, the skeleton Tuโ` of Tu is then defined as the subtree of Teu induced
0
0
0
0
by {v โ V (Teu ) | Reach `Te (v) โฅ 21 d`e (u, v)}, where d`e and Reach `Te denote distance and reach with
Tu
u
respect to `0 .
0
The skeleton dimension of G is then k `
Tu
u
0
= maxuโV (G) Width(Tuโ` ). The advantage of this
approach is that it sometimes results in smaller skeleton dimension (depending on the choice of metric
`0 ), without affecting the correctness of any of the hub labeling schemes designed in this paper. As
an example, the respective skeleton dimensions of the 9-th DIMACS New York graph [1] for different
choices of metrics turn out to be: k `t = 73, k `d = 66, and k `h = 56, where `t , `d , and `h denote traveltime, geographic-distance, and hop-count length functions, respectively (considering shortest path trees
for the metric `t in all three cases).
We remark that a similar phenomenon, also taking advantage of two metrics, was observed and used
in the reach-pruning approach [24].
Modifying reach threshold. The choice of a reach threshold of 21 in the definition of skeleton is
arbitrary. Indeed, for any fixed ฮฑ > 0, we can define the skeleton Tuฮฑโ as the subtree of Teu induced
by {v โ V (Teu ) | Reach Teu (v) โฅ ฮฑ dTeu (u, v)}, and the skeleton dimension kฮฑ of G is given as kฮฑ =
maxuโV (G) Width(Tuฮฑโ ). The values of skeleton dimension for different values ฮฑ and ฮฒ of the reach
threshold are related to each other by the following Proposition.
Proposition 5. For two constants ฮฑ < ฮฒ, the following bounds hold:
kฮฒ โค kฮฑ โค kฮฒ k
ฮฒ+1
ฮฒ/ฮฑโ1
.
Proof. The first relation is immediate since Tuฮฒโ is a subtree of Tuฮฑโ for ฮฒ โฅ ฮฑ. The second relation
S
0
0
is obtained by observing that Cut r (Tuฮฑโ ) โ vโCut 0 (T ฮฒโ ) Cut rโr0 (Tvฮฒ โ ), with r0 = 1+ฮฑ
1+ฮฒ and ฮฒ =
u
r
ฮฒ+1
. Indeed, for w โ Cut r (T ฮฑโ ), we can consider in Teu the point v at distance r0 from u on the
ฮฒ/ฮฑโ1
u
branch leading to w. The reach of w in Teu is then at least r โ r0 + Reach Teu (v) โฅ r โ r0 + ฮฑr โฅ ฮฒr0 for
27
0
(1 + ฮฑ)r โฅ (1 + ฮฒ)r0 and v thus belongs to Tuฮฒโ for r0 = 1+ฮฑ
1+ฮฒ . Moreover, w is at distance r โ r from v
0
in Tev and has reach at least ฮฑr, implying w โ V (Tvฮฒ โ ) for ฮฒ 0 โค ฮฑr 0 , which is the case for ฮฒ 0 = ฮฒ+1
rโr
when r0 =
ฮฒ/ฮฑโ1
1+ฮฑ
1+ฮฒ .
For ฮฒ = 1 and ฮฑ < 1, the second relation of the above Proposition gives kฮฑ โค k1 k
2ฮฑ
1โฮฑ
, which
also implies that k1 โค kฮฑ โค k12 for ฮฑ โฅ 1/3. More generally, we can derive the following bounds by
repeatedly applying Proposition 5 for ฮฒ = 1:
dlog(1+1/ฮฑ)e
k1 โค kฮฑ โค k1
for
ฮฑ < 1.
This shows that for a given graph, skeleton dimension kฮฑ grows at most polynomially with ฮฑ1 .
Naturally, one can also apply both of the above-described generalizations together, obtaining a new
0
skeleton dimension parameter kฮฑ` with reach metric `0 and reach threshold ฮฑ. All the results of the
paper about hub labelings and their computation in graphs with low skeleton dimension can be easily
0
0
generalized to use kฮฑ` instead of k, as long as ฮฑ < 1 (ensuring that any two skeleton trees Tu` โฮฑ and
0
`
Tv` โฮฑ share a constant fraction of the u โ v shortest path). The particular choice of k = k1/2
was made
`
with the objective of clarity, and also on account of the simple relationship between k1/2 and highway
dimension.
7
Conclusion
In this paper, we have proposed skeleton dimension as a measure of the networkโs amenability to shortest
path schemes based on hub/transit nodes. We intend it as a parameter which is easy to describe and can
be computed efficiently. Computations of hub sets based on skeleton dimension allow each node to
individually and efficiently define its own hub set, subject only to a universal choice of random id-s.
Such a construction is always correct, and gives small hub sets w.h.p. We remark that in a weighted
network each node can compute its own appropriate labeling in O(m + n log C(log n + log log C))
time, where C is the length of the longest integer weight in the network. The definition of hub sets, and
the obtained bounds on their size, hold both for undirected and directed graphs. For directed graphs,
skeleton dimension appears to be a parameter which is more directly usable than highway dimension.
Possible extensions of skeleton dimension, discussed in Section 6, include variants of skeleton dimension with other values of reach threshold, as well as skeleton dimension defined using two separate
distance metrics in the graph: one corresponding to the needs of the shortest path queries (used to
construct shortest path trees), and another, potentially independent metric used internally in the computation of hub labelings, chosen so as to empirically minimize the width of the skeleton. When studying
average-case parameters of a network, the integrated skeleton dimension given by (2) (as well as its
natural generalizations to weighted graphs) appear to be a natural parameter, which may be related to
that of average highway dimension [3]. We could also use the integrated skeleton dimension averaged
over all nodes to get an even more accurate bound on average label size.
Finally, we remark on the interplay between skeleton and highway dimension. Skeleton dimension
is always not greater than geometric highway dimension. We have also shown a clear case of separation
in a weighted Manhattan-type network, where skeleton dimension is asymptotically much smaller than
(geometric) highway dimension.
We remark that skeleton dimension appears particularly worthy of further theoretical study in the
context of scale-free models of random graphs (cf. e.g. [9] for a discussion in the context of highway
dimension and reach). For geometric percolation graphs, skeleton dimension displays a close link with
the coalescence exponent for geodesics. Consequently, it may be easier to show rigorous theoretical
bounds for skeleton dimension than for highway dimension.
28
Acknowledgment
The authors thank Przemek Uznanฬski and Olivier Marty for inspiring discussions on closely related
problems. We also thank PU and Zuzanna Kosowska-Stamirowska for their help with the figures.
References
[1] 9th DIMACS Implementation Challenge: The Shortest Path Problem, 2006.
[2] Ittai Abraham, Daniel Delling, Amos Fiat, Andrew Goldberg, and Renato Werneck. Highway
dimension and provably efficient shortest path algorithms. Technical report, September 2013.
[3] Ittai Abraham, Daniel Delling, Amos Fiat, Andrew V. Goldberg, and Renato F. Werneck. VCdimension and shortest path algorithms. In ICALP, volume 6755 of Lecture Notes in Computer
Science, pages 690โ699. Springer, 2011.
[4] Ittai Abraham, Daniel Delling, Andrew V. Goldberg, and Renato F. Werneck. A hub-based labeling
algorithm for shortest paths in road networks. In SEA, volume 6630 of Lecture Notes in Computer
Science, pages 230โ241. Springer, 2011.
[5] Ittai Abraham, Daniel Delling, Andrew V. Goldberg, and Renato F. Werneck. Hierarchical hub labelings for shortest paths. In Proceedings of the 20th Annual European Conference on Algorithms,
ESAโ12, pages 24โ35, Berlin, Heidelberg, 2012. Springer-Verlag.
[6] Ittai Abraham, Daniel Delling, Andrew V. Goldberg, and Renato F. Werneck. Hierarchical hub
labelings for shortest paths. In ESA, volume 7501 of Lecture Notes in Computer Science, pages
24โ35. Springer, 2012.
[7] Ittai Abraham, Amos Fiat, Andrew V. Goldberg, and Renato F. Werneck. Highway dimension,
shortest paths, and provably efficient algorithms. In Moses Charikar, editor, Proceedings of the
Twenty-First Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2010, Austin, Texas,
USA, January 17-19, 2010, pages 782โ793. SIAM, 2010.
[8] Ittai Abraham and Cyril Gavoille. On approximate distance labels and routing schemes with affine
stretch. In In International Symposium on Distributed Computing (DISC), pages 404โ415, 2011.
[9] David Aldous and Karthik Ganesan. True scale-invariant random spatial networks. Proceedings of
the National Academy of Sciences, 110(22):8782โ8785, 2013.
[10] Stephen Alstrup, Sรธren Dahlgaard, Mathias Bรฆk Tejs Knudsen, and Ely Porat. Sublinear distance
labeling. In Piotr Sankowski and Christos D. Zaroliagis, editors, 24th Annual European Symposium
on Algorithms, ESA 2016, August 22-24, 2016, Aarhus, Denmark, volume 57 of LIPIcs, pages 5:1โ
5:15. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, 2016.
[11] Stephen Alstrup, Cyril Gavoille, Esben Bistrup Halvorsen, and Holger Petersen. Simpler, faster
and shorter labels for distances in graphs. In Robert Krauthgamer, editor, Proceedings of the
Twenty-Seventh Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2016, Arlington,
VA, USA, January 10-12, 2016, pages 338โ350. SIAM, 2016.
[12] Maxim A. Babenko, Andrew V. Goldberg, Anupam Gupta, and Viswanath Nagarajan. Algorithms
for hub label optimization. In Fedor V. Fomin, Rusins Freivalds, Marta Z. Kwiatkowska, and
David Peleg, editors, Automata, Languages, and Programming - 40th International Colloquium,
ICALP 2013, Riga, Latvia, July 8-12, 2013, Proceedings, Part I, volume 7965 of Lecture Notes in
Computer Science, pages 69โ80. Springer, 2013.
29
[13] H. Bast, Stefan Funke, Domagoj Matijevic, Peter Sanders, and Dominik Schultes. In transit to
constant time shortest-path queries in road networks. In ALENEX. SIAM, 2007.
[14] Holger Bast, Stefan Funke, Peter Sanders, and Dominik Schultes. Fast routing in road networks
with transit nodes. Science, 316(5824):566โ566, 2007.
[15] Reinhard Bauer and Daniel Delling. SHARC: Fast and robust unidirectional routing. J. Exp.
Algorithmics, 14:4:2.4โ4:2.29, January 2010.
[16] Beฬla Bollobaฬs, Don Coppersmith, and Michael Elkin. Sparse distance preservers and additive
spanners. SIAM Journal on Discrete Mathematics, 19(4):1029โ1055, 2005.
[17] Fan R. K. Chung and Lincoln Lu. Survey: Concentration inequalities and martingale inequalities:
A survey. Internet Mathematics, 3(1):79โ127, 2006.
[18] Edith Cohen, Eran Halperin, Haim Kaplan, and Uri Zwick. Reachability and distance queries via
2-hop labels. SIAM J. Comput., 32(5):1338โ1355, May 2003.
[19] Luc Devroye. Non-Uniform Random Variate Generation. Springer-Verlag, 1986.
[20] Andreas Emil Feldmann, Wai Shing Fung, Jochen Koฬnemann, and Ian Post. A 1 + -embedding
of low highway dimension graphs into bounded treewidth graphs. In ICALP 2015, volume 9134
of Lecture Notes in Computer Science, pages 469โ480. Springer, 2015.
[21] Cyril Gavoille, David Peleg, Steฬphane Peฬrennes, and Ran Raz. Distance labeling in graphs. J.
Algorithms, 53(1):85โ112, October 2004.
[22] Andrew V. Goldberg, Haim Kaplan, and Renato F. Werneck. Reach for A*: Efficient point-to-point
shortest path algorithms. In ALENEX, pages 129โ143. SIAM, 2006.
[23] R.L. Graham and H.O. Pollak. On embedding graphs in squashed cubes. In Y. Alavi, D.R. Lick, and
A.T. White, editors, Graph Theory and Applications, volume 303 of Lecture Notes in Mathematics,
pages 99โ110. Springer Berlin Heidelberg, 1972.
[24] Ronald J. Gutman. Reach-based routing: A new approach to shortest path algorithms optimized
for road networks. In ALENEX/ANALCO, pages 100โ111. SIAM, 2004.
[25] Ekkehard Koฬhler, Rolf H. Moฬhring, and Heiko Schilling. Fast point-to-point shortest path computations with arc-flags. In 9th DIMACS Implementation Challenge, 2006.
[26] Colin McDiarmid. Concentration. In Michel Habib, Colin McDiarmid, Jorge Ramirez-Alfonsin,
and Bruce Reed, editors, Probabilistic Methods for Algorithmic Discrete Mathematics, pages 195โ
248. Springer Berlin Heidelberg, 1998.
[27] Igor Nitto and Rossano Venturini. On compact representations of all-pairs-shortest-path-distance
matrices. In Paolo Ferragina and Gad M. Landau, editors, Combinatorial Pattern Matching, 19th
Annual Symposium, CPM 2008, Pisa, Italy, June 18-20, 2008, Proceedings, volume 5029 of Lecture Notes in Computer Science, pages 166โ177. Springer, 2008.
[28] Mikkel Thorup. Integer priority queues with decrease key in constant time and the single source
shortest paths problem. Journal of Computer and System Sciences, 69(3):330 โ 353, 2004.
[29] Oren Weimann and David Peleg.
111(14):671โ673, 2011.
A note on exact distance labeling.
30
Inf. Process. Lett.,
| 8cs.DS
|
Proceedings of Machine Learning Research vol 75:1โ22, 2018
Minimax Distribution Estimation in Wasserstein Distance
Shashank Singh
SSS 1@ CS . CMU . EDU
Barnabaฬs Poฬczos
BAPOCZOS @ CS . CMU . EDU
arXiv:1802.08855v1 [math.ST] 24 Feb 2018
Machine Learning Department, Carnegie Mellon University, Pittsburgh, PA 15213, USA
Abstract
The Wasserstein metric is an important measure of distance between probability distributions, with
several applications in machine learning, statistics, probability theory, and data analysis. In this
paper, we upper and lower bound minimax rates for the problem of estimating a probability distribution under Wasserstein loss, in terms of metric properties, such as covering and packing numbers,
of the underlying sample space.
Keywords: Wasserstein Distance; Density Estimation; Minimax Theory; Covering Number; Packing Number
1. Introduction
The Wasserstein metric is an important measure of distance between probability distributions, based
on the cost of transforming either distribution into the other through mass transport, under a metric
on the sample space. Originating in the optimal transport literature,1 the Wasserstein metric has,
owing to its intuitive and general nature, been utilized in such diverse areas as probability theory
and statistics, economics, image processing, text mining, robust optimization, and physics (Villani,
2008; Fournier and Guillin, 2015; Esfahani and Kuhn, 2015; Gao and Kleywegt, 2016).
In the analysis of image data, the Wasserstein metric has been used for various tasks such as
texture classification and face recognition (Sandler and Lindenbaum, 2011), reflectance interpolation, color transfer, and geometry processing (Solomon et al., 2015), image retrieval (Rubner et al.,
2000), and image segmentation (Ni et al., 2009), and, in the analysis of text data, for tasks such as
document classification (Kusner et al., 2015) and machine translation (Zhang et al., 2016).
In contrast to a number of other popular notions of distance2 between probability distributions,
such as Lp distances or Kullback-Leibler and other f -divergences (Morimoto, 1963; Csiszaฬr, 1964;
Ali and Silvey, 1966), which require distributions to be absolutely continuous with respect to each
other or to a base measure, Wasserstein distance is well-defined between any pair of probability
distributions over a sample space equipped with a metric.3 As a particularly important consequence,
Wasserstein distances between discrete (e.g., empirical) distributions and continuous distributions
are well-defined and informative (i.e., often finite).
Partly for this reason, Wasserstein distances have been widely used in probability theory to
prove central limit and related approximation theorems (Ruฬschendorf, 1985; Johnson et al., 2005;
1. The Wasserstein metric has been variously attributed to Monge, Kantorovich, Rubinstein, Gini, Mallows, and others;
see Chapter 3 of Villani (2008) for detailed history.
2. We use the term distance to refer both to proper metrics as well as to similar notions, such as information divergences,
that fail to satisfy symmetry or the triangle inequality.
3. For this reason, we use โdistribution estimationโ in this paper, rather than the more popular โdensity estimationโ.
c 2018 S. Singh & B. Poฬczos.
D ISTRIBUTION E STIMATION
IN
WASSERSTEIN D ISTANCE
Chatterjee et al., 2008; Rio et al., 2009, 2011; Chen et al., 2010; Reitzner et al., 2013). Within machine learning and statistics, this same property has inspired a class of so-called minimum Wasserstein distance estimates (del Barrio et al., 1999, 2003; Bassetti et al., 2006; Bernton et al., 2017)
of distributions, ranging from exponential distributions (Baฤฑฬllo et al., 2016) to more exotic models
such as restricted Boltzmann machines (RBMs) (Montavon et al., 2016) and generative adversarial
networks (GANs) (Arjovsky et al., 2017). k-means clustering (and, similarly, k-medians clustering)
also fall in this class of estimators, where the hypothesis class is taken to be discrete distributions
supported on at most k points; more flexible multi-level clustering algorithms can also be expressed
in this way, using a more elaborate hypothesis class (Ho et al., 2017). PCA can also be expressed
and generalized to manifolds using Wasserstein distance minimization (Boissard et al., 2015). In
principle, these estimators are equivalent to empirical risk minimization, taking advantage of the
fact that Wasserstein distances between the empirical distribution and distributions in the relevant
hypothesis class are well-defined and finite. Moreover, these estimates often perform well in practice because they are free of both tuning parameters and strong distributional assumptions.
In this paper, we study, in a minimax sense, the problem of estimating a distribution using
Wasserstein distance as a loss function. We make minimal assumptions, and some examples of the
varied metric spaces to which our results apply are given in Section 7. Specifically, we assume that
the sample space is a totally bounded metric space, but make no assumptions at all on the distribution. We then prove bounds on the minimax convergence rates of distribution estimation, utilizing
covering numbers of the sample space for upper bounds and packing numbers for lower bounds.
It may at first be surprising that positive results can be obtained under such mild assumptions; this
highlights that the Wasserstein metric is quite a weak metric (see our Lemma 8 and the subsequent
remark for some detailed discussion of this). Moreover, our results imply that, without further assumptions on the population distribution, the empirical distribution is often minimax rate-optimal.
O RGANIZATION
The remainder of this paper is organized as follows. Section 2 provides notation required to formally state both the problem of interest and our results, while Section 3 reviews previous work
studying convergence of distributions in Wasserstein distance. Section 4 provides several lemmas
on which the proofs of our main results rely; all lemmas are proven in Appendix A. Sections 5 and
6 respectively contain our main upper and lower bound results, along with their proofs. Finally, in
Section 7, we apply our upper and lower bounds to identify minimax convergence rates in a number of concrete examples. Section 8 concludes with a summary of our contributions and suggested
avenues for future work.
2. Notation and Problem Setting
For any integer n โ N, [n] = {1, 2, ..., n} denotes the set of the first n positive integers. For
sequences {an }nโN and {bn }nโN of non-negative real numbers, an . bn and, equivalently bn & an ,
are used to indicate the existence of a constant C > 0 such that lim supnโโ abnn โค C. an โ bn
indicates an . bn and an & bn simultaneously.
2
D ISTRIBUTION E STIMATION
IN
WASSERSTEIN D ISTANCE
2.1. Problem Setting
For the remainder of this paper, fix a metric space (โฆ, ฯ), over which ฮฃ denotes the Borel ฯ-algebra,
and let P denote the family of all Borel probability distributions on โฆ. The main object of study in
this paper is the Wasserstein distance on P, defined as follows:
Definition 1 (r-Wasserstein Distance) Given two Borel probability distributions P and Q over โฆ
and r โ [1, โ), the r-Wasserstein distance Wr (P, Q) โ [0, โ] between P and Q is defined by
!1/r
Wr (P, Q) :=
inf
E
ยตโฮ (P,Q) (X,Y )โผยต
[ฯr (X, Y )]
,
where ฮ (P, Q) denotes all couplings between X โผ P and Y โผ Q; that is,
ฮ (P, Q) := ยต : ฮฃ2 โ [0, 1] for all A โ ฮฃ, ยต(A ร โฆ) = P (A) and ยต(โฆ ร A) = Q(A) ,
is the set of joint probability measures over โฆ ร โฆ with marginals P and Q.
Wr is a proper metric over P; namely, it is symmetric in its arguments and satisfies the triangle inequality. Intuitively, Wr (P, Q) quantifies the r-weighted total cost of transforming mass distributed
according to P to be distributed according to Q, where the cost of moving a unit mass from x โ โฆ
to y โ โฆ is ฯ(x, y). Note that Wr (P, Q) is sometimes defined in terms of equivalent (e.g., dual)
formulations (especially for r = 1); however, they will not be necessary in this paper.
We now give a formal statement of the problem studied in this paper:
Formal Problem Statement: Suppose (โฆ, ฯ) is a metric space. Suppose P is an unknown
IID
Borel probability distribution on โฆ, from which we observe n IID samples X1 , ..., Xn โผ P . We
are interested in studying the minimax rates at which P can be estimated from X1 , ..., Xn , in terms
of the (r th power of the) r-Wasserstein loss. Specifically, we are interested in upper and lower
bounding the quantity
i
h
Wrr P, Pb ,
inf sup
E
Pb P โP X ,...,XnIID
โผ P
1
where the infimum is taken over all estimators Pb of P (i.e., all functions Pb : โฆn โ P of the data).
2.2. Definitions for Stating our Results
Here, we give notation and definitions needed to state our theoretical results in Sections 5 and 6 and
intermediate lemmas in Section 4.
โฆ
Let 2โฆ denote the power set of โฆ. Let S โ 22 denote the family of all Borel partitions of โฆ:
(
)
[
S := S โ ฮฃ : โฆ โ
S and โS, T โ S, S โฉ T = โ
.
SโS
We first define some metric notions that will later be useful for bounding Wasserstein distances:
Definition 2 (Diameter and Separation of a Set, Resolution of a Partition) For any set S โ โฆ,
the diameter Diam(S) of S is defined by Diam(S) := supx,yโS ฯ(x, y), and the separation Sep(S)
of S is defined by Sep(S) := inf x6=yโS ฯ(x, y). If S โ S is a partition of โฆ, then the resolution
Res(S) of S is defined by Res(S) := supSโS Diam(S).
3
D ISTRIBUTION E STIMATION
IN
WASSERSTEIN D ISTANCE
Definition 3 (Refinement of a Partition, Nested Partitions) Suppose S, T โ S are partitions of
โฆ. T is said to be a refinement of S if, for every T โ T , there exists S โ S with T โ S. A sequence
{Sk }kโ[K] of partitions is called nested if, for each k โ [K]\{K}, Sk+1 is a refinement of Sk ,
We now define the covering and packing number of a metric space, which are classic and widely
used measures of the size or complexity of a metric space (Dudley, 1967; Haussler, 1995; Zhou,
2002; Zhang, 2002). Our main convergence results will be stated in terms of these quantities, as
well as the packing radius, which acts, approximately, as the inverse of the packing number.
Definition 4 (Covering Number, Packing Number, and Packing Radius of a Metric Space) The
covering number N : (0, โ) โ N of (โฆ, ฯ) is defined for all ฮต by
N (ฮต) := min {|S| : S โ S
and
Res(S) โค ฮต} .
The packing number M : (0, โ) โ N of (โฆ, ฯ) is defined for all ฮต by
M (ฮต) := max {|S| : S โ โฆ
and
Sep(S) โฅ ฮต} .
Finally, the packing radius R : N โ [0, โ] is defined for all n โ N by
R(n) := sup{Sep(S) : S โ โฆ
and
|S| โฅ n}.
Sometimes, we use the covering or packing number of a metric space, say (ฮ, ฯ ), other than (โฆ, ฯ);
in such cases, we write N (ฮ; ฯ ; ฮต) or M (ฮ; ฯ ; ฮต) rather than N (ฮต) or M (ฮต), respectively. For
specific ฮต > 0, we will also refer to N (ฮ; ฯ ; ฮต) as the ฮต-covering number of (ฮ, ฯ ).
Remark 5 The covering and packing numbers of a metric space are closely related. In particular,
for any ฮต > 0, we always have
M (ฮต) โค N (ฮต) โค M (ฮต/2).
(1)
The packing number and packing radius also have a close approximate inverse relationship. In
particular, for any ฮต > 0, we always have
R(M (ฮต)) โฅ ฮต.
(2)
However, we may have R(M (ฮต)) > ฮต, and it need not, in general, be the case that, for all n โ N,
M (R(n)) โฅ n or, for all n โ N, M (R(n)) โค n.
Remark 6 We defined the covering number slightly differently from usual (using partitions rather
than covers). However, the given definition is equivalentSto the usual definition, since (a) any partition is itself a cover (i.e., a set C โ 2โฆ such that โฆ โ CโC C), and (b), for any countable cover
C := {C1 , C2 , ...} โ 2โฆ ,Sthere exists a partition S โ S with |S| โค |C| and each Si โ Ci , defined
recursively by Si := Ci \ iโ1
j=1 Si . S is often called the disjointification of C.
4
D ISTRIBUTION E STIMATION
IN
WASSERSTEIN D ISTANCE
3. Related Work
A long line of work (Dudley, 1969; Ajtai et al., 1984; Dereich et al., 2013; Boissard et al., 2014;
Fournier and Guillin, 2015; Weed and Bach, 2017) has studied distribution estimation in Wasserstein distance, with all the above papers focusing on analyzing convergence of the empirical distribution to the population distribution in Wasserstein distance. In terms of upper bounds, the most
general and tight upper bounds are those of Weed and Bach (2017), who provide results in general
metric spaces, in terms of the covering numbers of those spaces. Their main results are expressed
in terms of a particular notion of dimension, which they call the Wasserstein dimension s because it
allows them to derive convergence rates of order nโ1/s (matching the nโ1/D rate achieved on the
unit cube [0, 1]D ). Our general upper bounds as a function of covering number are somewhat easier
to apply than those of Weed and Bach (2017), and we use these in Section 7 to derive convergence
rates even in high-dimensional cases (where D โ โ as n โ โ) or infinite dimensional cases.
To the best of our knowledge, there has been no work on deriving minimax lower bounds for
distribution estimation under Wasserstein loss. As noted above, most previous works have focused
on studying convergence rate of the empirical distribution to the true distribution in Wasserstein distance. For this rate, several lower bounds have been established, matching known upper bounds in
many quite general cases. However, many distribution estimators besides the empirical distribution
can be considered. For example, it is tempting (especially given the infinite dimensionality of the
distribution to be estimated) to try to reduce variance by techniques such as smoothing or importance sampling (Bucklew, 2013). However, our lower bound results, given in Section 6, imply that
the empirical distribution is already minimax optimal, up to constant factors, in many cases.
4. Preliminary Lemmas
We begin by providing a few basic lemmas; these lemmas are not fundamentally novel, but they
will be used in the subsequent proofs of our main upper and lower bounds, and also help provide
intuition for the behavior of the Wasserstein metric and its connections to other metrics between
probability distributions. Our first lemma relates Wasserstein distance to the notion of resolution of
a partition.
Lemma 7 Suppose S โ S is a countable Borel partition of โฆ. Let P and Q be Borel probability
measures such that, for every S โ S, P (S) = Q(S). Then, for any r โฅ 1, Wr (P, Q) โค Res(S).
Our next lemma gives simple lower and upper bounds on the Wasserstein distance between distributions supported on a countable subset X โ โฆ, in terms of Diam(X ) and Sep(X ). Since our
main results will utilize coverings and packings to approximate โฆ by finite sets, this lemma will
provide a first step towards approximating (in Wasserstein distance) distributions on โฆ by distributions on these finite sets. Indeed, the lower bound in Inequality (3) will suffice to prove our lower
bounds, although a tighter upper bound, based on the upper bound in (3), will be necessary to obtain
tight upper bounds.
Lemma 8 Suppose (โฆ, ฯ) is a metric space, and suppose P and Q are Borel probability distributions on โฆ with countable support; i.e., there exists a countable set X โ โฆ with P (X ) = Q(X ) = 1.
Then, for any r โฅ 1,
X
X
|P ({x}) โ Q({x})| . (3)
|P ({x}) โ Q({x})| โค Wrr (P, Q) โค (Diam(X ))r
(Sep(X ))r
xโX
xโX
5
D ISTRIBUTION E STIMATION
Remark 9 Recall that the term
P
IN
WASSERSTEIN D ISTANCE
|P ({x}) โ Q({x})| in Inequality (3) is the L1 distance
X
kp โ qk1 :=
|p(x) โ q(x)|
xโX
xโX
between the densities p and q of P and Q with respect to the counting measure on X , and that this
same quantity is twice the total variation distance
T V (P, Q) := sup |P (A) โ Q(A)| .
Aโโฆ
Hence, Lemma 8 can be equivalently written as
Sep(โฆ) (kp โ qk1 )1/r โค Wr (P, Q) โค Diam(โฆ) (kp โ qk1 )1/r
and as
Sep(โฆ) (2T V (P, Q))1/r โค Wr (P, Q) โค Diam(โฆ) (2T V (P, Q))1/r ,
bounding the r-Wasserstein distance in terms of the L1 and total variation distance. As noted in
Example 1, equality holds in (3) precisely when ฯ is the unit discrete metric given by ฯ(x, y) =
1{x6=y} for all x, y โ โฆ.
On metric spaces that are discrete (i.e., when Sep(โฆ) > 0), the Wasserstein metric is (topologically) at least as strong as the total variation metric (and the L1 metric, when it is well-defined),
in that convergence in Wasserstein metric implies convergence in total variation (and L1 , respectively). On the other hand, on bounded metric spaces, the converse is true. In either of these cases,
rates of convergence may differ between metrics, although, in metric spaces that are both discrete
and bounded (e.g., any finite space), we have Wr โ T V 1/r .
While Lemma 8 gave a simple upper bound on the Wasserstein distance, the factor of Diam(โฆ)
turns out to be too large to obtain tight rates for a number of cases of interest (such as the Ddimensional unit cube โฆ = [0, 1]D , discussed in Example 2). The following lemma gives a tighter
upper bound, based on a hierarchy of nested partitions of โฆ; this allows us to obtain tighter bounds
(than Diam(โฆ)) on the distance that mass must be transported between P and Q. Note that, when
K = 1, Lemma 10 reduces to a trivial combination of Lemmas 7 and 8; indeed, these lemmas are
the starting point for proving Lemma 10 by induction on K.
Note that the idea of such a โmulti-resolutionโ upper bound has been utilized extensively before,
and numerous versions have been proven before (see, e.g., Fact 6 of Do Ba et al. (2011), Lemma 6
of Fournier and Guillin (2015), or Proposition 1 of Weed and Bach (2017)). However, most of these
versions have been specific to Euclidean space; to the best of our knowledge, only Proposition 1 of
Weed and Bach (2017) applies to general metric spaces.
Lemma 10 Let K be a positive integer. Suppose {Sk }kโ[K] is a nested sequence of countable Borel
partitions of (โฆ, ฯ), with S0 = โฆ. Then, for any r โฅ 1 and Borel probability measures P and Q on
โฆ,
๏ฃซ
๏ฃถ
K
X
X
Wrr (P, Q) โค (Res(SK ))r +
|P (S) โ Q(S)|๏ฃธ .
(Res(Skโ1 ))r ๏ฃญ
(4)
SโSk
k=1
6
D ISTRIBUTION E STIMATION
WASSERSTEIN D ISTANCE
IN
Lemma 10 requires a sequence of partitions of โฆ that is not only multi-resolution but also
nested. While the ฮต-covering number implies the existence of small partitions with small resolution,
these partitions need not be nested as ฮต becomes small. For this reason, we now give a technical
lemma that, given any sequence of partitions, constructs a nested sequence of partitions of the same
cardinality, with only a small increase in resolution.
Lemma 11 Suppose S and T are partitions of (โฆ, ฯ), and suppose S is countable. Then, there
exists a partition S โฒ of (โฆ, ฯ) such that:
a) |S โฒ | โค |S|.
b) Res(S โฒ ) โค Res(S) + 2 Res(T ).
c) T is a refinement of S โฒ
5. Upper Bounds
In this section, we utilize the covering number bounds from the previous section to develop error
bounds for density estimation using the empirical distribution under Wasserstein loss.
5.1. Expectation Bounds
Here, we use Lemmas 10 and 11 to prove bounds on the expected Wasserstein distance between the
empirical and true distributions. We begin with a simple technical lemma bounding the expected L1
deviation of a multinomial random variable from its mean.
Lemma 12 Suppose (X1 , ..., XK ) โผ Multinomial(n, p1 , ..., pK ). Let
Z := kX โ pk1 =
Then, E [Z/n] โค
p
K
X
k=1
|Xk โ pk | .
21K/n.
Theorem 13 Let (โฆ, ฯ) be a metric space on which P is a Borel probability measure. Let Pb denote
IID
the empirical distribution of n IID samples X1 , ..., Xn โผ P , give by
n
1X
Pb(S) :=
1{Xi โS} ,
n
i=1
โS โ ฮฃ.
Then, for any sequence {ฮตk }kโ[K] โ (0, โ)K with ฮต0 = Diam(โฆ),
๏ฃซ
๏ฃถr
r
K
K
i
X
X
p
21
r
r
๏ฃญ
2jโk ฮตj ๏ฃธ
N (ฮตk ).
E Wr (P, Pb) โค ฮตK +
n
h
k=1
7
j=kโ1
D ISTRIBUTION E STIMATION
IN
WASSERSTEIN D ISTANCE
Proof By recursively applying Lemma 11, there exists a sequence {Sk }kโ[K] of partitions of (โฆ, ฯ)
satisfying the following conditions:
1. for each k โ [K], |Sk | = N (ฮตk ).
2. for each k โ [K], Res(Sk ) โค
K
X
2jโk ฮตj .
j=k
3. {Sk }kโ[K] is nested.
Note that, for any k โ [K], the vector nPb(S) (indexed by S โ Sk ) follows an n-multinomial
distribution over |Sk | categories, with means given by P (S); i.e.,
(nPb(S1 ), ..., nPb(Sk )) โผ Multinomial(n, P (S1 ), ..., P (Sk )).
Thus, by Lemma 12, for each k โ [K],
๏ฃฎ
๏ฃน r
r
X
21|S
|
21N (ฮตk )
k
P (S) โ Pb(S) ๏ฃป โค
=
.
E๏ฃฐ
n
n
SโSk
Thus, by Lemma 10,
๏ฃฎ
r
r
E [Wr (P, Q)] โค E ๏ฃฐฮตK +
โค ฮตrK +
K
X
k=1
K
X
k=1
๏ฃซ
๏ฃญ
K
X
j=k
๏ฃถr ๏ฃซ
2jโk ฮตj ๏ฃธ ๏ฃญ
X
SโSk
๏ฃถ๏ฃน
|P (S) โ Q(S)|๏ฃธ๏ฃป
๏ฃซ
๏ฃถr ๏ฃฎ
๏ฃน
K
X
X
๏ฃญ
2jโk ฮตj ๏ฃธ E ๏ฃฐ
|P (S) โ Q(S)|๏ฃป
SโSk
j=k
๏ฃซ
๏ฃถr
r
K
K
X
X
p
21
๏ฃญ
N (ฮตk )
2jโk ฮตj ๏ฃธ
โค ฮตrK +
n
k=1
j=k
6. Lower Bounds
In this section, we prove minimax lower bounds (over the family P of all densities on the metric
space (โฆ, ฯ)) for density estimation in Wasserstein distance (that is, the quantity
i
h
(5)
Wrr P, Pb ,
inf sup
E
Pb P โP X1 ,...,Xn IID
โผ P
where the infimum is over all estimators Pb of P (i.e., all functions Pb : โฆn โ P)). Our bounds are
in terms of the packing radius R of (โฆ, ฯ).
8
D ISTRIBUTION E STIMATION
IN
WASSERSTEIN D ISTANCE
Theorem 14 Suppose P โ P is an unknown Borel probability measure on (โฆ, ฯ), and suppose we
IID
observe n IID samples X1 , ..., Xn โผ P . Then, there exists a universal constant CHJW > 0 such
that
r
h
i
kโ1
r
r
Wr (P, Pb) โฅ CHJW sup R (k)
inf sup
.
E
n
Pb P โP X ,...,X IID
kโ[n]
โผ P
1
n
Proof Our proof is based on a reduction to a minimax lower bound for estimating the mean parameter vector of a multinomial distribution in L1 norm. Specifically, we will use Corollary 4 of
Han et al. (2015), which implies the existence of a universal constant CHJW > 0 (independent of n)
such that, for any k โค n,
r
kโ1
,
p(X1 , ..., Xn ) โ pk1 ] โฅ CHJW
inf sup
E [kb
n
pb pโโk X1 ,...,Xn
where
โk :=
๏ฃฑ
๏ฃฒ
๏ฃณ
p โ [0, 1]k :
k
X
j=1
๏ฃผ
๏ฃฝ
pj = 1
๏ฃพ
denotes the standard (k โ 1)-dimensional probability simplex, X1 , ..., Xn โ [k] are distributed IID
according to a multinomial distribution with parameter vector p โ โk , and the infimum is taken
over all estimators pb of p (i.e., all functions pb : [k]n โ โk ).
For some k โค n, let PD denote the class of discrete distributions over an R(k)-packing D of
(โฆ, ฯ) with |D| = k. Then, Corollary 4 of Han et al. (2015) implies that
r
i
h
|D| โ 1
kPb (X1 , ..., Xn ) โ P k1 โฅ CHJW
,
inf sup
E
n
Pb pโPD X1 ,...,Xn
where the infimum is taken over all estimators Pb of P (i.e., all functions Pb : โฆn โ P).
Recalling Lemma 8 (which implies (Sep(D))r kPb โ P k1 โค Wrr (P, Pb)), we have
i
h
h
i
inf sup E Wrr (Pb, P ) โฅ (Sep(D))r inf sup E kPb โ P k1
Pb P โP
Pb P โP
i
h
โฅ (Sep(D))r inf sup E kPb โ P k1
Pb P โPD
r
|D| โ 1
r
โฅ CHJW (Sep(D))
n
r
kโ1
โฅ CHJW Rr (k)
.
n
The theorem follows by taking the supremum over k โค n on both sides.
9
(6)
D ISTRIBUTION E STIMATION
IN
WASSERSTEIN D ISTANCE
7. Example Applications
We conclude by exploring applications of our results for several metric spaces (โฆ, ฯ). In each of the
following examples, P is an unknown Borel probability measure over the specified โฆ, from which
we observe n IID samples. For upper bounds, Pb denotes the empirical distribution of these samples.
Example 1 (Finite Space) Consider the case where โฆ is a finite set, over which ฯ is the discrete
metric given, for some ฮด > 0, by
ฯ(x, y) = ฮด1{x=y} ,
x, y โ โฆ.
for all
Then, for any ฮต โ (0, ฮด), the covering number is N (ฮต) = |โฆ|. Thus, setting K = 1 and sending
ฮต1 โ 0 in Theorem 13 gives
r
h
i
21|โฆ|
r
r
b
.
E Wr (P, P ) โค ฮด
n
On the other hand, for any k โค |โฆ|, R(k) = ฮด, while, for k > |โฆ|, R(k) = 0. Thus, setting
k = |โฆ| in Theorem 14 gives
r
h
i
|โฆ| โ 1
r
r
b
.
Wr (P, P ) โฅ CHJW ฮด
inf sup
E
n
Pb P โP X ,...,X IID
โผ P
1
n
Example 2 (Unit Cube, Euclidean Metric) Consider the case where โฆ = [0, 1]D is the unit cube
and ฯ is the Euclidean metric. Suppose P is a Borel probability measure on (โฆ, ฯ), and let Pb
denote the empirical distribution of n IID samples from P . Setting ฮตk := 2โ2k and recalling that
N (ฮต) โค (2D)D ฮตโD , one can show that Theorem 13 gives
r
K
h
i
21(2D)D X k(Dโ2r)
r
โ2Kr
r+1
b
2
W
(P,
P
)
โค
2
+
2
E
r
n
k=1
If D = 2r, then this gives
E
and setting K โ
1
4r
h
i
Wrr (P, Pb )
โ2Kr
โค2
r+1
+2
r
21(2D)D
K,
n
h
i
log n gives the rate E Wrr (P, Pb) . nโ1/2 log n. Otherwise, if D 6= 2r, then
h
i
r
21(2D)D 2K(Dโ2r) โ 1
n
2Dโ2r โ 1
i
h
For 2r > D, sending K โ โ gives a rate of E Wrr (P, Pb) . nโ1/2 . For 2r < D, setting
i
h
r
1
K โ 2D
log n gives a rate of E Wrr (P, Pb) . nโ D . To summarize
E
Wrr (P, Pb)
โ2Kr
โค2
D+1
+2
๏ฃฑ โ1/2
i ๏ฃฒ n
r
nโ1/2 log n
E Wr (P, Pb) .
๏ฃณ โr/D
n
h
10
if 2r > D
if 2r = D
if 2r < D
D ISTRIBUTION E STIMATION
IN
WASSERSTEIN D ISTANCE
(reproducing results of Fournier and Guillin (2015)). On the
โ other hand, it is easy to check that
the packing radius R satisfies R(n) โฅ nโ1/D and R(2) โฅ D. Thus, applying Theorem 14 with
k = n and k = 2, we have
o
h
i
n
inf sup E Wrr (Pb, P ) โฅ CHJW max (n + 1)โr/D , D r/2 nโ1/2 .
Pb P โP
Combining these upper and lower bounds gives that the minimax rate for density estimation over P
in the loss Wrr is
h
i nโ1/2 if 2r > D
r b
inf sup E Wr (P , P ) โ
nโr/D if 2r < D
Pb P โP
(except for the case 2r = D, when our upper and lower bounds are separated by a factor of log n).
Moreover, this rate is achieved by using the empirical distribution to estimate P .
We now consider a high dimensional problem, where the size of โฆ can grow with n.
Example 3 (Binary Hypercube, Hamming Metric) Suppose โฆ = {0, 1}D is the P
D-dimensional
binary hypercube, and suppose ฯ is the Hamming metric given by ฯฮด (x, y) = ฮด D
j=1 1{xi 6=yi } .
Then, the covering number can easily be upper bounded for ฮต โ [D] by N (ฮต) โค 2Dโฮต . Thus,
setting K = 1 and sending ฮต1 โ 0 in Theorem 13 gives
r
h
i
21
r
r D
.
E Wr (P, Pb ) โค D 2
n
The famous Varshamov-Gilbert bound (see, e.g., Lemma
25.12 of Rigollet (2015)) can be interpreted as the statement that, for any ฮณ โ (0, 1/2), R โeฮณ D โ โฅ 21 โ ฮณ Dฮด. Thus, setting
p
2
k = โeฮณ D โ (so that k โค n as long as ฮณ โค
(1/D) log n) in Theorem 14 and applying the
Varshamov-Gilbert bound gives
s
r
h
i
1
โeฮณ 2 D โ โ 1
โ
ฮณ
Dฮด
.
Wrr (P, Pb) โฅ CHJW
sup
inf sup
E
q
2
n
Pb P โP X ,...,X IID
log n
1
โผ P
1
n
ฮณโ 0,min
2
,
D
To summarize, in the high-dimensional case where D, n โ โ, consistent estimation is possible if
D log D โ o(log n) and only if D โ o(log n).
Finally, we consider distributions over an infinite dimensional space of smooth functions.
Example 4 (Hoฬlder Ball, Lโ Metric) Suppose that, for some ฮฑ โ (0, 1],
โฆ := f [0, 1]D โ [โ1, 1]
โx, y โ [0, 1]D , |f (x) โ f (y)| โค kx โ ykฮฑ2
is the class of unit ฮฑ-Hoฬlder functions on the unit cube and ฯ is the Lโ -metric given by
ฯ(f, g) =
sup |f (x) โ g(x)|,
xโ[0,1]D
11
for all f, g โ โฆ.
D ISTRIBUTION E STIMATION
IN
WASSERSTEIN D ISTANCE
The covering and packing numbers of (โฆ, ฯ) are well-known to be of order exp ฮตโD/ฮฑ (DeVore and Lorentz,
1993); specifically, there exist positive constants 0 < c1 < c2 such that, for all ฮต โ (0, 1),
c1 exp ฮตโD/ฮฑ โค N (ฮต) โค M (ฮต) โค c2 exp ฮตโD/ฮฑ .
It also follows from Inequality (2) that, for all k โ N,
R(k) โฅ
1
log(k/c1 )
ฮฑ
D
.
Since Diam(โฆ) = 2, setting K = 1 and
ฮต1 =
in Theorem 13 gives
E
h
D
2D log n โ ฮฑr log log n
i
Wrr (P, Pb )
.
1
log n
ฮฑr
ฮฑr
D
D
.
On the other hand, setting k = n in Theorem 14 gives
inf sup
Pb P โP X
1
ฮฑr
h
i 1
D
1
r
Wr (P, Pb ) โฅ
,
E
2 log(n/c1 )
IID
,...,X โผ P
n
โฮฑr
showing that distribution estimation over (P, Wrr ) has the extremely slow minimax rate (log n) D .
Although we considered only ฮฑ โ (0, 1] (due to the notational complexity of defining higher-order
Hoฬlder spaces), analogous rates hold for all ฮฑ > 0. Also, since our rates depend only on covering
and packing numbers of โฆ, identical rates can be derived for related Sobolev and Besov classes.
One might wonder why we are interested studying Wasserstein convergence of distributions
over spaces of smooth functions, as in Example 4. Our main motivation comes from the fact that,
historically, smooth function spaces have been widely used for modeling images and other complex
naturalistic signals (Mallat, 1999; Peyreฬ, 2011). Far more recently, empirical breakthroughs have
been made in generative modeling, particularly of images, based on the principle of minimizing
Wasserstein distance between the empirical distribution and a large class of models encoded by a
deep neural network (Montavon et al., 2016; Arjovsky et al., 2017; Gulrajani et al., 2017).
However, little is known about the theoretical properties of these methods; while there has
been some work studying the optimization landscape of such models (Nagarajan and Kolter, 2017),
we know of no work exploring their statistical properties. Given the extremely slow minimax
convergence rate we derived above, it must be the case that the class of distributions encoded by
such models is far smaller or sparser than P. An important avenue for further work is thus to
explicitly identify stronger assumptions that can be made on distributions over interesting classes
of signals, such as images, to bridge the gap between empirical performance and our theoretical
understanding.
12
D ISTRIBUTION E STIMATION
IN
WASSERSTEIN D ISTANCE
8. Conclusion
In this paper, we derived upper and lower bounds for distribution estimation under Wasserstein loss.
Our upper bounds generalize prior results and are tighter in certain cases, while our lower bounds
are, to the best of our knowledge, the first minimax lower bounds for this problem. We also provided
several simple examples for which our upper and lower bounds agree.
8.1. Future Work
We studied only minimax rates over the entire class P of all distributions on the metric space (โฆ, ฯ).
It would be useful to understand how minimax rates improve when additional assumptions, such as
smoothness or finite-moment assumptions are made (see Fournier and Guillin (2015) for somewhat
improved upper bounds under finite-moment assumptions when (โฆ, ฯ) is Euclidean space). Given
the rather slow convergence rates we found over P in many cases, studying minimax rates under
assumptions may help to explain the relatively favorable empirical performance of popular distribution estimators based on empirical risk minimization in Wasserstein loss. Moreover, while rates over
all of P are of interest only for very weak metrics such as the Wasserstein distance (as stronger metrics may be infinite or undefined), studying minimax rates under additional assumptions will allow
for a better understanding of the Wasserstein metric in relation to other commonly used metrics.
Acknowledgments
This work was partly supported by a NSF Graduate Research Fellowship DGE-1252522 to S.S. and
by NSF IIS-1563887, Darpa D3M program, and AFRL grants to B.P..
References
Mikloฬs Ajtai, Jaฬnos Komloฬs, and Gaฬbor Tusnaฬdy. On optimal matchings. Combinatorica, 4(4):
259โ264, 1984.
Syed Mumtaz Ali and Samuel D Silvey. A general class of coefficients of divergence of one distribution from another. Journal of the Royal Statistical Society. Series B (Methodological), pages
131โ142, 1966.
Martin Arjovsky, Soumith Chintala, and Leฬon Bottou.
arXiv:1701.07875, 2017.
Wasserstein GAN.
arXiv preprint
Amparo Baฤฑฬllo, Javier Caฬrcamo, and Konstantin V Getman. The estimation of Wasserstein and
Zolotarev distances to the class of exponential variables. arXiv preprint arXiv:1603.06806, 2016.
Federico Bassetti, Antonella Bodini, and Eugenio Regazzini. On minimum Kantorovich distance
estimators. Statistics & probability letters, 76(12):1298โ1302, 2006.
Espen Bernton, Pierre E Jacob, Mathieu Gerber, and Christian P Robert. Inference in generative
models using the Wasserstein distance. arXiv preprint arXiv:1701.05146, 2017.
Emmanuel Boissard, Thibaut Le Gouic, et al. On the mean speed of convergence of empirical and
occupation measures in Wasserstein distance. In Annales de lโInstitut Henri Poincareฬ, Probabiliteฬs et Statistiques, volume 50, pages 539โ563. Institut Henri Poincareฬ, 2014.
13
D ISTRIBUTION E STIMATION
IN
WASSERSTEIN D ISTANCE
Emmanuel Boissard, Thibaut Le Gouic, Jean-Michel Loubes, et al. Distributions template estimate
with wasserstein metrics. Bernoulli, 21(2):740โ759, 2015.
James Bucklew. Introduction to rare event simulation. Springer Science & Business Media, 2013.
Sourav Chatterjee et al. A new method of normal approximation. The Annals of Probability, 36(4):
1584โ1610, 2008.
Louis HY Chen, Larry Goldstein, and Qi-Man Shao. Normal approximation by Steins method.
Springer Science & Business Media, 2010.
Imre Csiszaฬr. Eine informationstheoretische ungleichung und ihre anwendung auf beweis der ergodizitaet von markoffschen ketten. Magyer Tud. Akad. Mat. Kutato Int. Koezl., 8:85โ108, 1964.
Eustasio del Barrio, Evarist Gineฬ, and Carlos Matraฬn. Central limit theorems for the Wasserstein
distance between the empirical and the true distributions. Annals of Probability, pages 1009โ
1071, 1999.
Eustasio del Barrio, Evarist Gineฬ, Carlos Matraฬn, et al. Correction: Central limit theorems for the
Wasserstein distance between the empirical and the true distributions. The Annals of Probability,
31(2):1142โ1143, 2003.
Steffen Dereich, Michael Scheutzow, Reik Schottstedt, et al. Constructive quantization: Approximation by empirical measures. In Annales de lโInstitut Henri Poincareฬ, Probabiliteฬs et Statistiques, volume 49, pages 1183โ1203. Institut Henri Poincareฬ, 2013.
Ronald A DeVore and George G Lorentz. Constructive approximation, volume 303. Springer
Science & Business Media, 1993.
Luc Devroye. The equivalence of weak, strong and complete convergence in L1 for kernel density
estimates. The Annals of Statistics, pages 896โ904, 1983.
Khanh Do Ba, Huy L Nguyen, Huy N Nguyen, and Ronitt Rubinfeld. Sublinear time algorithms for
earth movers distance. Theory of Computing Systems, 48(2):428โ442, 2011.
Joseph L Doob. Measure theory, volume 143. Springer Science & Business Media, 2012.
Richard M Dudley. The sizes of compact subsets of hilbert space and continuity of gaussian processes. Journal of Functional Analysis, 1(3):290โ330, 1967.
RM Dudley. The speed of mean Glivenko-Cantelli convergence. The Annals of Mathematical
Statistics, 40(1):40โ50, 1969.
Peyman Mohajerin Esfahani and Daniel Kuhn. Data-driven distributionally robust optimization using the wasserstein metric: Performance guarantees and tractable reformulations. arXiv preprint
arXiv:1505.05116, 2015.
Nicolas Fournier and Arnaud Guillin. On the rate of convergence in Wasserstein distance of the
empirical measure. Probability Theory and Related Fields, 162(3-4):707โ738, 2015.
14
D ISTRIBUTION E STIMATION
IN
WASSERSTEIN D ISTANCE
Rui Gao and Anton J Kleywegt. Distributionally robust stochastic optimization with wasserstein
distance. arXiv preprint arXiv:1604.02199, 2016.
Ishaan Gulrajani, Faruk Ahmed, Martin Arjovsky, Vincent Dumoulin, and Aaron C Courville. Improved training of wasserstein gans. In Advances in Neural Information Processing Systems,
pages 5769โ5779, 2017.
Yanjun Han, Jiantao Jiao, and Tsachy Weissman. Minimax estimation of discrete distributions under
โ1 loss. IEEE Transactions on Information Theory, 61(11):6343โ6354, 2015.
David Haussler. Sphere packing numbers for subsets of the boolean n-cube with bounded vapnikchervonenkis dimension. Journal of Combinatorial Theory, Series A, 69(2):217โ232, 1995.
Nhat Ho, XuanLong Nguyen, Mikhail Yurochkin, Hung Hai Bui, Viet Huynh, and Dinh Phung.
Multilevel clustering via wasserstein means. arXiv preprint arXiv:1706.03883, 2017.
Oliver Johnson, Richard Samworth, et al. Central limit theorem and convergence to stable laws in
mallows distance. Bernoulli, 11(5):829โ845, 2005.
Matt Kusner, Yu Sun, Nicholas Kolkin, and Kilian Weinberger. From word embeddings to document
distances. In International Conference on Machine Learning, pages 957โ966, 2015.
Steฬphane Mallat. A wavelet tour of signal processing. Academic press, 1999.
Greฬgoire Montavon, Klaus-Robert Muฬller, and Marco Cuturi. Wasserstein training of restricted
Boltzmann machines. In Advances in Neural Information Processing Systems, pages 3718โ3726,
2016.
Tetsuzo Morimoto. Markov processes and the H-theorem. Journal of the Physical Society of Japan,
18(3):328โ331, 1963.
Vaishnavh Nagarajan and J Zico Kolter. Gradient descent GAN optimization is locally stable. arXiv
preprint arXiv:1706.04156, 2017.
Kangyu Ni, Xavier Bresson, Tony Chan, and Selim Esedoglu. Local histogram based segmentation
using the wasserstein distance. International journal of computer vision, 84(1):97โ111, 2009.
Gabriel Peyreฬ. The numerical tours of signal processing. Computing in Science & Engineering, 13
(4):94โ97, 2011.
Matthias Reitzner, Matthias Schulte, et al. Central limit theorems for u-statistics of poisson point
processes. The Annals of Probability, 41(6):3879โ3909, 2013.
Phillippe Rigollet. High-dimensional statistics. Lecture notes for course 18S997, 2015.
Emmanuel Rio et al. Upper bounds for minimal distances in the central limit theorem. In Annales de
lโInstitut Henri Poincareฬ, Probabiliteฬs et Statistiques, volume 45, pages 802โ817. Institut Henri
Poincareฬ, 2009.
Emmanuel Rio et al. Asymptotic constants for minimal distance in the central limit theorem. Electronic Communications in Probability, 16:96โ103, 2011.
15
D ISTRIBUTION E STIMATION
IN
WASSERSTEIN D ISTANCE
Yossi Rubner, Carlo Tomasi, and Leonidas J Guibas. The earth moverโs distance as a metric for
image retrieval. International journal of computer vision, 40(2):99โ121, 2000.
Ludger Ruฬschendorf. The wasserstein distance and approximation theorems. Probability Theory
and Related Fields, 70(1):117โ129, 1985.
Roman Sandler and Michael Lindenbaum. Nonnegative matrix factorization with earth moverโs
distance metric for image analysis. IEEE Transactions on Pattern Analysis and Machine Intelligence, 33(8):1590โ1602, 2011.
Justin Solomon, Fernando De Goes, Gabriel Peyreฬ, Marco Cuturi, Adrian Butscher, Andy Nguyen,
Tao Du, and Leonidas Guibas. Convolutional wasserstein distances: Efficient optimal transportation on geometric domains. ACM Transactions on Graphics (TOG), 34(4):66, 2015.
Ceฬdric Villani. Optimal transport: old and new, volume 338. Springer Science & Business Media,
2008.
Jonathan Weed and Francis Bach. Sharp asymptotic and finite-sample rates of convergence of
empirical measures in Wasserstein distance. arXiv preprint arXiv:1707.00087, 2017.
Meng Zhang, Yang Liu, Huan-Bo Luan, Maosong Sun, Tatsuya Izuha, and Jie Hao. Building earth
moverโs distance on bilingual word embeddings for machine translation. In AAAI, pages 2870โ
2876, 2016.
Tong Zhang. Covering number bounds of certain regularized linear function classes. Journal of
Machine Learning Research, 2(Mar):527โ550, 2002.
Ding-Xuan Zhou. The covering number in learning theory. Journal of Complexity, 18(3):739โ767,
2002.
16
D ISTRIBUTION E STIMATION
IN
WASSERSTEIN D ISTANCE
Appendix A. Proofs of Lemmas
Lemma 7 Suppose S โ S is a countable Borel partition of โฆ. Let P and Q be Borel probability
measures such that, for every S โ S, P (S) = Q(S). Then, for any r โฅ 1, Wr (P, Q) โค Res(S).
Proof This fact is intuitively obvious; clearly, there exists a transportation map ยต from P to Q that
moves mass only within each S โ S and therefore without moving any mass further than ฮด. For
completeness, we give a formal construction.
Let ยต : ฮฃ2 โ [0, 1] denote the coupling that is conditionally independent given any set S โ S
with P (S) = Q(S) > 0 (that is, for any A, B โ ฮฃ, ยต(AรB โฉS รS)P (S) = P (AโฉS)Q(B โฉS)).4
It
S is easy to verify that ยต โ C(P, Q). Since S is a countable partition and ยต is only supported on
SโS S ร S,
Wr (P, Q) โค
Z
โฆรโฆ
XZ
=
SโS
XZ
โค
SโS
=ฮด
1/r
ฯ (x, y) dยต(x, y)
r
X
SโS
!1/r
r
ฯ (x, y) dยต(x, y)
SรS
!1/r
r
ฮด dยต(x, y)
SรS
!1/r
ยต(S ร S)
=ฮด
X P (S)Q(S)
P (S)
SโS
!1/r
=ฮด
X
!1/r
Q(S)
SโS
= ฮด.
Lemma 8 Suppose (โฆ, ฯ) is a metric space, and suppose P and Q are Borel probability distributions on โฆ with countable support; i.e., there exists a countable set X โ โฆ with P (X ) = Q(X ) = 1.
Then, for any r โฅ 1,
X
X
|P ({x}) โ Q({x})| .
|P ({x}) โ Q({x})| โค Wrr (P, Q) โค (Diam(X ))r
(Sep(X ))r
xโX
xโX
P
Proof The term xโX |P ({x}) โ Q({x})| = T V (P, Q) is precisely the (unweighted) amount
of mass that must be transported to transform between P and Q. Hence, the result is intuitively
fairly obvious; all mass moved has a cost of at least Sep(โฆ) and at most Diam(โฆ). However, for
completeness, we give a more formal proof below.
To prove the lower bound, suppose ยต โ ฮ (P, Q) is any coupling between P and Q. For x โ X ,
ยต({x} ร {x}) + ยต({x} ร (โฆ\{x})) = ยต({x} ร โฆ) = P ({x})
and, similarly,
ยต({x} ร {x}) + ยต((โฆ\{x}) ร {x}) = ยต(โฆ ร {x}) = Q({x}).
4. The existence of such a measure can be verified by the Hahn-Kolmogorov theorem, similarly to that of the usual
product measure (see, e.g., Section IV.4 of Doob (2012)).
17
D ISTRIBUTION E STIMATION
IN
WASSERSTEIN D ISTANCE
Since P ({x}), Q({x}) โ [0, 1], it follows that
ยต({x} ร (โฆ\{x})) + ยต(ยต((โฆ\{x}) ร {x})) โฅ |P ({x} โ Q({x})| .
Therefore, since ฯ(x, y) = 0 whenever x = y and ฯ(x, y) โฅ Sep(โฆ) whenever x 6= y,
Z
Z
ฯr (x, y) dยต(x, y)
ฯr (x, y) dยต(x, y) =
X รX
โฆรโฆ
Z
XZ
r
ฯr (x, y) dยต(x, y)
ฯ (x, y) dยต(x, y) +
=
xโX
{x}ร(โฆ\{x})
โฅ (Sep(โฆ))r
r
โฅ (Sep(โฆ))
X
xโX
X
xโX
(โฆ\{x})ร{x}
ยต({x} ร (โฆ\{x})) + ยต((โฆ\{x}) ร {x})
|P ({x}) โ Q({x})| .
Taking the infimum over ยต on both sides gives
X
|P ({x}) โ Q({x})| โค Wrr (P, Q).
(Sep(โฆ))r
xโX
To prove the upper bound, since ฯ is upper bounded by Diam(โฆ), it suffices to construct a coupling
ยต that only moves mass into or out of each given point, but not both; that is, for each x โ X ,
min{ยต({x} ร (โฆ\{x})), ยต((โฆ\{x}) ร {x})} = 0.
One way of doing this is as follows. Fix an ordering x1 , x2 , ... of the elements of X . For each i โ N,
define
i
i
X
X
Xi :=
(P (xโ ) โ Q(xโ ))+ and Yi :=
(Q(xโ ) โ P (xโ ))+ ,
โ=1
โ=1
and further define
ji := min{j โ N : Xi โค Yj }
and
ki := min{k โ N : Xj โฅ Yi }.
Then, for each i โ N, move Xi mass from {x1 , ..., xi } to {y1 , ..., yji } and move Yi mass from
{y1 , ..., yi } to {x1 , ..., xki }. As i โ โ, by construction of Xi and Yi , the total mass moved in this
way is
X
|P (x) โ Q(x)| .
ยต((X ร X )\{(x, x) : x โ X }) = lim Xi + Yi =
iโโ
xโX
Lemma 10 Let K be a positive integer. Suppose {Sk }kโ[K] is a sequence of nested countable Borel
partitions of (โฆ, ฯ), with S0 = โฆ. Then, for any r โฅ 1 and any Borel probability distributions P
and Q on โฆ,
๏ฃถ
๏ฃซ
K
X
X
(Res(Skโ1 ))r ๏ฃญ
Wrr (P, Q) โค (Res(SK ))r +
|P (S) โ Q(S)|๏ฃธ .
SโSk
k=1
18
D ISTRIBUTION E STIMATION
IN
WASSERSTEIN D ISTANCE
Proof Our proof follows the same ideas as and slightly generalizes of the proof of Proposition 1 in
Weed and Bach (2017). Intuitively, to prove Lemma 10 it suffices to find a transportation map such
that For each k โ [K], recursively define
Pk := P โ
kโ1
X
ยตk
and
j=0
Qk := Q โ
kโ1
X
ฮฝk ,
j=0
where, for each k โ [K], ยตk and ฮฝk are Borel measures on โฆ defined for any E โ ฮฃ by
ยตk (E) :=
X
(Pk (S) โ Qk (S))+
Pk (E โฉ S)
Pk (S)
X
(Qk (S) โ Pk (S))+
Qk (E โฉ S)
.
Qk (S)
SโSk :Pk (S)>0
and
ฮฝk (E) :=
SโSk :Qk (S)>0
P
By construction of ยตk and ฮฝk , each ยตk and ฮฝk is a non-negative measure and K
k=1 ยตk โค P and
PK
k=1 ฮฝk โค Q. Furthermore, for each k โ [K โ 1], for each S โ Sk , ยตk+1 (S) = ฮฝk+1 (S), and
X
|P (S) โ Q(S)| .
ยตk (โฆ) = ฮฝk (โฆ) โค
SโSk
Consequently, although ยต and ฮฝ are not probability measures, we can slightly generalize the definition of Wasserstein distance by writing
Wrr (ยตk , ฮฝk ) := ยต(โฆ)
ฯ โฮ
inf
ฮฝ
ยตk
, k
ยตk (โฆ) ฮฝk (โฆ)
[ฯr (X, Y )]
E
(X,Y )โผยต
(or Wrr (ยตk , ฮฝk ) = 0 if ยตk = ฮฝk = 0). In particular, this is convenient because we one can easily
show that, by construction of the sequences {Pk }kโ[K] and {Qk }kโ[K] ,
Wrr (P, Q) โค Wrr (PK , QK ) +
For each k โ [K], Lemma 8 implies that
X
Wrr (ยตk , ฮฝk ) โค
(Diam(S))r
SโSkโ1
โค (Res(Skโ1 ))
r
= (Res(Skโ1 ))
r
X
K
X
Wrr (ยตk , ฮฝk ) .
k=1
X
T โSk :T โS
|P (T ) โ Q(T )|
X
SโSkโ1 T โSk :T โS
X
T โSk
|P (T ) โ Q(T )| .
Furthermore, for each S โ SK , PK = QK , Lemma 7 gives that
Wrr (PK , QK ) โค (Res(SK ))r
19
|P (T ) โ Q(T )|
(7)
D ISTRIBUTION E STIMATION
IN
WASSERSTEIN D ISTANCE
Plugging these last two inequalities into Inequality (7) gives the desired result:
Wrr (P, Q)
r
โค (Res(SK )) +
K
X
(Res(Skโ1 ))r
X
SโSk
k=1
|P (S) โ Q(S)| .
Lemma 11 Suppose S and T are partitions of (โฆ, ฯ), and suppose S is countable. Then, there
exists a partition S โฒ of (โฆ, ฯ) such that:
a) |S โฒ | โค |S|.
b) Res(S โฒ ) โค Res(S) + 2 Res(T ).
c) T is a refinement of S โฒ .
Proof Enumerate the elements of S as S1 , S2 , .... Define S0โฒ := โ
, and then, for each i โ {1, 2, ...},
recursively define
๏ฃถ-๏ฃซ
๏ฃซ
๏ฃถ
iโ1
[
[
T๏ฃธ ๏ฃญ
Sjโฒ ๏ฃธ ,
Siโฒ := ๏ฃญ
j=1
T โT :T โฉSi 6=โ
and set S โฒ = {S1โฒ , S2โฒ , ...}. Clearly, |S โฒ | โค |S| (equality need not hold, as we may have some
Siโฒ = โ
). By the triangle inequality, each
๏ฃซ
๏ฃถ
[
Diam(Siโฒ ) โค Diam ๏ฃญ
T ๏ฃธ โค ฮดS + 2ฮดT .
T โT :T โฉSi 6=โ
Finally, since T is a partition and we can write
๏ฃถ-๏ฃซ
๏ฃซ
iโ1
[
[
T๏ฃธ ๏ฃญ
Siโฒ = ๏ฃญ
j=1 T โT
T โT :T โฉSi 6=โ
T is a refinement of S โฒ .
[
:T โฉSjโฒ 6=โ
๏ฃถ
T๏ฃธ ,
Before proving Lemma 12, we recall a simple concentration inequality bounding the L1 deviation of a multinomial random variable from its mean:
Lemma 15 (Lemma 3 P
of Devroye (1983)) Suppose (X1 p
, ..., XK ) โผ Multinomial(n, p1 , ..., pK ).
20K/n, for all ฮต โ [ฮต0 , 1),
Let Z := kX โ pk1 = K
|X
โ
p
|.
Then,
for
ฮต
:=
0
k
k
k=1
P [Z > nฮต] โค 3 exp โnฮต2 /25 .
Lemma 12 now follows as an easy corollary.
20
D ISTRIBUTION E STIMATION
IN
WASSERSTEIN D ISTANCE
Lemma 12 Consider the setting of Lemma 15. Then,
p
Z
โค 21K/n.
E
n
Proof Since, almost surely, Z < n, by Lemma 15,
Z โ
P [Z > nฮต] dฮต
[Z/n]
=
E
0
Z 1
โค ฮต0 + 3
exp โnฮต2 /25 dฮต
Z
ฮต0
1โฮต0
exp โn (ฮต + ฮต0 )2 /25 dฮต
0
Z
1
p
3
2
โค ฮต0 + 3 exp โnฮต0
exp โnฮต2 /25 dฮต โค ฮต0 + exp โnฮต20 โค 21K/n.
2
0
= ฮต0 + 3
21
D ISTRIBUTION E STIMATION
IN
22
WASSERSTEIN D ISTANCE
| 10math.ST
|
Intelligent Device Discovery in the Internet of
Things โ Enabling the Robot Society
James Sunthonlap, Phuoc Nguyen, Zilong Ye
arXiv:1712.08296v2 [cs.AI] 8 Jan 2018
California State University Los Angeles
5151 State University Drive, Los Angeles, CA 90032, USA
Email: [email protected]
AbstractโThe Internet of Things (IoT) is continuously growing
to connect billions of smart devices anywhere and anytime in an
Internet-like structure, which enables a variety of applications,
services and interactions between human and objects. In the
future, the smart devices are supposed to be able to autonomously
discover a target device with desired features and thus yield
the computing service, network service and data fusion that
leads to the generation of a set of entirely new services and
applications that are not supervised or even imagined by human
beings. The pervasiveness of smart devices, as well as the
heterogeneity of their design and functionalities, raise a major
concern: How can a smart device efficiently discover a desired
target device? In this paper, we propose a Social-Aware and
Distributed (SAND) scheme that achieves a fast, scalable and
efficient device discovery in the IoT. The proposed SAND scheme
adopts a novel device ranking criteria that measures the deviceโs
degree, social relationship diversity, clustering coefficient and
betweenness. Based on the device ranking criteria, the discovery
request can be guided to travel through critical devices that stand
at the major intersections of the network, and thus quickly reach
the desired target device by contacting only a limited number of
intermediate devices. We conduct comprehensive simulations on
both random networks and scale-free networks to evaluate the
performance of SAND in terms of the discovery success rate, the
number of devices contacted and the number of communication
hops. The simulation results demonstrate the effectiveness of
SAND. With the help of such an intelligent device discovery
as SAND, the IoT devices, as well as other computing facilities,
software and data on the Internet, can autonomously establish
new social connections with each other as human being do.
They can formulate self-organized computing groups to perform
required computing tasks, facilitate a fusion of a variety of
computing service, network service and data to generate novel
applications and services, evolve from the individual aritificial
intelligence to the collaborative intelligence, and eventually enable
the birth of a robot society.
Index TermsโInternet of Things, social-aware, distributed,
device discovery, computing, network and data fusion, robot
society.
I. I NTRODUCTION
The Internet of Things (IoT) is continuously growing to connect billions of smart devices anywhere and anytime through
an Internet-like structure. A recent forecast by International
Data Corporation (IDC) shows that the IoT will involve more
than 212 billion of objects by 2020, and the IoT and the
associated ecosystem are predicted to have a $1.7 trillion
market [1]. The IoT devices are capable of sensing, analyzing
and evaluating the surrounding objects and people. They
can collaborate and work together to provide a set of new
applications and services, such as smart home, e-healthcare
and intelligent transportation system. The IoT is envisioned
to dramatically change and enhance the interactions between
human and objects, bringing transformative benefits to the
lives of human beings.
As the IoT evolves, it is promising that the future smart
devices may have the capability to discover a target device
with desired features, and autonomously collaborate with each
other to accomplish certain missions or tasks. An intelligent
device discovery strategy may allow the IoT devices to efficiently establish new connections with other devices based on
their need. The connections can be set up to gather a certain
number of computing powers, network functions, program
source codes, raw datasets, and etc to enable new services and
applications. A variety of computing service, network service
and data can be fused [2]-[4] by following the guidance of an
intelligent device discovery strategy. For example, a glucose
level monitor can send a request to find a glucose analyzer,
and collaborate on evaluating a given patientโs glucose level.
The glucose analyzer may also need to search for a national
wide database to compare the given patientโs results with
that of other patients, and then given the advisement or alert
to the given patient. Here, an intelligent device discovery
strategy could guide the request to the appropriate destinations
for obtaining the required computing facilities, functions and
data to provide the evaluation service, natually leading to
a computing service, network service and data fusion. In
addition, the IoT devices can also form social connections
as human beings do, and they can collaborate to generate
entirely new kinds of applications and services with the help of
collaborative intelligence of smart devices and data, rather than
the supervision of human beings. In the above future scenarios,
one of the key challenges is how to achieve a fast, scalable and
efficient device discovery when there are millions or billions
of devices in the IoT. An intelligent device discovery should
have a forwarding strategy that guide the discovery request
to quickly arrive at the desired target device with minimum
detours. In addition, since most of the IoT devices are power
constrained, the device discovery should avoid involving too
many intermediate devices in the process of data exchange.
There are a few existing works on the topic of IoT device
discovery. The work in [5] identified the differences between
user search and machine-to-machine search, and presented
the challenges and requirements for IoT device search. The
authors in [6] studied device discovery on different network
topologies, including a star-like centralized network, a regular
mesh-like decentralized network and a hierarchical network.
They focused on analyzing the effect of the network topology
on the discovery success rate, rather than designing new device
discovery strategies. The study in [7] proposed a centralized
IoT search engine that can accurately interpret the context of
the discovery request and thus make a proper management of
search and usage in the IoT middleware environment. However, this centralized approach may not be scalable when the
network size is large, and can be vulnerable to a single point of
failure. More recent work [8] investigated a distributed device
discovery strategy based on Information-Centric Networking
(ICN). However, this approach may not be applicable to the
IoT system since it relies on the built-in features of ICN such
as cache and broadcast capabilities, which could introduce an
extra cost to the resource-constrained IoT devices.
In this work, we focus on investigating autonomous and
intelligent device discovery in the IoT. We do not treat smart
devices as independent objects or limit our study on the
artificial intelligence of a single device, but we explore humanlike social behaviors and collaborative intelligence of smart
devices. It is envisioned for the next episode of research in
the IoT and robotics. In particular, we propose a novel IoT
device discovery scheme, called Social-Aware and Distributed
(SAND), which can discover a desired target device in a fast,
efficient and scalable manner. In SAND, IoT devices are fair
and equal as peers, and they can interact with each other in an
autonomous and distributed manner as human do, as each of
them only maintains the information of their local neighboring
peers. Each IoT device is ranked by measuring the deviceโs
degree, social relationship diversity, clustering coefficient and
betweenness. Based on this, SAND opts to forward the discovery request to the neighboring device with the highest
rank, which is likely to stand at the major intersection of the
network that can fast and efficiently lead the request to the
desired target device. We conduct comprehensive simulations
to evaluate the proposed SAND scheme on both a random
network and a scale-free network. The simulation results show
that SAND can achieve a high discovery success rate and
a short discovery path, while contacting a small number of
intermediate devices.
The rest of the paper is organized as follows. We first
introduce the traditional centralized and distributed device
discovery schemes in Section 2. Then, we describe the design
details of the proposed SAND scheme in Section 3. In Section
4, we present the performance evaluation. In Section 5, we
discuss the research challenges and opportunities related to
the IoT device discovery. Finally, we conclude the paper and
propose our future work in Section 6.
II. T RADITIONAL I OT D EVICE D ISCOVERY S CHEMES
There are two traditional solutions for addressing the device
discovery in the IoT, which are the centralized scheme and
the distributed scheme. The former leverages a centralized
controller to resolve the discovery request, and the latter
uses a simple broadcast mechanism to discover the required
target device in a breadth-first search manner. The detailed
description and the comparison of these two approaches are
presented in the following subsections.
A. Centralized IoT Device Discovery Scheme
To achieve a fast and efficient IoT device discovery, a simple
yet effective approach is to introduce a centralized controller
which keeps track of the general information (e.g., the deviceโs
functionality) of all the devices and maintains the shortest
paths between all the device pairs. If there exists a source
device which requests to discover a target device that provides
a desired function, the discovery request can be sent to the
centralized controller to resolve. The centralized controller can
find the location of the desired target device and reply to the
source device with the shortest path information to the target
device. Such a centralized scheme is fast and accurate due
to that the centralized controller has a global view of all the
devices in the network. It is also efficient since the centralized
controller can provide the shortest path between the source
and target devices, which involves the minimum number of
intermediate devices in transmitting the discovery request.
The centralized scheme can be designed with robustness
against dynamic changes in the network. When a new device
joins the network, it needs to register the general information
at the controller. A device that leaves the network also needs
to unsubscribe at the centralized controller. In addition, the
centralized controller can periodically send out heartbeat messages to all the registered devices and maintain an up-to-date
list of the alive devices in the network. If a device fails to reply
to the heartbeat after three attempts, it is considered as in the
mode of lost and will be removed from the list of alive at the
centralized controller. We can see that the centralized scheme
highly relies on the centralized controller which manages the
whole system and the communication between the IoT devices.
B. Distributed IoT Device Discovery Scheme
The centralized scheme is fast and efficient; however, it
may not be scalable when the number of devices is large.
In contrast, the distributed scheme offers a scalable device
discovery in the IoT. In the distributed scheme, each device
maintains a local neighbor list that consists of the neighborsโ
general information. When a new device joins a network, it
only exchanges the general information with nearby devices
that are within the transmission range. When a device leaves
the network, it needs to inform its neighbors for them to update
their local neighbor list. Heartbeats can be exchanged between
the devices to maintain the fresh live or lost status of the
devicesโ neighbors. The distributed discovery scheme works
in a breadth-first search manner. When a source device makes
a request to discover a target device with desired features,
the distributed scheme simply broadcasts the discovery request
to all the neighboring devices. This process iterates until the
desired target device is found.
Compared to the centralized scheme, the distributed scheme
is more resilient against possible failures since there is no
centralized control that is at the risk of single point of failure. It
is also more robust when the network is dynamically changing
since each device only needs to maintain their local neighborโs
information. We can also infer that the distributed scheme can
find a cost-efficient communication path between the source
and target devices since the breadth-first search is used. The
only limitation is that a large number of intermediate devices
may be involved in transmitting the discovery request when
broadcast is used, which is energy consuming. This is harmful
to the IoT system where most of the devices are power
constrained.
III. S OCIAL -AWARE AND D ISTRIBUTED I OT D EVICE
D ISCOVERY โ SAND
In the famous small-world experiment [9], Travers and
Milgram found that people are tied by a short chain of
connections and any two persons can be connected in six
hops by simply exploring their social networks. A more recent
Facebook research [10] confirmed this observation in which
they concluded that, among their 1.59 billion active users,
in average a person is separated by 3.57 hops away from
another person. As the IoT evolves, devices could also exhibit
human-like social relationships. For example, devices can be
considered as family if they are from the same manufacturer,
or can be considered as colleagues if they work together to
provide a service. Such social aspects can therefore be used
to intelligently navigate device discovery requests through the
device social network and connect two devices in a few hops
as the small-world exhibited by the human social network.
Based on this motivation, we propose the Social-Aware and
Distributed (SAND) scheme, which can achieve a scalable,
fast and efficient device discovery in the IoT. In SAND, IoT
devices can autonomously establish meaningful relationships
with other devices, and form an overlay device social network
in addition to their communication network. It may be faster
and more efficient for the devices to find their desired target
device by searching among their โfriendsโ through the overlay device social network, as oppose to simply broadcasting
through the communication network as the distributed scheme
works. In the following subsections, we will present the details
of the SAND architecture, the device ranking criteria and the
forwarding strategy, respectively.
A. The SAND Architecture
In SAND, the IoT devices form two layers of networks,
which consists of the communication network and the overlay
device social network. The communication network is at the
bottom layer, which abstracts the data communication links
between the IoT devices. As long as two IoT devices are
within their transmission range, a communication link exists
between them. Actually, the distributed scheme introduced
in the previous section only considers this communication
network and performs simple broadcasting for device discovery. In SAND, in addition to the communication network, an
overlay device social network is constructed to help achieve
an effective IoT device discovery. When two IoT devices
can communicate with each other, they can exchange their
device general information, such as the manufacturer, the
functionality, the ownership and the location information. In
the overlay device social network, there exists a link between
two IoT devices if they have a valid social relation. Similar
as human relationships, device social relationships typically
include family, friends, neighbors, colleagues, and etc. Devices
from the same manufacturer can be considered as family,
e.g., an iPhone and an Apple TV. Device friendship can be
described as objects that interact frequently with one another
and tend to share a common theme. For example, Bobโs smartphone and his body sensors are considered as friends since
they interact frequently and they both serve as key components
in providing e-healthcare services. IoT devices that locate in
the same room or floor can be considered as neighbors. IoT
devices are considered as colleagues if they work together
to provide a specific service. For example, the temperature
sensors, the humidity sensors and the air conditioner are
colleagues that work together to offer a comfortable living
environment in a smart home. It is worth noting that, in our
simulation (to be introduced in Section IV), we abstract the
device general information into a number of device features,
and there exists a social link between two IoT devices if they
have a common feature.
An illustrative example of SAND in a smart home is shown
in Fig. 1. Here, we only show the overlay device social
network. We assume that all the devices are connected through
WiFi, so the communication network is a complete mesh
network, which is not shown. In the overlay social network,
the refrigerator (E), the TV (A) and the washing machine
(C) are connected since they are from the same manufacturer,
e.g., Samsung. The neighbor relationship exists between the
vacuum (B) and the washing machine (C), both of which
locate in the storage room. Friendship exists between (1) the
telephone (D) and the TV (A), and (2) the refrigerator (E)
and the PC (F ), which are involved in frequent interactions
to serve the home owner. The refrigerator (E), the microwave
(G) and the boiler (H) are considered as colleagues that work
together to prepare meals.
In SAND, when an IoT device joins the network, it will
exchange the general information with nearby devices that
are within the transmission range. Consequently, social links
can be established if valid social relationships exist. Here, we
assume each IoT device is social-aware and intelligent in the
sense that they can establish social relationships autonomously
like human. The social aspects of IoT devices give them the
ability to form an overlay device social network automatically.
It is worth noting that the overlay device social network is not
static but dynamically changing because of the device movements or the device relationship changes (e.g., the colleague
relationship may change frequently). Hence, each IoT device
needs to periodically update their social connections in SAND.
In SAND, IoT devices are supposed to act as human beings.
The social aspects of the devices allow them to dynamically
create new social connections and form new colleagueship to
work together to generate new services. With the social aspects
B
A
C
F
E
D
H
G
Fig. 1: SAND in a Smart Home
in SAND, devices become more visible and aware to each
other, thus leading to a fast and effective device discovery.
In the process of device discovery, rather than simply
broadcasting the discovery message to all the neighbors as
the distribute schemes does, SAND will send the discovery
message to each of the neighbors in a preferred order based
on the the rank of the neighboring device. The higher rank the
device is, the more likely and faster it is able to forward the
discovery message to the target device requested by the source
device. With the social aspects in SAND, devices become more
visible to other devices, thus making SAND more scalable and
efficient than the baseline distributed scheme.
B. The Device Ranking Criteria in SAND
In SAND, the device discovery adopts the depth-first search
strategy, where the discovery request is forwarded to the neighboring devices in a preferred order based on their ranks. Here,
the rank of a device is determined by four factors which are the
device degree, the diversity, the (local) clustering coefficient
and the (local) betweenness of the IoT device. The first three
factors help SAND to select a device that may reach a broad
community, while the betweenness leads the discovery request
to a device that stands at the major intersection of multiple
shortest paths in the network. Thus, the device ranking criteria
makes SAND an intelligent, accurate and fast device discovery
strategy. We will present the calculation details of these four
factors as follows.
Device Degree: In the overlay social network, the degree
of device i is denoted by ki , which is defined as the number
of social links it has. For example, in Fig. 1, device E has a
degree of 5 since there are five social connections associated
with it. The higher the device degree is, the more likely it
is associated with a routing path to the desired target device
since there are more outlets from this device.
Diversity: In SAND, the diversity of device i is denoted by
di , which is defined as the number of types of social links a
device is associated with. For example, in Fig. 1, device E
has a diversity of 3 since it has three different types of social
links which are family (i.e., links with A and C), colleagueship
(i.e., links with G and H) and friendship (i.e., link with F ).
An IoT device could have a high device degree ki , but if all
the connections are within the same type of social relationship,
the device is still assigned with a relatively low rank since it is
not diverse enough to reach distinct communities of devices. In
contrast, an IoT device that has a high diversity d is involved in
many different types of social relations, and may have a broad
reachability, thus having a higher chance to connect with the
desired target device.
Clustering coefficient: The clustering coefficient shows how
likely a device and its neighbors form a clique [11]. The local
clustering coefficient of a device is defined as the number
of the social links in its neighborhood (including the device
itself and its one-hop neighbors) divided by the total number
of possible links in the neighborhood. For a given device i,
the local clustering coefficient ci can be calculated as:
2| est : s, t โ Ni , est โ E |
(1)
ci =
ki (ki โ 1)
where est is a social link between device s and device t, Ni
is the set of devices in the neighborhood of device i, E is
the set of social links in the neighborhood of device i, and
ki is the degree of device i. The higher the local clustering
coefficient is, the more likely the device and its neighbors are
forming a clique (e.g., fully mesh), thus the diameter of the
device neighborhood is smaller, which can lead to a faster and
wider dissemination for the discovery request.
Betweenness: The betweenness reflects the probability that
a given device stands at the critical intersection of multiple
shortest paths in the network [12]. It is defined as the number
of shortest paths that traverse the given device divided by the
total number of possible shortest paths. In SAND, the local
betweenness measures such a probability in the neighborhood
that includes the given device and its one-hop neighbors. The
local betweenness of device i is calculated as:
P
s,tโNi ฮดst (i)
bi =
(2)
ki (ki โ 1)
where Ni is the set of devices in the neighborhood of device
i, s and t are a pair of devices in Ni , and ki is the degree
of device i. Here, ฮดst (i) is 1 if the shortest path between s
and t traverses through device i; otherwise, it is 0. The higher
the local betweenness is, the higher chance the given device is
located at the intersection that connects major shortest paths
in the neighborhood. Discovery requests that arrive at such
intersection can be disseminated to anyplace in the network
easily and quickly over those shortest paths.
In SAND, the rank of a device Ri is defined as the
multiplication of the above mentioned four factors (e.g., Eq.
(3)). The higher the rank is, the more likely the device can
forward the discovery request to the desired target device in a
fast and efficient manner.
Ri = ki โ di โ ci โ bi
(3)
C. The SAND Forwarding Strategy
Based on the architecture and the device ranking criteria
as described above, we propose the SAND device discovery
scheme in this subsection. Rather than the simple broadcast
used in the distributed scheme, SAND forwards the discovery
request to a neighbor device that ranks the highest. For
example, in Fig. 1, the discovery request from D to C will
be forwarded to E, which has the highest rank (with a degree
of 5, diversity of 3, local clustering coefficient of 0.53 and
local betweenness of 0.53). The device with the highest rank is
supposed to be the most effective one that leads to the desired
target device. In the discovery process, SAND performs a
depth-first search with limited search depth, where the search
will not exhaust to the deepest level but a depth level of n
(which is a tunable parameter). If the desired target device
cannot be found after searching for n levels, SAND will step
back to examine the other unchecked neighbors in depth nโ1.
The pseudocode of SAND discovery algorithm is shown in
Algorithm 1.
Algorithm 1 The SAND Device Discovery Algorithm
Input: A discovery request rst from source s to target t
Output: The communication path pst between s and t
1: pst .push(s);
2: while pst is not empty do
3:
i โ pst .pop();
4:
if i is the desired target device then
5:
return the reverse path of pst ;
else if i has been checked before then
6:
7:
continue;
8:
else if pst .length() = depth n then
9:
continue;
10:
else
11:
rank and sort the neighbor devices Ni ;
12:
pst .push(Ni highest rank );
13:
end if
14: end while
Similar as the distributed scheme, SAND is scalable since
each IoT device only maintains information of its local connections. SAND is also resilient and robust since there is no
centralized controller and each IoT device is fair and equal
as a peer. Compared to the distributed scheme, SAND is
more efficient because the former applies simple broadcast and
thus a significant large number of devices are involved in the
discovery process, while in the latter, SAND performs depthfirst search with limited search depth and the guidance of an
intelligent device ranking criteria, so the number of devices
involved is relatively small. Such an advantage of SAND may
lead to a low energy consumption in the process of transmitting
the discovery request, which is critically beneficiary to the
IoT system where devices are power constrained. Hence, we
can see that SAND inherits the advantages of the distributed
scheme, and further improves the communication efficiency.
IV. P ERFORMANCE E VALUATION
In this section, we focus on evaluating the performance
of the proposed SAND scheme, compared to the distributed
scheme that uses simple broadcast. We conduct simulations
on both a random network and a scale-free network. The
random network is an irregular mesh network with social links
randomly generated between IoT devices, while the scale-free
network is generated by considering the power law [13] in
which the fraction of devices with k connections follows a
distribution P (K) โผ k โฮณ (ฮณ is usually between 2 and 3). It
is meaningful and reasonable to test SAND on a scale-free
network, since most of the social networks are scale-free and
SAND works by considering an overlay device social network.
In our simulation, we generate a network that consists of
20000 IoT devices. Each IoT device is associated with a
number of connections to its neighboring devices (the number
of connections follows uniform distribution and power law in
the random network and the scale-free network, respectively),
which forms the communication network. Each physical link
in the communication network has a transmission latency
uniformly distributed within [10ms, 40ms]. The distributed
scheme only runs on this communication network. In SAND,
for each IoT device, we randomly generate three features. Any
two IoT devices that are physically connected and share the
same features will be equipped with a social link, which forms
the overlay device social network. The total number of features
in the network is set to vary from 2000 to 10000. For all the
simulation results shown below, we generate 15000 discovery
requests from randomly selected source devices with randomly
chosen desired features, and obtain the average results. Each
discovery request has a time to live of 60s. With regards to
the evaluation, we focus on three performance metrics, which
are the success rate, the average number of devices contacted
on success and the average number of hops of the discovery
path on success. We will present the simulation results and
findings in the following parts.
A. Success Rate
In the simulation, if the target device with the desired feature
can be found before the time to live expires, it is considered as
a successful discovery; otherwise, it is considered as a failure
and the discovery request will be dropped. The success rate
is defined as the number of successful discovery divided by
the total number of discovery requests. We show the success
rate as a function of the number of features in Fig. 2(a)
and Fig. 2(b). Given a fixed number of IoT devices (i.e.,
15000 by default) in the system, as the number of features
increases, the system become more diverse with a variety of
types of devices. From Fig. 2(a), we can see that in the random
network the success rate of both the distributed scheme and
SAND decreases as the network becomes more diverse. The
distributed scheme performs better than SAND since the
distributed scheme uses simple broadcast while SAND uses
the depth-first search which may yield to a long discovery
period that exceeds the required time to live.
100.00%
100.00%
Distributed
Broadcast
SAND
90.00%
Success Rate
Success Rate
90.00%
80.00%
70.00%
80.00%
70.00%
60.00%
60.00%
50.00%
50.00%
Broadcast
Distributed
SAND
2000
4000
6000
8000
10000
No. of Features
(a) Success Rate in Random Networks
2000
4000
6000
8000
10000
No. of Features
(b) Success Rate in Scale-free Networks
Fig. 2: Simulation Results in the Random Network and the Scale-free Network
However, in the scale-free network as shown in Fig. 2(b),
we can see that SAND achieves a similar success rate as
that of the distributed scheme, which is as high as more
than 98%. Compared to the results in the random network,
the success rate experiences a significant increase. This is
primarily because in the scale-free network there are some
superhub devices that have a large number of connections,
which could help the discovery request reach the target device
in a short time. While in the random network, each device
has a similar node degree and the discovery request may take
a long time to reach the target, and in some bad cases the
time to live requirement is violated and thus failures occur.
Another reason is that the device ranking criteria in SAND is
effective and can successfully navigate the discovery request
to the desired target device. Given that most of the real-world
social networks are scale-free, we can infer that SAND is a
practically solid solution since its success rate is above 98%.
B. Average Number of Devices Contacted
One of our main interests in this research is to measure,
during a device discovery process, how many devices are
being contacted before the desired target device is found. It is
more energy efficient if less number of devices are involved
in transmitting the discovery message, which is critically
important for IoT system where devices are power constrained.
Fig. 3(b) and Fig. 3(b) show the number of devices contacted
with different number of features in the random network and
the scale-free network, respectively. Here, we only count the
measures on successful discovery. From the simulation results,
we can observe that in both random and scale-free networks, as
the number of features increases, SAND outperforms the distributed scheme, with an average performance improvement of
14.6% and 13.9%, respectively. It can also be seen that as the
number of features increases, the performance improvement of
SAND over the distributed scheme becomes more significant
in both networks. This indicates that SAND is more efficient
when the IoT system is more diverse and heterogeneous.
Thanks to the adoption of depth-first search and the intelligent
device ranking criteria, SAND can efficiently discover the
desired target device without involving too many unnecessary
intermediate devices. Thus, SAND can potentially achieve a
low energy consumption in the process of transmitting the
discovery request, which is critically beneficiary to the IoT
where the devices are power constrained.
C. Communication Hops
Another interest in this research is to find out how many
communication hops are there to separate a source device
from a desired target device. After the discovery process is
done, the source and target devices will communicate with
each other over the discovery path and cooperate to perform
computing tasks. The post-discovery communication can be
cost-efficient if the number of hops of the discovery path is
small. In Table I and II, we show the average number of hops
of the discovery path in the random network and the scale-free
network, respectively. It can be seen that SAND can achieve as
small communication hops as that of the distributed scheme,
the latter of which is supposed to be the optimal one because of
using the breadth-first search. This finding further validates the
effectiveness of the device ranking criteria of SAND, which
can intelligently navigate the discovery to the desired target
device with minimum detours. We can also see that as the
number of features increases, the number of hops increases in
both network scenarios. This is reasonable because it becomes
more difficult and needs more hops of query to find the
desired target device when the network becomes more diverse.
Comparing the results in the two tables, we can also observe
that from the random network to the scale-free network, the
average number of hops exhibits an average increase of two
hops. The reason behind is that the random network is a
regular mesh network where all the devices are relatively fair
and have similar number of connections, while the scale-free
network has some superhub devices that have huge number
of connections. In the scale-free network, a given discovery
request is usually forwarded to those superhub devices first and
then finds a path to the desired target device, thus resulting in
a larger number of hops than that of the random network.
Furthermore, we evaluate the distribution of devices over the
number of hops of the discovery path in the scale-free network.
As shown in Fig. 4, we plot the device distributions for SAND
4,000.00
3,000.00
2,000.00
1,000.00
Distributed
Broadcast
SAND
Avg. No. of Devices Contacted
Avg. No. of Devices Contacted
4,000.00
3,000.00
2,000.00
1,000.00
Broadcast
Distributed
SAND
0.00
0.00
2000
4000
6000
8000
10000
No. of Features
(a) Avg. No. of Devices Contacted in Random Networks
2000
4000
6000
8000
10000
No. of Features
(b) Avg. No. of Devices Contacted in Scale-free Networks
Fig. 3: Simulation Results in the Random Network and the Scale-free Network
TABLE I: No. of Hops in Random Networks
5000
2000
2000
4000
6000
8000
10000
Broadcast
3.67
4.16
4.43
4.53
4.82
SAND
3.66
4.14
4.28
4.40
4.69
TABLE II: No. of Hops in Scale-free Networks
No. of Features
2000
4000
6000
8000
10000
Broadcast
5.41
6.15
6.37
6.47
6.70
SAND
5.41
6.14
6.36
6.41
6.69
6000
4000
No. of Devices
No. of Features
10000
3000
2000
1000
0
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
No. of Hops
using 2000, 6000 and 10000 features. The result confirms the
past research on social networks [9][10], and shows that in
most of the cases any two IoT devices are separated by 5โผ7
hops. We can also observe that the average number of hops
is small when the network is less diverse (see the center of
the peak of distribution with 2000 features), and the average
number of hops increases when the network becomes more
diverse (e.g., 6000 and 10000 features). We can also infer that
if a device cannot be discovered in a few hops, the probability
that the discovery is unsuccessful increases dramatically. The
reason behind is that the unsuccessful discovery involves
devices that are relatively isolated from all other devices. It
is quite common that the discovery to those isolated devices
will violate the time to live requirement and get dropped. In
contrast, the successful discovery usually involves devices that
are in a cluster or connected to the superhubs.
V. R ESEARCH C HALLENGES AND O PPORTUNITIES
An efficient IoT device discovery may lead to the generation
of a new set of applications and services, as well as research
opportunities, such as self-organized computing, service and
data fusion, malware source traceback and the formation of a
robot society, etc. Meanwhile, there are many open challenges
with regards to these applications. In the following parts, we
propose a few research opportunities and challenges related
to the topic of intelligent device discovery in the IoT, and
beyond.
Fig. 4: Device Distribution v.s. No. of Hops in SAND with
20K nodes
A. Self-Organized Computing
The intelligent device discovery can enable a new format of
computing services that can be self-organized by a number of
smart devices. A client can initiate a computing task from
any device (e.g., a smart watch), with a set of specified
requirements such as computing power demand (e.g., CPU
and memory), function or platform demand, and data demand
(e.g., source code or raw dataset). The source IoT device is responsible for deliverying these requirements to the appropriate
computing facilities in the Internet and gathering the results
back. In this case, an intelligent device discovery strategy can
be used to establish connections between IoT devices and the
computing facilities in the Internet. For example, a user wants
to issue a request to check his/her glucose level from the
smart watch. The smart watch can use the intelligent device
discovery to search for the nearest server that has enough
computing and memory power to perform the computing tasks.
Then, the server may use the intelligent device discovery
to find the source code of glucose level analyzer, and then
download and install the analyzer to perform the analysis. The
intelligent device discovery grants IoT devices and computing
facilities the capability to fetch the data and functions as they
need for performing a given computing tasks. Thus, the IoT
devices and computing facilities can perform the computing
tasks in a self-organized manner.
In this process, one of the open challenges is how to
standardize the experssion of the computing requirements so
that the devices and machines can initiate standard requests
that can be understood by other machines. Another challenge
is how to optimize the request and reply flow routes so that
the network resource consumption can be minimized and the
request-response latency can be minimized.
B. Computing, Network and Data Fusion
In the above self-organized computing scenario, a variety
of computing facilities, network functions/services and data
(e.g., programming source code, patientโs raw data) can be
interconnected and fused by running an intelligent device
discovery strategy. For a given service request, the intelligent
device discovery can help with gathering the computing,
switching and storage hardware from a specific site, while
fetching a pool of patientsโ data from a different site and
obtaining the source codes of particular computing functions
or network functions from another site. Here, the computing,
switching and storage hardware are served as placeholders,
while the source codes of the computing and network functions
and the raw dataset can be discovered and fetched by the
intelligent device discovery strategy and served as the input
to those hardware placeholders. Data, software and hardware
can be distributed in different sites, while they are coupled by
the intelligent device discovery approach. Hence, an intelligent
device discovery strategy is promising to enable the computing, network and data fusion, and achieve an efficient communication between the fused devices. After the computing,
network and data fusion becomes true, devices and machines
can easily launch new services by specifying their needs to
the Internet. The Internet can resolve the needs in a standard
format (e.g., service function chains) and efficiently connect
those required devices and funcitons (e.g., through intelligent
device discovery strategy) to provide the required new services
specified by the devices and machines. With the computing,
network and data fusion, it is promising to generate novel
machine-initiative services that are not supervised by human
beings. Fusion can be considered as an intermediate phase that
prepares and enables the formation of a robot society.
To achieve this, an open challenge is how to develop
a platform that can address the IoT interoperability issue
and facilitate a computing, network service and data fusion
platform. Another challenge is how to efficiently discover and
deliver the required data and source codes to the selected
hardware sites in a timely manner such that a seamless service
can be provided for the users.
C. Traceback Cyber Attack Source
Another application of intelligent device discovery is in the
area of network security. The sources of malicious attacks are
usually spoofed to avoid being detected [14]. The intelligent
device discovery can be used to traceback the actual source
of malware attacks based on the characteristics and features
of the malicious attacks. The security protection system can
issue a traceback request for the malware source generator,
with certain key features of the malicious traffic. The overlay
social network on top of the communication network can
be constructed based on the model in Section 3.1. Then,
an enhanced model that can accurately predict the hidden
links/relationships between machines can be constructed using
the method in [15]. Machine learning or deep learning [16]
techniques can also be applied here to improve the accruacy
of the prediction. After that, the proposed intelligent device
discovery strategy can run on this enhanced overlay social
network (with hidden links based on prediction) to traceback
the malicious source attacker. Even if the malicious source
are spoofed and hidden behind some links or relationships,
the intelligent device discovery can still guide the traceback
route based on the pattern and features of malicious attacks.
D. Robot Society
The intelligent device discovery can be used to initiate the
connection between a given device and its desired device for
the first time. After the first contact, the two devices can be
considered to know each other and maintain a certain type
of social relationship as human does. As the communications
between different devices continue to grow, a variety of
computing service, network service and data can be fused,
and a robot society could be formed which consists of IoT
devices, servers, robots and all the machines in the Internet.
The device relationship in the robot society can be the same as
the human relationship in the human society, such as friend,
colleague and family relationships (which are considered in
this paper). There is also a high chance that some unique
machine type of relationships may exist in the robot society.
One of the challenging and meaningful work is to analyze
a large dataset of network traffic data to categorize the
relationships between machines/devices in the Internet. This
can be useful to give us an insight of the relationships and
communication purpose between machines. It is also helpful
for us to formulate the foundamental rules of how to establish
the social relationship between machines/devices. Another
open challenge is how to ensure the security of the connection
before the two machines/devices establish their social relationship. It is necessary to avoid establishing relationships with
potential malicious devices. To achieve this, we may need
to develop machine learning based solutions (e.g., decision
tree classification, convolutional neural networks or recurrent
neural networks) to train the machines/devices to identify their
own roles and their contactโs roles in the robot society, to
reduce the chance of establishing connections with malicious
devices. In general, a promising research area is to investigate
the social behavior and the collaborative intelligence in the
robot society, in addition to the artificial intelligence in a single
device/machine.
VI. C ONCLUSION AND F UTURE W ORK
The Internet of Things (IoT) grows continuously and connects billions of smart devices with heterogeneous functionalities, purposes and platforms. As the IoT evolves, it
is promising that human-like social relationships could be
autonomously established by the smart devices. With the
help of an intelligent device discovery strategy, IoT devices
can easily discover the resources (e.g., source codes) and
devices (e.g., computing facilities) that meet their needs. Each
device/machine is associated with one or more resources
or capabilities of either computing power, network function,
source code or data. The intelligent device discovery can be
used to glue and couple the resources from distributed sites
to achieve the computing, network service and data fusion.
Each device/machine acts like a robot and can establish social
connections with each other autonomously to collaborate and
create new applications and services, which could eventually
lead to the formation of a robot society. The goal of this
research is to address the impending scalability issue in
the process of device discovery in IoT. In this paper, we
have proposed a novel approach that leverages such social
aspects of IoT devices to achieve a scalable and efficient IoT
device discovery. The proposed Social-Aware and Distributed
(SAND) scheme applies the depth-first search and forwards
the discovery request to neighboring devices in a preferred
order defined by a novel social network-aware device ranking
criteria. More specifically, the ranking criteria takes into consideration the deviceโs degree, diversity and clustering coefficient, which could potentially navigate the discovery request to
reach a broad community. Furthermore, the local betweenness
is considered in the ranking criteria, which prioritizes the
devices that stands at the critical intersections of multiple
shortest paths of the network. With the guidance of such an
intelligent device ranking criteria, the discovery request can
find the desired target device in a fast and efficient manner.
We have conducted comprehensive simulations to validate the
effectiveness of SAND on both a random network and a
scale-free network. Simulation results have shown that SAND
can achieve the near-optimal success rate and communication
hops as that of the distributed scheme which uses broadcast.
In addition, we have found that the SAND scheme contacts
a much smaller number of intermediate devices than that
of the distributed scheme during the discovery process, thus
potentially leading to a much less energy consumption.
As for future work, we plan to extend our study in the following aspects. First, we plan to extend SAND with multicast
feature, which allows one discovery request to fetch multiple
replies. This could be useful in wireless sensor network
applications, such as in the temperature monitor system. In
addition, rather than specifying only one feature of the desired
target device, we can enhance the SAND scheme by allowing
it to claim for multiple features to achieve a more accurate
discovery. We also plan to implement SAND on a physical
testbed and conduct experimental studies. Secondly, we plan
to analyze various network traffic datasets to understand the
meanings and purposes behind those communications, and we
can use machine learning techniques to categorize the social
relationships in the IoT. This can be used to further improve
the discovery speed and the discovery accuracy of SAND,
and can also provide the basic insights for exploring the
formation of the robot society. Thirdly, we plan to investigate
the interoperability issues in the IoT and explore a standard
platform that enables a variety of computing, network service
and data fusion.
R EFERENCES
[1] A. Zaslavsky and P. P. Jayaraman, โDiscovery in the internet of things,โ
in ACM Ubiquity Magazine, October 2015, Article No. 2.
[2] G. Sun, V. Chang, G. Yang and D. Liao, โThe cost-efficient deployment of
replica servers in virtual content distribution networks for data fusion,โ in
Information Sciences (2017), http://dx.doi.org/10.1016/j.ins.2017.08.021
[3] G. Sun, D. Liao, D. Zhao, Z. Sun, V. Chang, โTowards
provisioning hybrid virtual networks in federated cloud data
centers,โ in Future Generation Computer Systems, 2017,
https://doi.org/10.1016/j.future.2017.09.065
[4] C. Li, F. Darema and V. Chang, โDistributed behavior model orchestration in cognitive internet of things solution,โ in Journal of Enterprise
Information Systems, 2017, pp. 1-21.
[5] P. Barnaghi and A. Sheth, โOn searching the internet of things: requirements and challenges,โ in IEEE Intelligent Systems, vol. 31, no. 6, 2016,
pp. 71-75.
[6] P. C. Ccori, L. C. De Biase, M. K. Zuffo and F. S. Da Silva, โDevice discovery strategies for the IoT,โ in Proc. of IEEE International Symposium
on Consumer Electronics, 2016, pp. 97-98.
[7] W. T. Lunardi, E. De Matos, R. Tiburski, et. al., โContext-based search
engine for industrial IoT: discovery, search, selection and usage of
devices,โ in Proc. of IEEE Conference on Emerging Technologies and
Factory Automation, 2015, pp. 8-11.
[8] L. Dong, R. Ravindran and G. Wang, โICN based distributed IoT resource
discovery and routing,โ in Proc. of IEEE International Conference on
Telecommunications, 2016, pp. 1-7.
[9] J. Travers and S. Milgram, โAn experimental study of the small world
problem,โ in Sociometry, vol. 32, no. 4, 1969, pp. 425-443.
[10] S. Edunov, C. Diuk, I. O. Filiz and S. B. Burke, โThree and a half degrees
of separation,โ 2016. [Online]. Available: https://research.fb.com/threeand-a-half-degrees-of-separation.
[11] D. J. Watts and Steven Strogatz, โCollective dynamics of small-world
networks,โ in Nature, vol. 393, June 1998, pp. 440-442.
[12] M. E. J. Newman, โNetworks: an introduction,โ Oxford University Press,
2010, ISBN 978-0199206650.
[13] A. Barabsi and R. Albert, โEmergence of scaling in random networks,โ
in Science, vol. 286, 1999, pp. 509-512.
[14] Zhen Ling ; Junzhou Luo ; Kui Wu ; Wei Yu ; Xinwen Fu, โTorWard:
Discovery, Blocking, and Traceback of Malicious Traffic Over Tor,โ in
IEEE Transactions on Information Forensics and Security, vol. 10, no.
12, pp. 2515-2530, 2015.
[15] Berlusconi G, Calderoni F, Parolini N, Verani M, Piccardi
C, โLink Prediction in Criminal Networks: A Tool for
Criminal Intelligence Analysis,โ in PLoS ONE 11(4): e0154244.
https://doi.org/10.1371/journal.pone.0154244
[16] R. Chauhan, H. Kaur and V. Chang, โAdvancement and applicability of
classifiers for variant exponential model to optimize the accuracy for deep
learning,โ in Journal of Ambient Intelligence and Humanized Computing,
2017, pp. 1-10.
| 2cs.AI
|
SOFIC ENTROPY OF GAUSSIAN ACTIONS
arXiv:1509.07835v2 [math.DS] 31 Dec 2015
BEN HAYES
Abstract. Associated to any orthogonal representation of a countable discrete group is a probability
measure-preserving action called the Gaussian action. Using the Polish model formalism we developed
before, we compute the entropy (in the sense of Bowen, Kerr-Li) of Gaussian actions when the group is
sofic. Computations of entropy for Gaussian actions has only been done when the acting group is abelian
and thus our results are new even in the amenable case. Fundamental to our approach are methods of
noncommutative harmonic analysis and C โ -algebras which replace the Fourier analysis used in the abelian
case.
Contents
1. Introduction
2. Preliminaries on Sofic Entropy
3. Generating Sets and Tightness
4. Entropy of Gaussian Actions
4.1. Definition of Gaussian Actions
4.2. Preliminaries on the Group von Neumann Algebra and Embedding Sequences
4.3. Preliminaries on Real Subspaces of the Left Regular Representation
4.4. Sofic Entropy of Gaussian Actions
References
1
3
4
7
7
10
12
16
27
1. Introduction
This paper is concerned with giving new computations for sofic entropy, specifically in computing entropy
of Gaussian actions. Entropy for actions of Z is classical and goes back to work of Kolmogorov and Sinaฤฑฬ.
Entropy roughly measures how chaotic the action of Z is. Kieffer in [20] showed that one can generalize
entropy to actions of amenable groups. An amenable group is a group which has a sequence of nonempty
finite sets which are almost invariant under translation by elements of the group. Abelian groups, nilpotent
groups and solvable groups are amenable, but the free group on r letters is not if r โฅ 2. Entropy for amenable
groups has been studied by many people and is a useful invariant in ergodic theory: it can be computed in
many cases and positivity of entropy implies interesting structural properties.
Fundamental examples in [24] led many to believe that there cannot be a good entropy theory beyond
the realm of amenable groups. In groundbreaking and seminal work Bowen in [1] defined a notion of entropy
for actions of sofic groups. The class of sofic groups is considerably larger than that of amenable groups: it
contains all amenable groups, all residually finite groups, all linear groups and is closed under free products
with amalgamation over amenable subgroups (see [11],[10],[12],[25],[28]). Since the subject is fairly young,
not as much is known about sofic entropy as entropy for actions of amenable groups but some structure is
beginning to emerge. It can be calculated for some interesting examples such as Bernoulli shifts (see [1],[19])
as well as algebraic actions (see [2],[5],[15],[19]). Additionally, recent work in [22],[16] shows that one can
deduce structural properties of an action from assumptions of positive sofic entropy.
Our goal in this paper is to add to the list of computations of sofic entropy by computing the entropy
of Gaussian actions. The Gaussian action construction is a way to associate, in a functorial way, to any
orthogonal representation ฯ : ฮ โ O(H) a probability measure-preserving action called the Gaussian action.
Date: April 11, 2018.
2010 Mathematics Subject Classification. 37A35,28D15, 37A55, 22D25,43A65.
Key words and phrases. Sofic entropy, Gaussian actions, noncommutative harmonic analysis.
1
2
BEN HAYES
We refer the reader to Section 4.1 for the precise definition. For intuition we mention that if H is finitedimensional, then this action is just the induced action of ฮ on H with the Gaussian measure. The Gaussian
action is a natural generalization of this construction to the case of infinite-dimensional representations.
Recall that the left regular representation ฮปR : ฮ โ โ2 (ฮ, R) is given by
(ฮปR (g)ฮพ)(h) = ฮพ(g โ1 h), for ฮพ โ โ2 (ฮ, R), g, h โ ฮ.
It is known that the Gaussian action associated to the left-regular representation ฮ y โ2 (ฮ, R) is the Bernoulli
action with base (R, ฮฝ) where ฮฝ is the Gaussian measure. Thus Gaussian actions are a class of actions which
are similar to the class of Bernoulli shifts.
To the best of our knowledge, entropy for Gaussian actions has only been computed when the acting
group is abelian (see [21] and [9]). To state our result, we need to introduce the following decomposition of
representations. We define singularity of orthogonal representations exactly as in the unitary case. Given
orthogonal representations ฯ1 , ฯ2 of ฮ, we say that ฯ1 is singular with respect to ฯ2 and write ฯ1 โฅ ฯ2 if
no nonzero subrepresentation of ฯ1 embeds into ฯ2 . We say that ฯ1 is absolutely continuous with respect to
ฯ2 , and write ฯ1 โช ฯ2 , if ฯ1 embeds into ฯโโ
. For general pairs of orthogonal representations ฯ1 , ฯ2 we can
2
always write
ฯ1 = ฯ1,a โ ฯ1,s
where ฯ1,s , ฯ1 are singular and ฯ1,a โช ฯ2 . If ฮ is abelian, this reduces to the Lebesgue decomposition in
measure theory. We thus regard this as a noncommutative analogue of the Lebesgue decomposition.
Theorem 1.1. Let ฮ be a countable discrete sofic group with sofic approximation ฮฃ. Let ฯ : ฮ โ O(H) be
an orthogonal representation with H separable. Let ฮ y (Xฯ , ยตฯ ) be the induced Gaussian action; write
ฯ = ฯa โ ฯs where ฯs and ฮปฮ,R are singular and ฯa โช ฮปฮ,R . Then
๏ฃฑ
๏ฃด
๏ฃฒโโ, if hฮฃ,ยตฯs (Xฯs , ฮ) = โโ
hฮฃ,ยตฯ (Xฯ , ฮ) = 0,
if ฯa = 0 and hฮฃ,ยตฯs (Xฯs , ฮ) 6= โโ
๏ฃด
๏ฃณ
โ,
if ฯa 6= 0 and hฮฃ,ยตฯs (Xฯs , ฮ) 6= โโ.
Since it appears to be new, we specifically mention the amenable case.
Corollary 1.2. Let ฮ be a countable discrete amenable group. Let ฯ : ฮ โ O(H) be an orthogonal representation and ฮ y (Xฯ , ยตฯ ) the induced Gaussian action. Write ฯ = ฯ1 โ ฯ2 where ฯ2 is embeddable into
ฮ y โ2 (ฮ, R)โโ , and Homฮ (ฯ1 , ฮปฮ,R ) = {0}. Then hยตฯ (Xฯ , ฮ) = โ if and only if ฯ2 6= 0, and if ฯ2 = 0,
then hยตฯ (Xฯ , ฮ) = 0.
In [15] we gave a formula for entropy of a probability measure-preserving action ฮ y (X, ยต) when X
is a Polish space, ยต is a Borel probability measure, and ฮ y X by homeomorphisms. Given an arbitrary
probability measure-preserving action ฮ y (Y, ฮฝ), a probability measure-preserving action ฮ y (X, ยต) where
X is Polish, ยต is a Borel measure on X and ฮ y X by homeomorphisms is called a Polish model for
ฮ y (Y, ฮฝ) if ฮ y (X, ยต) โผ
= ฮ y (Y, ฮฝ) as probability measure-preserving actions. Our definition of entropy
in terms of a Polish model took into account the topology of X in a nontrivial way like the definition
for entropy in the presence of a compact model developed by Kerr-Li in [19]. Our computation for the
entropy of Gaussian actions goes through Polish models. This model is associated to a family of generators
for the representation, and the measure is canonically defined in terms of the representation. Although
one can write down a compact model, it is unnatural and the measure is not expressed nicely in terms
of the representation. We mention that entropy in the sofic case is roughly a measure of โhow manyโ
finitary simulations a probability measure-preserving action has. The typical way to prove existence of
these simulations is through a probabilistic argument. For the Gaussian action, our probabilistic argument
uses Gaussian measures on finite-dimensional spaces. A consequence of our methods is that, associated
to any sofic approximation of a group, we have a natural way of describing the Gaussian measure for a
subrepresentation of the left regular representation as a limit of finite-dimensional Gaussian measures.
Let us sketch how we are able to handle the case ฯ is singular with respect to ฮปR when ฮ is nonabelian.
In the case ฮ = Z, the problem of showing that ฮ y (Xฯ , ยตฯ ) has zero entropy reduces to the fact that if
ยต, ฮฝ are two singular measures on T = R/Z, then there is a f โ C(T) with 0 โค f โค 1 so that f is โcloseโ to
1 in L2 (ยต) and close to zero in L2 (ฮฝ). As the representation theory of a group is captured by its universal
C โ -algebra it is natural to replace C(T) with C โ (ฮ) in the nonabelian case. This statement about singularity
SOFIC ENTROPY OF GAUSSIAN ACTIONS
3
of representations then becomes a statement about singularity of measures and we can prove an analogous
characterization of singularity of representations in terms of elements of C โ (ฮ). In short, we abstract the
harmonic analysis present in the abelian case to noncommutative harmonic analysis using the framework of
C โ -algebras.
We mention that if ฮ is amenable and is an infinite conjugacy class group (i.e. every nontrivial conjugacy
class is infinite) then there is a easy proof that if ฯ : ฮ โ O(H) embeds into ฮปโโ
ฮ,R , then hยตฯ (Xฯ , ฮ) = โ.
Namely, one can show in this case that there is an n so that ฯโn contains ฮปฮ,R (this is a consequence of the
theory of II1 factors). In this case (Xฯ , ยตฯ ) will factor onto (Xฮป , ยตฮป ) which is isomorphic to ฮ y (R, ฮท)ฮ
where ฮท is the Gaussian measure. Since entropy for amenable groups decreases under factor maps, we are
done. This proof fails disastrously in the non-amenable case. It is very far from true that sofic entropy
decreases under factor maps for non-amenable groups. In fact, it can be shown that for every nonamenable
group there is a ฮฑ > 0 so that if (X, ยต) is a measure space with H(X, ยต) โฅ ฮฑ then ฮ y (X, ยต)ฮ factors onto
every nontrivial Bernoulli shift (see [4] Corollary 1.6), even a Bernoulli shift with infinite entropy. Moreover,
if ฮ contains a free group then ฮฑ can be taken to be any positive number [3]. In fact, even more is true: a
recent result of Seward (see [29], Theorem 1.1) implies that for every nonamenable sofic group ฮ, there is an
ฮฑ > 0 so that any probability measure-preserving action of ฮ is a factor of an action having sofic entropy
less than ฮฑ. Thus, there is no simple proof in the nonamenable case based on factors, and we must use a
direct proof. Even in the amenable case this argument relies on the group being an infinite conjugacy class
group and one needs general methods to handle the general case.
2. Preliminaries on Sofic Entropy
We use Sn for the symmetric group on n letters. If A is a set, we will use Sym(A) for the set of bijections
of A.
Definition 2.1. Let ฮ be a countable discrete group. A sofic approximation of ฮ is a sequence ฮฃ = (ฯi : ฮ โ
Sdi ) of functions (not assumed to be homomorphisms) so that
lim udi ({1 โค k โค di : ฯi (g)ฯi (h)(k) = ฯi (gh)(k)}) = 1, for all g, h โ ฮ
iโโ
lim udi ({1 โค k โค di : ฯi (g)(k) 6= ฯi (h)(k)}) = 1, for all g 6= h in ฮ.
iโโ
We will call ฮ sofic if it has a sofic approximation.
All amenable groups and residually finite groups are sofic. Also, it is known that soficity is closed under free
products with amalgamation over amenable subgroups (see [12],[25],[11],[10], [28]). Additionally, residually
sofic groups and locally sofic groups are sofic. Thus by Malcevโs Theorem we know all linear groups are sofic.
It is known that graph products of sofic groups are sofic by [7]. If ฮ is a subgroup of ฮ, and ฮ is sofic and
ฮ y ฮ/ฮ is amenable (in the sense of having a ฮ-invariant mean) then ฮ is sofic. One can argue this by the
same methods of Theorem 1 of [12] (for example consider the observations after Definition 12.2.12 of [6]).
We recall the definition of entropy in the presence of a Polish model given in [16]. Let X be a Polish
space and let ฮ be a countable, discrete group with ฮ y X by homeomorphisms. We say that a continuous
pseudometric โ on X is dynamically generating if for every x โ X and every neighborhood U of x in X
there exists a finite F โ ฮ and a ฮด > 0 so that if y โ X and
max โ(gx, gy) < ฮด
gโF
then y โ U. Notice that our definition includes the hypothesis that โ is continuous. We use Cb (X) for the
Banach space of bounded, continuous functions on X with norm
kf k = sup |f (x)|.
xโX
Given a pseudometric space (X, โ), A, B โ X and ฮต > 0, we say that A is ฮต-contained in B and write
A โฮต B if for any a โ A, there is a b โ B so that โ(a, b) โค ฮต. We say that A โ X is ฮต-dense if X โฮต A.
We use Sฮต (X, โ) for the minimal cardinality of an ฮต-dense subset of X. We say that A โ X is ฮต-separated if
for any a1 6= a2 in A we have โ(a1 , a2 ) > ฮต. We use Nฮต (A, โ) for the maximal cardinality of an ฮต-separated
subset of X. We leave it as an exercise to show that
(1)
N2ฮต (A, โ) โค Sฮต (A, โ) โค Nฮต (A, โ),
4
BEN HAYES
and that if ฮด > 0 and A โฮด B then
S2(ฮต+ฮด) (A, โ) โค Sฮต (B, โ).
We use โ2 for the metric on X n defined by
n
1X
โ(ฯ(j), ฯ(j))2 .
โ2 (ฯ, ฯ)2 =
n j=1
If X is a Polish space we use Prob(X) for the space of all Borel probability measures on X. If ฮ is a countable,
discrete group with ฮ y X by homeomorphisms we use Probฮ (X) for the space of all ฮ-invariant elements
of Prob(X). We are now ready to state our definition of sofic entropy from [16]. It is defined by counting
the exponential growth of maps from {1, . . . , di } โ X which approximately preserve the measure-theoretic
structure of X and are approximately equivariant. We call these maps microstates (this is a heuristic term
and will not be defined rigorously).
Definition 2.2. Let ฮ be a countable, discrete, sofic group with sofic approximation ฮฃ = (ฯi : ฮ โ Sdi ).
Let X be Polish space with ฮ y X by homeomorphisms. Fix a bounded, continuous pseudometric on X.
For a finite F โ ฮ and ฮด > 0 we let Map(โ, F, ฮด, ฯi ) be all ฯ โ X di so that
max โ2 (gฯ, ฯ โฆ ฯi (g)) < ฮด.
gโF
Notice that Map(โ, F, ฮด, ฯi ) only accounts for the group action and not the measure-theoretic structure
of X. Recall that Cb (X) denotes the space of bounded continuous functions on X. For ยต โ Prob(X), a finite
L โ Cb (X), and a ฮด > 0 we let
Z
Z
\
UL,ฮด (ยต) =
ฮฝ โ Prob(X) :
f dยต โ f dฮฝ < ฮด .
f โL
The sets UL,ฮด (ยต) form a basis of open sets for a topology called the weak topology. We use this topology to
account for the measure-theoretic structure in our microstates.
Definition 2.3. Let ฮ be a countable, discrete, sofic group with sofic approximation ฮฃ = (ฯi : ฮ โ Sdi ).
Let X be Polish space with ฮ y X by homeomorphisms and fix ยต โ Probฮ (X). For finite F โ ฮ, L โ Cb (X)
and ฮด > 0 we set Mapยต (โ, F, ฮด, L, ฯi ) to be the set of all ฯ โ Map(โ, F, ฮด, L, ฯi ) so that ฯโ (udi ) โ UL,ฮด (ยต).
Definition 2.4. Let ฮ be a countable, discrete, sofic group with sofic approximation ฮฃ = (ฯi : ฮ โ Sdi ).
Let X be Polish space with ฮ y X by homeomorphisms and let ยต โ Probฮ (X). Fix a bounded, dynamically
generating pseudometric on X. For finite F โ ฮ, L โ Cb (X) and ฮด, ฮต > 0 we set
1
hฮฃ,ยต (โ, F, ฮด, L, ฮต) = lim sup log Nฮต (Mapยต (โ, F, ฮด, L, ฯi ), โ2 ),
d
iโโ
i
hฮฃ,ยต (โ, ฮต) =
inf
F โฮ finite,
LโCb (X) finite,ฮด>0
hฮฃ,ยต (โ, F, ฮด, L, ฮต),
hฮฃ,ยต (X, ฮ) = sup hฮฃ,ยต (โ, ฮต).
ฮต>0
We call hฮฃ,ยต (X, ฮ) the entropy of ฮ y (X, ยต) with respect to ฮฃ.
It is shown in [16] that this agrees with entropy as defined by [1],[19].
3. Generating Sets and Tightness
Since Cb (X) is not separable, we would like to reduce checking the approximate measure-preserving
property of our microstates from all functions in Cb (X) to a smaller class of functions. For example Cb (X)
is separable in the topology of uniform convergence on compact sets, so if we require that we have a family
of functions dense in this topology then this will give us a sufficiently small family of functions to deal with.
However, for this to work we need to modify our microstates so that they have some uniform tightness. We
proceed with the definitions.
Definition 3.1. Let X be a Polish space. A family L โ Cb (X) is said to be generating if there is a A > 0
so that for every g โ Cb (X), for every compact K โ X and for every ฮต > 0 there is a f โ Span(L) so that
kf K โ g K k < ฮต and kf k โค Akgk.
SOFIC ENTROPY OF GAUSSIAN ACTIONS
5
We now proceed with our modified version of sofic entropy in the case of a generating set of functions.
Definition 3.2. Let ฮ be a countable discrete group and ฯ : ฮ โ Sd a function for some d โ N. Let
X be a Polish space with ฮ y X by homeomorphisms preserving a Borel probability measure ยต. Let
โ be a dynamically generating pseudometric on X. For an open subset U of X, for ฮท, ฮด > 0 and finite
L โ Cb (X), F โ ฮ we let MapU,ฮท
ยต (โ, F, ฮด, L, ฯ) be the set of ฯ โ Mapยต (โ, F, ฮด, L, ฯ) so that
ฯโ (ud )(U ) > 1 โ ฮท.
Suppose now that ฮ is sofic. For a dynamically generating pseudometric โ, L โ Cb (X) and a sofic approximation ฮฃ = (ฯi : ฮ โ Sdi ) set:
1
hU,ฮท
log Nฮต (MapU,ฮท
ยต (โ, F, ฮด, L, ฯi )),
ฮฃ,ยต (โ, ฮต, F, ฮด, L) = lim sup
iโโ di
hK,ฮท
ฮฃ,ยต (โ, ฮต, F, ฮด, L) =
hฮทฮฃ,ยต (โ, ฮต, F, ฮด, L) =
hฮฃ,ยต (โ, ฮต, L) =
inf
open U โ K
hU,ฮท
ฮฃ,ยต (โ, ฮต, F, ฮด, L),
sup
hK,ฮท
ฮฃ (โ, ฮต, F, ฮด, L)
KโX compact
inf
hฮทฮฃ,ยต (โ, ฮต, F, ฮด, L)
ฮท,ฮด>0,
F โฮ finite,
LโL finite
hฮฃ,ยต (โ, L) = sup hฮฃ,ยต (โ, ฮต, L).
ฮต>0
In the above definition, the necessary trick is to add more quantifiers to the definition of sofic entropy.
The reader may be concerned already by the number of quantifiers involved in the original definition of
sofic entropy. When we compute sofic entropy of Gaussian actions in Section 4.1 it will be clear that this is
the correct tradeoff. The difficulty involved in the computation will not be in dealing with quantifiers but
instead that we can only show the approximate measure-preserving property on a class of functions which
is not norm dense. However, one can easily see that this class of functions is generating and so we will use
the above definition.
Theorem 3.3. Let ฮ be a countable discrete sofic group with sofic approximation ฮฃ. Let X be a Polish space
with ฮ y X by homeomorphisms preserving a Borel probability measure ยต. For any dynamically generating
pseudometric โ on X, L โ Cb (X) generating, and ฮต > 0
In particular,
hฮฃ,ยต (โ, ฮต) = hฮฃ,ยต (โ, ฮต, L).
hฮฃ,ยต (X, ฮ) = hฮฃ,ยต (โ, L).
Proof. The โin particularโ part follows from Theorem 3.12 of [16]. We first show that
hฮฃ,ยต (โ, ฮต) โค hฮฃ,ยต (โ, ฮต, L).
Let ฮท > 0. Since X is Polish, we may find a compact K โ X with
ยต(X \ K) < ฮท.
Fix an open subset U of X containing K. By Urysohnโs Lemma we may find a f โ Cb (X) with
Note that if ฮฝ โ Prob(X) and ฮด > 0 with
ฯK โค f โค ฯU .
Z
X
we have
f dยต โ
Z
f dฮฝ < ฮด,
X
ฮฝ(U ) > 1 โ ฮท โ ฮด.
We now see that for all finite L โ L, F โ ฮ, 0 < ฮด < ฮท we have
MapU,ฮท+ฮด (โ, F, ฮด, L, ฯi ) โ Map(โ, F, ฮด, L โช {f }, ฯi ).
Thus for all ฮด < ฮท, and all finite F โฒ โ F, Lโฒ โ L โช {f } < and ฮด โฒ < ฮด,
hฮฃ,ยต (โ, ฮต, F โฒ , ฮด โฒ , Lโฒ ) โค hU,2ฮท
ฮฃ,ยต (โ, ฮต, F, ฮด, L).
6
BEN HAYES
Taking the infimum over F โฒ , ฮด โฒ , Lโฒ we find
hฮฃ,ยต (โ, ฮต) โค hU,2ฮท
ฮฃ,ยต (โ, ฮต, F, ฮด, L).
Taking the infimum over all U โ K we find that
K,2ฮท
hฮฃ,ยต (โ, ฮต) โค hฮฃ,ยต
(โ, ฮต, F, ฮด, L).
Now take the supremum over all K and then the infimum over all ฮท, ฮด, F, L โ L to find that
hฮฃ,ยต (โ, ฮต) โค hฮฃ,ยต (โ, ฮต, L).
We now show that
hฮฃ,ยต (โ, ฮต, L) โค hฮฃ,ยต (โ, ฮต).
Let A > 0 be as in the definition of generating. Let F โ ฮ and L โ Cb (X) be given finite sets and ฮด > 0. Let
ฮบ > 0 be sufficiently small depending upon F, L, ฮด in a manner to be determined later. Since X is Polish,
we may find a compact K0 โ X so that
ยต(K0 ) โฅ 1 โ ฮบ.
Let K โ X compact be given with K โ K0 . Let L = {f1 , . . . , fl }. For 1 โค j โค l we can find a gj โ Span(L)
so that
kgj K โ fj K k < ฮด
and
kgj k โค Akfj k.
We may find an open neighborhood U0 of K so that
kgj
U0
โ fj
k
U0 Cb (U0 )
< ฮด, for j = 1, . . . , l.
Let ฮด โฒ > 0 and F โฒ โ ฮ and Lโฒ โ Cb (X) be finite sets which will depend upon F, ฮด, L in a manner to be
โฒ โฒ
โฒ
determined shortly. Let U be an open neighborhood of K contained in U0 . For ฯ โ MapU,ฮท
ยต (โ, F , ฮด , L , ฯi )
we have
Z
Z
Z
Z
Z
Z
fj dยต โ
fj dฯโ (udi ) โค
gj dฯโ (udi ) +
fj dฯโ (udi ) โ
gj dยต โ
gj dฯโ (udi )
X
X
X
X
X
X
Z
Z
+
fj dยต
gj dยต โ
X
X
Z
Z
โค ฮท(1 + A)kfj k + ฮบ(1 + A)kfj k +
gj dฯโ (udi )
fj dฯโ (udi ) โ
U
U
Z
Z
Z
Z
+
gj dฯโ (udi ) +
gj dยต โ
fj dยต
gj dยต โ
X
X
U
U
Z
Z
โค ฮท(1 + A)kfj k + ฮบ(1 + A)kfj k + 2ฮด +
gj dยต โ
gj dฯโ (udi )
X
If we choose ฮด โฒ > 0 sufficiently small, and F โฒ , Lโฒ sufficiently large we may force
Z
Z
gj dฯโ (udi ) < ฮด.
gj dยต โ
X
X
If we choose
max 2ฮท(1 + A)kfj k < ฮด
j
max ฮบ(1 + A)kfj k < ฮด
j
then we have
Thus
MapU,ฮท (โ, F โฒ , ฮด โฒ , Lโฒ , ฯi ) โ Map(โ, F, 7ฮด, L, ฯi ).
U,ฮท
โฒ โฒ
โฒ
โฒ โฒ
โฒ
hK,ฮท
ฮฃ,ยต (โ, ฮต, F , ฮด , L ) โค hฮฃ,ยต (โ, ฮต, F , ฮด , L ) โค hฮฃ,ยต (โ, ฮต, F, 7ฮด, L).
Since K โ K0 was arbitrary, we may take the supremum over all K to see that
hฮฃ,ยต (โ, ฮต, L) โค hฮทฮฃ,ยต (โ, ฮต, F โฒ , ฮด โฒ , Lโฒ ) โค hฮฃ,ยต (โ, ฮต, F, 7ฮด, L).
X
SOFIC ENTROPY OF GAUSSIAN ACTIONS
7
Now taking the infimum over all F โฒ , ฮด โฒ , Lโฒ proves that
hฮฃ,ยต (โ, ฮต, L) โค hฮฃ,ยต (โ, ฮต).
4. Entropy of Gaussian Actions
Gaussian actions are a natural class of actions induced by orthogonal representations of a group. When
the representation is the left regular representation, the Gaussian action is simply the Bernoulli action on
(R, ฮฝ)ฮ where ฮฝ is the Gaussian measure. In [16], we prove some results which give structural results of
the Koopman representation ฮ y L2 (X, ยต) of a probability measure-preserving action ฮ y (X, ยต) of a sofic
group ฮ, under the assumption that this action has positive entropy. For example, we could show that if
ฮ y (X, ยต) has positive entropy then ฮ y L2 (X, ยต) must contain a โpieceโ of the left regular representation
(for more precise statements see [16] Theorem 1.1 and Corollary 1.2). We will exploit the connections to
representation theory to apply our spectral consequences of positive entropy in [16] to Gaussian actions. We
will also exploit the similarity to Bernoulli shifts to compute the entropy of Gaussian actions.
Let ฮ be a countable discrete group. Recall that an orthogonal representation of ฮ on a real Hilbert
space H is a homomorphism ฯ : ฮ โ O(H) where O(H) is the group of orthogonal transformations of H
(i.e. the set of O โ B(H) so that hOฮพ, Oฮทi = hฮพ, ฮทi for ฮพ, ฮท โ H.) We let HC = H โR C = H + iH be the
complexification of H equipped with the unique sesquilinear inner product extending the one on H. We let
ฯC : ฮ โ U(H + iH) be the complexification of ฯ, i.e. ฯC (g) for g โ ฮ is the unique unitary transformation
so that ฯC (g)(ฮพ) = ฯ(g)ฮพ for ฮพ โ H.
4.1. Definition of Gaussian Actions. The most natural way to define Gaussian actions is by von Neumann algebras.
Definition 4.1. Let H be a complex Hilbert space. A von Neumann algebra on H is a โ-subalgebra of
B(H) containing the identity and closed in the weak operator topology. We say that a vector ฮพ โ H is cyclic
for M if M ฮพ = H.
by
Suppose that (X, ยต) is a standard probability space. For f โ Lโ (X, ยต), let Mf โ B(L2 (X, ยต)) be given
(Mf ฮพ)(x) = f (x)ฮพ(x).
The map f 7โ Mf allows us to view Lโ (X, ยต) as a von Neumann algebra. It turns out (see [8] Theorem
14.5) that if M โ B(H) is a commutative von Neumann algebra with cyclic vector ฮพ with kฮพk2 = 1 and H
is separable, then there is a standard probability space (X, ยต) and a unitary
U : H โ L2 (X, ยต)
so that
U (ฮพ) = 1
U M U โ = {Mf : f โ Lโ (X, ยต)}.
Additionally, if ฯ : M โ C is a linear functional so that
ฯ
{T โM:kT kโค1}
is weak operator topology continuous, then there is a complex measure ฮฝ โช ยต so that if U T U โ = Mf then
Z
ฯ(T ) =
f dฮฝ.
X
โ
We leave it to reader the verify that if U T U = Mf then
Z
f dยต.
hT ฮพ, ฮพi =
X
8
BEN HAYES
Definition 4.2. Let H be a real Hilbert space. The Gaussian algebra associated to H, denoted A(H) is
a commutative von Neumann algebra with cyclic vector โฆ with kโฆk = 1, which is generated by unitaries
{u(ฮพ) : ฮพ โ H} satisfying
u(ฮพ1 + ฮพ2 ) = u(ฮพ1 )u(ฮพ2 ) for ฮพ โ H
hu(ฮพ)โฆ, โฆi = exp(โฯkฮพk2 ).
For a โ A(H), we let
ฯ(a) = haโฆ, โฆi.
Suppose that ฮ is a countable discrete group and ฯ : ฮ โ O(H) is a representation. Then there is a ฯpreserving action ฮฑ on A(H) determined uniquely by
ฮฑ(g)(u(ฮพ)) = u(ฯ(g)ฮพ), for ฮพ โ H.
This action is called the Gaussian action.
By [27] the Gaussian algebra exists and is unique up to ฯ-preserving isomorphism. See also [27] for the
existence and uniqueness of the Gaussian action.
Let us sketch an alternate construction of the Gaussian algebra. First consider the case that H is finiteโฯkxk2โ2 (n)
dimensional. Say H = Rn . In this case we can simply take A(H) = Lโ (Rn , ฮฝ) where dฮฝ = e
dx,
and
Z
ฯ(a) =
a(x) dฮฝ(x),
Rn
u(ฮพ)(x) = exp(2ฯihฮพ, xi).
e
In general, consider the universal โ-algebra A(H)
generated by unitaries u
e(ฮพ), ฮพ โ H satisfying the relation
u
e(ฮพ1 + ฮพ2 ) = u
e(ฮพ1 )e
u(ฮพ2 ) for ฮพ1 , ฮพ2 โ H. Here one can make sense of a unitary in a โ-algebra by saying that
it is an element u so that uโ u = uuโ = 1. One then has to check that there is a well-defined linear function
e
ฯe : A(H)
โ C defined by
e u(ฮพ)) = exp(โฯkฮพk2 ).
ฯ(e
Checking that ฯe is well-defined reduces to showing that if we take ฮพ1 , . . . , ฮพn ,ฮถ1 , . . . , ฮถm โ H and ฮป1 , . . . , ฮปn ,
c1 , . . . , cm โ C with
m
n
X
X
cj u
e(ฮถj ),
ฮปj u
e(ฮพj ) =
j=1
then
n
X
j=1
ฮปj exp(โฯkฮพj k2 ) =
i=1
m
X
j=1
cj exp(โฯkฮถj k2 ).
Replacing H with the span of {ฮพ1 , ยท ยท ยท , ฮพn , ฮถ1 , ยท ยท ยท , ฮถm } reduces the verification that ฯe is well-defined to the
case that H is finite-dimensional, where we have already shown that ฯe is well-defined (by explicitly exhibiting
it as integration with respect to the Gaussian measure as explained above). By similar reasoning, one checks
e โ a) โฅ 0 for a โ A(H).
e
that ฯ(a
One now runs the GNS construction. That is, we let K be the completion of
e
A(H) under the inner product
e โ a).
ha, bi = ฯ(b
e
We then have an induced homomorphism ฯ : A(H)
โ B(K) given by
SOT
e
(ฯ(a))(b) = ab for b โ A(H).
e
We then let A(H) = ฯ(A(H))
, and โฆ = u
e(0), u(ฮพ) = ฯ(e
u(ฮพ)). It is then straightforward to verify that
A(H), โฆ have the desired properties.
By our remarks before this definition if ฯ, ฮ are as in the definition then there is a standard probability
space (Xฯ , ยตฯ ) and a measure-preserving action ฮ y (Xฯ , ยตฯ ) so that
โผ ฮ y (A(H), ฯ).
ฮ y Lโ (Xฯ , ยตฯ ) =
Furthermore, this action is uniquely determined up to isomorphism. Note that for two orthogonal representations
ฯj : ฮ โ O(Hj ), j = 1, 2
SOFIC ENTROPY OF GAUSSIAN ACTIONS
9
we have
ฮ y (Xฯ1 โฯ2 , ยตฯ1 โฯ2 ) โผ
= (Xฯ1 ร Xฯ2 , ยตฯ1 โ ยตฯ2 ).
The definition via von Neumann algebras may be abstract, so let us mention a simple version of the definition
in the case of a cyclic representation. Recall that if t โ cc (ฮ, R) and x โ Rฮ we use
X
tยทx =
t(g)x(g).
gโฮ
Proposition 4.3. Let ฮ be a countable discrete group and ฯ : ฮ โ O(H) an orthogonal representation.
Suppose that there is a vector ฮพ โ H so that H = Span{ฯ(g)ฮพ : g โ ฮ}. Then the Gaussian action is isomorphic
to the shift action on Rฮ with measure determined by
๏ฃถ
๏ฃซ
2
Z
X
๏ฃท
๏ฃฌ
exp(2ฯit ยท x) dยตฮพ (x) = exp ๏ฃญโฯ
t(g)ฯ(g)ฮพ ๏ฃธ for all t โ cc (ฮ, R).
Rฮ
gโฮ
Proof. Choose a realization ฮ y (A(H), ฯ) โผ
= ฮ y Lโ (Xฯ , ยตฯ ). By [30] Proposition 5.3, a sequence an โ
A(H) converges in the strong operator topology to a โ A(H) if and only if
ฯ((a โ an )โ (a โ an )) โ 0.
Thus, t โ
7 u(tฮพ) is a strongly continuous one-parameter group in A(H). Fix ฮถ โ H. By Stoneโs Theorem
there is a closed, densely-defined self-adjoint operator ฯ(ฮถ) on L2 (Xฯ , ยตฯ ) so that for all s โ R
exp(2ฯisฯ(ฮถ)) = u(sฮถ),
in the sense of functional calculus. Recall that Lโ (Xฯ , ยตฯ ) can be viewed as a von Neumann algebra (by
multiplication operators). It is not hard to see that the elements u โ Lโ (Xฯ , ยตฯ ) whose multiplication
operators are unitaries are almost everywhere equal to measurable functions
u : X โ {z โ C : |z| = 1}.
Thus we can identify u(sฮถ) as a measurable function Xฯ โ {z โ C : |z| = 1}. For similar reasons, we can
identify ฯ(ฮถ) with a measurable function Xฯ โ R. Thus for every s โ R, it is true that for almost every
x โ Xฯ we have
exp(2ฯisฯ(ฮถ)(x)) = u(sฮถ)(x).
Define
ฮฆ : X ฯ โ Rฮ
by
ฮฆ(x)(g) = ฯ(ฮพ)(g โ1 x).
Then it is not hard to see that for every s โ R and for all g โ ฮ we have
exp(2ฯisฮฆ(x)(g)) = u(sฯ(g)ฮพ)(x)
for almost every x โ Xฯ . Define ยตฮพ = ฮฆโ ยตฯ . Since the unitaries of the form
u(sฯ(g)ฮพ), s โ R, g โ ฮ
generate all of A(H) we see that ฮฆ gives an ฮ-equivariant isomorphism
(Rฮ , ยตฮพ ) โผ
= (Xฯ , ยตฯ ).
10
BEN HAYES
Additionally for all t โ cc (ฮ, R)
Z
Rฮ
exp(2ฯit ยท x) dยตฮพ (x) =
Z
X
๏ฃซ
exp ๏ฃญ2ฯi
๏ฃซ ๏ฃซ
= ฯ ๏ฃญฯ ๏ฃญ
๏ฃซ
X
gโฮ
๏ฃฌ
= exp ๏ฃญโฯ
X
gโฮ
๏ฃถ
t(g)ฮฆ(x)(g)๏ฃธ dยตฯ (g)
๏ฃถ๏ฃถ
t(g)ฯ(g)ฮพ ๏ฃธ๏ฃธ
X
2
t(g)ฯ(g)
gโฮ
๏ฃถ
๏ฃท
๏ฃธ.
4.2. Preliminaries on the Group von Neumann Algebra and Embedding Sequences. For our
purposes we will need to โlinearizeโ a sofic approximation to approximations of algebras associated to ฮ.
Let C(ฮ) be the ring of finite formal linear combinations of elements of ฮ with addition defined naturally
and multiplication defined by
๏ฃซ
๏ฃถ
!
!
X
X
X X
๏ฃญ
ag g ๏ฃธ
bh h =
ah bhโ1 g g.
gโฮ
hโฮ
gโฮ
hโฮ
We will also define a conjugate-linear involution on C(ฮ) by
๏ฃซ
๏ฃถโ
X
X
๏ฃญ
agโ1 g.
ag g ๏ฃธ =
gโฮ
gโฮ
P
Given a sofic approximation ฮฃ = (ฯi : ฮ โ Sdi ) and ฮฑ = gโฮ ฮฑg g โ C(ฮ) we define ฯi (ฮฑ) โ Mdi (C) by
X
ฯi (ฮฑ) =
ฮฑg ฯi (g).
gโฮ
In order to talk about the asymptotic properties of this extended sofic approximation, we will need a more
analytic object associated to ฮ.
Let ฮป : ฮ โ U(โ2 (ฮ)) be the left regular representation defined by (ฮป(g)ฮพ)(h) = ฮพ(g โ1 h). We will continue
to use ฮป for the linear extension to C(ฮ) โ B(โ2 (ฮ)). The group von Neumann algebra of ฮ is defined by
ฮป(C(ฮ))
W OT
where WOT denotes the weak operator topology. We will use L(ฮ) to denote the group von Neumann
algebra. Define ฯ : L(ฮ) โ C by
ฯ (x) = hxฮดe , ฮดe i.
We leave it as an exercise to the reader to verify that ฯ has the following properties.
1: ฯ (1) = 1,
2: ฯ (xโ x) โฅ 0, with equality if and only if x = 0,
3: ฯ (xy) = ฯ (yx), for all x, y โ M,
4: ฯ is weak operator topology continuous.
We call the third property the tracial property. We will typically view C(ฮ) as a subset of L(ฮ). In particular,
we will use ฯ as well for the functional on C(ฮ) which is just the restriction of ฯ on L(ฮ).
In order to state our linearization of a sofic approximation properly, we give a general definition. By
definition, โ-algebra is a complex algebra equipped with an involution โ which is conjugate linear and
antimultiplicative.
Definition 4.4. A tracial โ-algebra is a pair (A, ฯ ) where A is a โ-algebra equipped with a linear functional
ฯ : A โ C so that
SOFIC ENTROPY OF GAUSSIAN ACTIONS
11
1: ฯ (1) = 1,
2: ฯ (xโ x) โฅ 0, with equality if and only if x = 0,
3: ฯ (xy) = ฯ (yx), for all x, y โ M,
4: For all a โ A, there is a Ca > 0 so that for all x โ A, |ฯ (xโ aโ ax)| โค Ca ฯ (xโ x).
For a, b โ A we let ha, bi = ฯ (bโ a) and we let kak2 = ฯ (aโ a)1/2 . Define L2 (A, ฯ ) to be the Hilbert space
completion of A in this inner product. By condition 4 of the definition, we have a representation ฮป : A โ
B(L2 (A, ฯ )) defined densely by ฮป(a)x = ax for x โ A. We let kakโ = kฮป(a)k.
We make Mn (C) into a tracial โ-algebra using tr = n1 Tr where Tr is the usual trace. In particular, we
use kAk2 = tr(Aโ A)1/2 and kAkโ will denote the operator norm.
We let C[X1 , . . . , Xn ] be the free โ-algebra on n-generators X1 , . . . , Xn . We will call elements of C[X1 , . . . , Xn ]
โ-polynomials in n indeterminates. For a โ-algebra A, for elements a1 , . . . , an โ A, there is a unique โhomomorphism C[X1 , . . . , Xn ] โ A sending Xj to aj . If P โ C[X1 , . . . , Xn ] we use P (a1 , . . . , an ) for the
image of P under this โ-homomorphism.
Definition 4.5. Let (A, ฯ ) be a tracial โ-algebra. An embedding sequence is a sequence ฮฃ = (ฯi : A โ
Mdi (C)) such that
sup kฯi (a)kโ < โ, for all a โ A
i
kP (ฯi (a1 ), . . . , ฯi (an )) โ ฯi (P (a1 , . . . , an ))k2 โ 0, for all a1 , . . . , an โ A and all P โ C[X1 , . . . , Xn ]
tr(ฯi (a)) โ ฯ (a) for all a โ A.
We will frequently use the following fact: if x1 , . . . , xn โ A and P โ C[X1 , . . . , Xn ] then
(2)
kP (ฯi (x1 ), . . . , ฯi (xn ))k2 โ kP (x1 , . . . , xn )k2 .
To see this, we notice that since
kP (ฯi (x1 ), . . . , ฯi (xn )) โ ฯi (P (x1 , . . . , xn ))k2 โ 0,
it suffices to handle the case n = 1 and P (X) = X. Then,
kฯi (x)k22 = tr(ฯi (x)โ ฯi (x))
and since kฯi (x)โ ฯi (x) โ ฯi (xโ x)k2 โ 0 we have
| tr(ฯi (x)โ ฯi (x)) โ tr(ฯi (xโ x))| โ 0.
As
tr(ฯi (xโ x)) โ kxk22 ,
we have proved (2).
The proof of the next two propositions will be left to the reader.
Proposition 4.6. Let ฮ be a countable discrete sofic group with sofic approximation ฮฃ = (ฯi : ฮ โ Sdi ).
Extend ฮฃ to maps ฯi : C(ฮ) โ Mdi (C) linearly. Then ฮฃ is an embedding sequence of (C(ฮ), ฯ ).
Proposition 4.7. Let (A, ฯ ) be a tracial โ-algebra and ฮฃ = (ฯi : A โ Mdi (C)) be an embedding sequence.
If ฮฃโฒ = (ฯiโฒ : A โ Mdi (C)) is another sequence of functions so that
sup kฯiโฒ (a)kโ < โ, for all a โ A,
i
then ฮฃโฒ is an embedding sequence.
kฯi (a) โ ฯiโฒ (a)k2 โ 0, for all a โ A,
We will in fact need to extend our sofic approximation to the group von Neumann algebra. For this, we
use the following.
Lemma 4.8 (Lemma 5.5 in [17]). Let ฮ be a countable discrete group. Then any embedding sequence for
C(ฮ) extends to one for L(ฮ).
We will use the preceding lemma when ฮ is sofic, in combination with Proposition 4.6.
12
BEN HAYES
4.3. Preliminaries on Real Subspaces of the Left Regular Representation. We define the Fourier
algebra of ฮ as all functions ฯ : ฮ โ C so that there is a linear functional ฮฆ : L(ฮ) โ C with ฮฆ {xโL(ฮ):kxkโ โค1}
being weak operator topology continuous so that
ฮฆ(ฮป(g)) = ฯ(g).
We will call ฮฆ the continuous extension of ฯ (note that by continuity and Kaplanskyโs density theorem,
ฮฆ as above must be unique). We let A(ฮ)+ consist of all such ฯ where the continuous extension of ฯ is a
positive linear functional. We let kฯkA(ฮ) = kฮฆk. By [30] Theorem II.2.6 k ยท kA(ฮ) is a norm on A(ฮ) which
makes A(ฮ) a Banach space. By [30] Theorem V.3.15 we have that A(ฮ) consists of all functions of the form
g 7โ hฮป(g)ฮพ, ฮทi where ฮพ, ฮท โ โ2 (ฮ). Moreover
kฯk = inf kฮพkkฮทk
where infimum is over all ฮพ, ฮท so that ฯ(g) = hฮป(g)ฮพ, ฮทi.
For intuition, we leave it to the reader to verify that when ฮ is abelian, then A(ฮ) consists of all fb
b and that A(ฮ)+ consists of all fb where f โ L1 (ฮ)
b and f โฅ 0. We state a few basic (and
where f โ L1 (ฮ),
well-known) properties of A(ฮ) in the following proposition. Lastly, if we are given x โ L(ฮ) we set
x
b = xฮดe โ โ2 (ฮ).
Proposition 4.9. Let ฮ be a countable discrete group.
(1) If ฯ : ฮ โ U(H) is a unitary representation with ฯ โช ฮปฮ , and ฮพ โ H, then ฯ(g) = hฯ(g)ฮพ, ฮพi is in
A(ฮ)+ . In particular there is a ฮถ โ โ2 (ฮ) with hฯ(g)ฮพ, ฮพi = hฮป(g)ฮถ, ฮถi.
(2) If ฯ โ A(ฮ), then ฯ โ A(ฮ) and kฯk = kฯk. If ฯ โ A(ฮ)+ , then so is ฯ.
(3) For x โ L(ฮ) we define ฯx : ฮ โ C by
ฯx (g) = ฯ (xฮป(g)),
then ฯx โ A(ฮ), and ฯx โ A(ฮ)+ if and only if x โ L(ฮ)+ . Additionally
kฯx k = ฯ (|x|),
and {ฯx : x โ L(ฮ)+ } is dense in A(ฮ)+ .
(4) If x, y โ L(ฮ) and ฯ(g) = hฮป(g)b
x, x
bi, ฯ(g) = hฮป(g)b
y , ybi then
kb
x โ ybk22 โค kฯ โ ฯkA(ฮ) .
Proof. (1): The assumption ฯ โช ฮปฮ implies that we may extend ฯ to a โ-homomorphism ฯ : L(ฮ) โ B(H)
so that
ฯ {xโL(ฮ):kxkโ โค1}
is weak operator topology continuous. Thus the continuous extension ฮฆ of ฯ is given by
ฮฆ(x) = hฯ(x)ฮพ, ฮพi.
The โin particularโ part follows from the discussion preceding the proposition.
(2): Write
ฯ(x) = hฮป(x)ฮพ, ฮทi,
2
with ฮพ, ฮท โ โ (ฮ). Then
ฯ(x) = hฮป(x)ฮพ, ฮทi
the conclusion follows easily from this equality.
(3): If x โ L(ฮ)+ , then the continuous extension ฮฆ of ฯx is given by
ฮฆ(y) = ฯ (xy).
For y โฅ 0,
ฮฆ(y) = ฯ (xy) = ฯ (y 1/2 xy 1/2 ) โฅ 0
as x โฅ 0.
Conversely, if ฯx โ A(ฮ)+ let ฮฆ be the continuous extension of ฯx to L(ฮ). Then for all y โ L(ฮ)
hxyฮดe , yฮดe i = ฯ (y โ xy) = ฯ (xyy โ ) = ฮฆ(yy โ ) โฅ 0.
Since L(ฮ)ฮดe = โ2 (ฮ), we see that x โ L(ฮ)+ . The norm equality and density statement are contained in
[31] Lemma IX.2.12.
SOFIC ENTROPY OF GAUSSIAN ACTIONS
13
(4): This is the Powers-Stรธrmer inequality (see [6] Proposition 6.2.4 for a proof which generalizes to our
situation).
In order to compute the entropy of Gaussian actions, we will need to discuss real subspaces of โ2 (ฮ), and
for this we need a real version of L(ฮ). We let LR (ฮ) be all x โ L(ฮ) so that x
b โ โ2 (ฮ, R). Recall that the
ฮ
convolution between f โ cc (ฮ), g โ C is defined by
X
f โ g(x) =
f (h)g(hโ1 x).
hโฮ
ฮ
We similarly define f โ g if f โ C and g โ cc (ฮ). If f โ cc (ฮ), we use
X
fห =
f (g)g โ C(ฮ).
gโฮ
Note that for all f โ cc (ฮ), x โ L(ฮ) we have xf = x
b โ f. Thus
kxkโ =
sup
f โcc (ฮ),kf k2 =1
kb
x โ f k2 .
cโ . Thus for all f โ cc (ฮ),
b=x
Define J : โ2 (ฮ) โ โ2 (ฮ) by (Jf )(x) = f (xโ1 ), and observe that J x
cโ โ f k2 โค kxโ kโ kf k2 = kxkโ kf k2 .
kf โ x
bk2 = kJ x
b โ Jf k2 = kx
Replacing x with xโ we see that
kxkโ =
sup
f โcc (ฮ),kf k2 =1
kf โ x
bk2 .
Thus there is a unique bounded operator on โ2 (ฮ) extending f 7โ f โ x
b of norm equal to that of x. We write
the image of ฮพ โ โ2 (ฮ) under this operator as ฮพx. We use
โ2 (ฮ)x = {ฮพx : ฮพ โ โ2 (ฮ)}.
By Theorem 43.11 and Proposition 43.10 of [8], we have
(
{b
x : x โ L(ฮ)} =
2
ฮพ โ โ (ฮ) :
sup
f โcc (ฮ),kf kโค1
)
kฮพ โ f k2 < โ .
For ฮพ โ โ2 (ฮ), f โ cc (ฮ) we have
kฮพ โ f k2 = kฮพ โ f k2
where bar denotes complex conjugation. It follows that there is a weak operator topology continuous,
norm-one operator
C : L(ฮ) โ L(ฮ)
so that
c =x
Cx
b.
Lemma 4.10. Let ฮ be a countable discrete group and ฯ : ฮ โ O(H) an orthogonal representation on a real
separable Hilbert space H with ฯC โช ฮปฮ . Suppose that ฯ has a cyclic vector. Then there is an orthogonal
projection p โ LR (ฮ) so that
ฮyHโผ
= ฮ y โ2 (ฮ, R)p.
Proof. Let ฮพ be a cyclic vector for H, and define ฯ : ฮ โ R by
ฯ(g) = hฯ(g)ฮพ, ฮพi,
then ฯ(g) โ A(ฮ)+ . By (3) of the preceding Proposition, we may find xn โ L(ฮ)+ so that
Letting yn =
xn +Cxn
2
kฯ โ ฯxn k โ 0.
and using that ฯ = ฯ we find that
kฯ โ ฯyn k โ 0.
d
1/2
Let ฮถn = yn . Approximating the square root function by polynomials, we see that ฮถn โ โ2 (ฮ, R). Note that
ฯyn (g) = ฯ (ฮป(g)yn1/2 yn1/2 ) = ฯ (yn1/2 ฮป(g)yn1/2 ) = hฮป(g)ฮถn , ฮถn i.
14
BEN HAYES
By the Powers-Stรธrmer inequality (i.e. (4) of the preceding Proposition),
kฮถn โ ฮถm k โค kฯyn โ ฯym k1/2
so that ฮถn is a Cauchy sequence. Hence ฮถn converges to a ฮถ โ โ2 (ฮ, R). Also,
ฯ(g) = lim ฯyn (g) = lim hฮป(g)ฮถn , ฮถn i = lim hฮป(g)ฮถ, ฮถi.
nโโ
Thus
2
nโโ
nโโ
ฮyHโผ
= ฮ y Span{ฮป(g)ฮถ : g โ ฮ}.
Let P be the projection from โ (ฮ, R) onto Span{ฮป(g)ฮถ : g โ ฮ} and let PC denote its complexification as an
operator on โ2 (ฮ). As PC commutes with ฮป(g), Theorem 43.11 of [8] shows that there is a unique orthogonal
projection p โ L(ฮ) so that for all ฮพ โ โ2 (ฮ) we have PC ฮพ = ฮพp. Moreover,
so p โ LR (ฮ). Thus
๏ฃฑ
๏ฃฒX
๏ฃณ
gโฮ
pb(g) = hb
p, ฮดg i = hP (ฮดe ), ฮดg i โ R
๏ฃผ
๏ฃฝ
f (g)ฮป(g)ฮถ : f โ cc (ฮ, R) = P (โ2 (ฮ, R)) = โ2 (ฮ, R)p.
๏ฃพ
We will need to extend a sofic approximation to an embedding sequence of L(ฮ) as in Lemma 5.5 in [17],
however we will also want ฯi (LR (ฮ)) โ Mdi (R).
Proposition 4.11. Let ฮ be a countable discrete group and ฮฃ = (ฯi : ฮ โ Sdi ) a sofic approximation.
(i): There exists an embedding sequence ฮฃ = (ฯi : L(ฮ) โ Mdi (C)) such that
X
ฯi (ฮฑ) =
ฮฑ
b(g)ฯi (g)
gโฮ
and ฯi (LR (ฮ)) โ Mdi (R).
(ii) If ฮฃ = (ฯi : L(ฮ) โ Mdi (C)) is as in (i), and p โ LR (ฮ) is an orthogonal projection, then there are
orthogonal projections pi โ Mdi (R) so that
kฯi (p) โ pi k2 โ 0.
Proof. (i): By Lemma 4.8 we may extend to some embedding sequence ฮฃ = (ฯi : L(ฮ) โ Mdi (C)) so that
X
ฯi (ฮฑ) =
ฮฑ
b(g)ฯi (g).
gโฮ
By Proposition 4.7, it suffices to show that for all x โ LR (ฮ) \ R(ฮ), there are xi โ Mdi (R) so that
sup kxi kโ < โ
i
and
kxi โ ฯi (x)k2 โ 0.
For A โ Mn (C) define A โ Mn (C) by Aij = Aij , then
kAkโ = kAkโ
It suffices to show that
kAk2 = kAk2 .
kฯi (Cx) โ ฯi (x)k2 โ 0
for all x โ L(ฮ). Indeed, assuming we have the above convergence we may then redefine ฯi (x) for x โ LR (ฮ)
by 21 (ฯi (x) + ฯi (x)). So let x โ L(ฮ), let ฮต > 0, and let ฮฑ โ C(ฮ) be such that
kxฮดe โ ฮป(ฮฑ)ฮดe k2 < ฮต.
Since ฯi (Cฮป(ฮฑ)) = ฯi (ฮฑ),
kฯi (Cx) โ ฯi (x)k2 โค kฯi (Cx) โ ฯi (Cฮป(ฮฑ))k2 + kฯi (x) โ ฯi (ฮป(ฮฑ))k2
= kฯi (Cx) โ ฯi (Cฮป(ฮฑ))k2 + kฯi (x) โ ฯi (ฮป(ฮฑ))k2 .
SOFIC ENTROPY OF GAUSSIAN ACTIONS
15
Letting i โ โ and using that ฯi is a sofic approximation we find that
lim sup kฯi (Cx) โ ฯi (x)k2 โค kCxฮดe โ Cฮป(ฮฑ)ฮดe k + kxฮดe โ ฮป(ฮฑ)ฮดe k2 < 2ฮต.
iโโ
Letting ฮต โ 0 proves (i).
(ii): Since ฯi is an embedding sequence we have
k|ฯi (p)|2 โ ฯi (p)k2 โ 0,
k|ฯi (p)|2 โ |ฯi (p)|4 k2 โ 0.
By functional calculus,
kฯ[1/2,3/2] (|ฯi (p)|2 ) โ |ฯi (p)|2 )k22 = kฯ{t:|tโ1|>1/2} (|ฯi (p)|2 )k22
= tr(ฯ{t:|tโ1|>1/2} (|ฯi (p)|2 ))
โค 16 tr(||ฯi (p)|2 โ |ฯi (p)|4 |2 )
= 16k|ฯi (p)|2 โ |ฯi (p)|4 k22
โ 0.
Thus setting pi = ฯ[1/2,3/2] (|ฯi (p)|2 ) completes the proof.
Lastly, we will need an analogous definition of singularity, as in the unitary case. If ฯj : ฮ โ O(Hj ), j = 1, 2
are two orthogonal representations, we use Homฮ (ฯ1 , ฯ2 ) for the space of real, linear, bounded, ฮ-equivariant
maps from H1 โ H2 . We say that ฯ1 , ฯ2 are mutually singular, written ฯ1 โฅ ฯ2 , if whenever ฯโฒj is a nonzero
subrepresentation of ฯj for j = 1, 2 we have that ฯโฒ1 , ฯโฒ2 are not isomorphic. Similarly, we say that ฯ1 โช ฯ2
if ฯ1 is embeddable into ฯโโ
.
2
Lemma 4.12. Let ฮ be a countable discrete group, and ฯj : ฮ โ O(Hj ) two orthogonal representations. The
following are equivalent.
(i): ฯ1 โฅ ฯ2
(ii): Homฮ (ฯ1 , ฯ2 ) = {0},
(iii): Homฮ (ฯ2 , ฯ1 ) = {0}.
Proof. The proof of (ii) equivalent to (iii) and (ii) implies (i) is the same as in Proposition 4.2 of [16]. We
can copy the proof of (i) implies (ii) in Proposition 4.2 of [16] provided we prove an analogue of the Polar
decomposition.
So let T : H1 โ H2 be a bounded operator. Let
TC : H1,C โ H2,C
be the complexification of T. Using T t for the real Banach space transpose of T,
TCโ
Thus
H2
= T t.
TCโ TC (H1 ) โ H1 ,
approximating the square root function by polynomials, we see that
|TC |(H1 ) โ H1 .
Let
be the polar decomposition. As
TC = U |TC |
U = SOT โ lim TC (|TC | + ฮต)โ1 ,
ฮตโ0
we find that U (H1 ) โ H2 . The rest is as in Proposition 4.2 of [16].
We now show that in the case of the left regular representation, that the concepts of singularity and
absolute continuity in the real case are related to the complex case.
16
BEN HAYES
Lemma 4.13. Let ฮ be a countable discrete group. Let ฯ : ฮ โ O(H) be an orthogonal representation. Then
ฯC โช ฮปฮ (in the unitary sense) if and only if ฯ โช ฮปฮ,R . Similarly ฯC โฅ ฮปฮ if and only if ฯ โฅ ฮปฮ,R .
Proof. Suppose ฯC โช ฮปฮ . Applying Zornโs Lemma to write ฯ as a direct sum of cyclic representations and
applying Lemma 4.10 we see that ฯ โช ฮปฮ,R . The converse is even easier.
Suppose ฯC โฅ ฮปฮ . If K โ H is a closed, linear, ฮ-invariant subspace so that ฯ K embeds into ฮปฮ,R , then
by complexification we have that ฯC K embeds into ฮปฮ . Conversely, suppose T โ Homฮ (ฯC , ฮปฮ ). Then T H
C
is a ฮ-equivariant, bounded, real-linear map
H โ โ2 (ฮ).
As โ2 (ฮ) โผ
= โ2 (ฮ, R)โ2 as a real representation we see that T
HC (as a complex vector space) we see that T = 0.
H
= 0, by the previous Lemma. Since H spans
The following is proved in the same way as Proposition 4.3 of [16].
Proposition 4.14. Let ฮ be a countable discrete group and ฯj : ฮ โ O(Hj ), j = 1, 2 be two orthogonal
representations. Then
ฯ1 = ฯ1,s โ ฯ1,c
where ฯ1,s โฅ ฯ2 , and ฯ1,c โช ฯ2 .
4.4. Sofic Entropy of Gaussian Actions. In this section we compute the entropy of Gaussian actions.
Let us first start with a very simple corollary of Theorem 4.4 of [16].
Corollary 4.15. Let ฮ be a countable discrete sofic group with sofic approximation ฮฃ. Let ฯ : ฮ โ O(H) be
an orthogonal representation on a separable Hilbert space H. Suppose that ฯ โฅ ฮปฮ,R . Then if ฮ y (Xฯ , ยตฯ )
is the corresponding Gaussian action we have
hฮฃ,ยตฯ (Xฯ , ฮ) โค 0.
Proof. As in proposition 4.3, for any ฮพ โ H we can find a unique
ฯ(ฮพ) : Xฯ โ R
so that for all t โ R we have
exp(2ฯitฯ(ฮพ)(x)) = u(tฮพ)(x)
for almost every x โ Xฯ . By uniqueness, we have that
ฯ(ฮพ + ฮท) = ฯ(ฮพ) + ฯ(ฮท)
almost everywhere. By [27] we have that ฯ(ฮพ) โ L2 (Xฯ , ยตฯ ) for all ฮพ โ H and that in fact
ฮ y Span{ฯ(ฮพ) : ฮพ โ H} โผ
= ฮ y H โฅ ฮปฮ .
We have that Lโ (Xฯ , ยตฯ ) is generated as a von Neumann algebra by
u(tฯ(g)ฮพ) = exp(2ฯitฯ(ฯ(g)ฮพ)) for t โ R, ฮพ โ H, g โ ฮ.
From this, it is not hard to argue that the sigma-algebra generated by
{ฯ(ฮพ)โ1 (E) : E โ C is Borel, ฮพ โ H}
is all measurable sets (up to measure zero). Thus by Theorem 4.4 of [16] and Lemma 4.13 we know that
hฮฃ,ยตฯ (Xฯ , ฮ) โค 0.
We turn to the computation of sofic entropy of Gaussian actions in the case that ฯC โช ฮปฮ . We will need
the following general Lemmas.
SOFIC ENTROPY OF GAUSSIAN ACTIONS
17
Lemma 4.16. Let ฮ be a countable discrete sofic group with sofic approximation ฮฃ = (ฯi : ฮ โ Sdi ). Let
X be a Polish space with a bounded, compatible (not necessarily complete) metric โโฒ , and fix x0 โ X. Let
ฮ y X ฮ be the Bernoulli action, and give X ฮ the dynamically generating pseudometric
โ(x, y) = โโฒ (x(e), y(e)).
(E)
For a finite E โ ฮ and x โ X di define ฯx : {1, . . . , di } โ X ฮ by
(
x(ฯi (g)โ1 (j)), if g โ E
(E)
ฯx (j)(g) =
x0 ,
if g โ
/ E.
For any finite F โ ฮ, there is a finite E0 โ ฮ so that if E โ ฮ is a finite set containing E0 , then for all
ฮด > 0 and for all large i we have
ฯx(E) โ Map(โ, F, ฮด, ฯi ).
Proof. For h โ F, we have
โ2 (hฯx(E) , ฯx(E) โฆ ฯi (h))2 =
If E โ F โช F โ1 โช {e}, then we have
โ2 (hฯx(E) , ฯx(E) โฆ ฯi (h))2 =
1
di
di
1 X
โโฒ (ฯx(E) (j)(hโ1 ), ฯx(E) (ฯi (h)(j))(e))2 .
di j=1
X
โโฒ (x(ฯi (hโ1 )โ1 (j)), x(ฯi (h)(j)))2 .
j:ฯi (hโ1 )โ1 (j)6=ฯi (h)(j)
Let M be the diameter of (X, โโฒ ) then we have
โ2 (hฯx(E) โฆ ฯi (h), hฯx(E) )2 โค M udi ({1 โค j โค di : ฯi (hโ1 )โ1 (j) 6= ฯi (h)(j)}) โ 0
by soficity. Setting E0 = F โช F โ1 โช {e} completes the proof.
Lemma 4.17. Let ฮ be a countable discrete sofic group with sofic approximation ฮฃ = (ฯi : ฮ โ Sdi ). By
Lemma 4.8 extend ฮฃ to an approximation sequence ฮฃ = (ฯi : L(ฮ) โ Mdi (C)) so that for ฮฑ โ C(ฮ)
X
ฯi (ฮฑ) =
ฮฑ
b(g)ฯi (g).
gโฮ
Fix a finite F โ ฮ and a x โ L(ฮ), and let xi โ Mdi (C) be such that
sup kxi kโ < โ,
i
kฯi (x) โ xi k2 โ 0.
Then the following statements hold.
(i): There is a sequence Ci โ {1, . . . , di } so that
udi (Ci ) โ 1
with
lim
iโโ
sup
tโRF ,sโRF ,
jโCi
kฯi (tฬ)xi ฯi (sฬ)ej k2โ2 (di ) โ kฮป(tฬ)xฮป(sฬ)ฮดe k22
ktk2โ2 (F ) ksk2โ2 (F )
= 0.
(ii): There is a sequence Ai โ {1, . . . , di }2 so that
udi โ udi (Ai ) โ 1,
and
lim
iโโ
sup
tโRF ,sโRF ,
(j,k)โAi
kฯi (tฬ)โ xi ej โ ฯi (sฬ)โ xi ek k2โ2 (di ) โ kฮป(tฬ)โ xฮดe k22 โ kฮป(sฬ)xฮดe k22
(ktkโ2 (F ) + kskโ2 (F ) )2
= 0.
18
BEN HAYES
Proof. (i): We first handle the case that x โ C(ฮ) and xi = ฯi (x). We may choose a Ci so that
udi (Ci ) โ 1,
ฯi (tฬxsฬ)ej = ฯi (tฬ)ฯi (x)ฯi (sฬ)ej ,
for j โ Ci . By soficity, we may also force that
ฯi (g)ej 6= ฯi (h)ej for g 6= h in supp(tฬxsฬ), and j โ Ci ,
while still having
udi (Ci ) โ 1.
In this case it is easy to see that
kฯi (tฬ)ฯi (x)ฯi (sฬ)ej k2โ2 (di ) = kฯi (tฬxsฬ)ej k2โ2 (di ) = kฮป(tฬ)xฮป(sฬ)ฮดe k2โ2 (di )
for all j โ Ci .
Now we handle the general case. Let ฮต > 0, and choose ฮฑ โ C(ฮ) so that
k(ฮป(ฮฑ) โ x)ฮดe k2 < ฮต.
Since ฯi is an approximation sequence by (2) we have for all g, h โ ฮ that
lim kฯi (g)ฯi (ฮฑ)ฯi (h) โ ฯi (g)xi ฯi (h)k2 = kฮป(g)(ฮป(ฮฑ) โ x)ฮป(h)ฮดe k2 < ฮต.
iโโ
Thus for all large i we have
di
X
1 X X
kฯi (g)ฯi (ฮฑ)ฯi (h)ej โ ฯi (g)xi ฯi (h)ej k2โ2 (di ) =
kฯi (g)ฯi (ฮฑ)ฯi (h) โ ฯi (g)ฯi (ฮฑ)ฯi (h)k2L2 (Md (C),tr)
i
di
j=1
g,hโF
g,hโF
< ฮต|F |2 .
For such i, we may find a Ci โ {1, . . . , di } with
so that
udi (Ci ) โฅ (1 โ
โ
ฮต|F |2 )
kฯi (g)ฯi (ฮฑ)ฯi (h)ej โ ฯi (g)xi ฯi (h)ej k2โ2 (di ) <
โ
ฮต
for all g, h โ F and all large i, and j โ Ci . Thus for all j โ Ci , and all s, t โ RF
X
kฯi (tฬ)xi ฯi (sฬ)ej โ ฯi (tฬ)ฯi (ฮฑ)ฯi (sฬ)ej kโ2 (di ) โค
|t(g)s(h)|kฯi (g)xi ฯi (h)ej โ ฯi (g)ฯi (ฮฑ)ฯi (h)ej kโ2 (di )
g,hโฮ
โค ฮต1/4 |F |2 ktkโ2 (F ) kskโ2 (F ) .
Therefore for j โ Ci and all large i, and all t, s โ RF
|kฯi (tฬ)xi ฯi (sฬ)ej kโ2 (di ) โ kฯi (tฬ)ฯi (ฮฑ)ฯi (sฬ)ej k2 | โค ฮต1/4 |F |2 ktkโ2 (F ) kskโ2 (F ) .
By the first part, we can find a Ciโฒ โ {1, . . . , di } with
and
udi (Ciโฒ ) โ 1,
kฯi (tฬ)ฯi (ฮฑ)ฯi (sฬ)ej k2โ2 (di ) = kฮป(tฬ)ฮป(ฮฑ)ฮป(sฬ)ฮดe k22 ,
for all j โ Ciโฒ , and t, s โ RF . Thus for all large i and all t, s โ RF , j โ Ci โฉ Ciโฒ ,
|kฯi (tฬ)xi ฯi (sฬ)ej kโ2 (di ) โ kฮป(tฬ)xฮป(sฬ)ฮดe kโ2 (ฮ) | โค ฮต1/4 |F |2 ktkโ2 (F ) kskโ2 (F ) + ฮตkฮป(tฬ)kโ kฮป(sฬ)kโ
โค ฮต1/4 |F |2 ktkโ2 (F ) kskโ2 (F ) + ฮตktkโ1 (F ) kskโ1 (F )
Since
โค ฮต1/4 |F |ktkโ2 (F ) kskโ2 (F ) + |F |ฮตktkโ2 (F ) kskโ2 (F )
โ
udi (Ci โฉ Ciโฒ ) โฅ (1 โ 2 ฮต)|F |
for all large i, we can use a diagonal argument to complete the proof of (i).
(ii): Let Ci be as (i). Note that
kฯi (tฬ)โ xi ej โ ฯi (sฬ)โ xi ek k2โ2 (di ) = kฯi (tฬ)โ xi ej k2โ2 (di ) + kฯi (sฬ)โ xi ek k2โ2 (di ) โ 2 Re(hxโi ฯi (sฬ)ฯi (tฬ)โ xi ej , ek iโ2 (di ) ).
SOFIC ENTROPY OF GAUSSIAN ACTIONS
19
We look for Ai with Ai โ Ci ร Ci . By (i) it is enough to find an Ai โ Ci ร Ci with
lim
sup
iโโ s,tโRF ,(j,k)โA
i
|hxโi ฯi (sฬ)ฯi (tฬ)โ xi ej , ek iโ2 (di ) |
= 0,
(ktkโ2 (F ) + kskโ2 (F ) )2
udi โ udi (Ai ) โ 1.
We prove that
1
2
iโโ d2
2
(ktk
โ (F ) + kskโ2 (F ) )
i
(3)
lim
X
1โคj,kโคdi
|hxโi ฯi (sฬ)ฯi (tฬ)โ xi ej , ek iโ2 (di ) | = 0,
which will clearly prove the existence of such an Ai . Again, as in (i) we first do this for xi = ฯi (ฮฑ) for
ฮฑ โ C(ฮ). Let Di be the set of all j so that
ฯi (ฮฑ)โ ฯi (sฬ)ฯi (tฬ)โ ฯi (ฮฑ)ej = ฯi (ฮฑโ stโ ฮฑ)ej .
We use o(1) for any expression which tends to 0 as i โ โ. Then
lim udi (Di ) = 1,
iโโ
and
1 X
d2i
1โคj,kโคdi
|hฯi (ฮฑ)โ ฯi (sฬ)ฯi (tฬ)โ ฯi (ฮฑ)ej , ek iโ2 (di ) |2 โค o(1)
+
1
d2i
X
X
(ฮฑโ sฬtฬโ ฮฑ)(g)(ฮฑโ sฬtฬโ ฮฑ)(h)hฯi (g)ej , ek iโ2 (di ) hek , ฯi (h)ej iโ2 (di )
1โคj,kโคdi ,jโDi g,hโฮ
= o(1) +
1 XX โ โ
|(ฮฑ sฬtฬ ฮฑ)(g)|2
d2i
jโDi gโฮ
1
= o(1) + udi (Di )kฮฑโ sฬtฬโ ฮฑk22
di
1
โค o(1) + udi (Di )kฮฑkโ ksk2โ1 (F ) ktk2โ1 (F ) kฮฑkโ
di
1
โค o(1) + |F |2 ktk2โ2 (F ) ksk2โ2 (F ) kฮฑk2โ (1 + o(1))
di
โ 0.
This proves (3) by the Cauchy-Schwartz inequality. The general case follows by approximation as in (i).
For notation, if E โ ฮ is finite, and f : RE โ C is measurable, we let f โ 1Rฮ\E : Rฮ โ C be defined by
f โ 1Rฮ\E (x) = f (x
E
).
We say that f โ S(Rฮ ) if there is a finite E โ ฮ and a Schwartz function f0 : RE โ C so that
f = f0 โ 1Rฮ\E .
By standard Fourier analysis, there is a ฮธ โ S(RE ) so that
Z
exp(2ฯit ยท x) ฮธ(t) dt.
f (x) =
RE
We prove that if we choose x โ Rdi with respect to the Gaussian measure on pi Rdi then with high prob(E)
ability, the microstate ฯx will approximately preserve the measure ยตpฮดe when integrated against Schwartz
functions.
We need the following notation: if ฯ โ X di , ฯ โ Y di we define ฯ โ ฯ โ (X ร Y )di by
(ฯ โ ฯ)(j) = (ฯ(j), ฯ(j)).
20
BEN HAYES
Lemma 4.18. Let ฮ be a countable discrete sofic group with sofic approximation ฮฃ = (ฯi : ฮ โ Sdi ). Let
p โ LR (ฮ) be an orthogonal projection. Fix a sequence of orthogonal projections pi โ Mdi (R) such that
kpi โ ฯi (p)k2 โ 0.
Define the Gaussian measure ฮฝi on pi โ2R (di ) by
d ฮฝi (x) = e
โฯkxk2โ2 (d
i)
dx.
(E)
Here dx is the Lebesgue measure on pi โ2R (di ). Let ฯx be defined as in Lemma 4.16 for X = R, x0 = 0. Let
ยตpฮดe be defined as in Proposition 4.3. Let F โ E be finite subsets of ฮ and ฮด > 0. Then for any compact
Hausdorff space Y, sequence ฯi โ Y di , and f โ S(RF ) , g โ C(Y ),
Z
Z
Z
x โ p i Rd i :
ฮฝi
f โ 1Rฮ\F โ g d(ฯx(E) โ ฯi )โ (udi ) โ
f โ 1Rฮ\F dยตpฮดe g d(ฯi )โ (udi ) > ฮด
โ 0.
Rฮ
Proof. Define G : pi Rdi โ R by
G(x) =
Z
f โ 1Rฮ\E โ g d(ฯx(E) โ ฯi )โ (udi ).
We will show that
(4)
Z
Z
G dฮฝi โ
Z
|G|2 dฮฝi โ
pi Rdi
X
f โ 1Rฮ\E dยตpฮดe
Z
Y
g d(ฯi )โ (udi ) โ 0
and
(5)
pi Rdi
As
Gโ
Z
Z
X
2
f โ 1Rฮ\E dยตpฮดe
2
=
G dฮฝi
Z
pi Rdi
L2 (dฮฝi )
Z
Y
2
2
g d(ฯi )โ (udi )
|G| dฮฝi โ
Z
โ 0.
2
pi Rdi
G dฮฝi
,
the Lemma will then follow from Chebyshevโs inequality.
Write
Z
exp(2ฯit ยท x)ฮธ(t) dt
f (x) =
RF
F
with ฮธ โ S(R ). Note that by Proposition 4.3 and by the fact that ฮธ โ L1 (RF ),
Z Z
Z
Z
f โ 1Rฮ\E dยตpฮดe =
ฮธ(t) exp(โฯkฮป(tฬ)pk22 ) dt.
(6)
exp(2ฯit ยท x)ฮธ(t) dยตpฮดe dt =
Rฮ
RF
Rฮ
RF
We have
Z
pi Rdi
G(x) dฮฝi (x) =
=
Z
di Z
1 X
ฮธ(t) exp(2ฯit ยท ฯx(E) (j))g(ฯi (j)) dt dฮฝi (x)
di j=1 pi Rdi RF
Z
di Z
1 X
ฮธ(t) exp(2ฯit ยท ฯx(E) (j))g(ฯi (j)) dฮฝi (x) dt
di j=1 RF pi Rdi
the interchanges of integrals being valid as g is bounded and ฮธ โ L1 (RF ). If E โ F, then
t ยท ฯx(E) (j) = hฯi (tฬ)x, ej iโ2 (di ) .
SOFIC ENTROPY OF GAUSSIAN ACTIONS
21
Thus
Z
pi Rdi
G(x) dฮฝi (x) =
Z
di Z
1 X
ฮธ(t) exp(2ฯihฯi (tฬ)x, ej iโ2 (di ,R) )g(ฯi (j)) dฮฝi (x) dt
di j=1 RF pi Rdi
Z
di Z
1 X
=
ฮธ(t) exp(2ฯihx, pi ฯi (tฬ)โ ej iโ2 (di ,R) )g(ฯi (j)) dฮฝi (x) dt
di j=1 RF pi Rdi
di Z
1 X
ฮธ(t) exp(โฯkpi ฯi (tฬ)โ ej k2โ2 (di ) )g(ฯ(j)) dt.
=
di j=1 RF
Here we are using that
Z
pi Rdi
exp(2ฯihx, pi ฯi (t)โ ej iโ2 (di ,R) ) dฮฝi (x) = exp(โฯkpi ฯi (tฬ)โ ej k2โ2 (di ) ),
(this is an obvious generalization of Proposition 8.24 in [13]). By the preceding Lemma, there is a Ci โ
{1, . . . , di } with
|Ci |
โ1
di
(7)
and
kpi ฯi (tฬ)โ ej k2โ2 (di ) โ kฮป(tฬ)pk22
lim sup
sup
iโโ
jโCi ,tโRF
ktk22
As
we have
(8)
Z
sup
jโCi
RF
= 0.
kฮป(tฬ)pฮดe k22 = ฯ (pฮป(tฬ)โ ฮป(tฬ)p) = ฯ (ฮป(tฬ)pฮป(tฬ)โ ) = kpฮป(tฬ)โ ฮดe k22 ,
ฮธ(t) exp(โฯkpi ฯi (tฬ)โ ej k2โ2 (di ) ) dt โ
Z
RF
ฮธ(t) exp(โฯkฮป(tฬ)pฮดe k2 ) dt โค o(1)
Z
RF
|ฮธ(t)|ktk2โ2 (F ) dt,
where we use o(1) for any expression that goes to zero as i โ โ. Additionally,
Z
(9)
sup
ฮธ(t) exp(โฯkpi ฯi (tฬ)โ ej k2โ2 (di ) ) โค kฮธk1 .
jโ{1,...,di }\Ci
Since
RF
Z
RF
ฮธ(t)ktk2โ2 (F ) dt < โ
equations (8), (9), (7) and the fact that g is bounded imply that
Z
Z
Z
ฮธ(t) exp(โฯkฮป(tฬ)pk22 ) dt g dฯโ (udi ) โ 0.
G(x) dฮฝi (x) โ
pi Rdi
RF
By (6) we have proved (4).
We now turn to the proof of (5). By the same computations as above,
Z
Z Z
Z
1 X
|G|2 dฮฝi = 2
ฮธ(t)ฮธ(s)e2ฯi(hฯi (tฬ)x,ej iโ2 (di ) โhฯi (sฬ)x,ek iโ2 (di ) ) g(ฯi (j))g(ฯi (k)) dt ds dฮฝi (x)
d
d
d
F
F
i
i
R
pi R
R
i 1โคj,kโคdi pi R
Z Z
X
1
โฯ(kpi ฯi (tฬ)โ ej โpi ฯi (sฬ)โ ek k2โ2 (d ) )
i g(ฯ (j))g(ฯ (k)) dt ds.
ฮธ(t)ฮธ(s)e
= 2
i
i
di
RF RF
1โคj,kโคdi
Again the interchanges of integrals are valid as ฮธ โ L1 (RF ). By the preceding Lemma, there are Ai โ
{1, . . . , di }2 so that
(10)
udi โ udi (Ai ) โ 1
22
BEN HAYES
and
lim
kpi ฯi (tฬ)โ ej โ pi ฯi (sฬ)โ ej k22 โ kฮป(tฬ)pฮดe k22 โ kฮป(sฬ)pฮดe k22
dt = 0.
(ktkโ2 (F ) + kskโ2 (F ) )2
sup
iโโ (j,k)โA ,
i
t,sโRF
Thus
(11)
sup
(j,k)โAi
as
Z
RF
Z
ฮธ(t)ฮธ(s)e
โฯ(kpi ฯi (tฬ)โ ej โpi ฯi (sฬ)โ ek k2โ2 (d ) )
i
RF
Z
Z
Z
Z
RF
Additionally,
(12)
sup
(j,k)โ{1,...,di }2 \(Ai โฉCi รCi )
RF
RF
Z
dt ds โ
ฮธ(t)e
(โฯkpi ฯi (tฬ)โ ej k2โ2 (d ) )
i
2
dt
RF
โ 0,
|ฮธ(t)||ฮธ(s)|(ktkโ2 (F ) + kskโ2 (F ) )2 dt ds < โ.
ฮธ(t)ฮธ(s)e
โฯ kpi ฯi (t)โ ej k2โ2 (d ) โ2hฯi (s)pi ฯi (t)โ ej ,ek iโ2 (d ) +kpi ฯi (t)ek k2โ2 (d )
i
i
i
RF
โค kฮธk21 .
Equations (8), (12), (10), (7) and the fact that g is bounded imply that
Z
Z
2
1 X
g(ฯi (j))g(ฯi (k)) โ 0.
|G|2 dฮฝi โ
ฮธ(t) exp(โฯkฮป(tฬ)pฮดe k22 ) dt ยท 2
di
pi Rdi
RF
1โคj,kโคdi
Since
1
d2i
we have proved (5).
X
g(ฯi (j))g(ฯi (k) =
1โคj,kโคdi
Z
2
g dฯโ (udi )
A
A
Lemma 4.19. Let A be an infinite set. Then the space S(R ) generates Cb (R ) in the sense of Definition
3.1.
Proof. Let ฮต > 0, f โ Cb (RA ) and K โ RA compact. We say that a function ฯ : K โ C depends upon
finitely many coordinates if there is a finite E โ A so that if x, y โ K and
x(a) = y(a) for all a โ E
then
f (x) = f (y).
By the Stone-Weierstrass Theorem there is a function ฯ : K โ C depending upon finitely many coordinates so that
kฯkC(K) โค kf K kC(K) โค kf kCb(X)
and
kฯ โ f K kC(K) < ฮต.
Let E โ A be such that if x, y โ K and
then ฯ(x) = ฯ(y). Let
x(a) = y(a) for all a โ E
KE = {x โ RE : there is a y โ K with x(a) = y(a) for all a โ E}.
Then KE is a compact, being the continuous image of K under the projection map RA โ RE . There is a
well-defined function ฯe : KE โ C such that
e
ฯ(x)
= ฯ(xโฒ )
whenever xโฒ โ Rฮ has xโฒ (g) = x(g) for all g โ E. It is well known that there is a ฯe โ Ccโ (RE ) so that
kฯe K โ ฯe
E
C(KE )
<ฮต
SOFIC ENTROPY OF GAUSSIAN ACTIONS
23
e C (RE ) โค kf kC (RA ) .
kฯk
b
b
Let
ฯ = ฯe โ 1RA\E .
Since ฯe is a Schwartz function, we have that ฯ โ S(RA ). Finally,
kฯ
This completes the proof.
K
โf
k
K C(K)
โค kฯ
K
โ ฯkC(K) + kฯ โ f
k
K C(K)
< 2ฮต.
Theorem 4.20. Let ฮ be a countable discrete sofic group with sofic approximation ฮฃ = (ฯi : ฮ โ Sdi ).
Let ฯ : ฮ โ O(H) be an orthogonal representation on a real, separable Hilbert space H with ฯ โช ฮปฮ,R . Let
ฮ y (Xฯ , ยตฯ ) be the corresponding Gaussian action. Let (Y, ฮฝ) be a standard probability space and ฮ y (Y, ฮฝ)
a measure-preserving action with hฮฃ,ฮฝ (Y, ฮ) โฅ 0. Then hฮฃ,ยตฯ โฮฝ (Xฯ ร Y, ยตฯ โ ฮฝ) = โ.
Proof. We shall first reduce to the case that ฯ is cyclic, i.e there is a vector ฮพ โ H so that
H = Span{ฯ(g)ฮพ : g โ ฮ},
so suppose we can prove the Theorem in the cyclic case. Let
ฯ = ฯ1 โ ฯ2 ,
where ฯ1 is cyclic and ฯ2 โช ฮปฮ,R . Since we are assuming the theorem in the cyclic case and
ฮ y (Xฯ ร Y, ยตฯ โ ฮฝ) โผ
= ฮ y (Xฯ1 ร Xฯ2 ร Y, ยตฯ1 โ ยตฯ2 โ ฮฝ)
it suffices to show that
hฮฃ,ยตฯ2 โฮฝ (Xฯ2 ร Y, ฮ) โฅ 0,
(13)
as ฯ1 is cyclic. Since H is separable, we may write
ฯ2 =
โ
M
ฯ2,n
n=1
where ฯ2,n is cyclic. For n โ N, let
ฯ2,โคN =
N
M
ฯ2,n .
n=1
By the cyclic case and induction, we have
hฮฃ,ยตฯ2,โคN โฮฝ (Xฯ2,โคN ร Y, ฮ) = โ
for any N โ N. Using that
ฮ y (Xฯ2,โคN ร Y, ยตฯ2,โคN โ ฮฝ),
ฮ y (Xฯ2 ร Y, ยตฯ2 โ ฮฝ) โผ
= lim
โโ
it is not hard to show (13).
We use the preceding Lemma and Theorem 3.3. By Proposition 4.3 we may regard ฮ y (Xฯ , ยตฯ ) as Rฮ
with the measure ยตpฮดe defined by
Z
exp(2ฯit ยท x) dยตpฮดe (x) = exp(โฯkฮป(t)pฮดe k22 )
Rฮ
for t โ cc (ฮ, R) and some orthogonal projection p โ LR (ฮ). Extend ฮฃ to an approximation sequence of L(ฮ)
still denoted ฯi : L(ฮ) โ Mdi (C). By Proposition 4.11, there exists a sequence pi of orthogonal projections
in Mdi (R) so that
kpi โ ฯi (p)k2 โ 0.
di
Let ฮฝi be the Gaussian measure on pi R defined by
dฮฝi (x) = e
โฯkxk2โ2 (d
i)
dx.
Choosing a compact model, we may assume that Y is a compact metrizable space and that ฮ y Y by
homeomorphisms. Let โY be a compatible metric on Y. Let โRฮ be the dynamically pseudometric on Rฮ
defined by
โRฮ (x, y) = min(|x(e) โ y(e)|, 1).
24
BEN HAYES
We shall use the generating set L = {f โ g : f โ S(Rฮ ), g โ C(Y )}. We use the dynamically generating
pseudometric on Rฮ ร Y defined by
โ((x1 , y1 ), (x2 , y2 )) = โRฮ (x1 , x2 ) + โY (y1 , y2 ).
Let ฮต, ฮด, ฮท > 0 and finite F โ ฮ,L โ L be given.
Let e = g1 ,g2 , . . . be an enumeration of the elements of ฮ. Inductively find positive real numbers
M1 , M2 , . . . so that
l
X
ฮ
2โj ฮท.
ยตpฮดe {x โ R : |x(gj )| โค Mj , j = 1, . . . , l} โฅ 1 โ
j=1
Define M : ฮ โ (0, โ) by M (gj ) = Mj . Set
KM = {x โ Rฮ : |x(g)| โค M (g) for all g โ ฮ}
and note that KM is compact. Let U be an open neighborhood of KM in Rฮ .
Let L1 โ S(Rฮ ), L2 โ C(Y ) be finite sets so that
L โ {f โ g : f โ L1 , g โ L2 }.
Since
hฮฃ,ฮฝ (Y, ฮ) โฅ 0,
for infinitely many i, there is a ฯi โ Mapฮฝ (โY , F, ฮด, L2 , ฯi ). For these i, by Lemma 4.18, there is a finite set
E of ฮ containing the identity and an Bi โ pi Rdi so that
ฮฝi (Bi ) โ 1
ฯx(E) โ ฯi โ Mapยตโฮฝ (โ, F, ฮด, L, ฯi )
for all x โ Bi . We will also assume that
U โ ฯE (KM ) ร Rฮ\E .
This may be done by enlarging E, as KM is compact. Choose f โ S(RE ) so that
Z
f d(ฯE )โ ยตฯ โฅ โฮท + (ฯE )โ ยต(ฯE (KM ))
RE
and
0 โค f โค ฯฯE (KM ) .
We may assume that
ฯx(E) โ ฯi โ Mapยตโฮฝ (โ, F, ฮด, L โช {f โ 1Rฮ\E โ1 }, ฯi ),
for all x โ Bi . Note that in this case
(ฯx(E) โ ฯi )โ (udi )(U ร Y ) โฅ (ฯx(E) โ ฯi )โ (udi )(ฯE (KM ) ร Rฮ\E ร Y )
Z
โฅ โฮด +
f โ 1Rฮ\E dยตp
Rฮ
โฅ โฮด โ ฮท + (ฯE )โ ยต(ฯE (KM ))
โฅ โฮด โ 2ฮท + 1.
So if ฮด < ฮท we have
Thus
UรY,3ฮท
ฯx(E) โ ฯi โ Mapยตโฮฝ
(โ, F, ฮด, L โช {f โ 1Rฮ\E โ 1}, ฯi ).
1
log Sฮต (Bi , โ2 ).
iโโ di
Suppose that S โ Bi is ฮต-dense. Then for every y โ Bi , there exists x โ S and a C โ {1, . . . , di } so that
โ
|x(j) โ y(j)| < ฮต, for j โ C,
โ
|C| โฅ (1 โ ฮต)di .
UรY,ฮท
hฮฃ,ยต
(โ, ฮต, F, ฮด, L โช {f โ 1Rฮ\E โ 1}) โฅ lim sup
p โฮฝ
SOFIC ENTROPY OF GAUSSIAN ACTIONS
Using m for Lebesgue measure,
ฮฝi (B) โค
โค
X
xโS,
Aโ{1,...,d
โ i },
|A|โฅ(1โ ฮต)di
X
ฮฝi ((xA +
25
โ
c
ฮต Ball(โ2R (A, uA ))) ร RA )
โ
m( ฮต Ball(โ2R (A, uA )))
xโS,
Aโ{1,...,d
โ i },
|A|โฅ(1โ ฮต)di
X
=
ฮต|A|/2 m(Ball(โ2R (A, uA )))
xโS,
Aโ{1,...,d
โ i },
|A|โฅ(1โ ฮต)di
By [13] Corollary 2.55 and Stirlingโs Formula, there is a R > 0 so that
|A|/2
di
m(Ball(โ2R (A, uA ))) โค R|A|/2
.
|A|
Set
H(t) =
(
Then for some D > 0 we have
ฮฝi (B) โค
0,
โt log(t) โ (1 โ t) log(1 โ t),
X
di
ฮต 2 R|A|/2
xโS,
Aโ{1,...,d
โ i },
|A|โฅ(1โ ฮต)di
di
|A|
|A|/2
โ
โ
โค |S|D ฮตdi Rdi /2 exp(H( ฮต)di )
the last line following by Stirlingโs Formula. Thus
1
1
lim sup log |S| โฅ log
2
iโโ di
So
UรY,3ฮท
hฮฃ,ยต
(โ, ฮต, F, ฮด, L)
p โฮฝ
โฅ
UรY,3ฮท
hฮฃ,ยต
(โ, ฮต, F, ฮด, L
p โฮฝ
if t = 0, 1
for 0 < t < 1.
ฮต
โ
(1 โ ฮต)
d2i
,
โ
โ
1
1โ ฮต
โ log R โ H( ฮต).
ฮต
2
โช {f โ R
ฮ\E
1
โ 1}) โฅ log
2
โ
โ
1
1โ ฮต
โ log R โ H( ฮต),
ฮต
2
taking the infimum over all U โ KM , then the supremum over all KM , then the infimum over all F, ฮด, ฮท and
L โ L we find that
โ
โ
1
1โ ฮต
1
โ log R โ H( ฮต).
hฮฃ,ยตpฮดe โฮฝ (โ, ฮต, L) โฅ log
2
ฮต
2
If we now let ฮต โ 0 we see that
hฮฃ,ยตpฮดe โฮฝ (X ร Y, ฮ) = โ.
We now prove a general formula for the entropy of Gaussian actions.
Corollary 4.21. Let ฮ be a countable discrete sofic group with sofic approximation ฮฃ = (ฯi : ฮ โ Sdi ). Let
ฯ : ฮ โ O(H) be an orthogonal representation. By Proposition 4.14 write ฯ = ฯ1 โ ฯ2 where ฯ1 โช ฮปฮ,R and
ฯ2 โฅ ฮปฮ,R . Let ฮ y (Xฯ , ยตฯ ), ฮ y (Xฯj , ยตฯj ), j = 1, 2 be the corresponding Gaussian actions. Then:
(i): hฮฃ,ยตฯ2 (Xฯ2 , ยตฯ2 ) โ {0, โโ},
(ii):
๏ฃฑ
๏ฃด
๏ฃฒโโ, if hฮฃ,ยตฯ2 (Xฯ2 , ยตฯ1 ) = โโ,
hฮฃ,ยตฯ (Xฯ1 , ยตฯ1 ) = 0,
if ฯ1 = 0 and hฮฃ,ยตฯ2 (Xฯ2 , ยตฯ2 ) = 0,
๏ฃด
๏ฃณ
โ,
if ฯ1 6= 0 and hฮฃ,ยตฯ2 (Xฯ2 , ยตฯ2 ) = 0.
26
BEN HAYES
Proof. Statement (i) is just a direct corollary of Corollary 4.15 and the fact that sofic entropy is always
nonnegative or โโ. The first case of statement (i) follows from the general fact that if ฮ y (X, ยต), ฮ y (Y, ฮฝ)
are two measure-preserving actions on standard probability spaces, then
hฮฃ,ยต (X, ฮ) = โโ
implies that
hฮฃ,ยตโฮฝ (X ร Y, ฮ) = โโ.
The second case of statement (ii) is also just a special case of statement (i). The last case of statement (ii)
follows from Theorem 4.20.
We give some examples to show that hฮฃ,Xฯ (Xฯ , ยตฯ ) can be โโ. Let ฮ be a countable discrete sofic group
with sofic approximation ฮฃ = (ฯi : ฮ โ Sdi ). We say that ฮฃ is ergodic if whenever Ai โ {1, . . . , di } are such
that
lim udi (Ai โฯi (g)Ai ) = 0 for all g โ ฮ
iโโ
then
lim udi (Ai )(1 โ udi (Ai )) = 0.
iโโ
The following is a folklore result and we include a proof for completeness.
Proposition 4.22. Let ฮ be a countable discrete sofic group with an ergodic sofic approximation ฮฃ. Then,
if ฮ y (X, ยต) is a nonergodic probability measure-preserving action on a standard probability space, we have
hฮฃ,ยต (X, ฮ) = โโ.
Proof. Let ฮฃ = (ฯi : ฮ โ Sdi ). Let E โ X be a ฮ-invariant set with 0 < ยต(E) < 1. Let ฮฑ : X โ {0, 1} be
the finite observable given by
ฮฑ(x) = ฯE (x).
Let ฮต > 0, by a diagonalization argument it is easy to see that there is a ฮด > 0 and a finite F โ ฮ containing
e so that if Bi โ {1, . . . , di } has
lim sup max udi (Bi โฯi (g)Bi ) < ฮด,
(14)
iโโ
gโF
then
lim sup udi (Bi )(1 โ udi (Bi )) < ฮต.
(15)
iโโ
e = {a โ {0, 1} : a(e) = 1}. If ฮด is sufficiently small, and ฯ โ AP(ฮฑ, F, ฮด โฒ , ฯi ) then since ยต(gEโE) = 0,
Set E
we have
e
e <ฮด
E))
max udi (ฯi (g)ฯโ1 (E)โฯ(
F
gโF
and we always have
If ฮด โฒ , ฮต are sufficiently small, then
e โฅ ยต(E) โ ฮด โฒ .
ยต(E) + ฮด โฒ โฅ udi (ฯโ1 (E))
e > ฮต.
e
โ udi (ฯโ1 (E)))
udi (ฯโ1 (E))(1
Thus we see from (14), (15) that AP(ฮฑ, F, ฮด โฒ , ฯi ) = โ
. Thus hฮฃ,ยต (X, ฮ) = โโ, using Kerrโs definition of
entropy via partitions.
Combining with Theorem 2.8 of [27] we have the following.
Corollary 4.23. Let ฮ be a countable discrete sofic group with an ergodic sofic approximation ฮฃ. Let ฯ : ฮ โ
O(H) be an orthogonal representation which is not weakly mixing (e.g. ฯ could be compact). Then if
ฮ y (X, ยต) is the associated Gaussian action,
hฮฃ,ยต (X, ฮ) = โโ.
SOFIC ENTROPY OF GAUSSIAN ACTIONS
27
We mention an example of an ergodic sofic approximation when ฮ = F2 is the free group on two generators
a, b. Here we can choose a sofic approximation randomly. Namely let ฯ = (ฯ1 , ฯ2 ) โ Sn2 be chosen uniformly
at random, and let
ฯฯ : F2 โ Sn
be the unique homomorphism so that ฯฯ (a) = ฯ1 , ฯฯ (b) = ฯ2 . It is known that with high probability ฯฯ is
a sofic approximation (see [23], as well as [18] Lemma 3.1). It is also known from the theory of expanders
that with high probability ฯฯ is a ergodic sofic approximation (see [14], and the remarks in Section 5 of
[26]). If we take an orthogonal representation ฯ : F2 โ O(H) which is not weakly mixing (e.g. take H to be
finite-dimensional) then we have
hฮฃ,ยตฯ (Xฯ , ฮ) = โโ.
References
[1] L. Bowen. Measure conjugacy invariants for actions of countable sofic groups. J. Amer. Math. Soc, 23:217โ245, 2010.
[2] L. Bowen. Entropy for expansive algebraic actions of residually finite groups. Ergodic Theory Dynam. Systems, 31(3):703โ
718, 2011.
[3] L. Bowen. Weak isomorphisms between Bernoulli shifts. Israel J. Of Math, 183, 2011.
[4] L. Bowen. Every countably infinite group is almost Ornstein. In Dynamical systems and group actions, volume 567 of
Contemp. Math, pages 67โ78. Amer. Math. Soc, Providence, RI, 2012.
[5] L.Bowen and H.Li. Harmonic models and spanning forests of residually finite groups. J. Funct. Anal., 263(7):1769โ1808,
2012.
[6] N. Brown and N. Ozawa. C โ -Algebras and Finite-Dimensional Approximations. Cambridge University Press, 1994.
[7] L. Ciobanu, D. Holt, and S. Rees. Sofic groups: graph products and graphs of groups. Pacific J. of Math, 271(1):53โ64,
November 2014.
[8] J. Conway. A Course in Operator Theory. Graduate Studies in Mathematics. American Mathematical Society, Providence,
RI, 1991.
[9] A. Dooley and V. Golodets. The spectrum of completely positive entropy actions of countable amenable groups. J. Funct.
Anal., 196(1):1โ18, 2002.
[10] K. Dykema, D. Kerr, and M. Pichot. Orbit equivalence and sofic approximation. arXiv:1102.2556.
[11] K. Dykema, D. Kerr, and M. Pichot. Sofic dimension for discrete measurable groupoids. Trans. Amer. Math. Soc,
366(2):707โ748, 2013.
[12] G. Elek and E. Szabo. On sofic groups. J. Group Theory, 9(2):161โ171, 2006.
[13] G. Folland. Real Analysis: Modern Techinques and Their Applications. John Wiley & Sons, Hoboken, NJ, second edition,
1999.
[14] J. Friedman. A proof of Alonโs second eigenvalue conjecture and related problems. Memoirs of AMS, 195:1โ100, 2008.
[15] B. Hayes. Fuglede-Kadison determinants and sofic entropy. arXiv:1402.1135.
[16] B. Hayes. Polish models and sofic entropy. J. Inst. Math. Jussieu. To appear.
[17] B. Hayes. An lp -version of von Neumann dimension for Banach space representations of sofic groups. J. Funct. Anal.,
266(2):989โ1040, 2014.
[18] D. Kerr. Bernoulli actions of sofic groups have completely positive entropy. Israel J. Math. To appear.
[19] D. Kerr and H. Li. Topological entropy and the variational principle for actions of sofic groups. Invent. Math, 186:501โ558,
2011.
[20] J. Kieffer. A generalized Shannon-McMillan theorem for the action of an amenable group on a probability space. Ann.
Prob, 3(6):1031โ1037, 1975.
[21] M. Lemanฬczyk. Entropy of Gaussian actions for countable abelian groups. Fund. Math., 157:277โ286, 1998.
[22] T. Meyerovitch. Positive sofic entropy implies finite stabilizer. arXiv:1504.08137.
[23] A. Nica. Asymptotically free families of random unitaries in symmetric groups. Pacific J. Math, 157:295โ310, 1993.
[24] D. Ornstein and B. Weiss. Entropy and isomorphism theorems for actions of amenable groups. J. Anal. Math., 48:1โ141,
1987.
[25] L. Paunescu. On sofic actions and equivalence relations. J. Funct. Anal., 261(9):2461โ2485, November 2011.
[26] L. Paunescu. Convex structures revisited. Ergodic Theory Dynam. Systems. To appear.
[27] J. Peterson and T. Sinclair. On cocycle superrigidity for Gaussian actions. Ergodic Theory Dynam. Systems, 32(1):249โ272,
2012.
[28] S. Popa. Independence properties in sublagebras of ultraproduct II1 factors. J. Funct. Anal., 266(9):5818โ5846, 2014.
[29] B. Seward. Every action of a non-amenable group is the factor of a small action. J. Mod. Dyn., 8(2):251โ270, 2014.
[30] M. Takesaki. The Theory of Operator Algebras I. Springer-Verlag, Berline-Heidelberg-New York, 2002.
[31] M. Takesaki. Theory of Operator Algebras II, volume 125 of Encyclopaedia of Mathematical Sciences. Springer, New York,
NY, 2003.
Stevenson Center, Nashville, TN 37240
E-mail address: [email protected]
| 4math.GR
|
arXiv:1708.05761v1 [math.AC] 18 Aug 2017
EXTENDED PLUS CLOSURE IN COMPLETE LOCAL RINGS
RAYMOND C HEITMANN AND LINQUAN MA
Abstract. The (full) extended plus closure was developed as a replacement
for tight closure in mixed characteristic rings. Here it is shown by adapting Andreฬโs perfectoid algebra techniques that, for complete local rings, this
closure has the colon-capturing property. In fact, more generally, if R is
a (possibly ramified) complete regular local ring of mixed characteristic, I
and J are ideals of R, and the local domain S is a finite R-module, then
(IS : J) โ (I : J)S epf . A consequence is that all ideals in regular local rings
are closed, a fact which implies the validity of the direct summand conjecture
and the Briancฬงon-Skoda theorem in mixed characteristic.
1. Introduction
In [7], the first author introduced several closure operations for mixed characteristic rings, most notably the full extended plus closure. These closures were
proposed as possibilities to play the same role in mixed characteristic as the tight
closure does in characteristic p. It was hoped that they might allow us to prove
some of the homological conjectures that remained unresolved in mixed characteristic and indeed, the full extended plus closure did figure in the proof of the direct
summand conjecture in dimension 3 [8].
Of course, the direct summand conjecture has been resolved [2] without the use
of this closure operation. However, it still remains of interest to note to what extent
the full extended plus closure fills the void left open by the absence of tight closure in
mixed characteristic. In this paper, we note a number of properties that were shown
in [7] and add several others. In particular, we deal with two fundamental questions
that were left open in [7]. We shall see that the full extended plus closure has the
colon-capturing property in complete local rings and that ideals in all regular local
rings are closed. The latter fact is sufficient to imply the direct summand conjecture.
This is not truly an alternate proof as our work makes use of Andreฬโs notation and
techniques. For the most part, this article is about the full extended plus closure
in complete local rings. Since we do not know whether or not completing, closing,
and contracting occasionally gives a larger closure, only Theorem 3.16 gives new
information about rings which are not complete.
The primary result in this article is that, in a sense, the full extended plus closure
captures obstructions to flatness. Our principal theorems are:
Theorem 1.1 (Corollary 3.11). Let S be a complete local domain of mixed characteristic and let y1 , . . . , yn be parameters in S. Then ((y1 , . . . , ynโ1 )S : yn ) โ
(y1 , . . . , ynโ1 )S epf .
Date: August 22, 2017.
1
2
RAYMOND C HEITMANN AND LINQUAN MA
Theorem 1.2 (Theorem 3.12). Let R be a complete regular local ring of mixed
characteristic and let the integral domain S be a finite extension of R. If I is an
ideal of R and J โ R, then (IS : J) โ (I : J)S epf .
An equivalent formulation of Theorem 1.2, divorced from the language of extended plus closure, is
Theorem 1.3 (Theorem 3.14). Let R be a complete regular local ring of mixed
characteristic p and let the integral domain S be finite over R. Let M be an RN
module. Then there exist c โ R such that the natural map cวซ TorR
โโ
i (S, M )/p
R
+
N
Tori (S , M )/p is zero for all i โฅ 1 and for every N, วซ > 0. Consequently, for
+
N
วซ
every ฮฑ โ TorR
i (R , M )/p , there exist c โ R such that c ฮฑ = 0 for every วซ.
This paper is organized as follows. In Section 2, we will give a brief introduction
to extended plus closure. The results discussed here are generally known although
Proposition 2.10 is actually new. We will also give a short introduction to our
terminology and conventions. Section 3 will be devoted to our new results.
2. basics
Notation 2.1. If I is an ideal of R and J โ R, (I : J) = {r โ R | rJ โ I}. The
ring involved will always be clear from the ideal and there will be no need for the
more cumbersome notation (I :R J).
In [7], the first author introduced four closure operations for mixed characteristic
rings. Subsequently, only one of these, the full extended plus closure, has received
any attention. That will also be the case in this article. In fact, while we shall
preserve the notation I epf , the f for full, we shall mostly refer to the closure as
the extended plus closure. It should be noted that the original definition and early
results allow R to be either mixed characteristic or characteristic p. However, the
characteristic p case is less interesting as the full extended plus closure trivially
contains the tight closure.
Definition 2.2. Let R be an integral domain with p โ J(R) and I an ideal of
R. Then an element x โ R is said to be in the (full) extended plus closure of I
(designated x โ I epf ) provided there exists c โ R such that for every วซ > 0 and
every positive integer N , cวซ x โ (I, pN )R+ .
Remark 2.3. The extended plus closure is actually defined for all Noetherian
rings with p โ J(R). Just as with tight closure, one may compute the extended
plus closure by computing it modulo each minimal prime ideal and then taking
the intersection of the liftings back to the original ring. The more general setting
does not hold great interest and in this article, we will focus on the case of integral
domains.
We first shall highlight some of the basic results from [7]. First we see that it
behaves as a reasonable closure operation.
Proposition 2.4. [7, Proposition 2.1] Let I, J be ideals in a Noetherian ring R.
(1) I epf is an ideal.
(2) I โ I epf .
(3) If I โ J, I epf โ J epf .
(4) (I epf )epf = I epf .
EXTENDED PLUS CLOSURE IN COMPLETE LOCAL RINGS
3
(5) (I epf J epf )epf = (IJ)epf .
(6) (I : J)epf โ (I epf : J). In particular, if I is closed, then (I : J) is closed.
Remark 2.5. It is known that if R is local and S = Rh , the henselization of R, then
IS epf โฉ R = I epf [7, Theorem 3.4]. However, this result is unfortunately not known
b of R, even when R is an excellent domain. For
if we replace S by the completion R
this reason our main theorems on extended plus closure do not obviously generalize
to non-complete rings.
Finally, we have the two most interesting theorems from the earlier work - two
theorems which match consequential theorems from tight closure theory. First full
extended plus closure gives a Briancฬงon-Skoda type theorem.
Theorem 2.6. [7, Theorem 4.2] Let R be a ring, let I be an ideal of R generated
by n elements, and suppose y is in the integral closure of I n+d for some integer
d โฅ 0. Then y โ (I d+1 )epf .
We note that this Briancฬงon-Skoda type theorem is a simple consequence of [6,
Theorem 2.13]. We include that result next as it serves as a lemma we will need in
our proof of Lemma 3.3 and Theorem 3.17.
Proposition 2.7.
p Let R be an integral domain and I = (x1 , . . . , xn )R an ideal of
R. Suppose p โ (x1 , x2 )R and z โ I n+k with k โฅ 0. Then there exists an integral
extension S of R with z โ I k+1 S.
Recall that the classical Briancฬงon-Skoda theorem says that in a regular ring, if an
ideal I is generated by n elements, then the integral closure of I n+d is contained in
I d+1 for every integer d [14]. We can recover this result by proving that in a regular
local ring, every ideal is closed under the extended plus closure; see Theorem 3.16.
We give two proofs of this theorem: it can be obtained from our earlier work on the
vanishing conjecture for maps of Tor [9], and it also follows from our main result
in this article and the following result in [7]:
Theorem 2.8. [7, Theorem 4.4] Let R be a regular local ring with p in the maximal
ideal. If the full extended plus closure has the colon-capturing property for finite
extensions of complete regular local rings, then I epf = I for every ideal I of R.
Remark 2.9. The actual statement of this result in [7] presumes that the coloncapturing property holds for finite extensions of all regular local rings. However,
the statement of [7, Lemma 4.3] makes it clear that one may restrict to complete
regular local rings. Then, by faithful flatness, the fact that I epf = I holds in
complete regular local rings implies it holds in all regular local rings.
One may observe that these results are all well known for tight closure. In fact, an
alternate definition of tight closure closely resembles that of extended plus closure.
Instead of requiring cวซ x โ IR+ , the tight closure requires cวซ x โ IRF where RF is
the integral closure of R in the largest purely inseparable extension of its quotient
field. Superficially, this means the tight closure could be smaller. However, Hochster
and Huneke [12] introduced the dagger closure (which must contain the extended
plus closure) and showed [12, Theorem 3.1] that, for characteristic p complete local
rings, the tight closure and dagger closure were equal. Thus
Proposition 2.10. If R is a complete local ring of equal characteristic p, the
extended plus closure coincides with tight closure for ideals of R.
4
RAYMOND C HEITMANN AND LINQUAN MA
2.1. Perfectoid algebras. We will freely use the language of perfectoid spaces
[16] and almost mathematics [5]. In this paper we will always work in the following
situation: for a perfect field k of characteristic p > 0, we let W (k) be the ring of
โ
Witt vectors with coefficients in k. Let K โฆ be the p-adic completion of W (k)[p1/p ]
and K = K โฆ [1/p]. Then K is a perfectoid field in the sense of [16] with K โฆ โ K
its ring of integers.
A perfectoid K-algebra is a Banach K-algebra R such that the set of powerbounded elements Rโฆ โ R is bounded and the Frobenius is surjective on Rโฆ /p.
A K โฆ -algebra S is called integral perfectoid if it is p-adically complete, p-torsion
free, satisfies S = Sโ 1 and the Frobenius induces an isomorphism S/p1/p โโ S/p.
These two categories are equivalent to each other [16, Theorem 5.2] via the functors
R โโ Rโฆ and S โโ S[1/p].
Almost mathematics in this article will be measured with respect to a flat ideal
โ
(c1/p ). There are two cases that we will use: c = p or c = pg for some nonzero
element g. This will be stated explicitly throughout.
3. Main Results
For R a Noetherian integral domain of mixed characteristic p, we let R+ denote
the absolute integral closure of R and let R++ denote the p-adic completion of R+ .
For a nonzero element c โ R, we will use Rc to denote the integral closure of R++
in R++ [cโ1 ].
Lemma 3.1. Let R be an integral domain of mixed characteristic p and I an ideal
of R. For x โ R, if there exists c โ R such that for every วซ > 0 and every positive
integer N , cวซ x โ (I, pN )R++ , then x โ I epf .
N
++
Proof. We need only show that if cวซ x โ (I,
cวซ x โ (I, pN )R+ . HowPps )R , then
N
วซ
N
++
วซ
ever, if c x โ (I, p )R , we have c x = i=1 yi ui + p u0 where each
Psyi โ I and
each ui is the limit of a Cauchy sequence {uij }. It follows that {cวซ x โ i=1 yi uij โ
pN u0j } is a Cauchy
sequence which converges to zero. Thus,
P
P for sufficiently large j,
we have cวซ x โ si=1 yi uij โ pN u0j โ pN R+ . Then cวซ x = si=1 yi uij + pN (u0j + v) โ
(I, pN )R+ .
Lemma 3.2. Let R be a universally catenarian Noetherian integral domain of
mixed characteristic p and suppose (p, g)R is a height two ideal. Then we have
โฉn (g, pn )R++ = gR++ .
Proof. Pick z โ โฉn (g, pn )R++ ; we can write z = a1 g + b1 p with a1 โ R+ and
b1 โ R++ . Now b1 p โ โฉn (g, pn )R++ and so we can write b1 p = a2 g + b2 p2 with
a2 โ R+ and b2 โ R++ . But then b2 p2 โ โฉn (g, pn )R++ , so we can repeat the above
process to write b2 p2 = a3 g + b3 p3 and keep going:
z = a1 g + b 1 p = a1 g + a2 g + b 2 p 2 = a1 g + a2 g + a3 g + b 3 p 3 = ยท ยท ยท .
Note that we have ai g โ piโ1 R++ for all i, thus ai g = 0 as an element in R+ /piโ1 =
R++ /piโ1 . Since R is universally catenary, (p, g) is a height two ideal in any integral
k
1S = {x โ S[1/p]|S 1/p ยท x โ S for all k}. Hence S is almost isomorphic to S with respect
โ
โ
โ
to (p1/p ), thus in practice we will often ignore this distinction since one can always pass to Sโ
without affecting the issue.
EXTENDED PLUS CLOSURE IN COMPLETE LOCAL RINGS
5
extension of R. Since R+ is a direct limit of normal integral extensions of R, g is
a nonzerodivisor on R+ /piโ1 and so ai โ piโ1 R+ . Therefore, in R++ we have
z = a1 g + a2 g + a3 g + ยท ยท ยท = g(a1 + a2 + a3 + ยท ยท ยท ) โ gR++ .
This finishes the proof.
Lemma 3.3. Let R be a universally catenarian Noetherian integral domain of
mixed characteristic p of dimension at least two and I an ideal of R. For x โ R,
if there exists a nonzero c โ R such that for every วซ > 0 and every positive integer
N , cวซ x โ (I, pN )Rc , then x โ I epf .
โ
Proof. We can find an element g โ R such that pg โ cR and (p, g)R is a height
two ideal and likewise so is (p, g)Rโฒ for every integral extension Rโฒ of R (since R is
universally catenary). The hypothesis of the lemma clearly holds with pg in place
of c (note that Rpg is larger than Rc ) and so we may assume c = pg. Now this
lemma will follow immediately from Lemma 3.1 if we can show that the injection
โ
R++ โโ Rc is an almost isomorphism with respect to (c1/p ).
Suppose u โ Rc . Then u = (pg)โd v for v โ R++ and some integer d. As R++ is
just the p-adic completion of R+ , we may write v = w1 + pd w2 with w1 โ R+ and
1
1
is integral over R++ . This forces w
to be integral
w2 โ R++ . It follows that w
pd
pd
+
over the integrally closed R . So without loss of generality, we may assume w1 = 0
and so reduce to the case u = g โd v.
Fix t > 0 and let วซ = 1/pt . To complete the proof, it suffices to show v โ
dโวซ n
(g , p )R++ for all positive integers n by Lemma 3.2. Now we fix an n > 0.
We may write v = v1 + pnN v2 with v1 โ R+ , v2 โ R++ , and N = dpt = d/วซ.
As v is integral over g d R++ , v1 is integral over (g d , pnN )R++ . This means there
exists some integer k such that (v1 , g d , pnN )k+1 R++ = (v1 , g d , pnN )k (g d , pnN )R++ .
Since both ideals contain a power of p, it is easy to see that (v1 , g d , pnN )k+1 R+ =
(v1 , g d , pnN )k (g d , pnN )R+ and thus v1 is integral over (g d , pnN )R+ . It follows that
v1 โ (g วซ , pn )N R+ . As R+ is absolutely integrally closed, Proposition 2.7 gives
v1 โ (g วซ , pn )N โ1 R+ โ (g dโวซ , pn )R+ . Therefore v = v1 + pnN v2 โ (g dโวซ , pn )R++ as
desired.
Now suppose R is a complete and unramified regular local ring of mixed characteristic, and R โโ S is a module-finite local extension (so S is a complete local
domain). By Cohenโs structure theorem R โผ
= W (k)[[x1 , . . . , xdโ1 ]] where W (k) is a
coefficient ring of R, which is a complete and unramified DVR with residue field k.
Let kฬ denote an algebraic closure of k, let A0 = R โW (k) W (kฬ), and let A be the
p-adic completion of A0 . Then A is p-adically complete and formally smooth over
W (kฬ) mod p. We next point out that A is actually Noetherian (though we donโt
need this).
Lemma 3.4. With the notation as above, A is a Noetherian ring.
Proof. First of all, in general, if T is p-adically complete, then T is Noetherian if
and only if T /pT is Noetherian: suppose Q is an infinitely generated prime ideal
of T , then since T /pT is Noetherian, Q does not contain p. Now Q + pT is finitely
generated,
say by f1 + ptP
1 , . . . , fn + pt
P
Pn . Suppose f โPQ โ Q + pT ; we can write
fP=
a1j (fj + ptj ) =
a1j fj P
+ p a1j tP
a1j tj P
โ Q but p P
โ
/ Q, so
j . Now p
a1j tj โ Q โ Q
+
pT
and
thus
a
t
=
a
(f
+
pt
)
=
a
f
+
p
a2j tj .
1j
j
2j
j
j
2j
j
P
P
This gives f = (a1j + pa2j )fj + p2 a2j tj . We can repeat this process to find
6
RAYMOND C HEITMANN AND LINQUAN MA
PP
aij and since T is p-adically complete, we have f = ( i piโ1 aij )fj . Therefore
Q = (f1 , . . . , fn ) is finitely generated.
Now to see A is Noetherian, it is enough to show A/pA = kฬ โ k[[x1 , . . . , xdโ1 ]]
is Noetherian by the previous paragraph. We prove this by induction on d. The
case d = 1 is clear. We now prove that every prime ideal Q in kฬ โ k[[x1 , . . . , xdโ1 ]]
is finitely generated. Since k[[x1 , . . . , xdโ1 ]] โโ kฬ โ k[[x1 , . . . , xdโ1 ]] is integral, we
have P = Q โฉ k[[x1 , . . . , xdโ1 ]] with ht P = ht Q. If ht Q = 0 then Q = 0 since
kฬ โ k[[x1 , . . . , xdโ1 ]] is a domain. If ht Q = ht P > 0, then Qฬ is a minimal prime of
kฬ โ (k[[x1 , . . . , xdโ1 ]]/P ). But we have k[[y1 , . . . , ydโฒ โ1 ]] โโ k[[x1 , . . . , xdโ1 ]]/P for
some dโฒ < d by Cohenโs structure theorem; hence kฬ โ (k[[x1 , . . . , xdโ1 ]]/P ), being a
finite extension of kฬ โ k[[y1 , . . . , ydโฒ โ1 ]], is Noetherian by our induction hypothesis.
Therefore Qฬ is finitely generated and thus Q is finitely generated.
Returning to the development of our set-up, we next set B = S โR A. Since
R โโ S is module-finite and generically eฬtale, there exists a nonzero g โ R with
ht(p, g)R = 2 such that R[(pg)โ1 ] โโ S[(pg)โ1 ] is finite eฬtale. Thus A[(pg)โ1 ] โโ
โ
B[(pg)โ1 ] is finite eฬtale. Let K โฆ be the p-adic completion of W (kฬ)[p1/p ] and
โ
โ
1/p
1/pโ
K = K โฆ [1/p]. Let Aโ,0 be the p-adic completion of A[p1/p , x1
, . . . , xdโ1 ],
which is an integral perfectoid K โฆ -algebra. Furthermore, for g โ R โ A as above,
we let Aโ,0 โโ Aโ be Andreฬโs construction of integral perfectoid K โฆ -algebras (for
example see [3, Theorem 1.4]): it is the integral perfectoid K โฆ -algebra of functions
โ
โ
on the Zariski closed subset of Spa(Aโ,0 hT 1/p i[1/p], Aโ,0 hT 1/p i) defined by the
ideal T โ g. More explicitly, Aโ can be described as the p-adic completion of the
โ
โ
integral closure of Aโ,0 hT 1/p i/(T โ g) inside (Aโ,0 hT 1/p i/(T โ g))[1/p]. Andreฬ
m
proved that Aโ is almost faithfully flat over Aโ,0 mod p for every m (for example,
see [3, Theorem 2.3]). More importantly, Andreฬ proved the following remarkable
result:
Theorem 3.5. [1, Theorem 0.3.1] Let A be a perfectoid algebra over a perfectoid
field K of residue characteristic p. Suppose g โ Aโฆ is a nonzerodivisor and A
contains a compatible system of p-power roots of g. Let B โฒ be a finite eฬtale A[ g1 ]algebra. Then
(1) There exists a larger perfectoid algebra B between A and B โฒ such that the
inclusion A โโ B is continuous. We have B[ g1 ] = B โฒ and B โฆ is contained
โ
โ
in the integral closure of g โ1/p Aโฆ in B โฒ and it is a (pg)1/p -almost isomorphism.
โ
(2) For every m, B โฆ /pm is (pg)1/p -almost finite eฬtale over Aโฆ /pm .
โ
Remark 3.6. It is easy to see that B โฆ is (pg)1/p -almost isomorphic to the integral
โ
closure of Aโฆ in B โฒ : clearly this integral closure is (pg)1/p -almost contained in B โฆ .
Now suppose we have an equation
y n + a1 y nโ1 + ยท ยท ยท + an = 0
โ
where n = pe and a1 , . . . , an belongs to g โ1/p Aโฆ . Then after multiplication by
t
t+e
โ
g 1/p , the above equation tells us that g 1/p y is integral over Aโฆ and thus g 1/p B โฆ
โ
is (pg)1/p -almost contained in the integral closure of Aโฆ in B โฒ .
Notation 3.7. We will frequently use the following notation throughout the rest of
the article. R will be a complete and unramified regular local ring and S a modulefinite domain extension of R. Fix a nonzero element g โ R with ht(p, g)R = 2 such
EXTENDED PLUS CLOSURE IN COMPLETE LOCAL RINGS
7
that R[(pg)โ1 ] โโ S[(pg)โ1 ] is finite eฬtale. We construct A as in the paragraph
after Lemma 3.3, and construct B, Aโ,0 , Aโ as in the paragraph before Theorem 3.5. A will be the perfectoid algebra Aโ [pโ1 ] and B โฒ will be B โA Aโ [(pg)โ1 ].
By Theorem 3.5 we have B and B โฆ .
The next lemma is well-known to some experts. We record it here for completeness.
โ
Lemma 3.8. Using the terminology of Notation 3.7, B โฆ is (pg)1/p -almost flat
over R.
โ
Proof. By Theorem 3.5 we know B โฆ /pm is (pg)1/p -almost flat over Aโ /pm , and
โ
hence (pg)1/p -almost flat over A/pm by construction. Since A is flat over R,2
โ
B โฆ /pm is (pg)1/p -almost flat over R/pm for all m. But we also know that B โฆ is
p-torsion-free and p-adically complete since it is integral perfectoid. Now the same
argument as in [15, Lemma 2.2] (simply replace A by R and Aโ by B โฆ ) shows that
โ
B โฆ is (pg)1/p -almost flat over R.
โ
Lemma 3.9. Using the terminology of Notation 3.7, there exists a (pg)1/p -almost
map from B โฆ to S pg = Rpg .
Proof. As W (kฬ) is, up to p-adic completion, integral over W (k), we get an embedding W (kฬ) โโ R++ and hence a map A โโ R++ (recall that A is the p-adic comโ
1/pโ
1/pโ
pletion of RโW (k) W (kฬ)). We next fix an embedding A[p1/p , x1
, . . . , xdโ1 ] โโ
R++ . This in turn induces an embedding of the p-adic completions of the rings,
i.e., an embedding ฮฑ : Aโ,0 โโ R++ = S ++ . We next extend this to a homomorโ
k
k
phism ฮฒ : Aโ,0 hT 1/p i โโ S ++ which sends T 1/p to g 1/p . In particular, since
โ
ฮฒ(T โ g) = 0, we get an induced homomorphism Aโ,0 hT 1/p i/(T โ g) โโ S ++ .
โ
Finally, since S ++ is integral perfectoid, it is (at least (p1/p )-almost) isomorphic
to the integral closure of S ++ in S ++ [1/p]. Hence by the description of Aโ , we get
โ
a (p1/p )-almost map ฮณ : Aโ โโ S ++ . This induces 1 โ ฮณ : S โR Aโ โโ S ++ .
But S โR Aโ = S โR (A โA Aโ ) = B โA Aโ . So this map extends to an almost
map ฮด from the integral closure of B โA Aโ in B โA Aโ [(pg)โ1 ] to S pg . As B โฆ
โ
is (pg)1/p -almost isomorphic to the integral closure of Aโ in B โA Aโ [(pg)โ1 ]
โ
by Remark 3.6, we get a (pg)1/p -almost map from B โฆ to S pg . The proof is complete.
We are ready to prove our main theorem in the unramified case.
Theorem 3.10. Using the terminology of Notation 3.7, if I is an ideal of R and
โ
J โ R, then (pg)1/p (IS : J) โ (I : J)B โฆ and consequently (IS : J) โ (I : J)S epf .
Proof. Because there exist a chain of maps:
S โโ B โโ B โ Aโ โโ B โฆ ,
โ
we have (IS : J) โ (IB โฆ : J) and the later one is (pg)1/p -almost isomorphic
โ
to (I : J)B โฆ because B โฆ is (pg)1/p -almost flat over R by Lemma 3.8. Thus
โ
โ
(pg)1/p (IS : J) โ (I : J)B โฆ . Next, by Lemma 3.9 there is a (pg)1/p -almost map
โ
from B โฆ to S pg = Rpg . This implies that (pg)1/p (IS : J) โ (I : J)S pg .
2In general, if A โโ B is a map of p-adically complete and p-torsion-free rings with A Noetherian and A/p โโ B/p flat, then A โโ B is flat, see Remark 4.31 of [4].
8
RAYMOND C HEITMANN AND LINQUAN MA
So for every z โ (IS : J) and every วซ =
z โ (I : J)S epf by Lemma 3.3.
1
pt ,
(pg)วซ z โ (I : J)S pg , and thus
Now we can prove the usual form of colon-capturing:
Corollary 3.11. Using the terminology of Notation 3.7, suppose y1 , . . . , yn are
โ
parameters in S. Then (pg)1/p ((y1 , . . . , ynโ1 )B โฆ : yn ) โ (y1 , . . . , ynโ1 )B โฆ . As a
consequence, we have ((y1 , . . . , ynโ1 )S : yn ) โ (y1 , . . . , ynโ1 )S epf .
โ
Proof. We first prove (pg)1/p ((y1 , . . . , ynโ1 )B โฆ : yn ) โ (y1 , . . . , ynโ1 )B โฆ . Assume
k of the elements yi actually belong to R. If k = n, the claim is true because
โ
B โฆ is (pg)1/p -almost flat over R by Lemma 3.8. We now prove by induction
on n โ k; the case n โ k = 0 is done. Suppose we have a counterexample with
n โ k minimal. First suppose yn โ
/ R. Clearly (y1 , . . . , yn )S โฉ R is not contained in any minimal prime of (y1 , . . . , ynโ1 )S; so there exists wn โ R such that
((y1 , . . . , ynโ1 )B โฆ : wn ) โ ((y1 , . . . , ynโ1 )B โฆ : yn ) and y1 , . . . , ynโ1 , wn are paramโ
eters in S. By the minimality assumption, we have (pg)1/p ((y1 , . . . , ynโ1 )B โฆ :
โ
yn ) โ (pg)1/p ((y1 , . . . , ynโ1 )B โฆ : wn ) โ (y1 , . . . , ynโ1 )B โฆ and so we did not
have a counterexample. Thus we know yn โ R. Without loss of generality, we
may now assume y1 โ
/ R. If an โ ((y1 , . . . , ynโ1 )B โฆ : yn ), we have an equation
a1 y1 + ยท ยท ยท + an yn = 0 with each ai โ B โฆ . Then a1 โ ((y2 , . . . , yn )B โฆ : y1 ). The
โ
โฆ
argument we used above nowP
shows (pg)1/p aP
1 โ (y2 , . . . , yn )B . Consider any
n
n
t
วซ
วซ
วซ = 1/p . We have (pg) a1 = i=2 bi yi . Then i=2 (bi y1 + (pg) ai )yi = 0 and so
bn y1 + (pg)วซ an โ ((y2 , . . . , ynโ1 )B โฆ : yn ). Since we have decreased n but not k,
n โ k has been decreased and so (pg)วซ (bn y1 + (pg)วซ an ) โ (y2 , . . . , ynโ1 )B โฆ . Thus
โ
(pg)2วซ an โ (y1 , . . . , ynโ1 )B โฆ . Hence (pg)1/p an โ (y1 , . . . , ynโ1 )B โฆ . This finishes
the proof of the first conclusion.
Finally, for every z โ ((y1 , . . . , ynโ1 )S : yn ) and every วซ = p1t , z โ ((y1 , . . . , ynโ1 )B โฆ :
yn ) and so we have (pg)วซ z โ (y1 , . . . , ynโ1 )B โฆ . Now by Lemma 3.9, (pg)วซ z โ
(y1 , . . . , ynโ1 )S pg and thus z โ (y1 , . . . , ynโ1 )S epf by Lemma 3.3.
Our next objective is to extend Theorem 3.10 to the ramified case.
Theorem 3.12. Let Rโฒ be a (possibly ramified) complete regular local ring of mixed
characteristic p and let the integral domain S be a finite extension of Rโฒ . If I is an
ideal of Rโฒ and J โ Rโฒ , then (IS : J) โ (I : J)S epf .
Proof. Rโฒ is a finite extension of an unramified complete local ring R. We choose
g so that R[(pg)โ1 ] โโ S[(pg)โ1 ] is finite eฬtale, and (p, g)R is a height two ideal.
We now use the standard framework of Notation 3.7. We first note that, just as
in the proof of Theorem 3.10, our Lemma 3.9 and Lemma 3.3 will give us the
โ
desired result provided we can prove (pg)1/p (IB โฆ : J) โ (I : J)B โฆ . Thus we will
โ
be done if we can show B โฆ is (pg)1/p -almost flat over Rโฒ . This follows formally
from the fact that Rโฒ is regular and every system of parameters of Rโฒ (in fact S)
โ
is a (pg)1/p -almost regular sequence on B โฆ by Corollary 3.11. We give a detailed
argument below.
โ
Claim. B โฆ is (pg)1/p -almost flat over Rโฒ .
โฒ
โฆ
1/pโ
Proof of Claim. It is enough to show TorR
-almost zero for all
i (N, B ) is (pg)
finitely generated Rโฒ -modules N and every i > 0. We use descending induction.
โฒ
โฆ
This is clearly true when i > dim Rโฒ since Rโฒ is regular. Now suppose TorR
k+1 (N, B )
โฒ
โ
โฆ
is (pg)1/p -almost zero for all finitely generated N . We want to show TorR
k (N, B )
EXTENDED PLUS CLOSURE IN COMPLETE LOCAL RINGS
9
โ
is (pg)1/p -almost zero for all finitely generated N . By considering a prime cyclic
filtration of N , it is enough to prove this for N = Rโฒ /P . Let h = ht P . We can pick
a regular sequence x1 , . . . , xh โ P . Now P is an associated prime of (x1 , . . . , xh )
and so we have 0 โโ Rโฒ /P โโ Rโฒ /(x1 , . . . , xh ) โโ C โโ 0. The long exact
sequence for Tor gives:
โฒ
โฒ
โฒ
R
R
โฆ
โฒ
โฆ
โฒ
โฆ
TorR
k+1 (C, B ) โโ Tork (R /P, B ) โโ Tork (R /(x1 , . . . , xh ), B ).
โฒ
โฒ
โฆ
โฆ
1/p
Now TorR
-almost zero bek (R /(x1 , . . . , xh ),โB ) = Hk (x1 , . . . , xh , B ) is (pg)
1/p
โฆ
cause x1 , . . . , xh is a (pg)
-almost regular sequence on B by Corollary 3.11, and
โฒ
โฒ
โฆ
1/pโ
โฒ
โฆ
TorR
-almost zero by induction. It follows that TorR
k+1 (C, B ) is (pg)
k (R /P, B )
โ
1/p
is (pg)
-almost zero.
โ
Remark 3.13. The analog of Theorem 3.10 and Theorem 3.12 in equal characteristic p > 0 is true if we replace extended plus closure by tight closure (in
fact, even by the plus closure): suppose R โโ S is a module-finite extension of
excellent local domains of characteristic p > 0 with R regular, let I, J be ideals
of R, then we have (IS : JS) โ (I : J)S โ . To see this, let z โ (IS : JS),
then since we have R โโ S โโ R+ , we know that z โ (IR+ : JR+ ). Since
R is regular and R+ is a balanced big Cohen-Macaulay algebra in characteristic
p > 0, R+ is faithfully flat over R and thus (IR+ : JR+ ) = (I : J)R+ . Hence
z โ (I : J)R+ โฉ S = (I : J)S + โ (I : J)S โ .
Theorem 3.14. Let Rโฒ be a (possibly ramified) complete regular local ring of mixed
characteristic p and let the integral domain S be finite over Rโฒ . Let M be an Rโฒ โฒ
N
module. Then there exists c โ Rโฒ such that the natural map cวซ TorR
i (S, M )/p โโ
โฒ
R
+
N
Tori (S , M )/p is zero for all i โฅ 1 and every N, วซ > 0. Consequently, for every
โฒ
N
โฒ
วซ
โฒ+
ฮฑ โ TorR
i (R , M )/p , there exists c โ R such that c ฮฑ = 0 for every วซ.
Proof. As before, Rโฒ is a finite extension of an unramified complete regular local
ring R. We choose g so that R[(pg)โ1 ] โโ S[(pg)โ1 ] is finite eฬtale, and (p, g)R
is a height two ideal. We now use the standard framework of Notation 3.7. By
โ
the Claim in the proof of Theorem 3.12, B โฆ is (pg)1/p -almost flat over Rโฒ . Thus
โฒ
โฒ
โ
โ
R
(pg)1/p Tori (B โฆ , M ) = 0 for all i > 0. It follows that (pg)1/p TorR
i (S, M ) โโ
โฒ
โฒ
pg
โฆ
TorR
through TorR
i (S , M ) is zero since it factors
i (B , M ) by Lemma 3.9. At this
pg
1/pโ
point, we note that S is (pg)
-almost isomorphic to S ++ by Lemma 3.3; thus
โฒ
โฒ
โ
R
++
the map (pg)1/p Tori (S, M ) โโ TorR
, M ) is also zero. Finally, tensoring
i (S
the commutative diagram
/ S+
0
ยทpN
/ S+
/ S + /pN
/ S ++
/ S ++ /pN
/0
=
/ S ++
0
N
ยทp
with M induces a commutative diagram:
โฒ
+
N
TorR
i (S , M )/p
/0
โฒ
+
N
/ TorR
i (S /p , M )
=
โฒ
++
TorR
, M )/pN
i (S
/ TorRโฒ (S ++ /pN , M )
i
10
RAYMOND C HEITMANN AND LINQUAN MA
By the injectivity of the map on the first line of the above diagram, in order to show
โฒ
โ
Rโฒ
+
N
the image of (pg)1/p TorR
i (S, M ) is zero in Tori (S , M )/p , it suffices to prove
โฒ
+
N
its image is zero in TorR
i (S /p , M ), which is clear because it factors through
โฒ
Rโฒ
++
N
++
Tori (S , M )/p and we already know the image is zero in TorR
, M ).
i (S
โฒ+
N
Remark 3.15. We cannot assert that TorR
is almost zero or that
i (R , M )/p
+
โฒ
N
R /p is almost flat because each S requires its own c.
โฒ
The next theorem is a simple consequence of our results, following directly from
Corollary 3.11 and Theorem 2.8. However, as our proof relies heavily on Andreฬโs
very deep perfectoid Abhyankar lemma, we would like to offer a more direct proof
based on our earlier work on the vanishing conjecture for maps of Tor.
Theorem 3.16. Let R be a regular local ring of mixed characteristic and let I be
an ideal of R. Then I epf = I.
Proof. We first claim that for every c 6= 0 in R, there exists e such that the natural
e
map R โโ R+ sending 1 to c1/p is pure. We prove this by contradiction. Suppose
e
there exists c 6= 0 such that for every e, the map R โโ R+ sending 1 โโ c1/p is
ยทc1/p
e
not pure. Let x1 , . . . , xd be a regular system of parameters of R. Since R โโโโโ R+
ยทc1/p
e
d
d
d
(R) โโโโโ Hm
is not pure, the map Hm
(R) to
(R+ ) sends the socle element of Hm
0, i.e., there exists t (depending on e) such that
(1)
e
t+1
t+1
+
c1/p (x1 x2 ยท ยท ยท xd )t โ (xt+1
1 , x2 , . . . , xd )R .
Next we claim that for every t > 0,
(2)
t+1
t+1
+
t
+
((xt+1
1 , x2 , . . . , xd )R : (x1 x2 ยท ยท ยท xd ) ) โ (x1 , . . . , xd )R .
t+1
t+1
+
To see this, suppose u(x1 x2 ยท ยท ยท xd )t โ (xt+1
but u is not in
1 , x2 , . . . , xd )R
(x1 , . . . , xd )R+ . Then there exists a domain S module-finite over R such that
t+1
t+1
u(x1 x2 ยท ยท ยท xd )t โ (xt+1
1 , x2 , . . . , xd )S. Say
u(x1 x2 ยท ยท ยท xd )t = r1 xt+1
+ ยท ยท ยท + rd xt+1
1
d .
Then (r1 , . . . , rd , โu) represents a class in
TorR
1(
R
t+1
(xt+1
1 , . . . , xd , (x1 x2
ยท ยท ยท xd )t )
, S).
Since u โ
/ (x1 , . . . , xd )R+ , u โ
/ (x1 , . . . , xd )S. By the valuation criterion for integral
closure, we know that there exists a mixed characteristic DVR V such that u โ
/
(x1 , . . . , xd )V . This means (r1 , . . . , rd , โu) represents a nonzero class in
t+1
t+1
t
TorR
1 (R/(x1 , . . . , xd , (x1 x2 ยท ยท ยท xd ) ), V ).
But this contradicts the vanishing conjecture for maps of Tor in mixed characteristic
e
[9, Theorem 1.3] applied to R โโ S โโ V . Now (1) and (2) shows that c1/p โ
(x1 , . . . , xd )R+ for all e > 0. But this is clearly impossible by computing valuations.
Finally, suppose x โ I epf , then for some c 6= 0, cวซ x โ (I, pN )R+ for every N, วซ.
e
Since the map R โโ R+ sending 1 โโ c1/p is pure for some e, we know that
x โ (I, pN )R for every N . This implies x โ I and hence I epf = I.
We also have completed a closure-based proof of the Briancฬงon-Skoda Theorem.
EXTENDED PLUS CLOSURE IN COMPLETE LOCAL RINGS
11
Theorem 3.17. [14] Let R be a regular ring and let I be an ideal of R generated
by n elements. Then the integral closure of I d+n is contained in I d+1 .
Proof. It suffices to prove the result locally and so we can assume that we have either
an equicharacteristic regular local ring or a mixed characteristic regular local ring.
Hochster and Huneke have proved the result in the equal characteristic case. See
[10, Theorem 5.4] for equal characteristic p case and [11] for equal characteristic
0 case (or [13, section 9.6] for generalizations in the equal characteristic 0 case
using multiplier ideals). We can now handle the mixed characteristic case. By
Theorem 2.7, we know that the integral closure of I d+n is contained in (I d+1 )epf .
Theorem 3.16 completes the proof.
References
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
Y. Andreฬ, Le lemme dโAbhyankar perfectoide, arXiv:1609.00320.
Y. Andreฬ, La conjecture du facteur direct, arXiv:1609.00345.
B. Bhatt, On the direct summand conjecture and its derived variant, arXiv:1608.08882.
B. Bhatt, M. Morrow and P. Scholze, Integral p-adic Hodge theory, arXiv:1602.03148.
O. Gabber and L. Romero, Almost ring theory, Lecture Notes in Mathematics, vol. 1800,
Springer-Verlag, Berlin, 2003.
R. Heitmann, The plus closure in mixed characteristic, J. of Algebra 193 (1997), 688โ708.
R. Heitmann, Extensions of plus closure, J. of Algebra 238 (2001), 801โ826.
R. Heitmann, The direct summand conjecture in dimension three, Ann. of Math. 156 (2002),
695โ712.
R. Heitmann and L. Ma, Big Cohen-Macaulay algebras and the vanishing conjecture for maps
of Tor in mixed characteristic, arXiv:1703.08281.
M. Hochster and C. Huneke, Tight closure, invariant theory, and the Briancฬงon-Skoda theorem,
J. Amer. Math. Soc. 3 (1990), 31โ116.
M. Hochster and C. Huneke, Tight closure in equal characteristic zero, preprint.
M. Hochster and C. Huneke, Tight closure and elements of small order in integral extensions,
J. of Pure & Appl. Algebra 71 (1991), 233โ247.
R. Lazarsfeld, Positivity in algebraic geometry. II, Ergebnisse der Mathematik und ihrer
Grenzgebiete. 3. Folge. A Series of Modern Surveys in Mathematics [Results in Mathematics and Related Areas. 3rd Series. A Series of Modern Surveys in Mathematics], vol. 49,
Springer-Verlag, Berlin, 2004.
J. Lipman and A. Sathaye, Jacobian ideals and a theorem of Briancฬงon-Skoda, Michigan
Math. J. 28 (1981), 199โ222.
L. Ma and K. Schwede, Perfectoid multiplier/test ideals in regular rings and bounds on symbolic powers,
arXiv:1705.02300.
P. Scholze, Perfectoid spaces, Publ. Math. Inst. Hautes Eฬtudes Sci. 116 (2012), 245โ313.
| 0math.AC
|
arXiv:1711.08410v1 [math.GR] 22 Nov 2017
LATTICE ENVELOPES
URI BADER, ALEX FURMAN, AND ROMAN SAUER
Abstract. We introduce a class of countable groups by some abstract grouptheoretic conditions. It includes linear groups with finite amenable radical
and finitely generated residually finite groups with some non-vanishing โ2 Betti numbers that are not virtually a product of two infinite groups. Further,
it includes acylindrically hyperbolic groups. For any group ฮ in this class we
determine the general structure of the possible lattice embeddings of ฮ, i.e. of
all compactly generated, locally compact groups that contain ฮ as a lattice.
This leads to a precise description of possible non-uniform lattice embeddings
of groups in this class. Further applications include the determination of possible lattice embeddings of fundamental groups of closed manifolds with pinched
negative curvature.
1. Introduction
1.1. Motivation and background. Let G be a locally compact second countable
group, hereafter denoted lcsc1. Such a group carries a left-invariant Radon measure
unique up to scalar multiple, known as the Haar measure. A subgroup ฮ < G is a
lattice if it is discrete, and G/ฮ carries a finite G-invariant measure; equivalently,
if the ฮ-action on G admits a Borel fundamental domain of finite Haar measure.
If G/ฮ is compact, one says that ฮ is a uniform lattice, otherwise ฮ is a nonuniform lattice. The inclusion ฮ ึโ G is called a lattice embedding. We shall
also say that G is a lattice envelope of ฮ.
The classical examples of lattices come from geometry and arithmetic. Starting
from a locally symmetric manifold M of finite volume, we obtain a lattice embedding
ฯ1 (M ) ึโ Isom(Mฬ ) of its fundamental group into the isometry group of its universal
covering via the action by deck transformations. The real Lie group Isom(Mฬ ) is
semi-simple if Mฬ has no Euclidean direct factors, and the lattice ฮ < Isom(Mฬ ) is
uniform if and only if M is compact.
The fact that semi-simple real Lie groups are algebraic and can be expressed as
zero sets of polynomials allows to construct arithmetic lattices, such as
SLd (Z) < SLd (R).
2000 Mathematics Subject Classification. Primary 20565; Secondary 22D05.
Key words and phrases. Locally compact groups, lattices, geometric group theory.
In part, U.B. and A.F. were supported by BSF grant 2008267 and A.F. by NSF grant DMS
1611765. All three authors thank MSRI for its support during the Geometric Group Theory
Program.
1If G is, in addition, totally disconnected we call G a tdlc group.
1
2
URI BADER, ALEX FURMAN, AND ROMAN SAUER
Analogous constructions exist for products of real and p-adic algebraic semi-simple
groups, such as
SLd (Z[
1
1
, . . . , ]) < SLd (R) ร SLd (Qp1 ) ร ยท ยท ยท ร SLd (Qpk ).
p1
pk
Our notations and conventions for arithmetic lattices are defined in ยง4.1 below.
A central theme in the study of lattices are the connections between the lattices
and the ambient group. Mostowโs Strong Rigidity ([52] for the uniform case, [45,57]
for the non-uniform case) asserts that an irreducible lattice in a semi-simple real
Lie group G 6โ SL2 (R) determines the ambient Lie group among all Lie groups and
determines its embedding in the ambient Lie group uniquely up to an automorphism
of G.
It is natural to ask to what extent lattices determine their lattice envelopes
among all lcsc groups, and which countable groups have only trivial lattice envelopes. To make the question precise we introduce the notion of virtual isomorphism between lattice embeddings in Definition 3.1, which generalizes the notion
of weak commensurability or virtual isomorphism of abstract groups (see Definition 2.2). A lattice embedding is called trivial if it is virtually isomorphic to the
identity homomorphism of a countable discrete group, which can be regarded as
a lattice embedding. Virtual isomorphism is an equivalence relation. We refer to
ยง3.1 for more information.
Problem 1.1. Given a countable group ฮ, describe all its possible lattice envelopes
up to virtual isomorphism.
In the study of lattices, the non-uniform lattices are often harder to work with
when compared to uniform ones. For example, the condition of integrability of
lattices (e.g. required for different purposes in [4, 37, 46, 50, 64]) and the spectral
gap condition (also known as weak cocompactness, which is e.g. required in [41])
are automatically satisfied by uniform lattices and can be proven for some examples of non-uniform lattices, often using elaborate arguments. This motivates the
following.
Problem 1.2. How prevalent are non-uniform lattice embeddings?
1.2. Main result. To state our main result, Theorem A, towards Problem 1.1 we
need to put some conditions on the group ฮ.
Definition 1.3. We say that a countable group ฮ has property
โข (BT) if there is an upper bound on the order of finite subgroups of ฮ.
โข (Irr) if ฮ is not virtually isomorphic to a product of two infinite groups.
โข (CAF) if every amenable commensurated subgroup of ฮ is finite.
โข (NbC) if for every normal subgroup N โณ ฮ and every commensurated subgroup M < ฮ such that N โฉ M = {1} there is a finite index subgroup of
M that commutes with N .
The abbreviations stand for Bound on Torsion, Irreduciblity, Commensurated
Amenable is Finite, and Normal by Commensurated. For the definition of commensurated subgroup see ยง2.1.
In ยง2 we prove the following result that shows that large classes of groups satisfy
the above conditions, and we also describe these classes in more detail.
LATTICE ENVELOPES
3
Theorem 1.4. The following countable groups have property (CAF):
(1) Groups with a non-vanishing โ2 -Betti number in some degree.
(2) Linear groups with finite amenable radical.
(3) Groups in the class Dreg introduced in [68]. This class contains all acylindrically hyperbolic groups and thus non-elementary convergence groups.
Further, the following countable groups have property (NbC):
(1โ) Groups with non-vanishing first โ2 -Betti number.
(2โ) Linear groups.
(3โ) Finitely generated residually finite groups.
(4โ) Groups in the class Dreg .
The groups in (1โ) and (4โ) also have the property (Irr).
The statement about (NbC) for the groups of case (3โ) is due to CapraceKropholler-Reid-Wesolek [20, Corollary 18]. Of course, linear groups fall into this
case provided they are finitely generated.
The next theorem was announced in [5] with a slightly stronger formulation of
the (NbC) and (CAF) condition. It gives a partial answer to Problem 1.1 that
concerns possible lattice envelopes of a given group ฮ. We impose no restriction on
the lattice envelope, except for it being compactly generated. This condition can
also be removed if ฮ is assumed to be finitely generated (see Lemma 3.6).
Theorem A (Structure of possible lattice envelopes).
Let ฮ be a countable group with properties (Irr), (CAF), and (NbC), and let ฮ < G
be a non-trivial lattice embedding into a compactly generated lcsc group G.
Then the lattice embedding ฮ ึโ G is virtually isomorphic to one of the following:
(1) an irreducible lattice in a connected, center-free, semi-simple real Lie group
without compact factors, or
(2) the inclusion of a subgroup commensurable with H(O[S]) into a (possibly
trivial) tree extension of HK,S , where S, being a finite set of places compatible with H, and H, K are as in ยง4.1.
(3) a lattice in a non-discrete totally disconnected locally compact group without
normal amenable subgroups.
If in addition ฮ has (BT), then the lattice in (3) is uniform.
For the notion of tree extension see Definition 4.3. The three cases are distinct
(see Remark 4.2). We show in Example 2.14 the necessity of the condition (NbC)
for the theorem above.
The classical case of lattices in semi-simple real Lie groups includes both arithmetic and non-arithmetic examples (non-arithmetic lattices can appear only in
SO(n, 1) and SU(n, 1)). The case of S-arithmetic lattices in the above statement
refers to irreducible lattices in a product of finitely many real semi-simple Lie groups
and p-adic ones, where factors of both types are present. Case (3) contains a large
class of examples that includes lattices in p-adic groups, and fundamental groups ฮ
of some finite cubical complexes whose universal cover has a non-discrete group of
automorphisms. This last case remains quite mysterious although a structure theory of non-discrete, simple, totally disconnected groups emerged in the last decade
(in this regard, Capraceโs survey [19] is recommended).
However assuming property (BT) the last case does not allow non-uniform lattices. Hence we obtain the following partial solution to Problem 1.2.
4
URI BADER, ALEX FURMAN, AND ROMAN SAUER
Corollary 1.5 (Classification of non-uniform lattices).
Let ฮ be a countable group with properties (BT), (Irr), (CAF), and (NbC). Then
every non-uniform lattice embedding ฮ ึโ G of ฮ is virtually isomorphic to either
(1) an irreducible lattice in a connected, center free, semi-simple real Lie group
without compact factors, or
(2) a (possibly trivial) tree extension of an S-arithmetic lattice with both real
and p-adic factors present.
In particular, every lattice embedding of ฮ is weakly compact, and, with the exception
of lattice embeddings into Lie groups isogenous to SL2 (R) or SL2 (C), every lattice
embedding of ฮ is square integrable.
This is a direct corollary except for the last statement which is a consequence of
results about weak compactness and square integrability of classical lattices: Weak
compactness of lattices in connected semi-simple Lie groups is stated in [47, III.1.12
on p. 113] and proved in [8, Lemma 3]. Weak compactness of lattices in S-arithmetic
groups as in Setup 4.1 follows from the stronger property (T) [47, III.5]. The
statement about square integrability is taken from Shalomโs work (see [64, ยง2] for
the S-arithmetic and higher rank case and [65, Theorem 3.7] for the rank 1 case).
1.3. Applications. As applications of our main result, we now present more precise classification results of lattice envelopes for specific groups. Their proofs can
be found in ยง6.
Theorem B (Mostow rigidity with locally compact targets).
Let ฮ < H be either an irreducible lattice in a center-free, real semi-simple Lie
group H without compact factors and H 6โ SL2 (R), or an S-arithmetic lattice
H(O[S]) < HK,S as in Setup 4.1.
Then any other lattice embedding of ฮ < G into an lcsc group G is virtually
isomorphic to ฮ < H.
This theorem may be viewed as a generalization of Mostowโs Strong Rigidity,
corresponding to the special case of Theorem B, where H is a real semi-simple Lie
group and G is also known to be a semi-simple real Lie group (in most accounts one
even assumes G = H and the focus is on aligning two given lattice embeddings of
ฮ in G by an automorphism of G). In fact, Mostow considered the case of uniform
lattice embeddings [52]; the non-uniform were later obtained by Prasad [57] and
Margulis [45]. In [33] the second author proved Theorem B for the case of a simple
real Lie group H with rkR (H) โฅ 2 and a general lattice envelope ฮ < G, and for
the case of rank-one real Lie group H and a uniform lattice envelope ฮ < G.
The case of H = PSL2 (R) is excluded from Theorem B for two reasons. First,
strong rigidity does not hold in this setting โ the moduli space of embeddings
of a surface group in the same group G = H = PSL2 (R) is multidimensional.
Secondly, non-uniform lattices in PSL2 (R), that are virtually free groups of finite
rank 2 โค n < โ, can be embedded as a lattice in completely different lcsc groups,
such as PGL2 (Qp ), or the automorphism group Aut(T ) of a locally finite tree T .
Our next results show that all examples are related to the ones mentioned above.
Theorem C (Lattice embeddings of free groups).
Let ฮ be a finite extension of a finitely generated non-abelian free group Fn and let
ฮ < G be a non-trivial lattice embedding.
LATTICE ENVELOPES
5
(1) If ฮ < G is non-uniform, then it is virtually isomorphic to a non-uniform
lattice in PSL2 (R).
(2) If ฮ < G is uniform, then it is virtually isomorphic to a lattice in a closed
cocompact subgroup of the automorphism group of a tree.
Note that the second possibility in the Theorem includes such examples as
PGL2 (Qp ) or other rank-one non-Archimedean groups.
For uniform lattices in PSL2 (R), such as surface groups, the possibilities for
lattice embeddings are even more restricted.
Theorem D (Lattice embeddings of surface groups).
Let ฮ be a uniform lattice in PSL2 (R). Any other non-trivial lattice embedding of
ฮ is virtually isomorphic to a uniform lattice embedding into PSL2 (R).
Let M be a manifold that admits a Riemannian metric with strictly negative
sectional curvature, but is not homeomorphic to a locally symmetric one. We
conjecture that fundamental groups of such manifolds ฮ = ฯ1 (M ) have no nontrivial lattice envelopes. Under an additional pinching assumption, we are able to
prove this.
Theorem E (Lack of lattice embeddings in pinched negative curvature).
The fundamental group of a closed Riemannian manifold M of dimension n โฅ 5
whose sectional curvatures range in
1 2
) , โ1
โ(1 +
nโ1
does not admit a non-trivial lattice embedding unless M is homeomorphic to a closed
hyperbolic manifold.
Some remarks about this result are in order. Gromov and Thurston [38] construct
infinitely many examples of negatively curved manifolds with the above pinching in
dimensions n โฅ 4 that are not homeomorphic to hyperbolic manifolds. By taking
connected sums of a hyperbolic manifold with an exotic sphere Farrell and Jones
construct closed smooth manifolds that are homeomorphic to a hyperbolic manifold
but whose smooth structure does not support a hyperbolic Riemannian metric [30].
We recommend the survey [31] by Farrell, Jones and Ontaneda on these issues.
Finally, we obtain the following surprising characterization of free groups.
(2)
Theorem F (Non-uniform lattice embeddings of groups with ฮฒ1 > 0).
Let ฮ be a group with non-vanishing first โ2 -Betti number that has an upper bound on
the order of its finite subgroups. If ฮ possesses a non-uniform compactly generated
lattice envelope, then ฮ has a non-abelian free subgroup of finite index.
1.4. Structure of the paper. We devote most of ยง2 to the proof of Theorem 1.4.
We discuss an example by Burger and Mozes in ยง2.4 that shows the necessity of
the condition (NbC); if one drops (NbC) while still keeping (CAF) then there are
exotic lattice embeddings that are not covered by the three cases of Theorem A.
The definition of virtually isomorphism of lattice embeddings and the tools of the
trade for the proof of Theorem A are provided in ยง3. The most difficult proof in ยง3
is the result about outer automorphisms of S-arithmetic lattices (Theorem 3.13).
While this result is known or expected to hold by the experts there was no proof
so far in the required generality. We hope its proof provides a useful reference.
6
URI BADER, ALEX FURMAN, AND ROMAN SAUER
The bulk of the paper is devoted to the proof of Theorem A in ยง5. The paper [5]
in which we announced the results of this paper and provided proofs in special
cases might be helpful for the reader. In the first step of the proof we rely on
property (CAF) and the positive solution of Hilbertโs 5th problem to show that the
given lattice embedding ฮ < G is virtually isomorphic to one into a product of a
semi-simple Lie group L and a totally disconnected group D. So we may assume
that G = L ร D. Let U < D be a compact-open subgroup. In the second step
of the proof we split L further as L = L0 ร L1 in a way so that the projection
of ฮ to L1 is dense. Depending on the finiteness of ฮ โฉ (L ร U ) and ฮ โฉ ({1} ร
L1 ร U ), we distinguish three cases in the third step which correspond to the
cases (1), (2) or (3) of the statement of Theorem A. The second case is the most
sophisticated. Here we have to identify the lattice ฮ โฉ ({1} ร L1 ร Dโฒ ) < L1 ร Dโฒ ,
where Dโฒ < D is a certain closed cocompact subgroup, as an S-arithmetic lattice,
and Dโฒ with the corresponding non-Archimedean factor. This identification is an
arithmeticity theorem which is proved in our companion paper [6] and heavily relies
on Margulisโ commensurator rigidity. We actually prove in that paper a result of
greater generality which does not assume compact generation of the ambient group.
The version needed here is only slightly more general than the arithmeticity theorem
by Caprace and Monod in [23, Theorem 5.20]. Our basic setup for S-arithmetic
groups and a detailed explanation of the arithmeticity theorem is provided in ยง4.
Further, we use Margulisโ normal subgroup theorem and the aforementioned result
on outer automorphism groups to conclude that L = L1 and L0 = {1} in the second
case. The condition on (NbC) appears just once in the whole proof, namely in the
third step of the proof, in Lemma 5.9.
The final step of the proof identifies the difference between L ร Dโฒ and L ร D as
a tree extension in the sense of Setup 4.1. Important ingredients here are the fact
that D and Dโฒ are quasi-isometric, the quasi-isometry rigidity theorem of KleinerLeeb [42] and the work of Mosher-Sageev-White [51].
In the proof of the applications, that is Theorems BโF, a major step is always to
identify the most mysterious case, namely (3), in Theorem A. To this end, we appeal
to ideas of geometric group theory as in the final step of the proof of Theorem A.
This is based on the fact that a lattice with property (BT) is quasi-isometric to any
of its totally disconnected lattice envelopes.
2. The properties (BT), (Irr), (CAF), and (NbC)
We describe the classes in Theorem 1.4 in more detail. In ยง2.3 we prove Theorem 1.4. In ยง2.4 we describe an exotic lattice embedding of a group that does not
have property (NbC).
2.1. Commensurated and commensurable groups. We recall the following
well known definitions.
Definition 2.1. A subgroup A of ฮ is commensurated by a subset S โ ฮ if sโ1 Asโฉ
A has finite index in sโ1 As and A for every s โ S. If A < ฮ is commensurated by
all of ฮ we just say that A < ฮ is commensurated.
Definition 2.2. Two groups ฮ and ฮ are commensurable if there are subgroups
ฮโฒ < ฮ and ฮโฒ < ฮ of finite index such that ฮโฒ โผ
= ฮโฒ . In this case we write ฮ โ ฮ.
Further, ฮ and ฮ are weakly commensurable or virtually isomorphic if there are
LATTICE ENVELOPES
7
subgroups ฮโฒ < ฮ and ฮโฒ < ฮ of finite index and finite normal subgroups N โณ ฮโฒ
and M โณ ฮโฒ such that ฮโฒ /N โผ
= ฮโฒ /M .
The notion of virtual isomorphism is generalized to lattice embeddings in Definition 3.1. The proof of the following easy lemma is left to the reader.
Lemma 2.3. Being commensurated is preserved in the following situations:
(1) Preimages of commensurated subgroups under homomorphisms are commensurated.
(2) Intersections of commensurated subgroups are commensurated.
(3) A finite index subgroup of a commensurated subgroup is itself commensurated.
Both (CAF) and (NbC) are not necessarily preserved if one passes to a weakly
commensurable group. They are, however, preserved by passing to quotients by
finite kernels.
Lemma 2.4. Let K โณ ฮ be a finite normal subgroup. If ฮ has property (CAF), then
ฮ/K has (CAF).
Proof. Let p : ฮ โ ฮ/K be the projection. Let A < ฮ/K be an amenable, commensurated subgroup. Then pโ1 (A) < ฮ is commensurated by Lemma 2.3. Since
pโ1 (A) is a finite extension of A, it is amenable too. By the property (CAF) the
group pโ1 (A) is finite, thus A is finite.
Lemma 2.5. Let K โณ ฮ be a finite normal subgroup. If ฮ has property (NbC), then
ฮ/K has (NbC).
Proof. Let M, N be subgroups of ฮ/K such that M โฉ N = {1}, M โณ ฮ/K, and
M < ฮ/K is commensurated. Then pโ1 (M ) < ฮ and pโ1 (N ) < ฮ satisfy the same
properties (see Lemma 2.3). Hence there is a finite index subgroup of pโ1 (M )
that commutes with pโ1 (N ). Its projection is a finite index subgroup of M that
commutes with N .
2.2. Groups in the class Dreg and acylindrically hyperbolic groups. The
class Dreg was introduced by Thom [68]. It is closely related to the class Creg of
Monod-Shalom. Both Dreg and Creg are an attempt to define negative curvature
for groups in a cohomological way. The definition of Dreg is analytical.
Let ฯ : ฮ โ U (H) be a unitary representation. A map c : ฮ โ H is a quasi-1cocycle for ฯ if
ฮ ร ฮ โ (g, h) 7โ ฯ(g)c(h) โ c(gh) + c(g) โ H
is uniformly bounded on ฮ ร ฮ. The vector space of quasi-1-cocycles modulo the
bounded ones forms a group QH 1 (ฮ, H). The class Dreg is the class of groups
for which QH 1 (ฮ, โ2 (ฮ)) has non-zero L(ฮ)-dimension in the sense of Luฬck [44,
Section 6.1]. More concrete is the description of non-amenable groups in Dreg :
Proposition 2.6 ([68, Corollary 2.5]). A non-amenable group ฮ is in Dreg if and
only if there is an unbounded quasi-1-cocycle ฮ โ โ2 (ฮ).
The following theorem was proved by Bestvina-Fujiwara [9] and Hamenstaฬdt [39]
for classes of groups that were later identified as acylindrically hyperbolic groups
by Osin [54].
8
URI BADER, ALEX FURMAN, AND ROMAN SAUER
Theorem 2.7 ([54, Theorem 8.3]). The class Dreg strictly contains the class of
acylindrically hyperbolic groups.
We also mention the following result of Sun [67].
Theorem 2.8. Non-elementary convergence groups are acylindrically hyperbolic.
Remark 2.9. In the sequel, we show properties (NbC) and (CAF) for groups in
Dreg . Using the difficult Theorem 2.7 this implies (NbC) and (CAF) for acylindrically hyperbolic groups. We emphasize, however, that one can deduce (CAF)
and (NbC) directly and quite easily for acylindrically hyperbolic groups. For example, (CAF) follows directly from [54, Corollary 1.5] and the non-amenability of
acylindrically hyperbolic groups.
We show that groups in Dreg satisfy the (NbC) property for the trivial reason
that the situation in which to apply (NbC) cannot happen. That means, we show
the following stronger property for groups in Dreg .
Definition 2.10. A group ฮ has property (NbC)1 if it satisfies the following:
If N โณ ฮ is a normal subgroup and M < ฮ is a commensurated subgroup and
N โฉ M = {1}, then N is finite or M is finite.
It is obvious that (NbC)1 implies (NbC).
Lemma 2.11. Let ฮ be a group with a normal subgroup N โณฮ and a commensurated
subgroup M < ฮ such that ฮ = N ยท M and N โฉ M = {1}.
To every finite subset F โ ฮ we can assign subgroups NF < N and MF < M in
such a way that the following holds:
(1) NF is normalized by M ;
(2) MF โณ M is normal and has finite index;
(3) F โ ฮF := NF M and NF MF < ฮF has finite index;
(4) MF commutes with NF , thus NF MF โผ
= NF ร M F ;
(5) F โ F โฒ implies NF โ NF โฒ and MF โ MF โฒ .
In particular, if N is finitely generated, then M has a finite index subgroup that
commutes with N .
Proof. For every F โ ฮ let MF be the normal core of the subgroup
\
ฮปM ฮปโ1 โ M.
MFโฒ :=
ฮปโF โช{1}
MFโฒ
Since M is commensurated,
< M , hence MF < M , are of finite index. In other
words, MF is the largest normal subgroup of M with the property ฮปMF ฮปโ1 โ M
for all ฮป โ F .
Let q : ฮ โ N be the map q(nm) = n; it is well defined because of N โฉ M = {1}.
โฒ
Clearly, MFโฒ = Mq(F
) , thus MF = Mq(F ) . Since N โณ ฮ is normal, the commutator
โ1 โ1
[n, m] = n(mn m ) lies in N . For m โ MF = Mq(F ) and n โ q(F ) we also have
[n, m] = (nmnโ1 )mโ1 โ M , hence [n, m] โ M โฉ N = {1}. So MF commutes with
the subset q(F ). Let
[
S :=
mq(F )mโ1 โ N.
mโM
Because of normality MF โณ M the group MF commutes with the subset S as well.
The subgroups NF := hSi < N and MF satisfy all the required properties.
LATTICE ENVELOPES
9
Theorem 2.12. Every group in Dreg is (Irr), (CAF) and (NbC)1 .
Proof. The properties (Irr) and (CAF) are shown in [68, Theorem 3.4]. Let ฮ โ
Dreg , and let N โณ ฮ and M < ฮ normal and commensurated subgroups, respectively,
with trivial intersection. Assume by contradiction that both subgroups are infinite.
According to loc. cit. N is non-amenable. Let N = {n1 , n2 , . . .} be an enumeration
of N . We refer to the notation of Lemma 2.11 applied to our situation. The group
N is the increasing union of subgroups NFi < N for Fi = {n1 , . . . , ni }. Hence there
is some k โ N such that N โฒ := NFk is non-amenable, thus infinite.
The group N โฒ commutes with the finite index subgroup M โฒ := MFk of M . Since
M < ฮ is commensurated, also M โฒ < ฮ is commensurated. By [68, Lemma 3.3]
the restriction maps QH 1 (ฮ, โ2 (ฮ)) โ QH 1 (M โฒ , โ2 (ฮ)) and QH 1 (N โฒ M โฒ , โ2 (ฮ)) โ
QH 1 (M โฒ , โ2 (ฮ)) to commensurated subgroups are injective. Hence the restriction
map
QH 1 (ฮ, โ2 (ฮ)) โ QH 1 (N โฒ M โฒ , โ2 (ฮ))
is injective. We reach a contradiction as the latter module vanishes by [68, Theorem 3.4] and the fact that N โฒ M โฒ is a product of two infinite groups.
2.3. Conclusion of proof of Theorem 1.4.
Proof of property (CAF). We refer to the cases in the statement of Theorem 1.4.
(1) Since all โ2 -Betti numbers of an infinite amenable group vanish by a result of Cheeger-Gromov [24], every group with some non-vanishing โ2 -Betti
number is (CAF) according to [7, Corollary 1.4].
(2) This is exactly [14, Theorem 6.8].
(3) See Theorem 2.12. For the classes included in Dreg see Theorems 2.7
and 2.8.
Proof of property (NbC). We refer to the cases in the statement of Theorem 1.4.
(1โ) Let ฮ be a group with positive first โ2 -Betti number. Assume by contradiction that ฮ does not have (NbC)1 .
Let M, N < ฮ be subgroups with M โฉN = {1} such that N โณ ฮ is normal
and M is commensurated by ฮ. Asssume that neither M nor N are finite.
(2)
We have to show that ฮฒ1 (ฮ) = 0. Since ฮ := N M is commensurated by
(2)
ฮ, the vanishing of ฮฒ1 (ฮ) would imply this according to [7, Corollary 1.4].
By Lemma 2.11 the group ฮ is an ascending union of groups ฮn such that
ฮn is virtually a product of infinite groups. A product of infinite groups has
vanishing first โ2 -Betti number because of the Kuฬnneth formula for โ2 -Betti
numbers and the fact that the zeroth โ2 -Betti number of an infinite group
(2)
vanishes. The same is true for a virtual product, so ฮฒ1 (ฮn ) = 0 for large
n. This follows from the fact that the vanishing of โ2 -Betti numbers is an
invariant of virtual isomorphism which can be easily deduced from their
basic properties [44]. Or one may cite the much more general result that
the vanishing of โ2 -Betti numbers of lcsc groups is a coarse invariant [61].
(2)
(2)
Finally, ฮฒ1 (ฮn ) = 0 for all n implies ฮฒ1 (ฮ) = 0 by [44, Theorem 7.2 (2)].
(2โ) Let ฮ < GLn (k) be a linear group, and let N, M < ฮ subgroups with trivial
intersection such that N โณ ฮ is normal and M < ฮ is commensurated by ฮ.
Let F 7โ NF , MF be an assignment of finite subsets to subgroups as in
Lemma 2.11. By the Noetherian property of the algebraic group GLn (k)
10
URI BADER, ALEX FURMAN, AND ROMAN SAUER
there exists some finite set F1 โ N such that the Zariski closure Mฬ1 of MF1
is minimal among all finite subsets of N . Thus, for every n โ N , MF0 โช{n}
is Zariski dense in Mฬ1 . Since
[n, MF0 โช{n} ] = 1
we get that [n, Mฬ1 ] = 1. In particular, the finite index subgroup MF1 of M
commutes with N . This implies (NbC) for linear groups.
(3โ) As mentioned before, this is exactly [20, Corollary 18].
(4โ) See Theorem 2.12.
Proof of property (Irr). By the Kuฬnneth formula for โ2 -Betti numbers and the fact
from the previous proof that their vanishing is unaffected by passing to virtually
isomorphic groups it follows that groups with positive first โ2 -Betti numbers have
property (Irr). That groups in Dreg have (Irr) is contained in Theorem 2.12.
2.4. Examples of groups without property (NbC). Among the conditions required for our main result, the (NbC) property is the most opaque. We present two
examples of groups that do not have property (NbC). The first example is a wreath
product. The second one comes with a lattice envelope that shows the necessity of
the (NbC) condition in Theorem A.
Example 2.13. For an infinite residuallyQfinite group M and a countable group
H we consider the product group H M = M H endowed with the natural (shift)
action of M . Let N be the subgroup in H M consisting of periodic elements, that
is, elements having an M -stabilizer of finite index in M . N is clearly a countable
subgroup on which M acts. Let ฮ = M โ N . Observe that ฮ = N M , N โณ ฮ, M is
commensurated by ฮ and N โฉ M = {e}. The subgroup N does not commute with
any finite index subgroup of M , yet any finitely generated subgroup of N does so
(cf. Lemma 2.11).
Example 2.14. Let ฮ be an irreducible lattice in SLn (Qp )ร SLn (R). Let X be the
symmetric space of SLn (R), and let B be the 1-skeleton of the Bruhat-Tits building
associated with SLn (Qp ). Then the action of ฮ on B ร X can be extended to an
action of an extension, denoted by ฮ, of ฮ by the fundamental group ฯ1 (B), which
is an infinitely generated free group, on the universal covering Bฬ ร X. Note that
T := Bฬ is a tree. Moreover, ฮ is an irreducible lattice in Aut(T ) ร SLn (R). This
type of example originates from the work of Burger-Mozes [18, 1.8]. More general
constructions in this direction are discussed in Caprace-Monod [22, 6.C].
The group ฮ has the properties (BT), (Irr), and (CAF), but it lacks property
(NbC). Let us show property (CAF) first. Let A < ฮ be a commensurated subgroup. The image p(A) under the projection p : ฮ โ ฮ is an amenable commensurated subgroup of ฮ. It follows from Theorem 1.4 that ฮ has (CAF). Thus p(A) is
finite. Since ฯ1 (B) satisfies (CAF) by loc. cit., the intersection A โฉ ฯ1 (B) is finite
as well, which implies that A is finite.
Let U โ Aut(T ) be the stabilizer of a vertex; it is a compact open subgroup.
Then it is easy to verify that the normal subgroup N = ฯ1 (B) โณ ฮ and the subgroup
M = ฮ โฉ (U ร SLn (R)), which is commensurated by Lemma 3.5, violate property
(NbC): No finite index subgroup of M commutes with N .
LATTICE ENVELOPES
11
3. General facts about locally compact groups and their lattices
In ยง3.1 we introduce the analog of weak commensurability or virtual isomorphism
of groups for lattice embeddings. In ยง3.2 and ยง3.3 we have a look at broader classes
of subgroups in lcsc groups than lattices, discrete subgroups and closed subgroups
of finite covolume. In ยง3.4 we recall the definition of the amenable radical and
study its behaviour under passage to closed subgroups of finite covolume. Finally,
in ยง3.5 and ยง3.6 we study automorphisms of lcsc groups and their lattices in different
categories: outer automorphism groups and quasi-isometry groups.
3.1. Virtual isomorphism of lattice embeddings.
Definition 3.1. Two lattice embeddings ฮ ึโ G and ฮโฒ ึโ Gโฒ are virtually isomorphic if there are open finite index subgroups H < G and H โฒ < Gโฒ and compact
normal subgroups K โณH and K โฒ โณH โฒ and a topological isomorphism H/K โ H โฒ /K โฒ
that restricts to an isomorphism of lattices (ฮ โฉ H)/(ฮ โฉ K) โ (ฮโฒ โฉ H โฒ )/(ฮโฒ โฉ K โฒ ),
that is, there is a commutative square:
(ฮ โฉ H)/(ฮ โฉ K)
H/K
โผ
=
(ฮโฒ โฉ H โฒ )/(ฮโฒ โฉ K โฒ )
โผ
=
H โฒ /K โฒ
A lattice embedding is trivial if it is virtually isomorphic to the identity homomorphism of a countable discrete group.
In particular, if ฮ ึโ G and ฮโฒ ึโ Gโฒ are virtually isomorphic then ฮ and ฮโฒ are
virtually isomorphic in the sense of Definition 2.2. To justify the above definition
one needs that the horizontal maps in the above diagram are lattice embeddings.
This follows from Lemma 3.3 and Lemma 3.4.
Proposition 3.2. Virtual isomorphism is an equivalence relation on the class of
lattice embeddings.
Proof. The only non-obvious claim is transitivity. Its proof is similar to the proof
that weak commensurability among groups is transitive.
Let jl : ฮl ึโ Gl for l โ {1, 2, 3} be lattice embeddings such that j1 , j2 and
j2 , j3 are virtually isomorphic. So for l โ {1, 2, 3} there are finite index subgroups
Hl < Gl and H2โฒ < G2 and compact normal subgroups Kl โณ Hl and K2โฒ โณ H2โฒ and
isomorphisms
โผ
=
โผ
=
H1 /K1 โ
โ H2 /K2 and H2โฒ /K2โฒ โ
โ H3 /K3
that restrict to isomorphisms
(ฮ1 โฉ H1 )/(ฮ1 โฉ K1 ) โผ
= (ฮ2 โฉ H2 )/(ฮ2 โฉ K2 ) and
โฒ โผ
โฒ
(ฮ2 โฉ H )/(ฮ2 โฉ K ) = (ฮ3 โฉ H3 )/(ฮ3 โฉ K3 ),
2
2
respectively. The subgroup
H2โฒโฒ
:= H2 โฉ H2โฒ < G2 has finite index in G2 . Let
pr : H2โฒโฒ โ Q2 := H2โฒโฒ /(K2 โฉ H2โฒ )
be the projection. Let K2โฒโฒ be the kernel of the composition of quotient maps
H2โฒโฒ โ Q2 โ Q2 / pr(K2โฒ โฉ H2 ).
12
URI BADER, ALEX FURMAN, AND ROMAN SAUER
Note that K2โฒโฒ contains K2 โฉ H2โฒ = K2 โฉ H2โฒโฒ and K2โฒ โฉ H2 = K2โฒ โฉ H2โฒโฒ . Since K2 and
pr(K2โฒ โฉ H2 ) are compact, K2โฒโฒ โณ H2โฒโฒ is a compact normal subgroup of H2โฒโฒ . Consider
the compositions of quotient maps and isomorphisms as above
โผ
=
โผ
=
f1 : H1 โ H1 /K1 โ
โ H2 /K2 and g3 : H2โฒ โ H2โฒ /K2โฒ โ
โ H3 /K3 .
Similarly, using the inverses of the above isomorphisms we obtain homomorphisms
โผ
=
โผ
=
g1 : H2 โ H2 /K2 โ
โ H1 /K1 and f3 : H3 โ H3 /K3 โ
โ H2โฒ /K2โฒ .
We set Ci := gi (H2โฒโฒ ) and Ei := gi (K2โฒโฒ ) โณ Ci for i โ {1, 3}; further, let Cฬi < Hi and
Eฬi < Hi be the preimages of Ci and Ei under the quotient maps. Then Cฬi has
finite index in Hi , thus also in Gi , and Eฬi is a compact normal subgroup of Cฬi for
i โ {1, 3}. The homomorphism
Cฬi /Eฬi โ H2โฒโฒ /K2โฒโฒ , [x] 7โ [fi (x)]
is an isomorphism for i โ {1, 3} with inverse map [y] 7โ [gi (y)]. Since fi and gi
preserve the lattices, this isomorphism restricts to an isomorphism
(ฮi โฉ Cฬi )/(ฮi โฉ Eฬi ) โผ
= (ฮ2 โฉ H2โฒโฒ )/(ฮ2 โฉ K2โฒโฒ )
for i โ {1, 3}. This finishes the proof of transitivity.
3.2. Discrete subgroups of locally compact groups. We collect some important, albeit easy facts used in the proof of the main result.
Lemma 3.3 (cf. [21, 2.C]). Let ฮ < G be a lattice in an lcsc group. Let U < G be
an open subgroup. Then ฮ โฉ U is a lattice in U .
Lemma 3.4 ([59, Theorem 1.13 on p. 23]). Let G be an lcsc group and N โณ G a
normal closed subgroup. The projection of a lattice ฮ < G to G/N is discrete if
and only if ฮ โฉ N is a lattice in N . If so, then the projection of ฮ to G/N is also
a lattice.
The following statement is our main source of commensurated subgroups.
Lemma 3.5. Let G be an lcsc group and U < G be a compact open subgroup.
Then U is commensurated by G. For any subgroup ฮ < G the intersection ฮ โฉ U
is commensurated in ฮ.
Proof. For any g โ G, U โฉ gU g โ1 is an open subgroup of the compact group U
(resp. in gU g โ1 ), hence it has finite index in U (resp. in gU g โ1 ). The second
statement follows by taking g โ ฮ and taking intersections with ฮ.
Lemma 3.6. Any lattice envelope of a finitely generated group is compactly generated.
Proof. Let ฮ < G be a lattice in an lcsc group, and let ฮ be generated by a finite set
F โ ฮ. Let V โ G be an open neighborhood of the identity with compact closure.
We claim that the compact set K = V โช F generates a subgroup Gโฒ of finite index
in G. Indeed, Gโฒ contains the group generated by V , hence Gโฒ is open. Thus G/Gโฒ
is a countable discrete space. But ฮ โ Gโฒ , hence G/Gโฒ is finite. Hence by adding
a finite set to K one obtains a compact generating set for G.
LATTICE ENVELOPES
13
3.3. Closed subgroups of finite covolume. The notion of a lattice, that is a
discrete subgroup of finite covolume, can be generalized to closed, but not necessarily discrete, subgroups as follows. A closed subgroup H < G of an lcsc group G is
said to have finite covolume in G if G/H carries a finite G-invariant Borel measure.
If H has finite covolume in G, then G is unimodular if and only if H is unimodular [59, Lemma 1.4 on p. 18].
Lemma 3.7 ([59, Lemma 1.6 on p. 20]). Let G be an lcsc group, and H < L < G
closed subgroups. Then H < G has finite covolume if and only if both L < G and
H < L have finite covolumes.
It is well known that a torsion-free lattice in a tdlc group is uniform. A mild
generalization is given by the following.
Lemma 3.8 ([2, Corollary 4.11]). Let G be a unimodular tdlc group. Let H < G
be a closed subgroup of finite covolume. Let mH be the Haar measure of H. If there
is an upper bound on the Haar measures of compact open subgroups in H, i.e.
sup mH (U ) | U is a compact open subgroup in H < โ,
then G/H is compact.
Lemma 3.9. Let G be a connected, semi-simple, center-free, real Lie group without
compact factors. Every closed subgroup H < G of finite covolume has the form
H = โ ร G2 , where G2 is a direct factor of G, G = G1 ร G2 , and โ < G1 is a
lattice.
Proof. The Lie algebra h of the connected component H 0 is Ad(H)-invariant. Since
H is Zariski dense in G by Borelโs density theorem [10], it follows that h is an ideal
in the semisimple Lie algebra g of G. Let
g = g1 โ ยท ยท ยท โ gn
be the decomposition into simple Lie algebras. Let
I1 = {i โ {1, . . . , n} | gi โฉ h = {0}},
and let I2 = {1, . . . , n}\I1 . Then G = G1 ร G2 with Gk being the Lie subgroup
with Lie algebra
M
gi .
iโIk
Since gi is simple we either have gi โฉ h = {0} or gi โฉ h = gi . This implies H =
(G1 ร {1} โฉ H) ร G2 where โ := G1 ร {1} โฉ H is discrete. Since H has finite
covolume, โ is a lattice.
3.4. The amenable radical.
Definition 3.10. The amenable radical of an lcsc group G is the maximal closed
normal amenable subgroup. We denote it by Radam (G) โณ G.
Lemma 3.11. Let G be an lcsc group, and let H < G be a closed subgroup of finite
covolume. Then Radam (H) = Radam (G) โฉ H.
This lemma can be deduced from the following result.
14
URI BADER, ALEX FURMAN, AND ROMAN SAUER
Lemma 3.12 (Furstenberg [35]). Let G be an lcsc group and G y M a continuous
action that is minimal and strongly proximal. Let H < G be a closed subgroup of
finite covolume. Then the restriction of the G-action to H is also minimal and
strongly proximal.
In [35] Furstenberg was interested in the restriction to lattices, but the proof
applies to general closed subgroups of finite covolume.
Proof of Lemma 3.11 from Lemma 3.12. The very definition of Radam (G) yields
the inclusion
Radam (G) โฉ H < Radam (H).
For the converse inclusion, we use an equivalent characterization of the amenable
radical as the common kernel of all minimal, strongly proximal actions on compact
metrizable spaces [34, Proposition 7]. Thus for the converse inclusion it suffices
to show that given an arbitrary minimal and strongly proximal G-action G โ
Homeo(M ), its restriction to H is also minimal and strongly proximal, because
it would show that Radam (H) acts trivially in every minimal strongly proximal
G-action, which is the content of Lemma 3.12.
3.5. (Outer) automorphism groups. We describe various results about groups
of automorphisms and groups of outer automorphisms of certain groups. We are
confident that the main result of this section, Theorem 3.13, is known to experts,
but it does not seem to be in the literature in the appropriate generality.
Theorem 3.13. Let K1 , . . . , Kn be number fields, and let Hi be connected, noncommutative, adjoint, absolutely simple Ki -groups. Let Si โ Vi be finite compatible
sets of places of Ki as in ยง4.1. Then any group that is (abstractly) commensurable
with
n
Y
Hi (Oi [Si ])
i=1
has a finite outer automorphism group.
The proof of Theorem 3.13 will be given by the end of this subsection. This
theorem will be used in ยง5 together with Lemma 3.14 to split certain extensions of
groups.
For a subgroup B < A of a group A, let Aut(A), AutB (A), and Out(A) denote
the automorphism group of A, the subgroup of Aut(A) preserving B set-wise, and
the outer automorphism group of A. For a ฯ-compact lcsc group G we denote the
group of continuous automorphisms by Autc (G) and the group of continuous outer
automorphisms by Outc (G) = Autc (G)/G. Note that a continuous automorphism
of G is a homeomorphism by the open mapping theorem [12, IX. ยง5.3].
We begin by quoting two auxiliary results which are elementary.
Lemma 3.14 ([16, Corollary (6.8) and Exercise 1 on p. 106]). Let B โณ A be a
normal subgroup in a group A. Assume that B has trivial center. Then the right
hand square in the commutative diagram
B
A
A/B
ฯ
B
Aut(B)
Out(B)
LATTICE ENVELOPES
15
whose rows are exact and whose vertical homomorphisms are induced by conjugation
is a pullback diagram of groups. Thus, if ฯ is trivial, then the group extension
B ึโ A ึ A/B splits as a direct product.
Lemma 3.15 ([72]). Let B โณ A be a normal subgroup in a group A. Let C be the
center of B. Then the sequence of groups
(3.1)
j
ฯ
1 โ Z 1 (A/B; C) โ
โ AutB (A) โ
โ Aut(B) ร Aut(A/B)
is exact. Here the left group is the abelian group of 1-cocycles of A/B in C, j maps
a cocycle c to a 7โ c([a])a, and ฯ(f ) = (f |B , [f ]).
The following three results are immediate consequences of Lemma 3.15.
Lemma 3.16. Every topological automorphism of a product G = G0 ร Gtd of a
center-free connected group G0 and a tdlc group Gtd is a product of a topological
automorphism of G0 and a topological automorphism of Gtd .
Proof. We apply Lemma 3.15 to A = G and B = G0 . In this situation the map
ฯ in (3.1) has an obvious right inverse s. Both ฯ and s preserve continuity of
automorphisms. Let ฮฑ : G โ G be a continuous automorphism. Then ฮฑ(G0 ) = G0 .
Since G0 has trivial center, ฯ is injective. So ฮฑ = s(ฯ(ฮฑ)).
Lemma 3.17. Let A be a group, and let B โณ A be a characteristic subgroup of finite
index. If B has a finite center, then the restriction map Aut(A) โ Aut(B) has a
finite kernel.
Proof. Denote by K the kernel of Aut(A) = AutB (A) โ Aut(B) and by C the
center of B. Since Aut(A/B) is finite, it is enough to show that the kernel K โฒ of
K โ Aut(A/B) is finite. By Lemma 3.15, K โฒ is isomorphic to Z 1 (A/B; C) which
is finite since A/B and C are finite.
Corollary 3.18. If a group A has a characteristic subgroup of finite index that
has a finite center and a finite outer automorphism group, then also A has a finite
outer automorphism group.
Proof. Let B โณ A be characteristic with finite center and finite outer automorphism
group. Since the group Aut(A)/B surjects onto Aut(A)/A = Out(A), it is enough
to show that the former is finite. This follows by the exactness of
1 โ ker Aut(A) โ Aut(B) โ Aut(A)/B โ Out(B),
as Out(B) is finite by assumption, and the kernel is finite by Lemma 3.17.
For the purposes of this subsection, we introduce the following definition.
Definition 3.19. A group A is said to be strongly irreducible if for every homomorphism ฯ : B1 ร B2 โ A with finite cokernel, either B1 < ker ฯ or B2 < ker ฯ.
A group is said to be strongly outer finite if the outer automorphism group of
any of its finite index subgroups is finite.
Lemma 3.20. A Zariski dense subgroup of the K-points of a connected, noncommutative, adjoint, K-simple K-algebraic group is strongly irreducible.
Proof. Let H be a connected, non-commutative, adjoint, K-simple K-group, and
let ฮ < H(K) be a Zariski dense subgroup.
16
URI BADER, ALEX FURMAN, AND ROMAN SAUER
Let ฯ : B1 ร B2 โ ฮ be a homomorphism with finite cokernel. Since ฮ < H(K)
is Zariski dense, the Zariski closure of im(ฯ) has to be H as a finite index subgroup
of the connected group H. The Zariski closure of ฯ(Bi ) define K-subgroups Hi ,
i โ {1, 2} that commute in H and together generate H. By the simplicity of H we
conclude that for some i โ {1, 2}, Hi is trivial. It follows that Bi < ker ฯ.
Theorem 3.21. Let B be a group that is (abstractly) commensurable to a product of
a finite family of finitely generated, strongly irreducible, strongly outer finite groups.
Then B has a finite outer automorphism group.
The proof of Theorem 3.21 will be preceded by some preparation. First we make
the following ad-hoc definition, which is not standard.
Q
Definition Q
3.22. A standard subgroup of a product iโI Ai of groups is a subgroup
of the form iโI Bi with each Bi < Ai being a finite index subgroup.
Lemma 3.23. Let (Ai )iโI be a finite family of strongly irreducible groups, and let
(Bj )jโJ be a finite family of non-trivial groups with |J| โฅ |I|. If
Y
ฯ Y
โ
Bj โ
Ai
jโJ
iโI
is a monomorphism with finite cokernel, then there are a bijection f : J โ I and,
for each j โ J, a monomorphism ฯj : Bj โ Af (j) with finite cokernel such that ฯ is
the product of the maps ฯj . In particular, the image im(ฯ) is a standard subgroup.
Proof. Let A and B be the product of (Ai )iโI and (Bj )jโJ , respectively. The proof
is by induction on |I|. If |I| = 1, there is nothing to prove. Let |I| > 1. Then
|J| > 1, and
Qwe can decompose it non-trivially as J = J1 โช J2 . For k โ {1, 2} we
set B (k) = jโJk Bj . We let
Y
Ik = {i โ I | B2โk < ker ฯi } and A(k) =
Ai ,
iโIk
where ฯi : A โ Ai is the i-th projection. By the strong irreducibility of the Ai โs, I =
I1 โช I2 is a partition. Hence the composition of ฯ : B โ A with the projection A โ
A(k) factors through B (k) โผ
= B/B (2โk) , thus giving a homomorphism ฯk : B (k) โ
(k)
A . We observe that these ฯk are injective homomorphisms with finite cokernels.
Without loss of generality, |I1 | โค |J1 |. By induction hypothesis, |I1 | = |J1 | and
therefore |I2 | โค |J2 |. Applying the induction hypothesis to both ฯk , the statement
follows.
Applying Lemma 3.23 to automorphisms ฯ, we obtain the following.
Corollary 3.24. Let (Ci )iโI be a finite family of strongly irreducible groups. Then
the obvious embedding
Y
Y
Aut(Ci ) โ Aut
Ci
iโI
iโI
has a finite cokernel.
Lemma 3.25. Let (Ai )iโI be a finite family of strongly irreducible
Q groups, and let
A be its product. Let B < A be a subgroup of finite index. Then iโI (B โฉ Ai ) is a
characteristic subgroup of B of finite index.
LATTICE ENVELOPES
17
Proof. Let us call a subgroup of B that is simultaneously a standard subgroup of A
a substandard subgroup.
By Lemma 3.23, every ฯ โ Aut(B) preserves substandard
Q
subgroups. Hence iโI (B โฉ Ai ) is characteristic in B as it is the unique maximal
element in the collection of substandard subgroups.
Proof of Theorem 3.21. By assumption, B has a finite index subgroup C โฒ < B that
is isomorphic to a finite index subgroup of the product A of a finite family (Ai )iโI
of finitely generated, strongly irreducible, strongly outer finite groups. From now
on we will identify C โฒ and its various subgroups with their images in A under
this isomorphism. As each Ai is finitely generated, A, C โฒ , and thus B are finitely
generated too. Thus C โฒ has a finite index subgroup C โฒโฒ that is characteristic in B
(e.g. the intersection of all subgroups of B with index [B : C โฒ ]). By Lemma 3.25
C โฒโฒ has
Q a characteristic subgroup C of finite index which is standard in A. That is,
C = iโI Ci , where Ci < Ai are of finite index. Strongly irreducibility passes to
finite index subgroups. So each Ci is strongly irreducible. Being characteristic is
transitive, so C is characteristic in B.
Q
By Corollary 3.24, the obvious embedding iโI Aut(Ci ) โ Aut(C) has a finite
cokernel. By the strong outer finite assumption, Out(Ci ) is finite for each i โ I.
Hence Out(C) is finite. By the strong irreducibility assumption C has a finite
center. Thus, Corollary 3.18 implies that Out(B) is finite.
The following proposition is well known.
Proposition 3.26. Let K be a number field, and let H be non-commutative, connected, adjoint, absolutely simple
Q K-group. Let S โ V be a finite compatible set of
places of K as in ยง4.1. Then ฮฝโS H(Kฮฝ ) has a finite group of continuous outer
automorphisms.
Proof. By Lemma 3.20 each group H(Kฮฝ ) is strongly irreducible. By Corollary 3.24,
the natural embedding
Y
Y
j
Aut(H(Kฮฝ )) โ
โ Aut(
H(Kฮฝ ))
ฮฝโS
ฮฝโS
has a finite cokernel. Further, if f โ im(j) is a continuous automorphism then f is
a product of continuous automorphisms. This implies that the restriction of j
Y
Y
Autc (H(Kฮฝ )) โ Autc (
H(Kฮฝ ))
ฮฝโS
ฮฝโS
has a finite cokernel, too. It is thus enough to show that Outc (H(Kฮฝ )) is finite
for every ฮฝ โ S. Since every continuous field automorphism of Kฮฝ is trivial on the
closure of Q over which Kฮฝ is finite, the field Kฮฝ has a finite group of continuous
field automorphisms. Moreover, the group H has a finite group of algebraic outer
automorphisms, given by Dynkin diagram automorphisms. Thus, Outc (H(Kฮฝ )) is
indeed finite by [47, Chapter I, 1.8.2(IV)].
Proposition 3.27. Let K be a number field, and let H be a non-commutative,
connected, adjoint, absolutely simple K-group. Let S โ V be a finite compatible set
of places of K as in ยง4.1. Then H(O[S]) is finitely generated, strongly irreducible
and strongly outer finite.
18
URI BADER, ALEX FURMAN, AND ROMAN SAUER
Proof. By [47, Chapter IX, Theorem 3.2] H(O[S]) is finitely generated, and by
Lemma 3.20 H(O[S]) is strongly irreducible. We are left to prove that H(O[S]) is
strongly outer finite. To this end, consider a subgroup
ฮ < H(O[S]) of finite index.
Q
The group ฮ is an irreducible lattice in H = ฮฝโS H(Kฮฝ ). Let A = Autc (H).
The conjugation homomorphism H โ A is injective as H is center-free and has a
finite cokernel by Proposition 3.26. Then ฮ ึโ A embeds as a lattice. We claim:
(1) The normalizer N = NA (ฮ) of ฮ in A is discrete in A.
(2) The conjugation action N โ Aut(ฮ) is an isomorphism.
Let us first conclude the finiteness of Out(ฮ) from (1) and (2). Since N contains
the lattice ฮ and N is discrete in A, N < A is also a lattice. Hence [N : ฮ] < โ.
By (2), Out(ฮ) is isomorphic to N/ฮ, hence finite.
Regarding (1), discreteness will follow once we show that N is countable because
N < A is closed. Since ฮ is finitely generated, Aut(ฮ) is countable. Hence N/ZA (ฮ)
is countable, where ZA (ฮ) denotes the centralizer of ฮ in A. Each factor of H is
center-free, so ZH (ฮ) is trivial by the density of the projection of ฮ in each factor.
Since H < A is of finite index, ZA (ฮ) is finite, and the countability of N follows.
To verify (2), it is enough to show that every automorphism of ฮ induces a
continuous automorphism of H. This is a consequence of the Mostow-Prasad strong
rigidity theorem for H [47, Theorem VII 7.1].
Proof of Theorem 3.13. By Proposition 3.27 the groups Hi (Oi [Si ]) are finitely generated, strongly irreducible and strongly outer finite. Thus the proof follows at once
from Theorem 3.21.
Finally, we need a classical result from the work of Tits and Borel-Tits.
Theorem 3.28. Let K be a number field, and let ฮฝ a finite place of K. Let H be
a non-commutative, connected, adjoint, absolutely simple K-group of Kฮฝ -rank โฅ 2.
Then the automorphism group of the Bruhat-Tits building associated to H and ฮฝ
contains H(Kฮฝ )+ as a subgroup of finite index.
Proof. In higher rank the automorphism group of the associated Bruhat-Tits building X is isomorphic to Aut(H)(Kฮฝ ) which is isomorphic to an extension of the group
Aut(H(Kฮฝ )) of algebraic automorphisms over Kฮฝ by a subgroup of field automorphisms of Kฮฝ . This follows from the results in [69]. See [3, Proposition C.1] for
an elaboration. The group Aut(H(Kฮฝ )) contains H(Kฮฝ )+ as a subgroup of finite
index, and Kฮฝ has only finitely many field automorphisms since every field automorphism is continuous [66] and trivial on the closure of the rationals over which
Kฮฝ is finite. This implies the statement.
3.6. Quasi-isometries of locally compact groups. Recall that a map between
metric spaces f : (X, dX ) โ (Y, dY ) is an (L, C)-quasi-isometry if
1
ยท dX (x, xโฒ ) โ C < dY (f (x), f (xโฒ )) < L ยท dX (x, xโฒ ) + C
L
for all x, xโฒ โ X and for every y โ Y there is x โ X so that dY (y, f (x)) < C. Two
maps f, g : (X, dX ) โ (Y, dY ) have bounded distance if
sup dY (f (x), g(x)) < โ.
xโX
The quasi-isometry group QI(X, dX ) of (X, dX ) is the group (under composition) of
equivalence classes of quasi-isometries (X, dX ) โ (X, dX ) under bounded distance.
LATTICE ENVELOPES
19
Lemma 3.29. Let G be an lcsc group containing a closed subgroup H < G such that
G/H is compact, the projection G โ H\G has locally a continuous cross-section,
and H is compactly generated. Let H โ Isom(X, d) be a properly discontinuous
cocompact action on some proper geodesic metric space (X, d). Then the natural
homomorphism
ฯ : H โ Isom(X, d) โ QI(X, d)
extends to a homomorphism ฯฬ : G โ QI(X, d) with the following property. There
exist constants L, C > 0 so that each ฯฬ(g), g โ G, is represented by a (L, C)quasi-isometry fg : X โ X such that for every bounded set B โ X there is a
neighbourhood of the identity V โ G with
โgโV โxโB d(fg (x), x) โค C.
(3.2)
Remark 3.30. The projection G โ H\G of an lcsc group G to the coset space
of a closed subgroup H < G has locally a continuous cross-section if G is finitedimensional with respect to covering dimension [40, Theorem 2]. Tdlc groups,
which are the ones we will apply Lemma 3.29 to, are zero-dimensional.
Proof of Lemma 3.29. Since H is compactly generated, and H\G is compact, G is
also compactly generated. Thus G and H possess left-invariant word metrics that
are unique up to quasi-isometry. The inclusion j : H โ G is a quasi-isometry. We
construct a quasi-inverse j โฒ : G โ H of j, which is unique up to bounded distance,
in the following way.
Let pr : G โ H\G be the projection. Let s : U0 โ G be a local continuous crosssection of pr defined on some compact neighbourhood U0 โ H\G of H1 such that
s(H1) = 1. We can extend s to a global cross-section s : H\G โ G with relatively
compact image s(H\G), which is not necessarily continuous. Then
j โฒ : G โ H, g 7โ g ยท s(pr(g))โ1
is a quasi-inverse of j.
The assignment f 7โ j โฆ f โฆ j โฒ yields an isomorphism jโ : QI(H) โ QI(G).
Let x0 โ X. By the Sฬvarc-Milnor theorem the map h โ hx0 is a quasi-isometry
f : H โ X. We pick a quasi-inverse f โฒ : X โ H of f . Similarly, we obtain an
isomorphism fโ : QI(H) โ QI(X). Let H โ QI(H) be the homomorphism that
sends a group element to its left translation. Similarly, G โ QI(G).
It is easy to see that the map ฯ coincides with the composition
fโ
H โ QI(H) โโ QI(X).
We define ฯฬ to be the composition
j โ1
fโ
โ
G โ QI(G) โโ
โ QI(H) โโ QI(X).
Clearly, ฯฬ extends ฯ. Let lgG : G โ G denote left translation by g โ G in G.
Similarly, let lhH : H โ H be left translation by h โ H. Then ฯฬ(g) is represented
by the quasi-isometry
fg := f โฆ j โฒ โฆ lgG โฆ j โฆ f โฒ .
Clearly, there are constants C, L > 0 only depending on j, j โฒ , f , and f โฒ such that
fg is a (L, C)-quasi-isometry.
Let B โ X be a bounded subset. Let
D := sup d x, f (f โฒ (x)) = sup d x, f โฒ (x)x0 < โ.
xโX
xโX
20
URI BADER, ALEX FURMAN, AND ROMAN SAUER
The set
f โฒ (x) | x โ B โ H
is bounded, thus relatively compact. Let K โ H be its closure. The continuous
map
H ร G โ H\G, (h, g) 7โ pr(gh)
sends H ร {1} to H1. By continuity and compactness of K there is an identity
neighbourhood V0 โ G such that K ร V0 is mapped to U0 โ H\G. Then the
function
ฯ : K ร V0 โ R, (h, g) 7โ d ghs(pr(gh))โ1 x0 , hx0
is continuous and maps K ร {1} to 0. By continuity and compactness of K there
is an identity neighborhood V โ V0 such that ฯ(K ร V ) โ [0, 1].
Now let x โ B and g โ V . Let h = f โฒ (x) โ K. Then
d fg (x), x = d f (j โฒ (gj(f โฒ (x)))), x) = d j โฒ (gf โฒ (x))x0 , x)
โค d j โฒ (gh)x0 , hx0 ) + D
= d ghs(pr(gh))โ1 x0 , hx0 ) + D
โค D + 1.
Upon replacing the constant C by max{C, D + 1}, the statement follows.
4. Arithmetic lattices, tree extensions, and the arithmetic core
In ยง4.1 we introduce the notion of tree extensions of S-arithmetic lattices, which
appears in our main result, Theorem A. In ยง5 we discuss an arithmeticity result for
lattices in a product of a semisimple Lie group and a tdlc group, which identifies
the second case in Theorem A.
4.1. Arithmetic lattices and tree extensions.
Setup 4.1. Let K be a number field, O its ring of integers, and let H be a connected, noncommutative, absolutely simple adjoint K-group. Let V be the set of
inequivalent valuations (places) of K, let V โ denote the archimedean ones, and
V fin = V โ V โ the non-archimedean ones (finite places). For ฮฝ โ V we denote by
Kฮฝ the completion of K with respect to ฮฝ; it is a local field. Let S โ V be a finite
subset of places that is compatible with H in the sense of [6]. Explicitly, this means
the following:
(1) For every ฮฝ โ S, H is Kฮฝ -isotropic.
(2) S contains all ฮฝ โ V โ for which H is Kฮฝ -isotropic.
(3) S contains at least one finite and one infinite place.
Let S โ = S โฉ V โ and S fin = S โฉ V fin . Let O[S] โ K be the ring of S-integers.
For ฮฝ โ V let H(Kฮฝ )+ < H(Kฮฝ ) be the normal subgroup as defined in [11,
Section 6]. If Kฮฝ is perfect, which is the case in our situation, then H(Kฮฝ )+ is the
subgroup generated by all unipotent elements and it has finite index in H(Kฮฝ ). If
ฮฝ โ V โ , then H(Kฮฝ )+ is just the connected component of the identity in the real
Lie group H(Kฮฝ ). Define
Y
Y
HK,S :=
H(Kฮฝ )
H+
H(Kฮฝ )+ .
K,S :=
ฮฝโS
The quotient
HK,S /H+
K,S
is finite.
ฮฝโS
LATTICE ENVELOPES
21
By reduction theory after Borel and Harish-Chandra the diagonal embedding
realizes H(O[S]) is a lattice in HK,S . Note that
HK,S = HK,S โ ร HK,S fin
is the splitting into a semi-simple real Lie group and a totally disconnected locally
compact group. We thus make the following remark.
Remark 4.2. If S is finite set of places compatible with H, then H(O[S]) is a
lattice in a product of at least two lcsc group, one of them being a Lie group and
one of them being a tdlc group.
We now exhibit a generalization of the previous type of lattices.
Definition 4.3. Let S be finite. Let S1fin denote the finite places ฮฝ โ S fin such that
the Kฮฝ -rank of H is 1; denote by Tฮฝ the associated Bruhat-Tits tree and by Aut(Tฮฝ )
the tdlc group of automorphisms of this simplicial tree. Any closed intermediate
group
Y
Y
Y
H+
Aut(Tฮฝ )
H(Kยต ) ร
H(Kฮฝ )+ < H โ <
K,S =
ฮฝโS
ยตโSโS1fin
ฮฝโS1fin
is called a tree extension of HK,S .
Q
+
โ
Since H+
K,S =
ฮฝโS H(Kฮฝ ) < H is cocompact, the inclusion of a subgroup
commensurable to H(O[S]) into a tree extension of HK,S is a lattice embedding by
Lemma 3.7.
Remark 4.4. Denote by Xฮฝ the Bruhat-Tits buildings or the symmetric space of
+
H(Kฮฝ ). For ฮฝ โ S โ S1fin the group Isom(X
Q ฮฝ ) contains H(Kฮฝ ) as a subgroup of
finite index
Q by Theorem 3.28. Further, ฮฝโS Isom(Xฮฝ ) is a finite index subgroup
of Isom( ฮฝโS Xฮฝ ). This follows from [15, Proposition I.5.3(4) on p. 56]. Thus any
closed intermediate subgroup
Y
โ
H+
Xฮฝ ).
K,S < H < Isom(
ฮฝโS
is, up to passing to a finite index subgroup, a tree extension of HK,S .
4.2. Arithmetic core theorem. Next we state an arithmeticity result for lattices
in products that provides a key step in the proof of Theorem A.
Theorem 4.5 (Arithmetic Core Theorem).
Let H be a connected, center-free, semi-simple, real Lie group without compact
factors, D be a tdlc group and ฮ < H ร D be a lattice. Assume that
(1) the projection ฮ โ D has a dense image,
(2) the projection ฮ โ H has a dense image,
(3) the projection ฮ โ H is injective,
(4) D is compactly generated.
Then there exist number fields K1 , . . . , Kn , connected, non-commutative, adjoint,
absolutely simple Ki -groups Hi , finite sets Si โ Vi of places of Ki compatible with
Hi as in ยง4.1 with the following properties: There is a topological isomorphism
Hโผ
=
n
Y
(Hi )0Ki ,Siโ
i=1
22
URI BADER, ALEX FURMAN, AND ROMAN SAUER
and a continuous epimorphism D ึ Q with compact kernel such that Q is a closed
intermediate subgroup
n
n
Y
Y
(Hi )Ki ,Sifin
(Hi )+
<
Q
<
fin
K ,S
i
i=1
i
i=1
and the image of ฮ in H ร Q is commensurable with the image of
n
n
n
Y
Y
Y
(Hi )Ki ,Sifin .
(Hi )Ki ,Siโ ร
Hi (Oi [Si ]) โโ
i=1
i=1
i=1
This result is quite close to Theorem 5.20 in the paper [23] of Caprace and
Monod. In fact, if H is assumed to be simple instead of semi-simple, Theorem 4.5
is essentially their theorem. In our companion paper [6] we prove Theorem 4.5
deducing it from a more general statement, in which D is not assumed to be compactly generated. In this more general case the sets Si of places of Ki might be
infinite, and the gap between H+
K,S and HK,S becomes large.
In the current paper we use the above arithmetic core theorem 4.5 in ยง5, Step 3,
case (iii). At this point in the proof we do not know yet that ฮ (called ฮ3 there) is
finitely generated, but do know compact generation of D (called Gtd
3 there) inherited
from the compact generation assumption on G.
For readerโs convenience we sketch the idea of the proof of Theorem 4.5 as it
appears in [6]. Apart from step (1) below our approach differs from that taken
by Caprace and Monod in [23]. In the following sketch we ignore some important
details for the sake of transparency.
(1) Choose a compact open subgroup U < D, and observe that the projection
โ of ฮU := ฮ โฉ (H ร U ) to H is a lattice in H, commensurated by the
projection of all of ฮ to H.
If โ is irreducible, Margulisโ commensurator super-rigidity and arithmeticity theorems provide a number field K and a simple K-algebraic group
H, so that the semi-simple real Lie group H is isogenous to HK,S โ and
โ is commensurable to the arithmetic lattice H(O); here S โ is the set of
infinite places ฮฝ โ V โ for which H(Kฮฝ ) is non-compact. If โ is reducible,
it is commensurable to a product
โ1 ร ยท ยท ยท ร โn < H1 ร ยท ยท ยท ร Hn
where โi < Hi are irreducible lattice, leading to fields Ki and Ki -simple
groups Hi , i = 1, . . . , n. For clarity we continue with n = 1 case.
(2) We now view ฮ as a subgroup of the commensurator CommenH (H(O)) of
the arithmetic lattice H(O) โ โ. If one glosses over the difference between
the simply-connected and adjoint forms of H (such as SLd and PGLd ) then
the above commensurator is the subgroup of rational points H(K), and
therefore ฮ < H(K). Define S fin to be the set of those non-archimedean
places ฮฝ โ V fin for which the image of ฮ in H(Kฮฝ ) is unbounded. (For
example, for SLd (Z) < ฮ < PSL(Q) the set S fin would consist of primes
p that appear with arbitrarily high powers in denominators of entries of
ฮณ โ ฮ). Then ฮ is commensurable to a subgroup of H(O[S]).
(3) For ฮฝ โ S fin the image of ฮ in the tdlc group H(Kฮฝ ) is not precompact. It
can be showed using Howe-Mooreโs theorem (alternatively, use [58]) that
this implies that the image of ฮ is dense in (an open subgroup of finite
LATTICE ENVELOPES
23
index in) H(Kฮฝ ). One can even show that the image of ฮ is dense in (an
open subgroup of finite index in) HK,S fin .
(4) One now considers the closure L of the diagonal imbedding of ฮ in D ร
HK,S fin . Using the fact that the projections to both factors are dense and
that the closure of โ โ H(O) in both projections is open compact, one
shows that L is a graph of a continuous epimorphism D โ HK,S fin with
compact kernel.
(5) Finally, the fact that ฮ < HรD is a lattice, implies that its image, contained
in the S-arithmetic lattice H(O[S]), is a lattice in H ร HK,S fin โ HK,S .
Thus ฮ โ H(O[S]).
If D is compactly generated, then so is HK,S fin , which implies that S fin
(hence also all of S) is finite. It also follows that ฮ is finitely generated.
5. Proof of Theorem A
The starting point of the proof of Theorem A is a consequence of Hilbertโs 5th
problem which was observed by Burger-Monod [17, Theorem 3.3.3].
Theorem 5.1. Every locally compact group H contains an open, normal, finite
index subgroup H โฒ containing Radam (H) such that the quotient H โฒ / Radam (H) is
isomorphic to a direct product of a connected, center-free, semi-simple, real Lie
group without compact factors and a tdlc group with trivial amenable radical.
Step 1. Reduction to a lattice in a product. It is only the very first step of
the proof where we shall take advantage of property (CAF).
Theorem 5.2. The amenable radical of a lattice envelope of a group with property (CAF) is compact.
Proof. Let Gโฒ < G be an open, normal, finite index subgroup so that
G1 := Gโฒ / Radam (G) โผ
= Gss ร Gtd
1
1
Gss
1
as in Theorem 5.1, namely
is a connected, center-free, semi-simple, real Lie
td
group without compact factors, and Gtd
1 is a tdlc group with Radam (G1 ) = {1}.
td
Pick a compact open subgroup U < G1 . We consider the following commutative
diagram:
=:A
}|
{
z
ฮ โฉ pโ1
(j({1}
ร
U
))
G
pโ1
G (j({1} ร U ))
ฮ
G
ฮ โฉ Gโฒ
Gโฒ
pG
pGโฒ
j({1} ร U )
G/ Radam (G)
Gโฒ / Radam (G)
j
โผ
=
td
Gss
1 ร G1
The arrows are the obvious inclusions and projections. Moreover, j is defined by
requiring commutativity.
First we show that A is commensurated by ฮ which is equivalent to j({1}รU ) being commensurated by G/ Radam (G) by Lemma 2.3. Let g โ G/ Radam (G). Since
Gโฒ is normal in G and thus Gโฒ / Radam (G) is normal G/ Radam (G), conjugation by
24
URI BADER, ALEX FURMAN, AND ROMAN SAUER
td โผ
ss
td
g is a continuous automorphism of j(Gss
1 ร G1 ) = G1 ร G1 . By Lemma 3.16
ss
ss
this automorphism is the product of continuous automorphisms css
g : G1 โ G1 and
td
td
td
td
cg : G1 โ G1 . Hence conjugation by g maps j({1} ร U ) to j({1} ร cg (U )). Since
td
td
the subgroup ctd
g (U ) < G1 is open and compact, the intersection cg (U ) โฉ U has
finite index in U . This implies that j({1} ร U ) is commensurated by G/ Radam (G)
from which we conclude that A is commensurated by ฮ.
Let GโฒU < Gโฒ be the preimage of Gss
1 ร U under pGโฒ , and let
pGโฒ
ss
K := ker GโฒU โโ
โ Gss
1 ร U โ G1 .
The group K is an extension of the amenable group Radam (G) by the compact group
U . Hence K is amenable. The group ฮ โฉ GโฒU is a lattice in GโฒU by Lemma 3.3.
We now invoke a deep result of Breuillard and Gelander [13, ยง9]. It follows
from [13, Theorem 9.5] and K being a closed amenable subgroup that the projection
of the lattice ฮ โฉ GโฒU in GโฒU /K is discrete. The result of Breuillard and Gelander
is a generalization of Auslanderโs theorem where K is a solvable Lie group.
By Lemma 3.4, the group
โฒ
A = ฮ โฉ pโ1
Gโฒ (j({1} ร U )) = K โฉ (ฮ โฉ GU )
โ1
is a lattice in K, thus is amenable. Note that we used pโ1
G (j({1}รU )) = pGโฒ (j({1}ร
U )) here which follows from the diagram. On the other hand A is commensurated
by ฮ and hence finite. This implies that K and its closed subgroup Radam (G) are
compact.
Let us summarize the situation after the first step:
Proposition 5.3. Let ฮ have property (CAF), and let ฮ < G be a lattice embedding.
Then the amenable radical K := Radam (G) of G is compact. By passing to an open
normal finite index subgroup Gโฒ < G containing K and to the finite index subgroup
ฮโฒ := ฮ โฉ Gโฒ < ฮ and taking quotients by compact or finite normal subgroups
G1 = Gโฒ /K and ฮ1 := ฮโฒ /(ฮโฒ โฉ K) one obtains a lattice embedding
td
ฮ1 < G1 = Gss
1 ร G1 ,
virtually isomorphic to ฮ < G, into a product of a connected, center free, semisimple real Lie group without compact factors Gss
1 and a tdlc group with trivial
td
amenable radical Gtd
1 . Furthermore, G is compactly generated if and only if G1 is
compactly generated.
Step 2: Projection to the semi-simple factor is irreducible.
td
Let ฮ1 < G1 = Gss
1 ร G1 be a lattice in a product as in Proposition 5.3. Since
compact generation of G is assumed in Theorem A, the group G1 is compactly
generated. The center-free, semi-simple, real Lie group Gss
1 splits as a direct product
of the simple factors:
Gss
1 = S1 ร ยท ยท ยท ร Sn .
For a subset J = {j1 , . . . , jk } โ {1, . . . , n} we denote by SJ = Sj1 ร ยท ยท ยท ร Sjk
the sub-product, which can be viewed both as a subgroup and as a factor of the
semi-simple group Gss
1 . Set Sโ
= {1}. Given a subset J โ {1, . . . , n} consider the
image of ฮ1 under the projection
prJ : G1 โโ Gss
1 โโ SJ .
LATTICE ENVELOPES
25
Note that it is possible that pr{i} (ฮ1 ) is dense in Si for each i โ {1, . . . , n}, but
prJ (ฮ1 ) is discrete for some non-empty proper subset J โ {1, . . . , n}.
Lemma 5.4. There is a unique maximal subset J โ {1, . . . , n} for which the
projection prJ (ฮ1 ) is discrete in SJ .
Proof. It suffices to show that the collection of all subsets J โ {1, . . . , n} with
discrete projection to SJ , is closed under union. Let J, K โ {1, . . . , n} be subsets
such that prJ (ฮ1 ) is discrete in SJ and prK (ฮ1 ) is discrete in SK . Let V โ SJ ,
W โ SK be open neighborhoods of the identity with
prJ (ฮ1 ) โฉ V = {1},
prK (ฮ1 ) โฉ W = {1}.
View SJโชK as a subgroup in SJ ร SK . Then U = SJโชK โฉ (V ร W ) is an open
neighborhood of the identity with prJโชK (ฮ1 ) โฉ U = {1}. Therefore prJโชK (ฮ1 ) is
discrete in SJโชK . This proves the claim.
Let J โ {1, . . . , n} be the maximal subset as in the claim. Denote
Y
Y
Si .
L = SJ =
Sj ,
H = SJ c =
jโJ
We have
Gss
1
iโJ
/
= L ร H, and consider the projection
prL : G1 = L ร H ร Gtd
1 โ L,
ฮ0 = prL (ฮ1 ).
Define ฮ2 to be the kernel of this projection
ฮ2 = Ker(prL : ฮ1 โโ ฮ0 ).
Then ฮ0 < L and ฮ2 < H ร Gtd
1 are lattices (Lemma 3.4). Consider the projections
p : H ร Gtd
1 โโ H,
td
q : H ร Gtd
1 โโ G1 .
Lemma 5.5. The projection p(ฮ2 ) of ฮ2 to H is dense.
Proof. Let H โฒ = p(ฮ2 ) be the closure of the projection of ฮ2 to H. Then H โฒ ร Gtd
1
โฒ
td
is a closed subgroup of H ร Gtd
1 containing the lattice ฮ2 . By Lemma 3.7, H ร G1
td
โฒ
is a closed subgroup of finite covolume in H ร G1 . It follows that H has finite
covolume in H. By Lemma 3.9 H โฒ has the form H โฒ = โ ร H2 , where H2 is a direct
factor of H, H = H1 ร H2 , and โ < H1 is a lattice. In our setting such a splitting
has to be trivial:
H โฒ = H2 = H,
H1 = โ = {1}.
ss
Indeed, otherwise the semi-simple group G1 splits as Gss
1 = (L ร H1 ) ร H2 , where
the projection of ฮ1 to the L ร H1 -factor lies in ฮ0 ร โ which is discrete. This
contradicts the maximality of L as such a factor. This completes the proof of the
lemma.
td
We now define an lcsc group G2 to be G2 = Gss
2 ร G2 , where
Gss
2 = H,
td
Gtd
2 = q(ฮ2 ) < G1 .
td
Being a closed subgroup of a tdlc group Gtd
1 , the group G2 itself is tdlc. The group
ss
G2 = H is a connected, center-free, semi-simple, real Lie group.
td
The group G2 is a closed subgroup of H ร Gtd
1 containing a lattice ฮ2 < H ร G1 .
td
By Lemma 3.7, ฮ2 forms a lattice in G2 , and G2 = H ร G2 is a finite covolume
td
td
subgroup of H ร Gtd
1 . Thus G2 is a subgroup of finite covolume in G1 . Since
26
URI BADER, ALEX FURMAN, AND ROMAN SAUER
td
Radam (Gtd
1 ) = {1} we deduce that Radam (G2 ) = {1} using Lemma 3.11. We
summarize:
td
Proposition 5.6. Let ฮ1 < G1 = Gss
1 ร G1 be as in Proposition 5.3. Then there
ss
td
is a splitting G1 = L ร H and a closed subgroup Gtd
2 < G1 such that by setting
ss
ss
td
G2 = H and G2 = G2 ร G2 we have:
(1)
(2)
(3)
(4)
(5)
(6)
(7)
The projection ฮ0 = prL (ฮ1 ) of ฮ1 is a lattice in L.
prL
td
The kernel ฮ2 = Ker(ฮ1 โโ
ฮ0 ) is a lattice in G2 = Gss
2 ร G2 .
ss
ss
The projection pr2 (ฮ2 ) is dense in G2 = H.
td
The projection prtd
2 (ฮ2 ) is dense in G2 .
td
td
G2 < G1 is a closed subgroup of finite covolume.
Gtd
2 has trivial amenable radical.
Gtd
2 is compactly generated.
Most of the conditions needed for an application of Theorem 4.5 are satisfied
with the exception of injectivity of the projection
ss
prss
2 : ฮ2 โโ G2 = H.
This is our next topic of concern.
Step 3. Identifying the lattice embedding.
We still denote the projections of G1 and G2 to their Lie and tdlc factors by
ss
prss
i : Gi โ Gi
td
and prtd
for i โ {1, 2}.
i : Gi โ Gi
td
The images of a subgroup in Gi under prss
i and pri will be indicated by superscripts
ss and td, respectively. For a subgroup H < G let
ZG (H) := {g โ G | โhโH gh = hg}
denote the centralizer of H in G.
td
Let U < Gtd
1 be a compact open subgroup in the tdlc group G1 such that
ฮ1 โฉ ({1} ร U ) = {1}. We define the following groups:
Ni := ฮi โฉ ({1} ร Gtd
i ) for i โ {1, 2},
M1 := ฮ1 โฉ (Gss
1 ร U ),
(5.1)
M2 := ฮ2 โฉ M1 ,
ฮ3 := ฮ2 /N2 ,
M3 := p(M2 ) where p : ฮ2 ึ ฮ3 is the projection,
ss
Gss
3 := G2 ,
td
td
Gtd
3 := G2 /N2 ,
td
G3 := Gss
3 ร G3 .
Remark 5.7. Since N2td is normalized by the dense image of ฮ2 in Gtd
2 and the
normalizer of a closed subgroup is closed, the subgroup N2td is normal in Gtd
2 . This
justifies the last definition. Moreover, since Gss
1 commutes with N2 it follows that
N2 is normal in G2 . Note that since compact generation passes to quotients, Gtd
3
is compactly generated.
Remark 5.8. At this point, we do not claim triviality of the amenable radical of
Gtd
3 , even though it will follow from later analysis.
Lemma 5.9. The group N1 commutes with some finite index subgroup of M1 .
LATTICE ENVELOPES
27
Proof. At this point we want to apply property (NbC) of the original group ฮ. Note
that property (NbC) does not pass to finite index subgroups in general, so we have
to argue more specifically. We refer to the notation of Proposition 5.3. Note that
ฮ1 = (ฮ โฉ Gโฒ )/(ฮ โฉ K) is a subgroup of ฮ/(ฮ โฉ K). We show that N1 is normal in
ฮ/(ฮ โฉ K) and M1 is commensurated by ฮ/(ฮ โฉ K). From this the claim follows
since ฮ/(ฮ โฉ K) has (NbC) by Lemma 2.5.
ss
The group {1} ร Gtd
1 is a topologically characteristic subgroup of G1 = G1 ร
td
โฒ
โฒ
td
G1 = G /K by Lemma 3.16. Since G /K < G/K is normal, {1} ร G1 is normal
in G/K. Since ฮ1 = (ฮ โฉ Gโฒ )/(ฮ โฉ K) is a normal subgroup of ฮ/(ฮ โฉ K), the group
โฒ
N1 is normal in ฮ/(ฮ โฉ K). The subgroup Gss
1 ร U < G1 = G /K is commensurated
โฒ
by G/K since G /K โณ G/K is normal and every (topological) automorphism of G1
ss
is a product of an automorphism of Gtd
1 and one of G1 by Lemma 3.16. Since
ฮ1 โณ ฮ/(ฮ โฉ K) is normal, M1 is commensurated by ฮ/(ฮ โฉ K).
By the previous lemma and upon making U smaller we may and will assume
that M1 itself centralizes N1 and M1 โฉ N1 = {1}. It follows that M2 centralizes
N2 . We record that
(5.2)
Mi โฉ Ni = {1} and [Mi , Ni ] = {1} for i โ {1, 2}.
In particular, the subgroup Mi Ni < ฮi is isomorphic to Mi ร Ni .
Lemma 5.10. The inclusions Miss ึโ Gss
i for i โ {1, 2, 3} and ฮ3 ึโ G3 are lattice
embeddings.
td
Proof. By Lemma 3.3, M1 is a lattice in Gss
1 รU since U < G1 is an open subgroup.
ss
ss
Since U is also compact, the image M1 of M1 in G1 is a lattice of Gss
1 as well.
ss
ss
ss
ss
Similarly, M2 < Gss
2 ร U and M2 < G2 are lattices. Since G2 = G3 by definition
ss
ss
one easily sees that the images of M2 and M3 in Gss
2 coincide, so M3 = M2 . In
ss
ss
particular, M3 < G3 is a lattice.
Since N2 โณ ฮ2 is also normal in G2 (see the remark below (5.1)), the quotient ฮ3
td
td โผ
is a lattice in G3 = Gss
2 ร G2 /N2 = G2 /N2 by Lemma 3.4.
We are finally in a position to identify the lattice embedding ฮ1 < G1 , which is
virtually isomorphic to the original lattice embedding ฮ < G. We distinguish three
cases depending on the finiteness of the groups M1 and M2 .
Case (i): M1 is finite (ฮ1 is a lattice in a tdlc group).
In this case, the connected real Lie group Gss
1 without compact factors has a finite
td
group M1ss as a lattice, thus Gss
1 must be trivial. Thus G1 = G1 is a tdlc group
with trivial amenable radical that contains ฮ1 as a lattice. If ฮ is assumed to have
property (BT), the same applies to ฮ1 , and by Lemma 3.8, ฮ1 < G1 is a uniform
lattice. Either G1 is discrete which means that the original lattice embedding
ฮ ึโ G was trivial or we are in case (3) of the main theorem.
Case (ii): M1 is infinite, but M2 is finite (ฮ1 is a lattice in a semi-simple Lie
group).
ss
In this case M2ss is finite and a lattice in Gss
2 . As above we conclude that G2 = H
is trivial. Therefore ฮ2 = N2 , and
td
td
td
Gtd
2 = ฮ2 = N 2 = N 2 .
The last equality follows from the discreteness of N2td .
28
URI BADER, ALEX FURMAN, AND ROMAN SAUER
ss
Since M1ss = prss
1 (M1 ) is a lattice in G1 = L ร H = L and a subgroup of the
ss
lattice ฮ0 (see Proposition 5.6), M1 < ฮ0 must have finite index. We have a short
exact sequence
prL
ฮ0 โโ 1.
1 โโ ฮ2 โโ ฮ1 โโ
ss
The prL -preimage of M1 which equals ฮ2 ยท M1 = N2 M1 โผ
= N2 ร M1 is a finite
index subgroup of ฮ1 . Since M1 is infinite, the (Irr) condition forces ฮ2 = N2 to be
td
td
finite. So Gtd
2 is finite. As G2 has finite covolume in G1 , the latter is compact. In
td
fact, G1 has to be trivial, because it has a trivial amenable radical. We conclude
that ฮ1 is a classical lattice in a connected, center-free, semi-simple, real Lie group
L = Gss
1 = G1 . This lattice is irreducible due to assumption (Irr). This corresponds
to case (1) in the main theorem.
Case (iii): M2 is infinite (ฮ1 is an S-arithmetic lattice).
ss
Recall that the projection M2ss of M2 to Gss
2 = G3 = H is a lattice there. The
ss
assumption that M2 is infinite, means that G3 is non-trivial. The inclusion
td
ฮ3 < G3 = Gss
3 ร G3
is a lattice embedding by Lemma 5.10. At this point we may and will apply the
Arithmetic Core Theorem 4.5 to ฮ3 < G3 to deduce that, up to dividing Gtd
3 by a
compact normal subgroup C, one has a product of S-arithmetic lattices with nontrivial semi-simple and totally disconnected factors. (It will become clear below
that C is trivial and that there is only one irreducible S-arithmetic lattice). More
precisely, there are number fields K1 , . . . , Kn , absolutely simple Ki -algebraic groups
Hi , and finite sets Si โ Vi of places of Ki compatible with Hi such that, denoting
โฆ
the connected real Lie groups by Hi = (Hi )+
Ki ,S โ = (Hi )Ki ,S โ , we have
i
i
td
Gss
3 ร G3 /C =
n
Y
Hi ร
i=1
n
Y
Qi
i=1
for certain closed intermediate groups
(Hi )+
K
fin
i ,Si
< Qi < (Hi )Ki ,Sifin .
Moreover, ฮ3 is commensurable to the product of the Si -arithmetic lattices: There
are finite index subgroups ฮ3,i < Hi (Oi [Si ]) such that
(5.3)
ฮ3,1 ร ยท ยท ยท ร ฮ3,n < ฮ3 , [ฮ3 : ฮ3,1 ร ยท ยท ยท ร ฮ3,n ] < โ
has finite index. Upon passing to smaller finite index subgroup, we may assume
that (5.3) is the inclusion of a normal subgroup. By Lemma 5.10,
M3ss < Gss
3 = H1 ร ยท ยท ยท ร Hn
is a lattice. It contains a product of irreducible lattices โi < Hi as a finite index
subgroup:
โ1 ร ยท ยท ยท ร โn < M3ss , [M3ss , โ1 ร ยท ยท ยท ร โn ] < โ.
Relying on the (NbC) condition we showed (see (5.2)) that M2 < ฮ2 commutes
with N2 , so
(5.4)
M2 < Zฮ2 (N2 ).
The abelian subgroup Zฮ2 (N2 ) โฉ N2 = Z(N2 ) is, being a characteristic subgroup
td
td
of N2td โณ Gtd
2 , normal in G2 . Since G2 has a trivial amenable radical,
(5.5)
Zฮ2 (N2 ) โฉ N2 = {1}.
LATTICE ENVELOPES
29
Hence the restriction p|Zฮ2 (N2 ) of the quotient map p : ฮ2 โ ฮ3 = ฮ2 /N2 is injective.
The image p(Zฮ2 (N2 )) of the normal subgroup Zฮ2 (N2 ) is normal in ฮ3 and contains
M3 . The subgroup
n
Y
ฮ3,i
T3 := p(Zฮ2 (N2 )) โฉ
i=1
has finite index in p(Zฮ2 (N2 )) and is normal in ฮ3,1 ร ยท ยท ยท ร ฮ3,n . The commutative
diagram below summarizes the various relations between the groups.
Since โi and M3 โฉ T3 โฉ ฮ3,i are commensurable, the normal subgroup T3 โฉ ฮ3,i โณ
ฮ3,i is infinite. Since each ฮ3,i is an irreducible Si -arithmetic lattice, Margulisโ
normal subgroup theorem implies that each T3 โฉ ฮ3,i < ฮ3,i is of finite index,
thus p(Zฮ2 (N2 )) < ฮ3 is of finite index. By the injectivity of p|Zฮ2 (N2 ) , the group
Zฮ2 (N2 ) is thus (abstractly) commensurable with a product of S-arithmetic lattices.
By Theorem 3.13, Zฮ2 (N2 ) has a finite outer automorphism group. Further, the
center of Zฮ2 (N2 ) โณ ฮ2 is trivial since it lies in the amenable radical of ฮ2 which is
trivial by Proposition 5.6 and Lemma 3.11.
Qn
M2
โผ
=
Zฮ2 (N2 )
p
โผ
=
i=1
Hi
f.i.
p(Zฮ2 (N2 ))
M3
Gss
3 ร {1}
ฮ3
td
Gss
3 ร G3
โณ
โณ
ฮ2
Qn
โi
i=1
p
ฮ2 /N2
โณ f.i.
T3
Qn
โณ
i=1
Qn
ฮ3,i
i=1
Hi ร Q i
f.i.
Qn
i=1
Hi (Oi [Si ])
Qn
i=1 (Hi )Ki ,Si
โ
ร (Hi )Ki ,Sifin
Since N2 is the intersection of ฮ2 โณ ฮ1 and N1 โณ ฮ1 the subgroup N2 is normal in
ฮ1 which implies that Zฮ2 (N2 ) is normal in ฮ1 .
By Lemma 3.14 the finite index subgroup ฮโฒ1 = ker ฮ1 โ Out(Zฮ2 (N2 )) < ฮ1
splits as a direct product:
ฮโฒ1 โผ
= Zฮ2 (N2 ) ร (ฮโฒ1 /Zฮ2 (N2 )).
Assumption (Irr) implies that one of the factors is finite; and by M2 being infinite
and (5.4), we obtain that Zฮ2 (N2 ) is of finite index in ฮ1 , hence ฮ2 < ฮ1 is of finite
index. So ฮ0 is finite. Because of [ฮ1 : Zฮ2 (N2 )] < โ and (5.5) we obtain that N1
and N2 are finite. The group L, being a lattice envelope of ฮ0 , is compact, thus L
and ฮ0 are trivial.
ss
ss
So Gss
1 = H = G2 = G3 . Using condition (Irr) we can now also deduce that
there was only one irreducible factor, hence n = 1 in (5.3).
Furthermore, the group N2 โผ
= N2td , that is now known to be finite, has to be
td
td
trivial, because N2 is normal in Gtd
2 , while Radam (G2 ) = {1}. It follows that
td
G3 = G2 and Radam (G3 ) = {1}. In particular, the compact normal subgroup
C โณ Gtd
3 is actually trivial.
30
URI BADER, ALEX FURMAN, AND ROMAN SAUER
We deduce that there is a number field K, a connected, non-commutative, adjoint, absolutely simple K-groups H, and a finite set S = S โ โช S fin of places as in
ยง4.1 so that
ฮ1 = ฮ2 = ฮ3 โ H(O[S])+
is an irreducible S-arithmetic lattice in the lcsc group
+
+
td
G2 = Gss
2 ร G2 = HK,S โ ร HK,S fin .
It remains to identify the lcsc group G1 . We have established the triviality of ฮ0
and of L, hence
+
ss
ss
Gss
1 = H ร L = H = G2 = G3 = HK,S โ .
It remains to identify the totally disconnected component Gtd
1 that contains
Y
+
+
td
H(Kฮฝ )
G2 = HK,S fin =
ฮฝโS fin
as a closed subgroup of finite covolume.
+
td
Step 4: Lattice envelope Gtd
1 of G2 = HK,S fin .
Let us enumerate the elements in S fin = {ฮฝ1 , . . . , ฮฝn } in such a way that H has
Kฮฝi -rank at least two for 1 โค i โค k and has Kฮฝi -rank 1 for k < i โค n. The extreme
cases k = n or k = 0 are, of course, possible.
Let Xi be the Bruhat-Tits building associated to H(Kฮฝi ), and let Hi := H(Kฮฝi )+ .
We write
H = H1 ร ยท ยท ยท ร Hn and X = X1 ร ยท ยท ยท ร Xn .
With that notation, H = Gtd
2 . The spaces Xi are irreducible Euclidean buildings
with cocompact affine Weyl group and Moufang Tits boundary. Each group Hi acts
by automorphisms on the simplicial complex Xi , such that the action on vertex set
has finitely many orbits and the vertex stabilizers are maximal compact subgroups
of Hi . For i โ {k + 1, . . . , n} the building Xi is a tree.
Theorem 5.11. Let G be a tdlc group that has trivial amenable radical and contains
H = Gtd
2 as a closed subgroup of finite covolume. Then G/H is compact, and
there is an open subgroup Gโฒ < G of finite index that contains H such that the
natural embedding H โ Isom(X) extends to an injective continuous homomorphism
Gโฒ โ Isom(X) with closed image.
We apply this result to G = Gtd
1 whose amenable radical is trivial. According to
Remark 4.4 und upon passing to a closed subgroup of Gโฒ of finite index the group
Gโฒ is a tree extension of H in the sense of Definition 4.3. This finishes the proof of
Theorem A based on Theorem 5.11.
The proof of Theorem 5.11 proceeds in several steps. We heavily use techniques
from geometric group theory, inspired by the approach taken in [33, Section 3].
Compactness of G/H. By the Bruhat-Tits fixed-point theorem (see [15, Corollary 2.8 on p. 179] for a more general result on CAT(0)-spaces) every compact
subgroup of H fixes a vertex of X. But since there are only finitely many H-orbits
of vertices there are only finitely many vertex stabilizer groups up to conjugation.
In particular, H endowed with Haar measure m has an upper bound on the Haar
measure of its open compact subgroups:
sup m(U ) | U is an open compact subgroup of H < +โ.
LATTICE ENVELOPES
31
Thus Lemma 3.8 applies to H < G and implies compactness of G/H.
Definition of the subgroup Gโฒ < G. Applying Lemma 3.29 in combination with
Remark 3.30 to H acting on X, one obtains a homomorphism of G to the quasiisometry group of X
ฯ : G โ QI(X).
Further, there are constants C, L > 0 such that for every g โ G there is a (L, C)quasi-isometry fg : X โ X that represents the class ฯ(g) โ QI(X) and has the
following property: For every bounded set B โ X there is a neighborhood of the
identity V โ G so that
(5.6)
โgโV โxโB dX (fg (x), x) < C.
We now apply the following splitting theorem by Kleiner and Leeb.
Theorem 5.12 ([42, Theorem 1.1.2]). For every C, L > 0 there are Lโฒ , C โฒ , D > 0
such that every (L, C)-quasi-isometry X โ X is within distance D from a product
of (Lโฒ , C โฒ )-quasi-isometries Xi โ Xฯ(i) between the factors for some permutation
ฯ โ Symn .
At the expense of increasing the constants C and L, we may hence assume
(i)
that each fg is a product of (L, C)-quasi-isometries fg : Xi โ Xฯg (i) for some
permutation ฯg โ Symn . Another consequence of Theorem 5.12 is that the product
QI(X1 ) ร ยท ยท ยท ร QI(Xn ) embeds into QI(X) as a subgroup of index at most n! =
|Symn |. We define the finite index subgroup Gโฒ < G as the ฯ-preimage of QI(X1 ) ร
ยท ยท ยท ร QI(Xn ). Note that Gโฒ contains H.
So there are homomorphisms
ฯi : Gโฒ โโ QI(Xi )
for i โ {1, . . . , n} such that ฯ|Gโฒ = ฯ1 ร ยท ยท ยท ร ฯn . Further, there are (L, C)(i)
(i)
quasi-isometries fg : Xi โ Xi for every i โ {1, . . . , n} and g โ Gโฒ such that fg
represents ฯi (g). The restriction of ฯi to H agrees with the homomorphism
pr
i
H โโโ
Hi โ Isom(Xi ) โ QI(Xi ),
where pri is the projection to the i-th factor. In view of (5.6) and the quantitative
statement in Theorem 5.12 and at the expense of increasing C, L > 0 once more,
the following holds true: For every i โ {1, . . . , n} and for every bounded set B โ Xi
there is a neighborhood of the identity V โ G so that
(5.7)
โgโV โxโB dX (fg(i) (x), x) < C.
Openness of Gโฒ < G. The group Gโฒ is defined as the kernel of a homomorphism of
G to a finite group. But we do not know at this point that the homomorphism is
continuous, which would imply that Gโฒ < G is open, thus an lcsc group itself. Next
we provide a direct argument that shows openness of Gโฒ < G.
Let dX and dXk denote the metric on X and Xk , respectively. Let Bi โ Xi
be a bounded subset whose diameter exceeds 3C, and let B = B1 ร ยท ยท ยท ร Bn .
Let V โ G be a neighborhood of the identity that satisfies (5.6). Next we show
that V is contained in Gโฒ and so Gโฒ < G is an open subgroup. Suppose it is not.
Then there is g โ V such that ฯg is non-trivial. Let i โ {1, . . . , n} be such that
j := ฯg (i) 6= i. Let xj , xโฒj โ Bj be points whose distance is at least 3D. Pick
(i)
points xl โ Bl for l โ {1, . . . , j โ 1, j + 1, . . . , n}. Then either dXj (fg (xi ), xj ) > C
32
URI BADER, ALEX FURMAN, AND ROMAN SAUER
(i)
or dXj (fg (xi ), xโฒj ) > C. Without loss of generality assume the first case. Let
x = (x1 , . . . , xn ) โ B. Then
dX (fg (x), x) โฅ dXj (fg(i) (xi ), xj ) > C,
contradicting (5.6). Therefore V โ Gโฒ .
Mapping Gโฒ to Isom(Xi ) for the higher rank factors Xi . The rigidity theorem for
higher rank irreducible buildings (such as X1 , . . . , Xk ) by Kleiner and Leeb [42] is
the next important ingredient.
Theorem 5.13 ([42, Theorem 1.1.3]). Let i โ {1, . . . , k}. For every C > 0 and
L > 0 there is a constant D > 0 such that every (L, C)-quasi-isometry Xi โ Xi is
within distance D from a unique isometry Xi โ Xi .
Moreover, no two distinct isometries Xi โ Xi for i โ {1, . . . , k} are within
bounded distance from each other. Hence the natural homomorphism Isom(Xi ) โ
QI(Xi ) is an isomorphism for i โ {1, . . . , k} and composing its inverse with ฯi we
obtain homomorphisms
ฯi : Gโฒ โโ Isom(Xi )
pr
i
for which the restriction to H < G is the homomorphism H โโโ
Hi โ Isom(Xi ).
(i)
The statement (5.7) and Theorem 5.13 applied to fg show that there is a constant
E > 0 such that for every bounded subset B โ Xi there is a neighbourhood of the
identity V โ G such that
(5.8)
โgโV โxโB dXi (ฯi (g)(x), x) < E.
Lemma 5.14. The map ฯi is continuous for i โ {1, . . . , k}.
Proof. Let U โ Isom(Xi ) be an open neighborhood of the identity. We have to
show that there is open neighborhood of the identity of G that is contained in
ฯiโ1 (U ).
We rely on the following geometric fact about buildings that follows, for example,
from [60]: For every constant D > 0 and any open neighborhood W of the identity
in Isom(Xi ), there is a bounded set B โ Xi , depending on D and W so that
(5.9)
ฮธ โ Isom(Xi ) | sup dXi (ฮธ(x), x) < D โ W.
xโB
We apply this general fact to the constant E from (5.8) and the identity neighborhood U . Let us fix a bounded subset B = B(E, U ) โ Xi such that
(5.10)
ฮธ โ Isom(Xi ) | sup dXi (ฮธ(x), x) < E โ U.
xโB
Applying the statement (5.8) to this specific subset B provides us with a neighborhood V = V (E, B) โ G of the identity such that
(5.11)
โgโV โxโB dXi (ฯi (g)(x), x) < E.
Since (5.10) and (5.11) mean that ฯiโ1 (U ) โ V , continuity of ฯi follows.
LATTICE ENVELOPES
33
Mapping G to Homeo(โXj ) for the rank 1 factors Xj . Next we turn to the tree
factors Xj with j โ {k + 1, . . . , n}. For every tree of bounded degree T , such as
Xj with k < j โค n, the space of ends โT is compact, and one has an embedding of
groups
QI(T ) ึโ Homeo(โT ).
For j โ {k + 1, . . . , n} let ฯj be the composition
ฯj
ฯj : Gโฒ โโ QI(Xj ) ึโ Homeo(โXj ).
Lemma 5.15. The map ฯj is continuous and has a closed image for every j โ
{k + 1, . . . , n}.
Proof. The continuity statement is proved in [33, Theorem 3.5]. The argument is
analogous to the one for Lemma 5.15. However, instead of the geometric fact (5.9)
one uses the following fact which is a consequence of the Mostow-Morse lemma:
For a tree T of bounded degree and constants L, C, D > 0 and for any identity
neighbourhood U โ Homeo(โT ) there is a compact subset B โ T so that the image
in Homeo(โT ) of any (L, C)-quasi-isometry f : T โ T with
sup{dT (f (x), x) | x โ B} < D
belongs to U .
Since H is cocompact in Gโฒ and the image of H in Homeo(โXj ), which equals
the image of Hj in Homeo(โXj ), is closed, also the image of Gโฒ is closed.
Identifying the image of ฯj . Since ฯi is continuous for i โ {1, . . . , n}, Ker(ฯi ) is a
closed subgroup of G. We set
Gi := Gโฒ / Ker(ฯi ).
Regarding Hi as a subgroup of H and thus of Gโฒ , the inclusion Hi ึโ G induces a
monomorphism Hi ึโ Gi since Gโฒ restricts to an injective map Hi โ Isom(Xi ) or
Hi โ Homeo(โXi ), respectively.
By Theorem 3.28 Isom(Xi ) contains Hi as a closed subgroup of finite index for
i โ {1, . . . , k}. Thus the ฯi -image of Gโฒ for i โ {1, . . . , k} contains Hi as a subgroup
of finite index.
Let us consider the ฯj -image for the tree factors. Fix an index j โ {k +1, . . . , n}.
The map ฯj describes a quasi-action of Gโฒ , thus a faithful quasi-action of Gj ,
(j)
on the tree Xj since every g โ G acts by a (L, C)-quasi-isometry fg such that
(j)
(j)
(j)
fg1 โฆ fg2 is within uniformly bounded distance from fg1 g2 .
Next we resort to the work of Mosher, Sageev and Whyte on quasi-actions on
trees. Their main result says:
Theorem 5.16 ([51, Theorem 1]). A cobounded quasi-action of a group on a bushy
tree of bounded degree is quasi-conjugated to an isometric action of the same group
on a โ possibly different โ tree.
Since Xj has degree at least 3 and Hj acts cocompactly on Xj the assumptions
are fulfilled for the quasi-action of Gj on Xj . Hence there is a tree Tj on which Gj
acts by isometries and a quasi-conjugacy from Xj to Tj , that is, a quasi-isometry
ฮท : Xj โ Tj such that
dTj ฮท ฯj (g)(x) , gฮท(x) < โ.
sup
gโGj ,xโXj
34
URI BADER, ALEX FURMAN, AND ROMAN SAUER
Some preliminary remarks for the proof of Lemma 5.18 below are in order. We
rely on the group-theoretic description of Bruhat-Tits buildings (see e.g. [1, Corollary 11.35 on p. 563 and Theorem 11.38 on p. 564]) which we only need in dimension 1: The Bruhat-Tits tree Xj as a 1-dimensional Hj -equivariant CW-complex
consists of two Hj -orbits of vertices Hj /K1 and Hj /K2 , where K1 and K2 are nonconjugated maximal compact-open subgroups of Hj , and one Hj -orbit Hj /(K1 โฉK2 )
of edges. Further, K1 and K2 generate Hj . In this description we are using that
Hj = H(Kฮฝj )+ is the image of the Kฮฝj -points of the simply connected form of H;
the whole group H(Kฮฝj ) might have only one orbit of vertices.
An action of a group on a tree is called minimal if there are no proper subtrees
invariant under the group action. If an action on a locally finite tree is minimal then
the induced action on the boundary of the tree is minimal in the sense of dynamical
systems: there are no proper closed invariant subsets. This is a consequence of
the limit set being the minimal closed invariant subset of the boundary (see [26,
Theฬoreฬme 5.1] for a more general result, which is attributed to Gromov, in the
context of Gromov-hyperbolic spaces).
Conversely, if a group G is acting by automorphisms on a locally finite tree T ,
and L โ โT is a minimal G-invariant set consisting of more than two points, then
the union of all geodesics in T with end points in L, called the convex hull TL of L,
is a minimal G-invariant sub-tree of T . Any G-invariant sub-tree T โฒ has โT โฒ = L,
and therefore contains TL . Moreover there exists a retraction r : T โฒ โ TL given
by nearest point projection to TL . This retraction is equivariant with respect to
Aut(T ).
Returning to our situation recall that the action of Hj on the tree Xj is minimal,
hence the Hj -action on โXj is minimal. Since โฮท is an equivariant homeomorphism,
the action of Hj on โTj is also minimal. In particular, the Gj -action on the convex
hull of โTj gives a minimal Gj -invariant tree. Without loss of generality we may
assume Tj itself is the convex hull of its boundary โTj , i.e. that Tj does not have
vertices of degree one.
The action of Gj on โTj defines a proper action on the space โ (3) Tj of triples of
distinct points of โTj . Thus the Gj -action on โTj is minimal and strongly proximal.
The subgroup Hj < Gj has finite covolume. Thus the action of Hj on โTj is also
minimal and strongly proximal by Lemma 3.12. Minimality of the Hj -action on
โTj implies that Tj , which is the convex hull of its boundary, is minimal also as an
Hj -invariant tree.
Lemma 5.17. The action homomorphism Gj โ Isom(Tj ) is injective, continuous
and has a closed image.
Proof. The map ฮท induces a Gj -equivariant homeomorphism
โฮท : โXj โ โTj .
Since both the isometry group and the quasi-isometry group of either Xj or Tj inject
into the homeomorphism group of โXj or โTj , respectively, and ฯj is injective, the
map Gj โ Isom(Tj ) is injective. Since Isom(Tj ) embeds as a closed subgroup into
Homeo(โTj ) continuity and closedness follow from the continuity and closedness of
the composition Gj โ Isom(Tj ) โ Homeo(โTj ). But the latter is conjugated via
โฮท to the map Gj โ Homeo(โXj ) whose continuity and closedness is implied by
Lemma 5.15.
LATTICE ENVELOPES
35
Lemma 5.18. There is c โ N and an Hj -equivariant cellular homeomorphism
f : Xj โ Tj such that f is a homothety with stretch factor c.
Proof. Upon subdividing we may assume that Hj acts on Tj without inversion. By
the continuity part of Lemma 5.17 the orbits of the compact subgroups K1 and K2
in Tj are bounded. By the Bruhat-Tits fixed point theorem [15, Corollary 2.8 on
p. 179], there is a vertex in Tj that is fixed under K1 or K2 , respectively. Choose
a pair (v1 , v2 ) of vertices with Ki vi = vi that has minimal distance.
The Hj -orbit of the geodesic segment c between v1 and v2 is connected, thus
a Hj -invariant subtree of Tj , because Hj is generated by K1 and K2 . By Hj minimality of Tj the Hj -orbit of c is Tj . Moreover, c is fixed by K1 โฉ K2 . The map
that sends the vertex 1 ยท Kl to vl for l โ {1, 2} and the edge e = 1 ยท (K1 โฉ K2 ) onto
c by an affine homeomorphism can be extended to an Hj -equivariant cellular map
f : Xj โ Hj . Clearly, f is surjective.
Next we show that f is locally injective. It is enough to show local injectivity at
the vertices 1K1 and 1K2 of Xj . By symmetry let us consider 1K1 only. Consider
its neighbours 1K2 and hK2 for some h โ Hj . Since K1 and K2 are not conjugated
the f -images v1 , v2 , v2โฒ of 1K1 , 1K2 and hK2 are pairwise distinct. Let w be the
center of the tripod given by v1 , v2 , v2โฒ . We want to show that w = v1 which implies
local injectivity of f at 1K1 . Both K1 โฉ K2 and K1 โฉ hK2 hโ1 are contained in the
stabilizer S of w. Since K1 โฉ K2 is maximal in K1 and K1 โฉ hK2 hโ1 6= K1 โฉ K2
by the group theoretic description of the Bruhat-Tits tree [1, Theorem 11.38 on
p. 564] it follows that S = K1 . So w = v1 since we chose (v1 , v2 ) to have minimal
distance among the vertices fixed by K1 or K2 , respectively.
As a surjective, locally injective map between trees f is a homeomorphism. Let
c be the distance between v1 and v2 . Obviously, f is locally a homothety with
stretch factor c. Thus it is globally so.
Conjugating with a homothety as in Lemma 5.18 we obtain a topological isomorphism
Isom(Tj ) โผ
= Isom(Xj )
compatible with the two embeddings of Hj . Hence, Gj can be embedded as a
closed intermediate subgroup Hj < Gj < Isom(Xj ), and the homomorphism ฯj
can be regarded as Gโฒ โ Gj ึโ Isom(Xj ) composed with the natural embedding
โฒ
Isom(Xj ) โ Homeo(โX
Qn j ). โฒThus we also denote the map G โ Gj โ Isom(Xj )
โฒ
by ฯj . Let โ : G โ i=1 G be the diagonal embedding. We obtain a continuous
homomorphism with closed image
n
Q
ฯi โฆโ Y
Isom(Xi ) < Isom(X)
ฯ : Gโฒ โโโโโโ
i=1
whose restriction to H is the natural embedding H ึโ Isom(X). Since G/H is compact, ker(ฯ) is compact. Since the amenable radical of G, thus of Gโฒ by Lemma 3.11,
is trivial, the map ฯ is injective.
This completes the proof of Theorem 5.11, and therefore also the proof of the
main classification result โ Theorem A.
6. Proofs of Theorems BโF
Proof of Theorem B.
Let ฮ < H be a lattice embedding, where we assume that
36
URI BADER, ALEX FURMAN, AND ROMAN SAUER
(i) either H is a connected, center-free, real Lie group without compact factors,
H 6โ SL2 (R) and ฮ < H is an irreducible lattice,
(ii) or H = HK,S as in Setup 4.1 and ฮ is commensurable to the S-arithmetic
lattice H(O[S]).
Such ฮ satisfies all the assumptions of Theorem A. Indeed, being a lattice ฮ is
Zariski dense in the semi-simple algebraic group H (Borelโs Density Theorem, cf.
[47, Theorem II.(4.4)]). Thus Theorem 1.4.(2) ensures that ฮ satisfies conditions
(CAF) and (NbC). Being an irreducible lattice, ฮ satisfies (Irr). Lattices in semisimple groups are known to be finitely generated (cf. [47, ยงIX.(3.2)]). By Selbergโs
lemma ฮ contains a torsion-free subgroup of finite index, in particular condition
(BT) applies.
Let G be some lcsc group and ฮ < G be a lattice embedding. Theorem A
states that there is an open subgroup of finite index Gโฒ < G and a compact normal
subgroup K โณ Gโฒ so that, upon replacing G by Gโฒ /K and ฮ by ฮ โฉ Gโฒ (we assume
ฮ to be torsion-free), one has the following three possibilities:
(1) G is a connected, center-free, semi-simple, real Lie group without compact
factors and ฮ < G is an irreducible lattice.
(2) There is a number field K โฒ , a finite set S โฒ of places, including infinite and
finite ones, a K โฒ -group G so that ฮ is a commensurable to an S โฒ -arithmetic
lattice G(O[S โฒ ]) in G = GK โฒ ,S โฒ as in Setup 4.1.
(3) G is a tdlc group with trivial amenable radical and ฮ < G is a uniform
lattice.
Cases (1) and (2) are covered by the following
Theorem 6.1 (Strong Rigidity Theorem, Mostow, Prasad, Margulis).
Let i : ฮ โ G and j : ฮ โ H be embeddings of ฮ as irreducible lattices into centerfree semi-simple Lie groups, or arithmetic lattices as in (1), (2) and (i), (ii) above.
Then there exists a continuous group isomorphism ฯ : G โ H such that j = ฯ โฆ i.
Strong Rigidity Theorem was proved by Mostow [52] for all the cases where G
and H are semi-simple real Lie Lie groups and i(ฮ) < G and j(ฮ) < H are uniform
irreducible lattices. Prasad [57] extended this result to some non-uniform lattices,
including all non-uniform lattices in rank one real Lie groups G and H. Higher
rank cases, including the S-arithmetic situations, for both uniform and non-uniform
lattice embeddings, follow from Margulis super-rigidity theorem, see [47, Theorem
VII.(7.1)].
Therefore it remains to prove that if ฮ < H is as in (i) or (ii), and ฮ < G is as in
case (3), then G is a discrete group containing ฮ as a as subgroup of finite index.
To this end we will use use the homomorphism
ฯ : G โโ QI(ฮ)
provided by Lemma 3.29. We shall prove below that
Claim 6.2. The kernel U := ker ฯ is an open subgroup in G.
Let us first show that the claim suffices to complete the proof of the theorem. Let
mG denote a Haar measure of G. Since U is open, we have mG (U ) > 0. Therefore
the restriction of mG to U is a Haar measure mU on U . For a lattice ฮ < H in
a center-free semi-simple group, the homomorphism ฮ โ QI(ฮ) is injective. Thus
U โฉ ฮ = {1} and one may include U in a Borel fundamental domain of ฮ in G. It
LATTICE ENVELOPES
37
follows that mG (U ) = mU (U ) is finite, and therefore U is a compact group. As G
is assumed to have trivial amenable radical, we deduce that U = {1}. But since U
is open in G, it follows that G is discrete and that its lattice ฮ is just a subgroup
of finite index.
We are left with proving Claim 6.2, that will be deduced from quasi-isometric
rigidity results about lattices in semi-simple Lie groups; we refer to Farbโs survey
[28] for background and references.
First assume that ฮ is a non-uniform irreducible lattice in H. In this case QI(ฮ)
is known to coincide with the commensurator of ฮ in H, which is a countable group:
ฯ : G โโ QI(ฮ) = CommenH (ฮ).
This was first proved by Schwartz [62] for rank-one real Lie groups, and then by
Schwartz [63], Farb-Schwarz [29], and Eskin [27] for higher rank real Lie groups,
and by Wortman [73] for S-arithmetic cases.
Hence the homomorphism ฯ has countable image. The kernel U = ker ฯ is
clearly a Borel subgroup, and since countably many of its cosets cover G, one has
mG (U ) > 0. A Borel subgroup U of positive Haar measure is open because of
U = U โ1 ยท U and U โ1 ยท U contains an identity neighborhood. This proves Claim 6.2
in case ฮ < H is non-uniform.
Next assume ฮ is a uniform lattice in H. Let H = H1 ร ยท ยท ยท ร Hn be the decomposition of H into simple factors and Xi = Hi /Ki be the associated symmetric
spaces and/or Bruhat-Tits buildings. At least one of the factors Hi is a simple real
Lie group, and we shall assume H1 is such. We have
ฯ : G โโ QI(ฮ) = QI(X1 ร ยท ยท ยท ร Xn ).
Arguing as in Step 4 in Section 5 (in particular Theorem 5.12), we observe that,
upon replacing G by an open subgroup of finite index (and replacing ฮ by a finite
index subgroup), we may assume that ฯ(G) takes value in
QI(X1 ) ร ยท ยท ยท ร QI(Xn ) < QI(X1 ร ยท ยท ยท ร Xn ).
Consider the homomorphism
pr1 โฆฯ : G โโ QI(X1 ).
We shall show that it factors through a continuous homomorphism
G โโ Isom(X1 )
by considering the following cases.
โข X1 is a symmetric space of higher rank, corresponding to rkR (H1 ) โฅ 2.
In this case the natural homomorphism Isom(X1 ) โ QI(X1 ) is a bijection
(Kleiner-Leeb [42]), and the group homomorphism
ฯ
G โโ QI(X1 ) = Isom(X1 )
is continuous by Lemma 5.14.
m
2
โข X1 is a quaternionic hyperbolic space HH
or the Cayley plane HO
, corresponding to H1 โ Sp(m, 1) or F4 . Also in this case the natural homomorphism Isom(X1 ) โ QI(X1 ) is a bijection (Pansu [56]), and the homomorphism
ฯ
G โโ QI(X1 ) = Isom(X1 )
is continuous by Lemma 5.15.
38
URI BADER, ALEX FURMAN, AND ROMAN SAUER
โข X1 is real hyperbolic space Hm with m โฅ 3, corresponding to H1 =
PO(m, 1)0 . The boundary at infinity โX1 is a sphere S mโ1 with a natural conformal structure that is preserved by Isom(X1 ). In fact, the well
known isomorphism Isom(Hm ) = Conf(S mโ1 ) extends to an isomorphism
โผ QConf(S mโ1 )
QI(Hm ) =
between the group of quasi-isoemtries and the group of quasi-conformal
homeomorphisms of the sphere. By a result of Tukia [70], a subgroup of
QConf(S mโ1 ) that is uniformly quasi-conformal and acts cocompactly on
triples of points of S mโ1 is conjugate into Conf(S mโ1 ). This can be applied to ฯ(G). Indeed, by Lemma 3.29 there exist constants C, L so that
all all ฯ(g) are represented by (L, C)-quasi-isometries, and therefore, by
Mostow-Morse lemma, induce a uniformly quasi-conformal group of mappings of S mโ1 . This group contains ฮ, that acts cocompactly on X1 , and
therefore also cocompactly on triples of points in S mโ1 . Therefore we get
a homomorphism
G โโ Isom(Hm ) = Conf(S mโ1 ) < QConf(S mโ1 ) = QI(Hm ).
m
The topology on Isom(HR
) coincides with that of Conf(S mโ1 ) inherited
from the Polish topology Homeo(S mโ1 ). Hence the continuity of the homomorphism
G โโ Isom(Hm )
follows from Lemma 5.15.
m
โข X1 is a complex hyperbolic space HC
, corresponding to PU(m, 1)0 . In
m
this case the boundary sphere โHC has a natural conformal class of a subRiemannian Carnot-Caratheodory structure. Carnot-Caratheodory analogues of the theory of quasi-conformal mappings and a result analogous
to Tukiaโs theorem allow to prove (see [25]) that ฯ(G) is quasi-conformally
conjugate into
m
m
Conf(โHC
) = Isom(HC
).
m
The continuity of the resulting homomorphism G โโ Isom(HC
) follows
from Lemma 5.15.
This shows that the homomorphism ฯ : ฮ โ QI(ฮ) factors through a continuous
homomorphism into a simple real Lie group
ฯ1 : G โโ Isom(X1 ) โ H1 .
Let V be an open compact subgroup of a tdlc group G. Its image ฯ1 (V ) is a profinite
group subgroup in Isom(X1 ), which is a real Lie group. Therefore ฯ1 (V ) must be
finite, and V0 := V โฉ ker(ฯ1 ) be an open subgroup. Since U = ker ฯ contains an
open subgroup V0 , U is also an open subgroup of G.
This completes the proof of Claim 6.2, and thereby the proof of Theorem B.
Proof of Theorem C.
Let ฮ be a finite extension of a finitely generated non-abelian free group, and let
ฮ < G be a lattice envelope. Since ฮ satisfies all the assumptions of Theorem A by
Theorem 1.4, we only need to discuss three possibilities.
(1) ฮ < G is virtually isomorphic to an irreducible lattice in a center-free
semisimple real Lie group H. The first โ2 -Betti number of ฮ is positive. By
Olbrichโs work [53] (see also Chapter 5 about computations of โ2 -invariants
LATTICE ENVELOPES
39
of locally symmetric spaces in Luฬckโs book [44]) the only such lattices with
positive first โ2 -Betti numbers are the ones in PSL2 (R). In this case, ฮ
is a non-uniform lattice, since, for example, ฮ has virtual cohomological
dimension one.
(2) ฮ < G is virtually isomorphic to an S-arithmetic lattices as in Setup 4.1. In
particular, it is virtually isomorphic to a lattice embedding into a product of
two non-compact lcsc groups. This can be ruled by the non-vanishing of the
first โ2 -Betti number of ฮ (see the argument in the proof of Theorem F).
Alternatively, this situation can ruled out by the fact that S-arithmetic
lattices as in ยง4 are not Gromov hyperbolic.
(3) ฮ < G is virtually isomorphic to a uniform lattice ฮ < H in a tdlc group H
with trivial amenable radical. In particular, ฮ is virtually isomorphic to a
free non-abelian group, and by passing to a finite index subgroup we may
assume that F := ฮ is a non-abelian free group. Let TF be the Cayleygraph of F which is a regular tree of degree at least 3. The natural action
homomorphism
F โ Isom(TF ) โ QI(TF )
of F extends by Lemma 3.29 to a homomorphism H โ QI(TF ) which
describes a cobounded quasi-action of H on TF (see the remark preceding Theorem 5.16). Next we appeal to the work of Mosher, Sageev and
Whyte [51] as in Step 4 in the proof of Theorem A. By Theorem 5.16, which
is taken from their work, the quasi-action of H on TF is quasi-conjugated
to an isometric (automatically also cobounded, i.e. cocompact) action
ฯ : H โ Isom(T )
on a possibly different tree T . Using the arguments for Lemma 5.15 and
Lemma 5.17 verbatim, one concludes that ฯ is injective, continuous and
has closed image. By the open mapping theorem [12, IX. ยง5.3], H is topologically isomorphic to im(ฯ), and the latter is a cocompact subgroup of
Isom(T ) by the cocompactness of the action.
Proof of Theorem D.
Let ฮ be a uniform lattice in PSL2 (R), and let ฮ < G be another lattice embedding. As a Gromov hyperbolic group, ฮ satisfies all the assumptions of Theorem A
according to Theorem 1.4. So we only need to discuss three possibilities.
(1) ฮ < G is virtually isomorphic to an irreducible lattice is a semisimple real
Lie group H. As in the proof above, by positivity of the first โ2 -Betti
number of ฮ one is reduced to the case of H โ PSL2 (R). In this case, ฮ
has to be cocompact, but the two embeddings of ฮ โ PSL2 (R) need not
be conjugate.
(2) ฮ < G is virtually isomorphic to an S-arithmetic lattices as in Setup 4.1.
This case is ruled out for the same reason as case (2) in the proof of Theorem C.
(3) ฮ < G is virtually isomorphic to a uniform lattice in a tdlc group. This is
covered by [33, Theorem C]: the only possibility is a trivial lattice embedding.
Proof of Theorem E.
Let M be a closed Riemannian manifold of dimension at least 5 with sectional
40
URI BADER, ALEX FURMAN, AND ROMAN SAUER
curvatures ranging in
1 2
, โ1 .
nโ1
Let ฮ = ฯ1 (M ) be the fundamental group, and let ฮ < G be a lattice envelope of
ฮ. Since ฮ is finitely generated, G is compactly generated by Lemma 3.6. The group
ฮ is Gromov hyperbolic, so it has the properties (CAF), (NbC), and (Irr) according
to Theorem 1.4. As a fundamental group of a closed aspherical manifold, ฮ is
torsionfree. In particular, ฮ also has property (BT). By Theorem A there are
the following three possibilities for the lattice embedding ฮ < G up to virtual
isomorphism. Since ฮ is torsionfree, we may assume upon replacing ฮ by a finite
index subgroup, G by a finite index subgroup and a quotient by a compact normal
subgroup, and M by a finite cover that we still have ฮ = ฯ1 (M ) and ฮ < G is
isomorphic (not just virtually) to one of the following cases.
(1) ฮ < G is an (irreducible) lattice embedding into a semisimple real Lie group
G.
(2) ฮ < G is an S-arithmetic lattice in the sense of Setup 4.1.
(3) ฮ < G is a uniform lattice and G is a tdlc group with trivial amenable
radical.
We need to show that the only possibility is case (3) with G being discrete unless
M is homeomorphic to a hyperbolic manifold.
Since ฮ is Gromov hyperbolic we can rule out case (2). By the same reason,
case (1) is only possible if G has real rank 1 and ฮ < G is uniform; note here that
non-uniform lattices contain a free abelian subgroup of rank 2. Let us analyze the
situation where ฮ < G is a uniform lattice in a simple Lie group of real rank 1.
Let X = G/K be the associated symmetric space which is thus real, complex,
quaternionic or Cayley hyperbolic. As aspherical spaces with the same fundamental
group, the locally symmetric space ฮ\X and M are homotopy equivalent.
If X is real hyperbolic, then M is homeomorphic to the closed hyperbolic manifold ฮ\X by the following striking result of Farrell and Jones [32] in their work on
the Borel conjecture. So this possibility is ruled out by assumption.
โ 1+
Theorem 6.3 (Topological rigidity [32]). Let Y be a closed non-positively curved
manifold of dimension 6= 3, 4. If a closed manifold Z is homotopy equivalent to Y ,
then Y and Z are homeomorphic.
The possibilities that X is complex, quaternionic or Cayley hyperbolic are ruled
out by applying the following result by Mok, Siu, and Yeung [49] to Y = ฮ\X and
Z = M and the pinching assumption for M .
Theorem 6.4 (Geometric rigidity [49, Theorem 1]). Let Y and Z be homotopy
equivalent closed Riemannian manifolds. Assume that Z is negatively curved and
Y is complex, quaternionic or Cayley hyperbolic. Then Y and Z are isometric up
to scaling. In particular, the sectional curvatures of Z cannot range in [โa, โ1] for
a < 4.
Summing up, case (2) never occurs, and case (1) can only occur if M is homeomorphic to hyperbolic manifold.
Finally, let us consider case (3) in which we have to show that the tdlc group
G is discrete upon dividing out a compact normal subgroup. Consider the natural
homomorphism
ฯ : ฮ โ Isom(Mฬ ) โ QI(Mฬ ) โ Homeo(โ Mฬ ) = Homeo(S nโ1 ).
LATTICE ENVELOPES
41
Of course, ฯ coincides with the natural action ฮ โ Homeo(โฮ) of ฮ on its Gromov
boundary. We can refer to Lemma 3.29 or, in this situation, to [33, Theorem 3.5]
to conclude that the map ฯ extends to a homomorphism
ฯฬ : G โ Homeo(S nโ1 ).
In the latter reference it is also shown that ฯฬ is continuous, the kernel K := ker(ฯฬ)
is compact, and the image of ฯฬ is locally compact in the subspace topology. By the
open mapping theorem [12, IX. ยง5.3] G is topologically isomorphic to im(ฯฬ). Since
G has trivial amenable radical, K is trivial.
Since the tdlc group G acts continuously and faithfully on the sphere S nโ1 , a
positive solution of the Hilbert-Smith conjecture would imply that G is discrete
and thus finish the proof. The general Hilbert-Smith conjecture remains open but
in our situation we can appeal to the work of Mj [48] that contains the following
result.
Theorem 6.5 (Hilbert-Smith conjecture for boundary actions [48, Corollary 2.2.5]).
Let ฮ be a Gromov hyperbolic Poincareฬ duality group.
Let Q < Homeo(โฮ) be a subgroup that is finite dimensional and locally compact in the subspace topology and lies in the image of the natural homomorphism
QI(ฮ) โ Homeo(โฮ). Let h be the Hausdorff dimension of โฮ with respect to
the visual metric, and let t be the topological dimension of โฮ. We assume that
h < t + 2.
Then Q is a Lie group.
We apply this theorem to Q = im(ฯฬ) โผ
= G and ฮ = ฮ. The topological dimension
of โฮ = S nโ1 is t = n โ 1. It remains to verify that we have h < t + 2 = n + 1. The
Hausdorff dimension h equals the volume entropy hvol of Mฬ (see [74, Theorem C]),
that is,
1
h = hvol := lim sup log vol BMฬ (x, R) .
Rโโ R
As a direct consequence of the Bishop-Gunther comparison theorem [36, Theorem 3.101 on p. 169] we obtain that if the n-dimensional manifold Mฬ has sectional
curvature in [โb2 , โa2 ], then
(n โ 1)a โค hvol โค (n โ 1)b.
In the present situation, b = 1 + 1/(n โ 1), so we obtain that
1
h = hvol โค (n โ 1)(1 +
) = n < n + 1 = t + 2.
nโ1
So the assumptions in Theorem 6.5 are satisfied and we conclude that G is at the
same time a Lie group and a tdlc group, thus discrete.
Proof of Theorem F.
(2)
Let ฮ be group with positive first โ2 -Betti number ฮฒ1 (ฮ) > 0 and property (BT).
Assume that ฮ admits a non-uniform compactly generated lattice envelope G.
Since, by Theorem 1.4, ฮ satisfies all the conditions of Theorem A and (BT),
ฮ < G is virtually isomorphic to some lattice embedding ฮโฒ < Gโฒ that is one
of the first two types in Theorem A; the totally disconnected case is ruled out
by (BT). Non-vanishing of the first โ2 -Betti number is preserved under virtual
isomorphism (this easily deduced from their basic properties), even under quasi(2)
isometry [61, Theorem 1]. So ฮฒ1 (ฮโฒ ) > 0. Hence ฮโฒ cannot be a lattice in a
42
URI BADER, ALEX FURMAN, AND ROMAN SAUER
(2)
product of two non-compact lcsc groups. That is because ฮฒ1 (ฮโฒ ) > 0 implies that
the first โ2 -Betti number of any lattice envelope of ฮโฒ is positive [43, Theorem B],
and the first โ2 -Betti number of a product of two non-compact unimodular lcsc
groups is zero [55, Theorem 6.5 on p. 61]. This excludes that ฮโฒ < Gโฒ is an Sarithmetic lattice as in Setup 4.1, so type (2) is ruled out. Hence ฮโฒ < Gโฒ is a
lattice in a connected center-free semisimple Lie group without compact factors.
By Olbrichโs work [53] (see also Chapter 5 about computations of โ2 -invariants of
locally symmetric spaces in Luฬckโs book [44]) the only such lattices with positive
first โ2 -Betti numbers are the ones in PSL2 (R). Since ฮโฒ < Gโฒ is also non-uniform,
the group ฮโฒ , hence ฮ, is virtually isomorphic to a free group.
References
[1] P. Abramenko and K. S. Brown, Buildings, Graduate Texts in Mathematics, vol. 248,
Springer, New York, 2008. Theory and applications.
[2] U. Bader, P.-E. Caprace, T. Gelander, and S. Mozes, Lattices in amenable groups. ArXiv
preprint: 1612.06220.
[3] U. Bader, P.-E. Caprace, and J. Lecureux, On the linearity of lattices in affine buildings and
ergodicity of the singular Cartan flow. ArXiv preprint: 1608.06265.
[4] U. Bader, A. Furman, T. Gelander, and N. Monod, Property (T) and rigidity for actions on
Banach spaces, Acta Math. 198 (2007), no. 1, 57โ105.
[5] U. Bader, A. Furman, and R. Sauer, On the structure and arithmeticity of lattice envelopes,
C. R. Math. Acad. Sci. Paris 353 (2015), no. 5, 409โ413.
, An adelic arithmeticity theorem for lattices in products. ArXiv preprint: 1705.08158.
[6]
, Weak Notions of Normality and Vanishing up to Rank in โ2 -Cohomology, Int. Math.
[7]
Res. Not. IMRN 12 (2014), 31773189.
[8] M. B. Bekka, On uniqueness of invariant means, Proc. Amer. Math. Soc. 126 (1998), no. 2,
507โ514.
[9] M. Bestvina and K. Fujiwara, Bounded cohomology of subgroups of mapping class groups,
Geom. Topol. 6 (2002), 69โ89.
[10] A. Borel, Density and maximality of arithmetic subgroups, J. Reine Angew. Math. 224 (1966),
78โ89.
[11] A. Borel and J. Tits, Homomorphismes โabstraitsโ de groupes algeฬbriques simples, Ann. of
Math. (2) 97 (1973), 499โ571 (French).
[12] N. Bourbaki, General topology. Chapters 5โ10, Elements of Mathematics (Berlin), SpringerVerlag, Berlin, 1998. Translated from the French; Reprint of the 1989 English translation.
[13] E. Breuillard and T. Gelander, A topological Tits alternative, Ann. of Math. (2) 166 (2007),
no. 2, 427โ474.
[14] E. Breuillard, M. Kalantar, M. Kennedy, and N. Ozawa, C โ -simplicity and the unique trace
property for discrete groups (2016). ArXiv preprint: 1410.2518.
[15] M. R. Bridson and A. Haefliger, Metric spaces of non-positive curvature, Grundlehren der
Mathematischen Wissenschaften [Fundamental Principles of Mathematical Sciences], vol. 319,
Springer-Verlag, Berlin, 1999.
[16] K. S. Brown, Cohomology of groups, Graduate Texts in Mathematics, vol. 87, Springer-Verlag,
New York, 1994. Corrected reprint of the 1982 original.
[17] M. Burger and N. Monod, Continuous bounded cohomology and applications to rigidity theory, Geom. Funct. Anal. 12 (2002), no. 2, 219โ280.
[18] M. Burger and S. Mozes, Groups acting on trees: from local to global structure, Inst. Hautes
Eฬtudes Sci. Publ. Math. 92 (2000), 113โ150 (2001).
[19] P.-E. Caprace, Non-discrete, simple locally compact groups (2016). to appear in the Proceedings of the 7th European Congress of Mathematics.
[20] P.-E. Caprace, P. Kropholler, C. D. Reid, and P. Wesolek, On the residual and profinite
closures of commensurated subgroups (2017). ArXiv preprint: 1706.06853.
[21] P.-E. Caprace and N. Monod, A lattice in more than two Kac-Moody groups is arithmetic,
Israel J. Math. 190 (2012), 413โ444.
LATTICE ENVELOPES
[22]
[23]
[24]
[25]
[26]
[27]
[28]
[29]
[30]
[31]
[32]
[33]
[34]
[35]
[36]
[37]
[38]
[39]
[40]
[41]
[42]
[43]
[44]
[45]
[46]
43
, Isometry groups of non-positively curved spaces: structure theory, J. Topol. 2 (2009),
no. 4, 661โ700.
, Isometry groups of non-positively curved spaces: discrete subgroups, J. Topol. 2
(2009), no. 4, 701โ746.
J. Cheeger and M. Gromov, L2 -cohomology and group cohomology, Topology 25 (1986), no. 2,
189โ215.
R. Chow, Groups quasi-isometric to complex hyperbolic space, Trans. Amer. Math. Soc. 348
(1996), no. 5, 1757โ1769.
M. Coornaert, Mesures de Patterson-Sullivan sur le bord dโun espace hyperbolique au sens
de Gromov, Pacific J. Math. 159 (1993), no. 2, 241โ270 (French, with French summary).
A. Eskin, Quasi-isometric rigidity of nonuniform lattices in higher rank symmetric spaces,
J. Amer. Math. Soc. 11 (1998), no. 2, 321โ361.
B. Farb, The quasi-isometry classification of lattices in semisimple Lie groups, Math. Res.
Lett. 4 (1997), no. 5, 705โ717.
B. Farb and R. Schwartz, The large-scale geometry of Hilbert modular groups, J. Differential
Geom. 44 (1996), no. 3, 435โ478.
F. T. Farrell and L. E. Jones, Negatively curved manifolds with exotic smooth structures, J.
Amer. Math. Soc. 2 (1989), no. 4, 899โ908.
F. T. Farrell, L. E. Jones, and P. Ontaneda, Negative curvature and exotic topology, Surveys
in differential geometry. Vol. XI, Surv. Differ. Geom., vol. 11, Int. Press, Somerville, MA,
2007, pp. 329โ347.
F. T. Farrell and L. E. Jones, Topological rigidity for compact non-positively curved manifolds,
Differential geometry: Riemannian geometry (Los Angeles, CA, 1990), Proc. Sympos. Pure
Math., vol. 54, Amer. Math. Soc., Providence, RI, 1993, pp. 229โ274.
A. Furman, Mostow-Margulis rigidity with locally compact targets, Geom. Funct. Anal. 11
(2001), no. 1, 30โ59.
, On minimal strongly proximal actions of locally compact groups, Israel J. Math. 136
(2003), 173 โ 187.
H. Furstenberg, Rigidity and cocycles for ergodic actions of semisimple Lie groups (after
G. A. Margulis and R. Zimmer), Bourbaki Seminar, Vol. 1979/80, Lecture Notes in Math.,
vol. 842, Springer, Berlin, 1981, pp. 273โ292.
S. Gallot, D. Hulin, and J. Lafontaine, Riemannian geometry, 3rd ed., Universitext, SpringerVerlag, Berlin, 2004.
T. Gelander, A. Karlsson, and G. A. Margulis, Superrigidity, generalized harmonic maps and
uniformly convex spaces, Geom. Funct. Anal. 17 (2008), no. 5, 1524โ1550.
M. Gromov and W. Thurston, Pinching constants for hyperbolic manifolds, Invent. Math. 89
(1987), no. 1, 1โ12.
U. Hamenstaฬdt, Bounded cohomology and isometry groups of hyperbolic spaces, J. Eur. Math.
Soc. (JEMS) 10 (2008), no. 2, 315โ349.
T. Karube, On the local cross-sections in locally compact groups, J. Math. Soc. Japan 10
(1958), 343โ347.
D. Y. Kleinbock and G. A. Margulis, Bounded orbits of nonquasiunipotent flows on homogeneous spaces, Sinaฤฑฬโs Moscow Seminar on Dynamical Systems, Amer. Math. Soc. Transl. Ser.
2, vol. 171, Amer. Math. Soc., Providence, RI, 1996, pp. 141โ172.
B. Kleiner and B. Leeb, Rigidity of quasi-isometries for symmetric spaces and Euclidean
buildings, Inst. Hautes Eฬtudes Sci. Publ. Math. 86 (1997), 115โ197 (1998).
D. Kyed, H. D. Petersen, and S. Vaes, L2 -Betti numbers of locally compact groups and their
cross section equivalence relations, Trans. Amer. Math. Soc. 367 (2015), no. 7, 4917โ4956.
W. Luฬck, L2 -invariants: theory and applications to geometry and K-theory, Ergebnisse der
Mathematik und ihrer Grenzgebiete. 3. Folge. A Series of Modern Surveys in Mathematics [Results in Mathematics and Related Areas. 3rd Series. A Series of Modern Surveys in
Mathematics], vol. 44, Springer-Verlag, Berlin, 2002.
G. A. Margulis, Non-uniform lattices in semisimple algebraic groups, Lie groups and their
representations (Proc. Summer School on Group Representations of the Bolyai Jaฬnos Math.
Soc., Budapest, 1971), Halsted, New York, 1975, pp. 371โ553.
, Finiteness of quotient groups of discrete subgroups, Funktsional. Anal. i Prilozhen.
13 (1979), no. 3, 28โ39 (Russian).
44
[47]
[48]
[49]
[50]
[51]
[52]
[53]
[54]
[55]
[56]
[57]
[58]
[59]
[60]
[61]
[62]
[63]
[64]
[65]
[66]
[67]
[68]
[69]
[70]
[71]
[72]
[73]
[74]
URI BADER, ALEX FURMAN, AND ROMAN SAUER
, Discrete subgroups of semisimple Lie groups, Ergebnisse der Mathematik und ihrer
Grenzgebiete (3) [Results in Mathematics and Related Areas (3)], vol. 17, Springer-Verlag,
Berlin, 1991.
M. Mj, Pattern rigidity and the Hilbert-Smith conjecture, Geom. Topol. 16 (2012), no. 2,
1205โ1246.
N. Mok, Y. T. Siu, and S.-K. Yeung, Geometric superrigidity, Invent. Math. 113 (1993),
no. 1, 57โ83.
N. Monod, Superrigidity for irreducible lattices and geometric splitting, J. Amer. Math. Soc.
19 (2006), no. 4, 781โ814.
L. Mosher, M. Sageev, and K. Whyte, Quasi-actions on trees. I. Bounded valence, Ann. of
Math. (2) 158 (2003), no. 1, 115โ164.
G. D. Mostow, Strong rigidity of locally symmetric spaces, Princeton University Press, Princeton, N.J., 1973. Annals of Mathematics Studies, No. 78.
M. Olbrich, L2 -invariants of locally symmetric spaces, Doc. Math. 7 (2002), 219โ237.
D. Osin, Acylindrically hyperbolic groups, Trans. Amer. Math. Soc. 368 (2016), no. 2, 851โ
888.
H. D. Petersen, L2 -Betti numbers of locally compact groups, Ph.D. thesis, Department of
Mathematical Sciences, Faculty of Science, University of Copenhagen, 2012. 139 p.
P. Pansu, Meฬtriques de Carnot-Caratheฬodory et quasiisomeฬtries des espaces symeฬtriques de
rang un, Ann. of Math. (2) 129 (1989), no. 1, 1โ60 (French, with English summary).
G. Prasad, Strong rigidity of Q-rank 1 lattices, Invent. Math. 21 (1973), 255โ286.
, Elementary proof of a theorem of Bruhat-Tits-Rousseau and of a theorem of Tits,
Bull. Soc. Math. France 110 (1982), no. 2, 197โ202 (English, with French summary).
M. S. Raghunathan, Discrete subgroups of Lie groups, Springer-Verlag, New York-Heidelberg,
1972. Ergebnisse der Mathematik und ihrer Grenzgebiete, Band 68.
C. Ramos-Cuevas, On the displacement function of isometries of Euclidean buildings, Indag.
Math. (N.S.) 26 (2015), no. 2, 355โ362.
R. Sauer and M. Schroฬdl, Vanishing of โ2 -Betti numbers of locally compact groups as an
invariant of coarse equivalence (2017). ArXiv preprint:1702.01685.
R. E. Schwartz, The quasi-isometry classification of rank one lattices, Inst. Hautes Eฬtudes
Sci. Publ. Math. 82 (1995), 133โ168 (1996).
, Quasi-isometric rigidity and Diophantine approximation, Acta Math. 177 (1996),
no. 1, 75โ112.
Y. Shalom, Rigidity of commensurators and irreducible lattices, Invent. Math. 141 (2000),
no. 1, 1โ54.
, Rigidity, unitary representations of semisimple groups, and fundamental groups of
manifolds with rank one transformation group, Ann. of Math. (2) 152 (2000), no. 1, 113โ182.
F. K. Schmidt, Mehrfach perfekte Koฬrper, Math. Ann. 108 (1933), no. 1, 1โ25 (German).
B. Sun, Non-elementary convergence groups are acylindrically hyperbolic (2016). ArXiv
preprint: 1612.00134.
A. Thom, Low degree bounded cohomology and L2 -invariants for negatively curved groups,
Groups Geom. Dyn. 3 (2009), no. 2, 343โ358.
J. Tits, Buildings of spherical type and finite BN-pairs, Lecture Notes in Mathematics, Vol.
386, Springer-Verlag, Berlin-New York, 1974.
P. Tukia, On quasiconformal groups, J. Analyse Math. 46 (1986), 318โ346.
J. Tits, Sur le groupe des automorphismes dโun arbre, Essays on topology and related topics
(Meฬmoires deฬdieฬs aฬ Georges de Rham), Springer, 1970.
C. Wells, Automorphisms of group extensions, Trans. Amer. Math. Soc. 155 (1971), 189โ194.
K. Wortman, Quasi-isometric rigidity of higher rank S-arithmetic lattices, Geom. Topol. 11
(2007), 995โ1048.
C. Yue, The ergodic theory of discrete isometry groups on manifolds of variable negative
curvature, Trans. Amer. Math. Soc. 348 (1996), no. 12, 4965โ5005.
LATTICE ENVELOPES
Weizmann Institute, Rehovot
E-mail address: [email protected]
University of Illinois at Chicago, Chicago
E-mail address: [email protected]
Karlsruhe Institute of Technology
E-mail address: [email protected]
45
| 4math.GR
|
NEURAL NETWORK APPROACH TO RAILWAY
STAND LATERAL SKEW CONTROL
Peter Mark Beneลก1, Matouลก Cejnek1, Jan Kalivoda2 and Ivo Bukovsky1
1
Department of Instrumentation and Control Engineering, Czech Technical University,
Prague, Czech Republic
{PeterMark.Benes;Matous.Cejnek;Ivo.Bukovsky}@fs.cvut.cz
2
Department of Automobiles, Internal Combustion Engines and Railway Vehicles,
Czech Technical University, Prague, Czech Republic
[email protected]
ABSTRACT
The paper presents a study of an adaptive approach to lateral skew control for an experimental railway
stand. The preliminary experiments with the real experimental railway stand and simulations with its
3-D mechanical model, indicates difficulties of model-based control of the device. Thus, use of neural
networks for identification and control of lateral skew shall be investigated. This paper focuses on realdata based modelling of the railway stand by various neural network models, i.e; linear neural unit and
quadratic neural unit architectures. Furthermore, training methods of these neural architectures as such,
real-time-recurrent-learning and a variation of back-propagation-through-time are examined,
accompanied by a discussion of the produced experimental results.
KEYWORDS
Roller Rig, Linear Neural Unit, Quadratic Neural Unit, Real-Time-Recurrent-Learning (RTRL),
Back-Propagation-Through-Time (BPTT)
1. INTRODUCTION
An ongoing problem, which is currently under research in the railway industry, is that of lateral
skew control of railway carriage wheel sets with Independently Rotating Wheels (IRW). In
particular, the control of position of the leading wheel set of a railway carriage bogie, such to
achieve central positioning of the wheel set, with respect to the span of the rail track. Or
furthermore, to control the lateral deviation of the wheel set to follow a given desired set point.
The primary necessity for such control arises from the need to improve behaviour of IRW wheel
sets, as currently under study at CTU, on an experimental railway stand (roller rig). Particularly,
for minimisation of wheel flange and rail head wearing as well as lateral forces and,
furthermore, optimal stability at higher speeds of the wheel set. To date, various methods for
control of the wheel set lateral position of IRW wheel sets have been under investigation, with
both mechanical and electrical means of control [2], each featuring their own, individual
drawbacks.
At CTU, the latest study features active control of the roller rig through manipulation of the yaw
torque of the rig wheel set [1], via a state feedback and cascade PID control for a linearization
of the model of the CTU roller rig. However, the results from this initial experimentation shows,
that such method is not suitable for real time control. Thus, this paper aims to investigate the
possible use of a neural network approach for lateral control of such railway wheel sets. The
suitability of application to this problem is motivated by promising theoretical studies of higherorder neural units (HONUs), especially the quadratic neural unit for engineering problems for
[3]-[7]. These studies are focused on the use of supervised learning based approaches for
polynomial structured neural units, also known as a class of HONUs, for adaptive identification
and control of real engineering systems. Further motivation arises from the successful
implementation of a quadratic neural unit controller (Neuro-controller), for control of a
bathyscaphe system located in the automatic control laboratories of CTU [12]. Where, here,
such controller adhered more closely to the desired behaviour of the system than the
conventionally used PID controller. An extension on this result can be recalled in the work [11].
Where, further study was made via introduction of a new software for adaptive identification
and control, along with further testing on both a theoretical system and the previously
mentioned bathyscaphe system. Given this, in this paper we aim to investigate use of neural
network (NN) approaches in the following manner. We will begin by explaining in more depth
the problem behind the recently employed state feedback and cascade PID control of the
linearization of the CTU roller rig. The proceeding section will then describe the principles and
control schemes behind the various experimented methods, for adaptive identification and
control. Following this, an experimental analysis of the various approaches of NN, focusing
firstly on adaptive identification of the CTU roller rig system and then to test the various NN
methods for control. The final component of this paper will then be, to analyse and compare the
produced experimental results, with a conclusion to be drawn at the end.
2. PROBLEM DESCRIPTION
This section aims to describe in more depth, the functionality behind the previously introduced
experimental railway stand (CTU roller rig). More importantly, for the scope of this paper, we
will elaborate on the necessity for control of such roller rig and the issues of conventional linear
PID control or state feedback control, for controlling the lateral skew.
2.1
Experimental Setup of the Roller Rig at CTU
The below figure (Figure 1) depicts the experimental setup of the CTU roller rig, along with the
3-D model for design and simulation purposes. This rig features 5 motor drives, two pairs of
0.5m diameter rollers are independently driven, via the largest of the set of drives (FM1 & 2).
To simulate both straight and curved tracks, similar to those present on real railway networks.
A central servo motor (FM4) was introduced, to yaw the lower roller pair for replicating curved
track motion. This setup however, assumes simulation of a rail pair without effects of rail
buckling. For manipulation of the wheel set yaw, a separate servo motor, central to the wheel
set (FM3) is installed. For the scope of this paper, this is the most crucial component, as it is the
action of this servo motor that is used for control actuation for the lateral skew of the wheel sets.
Where, the discussed control setups in this paper will analyse control via manipulation of this
servo motor torque. Finally, a fifth drive FM5 is located between the front roller set, as a control
differential.
Figure 1: CTU Roller Rig (real left, PTC Pro/Engineer 3-D model on the right)
2.2
Problem of the State Feedback and Cascade PID Control
In the work [1], the method of lateral skew control via state feedback with cascade PID setup is
introduced. In this presented setup, a linearization of the roller rig is used, via translation to a
state space representation, achieved via a 12x12 matrix of dynamics. However, according to
theory, this linearization of the roller rig system appeared to be uncontrollable and unobservable
via analysis by common linear algebra and control approaches.
Figure 2: Control loop on linearization of the roller rig with State feedback + Cascade PID
control
The above figure (Figure 2), depicts the control scheme for this setup. After numerous testing, it
was found that a simulation step of approximately < 1E-6 was necessary, in order to achieve
stability of the continuous control loop, which cannot be used for practical application. Hence, it
is for this reason that an alternative approach is necessary for the lateral skew control of such
railway wheel set. Thus, this paper aims on investigating the possibility of adaptive
identification and control of the stand, based on measured data. For the purposes of this paper
the data will be generated via a 3-D simulation model via software SIMPACK, linked via
SIMAT toolbox with MATLAB Simulink, to provide real time simulation of the roller rig as a
plant system for the investigated control approaches. Then, this data will be used as the training
data for neural network models, to simplify otherwise complex simulation models and to allow
a constant sampling for real time usability, furthermore, investigation into the potentials for
real-time neural-network based control.
3. APPLIED METHODS
In this section, the various NN approaches, aimed for adaptive identification and control of the
previously introduced lateral skew problem, will be described. These approaches are based on
the well know Gradient Descent (GD) method used as a tool for defining the learning rule of the
applied neural units. These applied neural units (adaptive models) are trained via two methods,
which will be focused on in this paper. These methods are namely, the method of incremental
training or Real Time Recurrent Learning (RTRL) [8] applicable for dynamic adaptive models
or a batch form of training, which is a variation of the back propagation through time or (BPTT)
training [10], as an extension of RTRL training in combination with the famous LevenbergMarquardt equation.
3.1
Preliminaries
This subsection aims to review the important theories from works [11]-[13], behind the GD
method and structures of the neural units used within this paper. Firstly, we will begin by
introducing the famous GD algorithm for the linear and quadratic neural units. To understand
this, we must begin with the polynomial models of the linear and quadratic (LNU and QNU)
neural units respectively, as follows
n
y = โ xi wi = w0 .x0 +w1.x1 + ... + wn .xn = w.x
(1)
y = โโ xi x j wi , j = w0,0 x0 x0 +w0,1 x0 x1 + ... + wn,n xn 2 = rowx.colW
(2)
i =0
n
n
i =0 j =0
Where, y represents the output of the LNU (1) and QNU (2) respectively. In regards to the
LNU, w stands for an updatable vector of neural weights and x, represents the input values of
the engineering system in the case of a purely static model and in the sense of a dynamic model,
a combination of inputs of the real system and neural model outputs. Looking at equation (2),
rowx is a long-vector representation of the utilised input vector. Where, colW represents a
weight matrix of the quadratic neural unit in general. From this, we may then understand the
GD algorithm as applied to such neural units.
wi +1 = wi + ยต .e(k ).
โy (k )
โwi
colW(k +1) = colW(k ) + ยต.e(k ).
โy (k + 1)
โcolW
(3)
(4)
Here, equation (3) & (4) depicts the GD algorithm for both the LNU and QNU respectively.
Here the output of the GD algorithm is to incrementally over sample-by-sample, update the
neural weights such to adaptively teach the LNU or QNU model, to learn the engineering
system. Here, ยต represents the learning rate of the GD algorithm. This is analogical to humans
where, setting ยต relatively high, corresponds to faster learning of the human and consequently,
means the less detail the human can remember and digest from their learning. Furthermore,
setting this parameter to a smaller value, corresponds to a slowing rate of learning i.e. the
human may remember the information learned, quite well, but less information overall about the
subject. The next parameter is e(k) (k representing the number of the sample), this represents the
current error between the real and calculated output of the model. The final term
โy (k )
,
โwi
corresponds to the partial derivatives of the neural unit output, with respect to the individual
neural weights.
Regarding the QNU in equation (4), we see that the GD algorithm is analogical, with exception
of updating the matrix of neural weights as opposed to a vector in the sense of the LNU.
Till now, the structures of GD for LNU and QNU were reviewed in the format of RTRL or
sample-by-sample method of learning. Where, the neural weights are updated over each new
sample of the engineering system data. However for certain engineering processes, it is more
advantageous to use the BPTT batch method of training these neural weights, over runs of the
algorithm rather than over each sample. This is because the RTRL method focuses on the
contemporary governing law of the system as opposed the BPTT which focuses more so on the
main governing law of the input and outputs of the engineering system. The BPTT method is
achieved via an extension of the RTRL method with combination of the famous LevenbergMarquardt equation. It is also important to note that this method is more preferable in cases
where the data may be affected by noise. The following equation denotes the weight update rule
for the BPTT method;
ฮw = (JT .J +
1
ยต
.I)โ1.JT .e
(5)
Here, the neural weights are updated over each run of the algorithm (or batch trained) in the
following way w=w+ฮw. Here equation (5) describes the change, necessary for the update of
the batch trained weights. Where, J represents the Jacobian matrix of derivatives for the neural
unit. This may be the complete partial derivatives of the neural model with respect to each
neural weights, or in practical applications it seems useful to simply introduce this Jacobian
matrix as the input vector or matrix itself, being x and colx for LNU and QNU respectively.
Furthermore, it is important to note that colx = rowxT .
Often in such adaptive neural units, it is apparent that a modification of the normalised learning
rate may be used to solve issues associated with instability of learning. In practise, it is possible
to employ the simplified normalised learning rate as presented in the work [11], as follows;
ฮท=
ยต
x(k)x(k)T + 1
(6)
Where, equation (6) represents the normalised learning rate in the sense of LNU. This is
analogically represented in the QNU, by replacement of x(k) (i.e. each k th sample of the input
vector x) with colx(k). It should be noted that the above representation holds for RTRL training
for dynamic adaptive models, where the algorithms used in this paper for BPTT method of
training, take the learning rate ยต itself.
3.2
Adaptive Identification and control
The previous section focused on usage of neural units in the sense of adaptive identification of a
real engineering system. In this subsection, we extend on these neural units as a method of
control, with brief review from works [11]-[13], and extension as applied to the lateral skew
problem, which is indeed our focus within this paper.
Figure 3: Adaptive Identification with supervised learning of neural networks (where,
w.x=LNU, rowX.colW=QNU)
The above figure (Figure 3), depicts the identification scheme for the previously reviewed
neural network architectures. Where, for the scope of this paper a simulation of the real roller
rig will be used for data generation of the investigated neural network approaches for control. u,
represents the input data of the roller rig, in our case this is the yaw torque of the servo motor
system for manipulating the lateral skew of the wheel set. The output yreal, is the simulated
output from the real time 3-D SIMPACK model and y, being the output of the neural unit, and
the difference being the error, e.
Figure 4: Adaptive control loop for experimental study of a neural network controller (where,
w.x=LNU, rowX.colW=QNU)
The above (Figure 4), shows an extension of the discussed neural architectures for application
to lateral skew control of the roller rig system. Here, once the neural unit as a model is
identified, it may be utilised as the foundation for a neural network based control setup. For the
scope of this paper, we will propose an offline tuned control scheme, as the goal here, is to
investigate the potentials of applying a neural network based control, for this application.
However, the extension to online control is indeed the ultimate aim of our research to this
problem, beyond this paper. Figure 4, depicts use of a second neural unit as a controller.
Similarly to the previously mentioned architectures, as a controller here too the neural unit may
take shape to that of the LNU or QNU adaptive models. However, in this case the adaptive
neural weights are tuned differently to that of those used for the neural unit as a model and
hence, depicted as v. Analogically, should a QNU structure be applied, these neural weights
would be represented in a matrix form. Further to this, the above figure (Figure 4) introduced a
new vector ฮพ. This vector comprises of a combination of outputs from the neural unit as a
model and the difference between the desired behaviour (in our case desired yaw torque or
lateral skew of the roller rig) and the output of the neural model. v. ฮพ or collectively, the
variable q, thus serves as a manipulator for the newly feed samples of the neural unit as an
identified model. Here the GD algorithms are employed in the following manner to achieve
sample-by-sample adaptation of the neural weights for the controller, as follows;
vi +1 = vi + ยต.ereg (k ).
โy (k )
โvi
(7)
Where vi , are adaptable neural weights of the neural unit as a controller and ereg(k) is the error
between the desired value of the real system (in our case the roller rig, where the desired value
will be denoted as d) and the real system output value at sample k.
โy (k )
, is the partial
โvi
derivative of the output of the neural unit as a model, with respect to the individual adaptive
neural weights of the neural unit as a controller. An extension of this weight update scheme for
BPTT training would result in the following form v=v+ฮv, where the change of neural weights
for each batch would be analogical to equation (5).
4. EXPERIMENTAL ANALYSIS
This section aims to analyse the previously reviewed methods of adaptive identification and
control, via the introduced neural network architectures. Particularly, we aim to investigate the
applicability of the discussed neural architectures for this problem of the lateral skew control of
railway wheel sets. In this section, we will simulate our results using simulation data of the
previously described 3-D SIMPACK model (at mid-range speed) linked with MATLAB
Simulink in real time simulation. The data was produced with 0.001 sampling over a 10 second
interval. First, we will analyse the results for identification of the roller rig as a system, via the
different methods of the neural network models, followed by an extension of control, where the
various combinations of neural network architectures will be tested.
DLNU with RTRL
Almost exact identification of
Roller Rig data (lines are superimposed)
Deviation of the model with the Roller Rig data,
over each sample
Figure 5: Testing of the adaptive identification, where the plant (roller rig) is represented by
blue colour and green being the neural model. Trained by DLNU with RTRL Training; ยต=1,
epochs =10, For ny=3 (previous samples of model output) and nu=5 (previous samples of real
system input)
The above figure (Figure 5) and following figure (Figure 6), illustrates the adaptive
identification process of the roller rig system data. We can note, that both methods of the
dynamic LNU or (DLNU) and dynamic QNU or (DQNU), for RTRL learning methods,
achieved almost exact identification. Where, the DQNU performed slightly faster in terms of
convergence to minima of sum of square errors, as opposed to the DLNU.
DQNU with RTRL. Excellent identification with slightly
faster learning than the DLNU of same parameters
Error of model is still within an
excellent range
Sum of square errors decreases more quickly
with the DQNU for same parameters.
Figure 6 : Testing of the adaptive identification, where the plant (roller rig) is represented by
blue colour and green being the neural model. Trained by DQNU with RTRL Training; ยต=1,
epochs =10, For ny=3 (previous samples of model output) and nu=5 (previous samples of real
system input)
Desired (black dashed)
Roller Rig system data (blue)
Neural controller (magenta) applied to
identified Roller Rig data
Error plot illustrates deviation of the Neural
Controller and desired behaviour.
Sum of Square Errors reaches
close to 10-4 after 50 epochs
Figure 7: Testing of the adaptively tuned control loop, where the roller rig is represented by
trained DLNU with constant and previously trained parameters (Figure 5) and the adaptive
feedback controller is trained via LNU, after 10 epochs Adaptive Identification (of DLNU with
RTRL) + Neural Unit Controller for lateral skew control of roller rig system - Using LNU with
Incremental training ยต=0.1, Data re-sampling = each 5th sample, epochs =200, for nqy=0
(previous samples of neural model output) and nqe=2 (previous samples of difference of the
neural model output and desired behaviour of the system.
Closer to desired behaviour of the system
with QNU + BPTT
The difference of the Neural Controller
and desired behaviour is within +0.2 to
-0.2 mm.
Sum of Square Errors reaches close to 10-4
after only few epochs, with QNU and BPTT
training.
Figure 8: Testing of the adaptively tuned control loop, where the roller rig is represented by
trained DQNU with constant and previously trained parameters (Figure 6) and the adaptive
feedback controller is trained via QNU,
after 10 epochs Adaptive Identification (of DQNU with RTRL) + Neural Unit Controller for
lateral skew control of roller rig system - Using QNU with BPTT Training ยต=0.00818,
epochs=5, for nqy=0 and nqe=3
Here, Figure 7 & Figure 8 show the application of the various neural units for control of the
lateral skew. The black dotted line, illustrates the chosen desired behaviour of the roller rig
lateral skew. It was found that the BPTT training method used in combination with the QNU
had the best performance. Providing closer control to the desired behaviour, as compared with
the incremental training methods of both LNU and QNU architectures.
Desired lateral skew (black dashed line)
set to ideal position of zero
Model provides almost exact response to the
desired after the first few samples.
Figure 9: Testing of the adaptively tuned control loop, where the roller rig is represented by
trained DQNU with constant and previously trained parameters (Figure 6) and the adaptive
feedback controller is trained via QNU,
after 10 epochs Adaptive Identification (of DQNU with RTRL) + Neural Unit Controller for
lateral skew control of roller rig system - Using QNU with BPTT Training ยต=0.001, epochs=5,
for nqy=3, nqe=3
Figure 9 depicts a theoretical test of the roller rig system under an idealised case of zero lateral
skew. This is included in our results to investigate the capability of the used neural controller.
From this figure, we see that after several small samples at the beginning of the controllerโs
application the controller provides almost exactly zero lateral skew. This result however, must
be reasoned with what is really possible in terms of actuation of the real system and real
conditions of the rig, such to achieve this ideal of a result.
5. DISCUSSION OF EXPERIMENTAL RESULTS
In the previous section, the experimental results of the various neural network architectures for
adaptive identification and control were presented. From the first set of figures, regarding the
adaptive identification for the roller rig system, it was found that the most suitable learning
method for both the DLNU and DQNU was the RTRL training method. Here, relatively few
epochs were adequate for both architectures to identify the system data, with almost exact
identification. The DQNU model was slightly faster in learning the behaviour of the system,
thus, was used as the identified neural unit as a model, in the control section. The extension of
these various architectures for control showed more distinguishable results. The application of
both LNU and QNU with incremental learning for the neural controller was only possible when
a higher number of epochs were run, or higher learning of the model with a small learning rate.
Few runs of the algorithm were unable to match the desired behaviour even moderately.
However, after the first few samples of application as in Figure 7, reasonable behaviour of the
controller was achieved. The combination of identification via the DQNU followed by
extension of a QNU trained by BPTT on the neural controller, showed to follow more closely to
the desired behaviour of the roller rig system than the other tested combinations. Where, the
setup of the QNU with BPTT neural controller featured input vector ฮพ, being comprised only of
several errors or differences of the desired behaviour, with the output of the neural unit as a
model. Further to this, the training was substantially quicker than the incremental training
method, showing that only several epochs were sufficient for the model to achieve its optimal
behaviour with respect to the desired of the system.
In the above results, two forms of the desired behaviour were used. The first was under proposal
that the lateral derivation of the wheel set would be within a small tolerance range, which is
most realistic in real application of such control. The presented desired data is relative to the
small range of lateral skew in the simulation data. Where, within this exampled range, we could
be sure the wheel flanges would not contact the rails of the real roller rig. The desired behaviour
is however relative to the setup of the wheel sets and rails, thus the desired deviation and lateral
skew outputs may indeed vary for real railway applications. The second was an idealised
situation where no lateral skew at all would occur. This is principally unrealistic for the neural
controller to achieve zero lateral skew, due to a combination of natural factors on real railway
wheel sets, however for demonstrational purposes, we may note the capability of the neural
controller, providing almost exact behaviour of the idealised lateral skew, as applied on the
identified roller rig system.
6. CONCLUSION
Referring back to the original control loop depicted in Figure 1 (as presented in work [1]), of the
Simulink model of the linearization of the roller rig system and state feedback with cascade PID
controller. We can recall that a minimum sampling of <1E-6 seconds for numerical stability was
necessary, which is not possible for practical application. After investigation of the presented
neural network approaches, we may conclude that it has promising potential for real application
on controlling the lateral skew of IRW railway wheel sets. Now, we note that the achieved
sampling can be within order of 0.005 (5E-3) seconds, for adequate functionality of the neural
network based, adaptive identification and control system as applied to the roller rig. The tested
models in this paper were DLNU and DQNU for adaptive identification models and LNU or
QNU architectures as a controller. The experimental results of these architectures showed that
both DLNU and DQNU, precisely approximated the complex SIMPACK model of the roller rig
system. This result however could vary when using more or, real training data measured from
the rig itself. In terms of control of the lateral skew, the QNU architecture showed better results
to keep the lateral skew within close limits to the desired behaviour of the system, which is also
in general consensus with our previous findings on using QNU for control. We also can note the
significantly faster tuning of the control loop via QNU as compared to the LNU, more
particularly, the BPTT training method as applied to the controller compared to the incremental
method. Where, more desirable control was shown, in much fewer epochs or runs of the
controller algorithm. Thus, this case study shows that with proper tuning of the investigated
neural units, application to the real system is theoretically possible, to achieve adequate control
for this investigated problem. Thus, real application of such adaptive control loop of neural
network based architecture, is indeed the very next step of our research.
ACKNOWLEDGEMENTS
The authors would like to acknowledge the following grant for support during this work:
SGS12/177/OHK2/3T/12SGS12/177/OHK2/3T/12, Non-conventional and Cognitive Signal
Processing Methods of Dynamic Systems.
And also the Technology Agency of Czech Republic. Project No: TE01020038 โCompetence
Center of Railway Vehiclesโ.
REFERENCES
[1] J. Kalivoda, P. Bauer (2013) โCurving Behaviour of 2-Axle Bogie with Independently Rotating
Wheels โ Simulations and Scaled Roller Rig Testsโ- 23rd International Symposium on Dynamics of
Vehicles on Roads and Tracks, Qingdao, China, August 19th-23rd.
[2] S. Bruni, R. M. Godall, T.X. Mei, H. Tsunashima (2007) โControl and monitoring for railway
vehicle dynamicsโ, Vehicle System Dynamics, vol. 45 issue 7-8, pp. 743-779
[3] Gupta, M., M., Bukovsky, I., Homma, N., Solo M. G. A., Hou Z.-G. (2012): โFundamentals of
Higher Order Neural Networks for Modeling and Simulationโ, in Artificial Higher Order Neural
Networks for Modeling and Simulation, ed. M. Zhang, IGI Global,.
[4] Bukovsky, I., Bila, J., Gupta, M., M, Hou, Z-G., Homma, N. (2010): โFoundation and Classification
of Nonconventional Neural Units and Paradigm of Nonsynaptic Neural Interactionโ in Discoveries
and Breakthroughs in Cognitive Informatics and Natural Intelligence within the series of the
Advances in Cognitive Informatics and Natural Intelligence (ACINI), ed. Y. Wang, IGI Publishing,
Hershey PA, USA, ISBN: 978-1-60566-902-1, pp.508-523.
[5] Bukovsky, I., Homma, N., Smetana, L., Rodriguez, R., Mironovova M., Vrana S. (2010): โQuadratic
Neural Unit is a Good Compromise between Linear Models and Neural Networks for Industrial
Applicationsโ, ICCI 2010 The 9th IEEE International Conference on Cognitive Informatics,
Tsinghua University, Beijing, China, July 7-9.
[6] Bukovsky I., S. Redlapalli and M. M. Gupta (2003): Quadratic and Cubic Neural Units for
Identification and Fast State Feedback Control of Unknown Non-Linear Dynamic Systems, Fourth
International Symposium on Uncertainty Modeling and Analysis ISUMA 2003, IEEE Computer
Society, , Maryland USA, ISBN 0-7695-1997-0, p.p.330-334
[7] Rodriguez , R., Bukovsky, I., Homma, N.: โPotentials of Quadratic Neural Unit for Applicationsโ, in
International Journal of Software Science and Computational Intelligence (IJSSCI) ,vol 3, issue 3,
IGI Global, Publishing, Hershey PA, USA ISSN.
[8] Bukovsky, I., Lepold, M., Bila J. (2010): โQuadratic Neural Unit and its Network in Validation of
Process Data of Steam Turbine Loop and Energetic Boilerโ,WCCI 2010, IEEE Int. Joint. Conf. on
Neural Networks IJCNN, Barcelona,Spain.
[9] R. J. Williams and D. Zipser (1989) โA learning algorithm for continually running fully recurrent
neural networks,โ Neural Computation, vol. 1, pp. 270โ280.
[10] P. J.Werbos (Oct. 1990) โBackpropagation through time: What it is and how to do itโ Proc. IEEE,
vol. 78, no. 10, pp. 1550โ1560.
[11] Peter M. Benes (2013): Software Application for Adaptive Identification and Controller Tuning
Student's Conference STC, Faculty of Mechanical Engineering, CTU in Prague.
[12] Ladislav Smetana (2008): โNonlinear Neuro-Controller for Automatic Control Laboratory Systemโ,
Masterโs Thesis, Czech Tech. Univ. in Prague,
[13] Laboratory System Batyscaphe, Automatic Control Laboratory, Dpt. of Instr. and Cont. Eng., FME,
Czech Technical University in Prague, online http://vlab.fsid.cvut.cz/en/ulohy/batyskaf.php, 2010.
Short Biography of the Authors
Peter Mark Beneลก received his Bachelorโs
degree with honours at Czech Technical
University (CTU) in Prague in 2012. Currently
he is a Masterโs student, with expected PhD
studies to follow in 2014. His research focuses
on non-conventional neural networks for
adaptive identification and control of industrial
systems including hoist mechanisms and skew
control of rail-based mechanisms as such cranes
and railway vehicles. Peterโs work has been
awarded in local and international student
competitions also with an industrial BOSCH
award in 2013.
Matouลก Cejnek received his Bachelorโs degree
at Czech Technical University (CTU) in Prague
in 2012. Currently he is a Masterโs student at
Czech Technical University in Prague. His
research focuses on non-conventional neural
networks for adaptive systems and novelty
detection in time series and biomedical
applications. Matousโs work has been awarded
in local and international student competitions
2013.
Jan Kalivoda graduated from Czech Technical
University (CTU) in Prague where he received
his Masterโs degree with honours in 1996 and
Ph.D. in the field of Machines and Equipment
for Transportation in 2006. Currently he is a
teacher and active researcher in the Department
of Automotive, Combustion Engine and
Railway Engineering at CTU. His research
interests include MBS models of railway
vehicles, Mechatronics for railway vehicles,
Active control of railway vehicle suspensions
and wheel sets.
Ivo Bukovsky graduated from Czech Technical
University in Prague (CTU) where he received
his Ph.D. in the field of Control and System
Engineering in 2007 and became associate
professor since 2013. His research interests
include higher-order neural networks, adaptive
evaluation of time series and systems, multiscale-analysis
approaches,
control
and
biomedical applications. He was a visiting
researcher at the University of Saskatchewan
(2003), at the University of Manitoba in Canada
(2010), and he was a visiting professor at
Tohoku University (2011)
| 9cs.NE
|
Sequential Coding of GaussโMarkov Sources
arXiv:1702.01779v3 [cs.IT] 3 Jun 2017
Anatoly Khina, Ashish Khisti, Victoria Kostina, and Babak Hassibi
AbstractโWe consider the problem of sequential transmission
of GaussโMarkov sources. We show that in the limit of large
spatial block lengths, greedy compression with respect to the
squared error distortion is optimal; that is, there is no tension between optimizing the distortion of the source in the current time
instant and that of future times. We then extend this result to the
case where at time t a random compression rate Rt is allocated
independently of the rate at other time instants. This, in turn,
allows us to derive the optimal performance of sequential coding
over packet-erasure channels with instantaneous feedback. For
the case of packet erasures with delayed feedback, we connect
the problem to that of compression with side information that
is known at the encoder and may be known at the decoder โ
where the most recent packets serve as side information that may
have been erased. We conclude the paper by demonstrating that
the loss due to a delay by one time unit is rather small.
Index TermsโSequential coding of correlated sources, successive refinement, source streaming, packet erasures, source coding
with side information.
I. I NTRODUCTION
Sequential coding of sources is increasingly finding applications, such as real-time video streaming, and cyberphysical
and networked control. Such systems use compressed packetbased transmission and strive to achieve minimum distortion
for the given compression rates.
This setting was introduced and treated for the two-source
case by Viswanathan and Berger [1] and for more users in [2]โ
[5]. For the special case of GaussโMarkov sources, an explicit
expression for the achievable sum-rate for given distortions
was derived in [2], [3] and extended for the (general) jointly
Gaussian three-source case in [6].
In practice, however, packet-based protocols are prone to
erasures and possible delays. The case of sequential coding
in the presence of packet erasures was treated for various
erasure models. The case when only the first packet is prone
to an erasure was considered in [7]. A more general approach
which trades between the performance given all previously
sent packets and the performance given only the last packet
was proposed in [8]. For random independent identically
distributed (i.i.d.) packet erasures, a hybridation between
pulse-code modulation (PCM) and differential PCM (DPCM),
termed leaky DPCM, was proposed in [9] and analyzed for the
case of very low erasure probability in [10]. The scenario in
which the erasures occur in bursts was considered in [11],
[12]. There, a sequence of source vectors sampled from a
A. Khina, V. Kostina and B. Hassibi are with the Department of Electrical Engineering, California Institute of Technology, Pasadena, CA 91125,
USA. E-mails: {khina, vkostina, hassibi}@caltech.edu
A. Khisti is with the Department of Electrical and Computer Engineering, University of Toronto, Toronto, ON M5S 3G4, Canada. E-mail:
[email protected]
GaussโMarkov process in the temporal dimension must be
encoded sequentially and reconstructed with zero delay at the
decoder. The channel introduces a burst of erasures of a certain
maximum length and the decoder is not required to reconstruct
the sequences that fall in the erasure period and a recovery
window following it.
All of these works assume no feedback is available at the
encoder, namely that the encoder does not know whether a
transmitted packet successfully arrives to the decoder or is
erased in the process.
In this paper, we first consider the problem of sequential
coding of GaussโMarkov sources and determine the rateโ
distortion region for large frames. Specifically, we show that
greedy quantization that optimizes the distortion for each time
is also optimal for minimizing the distortion of future time
instants. This insight allows us to extend the result to the case
where the compression rate rt available for the transmission of
the packet at time t is determined just prior to its transmission.
The packet-erasure channel with instantaneous output feedback (ACK/NACK) can be viewed as a special case of
the above noiseless channel with random rate allocation,
with rt = 0 corresponding to a packet-erasure event [13].
The optimal rateโdistortion region of sequential coding of
GaussโMarkov sources in the presence of packet erasures and
instantaneous output feedback thereby follows as a simple
particularization of our more general result.
We further tackle the more challenging delayed feedback
setting, in which the encoder does not know whether the
most recently transmitted packets arrived or not. Viewing these
recent packets as side information (SI) that is available at
the encoder and possibly at the decoder, and leveraging the
results of Kaspi [14] along with their specialization for the
Gaussian case by Perron et al. [15],1 we adapt our transmission
scheme to the case of delayed feedback. We provide a detailed
description of the proposed scheme for the case where the
feedback is delayed by one time unit and demonstrate that the
loss compared to the case of instantaneous feedback is small.
II. P ROBLEM S TATEMENT
We now present the model of the source, channel, and the
admissible encoder and decoder both of which are required to
be causal in this work; see Fig. 1.
Throughout the paper, kยทk denotes the Euclidean norm.
Random variables are denoted by lower-case letters with
1 The scenario considered in [14], [15] can be also viewed as special
case of the results of Heegard and Berger [16], where the SI is not available
at the encoder, by adjusting the distortion measure and โaugmentingโ the
source [17]. Interestingly, knowing the SI at the encoder allows one to improve
the optimal performance of this scenario in the Gaussian case; see Rem. 9.
wt
st = ฮฑt stโ1 + wt
st
Encoder
N Rt
bits
Decoder
sฬt
We further define the steady-state distortion (assuming the
limit exists):
Dโ , lim Dt .
Fig. 1: Sequential coding of a GaussโMarkov source setup.
temporal subscripts (at ), and random vectors (โframesโ) of
length N by boldface possibly accented lower-case letters with
ห t ). We denote temporal sequences by
temporal subscripts (at , aฬ
at , (a1 , . . . , at ). N is the set of natural numbers. All other
notations represent deterministic scalars.
We assume that the communication spans the time interval
[1, T ], where T โ N.
Source: Consider a GaussโMarkov source {st }, whose outcomes are vectors (โframesโ) of length N with i.i.d. samples
along the spatial dimension, that satisfy the temporal Markov
relation:
st = ฮฑt stโ1 + wt ,
t = 1, . . . , T ,
(1)
where {ฮฑt } are known process coefficients that satisfy
|ฮฑt | < 1, and the outcomes of {wt } are i.i.d. along the spatial
dimension, Gaussian and mutually independent across time
of zero mean and variances {Wt }. We assume s0 = 0 for
convenience.
Denote by St , N1 E kst k2 the average power of the
entries of vector st . Then, we obtain the following recursive
relation:
St = ฮฑt2 Stโ1 + Wt ,
t = 1, . . . , T ,
(2a)
S0 = 0.
(2b)
Channel: At time t, a packet ft โ 1, 2, . . . , 2N Rt is sent
over a noiseless channel of finite rate Rt .
Causal encoder: Sees st at time t and applies a causal
function Ft to the entire
source sequence st to
observed
N Rt
generate a packet ft โ 1, 2, . . . , 2
:
t
ft = Ft s .
(3)
Causal decoder: Applies a causal function Gt to the
sequence of received packets f t to construct an estimate sฬt of
st , at time t:
sฬt = Gt f t .
(4)
Distortion: The mean-square error distortion at time t is
defined as
i
1 h
2
Dt , E kst โ sฬt k .
(5)
N
If we specialize the source process into that of fixed
parameters, namely,
ฮฑt โก ฮฑ,
t = 1, . . . , T ,
Wt โก W,
then its power converges to
Sโ =
W
.
1 โ ฮฑ2
(6)
T โโ
Definition (Distortion-rate region). The distortionโrate region
is the closure of all achievable distortion tuples DT ,
(D1 , . . . , DT ) for a rate tuple RT , (R1 , . . . , RT ), for any
N , however large; its inverse is the rateโdistortion region.
III. D ISTORTION โR ATE R EGION OF S EQUENTIAL C ODING
OF G AUSS โM ARKOV S OURCES
The optimal achievable distortions for given rates for the
model of Sec. II are provided in the following theorem.
Theorem 1 (Distortionโrate region). The distortionโrate region of sequential coding for a rate tuple RT is given by all
distortion tuples DT that satisfy Dt โฅ Dtโ with
โ
Dtโ = ฮฑt2 Dtโ1
+ Wt 2โ2Rt ,
t = 1, . . . , T , (7a)
D0โ = 0.
(7b)
Remark 1. Th. 1 establishes the optimal rateโdistortion region
for the โcausal encoderโcausal decoderโ setting of Ma and
Ishwar [2] for the case of GaussโMarkov sources. We note that
Ma and Ishwar [2] provide an explicit result only for the sumrate for the GaussโMarkov case [3]. Torbatian and Yang [6]
extend the sum-rate result to the case of three jointly Gaussian
sources (which do not necessarily constitute a Markov chain).
Our work, on the other hand, fully characterizes the rateโ
distortion region for the case of GaussโMarkov sources.
Remark 2. The results and proof (provided in the sequel) of
Th. 1 imply that optimal greedy quantization at every step โ
which is achieved via Gaussian backward [18, Ch. 10.3] or
forward [18, pp. 338โ339] channels โ becomes optimal when
N is large. Moreover, it achieves the optimum for all t โ
[1, T ] simultaneously, meaning that there is no tension between
minimizing the current distortion and future distortions.
To prove this theorem we first construct the optimal greedy
scheme and determine its performance in Sec. III-A. We then
show that it is in fact (globally) optimal when N goes to
infinity, by constructing an outer bound for this scenario, in
Sec. III-B.
A. Achievable
We construct an inner bound using the optimal greedy
scheme. In this scheme all the quantizers are assumed to be
minimum mean square error (MMSE) quantizers. We note that
the quantized values of such quantizers are uncorrelated with
the resulting quantization errors.
Scheme.
Encoder. At time t:
โข Generates the prediction error
sฬt , st โ ฮฑt sฬtโ1 ,
(8)
where sฬtโ1 , defined in (4), is the previous source reconstruction at the decoder, and sฬ0 = 0. A linear recursive
relation for sฬt is provided in the sequel in (9) .2
โข Generates ห
sฬt , the quantized reconstruction of the prediction error sฬt , by quantizing sฬt using the optimal MMSE
quantizer of rate Rt and frame length N .
โข Sends ft = ห
sฬt over the channel.
Decoder. At time t:
โข Receives ft .
โข Recovers a reconstruction ห
sฬt of the prediction error sฬt .
โข Generates an estimate sฬt of st :
sฬt = ฮฑt sฬtโ1 + หsฬt .
(9)
The optimal achievable distortions {Dt } of this scheme for
long frame lengths N , are as follows.
Assertion 1 (Inner bound). Let > 0, however small. Then,
the expected distortion of the scheme at time t โ [1, T ] satisfies
the recursion
Dt โค ฮฑt2 Dtโ1 + Wt 2โ2Rt + ,
t = 1, . . . , T , (10a)
D0 = 0,
(10b)
for a large enough N .
Proof: First note that the error between st and sฬt , denoted
by et , is equal to
et , st โ sฬt
= (sฬt + ฮฑt sฬtโ1 ) โ ฮฑt sฬtโ1 + หsฬt
= sฬt โ หsฬt
Assertion 2 (Outer bound). Consider the setting of Sec. II.
Then, the average achievable distortion Dt at time t โ [1, T ]
is bounded from below by Dt โฅ Dtโ , where Dtโ satisfies (7)
with equality.
Proof: Let N โ N. We shall prove
Dt โฅ 2โ2Rt Efหtโ1 N st |f tโ1 = fหtโ1
โฅ
(11c)
sฬt , st โ ฮฑt sฬtโ1
= ฮฑt (stโ1 โ sฬtโ1 ) + wt
= ฮฑt etโ1 + wt .
Since wt is independent of etโ1 , the average power of the
entries of sฬt is equal to
Sฬt = ฮฑt2 Dtโ1 + Wt .
Using the property that the rateโdistortion function under
mean square error distortion of an i.i.d. source with given
variance is upper bounded by that of a white Gaussian source
with the same variance (see, e.g., [18, pp. 338โ339]), we obtain
the following recursion:
Dt โค ฮฑt2 Dtโ1 + Wt 2โ2Rt ,
and hence (7) is achievable within an arbitrarily small > 0,
for a sufficiently large N .
= E stโ1 f tโ1 and ฮฑt sฬtโ1 = E st f tโ1 are the MMSE
estimators of stโ1 and st , respectively, given all the past channel outputs.
Dtโ ,
t = 1, . . . , T ,
(12a)
(12b)
by induction, where the sequence {Dtโ } is defined in (7),
1
2
2 N h(st ) ,
N (st ) ,
2ฯ e
2 h s f k =fหk
1 N
t
N st f k = fหk ,
2
2ฯ e
denote the entropy-power and conditional entropy-power of
st given f k = fหk , the expectation Efหtโ1 [ยท] is with respect to
fหtโ1 , and the random vector fหt is distributed the same as f t .
Basic step (t = 1). First note that, since s0 = 0 and vector
w1 consists of i.i.d. Gaussian entries of variance W1 , (12b)
is satisfied with equality. To prove (12a), we use the fact that
the optimal achievable distortion D1 for a Gaussian source
(s1 = w1 ) with i.i.d. entries of power W1 and rate R1 is
dictated by its rateโdistortion function (RDF) [18, Ch. 10.3.2]:
D1 โฅ W1 2โ2R1 .
(11b)
where (11b) follows from (8) and (9). Thus, the distortion (5)
is also the distortion in reconstructing sฬt .
Using (1), (8) and (11), we express sฬt as
tโ1
We shall now construct an outer bound that coincides with
the inner bound of Assert. 1 for large frame lengths N .
(11a)
2 sฬ
B. Impossible (Converse)
Inductive step. Let k โฅ 2 and suppose (12) is true for
t = k โ 1. We shall now prove that it holds also for t = k.
i
1 h
2
Dk = E ksk โ sฬk k
N
ii
1 h h
2
= E E ksk โ sฬk k f kโ1
(13a)
N
h
h
ii
1
2
(13b)
= Efหkโ1 E ksk โ sฬk k f kโ1 = fหkโ1
N
(13c)
โฅ Efหkโ1 N sk f kโ1 = fหkโ1 2โ2Rk
โ2R
kโ1
kโ1
k
ห
= Efหkโ1 N ฮฑk skโ1 + wk |f
=f
2
(13d)
n
h
i
โฅ Efหkโ2 Efหkโ1 N ฮฑk skโ1 |f kโ1 = fหkโ1 fหkโ2
o
+ N (wk ) 2โ2Rk
(13e)
n
โฅ ฮฑk2 Efหkโ2 N skโ1 f kโ2 = fหkโ2 , fkโ1
o
+ Wk 2โ2Rk
(13f)
n
โฅ ฮฑk2 Efหkโ2 N skโ1 |f kโ2 = fหkโ2 2โ2Rkโ1
o
+ Wk 2โ2Rk
(13g)
โ2Rk
2 โ
โฅ2
ฮฑk Dkโ1 + Wk
(13h)
= Dkโ ,
(13i)
where (13a) follows from the law of total expectation, (13b)
holds since f kโ1 and fหkโ1 have the same distribution, (13c)
follows by bounding from below the inner expectation (conditional distortion) by the rateโdistortion function and the
Shannon lower bound [18, Ch. 10] โ this also proves (12a),
(13d) is due to (1), (13e) follows from the entropy-power
inequality [18, Ch. 17], (13f) holds since wk is Gaussian,
the scaling property of differential entropies and Jensenโs inequality:
Efห
2 h s
kโ1
2N
f kโ1 =fหkโ1
kโ1
2
โฅ 2N
2
โก 2N
Efห
kโ1
h
fหkโ2
f kโ2 =fหkโ2 , fkโ1
IV. R ANDOM -R ATE B UDGETS
,
Assertion 3 (Outer bound for non-Gaussian noise). Consider
the setting of Sec. II with independent non-Gaussian noise
entries {wt }. Then, the average achievable distortion Dt at
time t โ [1, T ] is bounded from below by Dt โฅ Dtโ , with Dtโ
given by the recursion
โ
Dtโ = ฮฑ2 Dtโ1
+ N (wt ) 2โ2Rt ,
D0โ = 0,
is the entropy-power of wt .
Proof: The proof is identical to that of Assert. 2 with Wt
replaced by N (wt ).3
C. Steady State of Asymptotically Stationary Sources
For the asymptotically stationary source in (6), the steadystate average distortion is as follows.
Corollary 1 (Steady state). Let > 0, however small. Then,
the minimum steady-state distortion is equal to
โ
Dโ
=
0 โถ Dt โ Dโ โถ Dtโ1 โ Dโ
(13h) is by the induction hypothesis, and (13i) holds by the
definition of {Dtโ } as the sequence that satisfies (7) โ which
also proves (12b). This concludes the proof of (12b) as desired.
1 h(wt )
2ฯe 2
Hence, if 0 โถ Dtโ1 โ Dโ , then
Remark 3. As is evident from the proof, the result of Corol. 1
remains true for any initial value D0 .
(13g) follows from the following standard set of inequalities:
N Rkโ1 โฅ H fkโ1 f kโ2 = fหkโ2
โฅ I skโ1 ; fkโ1 f kโ2 = fหkโ2
= h skโ1 f kโ2 = fหkโ2
โ h skโ1 f kโ2 = fหkโ2 , fkโ1 ,
where N (wt ) =
Dt โ Dโ
= ฮฑ2 2โ2R < 1.
Dtโ1 โ Dโ
and converges (exponentially fast) to Dโ .
i
h
h skโ1 f kโ1 =fหkโ1
skโ1
or equivalently
W 2โ2R
+ ,
1 โ ฮฑ2 2โ2R
for a large enough N .
(15)
In this section we generalize the results of Sec. III to random
rates {rt } that are independent of each other and of {wt }. Rate
rt is revealed to the encoder just before the transmission at
time t.
Theorem 2 (Distortionโrate region). The distortionโrate region of sequential coding with independent rates rT is given
by all distortion tuples DT that satisfy Dt โฅ Dtโ withD0โ = 0
and
โ
Dtโ = ฮฑt2 Dtโ1
+ Wt E 2โ2rt ,
t = 1, . . . , T . (16)
Remark 4. An immediate consequence of this theorem and
Jensenโs inequality is that using packets of a fixed rate that is
equal to E [rt ] performs better than using random rates.
Proof:
Achievable. Since the achievability scheme in Th. 1 does
not use the knowledge of future transmission rates to encode
and decode the packet at time t, we have
i
1 h
2
(17a)
dt , E kst โ sฬt k rT
N
h
i
1
2
= E kst โ sฬt k rt
(17b)
N
2
โ2rt
โค (ฮฑt dtโ1 + Wt )2
+ ,
(17c)
Taking an expectation of (17c) with respect to rt and using
the independence of rtโ1 and rt , we achieve (16).
Impossible. Revealing the rates to the encoder and the
decoder prior to the start of transmission can only improve the
distortion. Thus, the distortions {dt } conditioned on {rt } (17a)
are bounded from below as in Th. 1; by taking the expectation
with respect to {rt }, we attain the desired result.
For the special case of an asymptotically stationary
source (6), the steady-state distortion is given as follows.
Corollary 2 (Steady state). Assume that the rates {rt } are
Proof: Note that (15) is a fixed point of (7a) (up to ).
i.i.d. Let > 0, however small. Then, the minimum steadyโ2R
Now since ฮฑ < 1 and 2
< 1, Dt converges to Dโ .
state distortion is equal to
This can be easily proved as follows. Assume Dtโ1 6= Dโ
BW
(otherwise we are already at the fixed point). Then,
Dโ =
+
(18)
2
โ2R 2
โ2R
1 โ ฮฑ2 B
Dt โ Dโ = ฮฑ Dtโ1 + W 2
โ ฮฑ Dโ + W 2
for a large enough N , where
2 โ2R
=ฮฑ 2
(Dtโ1 โ Dโ ) ,
B , E 2โ2rt .
3 Recall
that in the Gaussian setting N (wt ) = Var (wt ) โก Wt .
Proof: Note that (18) is a fixed point of (16).
Since ฮฑ < 1 and B < 1, E [Dt ] converges to Dโ . This can
be easily proved as follows. Assume Dtโ1 6= Dโ (otherwise
we are already at the fixed point). Then,
Dt โ Dโ = ฮฑ2 Dtโ1 + W B โ ฮฑ2 Dโ + W B
= ฮฑ2 B (Dtโ1 โ Dโ ) ,
B. Multiple Packets Per Frame
or equivalently
Dt โ Dโ
= ฮฑ2 B < 1.
Dtโ1 โ Dโ
Hence, if 0 โถ Dtโ1 โ Dโ , then
0 โถ Dt โ Dโ โถ Dtโ1 โ Dโ
and converges exponentially fast to Dโ .
V. PACKET E RASURES WITH I NSTANTANEOUS F EEDBACK
A. One Packet Per Frame
An important special case of the random-rate budget model
of Sec. IV is that of packet erasures [13]. Since a packet
erasure at time t can be viewed as rt = 0, and assuming that
the encoder sends packets of fixed rate R and is cognizant of
any packet erasures instantaneously, the packet erasure channel
can be cast as the random rate channel of Sec. IV with
rt = bt R
(
R, bt = 1
=
0, bt = 0
(19a)
(19b)
where {bt } are the packet-erasure events, such that bt = 1
corresponds to a successful arrival of the packet ft at time t,
and bt = 0 means it was erased. We further denote by
gt , bt ft
(20)
the received output where gt = 0 corresponds to an erasure,
and otherwise gt = ft . We assume that {bt } are i.i.d. according
to a Ber(ฮฒ) distribution for ฮฒ โ [0, 1].
Remark 5. We shall concentrate on the case of packets of
fixed rate R to simplify the subsequent discussion. This way
the only randomness in rate comes from the packet-erasure
effect. Nevertheless, all the results that follow can be easily
extended to random/varying rate allocations to which the effect
of packet erasures {bt } is added in the same manner as in (19).
Corollary 3 (Distortionโrate region). The distortionโrate region of sequential coding with packet erasures and instantaneous feedback is given as in Th. 2 with
E 2โ2rt = 1 โ ฮฒ 1 โ 2โ2R .
Proof: Computing the expectation, we obtain
E 2โ2rt = E 2โ2bt R
= ฮฒ2โ2R + (1 โ ฮฒ),
as desired.
Corollary 4 (Steady state). The steady-state distortion is given
as in Corol. 2 with
B , E 2โ2rt
= 1 โ ฮฒ 1 โ 2โ2R .
In Sec. V-A we assumed one packet (ft ) was sent per
each source frame (st ). Instead, one may choose to transmit
multiple packets of lower rate per one source frame. Naฤฑฬve
repetition of the same packet trades off diversity for multiplexing in this case [19] and can potentially improve the overall
performance.
An improvement over this naฤฑฬve repetition-based scheme
was proposed in [20], where the repetitive transmission of
a single compressed description was replaced by multiple
descriptions compression [21]โ[24].
If we assume the availability of a perfect instantaneous
feedback after each packet, a further improvement can be
achieved by noting that this scenario falls again in the randomrate budget framework of Sec. IV.
Specifically, if we assume the use of K packets of equal
rate R/K (and hence a total rate of R), the rate probability
distribution amounts to
bt
rt = R
K
with bt denoting the number of successful packet arrivals at
time t, corresponding to source frame st . Assuming that the
erasure events of all packets are i.i.d. with probability 1 โ ฮฒ
implies that {bt } are i.i.d. according to a Binomial distribution
B (K, ฮฒ).
Interestingly, the optimal number of packets depends on the
(total) rate R and packet successful arrival probability ฮฒ, and
is determined by the number that minimizes E [2โrt ]. This is
demonstrated in Fig. 2.
Remark 6. We only considered uniform rate allocations for all
the packets. Clearly, one can generalize the same approach to
non-uniform packet rates.
Remark 7. In practice one might expect longer packets to be
prone to higher erasure probability. This can be taken
into
account when deciding on the K that minimizes E 2โ2rt .
VI. PACKET E RASURES WITH D ELAYED F EEDBACK
In this section we consider the case of i.i.d. packet erasures
with a delayed-by-one output feedback, i.e., the case where at
time t, the encoder does know whether the last packet arrived
or not (does not know btโ1 ), but knows the erasure pattern
of all preceding packets (knows btโ2 ). The encoder (3) and
decoder (4) mappings can be written as [recall the definition
of gt , bt ft in (20)]:
ft = Ft st , g tโ2 ,
sฬt = Gt g t .
To that end, we recall the following result by Perron et
al. [15, Th. 2], which is a specialization to the jointly Gaussian
rate required to achieve these distortions is given by
RKaspi (S, Z, Dโ , D+ )
๏ฃฑ
๏ฃด
0,
Dโ โฅ S and D+ โฅ Z
๏ฃด
๏ฃด1
๏ฃด
S
๏ฃด
Dโ < S and D+ kS โฅ Dโ kZ
๏ฃด
๏ฃฒ 2 log Dโ ,
Z
1
D+ < Z and Dโ โฅ D+ + S โ Z
= 2 log D+ ,
(
๏ฃด
๏ฃด
๏ฃด
Dโ < S and D+ kS < Dโ kZ
๏ฃด
1
S
๏ฃด
๏ฃด
log
,
โ
2
๏ฃณ2
D โโ
and Dโ < D+ + S โ Z
ab
denotes the harmonic mean of a and b, and
where akb , a+b
p
p
(S โ Z)(S โ Dโ )D+ โ (Z โ D+ )(Dโ โ D+ )S
โ
โ,
.
Z (S โ D+ )
(a) R = 1
(b) R = 5.5
Fig. 2: Evaluation of 2โrt for K = 1, 2 and 3 packets, all
possible values of ฮฒ โ [0, 1], and two (total) rates R = 1
and 5.5.
case of the result by Kaspi [14, Th. 1], who established the
rateโdistortion region of lossy compression with two-sided SI
where the SI may or may not be available at the decoder.4
Remark 8. Kaspiโs result [14, Th. 1] can also be viewed as a
special case of [16] with some adjustments; see [17].
Theorem 3 ( [15]). Let s be an i.i.d. zero-mean Gaussian
source of power S, which is jointly Gaussian with SI y, which
is available at the encoder and satisfies s = y + z where z
is an i.i.d. Gaussian noise of power Z that is independent of
y. Denote by sฬ+ and sฬโ the reconstructions of s with and
without the SI y, and by D+ and Dโ their mean squared
error distortion requirements, respectively. Then, the smallest
4 We use a backward channel to represent the SI s = y + z, as opposed
to the forward channel y = s + z used in [15], [16].
Remark 9. Surprisingly, as observed by Perron et al. [15], if
the side-information signal y is not available at the encoder โ
corresponding to the case considered in [16] and [14, Th. 2] โ
the required rate can be strictly higher than that in Th. 3. This
is in stark contrast to the case where the side-information is
never available at the encoder and the case where the sideinformation is always available at the decoder studied by
Wyner and Ziv [25], [26]. Knowing the SI at the encoder
allows to (anti-)correlate the noise z with the quantization
error โ some thing that is not possible when the SI is not
available at the encoder, as the two noises must be independent
in that case. This allows for some improvement, though a
modest one, as implied by the results for the dual channel
problem [27, Prop. 1], [28].
In our case, at time t, the previous packet ftโ1 will serve
as the SI. Note that it is always available to the encoder;
the decoder may or may not have access to it, depending
whether the previous packet arrived or not. Since the feedback
is delayed, during the transmission of the current packet ft the
encoder does not know whether the previous packet was lost.
The tradeoff between D+ and Dโ for a given rate R will be
determined by the probability of a successful packet arrival ฮฒ.
Scheme (Kaspi-based).
Encoder. At time t:
โข Generates the prediction error
sฬt , st โ ฮฑt2 sฬtโ2 .
โข
Generates ft by quantizing the prediction error sฬt as in
Th. 3, where ftโ1 is available as SI at the encoder and
possibly at the decoder (depending on btโ1 ) using the
optimal quantizer of rate R and frame length N that
minimizes the averaged over btโ1 distortion:
DtWeighted = ฮฒDt+ + (1 โ ฮฒ)Dtโ ;
(21)
more precisely, since the encoder does not know
(btโ1 , bt ) at time t:
โ Denote the reconstruction of sฬt at the decoder
from ft and g tโ1 โ namely given that bt = 1 โ
by Qt (sฬt ), and the corresponding distortion by
DtWeighted .
โข
โ Denote the reconstruction from ft and g tโ2 โ
namely given that bt = 1 and btโ1 = 0 โ by
โ
Qโ
t (sฬt ), and the corresponding distortion by Dt .
โ Denote the reconstruction from (ftโ1 , ft ) and
g tโ2 โ namely given that bt = 1 and btโ1 = 1 โ
+
by Q+
t (sฬt ), and the corresponding distortion by Dt .
Then, the encoder sees ฮฑt Q+
tโ1 (sฬtโ1 ) as possible SI
available at the decoder to minimize DtWeighted as in (21).
Sends ft over the channel.
Decoder. At time t:
โข Receives gt .
โข Generates a reconstruction ห
sฬt of the prediction error sฬt :
๏ฃฑ
+
๏ฃด
๏ฃฒQt (sฬt ), bt = 1, btโ1 = 1
หsฬt = Qโ (sฬt ), bt = 1, btโ1 = 0
(22)
t
๏ฃด
๏ฃณ
0,
bt = 0
โข
Generates an estimate sฬt of st :
sฬt = ฮฑt sฬtโ1 + หsฬt .
This scheme is the optimal greedy scheme whose performance is stated next, in the limit of large N .
Theorem 4. Let > 0, however small. Then, for a large
enough N , the expected distortion of the scheme at time
t โ [2, T ] given (b1 , . . . , bt ) satisfies the recursion
๏ฃฑ
+
๏ฃด
bt = 1, btโ1 = 1
๏ฃฒDt + ,
โ
Dt = Dt + ,
bt = 1, btโ1 = 0
๏ฃด
๏ฃณ 2
ฮฑt Dtโ1 + W + , bt = 0
D1 =
D1+
=
D1โ
โb1 2R
= Wt 2
+ ,
Fig. 3: Distortions Dt as a function of the time t of the
various schemes presented in this section, along with that of
the instantaneous-feedback scheme of Sec. V, for ฮฑ = 0.7,
W = 1, ฮฒ = 0.5 and R = 2.
(we derive their performance for the special case of an
asymptotically stationary source):
โข No prediction: A scheme that does not use prediction
at all, as if the source samples were independent. This
scheme achieves a distortion of
Dt = ฮฒSt 2โ2R + (1 โ ฮฒ)St ,
โข
where Dt+ and Dtโ are the distortions that minimize
DtWeighted = ฮฒDt+ + (1 โ ฮฒ)Dtโ ,
โ
+
RKaspi (ฮฑt Dtโ1
+ W, ฮฑt Dtโ1
+ W, Dtโ , Dt+ ) = R.
The proof is again the same as that of Ths. 1 and 2, with
หsฬt generated as in (22).
Remark 10. Here, in contrast to the case of instantaneous
feedback, evaluating the average distortions {Dt } in explicit
form (recall Corol. 3) is much more challenging. We do it
numerically, instead.
Somewhat surprisingly, the loss in performance of the
Kaspi-based scheme due to the feedback delay is rather small
compared to the scenario in Sec. V where the feedback is
available instantaneously, for all values of ฮฒ.5 This is demonstrated in Fig. 3, where the perfomances of these schemes
are compared along with the performances of the following
three simple schemes for ฮฑt โก 0.7, W โก 1, ฮฒ = 0.5, R = 2
5 For ฮฒ values close to 0 or 1, the loss becomes even smaller as in these
cases using the scheme of Sec. V that assumes that the previous packet arrived
or was erased, respectively, becomes optimal.
where St is the power of the entries of st as given in (2).
Assumes worst case (WC): Since at time t the encoder
does not know btโ1 , a โsafeโ way would be to work as
if btโ1 = 0. This achieves a distortion of
Dt = ฮฑ4 Dtโ2 + (1 + ฮฑ2 )W ฮฒ2โ2R + (1 โ ฮฒ)2
+ ฮฒ(1 โ ฮฒ)(ฮฑ2 Dtโ1 + W ),
such that the rate of Th. 3 satisfies
D0 = 0,
โข
t = 1, . . . , T ,
D1 = W 2
โ2R
t = 2, . . . , T ,
.
Assumes best case (BC): The optimistic counterpart of
the previous scheme is that which always works as if
btโ1 = 1. This scheme achieves a distortion of
Dt = ฮฒ ฮฑ2 Dtโ1|tโ2 2โ2R + W ฮฒ2โ2R + (1 โ ฮฒ)
+ (1 โ ฮฒ) ฮฑ2 Dtโ1|tโ2 + W , t = 2, . . . , T ,
Dtโ1|tโ2 , ฮฑ2 Dtโ2 + W,
D0 = 0,
t = 2, . . . , T ,
D1 = W 2โ2R .
VII. D ISCUSSION : F EEDBACK WITH L ARGER D ELAYS
To extend the scheme of Sec. VI for larger delays, a
generalization of Th. 3 is needed. Unfortunately, the optimal
rateโdistortion region for more than two decoders remains
an open problem and is only known for the case when the
source and the possible SIs form a Markov chain (โdegradedโ).
Nonetheless, achievable regions for multiple decoders have
been proposed in [16], which can be used for the construction
of schemes that accommodate larger delays.
ACKNOWLEDGMENT
The authors thank Yu Su from Caltech for valuable discussions.
R EFERENCES
[1] H. Viswanathan and T. Berger, โSquential coding of correlated sources,โ
IEEE Trans. Inf. Theory, vol. 46, no. 1, pp. 236โ246, Jan. 2000.
[2] N. Ma and P. Ishwar, โOn delayed sequential coding of correlated
sources,โ IEEE Trans. Inf. Theory, vol. 57, no. 6, pp. 3763โ3782, 2011.
[3] โโ, โErratum to โon delayed sequential coding of correlated sourcesโ,โ
IEEE Trans. Inf. Theory, vol. 58, no. 6, p. 4074, June 2012.
[4] E.-H. Yang, L. Zheng, and D.-K. He, โRate distortion theory for causal
video coding: Characterization, computation algorithm, and comparison,โ IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 5258โ5280, 2011.
[5] โโ, โOn the information theoretic performance comparison of causal
video coding and predictive video coding,โ IEEE Trans. Inf. Theory,
vol. 60, no. 3, pp. 1428โ1446, Mar. 2014.
[6] M. Torbatian and E.-H. Yang, โCausal coding of multiple jointly
Gaussian sources,โ in Proc. Annual Allerton Conf. on Comm., Control,
and Comput., Monticello, IL, USA, Oct. 2012, pp. 2060โ2067.
[7] M. Eslamifar, โOn causal video coding with possible loss of the first
encoded frame,โ Masterโs thesis, University of Waterloo, Waterloo,
Ontario, Canada, 2013.
[8] L. Song, J. Chen, J. Wang, and T. Liu, โGaussian robust sequential and
predictive coding,โ IEEE Trans. Inf. Theory, vol. 59, no. 6, pp. 3635โ
3652, June 2013.
[9] H. C. Huang, W. H. Peng, and T. Chiang, โAdvances in the scalable
amendment of H.264/AVC,โ IEEE Comm. Magazine, vol. 45, no. 1, pp.
68โ76, Jan. 2007.
[10] Y.-Z. Huang, Y. Kochman, and G. W. Wornell, โCausal transmission
of colored source frames over packet erasure channel,โ in Proc. Data
Comp. Conf. (DCC), Snowbird, UT, USA, Mar. 2010, pp. 129โ138.
[11] F. Etezadi, A. Khisti, and M. Trott, โZero-delay sequential transmission
of Markov sources over burst erasure channels,โ IEEE Trans. Inf. Theory,
vol. 60, no. 8, pp. 4584โ4613, Aug. 2014.
[12] F. Etezadi, A. Khisti, and J. Chen, โA truncated prediction framework for
streaming over erasure channels,โ IEEE Trans. Inf. Theory, Submitted
Jul. 2014, Revised Oct. 2016.
[13] P. Minero, M. Franceschetti, S. Dey, and G. N. Nair, โData rate theorem
for stabilization over time-varying feedback channels,โ IEEE Trans.
Auto. Control, vol. 54, no. 2, pp. 243โ255, Feb. 2009.
[14] A. H. Kaspi, โRateโdistortion when side-information may be present at
the decoder,โ IEEE Trans. Inf. Theory, vol. 40, no. 6, pp. 2031โ2034,
Nov. 1994.
[15] E. Perron, S. Diggavi, and I. E. Telatar, โOn the role of encoder sideinformation in source coding for multiple decoders,โ in Proc. IEEE Int.
Symp. on Inf. Theory (ISIT), Seattle, WA, USA, July 2006, pp. 331โ335.
[16] C. Heegard and T. Berger, โRateโdistortion when side information may
be absent,โ IEEE Trans. Inf. Theory, vol. 31, pp. 727โ734, Nov. 1985.
[17] A. Khina and U. Erez, โSource coding with composite side information
at the decoder,โ in Proc. IEEE Conv. Electrical and Electron. Engineers
in Israel (IEEEI), Eilat, Israel, Nov. 2012.
[18] T. M. Cover and J. A. Thomas, Elements of Information Theory, Second
Edition. New York: Wiley, 2006.
[19] D. Tse and P. Viswanath, Fundamentals of Wireless Communication.
U.K: Cambridge Univ. Press, 2005.
[20] J. Ostergaard and D. Quevedo, โMultiple descriptions for packetized
predictive control,โ EURASIP J. Advances in Sig. Proc., vol. 2016,
no. 45, Apr. 2016.
[21] H. Witsenhausen, โOn source networks with minimal breakdown degradation,โ Bell Sys. Tech. Jour., vol. 59, pp. 1083โ1087, July-Aug. 1980.
[22] J. K. Wolf, A. D. Wyner, and J. Ziv, โSource coding for multiple
descriptions,โ Bell Sys. Tech. Jour., vol. 59, pp. 1417โ1426, Oct. 1980.
[23] L. H. Ozarow, โOn the source coding problem with two channels and
three receivers,โ Bell Sys. Tech. Jour., vol. 59, pp. 1909โ1922, 1980.
[24] A. El Gamal and T. M. Cover, โAchievable rates for multiple descriptions,โ IEEE Trans. Inf. Theory, vol. 28, no. 6, pp. 851โ857, Nov. 1982.
[25] A. D. Wyner and J. Ziv, โThe rateโdistortion function for source coding
with side information at the decoder,โ IEEE Trans. Inf. Theory, vol. 22,
pp. 1โ10, Jan. 1976.
[26] A. D. Wyner, โThe rateโdistortion function for source coding with side
information at the decoder โ II: General sources,โ Information and
Control, vol. 38, pp. 60โ80, 1978.
[27] R. Zamir and U. Erez, โA Gaussian input is not too bad,โ IEEE Trans.
Inf. Theory, vol. 50, no. 6, pp. 1362โ1367, Jun. 2004.
[28] T. Philosof and R. Zamir, โThe cost of uncorrelation and noncooperation
in MIMO channels,โ IEEE Trans. Inf. Theory, vol. 53, no. 11, pp. 3904โ
3920, Nov. 2007.
| 7cs.IT
|
Reuse of Neural Modules for General Video Game Playing
Alexander Braylan
Mark Hollenbeck
Elliot Meyerson
Risto Miikkulainen
arXiv:1512.01537v1 [cs.NE] 4 Dec 2015
Department of Computer Science, The University of Texas at Austin
{braylan,mhollen,ekm,risto}@cs.utexas.edu
Abstract
A general approach to knowledge transfer is introduced in
which an agent controlled by a neural network adapts how it
reuses existing networks as it learns in a new domain. Networks trained for a new domain can improve their performance by routing activation selectively through previously
learned neural structure, regardless of how or for what it was
learned. A neuroevolution implementation of this approach
is presented with application to high-dimensional sequential decision-making domains. This approach is more general than previous approaches to neural transfer for reinforcement learning. It is domain-agnostic and requires no prior assumptions about the nature of task relatedness or mappings.
The method is analyzed in a stochastic version of the Arcade
Learning Environment, demonstrating that it improves performance in some of the more complex Atari 2600 games,
and that the success of transfer can be predicted based on a
high-level characterization of game dynamics.
Introduction
The ability to apply available previously learned knowledge
to new tasks is a hallmark of general intelligence. Transfer learning is the process of reusing knowledge from previously learned source tasks to bootstrap learning of target tasks. In long-range sequential control domains, such
as robotics and video game-playing, transfer is particularly
important, because previous experience can help agents explore new environments efficiently (Taylor and Stone 2009;
Konidaris, Scheidwasser, and Barto 2012). Knowledge acquired during previous tasks also contains information about
an agentโs domain-independent decision making and learning dynamics, and thus can be useful even if the domains
seem unrelated.
Existing approaches to transfer learning in such domains
have demonstrated successful transfer of varying kinds of
knowledge, but they make two fundamental assumptions
that restrict their generality: (1) some sort of a priori humandefined understanding of how tasks are related, and (2) separability of knowledge extraction and target learning. The
first assumption limits how well the approach can be applied by restricting its use only to cases where the agent
Copyright c 2016, Association for the Advancement of Artificial
Intelligence (www.aaai.org). All rights reserved.
has been provided with this additional relational knowledge, or, if it can be learned (Talvitie and Singh 2007;
Taylor, Kuhlmann, and Stone 2008; Ammar et al. 2015b),
cases where task mappings are useful. The second assumption implies that it is known what knowledge will be useful
and how it should be incorporated before learning on the target task begins, preventing the agent from adapting the way
it uses source knowledge as it gains information about the
target domain.
General ReUse of Static Modules (GRUSM) is proposed
in this paper as a general neural network approach to transfer learning that avoids both of these assumptions. GRUSM
augments the learning process to allow learning networks
to route through existing neural modules (source networks)
selectively as they simultaneously develop new structure
for the target task. Unlike previous work, which has dealt
with mapping task variables between source and target,
GRUSM is domain-independent, in that no knowledge about
the structure of the source domain or even knowledge about
where the network came from is required for it to be reused.
Instead of using mappings between task-spaces to facilitate
transfer, it searches directly for mappings in the solution
space, that is, connections between existing source networks
and the target network. This approach is motivated by studies that have shown in both naturally occurring complex networks (Milo et al. 2002) and in artificial neural networks
(Swarup and Ray 2006) that certain network structures repeat and can be useful across domains, without any context
for how exactly this structure should be used. This work is
further motivated by the idea that neural resources in the human brain are reused for countless purposes in varying complex ways (Anderson 2010).
In this paper, an implementation of GRUSM based on the
Enforced Subpopulations (ESP) neuroevolution framework
(Gomez and Miikkulainen 1997; 1999) is presented. The
approach is validated on the stochastic Atari 2600 general
game playing platform, finding that GRUSM-ESP improves
learning for more complex target games, and that these improvements may be predicted based on domain complexity
features. This result demonstrates that even without traditional transfer learning assumptions, successful knowledge
transfer via general reuse of existing neural modules is possible and useful for long-range sequential control tasks. In
principle, this approach scales naturally to transfer from an
arbitrary number of source tasks, which suggests that in the
future it may be possible to build GRUSM agents that accumulate and reuse knowledge throughout their lifetimes
across a variety of diverse domains.
Background
Transfer learning encompasses machine learning techniques
that involve reusing existing source knowledge in a different target task or domain. A domain is an environment in
which learning takes place, characterized by the input and
output space; a task is a particular function from input to
output to be learned (Pan and Yang 2010). In sequentialdecision domains, a task is characterized by the values of
sensory-action sequences corresponding to the pursuit of a
given goal. A taxonomy of types of knowledge that may be
transferred was also enumerated by Pan and Yang. Because
the GRUSM approach reuses the structure of existing neural
networks, it falls under feature representation transfer.
Transfer Learning for RL
Transfer learning for sequential decision-making domains
has been studied extensively within the reinforcement learning (RL) paradigm (Taylor and Stone 2009). Reinforcement
learning domains are often formulated as Markov decision
processes (MDPs) in which the state space comprises all
possible observations, and the probability of an observation
depends only on the previous observation and action taken
by a learning agent. However, many real world RL domains
are non-Markovian, including many Atari 2600 games, for
example, the velocity of a moving object cannot be determined by looking at a single frame.
The Atari 2600 platform also supports a wide variety
of games. Existing RL approaches to transfer differ on the
types of differences allowed between source and target task.
Some approaches that are general with respect to the kind of
knowledge that can be transferred are restricted in that they
require a consistent agent-space (Konidaris, Scheidwasser,
and Barto 2012), or an a priori specification of inter-task
mappings defining relationships between source and target
state and action variables (Brys et al. 2015). Existing approaches to transfer learning that encode policies as neural
networks require such a specification (Taylor, Whiteson, and
Stone 2007; Verbancsics and Stanley 2010). On the other
hand, existing modular neuroevolution approaches that are
more general with respect to connectivity (Reisinger, Stanley, and Miikkulainen 2004; Khare et al. 2005) have not been
applied to cross-domain transfer.
Some of the most general existing approaches to transfer for RL automatically learn task mappings, so they need
not be provided beforehand. These approaches are general
enough to apply to any reinforcement learning domains,
but initial approaches (Taylor, Kuhlmann, and Stone 2008;
Talvitie and Singh 2007) were intractable for high dimensional state and action spaces due to combinatorial blowup
in the number of possible mappings. However, recent approaches in policy gradient RL (Ammar et al. 2015b; 2015a)
can both tractably learn mappings and be applied across diverse domains. These approaches have been successful in
continuous control domains, but it is unclear how they would
scale to domains with many discretely-valued features such
as Atari. Also, the above approaches assume MDP environments, whereas GRUSM can use recurrent neural networks
to extend to POMDPs.
General Neural Structure Transfer
There are existing algorithms similar to GRUSM in that they
make it possible to reuse existing neural structure. They can
apply to a wide range of domains and tasks in that they automatically select source knowledge and avoid inter-task mappings. For example, Shultz and Rivest (2001) developed a
technique to build increasingly complex networks by inserting source networks chosen by how much they reduce error.
This technique is only applicable to supervised learning, because the source selection depends heavily on an immediate
error calculation. Also, connectivity between source and target networks is limited to the input and output layer of the
source. As another example, Swarup and Ray (2006) introduced an approach that creates sparse networks out of primitives, or commonly used sub-networks, mined from a library
of source networks. This subgraph mining approach depends
on a computationally expensive graph mining algorithm, and
tends to favor exploitation over innovation and small primitives rather than larger networks as sources.
The GRUSM approach is more general in that it can be
applied to unsupervised and reinforcement learning tasks,
makes few a priori assumptions about what kind of sources
and mappings should work best, and is able to develop memory via recurrent connections. Although an evolutionary approach is developed in this paper, GRUSM should be extensible to any neural network-based learning algorithm.
Approach
This section introduces the general idea behind GRUSM,
provides an overview of the ESP neuroevolution framework,
and describe the particular implementation: GRUSM-ESP.
General ReUse of Static Modules (GRUSM)
The underlying idea is that an agent learning a neural network for a target task can reuse knowledge selectively from
existing neural modules (source networks) while simultaneously developing new structure unique to a target task. This
approach attempts to balance reuse and innovation in an integrated architecture. Both source networks and new hidden
nodes are termed recruits. Recruits are added to the target
network during the learning process. Recruits are incorporated adaptively into the target network as it learns connection parameters from the target to the recruit and from the recruit to the target. All internal structure of source networks is
frozen to allow learning of connection parameters to remain
consistent across recruits. This mechanism forces the target
network to transfer learned knowledge, rather than simply
overwrite it. Connections to and from source networks can,
in the most general case, connect to any nodes in the source
and target, minimizing assumptions about what knowledge
will be useful.
A GRUSM network is a 3-tuple G = (M, S, T ) where
M is a traditional neural network (feedforward or recurrent) containing the new nodes and connections unique to
the target task, with input and output nodes corresponding
to inputs and outputs defined by the target domain; S is a
(possibly empty) set of pointers to recruited source networks
S1 , ..., Sk ; and T is a set of weighted transfer connections
between nodes in M and nodes in source networks, that is,
for any connection ((u, v), w) โ T , (u โ M โงv โ Si )โจ(u โ
Si โง v โ M ) for some 0 โค i โค k. This construction strictly
extends traditional neural networks so that each Si can be a
traditional neural network or a GRUSM network of its own.
When G is evaluated, only the network induced by directed
paths from inputs of M to outputs of M , including those
which pass through some Si via connections in T is evaluated. During each evaluation of G, all recruited source network inputs are fixed at 0, since the agent is concerned only
with performing the current target task. The parameters to
be learned are the usual parameters of M , along with the
contents of S and T . The internal parameters of each Si are
frozen in that they cannot be rewritten through G.
The motivation for this architecture is that if the solution to a source task contains any information relevant to
solving a target task, then the neural network constructed
for the source task will contain some structure (subnetwork
or module) that will be useful for a target network. This
has been previously observed in naturally occurring complex networks (Milo et al. 2002), as well as cross-domain
artificial neural networks (Swarup and Ray 2006). Unlike
the subgraph-mining approach to neural structure transfer
(Swarup and Ray 2006), this general formalism makes no
assumptions as to what subnetworks actually will be useful.
One interpretation is that a lifelong learning agent maintains
a system of interconnected neural modules that it can potentially reuse at any time for a new task. Even if existing
modules are unlabeled, they may still be useful, due to the
fact that they contain knowledge of how the agent can successfully learn. Furthermore, advances in reservoir computing (Lukoลกevicฬius and Jaeger 2009) have demonstrated the
power of using large amounts of frozen neural structure to
facilitate learning of complex and chaotic tasks.
The above formalism is general enough to allow for an
arbitrary number of source networks and arbitrary connectivity between source and target. In this paper, to validate
the approach and simplify analysis, at most one source network is used at a time and only connections from target input
to source hidden layer and source output layer to target output are permitted. By not allowing target input to connect to
source input, this restriction avoids high-dimensional transformations between domain-specific sensor substrates, and
more intuitively captures the domain-agnostic goals of the
approach, differentiating the approach from previous methods that have used direct mappings between sensor spaces.
This restriction is sufficient to show that the implementation can reuse hidden source features successfully, and it is
possible to analyze the cases in which transfer is most useful. Future refinements are discussed in the Discussion and
Future Work section. The current implementation, described
below, is a neuroevolution approach based on ESP.
Enforced Subpopulations (ESP)
Enforced Sub-Populations (ESP; Gomez and Miikkulainen
1997; 1999) is a neuroevolution technique in which different components of a neural network are evolved in separate
subpopulations rather than evolving the whole network in a
single population. ESP has been shown to perform well in a
variety of reinforcement learning domains, and has shown
promise in extending to POMDP environments, in which
use of recurrent connections for memory is critical (Gomez
and Miikkulainen 1999; Gomez and Schmidhuber 2005;
Schmidhuber et al. 2007). In traditional ESP, there is a single hidden layer, each neuron of which is evolved in its own
subpopulation. Recombination occurs only between members of the same subpopulation, and mutants in a subpopulation derive only from members of that subpopulation. The
genome of each individual in a subpopulation is a vector
of weights corresponding to the weights of connections to
and from that neuron, including node bias. In each generation, networks to be evaluated are randomly constructed by
inserting one neuron from each subpopulation. Each individual that participated in the network receives the fitness
achieved by that network.
When fitness converges, i.e., does not improve over
several consecutive generations, ESP makes use of burst
phases. In initial burst phases each subpopulation is repopulated by mutations of the single best neuron ever occuring in that subpopulation, so that it reverts to searching a
ฮด-neighborhood around the best solution found so far. If a
second consecutive burst phase is reached, i.e., no improvements were made since the previous burst phase, a new neuron with a new subpopulation may be added (Gomez 2003).
GRUSM-ESP
The idea of enforced sub-populations is extended to transfer learning via GRUSM networks. For each reused source
network Si , the transfer connections in T between Si and M
evolve in a distinct subpopulation. At the same time new hidden nodes can be added to M ; they evolve within their own
subpopulations in the manner of standard ESP. In this way,
the integrated evolutionary process simultaneously searches
the space for how to reuse each potential source network
and how to innovate with each new node. The GRUSMESP architecture (Figure 1) is composed of the following
elements: (1) A pool of potential source networks. In the experiments in this paper, each target network reuses at most
one source at a time; (2) Transfer genomes encoding the
weights of cross-network connections between source and
target. Each potential source network in the pool has its own
subpopulation for evolving transfer genomes between it and
the target network. Each connection in T is contained in
some transfer genome. In our experiments, the transfer connections included are those such that the targetโs inputs are
fully connected to the sourceโs hidden layer, and the sourceโs
outputs are fully connected into the targetโs outputs; (3) A
burst mechanism that determines when innovation is necessary based on a recent history of performance improvement.
New hidden recruits (source networks when available, and
single nodes otherwise) added during the burst phase evolve
within their own subpopulations as in standard ESP.
Figure 1: The GRUSM-ESP architecture, showing the balance between reused and new structure. In this example, the
target network has three recruits: one source network, and
two single nodes. Each bold edge between target network
nodes and source network recruit indicate connections to
multiple source nodes. The genome in each subpopulation
encodes weight information for the connections from and to
the corresponding recruit.
All hidden and output neurons use a hyperbolic tangent
activation function. Networks include a single hidden layer,
and include recurrent self loops on hidden nodes; they are
otherwise feedforward. The details of the genetic algorithm
in our implementation used to evolve each subpopulation
mirror those described by Gomez (2003). This algorithm has
been shown to work well within the ESP framework, though
any suitable evolutionary algorithm could potentially be substituted in its place. (Preliminary experiments using this approach were discussed in Braylan et al. (2015b).)
Experiments
GRUSM-ESP was evaluated in a stochastic version of the
Atari 2600 general video game-playing platform using the
Arcade Learning Environment simulator (ALE; Bellemare
et al. 2013). Atari 2600 is currently a very popular platform, because it challenges modern approaches, contains
non-markovian games, and entertained a generation of human video game players, who would regularly reuse knowledge gained from previous games when playing new games.
To make the simulator more closely resemble the human
game-playing experience, the -repeat action approach as
suggested by Hausknecht and Stone (2015) is used in this
paper to make the environment stochastic; in this manner,
like human players, the algorithm cannot as easily find loopholes in the deterministic nature of the simulator. The recommended = 0.251 is used. Note that the vast majority of
previously published Atari 2600 results are in the deterministic setting; we are unaware of any existing scores that have
been published in the -repeat setting.
Agents were trained to play eight games: Pong, Breakout, Asterix, Bowling, Freeway, Boxing, Space Invaders,
1
https://github.com/mgbellemare/Arcade-Learning-Environment/tree/dev
and Seaquest. Neuroevolution techniques are competitive in
the Atari 2600 platform (Hausknecht et al. 2013), and ESP in
particular has yielded state-of-the-art performance for several games (Braylan et al. 2015a). Three GRUSM-ESP conditions are evaluated: scratch, transfer, and random. In
the scratch condition, networks are trained from scratch
on a game using standard ESP (GRUSM-ESP with S = โ
).
In the transfer condition, each scratch network is reused
as a source network in training new GRUSM networks for
different target games. In the random control condition, random networks are initialized and reused as source networks.
Such networks contain on average the same number of parameters as fully-trained scratch networks.
Each run lasted 200 generations with 100 evaluations per
generation. Since the environment is stochastic, each evaluation consists of five independent trials of individual i playing game g, and the resulting score s(i, g) is the average of
the scores across these trials. The score of an evolutionary
run at a given generation is the highest s(i, g) achieved by
an individual by that generation. A total of 333 runs were
run split across all possible setups. Evolutionary parameters
were selected based on their success with standard ESP.
To interface with ALE, the output layer of each network
consists of a 3x3 substrate representing the nine directional
movements of the Atari joystick in addition to a single
node representing the Fire button. The input layer consisted
of a series of object representations manually generated
as previously described by Hausknecht et al. (2013). The
location of each object on the screen was represented in an
8 ร 10 input substrate corresponding to the objectโs class.
The numbers of object classes varied between one and
four. Although object representations were used in these
experiments, pixel-level vision could also be learned from
scratch below the neuroevolution process, e.g., via convolutional networks as was done by Koutnรญk, Schmidhuber, and
Gomez (2014).
Domain Characterization Understanding when transfer
will be useful is important for any transfer learning approach. In many cases, attempting transfer can impede learning, leading to negative transfer, when an approach is not
able to successfully adapt knowledge from the source to
the target domain. Negative transfer is a serious concern for
many practitioners (Taylor and Stone 2009; Pan and Yang
2010). To help understand when GRUSM-ESP should be
applied, it is useful to consider the diverse array of games
within a unified descriptive framework. Biological neural
reuse is generally thought to be most useful in transferring
knowledge from simple behaviors to more complex, and the
vast majority of previous computational approaches do exactly that. Thus, the characterization of games in this paper
is grounded by a sense of relative complexity.
Each game can be characterized by generic binary
features that determine what successful game play requires:
(1) horizontal movement (joystick left/right), (2) vertical
movement (joystick up/down), (3) shooting (fire button);
(4) delayed rewards; and (5) long-term planning. Intuitively,
more complex games will include more of these features. A
partial ordering of games by complexity defined by these
v
h
s
d
p
none
pong
breakout
asterix
bowling
freeway
boxing
s. invaders
seaquest
v = vertical movement
h = horizontal movement
s = shooting
d = delayed rewards
p = long-term planning
v
h
pong
d
breakout
s
h
v
bowling
freeway
asterix
h
h,s,p
s,p
s
boxing
space invaders
v,d
d
seaquest
Figure 2: (left) Feature representation for each game, and
(right) games partially-ordered by feature inclusion: every
path from none to g contains along its edges each complexity
feature of g exactly once, showing how games are related
across the feature space. The existence of such a hierarchy
motivates the use of atari for transfer.
features is shown in Figure 2. The assignment of features
(1), (2) and (3) is completely defined based on game
interface (Bellemare et al. 2013). Freeway and Seaquest
are said to have delayed rewards because a high score
can only be achieved by long sequences of rewardless
behavior. Only Space Invaders and Seaquest were deemed
to require long-term planning (Mnih et al. 2015), since
the long-range dynamics of these games penalize reflexive
strategies, and as such, agents in these games can perform
well with a low frequency decision-making (Braylan et al.
2015a). In addition to being intuitive, these features are
validated below based on how well they characterize games
by complexity and how well they predict successful transfer.
Analysis Methods There are many possible metrics for
evaluating success of transfer, depending on what kind of
transfer is desired or expected. Learning curves are irregular across different games, as illustrated in Figure 3, which
makes it difficult to choose a single metric that makes sense
across all source-target pairs. Thus, the analysis is focused
on a broad notion of transfer effectiveness (TE), which aggregates metrics such as jumpstart and max overall score,
with a weighted approximation of area under the curve (Taylor and Stone 2009). Success of a setup is defined as the
sum of the average score of that setup at a series of nonuniformly-spaced generations: [1, 10, 50, 100, 200]. This series favors early performance over later performance, as in
general, in the long run, training from transfer and scratch
should converge, as scratch eventually relearns everything
that was effectively transferred. Then, the TE of a setup is
its success minus the success of the control on the target
game, the difference normalized by the size of the range of
max scores achieved across all runs for that game, in order
to draw comparison across games.
The first hypothesis is that transfer would outperform
scratch in some setups, and that those setups could be predicted (i.e., they are not coincidental). However, any outperformance of transfer over scratch could be due to a
Figure 3: Raw mean score learning curves by generation for
each target game aggregated over transfer (solid), random
(dashed), and scratch (dotted) setups. The diversity of these
learning curves shows the difficulty in comparing performance across games.
larger number of network parameters. Therefore, as a second hypothesis, random setups were used as a control for
the number of parameters, to test how transfer could predictably outperform random. We postulated and tested several useful indicators for predicting the outperformance of
transfer, i.e., TE: (1) feature similarity: count of features
that are 1 for both source and target); (2) source feature
complexity: feature count of source game; (3) target feature
complexity: feature count of target game; (4) source training
complexity: source game average time to threshold; (5) target training complexity: target game average time to threshold, where the threshold for each game is the minimum max
score achieved across all scratch runs for that game, and
time to threshold is the average number of generations to
reach this threshold.
To predict TE, a linear regression model was trained in
a leave-one-out cross-validation analysis. For each possible
source-target pair (s, t), the model was trained on all pairs
(s0 , t0 6= t) with TE as the dependent variable and the five
indicators as the independent variables. Subsequently, the
trained model was used to predict the TE of (s, t). Correlation between the actual and predicted TE across all test
pairs was used to gauge the predictability of TE. This experiment was conducted identically for both transfer versus
scratch and transfer versus random conditions.
Results For both hypotheses, the indicator-based model
proved to be a statistically significant predictor of transfer
effectiveness in the test data: correlation R = 0.40 and pvalue < 0.0025 for transfer versus scratch; correlation R = 0.53 and p-value < 10โ7 for transfer versus
random (Figure 4). The strongest indicators for transfer
versus scratch were target feature complexity and target
training complexity, and for transfer versus random the
strongest indicator was target feature complexity.
The fact that more complex games are more successful
targets should not be surprising. As noted before, in most
transfer learning scenarios, only simple-to-complex transfer is considered. The ability to predict when GRUSM-ESP
will work is an important tool when applying this method to
boxing
breakout
bowling
asterix
space invaders
pong
Figure 4: Predicted vs. actual transfer effectiveness with respect to scratch (left) and random (right). Both predictors
have a significant correlation between predicated and actual
transfer effectiveness.
game
pong
breakout
asterix
bowling
freeway
boxing
s. invad.
seaquest
scratch
0.0
31.0
2800
249.3
31.4
93.9
1438.0
466.0
random
21.0
35.0
3216.7
265.0
31.5
92.7
1407.5
460.0
transfer
10.0ast
30.3box
3355bow
265.0f r
32.2brk
95.0sea
1655.0po
975.0sp
human
9.3
31.8
8503
154.8
29.6
4.3
1652
20182
DQN
18.9
401.2
6012
42.4
30.3
71.8
1976
5286
Table 1: For each game, average scores for scratch, random,
and transfer from best source (subscripted). Interestingly,
the best source for each target is unique. We also show human and DQN scores (Mnih et al. 2015). Note: DQN uses
deterministic ALE, so the most apt external comparison here
may be to humans, who cannot deterministically optimize
trajectories at the frame level.
larger problems, and it is encouraging that the predictive indicator coincides with the โcommon senseโ expectations of
transfer effectiveness in the current experiments. TE for all
source-target pairs is visualized in Figure 5. Also, although
it is difficult to compare to the deterministic Atari 2600 domain, Table 1 provides a comparison of GRUSM-ESP to recent results in that domain for context (Mnih et al. 2015).
Discussion and Future Work
The results show that GRUSM-ESP (an evolutionary algorithm for general transfer of neural network structure) can
improve learning in Atari game playing by reusing previously developed knowledge. They also make it possible to
characterize the conditions under which transfer may be useful. More specifically, the improvement in learning performance in the target domain depends heavily on the complexity of the target domain. The effectiveness of transfer in complex games aligns with the common-sense notion of hierarchical knowledge representation, as argued
previously in transfer learning (Konidaris, Scheidwasser,
and Barto 2012) as well as in biology (Anderson 2010;
Milo et al. 2002). It will be interesting to investigate whether
the same principles extend to other general video game playing platforms, such as VGDL (Perez et al. 2015; Schaul
2013). Such work should help understand how subsymbolic
knowledge can be recycled indefinitely across diverse domains.
freeway
seaquest
bowling
asterix
breakout
boxing
pong
space invaders
seaquest
freeway
Figure 5: Transferability graphs over all pairs of tasks with
respect to scratch (top) and random (bottom) illustrating the
target-centric clustering of successful source-target pairs.
Each graph includes a directed edge from g1 to g2 โโ
the TE (see Analysis) for g2 reusing g1 is positive.
Transfer is likely inefficient in simpler games due to
the effort involved in finding the necessary connections for
reusing knowledge from a given source network effectively,
in which case it is more efficient to relearn from scratch.
For particular low-complexity games, it can also be seen
that random consistently outperforms both scratch and
transfer (e.g., pong). The initial flexibility of untrained
parameters in the random condition may explain this result.
Unfreezing reused networks, and allowing them to change
with a low learning rate may help close this gap.
Some transfer pairs do not consistently outperform
training from scratch or random, indicating negative
transfer. This highlights the importance of source and target
selection in transfer learning. These results have taken a step
towards answering the target-selection problem: What kinds
of games make good targets for transfer? More data across
many more games is required to answer the source-selection
problem: For a given game, what sources should be used?
A next step will involve pooling multiple candidate sources
and testing GRUSM-ESPโs ability to exploit the most useful
structure available.
Despite negative transfer in some of the setups, the technique of training a classifier to predict transfer success is
shown to be a useful approach for helping decide when to
transfer: given some space of complex disparate domains,
try transfer with a subset of source-target pairs, and use the
results to build a classifier to inform when to attempt transfer in the future. In this paper, domain-characterization features were provided, but domain-agnostic features could be
learned from analysis of the networks and/or learning process; this is an interesting avenue for future work.
Another area of future work involves increasing the flexibility in the combined architecture by (1) relaxing the requirement for all transfer connections to be input-to-hidden
and output-to-output, (2) allowing deeper architectures for
the source and target networks, and (3) including multiple
source networks with adaptive connectivity to each. These
extensions will promote reuse of subnetworks of varying
depth, along with flexible positioning and combination of
modules. However, for GRUSM-ESP, as networks become
large and plentiful, maintaining full connectivity between
layers will become intractable, and it will be necessary to
enforcing sparsity. GRUSM-ESP can also be extended to include LSTM units, e.g., as by Schmidhuber et al. (2007),
when deep memory is a primary concern.
Conclusion
This paper introduced an approach for general transfer
learning using neural networks. The approach minimizes a
priori assumptions of task relatedness and enables a flexible
approach to adaptive learning across many domains. In a
stochastic version of the Atari 2600 general video gameplaying platform, a specific implementation developed in
this paper as GRUSM-ESP can boost learning by reusing
neural structure across disparate domains. The success
of transfer is shown to correlate with intuitive notions of
domain complexity. These results indicate the potential
for general neural reuse to predictably assist agents in
increasingly complex environments.
Acknowledgments We would like to thank Ruohan Zhang for useful feedback. This research was supported in part by NSF grant
DBI-0939454, NIH grant R01-GM105042, and an NPSC fellowship sponsored by NSA.
References
Ammar, H. B.; Eaton, E.; Luna, J. M.; and Ruvolo, P. 2015a. Autonomous cross-domain knowledge transfer in lifelong policy gradient reinforcement learning. Proc. of IJCAI.
Ammar, H. B.; Eaton, E.; Ruvolo, P.; and Taylor, M. E. 2015b. Unsupervised cross-domain transfer in policy gradient reinforcement
learning via manifold alignment. Proc. of AAAI.
Anderson, M. L. 2010. Neural reuse: A fundamental organizational
principle of the brain. Behavioral and Brain Sciences 33:245โ266.
Bellemare, M. G.; Naddaf, Y.; Veness, J.; and Bowling, M. 2013.
The arcade learning environment: An evaluation platform for general agents. JAIR 47:253โ279.
Braylan, A.; Hollenbeck, M.; Meyerson, E.; and Miikkulainen, R.
2015a. Frame skip is a powerful parameter for learning to play
atari. Workshops at AAAI-15.
Braylan, A.; Hollenbeck, M.; Meyerson, E.; and Miikkulainen, R.
2015b. On the cross-domain reusability of neural modules for general video game playing. IJCAI-15 GIGA Workshop.
Brys, T.; Harutyunyan, A.; Taylor, M. E.; and Nowรฉ, A. 2015.
Policy transfer using reward shaping. Proc. of AAMAS 181โ188.
Gomez, F. J., and Miikkulainen, R. 1997. Incremental evolution of
complex general behavior. Adaptive Behavior 5(3-4):317โ342.
Gomez, F. J., and Miikkulainen, R. 1999. Solving non-markovian
control tasks with neuroevolution. Proc. of IJCAI 1356โ1361.
Gomez, F. J., and Schmidhuber, J. 2005. Co-evolving recurrent
neurons learn deep memory pomdps. Proc. of GECCO 491โ498.
Gomez, F. J. 2003. Robust non-linear control through neuroevolution. Technical report, UT Austin.
Hausknecht, M., and Stone, P. 2015. The impact of determinism
on learning atari 2600 games. Workshops at AAAI-15.
Hausknecht, M.; Lehman, J.; Miikkulainen, R.; and Stone, P. 2013.
A neuroevolution approach to general atari game playing. IEEE
Trans. on Comp. Intelligence in AI in Games 6(4):355โ366.
Khare, V. R.; Yao, X.; Sendhoff, B.; Jin, Y.; and Wersing, H. 2005.
Co-evolutionary modular neural networks for automatic problem
decomposition. Proc. of CEC 2691โ2698.
Konidaris, G.; Scheidwasser, I.; and Barto, A. G. 2012. Transfer
in reinforcement learning via shared features. JMLR 13(1):1333โ
1371.
Koutnรญk, J.; Schmidhuber, J.; and Gomez, F. J. 2014. Evolving
deep unsupervised convolutional networks for vision-based reinforcement learning. Proc. of GECCO 541โ548.
Lukoลกevicฬius, M., and Jaeger, H. 2009. Reservoir computing approaches to recurrent neural network training. Computer Science
Review 3(3):127โ149.
Milo, R.; Shen-Orr, S.; Itzkovitz, S.; Kashtan, N.; Chklovskii, D.;
and Alon, U. 2002. Network motifs: Simple building blocks of
complex networks. Science 298(5594):824โ827.
Mnih, V.; Kavukcuoglu, K.; Silver, D.; Rusu, A. A.; Veness, J.;
Bellemare, M. G.; et al. 2015. Human-level control through deep
reinforcement learning. Nature 518(7540):529โ533.
Pan, S. J., and Yang, Q. 2010. A survey on transfer learning. IEEE
Trans. on Knowledge and Data Engineering 22(10):1345โ1359.
Perez, D.; Samothrakis, S.; Togelius, J.; Schaul, T.; et al. 2015.
The 2014 general video game playing competition. IEEE Trans.
on Comp. Intel. and AI in Games (99).
Reisinger, J.; Stanley, K. O.; and Miikkulainen, R. 2004. Evolving
reusable neural modules. Proc. of GECCO 69โ81.
Schaul, T. 2013. A video game description language for modelbased or interactive learning. Proc. of CIG 1โ8.
Schmidhuber, J.; Wierstra, D.; Gagliolo, M.; and Gomez, F. J.
2007. Training recurrent networks by evolino. Neural Computation 19(3):757โ779.
Shultz, T. R., and Rivest, F. 2001. Knowledge-based cascadecorrelation: Using knowledge to speed learning. Connection Science 13(1):43โ72.
Swarup, S., and Ray, S. R. 2006. Cross-domain knowledge transfer
using structured representations. Proc. of AAAI 506โ511.
Talvitie, E., and Singh, S. 2007. An experts algorithm for transfer
learning. Proc. of IJCAI 1065โ1070.
Taylor, M. E., and Stone, P. 2009. Transfer learning for reinforcement learning domains: A survey. JMLR 1633โ1685.
Taylor, M. E.; Kuhlmann, G.; and Stone, P. 2008. Autonomous
transfer for reinforcement learning. Proc. of AAMAS 283โ290.
Taylor, M. E.; Whiteson, S.; and Stone, P. 2007. Transfer via intertask mappings in policy search reinforcement learning. Proc. of
AAMAS 156โ163.
Verbancsics, P., and Stanley, K. O. 2010. Evolving static representations for task transfer. JMLR 11:1737โ1769.
| 9cs.NE
|
arXiv:1705.04910v2 [math.GR] 23 Aug 2017
Discretization of SU(2) and the orthogonal group using icosahedral
symmetries and the golden numbers
Robert V. Moody & Jun Morita
August 25, 2017
Department of Mathematics and Statistics, University of Victoria, Victoria, BC., V8W 3R4 Canada
Department of Mathematics, University of Tsukuba, Tsukuba, Ibaraki, 305-8571, Japan.
E-mail: [email protected], [email protected]
Abstract
The vertices of the four-dimensional 600-cell form a non-crystallographic root system whose
corresponding symmetry group is the Coxeter group H4 . There are two special coordinate representations of this root system in which they and their corresponding Coxeter groups involve only
rational numbers and the golden ratio ฯ . The two are related by the conjugation ฯ 7โ ฯ 0 = โ1/ฯ .
This paper investigates what happens when the two root systems are combined and the group
generated by both versions of H4 is allowed to operate on them. The result is a new, but infinite,
โroot systemโ ฮฃ which itself turns out to have a natural structure of the unitary group SU (2, R)
over the ring R = Z[ 21 , ฯ ] (called here golden numbers). Acting upon it is the naturally associated
infinite reflection group H โ , which we prove is of index 2 in the orthogonal group O(4, R). The
paper makes extensive use of the quaternions over R and leads to a highly structured discretized
filtration of SU (2). We use this to offer a simple and effective way to approximate any element of
SU (2) to any degree of accuracy required using the repeated actions of just five fixed reflections,
a process that may find application in computational methods in quantum mechanics.
Keywords: icosahedral symmetry, non-crystallographic root systems, infinite reflection groups, discretization of SU (2), golden numbers, quaternions
1
Introduction
The symmetry group of the icosahedron (and the dodecahedron) is the icosahedral group, denoted
H3 here, with 120 elements. It is a finite Coxeter group, that is to say, it is a finite group generated
by reflections and Coxeter relations, and it is simply transitive on the simplicial cells into which the
icosahedron is partitioned by the mirrors of the reflections in H3 . Apart from numerous dihedral
groups, there are only two finite indecomposable non-crystallographic Coxeter groups: H3 and its big
sister H4 , which is the symmetry group of the four-dimensional regular polytope called the 600-cell
(and its dual, the 120-cell). This paper involves both these groups, but notably the latter.
The 600-cell has 120 vertices and 600 three-dimensional faces, see Fig. 1. The 120 vertices form
a root system, of type H4 . With this interpretation of the vertices as roots, the set of 60 reflections
in these roots (opposite roots give the same reflection) is the entire set of reflections in the group
1
Figure 1: A two-dimensional projection of the 600-cell, whose vertices form a root system of type
H4 . The dots make up the 120 vertices that constitute a root system of type H4 .
H4 , and they generate it. The order of the group is |H4 | = 1202 = 14400. Notice that we use the
symbol H4 both as an adjective signifying the type of root system involved and as a noun signifying
the reflection group generated by the roots of that system.โWe will do the same thing with H3 .
0
Both
โ H3 and H4 involve the golden ratio ฯ = (1 + 5)/2 and its algebraic conjugate ฯ =
(1 โ 5)/2 in all sorts of significant ways. For instance, there is the well-known model of the vertices
of the 600-cell [5] ยง20 and ยง27, or equivalently the roots of the root system of type H4 , as the set of
points
๏ฃฑ
๏ฃด
๏ฃฒ R[0,0] (ยฑ1, 0, 0, 0) and all its permutations: 8 roots in all;
โ = R[1,0] 12 (ยฑ1, ยฑ1, ยฑ1, ยฑ1): 16 roots in all;
(1)
๏ฃด
๏ฃณ
1
0
R[1,1] 2 (0, ยฑ1, ยฑฯ , ยฑฯ ) and all its even permutations: 96 roots in all.
Here the first component of the label refers to the power of 2 appearing in the denominators
of the components and the second component is used to distinguish the rational versus irrational
nature of (some of) the components.
One cannot help noticing the interesting fact that only even permutations are allowed in the third
type of root. Half of the potential permutations are missing. The other half can be obtained by
conjugating these roots by interchanging ฯ and ฯ 0 throughout. Of course doing so produces another
model โ0 of the root system of type H4 , and the reflections in these generate a second model H40 of
the Coxeter group H4 . We shall also use the notation H4 = W (โ) and H40 = W (โ0 ), that suggests
the origin of these groups as reflection groups.
2
It is tempting to look at the group generated by the reflections of โ โช โ0 , but one quickly realizes
that this group, letโs call it H โ (or H โ [4]) is infinite.1 Since all the points of the set
ฮฃ = ฮฃ[4] := H โ (โ โช โ0 )
(2)
lie on the sphere of radius 1 in R4 , which is compact, ฮฃ is certainly not a discrete set. Up to now
no one seems to have paid much attention to it.
The objective of this paper is to get some idea of what ฮฃ and H โ look like. In fact they have
some very attractive features, as we shall see. Not surprisingly ฮฃ is a dense set of points on the unit
3-sphere S in R4 , see Prop. 3.7. It is also a group under quaternion multiplication, and we shall
show that it is an amalgamation of โ and โ0 , each of which is itself a group. Similarly H โ is an
amalgamation of the two groups H4 and H40 . What is especially interesting is that using ฮฃ and H โ
allows us to explicitly approximate elements of the two groups SU (2) and SO(3), the unitary and
special orthogonal groups of C2 and R3 respectively, by elements with matrix coefficients of the form
1
2n Z[ฯ ] (we call them dyadic integers from the field Q[ฯ ]). In fact the matrices used all arise from the
96 reflections of โ โช โ0 which are the ones involving ฯ and ฯ 0 , and even from just 5 reflections if one
gets down to the level of root system bases. The approximation can be made as fine as one wishes
(with increasing powers of two in the denominators) and there is a simple and efficient algorithm
for doing it.
The key to all of this is to interpret R4 as the standard division ring of quaternions, and use the
fact that its unit sphere can be identified with SU (2) and that it can be made to act as SO(3) on
the three-dimensional subspace of pure imaginary quaternions (those which change their sign under
quaternionic conjugation).
The paper is primarily concerned with the H4 picture, but we also require information from
the corresponding, and essentially parallel situation based on the three-dimensional icosahedral
root system H3 and its corresponding conjugate system H30 . The arguments are not identical but
sufficiently parallel that we provide only sketches of the arguments for the three-dimensional case.
The paper is organized around understanding the structure of the root system ฮฃ and the group
โ
H that the reflections in its roots generate. The approximation results appear in the final section,
though they can be read directly after ยง3.
Icosahedral symmetry and the Coxeter groups H2 , H3 , H4 have continued to intrigue people from
ancient times until the present day, where they are now familiar in such diverse places as carbon
molecules, buckyballs, the capsids (outer shells) of viruses, Penrose tilings, and the aperiodic order
of quasicrystals. There remains continuing interest in the mathematical world too, for instance, [6]
which investigates the subgroup structure of H4 in a quaternionic context, and [3] which explores
some of the ways of making affine extensions of the H4 root systems, following the success of
affinization of the root systems of the simple Lie algebras. Affinization is accomplished by extending
the Coxeter diagram, and might be thought of as based on using translations to extend root systems.
In the present paper, although the root systems involved are defined intrinsically from the H3 and
H4 root systems and the Galois conjugation ฯ 7โ ฯ 0 , effectively the result is to extend by using
contractions. Indeed this contractive aspect is something seems worthy of fuller study.
We might note here that there have been considerable advances in the understanding of Coxeter
groups along with their associated geometrical meanings by using the Clifford algebras, see [4] and
its associated references. Although we have not used these ideas here, and indeed we require only a
1
Throughout the paper we will see parallel structures pertaining to the three-dimensional setting around H3 and
the four-dimensional setting around H4 . Generally we use the same symbol for the corresponding objects, but if the
context does not make it clear then we shall make the distinction as in H โ [3], H โ [4], ฮฃ[3], ฮฃ[4], S[3], S[4], etc.
3
very limited number of tools, the Clifford algebra approach may offer new insights into the setting
we are introducing.
2
H4
The set โ of roots of the root system of type H4 can be presented in the standard form of (1) as the
union of three types of vectors in R4 . We let K = K0 โช K1 denote the set of roots of types R[0,0]
ห for the set of roots of
and R[1,0], which form a crystallographic root system of type D4 , and โ
type R[1,1]. Of course these distinctions are not intrinsic to the root system itself, but only to our
coordinatization of it. However this distinction plays a fundamental role in what is to follow.
Along with โ we have its conjugate โ0 which is the set of conjugates of โ, and the corresponding
ห 0 (it being irrelevant whether or not the dot operators are applied before or after
sets K and โ
conjugation). K = โ โฉ โ0 .
The reflections in the roots โ generate the group we call H4 . It is a Coxeter group of type
H4 . Similarly we have H40 generated by the reflections in the roots of โ0 , also of type H4 . We are
primarily interested in the group H โ which is generated by H4 and H40 together. The reflections
given by K, the roots in common to both systems, generate a subgroup D of type D4 For example
(1, 0, 0, 0),
1
(โ1, โ1, โ1, ยฑ1), (0, 1, 0, 0), (0, 0, 1, 0),
2
(3)
is a base (with either choice of the sign).
We let S = S[4] denote the unit sphere in 4-space. Both โ and โ0 are in S, and so too is the
set ฮฃ = ฮฃ[4] := H โ (โ โช โ0 ). It is the smallest subset containing โ โช โ0 and closed under its own
reflections (i.e. if a โ ฮฃ and ra is the reflection in a then ra (ฮฃ) = ฮฃ).
We note the important fact that
1
Z[ฯ ]4 โฉ S = โ โช โ0 .
2
(4)
At the start we use only the algebraic consequences of reflections applied in the context of Z[ฯ ]4
and R4 , but later we will interpret everything in the real quaternions, where the elements that we
are discussing can be interpreted as elements of SU(2).
It is useful to keep in mind the basic facts about ฯ :
ฯ + ฯ 0 = 1,
ฯ ฯ 0 = โ1,
ฯ 2 = ฯ + 1,
ฯ 02 = ฯ 0 + 1 .
(5)
The quotient ring F4 := Z[ฯ ]/2Z[ฯ ] is the Galois field of 4 elements. Let a 7โ a denote the
natural homomorphism of Z[ฯ ] โโ F4 . The elements of F4 are 0, 1, ฯ , ฯ 0 . We extend the meaning of
the map ยท to its component-wise version Z[ฯ ]4 โโ F44 .
Inside the F4 -vector space F44 , define A to be the subspace spanned by the elements of 2โ taken
modulo 2Z[ฯ ]4 , i.e., 2โ. This is a 2-dimensional space with basis (1, 1, 1, 1) and (0, 1, ฯ 0 , ฯ ). We define
ห Note the cardinalities: card (A) = 16, card (Aฬ) = 15, and card (Aฬ) = 12.
Aฬ := A\{0} and Aฬ := 2โ.
ห 0 . As we have already
Similarly we have A0 using 2โ0 and the corresponding subset Aฬ0 = 2โ
mentioned, and this sentence suggests, and will be true throughout, everything we say will come in
two versions, which are interchanged by conjugation. Henceforth we will usually only state and give
proofs for one of the versions, understanding that the other will be equally true.
4
5
1
5
Figure 2: This is the Coxeter diagram for the pairwise relationships between the reflection generators
of H โ [4]. The bonds between any two nodes indicate the orders of the product of the reflections
corresponding to them, with the convention that unmarked bonds indicate order 3 and bonds between
commuting reflections are omitted completely. The proof establishing the bond marked with โ is
found in Cor. 3.6. We shall see that in fact H โ [4] is a proper factor of the Coxeter group of this
diagram. The corresponding Coxeter diagram for the relationships between the generators of H โ [3]
is obtained by deleting the first node and its attached bond.
With the obvious dot product on F4 we find that A is totally isotropic. This is just another way
ห 2ฮฑ.2ฮฒ โ 2Z[ฯ ]. In addition, if ฮฑ and ฮฒ are linearly dependent,
of saying that for all ฮฑ, ฮฒ โ K1 โช โ,
then 2ฮฑ.2ฮฒ โ 4Z[ฯ ]. This simply follows from (0, 1, ฯ 0 , ฯ ).(0, 1, ฯ 0 , ฯ ) = 4 = (1, 1, 1, 1).(1, 1, 1, 1).
We have parallel statements for A0 and Aฬ0 . However, for any a โ Aฬ and b โ Aฬ0 we always have
a.b 6= 0.
Proposition 2.1.
(i) A.A = 0. In particular, for all x, y โ โ, 2x.y โ Z[ฯ ];
ห and y โ โ
ห 0 then 2x.y โ
(ii) for all a โ Aฬ and b โ Aฬ0 , a.b 6= 0. In particular if x โ โ
/ Z[ฯ ].
3
H โ as a reflection group
The set of vectors
1
1
1
{a1 , a2 , a3 , a4 , a5 } = {(1, 0, 0, 0), โ (1, 1, 1, 1), (0, 0, 1, 0), (0, โ1, ฯ 0 , ฯ ), (0, 1, โฯ, โฯ 0 )} (6)
2
2
2
define reflections that correspond to the Coxeter diagram of Fig. 2 and these reflections generate
H โ = H โ [4]. Indeed they contain a set of generators for both of the Coxeter groups H4 and H40 .
The associated Gram matrix with entries ai .aj is positive semidefinite with null vector (3 โ ฯ, 6 โ
2ฯ, 9 โ 3ฯ, โ6 + 4ฯ, 2ฯ ). Certainly H โ is a factor of the corresponding Coxeter group, and later on
we shall see that it is a proper factor, see Prop. 8.1.
Proposition 3.1. If x = (x1 , x2 , x3 , x4 ) โ Z[ฯ ]4 satisfies
x21 + x22 + x23 + x24 โก 0
mod 4Z[ฯ ]
then one of the three following cases prevails:
๏ฃฑ
๏ฃด
๏ฃฒall the xi are congruent to 0 modulo 2Z[ฯ ],
all the xi are congruent modulo 2Z[ฯ ] to each other, but not to 0,
๏ฃด
๏ฃณ
(x1 , x2 , x3 , x4 ) is congruent modulo 2Z[ฯ ]4 to a permutation of the components of (0, 1, ฯ 0 , ฯ ).
(7)
5
In the language and notation introduced above, these three cases correspond to
๏ฃฑ
๏ฃด
๏ฃฒx = (0, 0, 0, 0)
x โ Aฬ\(Aฬ โช Aฬ0 ) = Aฬ0 \(Aฬ โช Aฬ0 )
๏ฃด
๏ฃณ
x โ Aฬ or x โ Aฬ0 .
(8)
Proof: Modulo 2Z[ฯ ] each xi โก 0, 1, ฯ 0 , ฯ . Their squares are {0, 1, 1 + ฯ 0 , 1 + ฯ } modulo 4Z[ฯ ]. A
quick check shows that the sum of four such elements can be zero modulo 4Z[ฯ ] if and only if one of
the three conditions of the thesis is true.
Examples of all three types occur when we double each of the roots, i.e. when we look at
2(โ โช โ0 ).
Corollary 3.2. The three-dimensional version of Prop. 3.1 reads: if x = (x1 , x2 , x3 ) โ Z[ฯ ]3 satisfies
x21 + x22 + x23 โก 0
mod 4Z[ฯ ]
then one of the two following cases prevails:
(
all the xi are congruent to 0 modulo 2Z[ฯ ],
(x1 , x2 , x3 ) is congruent modulo 2Z[ฯ ]3 to a permutation of the components of (1, ฯ 0 , ฯ ).
(9)
For n = 1, 2, 3 . . . define the spherical sets
1
Sn := x โ n Z[ฯ ]4 : x โ S, and 2n x โ Aฬ ,
2
and
Sฬn :=
1
4
n
x โ n Z[ฯ ] : x โ S, and 2 x โ Aฬ ;
2
and similarly the conjugated versions using A0 . We call n here the level of the spherical set. We
define
Kn = Kn0 := Sn โฉ Sn0 ,
so Sn = Sฬn โช Kn , and similarly Sn0 = Sฬn0 โช Kn .
To these we add
S0 = S00 := K0 ,
the set of roots of type R[0,0].
Here are two consequences of Prop. 3.1:
ห and Sฬ1 = โ.
ห
Proposition 3.3. S1 = K1 โช โ,
Proof: Let y โ S1 . Then 2y โ Aฬ and 2y = (y1 , y2 , y3 , y4 ) โ Z[ฯ ]4 satisfies y12 + y22 + y32 + y42 = 4.
Using Prop. 3.1, one can hunt through all solutions to see that only elements of โ โช โ0 can satisfy
ห
this, and then restrict to Aฬ filter them out to โ.
6
Proposition 3.4. For n โฅ 1,
[
1
0
4
(Sm โช Sm
).
Z[ฯ
]
โฉ
S
=
2n
mโคn
Furthermore, x โ
1
4
2n Z[ฯ ]
โฉ S is in Sn โช Sn0 if and only if 2n x 6= {0, 0, 0, 0}.
Proof: Let x โ 21n Z[ฯ ]4 โฉ S, and let m โค n be minimal so that 2m x โ Z[ฯ ]4 . If m = 0 then x โ K0 .
0 .
If m โฅ 1 then 2m x.2m x = 4m and by Prop. 3.1, 2m x โ Aฬ โช Aฬ0 , see (8), from which x โ Sm โช Sm
The reverse inclusion comes from the definitions, and the last line is clear.
ห 0 , rฮฑ0 Sฬn โ Sฬ 0 .
Proposition 3.5. For all ฮฑ0 โ โ
n+1
Proof: Let x โ Sฬn , so by definition 2n x โ Z[ฯ ]4 and 2n x โ Aฬ. We have 2n rฮฑ0 x = 2n x โ (2n x.2ฮฑ0 )ฮฑ0 .
The elements 2n x and 2ฮฑ0 are in Aฬ and Aฬ0 respectively, so in all cases (2n x.2ฮฑ0 ) 6= 0. Since ฮฑ0
is not in Z[ฯ ]4 , but only in (1/2)Z[ฯ ]4 , 2n rฮฑ0 x = 2n x โ (2n x.2ฮฑ0 )ฮฑ0 โ
/ Z[ฯ ]4 . However 2n+1 rฮฑ0 x =
n+1
n
0
0
4
0
2
x โ (2 x.2ฮฑ )2ฮฑ โ Z[ฯ ] and furthermore 2n+1 rฮฑ0 x = (2n x.2ฮฑ0 )2ฮฑ0 โ Aฬ0 . Thus rฮฑ0 (x) โ Sฬn+1
,
which is what we wished to prove.
ห and for all ฮฒ 0 โ โ
ห 0 , rฮฑ rฮฒ 0 has infinite order.
Corollary 3.6. For all ฮฑ โ โ
Proof: Let x โ Sฬ1 . Then rฮฒ 0 x โ Sฬ20 , rฮฑ rฮฒ 0 x โ Sฬ3 , rฮฒ 0 rฮฑ rฮฒ 0 x โ Sฬ4 and so on.
โ [4] denote the commutator subgroup of H โ [4].
Let H+
Proposition 3.7.
โ [4] is dense in SO(4);
(i) H+
(ii) H โ [4] is dense in O(4);
(iii) ฮฃ[4] is dense in S[4].
ห and ฮฒ 0 := a5 = (1/2)(0, 1, โฯ, โฯ 0 ) โ โ
ห 0 , rฮฑ rฮฒ 0 is a
Proof: With ฮฑ := a4 = (1/2)(0, โ1, ฯ 0 , ฯ ) โ โ
1
rotation in the plane P orthogonal to the two roots (1, 0, 0, 0) and 2 (1, 1, 1, 1), and by Cor. 3.6 it
โ [4] be the infinite cyclic group generated by (r r 0 )2 = r r 0 r r 0 โ
has infinite order. Let G1 โ H+
ฮฑ ฮฒ
ฮฑ ฮฒ ฮฑ ฮฒ
โ
H+ [4]. The orbit of ฮฑ under G1 generated is infinite and hence is dense on the circle on the sphere
S โฉ P . In particular G1 has rotations through angles as small as we please.
ห 0 , so rฮฑ rฮณ 0 is a rotation of infinite order in a
Now also ฮณ 0 := ra3 (a5 ) = (1/2)(0, 1, ฯ, โฯ 0 ) โ โ
โ [4] with arbitrarily small
different plane orthogonal to (1, 0, 0, 0) and we get a second group G2 โ H+
โ [4] that is a dense subgroup of the group of
rotations. These two groups generate a subgroup of H+
โ
SO(3)1 of rotations of (0, R, R, R). Since H+ [4] can certainly map (0, R, R, R) to (R, R, R, 0), we see
that it also contains a subgroup that is a dense subgroup of the SO(3)4 of rotations of this space.
โ [4] contains a
Since SO(3)1 and SO(3)4 generate the entire rotation group SO(4), we see that H+
dense subgroup of this space.
Now (i),(ii),(iii) are all clear.
Proposition 3.8. Let n โฅ 2. Then
ห rฮฑ (Sn ) โ Sn โช Sฬ 0 ;
(i) for all ฮฑ โ โ,
nโ1
7
ห and for each x โ Sn \Sฬn there exists ฮฑ โ โ
ห for which rฮฑ (x) โ Sฬn ;
(ii) rฮฑ (Sn \Sฬn ) โ Sn for all ฮฑ โ โ,
ห for which rฮฑ x โ Sฬ 0 .
(iii) for each x โ Sฬn there are three reflections of the form rฮฑ where ฮฑ โ โ,
nโ1
ห
Proof: (i). We start with the slightly weaker assumption that n โฅ 1. Let x โ Sn and ฮฑ โ โ.
2n rฮฑ x = 2n x โ (2n x.2ฮฑ)ฮฑ .
(10)
Let 2n x = b โ Aฬ. Since 2n x and 2ฮฑ are elements of A, (2n x.2ฮฑ) โ 2Z[ฯ ]4 . Let (2n x.2ฮฑ)ฮฑ = a โ A.
As long as a 6= b, 2n rฮฑ x = b โ a โ Aฬ, so rฮฑ x โ Sn . If a = b then 2n rฮฑ x โ 2Z[ฯ ]4 , so 2nโ1 rฮฑ x โ Z[ฯ ]4 .
0 for some m < n.
By Prop. 3.4, rฮฑ x is either in Sm or Sm
Now whatever the case is, if n โฅ 1 then we have shown that rฮฑ (x) is either in Sn or in some Sm
0 for m < n. Now assume that n โฅ 2. Then if m < n it is not possible that r (x) โ S , for
or Sm
ฮฑ
m
either m โฅ 1 in which case by the same reasoning, x = rฮฑ rฮฑ (x) is on some sphere of level at most
0 ,
m, contrary to x โ Sn , or m = 0 in which case rฮฑ rฮฑ (x) has level 1. In the case that rฮฑ (x) โ Sm
0
0
0
then noting Prop. 3.5 we see that actually rฮฑ (x) โ Snโ1 . But in fact rฮฑ (x) cannot be in Snโ1 \Sฬnโ1 ,
since these elements do not change level under the application of rฮฑ and so x = rฮฑ rฮฑ (x) would be
0
impossible. Thus rฮฑ (x) โ Sฬnโ1
This proves part (i).
This last case, where the level drops under reflection, is particularly interesting and we wish to
look more carefully how it can happen in (iii) below.
ห In the notation of part (i) above, if x โ Sn \Sฬn then b := 2n x โ Fร (1, 1, 1, 1).
(ii). Let ฮฑ โ โ.
4
Now if a := (2n x.2ฮฑ)ฮฑ 6= 0 then a โ Aฬ, and then also bโa โ Aฬ and the resulting rฮฑ x โ Sฬn . However,
ห
if a = 0 then b โ a = b and rฮฑ (x) remains in โ Sn \Sฬn . We need to show that we can choose ฮฑ โ โ
for which the corresponding a 6= 0.
For definiteness (the other cases work the same way) we assume that b = (1, 1, 1, 1) and write
n
2 x = b + 2v, where v = (v1 , v2 , v3 , v4 ) โ Z[ฯ ]. We begin with ฮฑ = 21 (0, 1, ฯ 0 , ฯ ), though ultimately
we will cycle its last three components around. Then the question is what does it mean for
a = (2n x.2ฮฑ)ฮฑ = 0
(11)
to hold, or quivalently, what does it mean for 2n x.2ฮฑ = 2 + 2v.2ฮฑ โก 0 mod 4Z[ฯ ]?
The latter is equivalent to 1 + v.2ฮฑ โก 0 mod 2Z[ฯ ], or finally
v2 + ฯ 0 v3 + ฯ v4 = 1 .
This may happen, but if we cycle the last three terms of ฮฑ around then we get the same equation
but with the coefficients v2 , v3 , v4 likewise cycled around. Adding all three of the equations together
and using the fact that 1 + ฯ 0 + ฯ = 0 we get the contradiction 0 = 1. Thus, for at least one of these
three possibilities for ฮฑ, equation (11) fails, and this version of ฮฑ produces rฮฑ (x) โ Sฬn .
(iii). Suppose that x โ Sฬn and let ฮฑ โ Aฬ. What is required to have 2n rฮฑ x = 0 ? To see what
happens here, it is easiest to fix one particular form that 2n x can take, and we choose (0, 1, ฯ 0 , ฯ ).
All other forms are even permutations of this, and as will be seen, there is no loss in generality in
ห 2ฮฑ is some even permutation of (0, 1, ฯ 0 , ฯ ). Referring to
assuming this form. Now for any ฮฑ โ โ,
(10), the question becomes, how can (2n x.2ฮฑ)ฮฑ = a = (0, 1, ฯ 0 , ฯ ) ? Looking at the 0 in the first
coordinate of 2n x, it is clear that ฮฑ must be one of the elements, (0, ยฑ1, ยฑฯ 0 , ยฑฯ ), (0, ยฑฯ 0 , ยฑฯ, ยฑ1),
or (0, ยฑฯ, ยฑ1, ยฑฯ 0 ). Since an overall sign change in ฮฑ makes no difference to the reflection defined
by ฮฑ nor to the equation we are trying to solve, we can replace the ยฑฯ 0 in each of these by simply
ฯ 0 . Doing this we find there is exactly one solution in each of the three sets.
8
For instance, taking the second type we have
(2n x.2ฮฑ)ฮฑ =
๏ฃฑ
mod 2
๏ฃด
๏ฃด
0(0, ฯ 0 , ฯ, 1) โโ (0, 0, 0, 0)
๏ฃด
๏ฃด
๏ฃด
mod 2
๏ฃฒ1(0, ฯ 0 , โฯ, 1) โโ
(0, ฯ 0 , ฯ , 1)
1
(0, 1, ฯ 0 , ฯ ).(0, ฯ 0 , uฯ, v1) (0, ฯ 0 , uฯ, v1) =
mod 2
๏ฃด
2
โฯ (0, ฯ 0 , ฯ, โ1) โโ (0, 1, ฯ 0 , ฯ )
๏ฃด
๏ฃด
๏ฃด
๏ฃด
mod 2
๏ฃณฯ 0 (0, ฯ 0 , โฯ, โ1) โโ
(0, ฯ , 1, ฯ 0 )
(12)
as u, v go through the various possibilities of sign, so u = 1, v = โ1 gives the value we are looking for.
In fact the other two solutions are just obtained by cyclically permuting the last three coordinates,
so the solutions in this case are
(0, ฯ 0 , ฯ, โ1),
(0, ฯ, โ1, ฯ 0 ),
(0, โ1, ฯ 0 , ฯ ) .
(13)
The three solutions, and only these three, produce the desired effect that 2n rฮฑ (x) โ 2Z[ฯ ]4 , and
0
as a consequence, as we saw above, rฮฑ (x) โ Sฬnโ1
. This concludes the proof of part (iii).
It is worthwhile noting that the three vectors we have found in (13) are all in the plane orthogonal
to the roots (1, 0, 0, 0) and 21 (1, 1, 1, 1) and they lie at angles of 2ฯ/3 to each other.
Let
โ
[
1
a + bฯ
1
R :=
Z[ฯ ] =
: a, b โ Z, n โ Zโฅ0 = Z[ , ฯ ] .
n
n
2
2
2
(14)
n=0
This is a ring which we shall call the ring of dyadic golden numbers.
Proposition 3.9.
ฮฃ[4] =
H โ (โ
โ
[
(Sn โช Sn0 ) = S[4] โฉ R4 .
n=0
โช โ0 ).
Proof: By definition (2), ฮฃ =
Let ฮฃn := Sn โช Sn0 for all n = 0, 1, 2, . . . . We have
0
ฮฃ0 โช ฮฃ1 = โ โช โ โ ฮฃ. Now proceed by induction and assume that we have shown that ฮฃn โ ฮฃ.
0
Then from Prop. 3.5 and Prop. 3.8(iii), Sฬn+1 โช Sฬn+1
โ ฮฃ. By Prop. 3.8(ii) we see that all of
ฮฃn+1 โ ฮฃ. Thus
โ
[
(Sn โช Sn0 ) โ ฮฃ .
n=0
However Prop. 3.5 and Prop. 3.8 show that the left-hand side here is closed under the action of
ห โชโ
ห 0 , and these reflections generate all of H โ . This gives the reverse
the reflections in the roots โ
inclusion. For the final equality see Prop. 3.4.
Proposition 3.10. For all n โฅ 1, card (Sฬn ) = card (Sฬn0 ) = 3.(2)4n+1 .
ห and similarly for Sฬ 0 . Now proceed by induction. We
Proof: Sฬ1 consists of the 96 roots of โ,
1
ห 0 that will
simply have to note that for each element of Sฬn there are 48 reflections arising from โ
map it into 48 images in Sฬn+1 , see Prop. 3.5. However, according to Prop. 3.8(c) each of these
ห 0 . Thus
elements will be produced exactly three times as we use all the reflections available from โ
0
card Sฬn+1 = 16 card Sฬn , and likewise for card Sฬn+1 . This completes the induction step.
The consequence of Prop. 3.8 and Prop. 3.5 is that to go deeper into the structure of ฮฃ we
ห and โ
ห 0 . It is this path that leads to finer and finer
need to apply reflections alternately from โ
discretization of the unitary group.
The situation that we have just described is pictorially represented in Fig. 3.
9
Sฬn+1
Kn+1
ห0
1
0
Sฬn0
ห
ห0
Sฬn
0
ห
Kn
Sฬn
0
Sฬn+1
Kn
1
Sฬn0
1
0
Figure 3: The action of reflections from different types of roots is indicated diagramatically. The
intersection Sn โฉ Sn0 =: Kn is the common โcrystallographicโ part of the two spherical sets. The
lateral actions of โ apply to Sn but not to Sn0 , and similarly with โ0 .
4
H3
The four-dimensional theory that we have outlined so far has a parallel version in three dimensions
around the Coxeter group H3 . Most of the features that we have described in the four-dimensional
case appear again here, but now notationally distinguished with the additional suffix โ[3]โ. When
we are dealing with both settings together, we shall also use the suffix โ[4]โ for the four-dimensional
situation in order to avoid confusion.
The unit sphere in (1/2)Z[ฯ ]3 consists of 54 points, namely the 6 vectors (ยฑ1, 0, 0) and all permutations of its coordinates, and the 48 points (1/2)(ยฑ1, ยฑฯ 0 , ยฑฯ ) and all permutations of these
coordinates. If in the second set of points we restrict them by allowing only even (= cyclic) permutations then they provide 24 points which together with the original 6, produce a set of 30 points
which may be viewed as the non-crystallographic root system โ[3] of type H3 . They are the vertices
of the icosadodecahedron. The reflection group generated by the 15 distinct reflections in these
points, now called roots, that is the reflections in the mirrors (planes) through the origin orthogonal
to these roots, is the icosahedral group H3 of order 120.
As a base for the root system of type H3 we can use the vectors (1/2)(1, ฯ 0 , ฯ ), (1/2)(1, โฯ 0 , โฯ ),
(1/2)(ฯ 0 , ฯ, 1).
Instead of the even permutations of (1/2)(ยฑ1, ยฑฯ 0 , ยฑฯ ) we can conjugate them, thus taking only
all the even permutations of (1/2)(ยฑ1, ยฑฯ, ยฑฯ 0 ) (or equivalently we take all the odd permutations)
and do the same thing. We then end up with โ[3]0 , the set of conjugates of the elements of โ[3].
Again we have a root system of type H3 and again the reflections in these roots generates a copy of
the icosahedral group.
ห
ห 0.
We write โ[3]
for the non-rational roots of โ[3], and similarly for โ[3]
Let H โ [3] denote the group generated by the reflections in โ[3] โช โ[3]0 and let ฮฃ[3] be the orbit
10
of โ[3] โช โ[3]0 under H โ [3]. We shall see that ฮฃ[3] is a dense set of points on the unit 2-sphere S[3].
We put this into the 4-dimensional setting in which we have discussed H4 by considering the
3-dimensional space here as the subspace V := (0, R, R, R). Then it is clear that โ[3] = โ[4] โฉ V and
โ[3]0 = โ[4]0 โฉ V , and indeed all of ฮฃ[3], lies in V โฉ ฮฃ[4]. In fact we shall see that ฮฃ[3] = V โฉ ฮฃ[4].
Later on we shall put everything into the setting of the algebra of quaternions H, at which point
V will be come the subspace of pure quaternions.
As before, let F4 := Z[ฯ ]/2Z[ฯ ] and let x 7โ x denote the natural homomorphism of Z[ฯ ] โโ F4 .
In place of F44 we will now wish to use F34 . It is often convenient to identify this with the subspace
(0, F4 , F4 , F4 ) of F44 , and we will do this when it is useful to do so.
Using this we define the analogues of A[4] and A[4]0 , namely
A[3] := A[4] โฉ V ,
A[3]0 := A[4]0 โฉ V
(15)
which will play the same role as A and A0 in the four-dimensional case. Written as elements of F34
A[3] = {(0, 0, 0), (1, ฯ 0 , ฯ ), (ฯ 0 , ฯ , 1), (ฯ , 1, ฯ 0 )} ,
and similarly for A[3]0 . Define Aฬ[3] := Aฬ[4] โฉ V = Aฬ[4] โฉ V , and similarly Aฬ[3]0 .
The dot product on F34 is defined by u.v = u.v for all u, v โ Z[ฯ ]3 , which matches the dot product
it has as a subspace of F44 . From Prop. 2.1 we have:
Proposition 4.1.
(i) A[3].A[3] = 0. In particular, for all ฮฑ, ฮฒ โ โ[3], 2ฮฑ.ฮฒ โ Z[ฯ ];
ห
ห 0 then 2ฮฑ.ฮฒ โ
(ii) for all a โ Aฬ[3] and b โ Aฬ0 [3], a.b 6= 0. In particular if ฮฑ โ โ[3]
and ฮฒ โ โ[3]
/ Z[ฯ ].
We now obtain very similar results to those of ยง3. We mainly just list these, the proofs being
basically the same. However, there is one significant difference that appears immediatelyโthere are
no longer two spherical sets to deal with. For n โฅ 1, we define
1
Sn [3] := x โ n Z[ฯ ]3 : x โ S[3], and 2n x โ Aฬ[3] ,
2
and similarly Sn [3]0 using A0 . We call n here the level of the spherical set. The sets Kn and Kn0 have
no relevant counterparts if n > 0 since
Sn [3] โฉ Sn [3]0 = โ
.
To these we add
K0 [3] := S0 [3] = S0 [3]0 = {ยฑ1, 0, 0), (0, ยฑ1, 0), (0, 0, ยฑ1)} .
It is clear that S[3] = S[4] โฉ V and Sn [3] = Sn [4] โฉ V , and parallel statements for S 0 .
As a consequence of Cor. 3.2:
Proposition 4.2.
11
ห
(i) S1 [3] = โ[3];
(ii) for all n โฅ 0,
[
1
0
3
(Sm [3] โช Sm
[3]) .
Z[ฯ
]
โฉ
S[3]
=
2n
mโคn
Furthermore, x โ
1
3
2n Z[ฯ ]
โฉ S[3] is in Sn [3] โช Sn0 [3] if and only if 2n x 6= {0, 0, 0}.
For each ฮฑ โ โ[3], we also have ฮฑ โ โ[4] and the reflection in ฮฑ taken in V is just the restriction
of the reflection rฮฑ taken in R4 restricted to V . We use the same symbol rฮฑ for both, with context
distinguishing them if necessary. Corresponding primed notation will be used for โ[3]0 . H3 , H30
denote the groups generated by the reflections of โ[3] and โ[3]0 respectively. We may think of these
groups as subgroups of H4 and H40 .
From Prop. 3.5 we have
ห 0 , rฮฑ0 Sn [3] โ S 0 [3].
Proposition 4.3. For all ฮฑ0 โ โ[3]
n+1
ห
ห 0 , rฮฑ rฮฒ 0 has infinite order.
Corollary 4.4. For all ฮฑ โ โ[3]
and for all ฮฒ 0 โ โ[3]
Following the arguments of Prop. 3.7 we have
Proposition 4.5.
โ [3] is dense in SO(3);
(i) H+
(ii) H โ [3] is dense in O(3);
(iii) ฮฃ[3] is dense in S[3].
Define VR := V โฉ R4 . It is now rather easy to use the four-dimensional results of ยง3 to deduce corresponding results about the three-dimensional situation. We state these without further
comment.
Proposition 4.6.
ฮฃ[3] =
โ
[
(Sn [3] โช Sn0 [3]) = S[3] โฉ VR = S[4] โฉ VR = ฮฃ[4] โฉ VR = ฮฃ[4] โฉ V .
n=0
Proposition 4.7. For all n โฅ 1, card (Sn [3]) = card (Sn0 [3]) = 3.(2)2n+1 .
Proof: S1 [3] consists of the 24 roots of โ[3], and similarly for S10 [3]. Now proceed by induction. We
simply have to note that for each element of Sn [3] there are 12 reflections arising from โ[3]0 that
will map it into 12 images in Sn+1 [3], see Prop. 3.5. However, according to Prop. 3.8(iii) (which
is actually set up so as to make the corresponding three dimensional case rather apparent) each
of these elements will be produced exactly three times as we use all the reflections available from
0
โ[3]0 . Thus card Sn+1
[3] = 4 card Sn [3], and likewise for card Sn+1 [3]. This completes the induction
step.
12
5
How ฮฃ[4] acts on ฮฃ[3]
Proposition 5.1.
(i) H โ [4] acts transitively on ฮฃ[4] ;
(ii) H โ [3] acts transitively on ฮฃ[3] ;
(iii) For each ฮฑ โ ฮฃ[4] the set of roots (elements of ฮฃ[4]) orthogonal to ฮฑ is a translate of ฮฃ[3] by
an element of H โ [4] ;
(iv) For each ฮฑ โ ฮฃ[4] the stabilizer of ฮฑ in H โ [4] contains a subgroup conjugate to H โ [3].
Proof: (i) It suffices to show that H โ [4](1, 0, 0, 0) contains the basic roots of (6). This happens
because in the Coxeter diagram of Fig. 2, (1, 0, 0, 0) is connected to the four others by chains of
bonds that are all odd (namely labelled with 3 or 5). The argument is easily explained by doing it
for the case of a bond labelled 3 between two roots ฮฑ, ฮฒ. Then rฮฑ rฮฒ rฮฑ rฮฒ rฮฑ = rฮฒ . But the left side
is also rrฮฑ rฮฒ (ฮฑ) , showing that rฮฑ rฮฒ (ฮฑ) = ยฑฮฒ. If the sign is wrong we can use one more reflection rฮฒ .
The proof of (ii) is similar.
(iii) The stabilizing reflections ra of (1, 0, 0, 0), where a โ ฮฃ[4], consists of all elements of ฮฃ[4] โฉ
V = ฮฃ[3], see Prop. 4.6. Parts (iii) and (iv) follow directly from this.
Instead of thinking of โ[4] and โ[4]0 simply as subsets of R4 , we can view them as subsets of
the quaternion algebra H = R1 + Ri + Rj + Rk. We will identify the subspace V of R4 that we have
been using with the subspace of pure quaternions: V = Ri + Rj + Rk. Then โ[3] = โ[4] โฉ V โ H
and similarly for โ[3]0 . Generally we use this interpretation henceforth.
We equip H with the usual conjugation u 7โ u
e which changes the signs of the last three compo2
nents of each vector. The usual dot product of R4 is the standard one for H, and can be expressed
in terms of the quaternionic multiplication by
1
x.y = (xe
y + ye
x) .
2
As is well known, the unit sphere S of H, that is the set of vectors a โ H satisfying e
aa = 1, can
be identified with SU (2). Explicitly S can be interpreted as the group SU (2) by the usual matrix
representation of H using
โ
โ
1 0
โ1
0
0
1
โ1
0
โ
1โ
, iโ
, jโ
, kโ โ
.
(16)
0
โ โ1
โ1 0
โ1
0
0 1
Returning to the ring (14), we define SU (2, R) to be the set of all unitary matrices with coefficients in R + iR. Using (16), SU (2, R) identifies with the set of all quaternions with coefficients in
R with norm 1, i.e. with R4 โฉ S[4].
SU (2, R) is a subgroup of SU (2), and it is S[4] โฉ R4 = ฮฃ[4] by Prop. 3.9. This tells us that ฮฃ[4]
has the natural structure of a group, namely SU (2, R). Furthermore, since ฮฃ[4] is dense in S[4],
SU (2, R) is dense in SU (2).
We recall that for any a โ S and any x โ H we have
ra (x) = x โ (2x.a)a = x โ (xaฬ + axฬ)a = โaxฬa .
2
Usually the conjugation is designated by the
, but that would cause confusion with our earlier notation.
13
(17)
In particular this shows that reflection can be effected by multiplication. Since ฮฃ[4] is by definition
the smallest set containing โโชโ0 and closed under its own reflections, it follows that ฮฃ[4] is generated
as a group by โ โช โ0 .
Now we are viewing V as ordinary three-dimensional space, and since V = Ri + Rj + Rk, so
x โ V if and only if x
e = โx. Then for all a โ S and all x โ V ,
^
ga = a(โx)e
โ1 = axe
axa
a = โaxaโ1 ,
showing that axaโ1 โ V . This is the familiar way in which elements of SU (2) turn into elements of
SO(3), so that a โ SU (2) maps to the conjugation ฮณa : x 7โ axaโ1 on V . This is a rotation, and in
this way we obtain the well-known double cover mapping
SU (2) โโ SO(3) .
(18)
However, there is more. If a โ ฮฃ[4] then for all x โ ฮฃ[3], then axaฬ โ ฮฃ[3], since if a โ 21n Z[ฯ ]4 and
1
x โ 21m Z[ฯ ]3 then axaฬ โ 2m+2n
Z[ฯ ]3 โฉ S[3] โ ฮฃ[3]. Thus the group of rotations on the sphere in
3-space induced by ฮฃ[4] actually acts as a group of symmetries of ฮฃ[3]. In particular they all lie in
SO(3, R).
Proposition 5.2.
(i) ฮฃ[4] = R4 โฉ S[4] is a group under quaternion multiplication and is generated by โ โช โ0 ;
(ii) ฮฃ[4] = SU (2, R) and SU (2, R) is dense in SU (2);
(iii) ฮฃ[4] acts naturally as a group of isometries on ฮฃ[3] via the mapping ฮณa : x 7โ axaฬ for all
a โ ฮฃ[4] = SU (2, R);
(iv) Under the mapping ฮณ in (iii), SU (2, R) maps onto a subgroup of index 2 in SO(3, R).
Proof: There remains only to prove (iv). Let ฯ := ( โ12 , โ12 , 0, 0). We begin by making the observation
that
ฮณi ((x1 , x2 , x3 , x4 )) = (x1 , x2 , โx3 , โx4 )
ฮณj (x1 , x2 , x3 , x4 )) = (x1 , โx2 , x3 , โx4 )
(19)
ฮณk ((x1 , x2 , x3 , x4 )) = (x1 , โx2 , โx3 , x4 )
ฮณฯ ((x1 , x2 , x3 , x4 )) = (x1 , x2 , โx4 , x3 ) .
Since the mapping SU (2) โโ SO(3) is 2 : 1 and its kernel is ยฑ1 โ SU (2), it is clear that the last
of these rotations, ฮณฯ , while is is in SO(3, R), is not something that can arise from SU (2, R). We
shall see that this is the only obstruction that we have to deal with.
Since ฮฃ[3] = S โฉ VR , SO(3, R) maps ฮฃ[3] into itself. Let G := ฮณSU (2,R) denote the image of
SU (2, R) in SO(3, R) under the mapping SU (2) โโ SO(3, R). Note that if a โ ฮฃ[3] and x โ V
then xฬ = โx and (17) reads
ra (x) = โaxฬa = axa = โaxaโ1 .
(20)
Now suppose that R โ SO(3, R). We wish to make R as simple as possible by multiplying R on
the left by elements in G. Consider R(0, 1, 0, 0) โ S โฉ VR = ฮฃ[3]. Since H โ [3] is transitive on ฮฃ[3],
14
there exists w โ H โ [3] with wR = (0, 1, 0, 0). Writing w = rak . . . ra1 , (20) shows that (โ1)k w โ G.
This being the case we can assume at the outset that R(0, 1, 0, 0) = (0, ยฑ1, 0, 0). However we see
from (19) that we can alter this sign, so we can actually assume that R(0, 1, 0, 0) = (0, 1, 0, 0). Now,
the only elements of ฮฃ[3] that have the form (0, 0, โ, โ) are (0, 0, ยฑ1, 0) and (0, 0, 0, ยฑ1), and since R
is an orthogonal transformation fixing (1, 0, 0, 0) and (0, 1, 0, 0), it can only permute these two pairs
roots around. Of the four possible rotations that are possible here, two of them require interchanging
the two coordinate positions and changing one sign, and that requires ฮณฯ . Thus, by composing R
with elements of G we can reduce to one of the pair {1, ฮณฯ }; and indeed, ฮณฯ โ
/ G. This proves that
[SU (2) : G] = 2.
We note that SO(2, R) is not dense in SO(2), since the only R-points on the unit circle are
(ยฑ1, 0) and (0, ยฑ1). Likewise U (2, R) (the subgroup of all the elements of U (2) whose coefficients
are in R+iR) is not dense in U (2)โand for basically the very same reason: det on U (2) is surjective
onto the unit circle.
Proposition 5.3. The stabilizer of (1, 0, 0, 0) in hH โ [4], ฮนi is hH โ [3], ฮนi where ฮน is the permutation
operator on the last two coordinates.
Here H โ [3] is in its obvious form of working on the last three coordinates, that is on the space
V = Ri + Rj + Rk in the quaternions, and hH โ [3], ฮนi is the group generated by H โ [3] and ฮน.
Proof: The first observation is that in H3 the rotation of the last three coordinates exists (as a
rotation of order 3) and also the changes of signs of the individual coordinates exist (as the reflections
in these coordinates). The same goes for H30 , of course. Now let w โ H โ [4] be in the stabilizer of
z := (1, 0, 0, 0). Let y := (0, 1, 0, 0) and let x := w(y). Then x โ V since w is an isometry. Since
H โ [3] is transitive on ฮฃ[3], there is a v โ H โ [3] with v(x) = y = (0, 1, 0, 0). Now the element vw
fixes both x and y. We can ask what vw does to ฮฃ[4]. It must map the remaining two elements
(0, 0, 1, 0) and (0, 0, 0, 1) into roots of the form (0, 0, โ, โ). However the general form of roots shows
that the only possibilities are (0, 0, ยฑ1, 0) and (0, 0, 0, ยฑ1). The signs can be adjusted as we please
by using an element from the Weyl group of K, but vw may still interchange the two points, in other
words may be the involution ฮน. We shall show in Prop. 9.1 that H โ [4] does not contain ฮน.
6
โ and โ0 as groups
The two basic root systems we began with are โ and โ0 . The rational parts of these sets is their
intersection K = โ โฉ โ0 .
Proposition 6.1. K, โ, and โ0 are groups (under quaternion multiplication) of orders 24, 120, 120
respectively.
This is a well-known fact, see for instance [5] ยง20. But for the convenience of the reader we prove
it here.
Proof: For the rational root system K it is clear that the product of any two elements of K is a unit
vector in the rational space (1/2)Z4 , and so is still in K. Inversion is just quaternion conjugation,
and it preserves K. Thus K is a group with order 24.
We shall prove that โ is a group; the proof for โ0 then follows immediately. The roots of โ are
given in (1). The first set of these consists, in quaternion notation, of the elements ยฑ1, ยฑi, ยฑj, ยฑk.
Multiplication of a quaternion (x1 , x2 , x3 , x4 ) on the left by i turns it into (โx2 , x1 , โx4 , x3 ). There
are sign changes, but the important thing to observe is that it performs an even permutation of
15
the coordinates, interchanging the first two coordinates and the last two coordinates. Likewise
multiplication by j or k performs an even permutation of the coordinates (and makes two sign
changes). Similar things happen if the multiplication by i, j, k is on the right. In particular, left and
right multiplications by ยฑ1, ยฑi, ยฑj, ยฑk map โ into itself.
Now apart from the elements ยฑ1, ยฑi, ยฑj, ยฑk in โ, every other x โ โ has the property that
2x โ Z[ฯ ]4 and 2x 6= (0, 0, 0, 0) in F44 . In fact 2x is either (1, 1, 1, 1) or an even permutation of
(0, 1, ฯ 0 , ฯ ). This property actually characterizes elements of norm 1 that are in โ\{ยฑ1, ยฑi, ยฑj, ยฑk}.
Similar remarks hold for โ0 where the roles of ฯ and ฯ 0 are interchanged.
Now let x, y โ โ. We want to prove that xy โ โ. By what we said above, we can assume neither
is in the set {ยฑ1, ยฑi, ยฑj, ยฑk}. We begin by showing that 2xy โ Z[ฯ ]4 . By assumption 2x and 2y
are in Z[ฯ ]4 . We know that even permutations and arbitrary sign changes on y will leave it in โ. In
particular yฬ โ โ, and so we know that 2x.yฬ โ Z[ฯ ], by Prop. 2.1. Now x.yฬ is the first coordinate in
the quaternion xy, so we know that that the first coordinate in 2xy is 2x.y โ Z[ฯ ].
If we look at the second coefficient of xy we can see that it is (x1 , x2 , x3 , x4 ).(y2 , y1 , y4 , โy3 ), so
this shows that the second coefficient of 2xy is in Z[ฯ ]. Continuing this idea with the third and
fourth coefficients we end up with 2xy โ Z[ฯ ].
At this point, since |xy| = |x| |y| = 1 we know that xy is an element of โ or โ0 . However, it is
ห 0 (that is to say in โ0 \โ). We can see this in the following way. The first
not possible for xy โ โ
ห and v โ โ
ห 0 then neither uv nor vu is in โโชโ0 . The reason is that 2u.v โ
thing to note if u โ โ
/ Z[ฯ ],
0
โ1
โ1
ห
see Prop. 2.1. So if we assume that xy โ โ then from y = x (xy) we have that x cannot be in
ห But x and xโ1 are in โ, so this shows that xโ1 , and hence also x, is in K. Similarly x = (xy)y โ1
โ.
shows that y is in K. But then xy โ K since K is a group. This is contradicts the assumption that
ห 0 , so xy โ โ. This finishes the proof.
xy โ โ
We note in passing that
ห โ โ;
ห Kโ
ห0โโ
ห 0.
Kโ
(21)
since โ (resp. โ0 ) is a group and the products cannot be in K, for it is a subgroup.
We now determine basic the structure of ฮฃ as seen from its generation by the two groups โ and
โ0 .
The following set C of elements is a set of representatives for the four non-trivial right cosets of
K in โ :
1
1
1
1
0
0
0
0
(0, 1, ฯ , ฯ ), (0, โ1, ฯ , ฯ ), (0, 1, โฯ , ฯ ), (0, 1, ฯ , โฯ ) .
(22)
2
2
2
2
Similarly for C 0 and the right cosets of K in โ0 .
Now, any non-trivial element of ฮฃ can be written as an alternating product of elements of โ and
0
โ . Using the coset representatives we can always write such a product in the form
wam amโ1 . . . a2 a1
(23)
where the ai are alternately in C and C 0 and w โ K, since K is a subgroup of both โ and โ0 .
We are going to prove that this writing is unique: each element of ฮฃ can be written uniquely in
this form. The key to this is to introduce the set E โ Z[ฯ ]4 /4Z[ฯ ]4 , defined as the set of all
{(x1 + y1 ฯ, x2 + y2 ฯ, x3 + y3 ฯ, x4 + y4 ฯ )
where the xi and yi are integers and
16
mod 4Z[ฯ ]4 }
(24)
โข all the xi are congruent to 1 or 3 modulo 4;
โข all the yi are congruent to 0 or 2 modulo 4;
โข the number of xi congruent to 1 is even ;
โข the number of yi congruent to 2 is odd.
It is straightforward to see that this set has 64 elements. Using conjugation, we have the second
set E 0 which is easily seen to have the same four properties except that the number of xi congruent
to 1 is odd (we are retaining the x + yฯ form). These two sets have remarkable properties:
Lemma 6.2.
(i) (1/2)EE = E
and
(1/2)E 0 E 0 = E 0 ;
(ii) E โฉ E 0 = โ
;
(iii) 4CC 0 โ E
and
4C 0 C โ E 0 .
Part (ii) is clear from the definitions. It is only necessary to verify the first parts of (i) and (iii).
At the present time we have depended on brute force computation to prove this. For example, in
looking at 4CC 0 in (iii), we have the following of these 16 products:
โ โ โ
โ
โ
โ
(1, โ โ5, 5, 5)
(3,โโ 5,โโ1, 1)โ
(โ1, 3, 5,
(โ1, โ3,
โโ1)
โ1, 5)
(3, โ 5, โ
1, โ1) (1, โ 5, โ 5,โโ 5)
(1,
(1, โ3,โ 5, โ1)
โ 3,โ1, 5)โ
(1, โ3, โ1,
5)
(1, 5,โ 5, โ 5)
(โ3,
5, 1,โ1)
(โ1, โ3, 5,
โ1)
โ
โโ โ
(โ1, 3, โ1, 5)
(1, 3, 5, 1)
(โ3, โ 5, โ1, โ1) (1, 5, โ 5, 5)
from which one can convert into x + yฯ form to show 4CC 0 โ E. Conjugating we see that 4C 0 C โ
E0.
Using Lemma 6.2, let us show that is not possible for zam amโ1 . . . a2 a1 of (23) to be equal to
1, except trivially. The ai alternate between C and C 0 , and, for definiteness assume that a1 โ C 0 .
This analysis of this case uses E, while the case with a1 โ C uses E 0 .
Now suppose that wam amโ1 . . . a2 a1 = 1. Then am amโ1 . . . a2 a1 = wโ1 . For this to happen
โ1
m โฅ 2. If m is odd we can take the am to the other side to get amโ1 . . . a2 a1 = aโ1
m w . In either
case the right hand side is of level at most 1, and now we can assume that m = 2n is even and n โฅ 1.
We will show that the level of the left-hand side is n + 1, leading to a contradiction of levels.
Starting with 4a2 a1 โ 4CC 0 โ E, which shows that a2 a1 has level 2. Next we have
8a4 a3 a2 a1 = (1/2)(4a4 a3 )(4a2 a1 ) โ (1/2)EE = E ,
showing that a4 a3 a2 a1 has level 3. If n > 2 we can continue in this way to show that a6 a5 a4 a3 a2 a1
has level 4, and so on. This shows that indeed the level of the left-hand side is n + 1. Of course the
argument when a1 โ C can be obtained by conjugating the equation.
Now to show the uniqueness of the standard form, suppose that
wam amโ1 . . . a2 a1 = zbp bpโ1 . . . b2 b1
are two expressions in the form (23).
17
O(4)
SU (2)
dense
dense
SU (2, R)
O(4, R)
โ
H1
=
2
amalgamation of
and 0
over K
0
H40
H4
K
N (K)
{1}
{1}
root systems
amalgamation of
H4 and H40
over N (K)
groups
Figure 4: How ฮฃ and H โ appear as amalgamations.
Supposing that the two expressions are different, we can assume that p + m is minimal for such
ห
an equality. We can push w to the other side, and so assume from the outset that w = 1. If a1 โ โ
0
ห
and b1 โ โ , or vice-versa, then we can invert all the elements of the left hand side and get a new
reduced expression that equals 1, and we know that this cannot happen.
ห say, then b1 aโ1 โ โ and we can rewrite the
If on the other hand a1 and b1 are both in โ,
1
right-hand side, to bring it into standard form again, while not increasing the number of terms on
the right-hand side, and in so doing reduce the combined length p + m, contrary to our minimality
assumption. So this case does not happen either. This proves the uniqueness of expression in (23)
Putting this together we have shown:
Proposition 6.3. Every element of ฮฃ is uniquely expressible in the form (23). The group ฮฃ is the
amalgamation of the two groups โ and โ0 over K, i.e. it is the free product of โ and โ0 factored
by the normal subgroup generated identifying the elements of a โ K appearing in โ and โ0 .
7
W (K) and its normalizer
We know that H โ [4] is generated by two copies of the Coxeter group of type H4 , namely H4 and
H40 . In this section we shall call them W (โ) and W (โ0 ). Both of them contain the subgroup W (K)
generated by the reflections defined by K, and this is a Coxeter group (of type D4 ). Using the root
bases described above we see that together they create the Coxeter diagram (2). As we will see
below, it appears that there is an additional relation beyond the Coxeter relations, see (26). We
shall show the origin of this relation and how together with the obvious Coxeter relations, we obtain
a presentation of H โ [4].
18
We begin with looking at the group
N (K) := {w โ W (โ) : w(K) = K} .
(25)
Similarly we have N (K)0 for the stabilizer of K in W (โ0 ).
Since K is a root system of type D4 , its complete group of automorphisms is the semi-direct
product of W (K) and the symmetric group S3 (which acts as diagram automorphisms).
Lemma 7.1.
(i) N (K) is the semi-direct product of W (K) and a cyclic group of order 3.
(ii) N (K) is the normalizer of W (K) in W (โ) .
(iii) The parallel results hold for W (โ0 ) and its normalizer N (K)0 .
(iv) N (K) = N (K)0 = W (โ) โฉ W (โ0 ) = H4 โฉ H40 .
Proof: The set K is a root system of type D4 and W (K) is its Weyl group. Thus N (K)/W (K) is
a subgroup S3 of diagram automorphisms of D4 . Comparing the orders 26 .32 .52 of W (โ) and 26 .3
of W (K) ([1]), we see that the index [N (K) : W (K)] is either 1 or 3. We shall now see that it is 3.
The Sylow 3-groups of W (โ) are of order 9. They are in fact the direct product of two cyclic
groups of order 3. We can see this from the fact that there are subgroups of type A2 ร A2 inside
H4 . E.g. we have the root pairs {(1, 0, 0, 0), (1/2)(โ1, 1, 1, 1)} and {u := (1/2)(0, โ1, ฯ 0 , ฯ ), v :=
(1/2)(0, ฯ 0 , ฯ, โ1)}, both of which are A2 bases. Let ฮ be the associated A2 ร A2 root system.
Multiplying, we find that uv = (1/2, โ1/2, โ1/2, โ1/2) โ K and
ru rv (x1 , x2 , x3 , x4 ) = uv(x1 , x2 , x3 , x4 )vu = (x1 , x3 , x4 , x2 ) .
This three cycle performs a diagram automorphism of the D4 root system K and together with
W (K) it generates N (K).
Although u, v โ โ\K, their product is in K. Thus we have u0 , v 0 โ โ0 \K and their product
is the same element of K. They serve to produce the very same three cycle, and hence lie in the
normalizer N (K)0 of W (K) in W (โ0 ). Thus N (K) = N (K)0 .
Any element of w โ W (โ0 ) โฉ W (โ) maps K = โ โฉ โ0 into itself and so stabilizes K. Thus it is
in N (K) = N (K)0 .
Let
s := ru rv = ru0 rv0 .
(26)
Using (26) we can write down a presentation for the group H โ [4]. The presentation uses abstract
generators Rฮฑ , Rฮฑ0 and relations that involve the reflections rฮฑ , rฮฑ0 . This is discussed in the next
section.
Comment: All of the Sylow 3-subgroups of W (โ) are conjugate by elements of W (โ). The ones
that are in N (K) are Sylow 3-subgroups of it and so are conjugate by elements of N (K) to each
other, and in particular to the one that we used above. These conjugations must conjugate ฮ into
other A2 ร A2 root systems in โ. Each of these root systems generates another relation, just like
(26). Of course these are just ones that follow from the conjugation of (26).
19
8
A presentation of H โ
The purpose of this section is to prove
Proposition 8.1. H โ = H โ [4] is generated by the following generators and relations:
(i) generators Rฮฑ , ฮฑ โ โ, and Rฮฑ0 , ฮฑ0 โ โ0 ;
(ii) Rฮฑ2 = 1 = Rฮฑ2 0 for all ฮฑ โ โ and for all ฮฑ0 โ โ0 ;
(iii) relations Rฮฑ = Rฮฑ0 for all ฮฑ โ K;
(iv) relations Rฮฑ Rฮฒ Rฮฑโ1 = Rrฮฑ (ฮฒ) for all ฮฑ, ฮฒ โ โ; and similar relations for โ0 ;
(v) with u, v โ โ\K and u0 , v 0 โ โ0 \K as given above, Ru Rv = Ru0 Rv0 .
Notice that Rฮฑ = Rฮฑ Rฮฑ Rฮฑโ1 = Rโฮฑ for all ฮฑ โ โ and similarly for โ0 .
The proof depends on working explicitly with the group H โ and the reflections rฮฑ , rฮฑ0 as they
appear in terms of the algebra of the quaternions, and showing that we can untangle any relation
written in terms of these generators by only using the relations corresponding to those itemized in
the statement of the Proposition.
We begin by recalling that for a โ S, the quaternionic form of the reflection ra in a (17). The
effect of a product of reflections rak ยท ยท ยท ra2 ra1 acting on x is
(
โak ag
e a1 ae2 . . . ag
kโ1 . . . ae2 a1 x
kโ1 ak if k is odd
x 7โ
(27)
aek akโ1 . . . a2 e
a1 x e
a1 a2 . . . akโ1 aek if k is even .
When we write out products of reflections as two-sided products, as in (27), this involves alternately conjugating elements (this is quaternion conjugation, which we are designating by tilde),
with the explicit form depending on whether there are an even or an odd number of reflections
involved, and a possible overall sign change. This is rather messy to write down but quite trivial to
do in practice. In order to avoid lots of notation we simply signify the whole conjugation process
by putting a hat on each symbol, e.g. aฬ, which is capable of being conjugated. Thus the symbol
beneath the hat may or may not be conjugated according to the overall length being even or odd.
Thus we write
rak . . . ra1 (x) = (โ1)k abk . . . ab1 x
b ab1 . . . abk .
(28)
ห and โ
ห 0.
Notice that conjugation stabilizes each of K, โ,
Proof:(Prop. 8.1) Let
rak . . . ra2 ra1 = 1
(29)
be a non-trivial relation in H โ , written in terms of root reflections raj where the aj โ โ โช โ0 . Our
objective is to show that such a relation is a consequence of the relations (i)โ(v). Equivalently we
wish to show that the word on the left-hand side of (29) can be reduced to the empty word by using
only these relations. We can rewrite the left-hand side in the form (28).
To begin with consider any product rbp . . . rb1 with all bj โ โ and its action on H:
rbp . . . rb1 (x) = (โ1)p bbp . . . bb1 x
b bb1 . . . bbp ,
20
for all x โ H.
Let bbp . . . bb1 =: BL and bb1 . . . bbp =: BR . Then BL , BR โ โ since โ is a group, and the mapping
assumes the form
x 7โ (โ1)p BL x
b BR .
There seems to be no simple relationship between BL and BR , and it seems quite possible that
one would belong to K while the other would not. However, if both BL , BR โ K then we can see
that rbp . . . rb1 โ N (K). In fact, using the fact that the central inversion โ1 โ W (K) we see that for
all x โ K, rbp . . . rb1 (x) = (โ1)p BL x
b BR โ K, see (25). Notice that the fact that rbp . . . rb1 โ N (K)
is a fact that takes place entirely inside the group W (โ), that is to say, it is determined entirely by
the structure of W (โ) as a Coxeter group. In view of the structure of N (K), we can rewrite the
product rbp . . . rb1 so as to assume that all the bj โ K with the possible exception of bp , bpโ1 which
may be u, v or v, u, see (26). This is all deducible from the Coxeter relations of W (โ).
We now begin to parse the word on the left-hand side of (29), utilizing the form of (28), from
right to left. For definiteness we will assume that a1 โ โ. We now move to the left until we reach the
first ap+1 โ
/ โ. If all the roots involved are in โ, so p = n, there is nothing to prove since the whole
word is in W (โ) and the relation (29) is a consequence of the Coxeter relations of W (โ). Assuming
(1)
(1)
that p 6= n, we rewrite rap . . . ra1 using the two blocks BL = abp . . . ab1 and BR = ab1 . . . abp which are
both in โ. In the case that rap . . . ra1 โ N (K) we rewrite with the word (using the Coxeter relations
of W (โ)) so that all the aj involved are in K with the possible exception that ap , apโ1 are the pair
u, v in some order. In that case we use (26) to replace this pair with u0 , v 0 in the corresponding
order, thus shifting these last two letters into โ0 and passing them on to the next block and using
(1)
(1)
only ad
pโ2 . . . ab1 to make our blocks BL and BR . These two blocks are then elements of K. So
(1)
(1)
in the case rap . . . ra1 โ N (K)\K, we do this little trick to make BL , BR โ K and pass along the
non-K terms to subsequent blocks. We write q = p or q = p โ 2 accordingly.
We may assume that this rewriting and the passing along of pairs ru rv or rv ru , has been done
ห
in advance. That means that each block multiplies out to be either in K or in โ.
We now continue the parsing process from where we left off, this time producing a new set
(2)
(2)
aq , . . . , ap+1 which are of elements in โ0 whose left and right product produce blocks BL and BR ,
which are both in โ0 . Again, if these two blocks are both in K then ras . . . raq+1 โ N (K)0 = N (K),
and this is derivable from the Coxeter relations of W (โ0 ).
(2)
(2)
There is a little bit of extra attention needed here. The elements aj appearing BL and BR have
their conjugations determined by the parity of their positions in the sequence of reflections appearing
(2)
(2)
in (29). But as an element of W (โ0 ), the action of ras . . . raq+1 might be either u 7โ ยฑBL uฬ BR , or
the conjugations may be interchanged so its action would be
g
(2) e g
(2)
u 7โ ยฑBR u
b BL .
(2)
(2)
In either case, if both BL and BR are in K, the ras . . . raq+1 maps K into K and so lies in N (K).
We continue this process until we finally achieve a rewriting of left-hand side of (29) in the form
(h)
(1)
(1)
(h)
(โ1)n BL . . . BL (b
x)BR . . . BR = x ,
(30)
where n is the original length of the word we began with. This equation is valid for all x โ H4 . Of
ห or โ
ห 0.
these, all blocks multiply to be in K or โ
21
Now if all the blocks here lie in K then, as we saw above, the entire effect on x is that of an
element of N (K), and the entire relation can be determined, block by block, only using the Coxeter
ห or โ
ห 0 . Choose
relations of W (โ) and W (โ0 ). So let us suppose that at least one block is either in โ
a first such block to appear either to the left or right of x; call it B. The blocks, if any, that lie
between x and B are in K.
ห and suppose it is on the right. Choose x โ โ
ห 0 . Then on
For definiteness suppose B is of type โ
the left-hand side we have a partial product in the set
ห 0 [ possible blocks in K] โ
ห ...
...โ
From this we see that every element in the left-hand side has level at least 2, see Prop. 6.3 and
the discussion preceding it. The level can only increase if there are any other alternations of blocks
ห and โ
ห 0 in (30). The right hand side of (30) has level 1. This is a contradiction. This
of types โ
argument works in the same way if B is on the left.
This contradiction shows that all the blocks must lie in K, and so the relations (i)-(v) Prop. 8.1
suffice to reduce the left-hand side of (29) to the empty word. This proves that these relations are
a presentation of H โ .
There is a more succinct way of saying this that is useful. Let C be a set of coset representatives
for all the non-trivial right cosets of H4 mod N (K), and let D be a set of coset representatives for
all the non-trivial right cosets of H40 mod N (K). That is
[
H4 = N (K) โช
N (K) y (disjoint union)
yโC
and D does the same for H40 . A natural choice would be to relate C and D by using the conjugation
( )0 . However it is better to keep the freedom for other choices, as we shall see below.
Proposition 8.2.
(i) Let C (resp. D) be a set of coset representatives for all the non-trivial right cosets of H4
mod N (K) (resp. H40 mod N (K)). Then very element of H โ [4] is uniquely expressible in
the form
z yk . . . y1
(31)
where z โ N (K), and where the yj alternate between C and D.
(ii) H โ is the amalgamation of H4 = W (โ) and H40 = W (โ0 ) over their intersection N (K).
Proposition 8.3. Let us choose C and D of Prop. 8.2 so that the representatives are actually in
H3 (resp. H30 ) when the coset contains elements of these subgroups. Then
(i) every element of H โ [3] โ H โ [4] is uniquely expressible in the form
z yk . . . y1
where z โ H3 โฉ H30 , and where the yj alternate between C and D ;
(ii) H โ [3] is the amalgamation of H3 = W (โ[3]) and H30 = W (โ[3]0 ) over their intersection.
22
Proof: Notice that K โฉ V = {(0, ยฑ1, 0, 0), (0, 0, ยฑ1, 0), (0, 0, 0, ยฑ1)} = โ[3] โฉ โ[3]0 , which is a root
system of type A1 ร A1 ร A1 inside โ[3]. The stabilizer of K โฉ V in H3 is the semi-direct product of
the Weyl group of A1 ร A1 ร A1 and the cyclic group of order three arising by cycling the last three
components of K โฉ V (or equivalently cycling the three A1 s). All of these elements are in N (K) and
from this we see that the stabilizer of K โฉ V in H3 is N (K) โฉ H3 . In the same way the stabilizer of
K โฉ V in H30 is N (K) โฉ H30 , and from this we see
N (K) โฉ H3 = N (K) โฉ H30 = H3 โฉ H30 .
Now H โ [3] is the subgroup of H โ [4] generated by H3 and H30 . According to Prop. 8.2 every
element of H โ [4] is uniquely in the form (31). Amongst all the expressions (31), consider all those
in which all the elements occurring are actually in H3 or H30 , and z โ H3 โฉ H30 โ N (K). All of these
expressions are obviously elements of H โ [3]. Whatโs more, every element of H โ [3] can evidently be
written in this form. So H โ [3] is composed precisely of all of these products. Since the expression
in this form is unique, we see that in fact it says that this is the amalgamation of H3 and H30 over
their intersection.
9
The orthogonal group
Define O(ฮฃ) = O(ฮฃ[4]) to be the group of all orthogonal transformations of R4 that stabilize the root
system ฮฃ. We already know a lot of transformations in O(ฮฃ), namely all the elements of H โ . Along
with O(ฮฃ) we shall consider the orthogonal group O(4, R) of all orthogonal matrices with coefficients
in R. Since ฮฃ โ R4 and it contains a standard orthogonal basis of R4 , we have O(ฮฃ) โ O(4, R).
Notice that there is an orthogonal transformation of ฮฃ that interchanges โ and โ0 , namely
the automorphism of ฮฃ that interchanges the last two coordinates (x1 , x2 , x3 , x4 ) 7โ (x1 , x2 , x4 , x3 ).
Call this transformation ฮน. (Of course it has numerous conjugates.) Evidently O(ฮฃ) contains the
subgroup hH โ [4], ฮนi generated by H โ and ฮน. Now we prove the reverse inclusion.
Proposition 9.1.
(i) O(ฮฃ[4]) = O(4, R) ;
(ii) O(ฮฃ[4]) = hH โ [4], ฮนi = hฮนi n H โ [4] = hH4 , ฮนi ;
(ii) [O(4, R)) : H โ [4]] = 2 .
Proof: (i) Let g โ O(4, R). Then g stabilizes S โฉ R4 = ฮฃ, and so g โ O(ฮฃ).
(ii) We know that K is a root system of type D4 , for which (3) is a root base. Let B be any D4
root base in ฮฃ.
We will try to use elements of H โ to bring B back to the basis (3). We will see that we can
almost do this. To finish the job we may need to reverse the last two coordinates, hence use the
transformation ฮน.
Let V := (0, R, R, R), as before, and recall that V โฉ ฮฃ[4] = ฮฃ[3], see (4.6).
This base has the traditional D4 Coxeter diagram with one central node and three nodes attached
to it. Using H โ and simple transitivity, we can assume that one of the non-central nodes of the
base elements of B is (1, 0, 0, 0). Then the other two non-central nodes are in V โฉ ฮฃ[4] and so in
ฮฃ[3]. We take one of these and again using transitivityโ this time of H โ [3]โ to bring this node to
(0, 1, 0, 0). The remaining non-central node is now of the form (0, 0, โ, โ). The only elements of ฮฃ[3]
23
of this form are (0, 0, ยฑ1, 0) and (0, 0, 0, ยฑ1). We can use ฮน to assume that it is (0, 0, ยฑ1, 0). Since the
sign changes are in H โ [3], we can assume this element is (0, 0, 1, 0). There remains only the central
node. Its scalar product with the three other nodes (that is, with (1, 0, 0, 0), (0, 1, 0, 0), (0, 0, 1, 0) is
โ1/2 and so it has the form (1/2)(โ1, โ1, โ1, โ). Given that it is a vector of length 1, the last term
must be ยฑ1. We again have the choice of sign.
The upshot of this is that we have brought the base B to the standard basis of (3) using H โ
and ฮน. Since any orthogonal transformation of R4 is determined entirely by its action on any base,
we have proved that O(ฮฃ) โ hH โ , ฮนi. The rest of (ii) follows once we know that (iii) is true.
(iii) We know that ฮน2 = 1 and ฮน stabilizes ฮฃ and hence normalizes H โ (which is generated by
ห and โ
ห 0 (since it is an odd permutation
the reflections in the elements of ฮฃ). Also ฮน interchanges โ
of the coordinates) while stabilizing K. It follows that conjugation by ฮน interchanges W (โ) = H4
and W (โ0 ) = H40 while stabilizing their intersection, which is N (K). This means that in choosing
the coset representatives used in Prop. 8.2 we can choose D = ฮน(C)ฮนโ1 . We will assume this.
Now we prove that ฮน โ
/ H โ . If, on the contrary, it were in H โ then using Prop. 8.2 we could
write ฮน uniquely in the form ฮน = zyk . . . y1 where z โ N (K) and the other elements are alternately
in C and D. Then
ฮน = ฮนฮนฮนโ1 = ฮนzyk . . . y1 ฮนโ1
= ฮนzฮนโ1 ฮนyk ฮนโ1 . . . ฮนy1 ฮนโ1 .
This gives us a second way of writing ฮน as an element of H โ , in the form described in Prop. 8.2 and
accordingly they are identical. This obviously is not true if any of the coset terms are present, since
C and D are reversed by the conjugation and y1 6= ฮนy1 ฮนโ1 , etc. Thus we end up with ฮน = ฮนzฮนโ1 and
so ฮน = z โ N (K).
Now certainly ฮน โ
/ W (K), for it effects a diagram automorphism of D4 , and we have already
noted that [N (K) : W (K)] = 3. Thus ฮน โ
/ N (K), and this contradiction shows that ฮน โ
/ H โ.
There is a corresponding result for the three-dimensional case involving ฮฃ[3] and O(3, R). Here
we take O(3, R) to be the subgroup of O(4, R) which fixes the vector (1, 0, 0, 0) in H, and define
O(ฮฃ[3]) to be the subgroup of O(3, R) stabilizing ฮฃ[3].
Proposition 9.2.
(i) O(ฮฃ[3]) = O(3, R) ;
(ii) O(ฮฃ[3]) = hH โ [3], ฮนi = hฮนi n H โ [3] = hH3 , ฮนi ;
(ii) [O(3, R)) : H โ [3]] = 2 .
Proof: The argument is essentially a repeat of what we saw in Prop. 9.1. Since ฮฃ[3] = S[3] โฉ R3 , it is
clear that O(3, R) stabilizes ฮฃ[3], and this proves (i). We need only prove that O(3, R) โ hH โ [3], ฮนi.
Working in H, ฮฃ[3] contains the standard basis vectors v1 := (0, 1, 0, 0), v2 := (0, 0, 1, 0), v3 :=
(0, 0, 0, 1). Let g โ O(3, R) and let g(v1 ) = x โ ฮฃ[3]. Since H โ [3] is transitive on ฮฃ[3], there is an
element h โ H โ [3] so that hg(v1 ) = v1 . Then hg stabilizes the span of v2 and v3 as well as mapping
them into elements of ฮฃ[3]. However, the only elements of R3 of this form are (0, 0, ยฑ1, ยฑ1). Since
the sign changes on individual coordinates are elements of H โ [3], we can assume that we have the
positive signs here. Thus hg fixes both v2 and v3 , in which case hg = 1, or hg interchanges v2 and
v3 , in which case hg = ฮน[3].
24
10
Approximation in SU (2)
The unitary group SU (2) plays a significant role in the theory of quantum computation as the group
of admissible transformations of a quantum qbit. In this section we offer an algorithm by which any
element of SU (2) can be approximated to any degree of accuracy by the repeated use of just a few
very simple fixed elements in SU (2, R). In fact, this number can be reduced to five, these five being
related to a root base of ฮฃ[4]. Passing to SO(3) via (18) we can similarly approximate any rotation
to any degree of accuracy by elements of SO(3, R).
The idea is this. Inside the quaternion algebra H the unit sphere S is a group under quaternion
multiplication and this group is SU (2) from the point of view of the matrix representation of H of
(16). The full set of roots ฮฃ[4] that we have generated out of โ[4] and โ0 [4] is in fact the subgroup
of S generated by them and it is the orbit of โ[4] โช โ0 [4] under H โ [4]. Furthermore it is dense on
the sphere S, Prop. 3.7. Hence appropriate sets of mirrors (reflecting hyperplanes) associated with
the reflections in these elements partition S into convex regions of arbitrarily small diameter. We
call such regions chambers.
S
A natural choice is a set Un := kโคn Sฬk โช Sฬk0 and we can use the associated hyperplanes of these
points to define the set of chambers that we use. So we note that the chambers here are not absolute
things, but rather the outcome of some selection of a finite number of root hyperplanes. Assuming
that the chambers are selected and that one point p has been chosen in one of these chambers, say
p โ C, then the idea is that any element x โ S can be reflected into C using only reflections in these
mirrors, whereby it is a close approximation of p. Then reversing the operations we can take p to
some point equally close to x.
So we take some set Un and use its points to define a set of chambers. We should note that
the situation with these chambers is not the same as in the customary case of root systems. The
chambers are not all isometric copies of each other, nor are they necessarily simplices. The cellular
decomposition comes about through the sets of reflecting hyperplanes that we use, but we never use
all of them, only a finite number of them, and these finite sets are not invariants of H โ .3
For a โ S, the reflection ra in a has the quaternionic form
ra x = x โ 2(x.a)a = x โ (xe
a + ae
x)a = โae
xa
see (17). Suppose we wish to approximate x โ S using the reflections determined by the elements of
Un . The idea is to reflect x a number of times so that it ends up as close as possible to 1 โ H. Choose
a chamber C0 containing 1 (actually 1 will be at the vertex of such a chamber) and choose a point
z close to 1 in the interior of C0 . For each element pair ยฑa โ Un we choose the one which satisfies
a.z < 0 and let Unโ denote this subset chosen in this way. So C0 = {u โ S : u.a โค 0 for all a โ Unโ }.
Now if there is a reflection hyperplane for which x and z lie on opposite sides, then a.x > 0 and
we see that
(ra x โ z).(ra x โ z) = (x โ z).(x โ z) + 4(a.x)(a.z) < (x โ z).(x โ z) ,
thus moving the point x closer to z. We can always do this so that we choose a for which a.x is as
large as possible.
3
If the process is carried out to the end, allowing n โ โ, then every point y not on one of the reflecting hyperplanes
is uniquely specified by the signs that it makes with each of the roots: y.a is either positive or negative. In this way
it looks similar to a Dedekind cut where each real number is specified by the rationals that are less than it or greater
than or equal to it.
25
Almost surely, this process has to stop in a finite number of steps with the point ending up in C0 .
Here is why. Suppose that x = x0 , x1 , x2 , . . . were an infinite sequence of successive steps applied to
the starting point x. It has to have limit points, and we choose one, say y, that is closest to z. Now
a.z โค 0 for all a โ Unโ , and it follows that y โ C0 . In fact every iteration brings us closer to z and if
yโ
/ C0 there is an a โ Unโ with a.y > 0 and ra (y) is closer to z, a contradiction. Almost surely (in
the sense of Lebesgue measure) x is not on the boundary of a mirror so neither is y. Thus y is in
the interior of C0 . This means that almost surely there is a k for which xk is in the interior of C0 ,
and the iteration will stop as soon as it reaches such a k.
From the point of view of approximation theory, we can always assume that x is not on a
boundary. At the end of the process we will have achieved a relation of the form
rak ยท ยท ยท ra2 ra1 (x) = p โ C0 .
If d is the diameter of C0 , then since each reflection is an isometry of H relative to its usual norm,
|x โ ra1 ra2 ยท ยท ยท rak 1| = |rak ยท ยท ยท ra2 ra1 (x) โ 1| โค d .
This then gives us the desired approximation
(
โa1 ae2 ยท ยท ยท ag
kโ1 ak ak ag
kโ1 ยท ยท ยท ae2 a1 if k is odd
x'
ae1 a2 ยท ยท ยท akโ1 e
ak e
ak akโ1 ยท ยท ยท a2 ae1 if k is even .
(32)
Treated as elements of SU (2), the matrix entries all come from the ring of dyadic golden numbers
R.
ห
ห 0 we need to write each
To write this fully in terms of the basic reflections in the roots of โโชK
โชโ
of the roots appearing in Unโ in terms of these elements. Thus if a โ Unโ is a = rbm rbmโ1 ยท ยท ยท rb1 b0
ห โชK โชโ
ห 0 , then
with all the bj โ โ
(
e
f
bf
m bmโ1 ยท ยท ยท b1 b0 b1 b2 ยท ยท ยท bmโ1 bm if m is odd
a=
e e
]
โbm b]
mโ1 ยท ยท ยท b1 b0 b1 ยท ยท ยท bmโ1 bm if m is even .
Example: Here we give some sample results from a computer implementation of the approximation
process. The set U3 of roots formed from the sets Sฬk , Sฬk0 is evaluated for k = 1, 2, 3, resulting in a
total of
52416 = 2.3.(25 + 29 + 213 )
elements. A random element of SU (2) is computed, e.g.
โ0.244828 โ 0.155561i 0.731977 โ 0.616498i
u=
โ0.731977 โ 0.616498i โ0.244828 + 0.155561i
and the process then determines (in this case six) reflections from roots of R3 that bring this point on
S[4] as close to the identity element 1 โ H as possible (using reflections from R3 ). These reflections
ห โชโ
ห 0 , giving rise to a total of fifteen.
are rewritten as products of reflections from the original set โ
The matrix
1 1 + ฯ i (1 โ ฯ )i
2 (1 โ ฯ )i 1 โ ฯ i
is a typical looking example.
26
After computing the resulting matrix product according to (32), we obtain the approximation
โ0.245712 โ 0.15869i 0.730844 โ 0.616694i
,
โ0.730844 โ 0.616694i โ0.245712 + 0.15869i
the difference being
0.000883332 + 0.00312853i 0.00113294 + 0.000195296i
.
โ0.00113294 + 0.000195296i 0.000883332 โ 0.00312853i
This example is entirely typical both in the number of reflections required and in the degree of
ห and โ
ห 0 in terms of
approximation. If we wished we could rewrite the reflections in the roots of โ
the five generators of (6). Computing out more roots, e.g. U4 will result in more accuracy. We do
not have any decent estimates on the diameters of the chambers arising from Un .
Acknowledgements
We thank the referee for his/her careful parsing of the manuscript and helpful historical suggestions.
RVM was supported by Discovery Grant 461292003, Natural Sciences and Engineering Research
Council of Canada.
JM was supported by Grants-in-Aid for Scientific Research 26400005, 17K05158 (Monkasho Kakenhi,
Japan).
References
[1] N. Bourbaki, Groupes et algeฬbres de Lie, Ch. IV-VI, Hermann, Paris, 1968.
[2] L. Chen, R. V. Moody, J. Patera, Non-crystallographic root systems in Quasicrystals and Discrete Geometry, ed. J. Patera, Fields Institute Monographs, American Mathematical Society,
1997.
[3] P-P. Dechant, C. Boฬhm, R. Twarock, Novel Kac-Moody-type affine extensions of noncrystallographic Coxeter groups, J. Phys. A: Math. Theor. 45(28)(2012), 285202.
[4] P-P. Dechant,A Clifford Algebraic Framework for Coxeter group theoretical computations, Adv.
Appl. Clifford Algebras, 24(2014), 89-104.
[5] P. Du Val, Homographies, Quaternions, and Rotations, Oxford, 1964.
[6] M. Koca, R. Kocฬง, M. Al-Barwani, S. Al-Farsi, Maximal subgroups of the Coxeter group W (H4)
and quaternions, Linear algebra and its applications, 412 (2006), pp.441-452.
[7] R.V. Moody and J. Patera, Quasicrystals and Icosians, J. Phys. A: Math. Gen. 26 (1993), 28292853.
27
| 4math.GR
|
PREPRINT VERSION
Improving files availability for BitTorrent using a diffusion
model
C. Napoli, G. Pappalardo, and E. Tramontana
arXiv:1409.4565v1 [cs.NI] 16 Sep 2014
PUBLISHED ON: 2014 IEEE 23rd International WETICE Conference
BIBITEX:
@incollection{Napoli2014Improving
year={2014},
isbn={978-1-4799-4249-7/14},
doi={10.1109/WETICE.2014.65},
booktitle={23rd International WETICE Conference},
title={Improving files availability for BitTorrent using a diffusion model},
publisher={IEEE},
author={Napoli, Christian and Pappalardo, Giuseppe and Tramontana Emiliano},
pages={191-196}
}
Published version copyright c 2014 IEEE
UPLOADED UNDER SELF-ARCHIVING POLICIES
NO COPYRIGHT INFRINGEMENT INTENDED
Improving files availability for BitTorrent using a diffusion model
Christian Napoli, Giuseppe Pappalardo, and Emiliano Tramontana
Dipartimento di Matematica e Informatica, University of Catania
Viale A. Doria 6, 95125 Catania, Italy
Email: {napoli, pappalardo, tramontana}@dmi.unict.it
AbstractโThe BitTorrent mechanism effectively spreads file
fragments by copying the rarest fragments first. We propose
to apply a mathematical model for the diffusion of fragments
on a P2P in order to take into account both the effects of
peer distances and the changing availability of peers while
time goes on. Moreover, we manage to provide a forecast on
the availability of a torrent thanks to a neural network that
models the behaviour of peers on the P2P system.
The combination of the mathematical model and the neural
network provides a solution for choosing file fragments that
need to be copied first, in order to ensure their continuous
availability, counteracting possible disconnections by some
peers.
Keywords-Dependability, distributed caching, P2P, neural
networks, wavelet analysis.
I. I NTRODUCTION
In peer to peer (P2P) systems using BitTorrent, a shared
content (named torrent) becomes split into fragments and
the rarest fragments are automatically chosen to be sent
first to users requesting the file. Fragments availability is
given by the number of peers storing a fragment at a given
moment, and periodically computed by a server storing peer
ids, fragments held and requested [7]. For computing the
priority of fragments to spread, at best availability has been
freshly updated, however peers often leave the system hence
file fragments availability quickly changes, possibly before
the least available fragments have been spread [13]. This
occurs so frequently that such a fundamental BitTorrent
mechanism may become ineffective, and as a result some
fragments can quickly become unavailable. Moreover, when
choosing fragments to spread, communication latencies [8],
[18] among peers are not considered, therefore fragments
spreading will surely occur sooner on peers nearby the one
holding the fragment to spread. As a result, the furthest peers
could disconnect before receiving the whole fragment.
This paper proposes a model for spreading file fragments
that considers both a time-dependent priority for a fragment
to spread and latencies among nodes. I.e. the priority of
fragments to spread gradually changes according to the passing time and fragments availability. The priority variation is
regulated in such a way that the availability of fragments is
maximised while time goes.
Fragments to spread are selected according to the results
of our proposed diffusion model, developed by analogy
to a diffusion model on a porous medium. Moreover, we
propose to characterise the typical availability of a torrent
observed on the P2P system, by using an appropriate neural
network. Then, the selection of fragments to spread aims
at counteracting their decreasing availability estimated for a
later time. Therefore, the proposed work aims at supporting
Quality of Service and dependability of P2P systems by
attributing a priority on both the fragment to spread and
the destination peer. This in turn increases availability and
performances [9], [10], [11], as well as consistency [1].
The rest of the paper is organised as follow. Next section
provides the mathematical representation for the proposed
model. Section III develops the model for the diffusion
of contents on a P2P system. Section IV introduces the
neural network that predicts the user behavious. Section V
describes some experiments based on our proposed model
and neural network predictions, as well as the preliminary
results. Section VI compares with related work, and finally
conclusions are drawn in Section VII.
II. M ATHEMATICAL R EPRESENTATION
In order to put forward our analogy between BitTorrent
and a physical system, some conventions must be chosen
and some extrapolations are needed. We first describe a
continuum system using a continuum metric, however later
on we will single out a few interesting discrete points of
the continuum. Due to the analogy to BitTorrent, we use a
distance metric (named ฮด), which will be assimilated to the
network latency among nodes, i.e. the hosts on a network
holding seeds, peers or leeches.
For the nodes we use notations ni or niฮฑ : the first indicates
a generic i-esime node on the BitTorrent network, the second
indicates the ฮฑ-esime node as seen from the i-esime node.
Of course, niฮฑ and njฮฑ could be different nodes if i 6= j.
Double indexing is needed since when we use something
like ฮด ij , it will be representing the distance of the j-esime
node as measured by the i-esime node. Moreover, let us
express Pkij as the probability of diffusion of the k-esime file
fragment from the i-esime node to the j-esime node. Finally,
we distinguish between time and time steps: the first will
be used for a continuum measure of temporal intervals and
we will use for it the latin letter t, the second will indicate
computational time steps (e.g. the steps of an iterative cycle)
and we will use for it the greek letter ฯ . Therefore, while
ฮด ij (t) will represent the continuous evolution during time t
of the network latency ฮด, which is measured by the i-esime
node for the distance with the j-esime node, the notation
ฮด ij (ฯ ) will represent the latency measured at the ฯ -esime
step, i.e. the time taken by a ping from the i-esime node to
the j-esime node, only for a specific time step ฯ . Finally,
we will suppose that each node has the fragment zk of a
file z and is interested in sharing or obtaining other portions
of the same file, hence we will compute the probabilitylike function that expresses how easily the k-esime shared
fragment is being copied from the i-esime node to the jesime node at a certain step ฯ and we will call it Pkij (ฯ ).
Eventually, we are interested in an analytical computation
for the urgency to share a fragment zk from ni to nj during
a time set ฯ , and we will call it ฯi,j
k (ฯ ). In the following
sections we will distinguish between an actually measured
value and a value predicted by a neural network using a tilde
for predicted values as in xฬ.
III. F RAGMENTS DIFFUSION ON A P2P NETWORK
In our work we compare the file fragments of a shared file
to the diffusion of mass through a porous means. To embrace
this view, it is mandatory to develop some mathematical
tools, which we will explain in the following.
A. Spaces and metrics
Users in a P2P BitTorrent network can be represented as
elements of a space where a metric could be given by the
corresponding network communication latency. Therefore,
for each node ni โ N , set of the nodes, it is possible to
define a function
ฮด : N ร N โ R / ฮด(ni , nj ) = ฮด ij
โ ni , nj โ N
(1)
where ฮด ij is the amount of time taken to bring a minimum
amount of data (e.g. as for a ping) from ni to nj . By using
the given definition of distance, for each node ni , it is also
possible to obtain an ordered list โฆi so that
n
o|N |
โฆi = niฮฑ โ N
: ฮด(ni , niฮฑ ) โค ฮด(ni , niฮฑ+1 ) (2)
ฮฑ=0
In such a way, the first item of the list will be ni0 = ni
and the following items will be ordered according to their
network latency as measured by ni . Using this complete
ordering of peers, it is possible to introduce the concept of
content permeability and diffusion. Let us consider the files
shared by one user of a P2P system: each file consists of
fragments that can be diffused. Then, the diffusion of a file
fragment can be analysed in terms of Fickโs law.
B. Fickโs law and its use for P2P
Fickโs second law is commonly used in physics and
chemistry to describe the change of concentration per time
unit of some element diffusing into another [21]. This work
proposes an analogy between a P2P system and a physical
system. The key idea is to model the sharing file fragments
as the diffusion of a substance into a porous means along
one dimension. Different places of the porous means would
represent different P2P nodes, whereas distances along such
a one-dimension would be proportional to the network
latencies. Then, P2P entities would be accommodated into
the formalism of equations (1) and (2).
Using both the First and Second Fickโs laws, the diffusion
of a substance into a means is given as the solution of the
following vectorial differential equation
โฮฆ
= โ ยท (Dโฮฆ)
(3)
โt
where ฮฆ is the concentration, t the time and D the permeability of the means to the diffusing matter. Since this is a
separable equation and we use a 1โdimensional metric based
on the distance ฮด, and assuming D as constant among the
nodes, equation (3) can be written as a scalar differential
equation
โ2ฮฆ
โฮฆ
=D 2
(4)
โt
โฮด
This partial differential equation, once imposed the initial
and boundaries conditions, admits at least Greenโs Function
as a particular solution [2]. Greenโs Function lets us study
the diffusion dynamics of a single substance and can be
rewritten as solution of the equation (4) in the form:
ฮด
1
ฮฆ(ฮด, t) = ฮฆ0 ฮ โ
(5)
,
ฮฆ0 = โ
4Dt
4ฯDt
where ฮ is the complementary gaussian error function.
ฮ function should then be computed by means of a
Taylor expansion. However, to avoid such a computationally
difficult task, we use an approximation proposed in [6],
where a pure exponential approximation for ฮ(x) has been
obtained, having an error on the order of 10โ9 . Then, it is
possible to have the following equation
h
i
๏ฃฑ
2
2
4
1
1
๏ฃด
๏ฃฒ ฮฆ(ฮด, t) โ ฮฆ0 6 e(ฮฆ0 ฮด) + 2 eโ 3 (ฮฆ0 ฮด)
(6)
๏ฃด
๏ฃณ
โ 12
ฮฆ0 = (4ฯDt)
for every node at a certain distance ฮด โ R+ at a time t โ R+ .
C. From concentration to probability
In equation (6) the scaling factor ฮฆ0 is a function of the
time t. On the other hand, the used formalism was developed
mainly to focus on the distance ฮด and managing t merely as
a parameter. The above mathematical formalism is valid as
long as the distances ฮด(ni , nj ) remain time-invariant. The
common practice considers the distance between nodes ฮด
as time-invariant, however the actual network latencies vary
(almost) continuously, with time, and a stationary โฆi ordered
set is a very unlikely approximation for the network. In our
solution, we make time-dependent the latency embedded into
our model. In turn, this makes it possible to choose different
fragments to be shared as time goes.
For the P2P system, the equation (6) states that a certain
file fragment zki in a node ni at a time t0 has a probability
Pkij (t0 , t) to be given (or diffused) to node nj , at a distance
ฮด ij (t0 ) from ni , within a time t, which is proportional to
the ฮฆ(ฮด, t) so that
ij 2
ij 2
1 โ 43 (pij
1 (pij
k ฮด ) +
k ฮด )
Pkij (t0 , t) = pij
e
e
(7)
k
6
2
ij
where the function pij
k = pk (t0 , t) carries both the diffusion factors and the temporal dynamics. And since we are
interested in a simple proportion, not a direct equation, we
can also neglect the factor 4ฯ and then write pij
k in the
normalised form
1
1
1
(8)
ยทp
ยทโ
pij
k (t, t0 ) = โ
t
4ฯ
Dk (t0 )
It is now important to have a proper redefinition of the
coefficient D. Let us say that Tk is the number of users
using file fragment zk (whether asking or offering it), Sk
is the number of seeders for the file fragment and ฯk is
the mean share ratio of the file fragment among peers (and
leeches), then it is possible to consider the โurgeโ to share the
resource as an osmotic pressure which, during time, varies
the coefficient of permeability of the network D. In order
to take into account the mutable state in a P2P system, D
should vary according to the amounts of available nodes and
file fragments. We have chosen to define D as
Dk (t0 ) ,
Tk (t0 )
Sk (t0 ) + [Tk (t0 ) โ Sk (t0 )] ฯk (t0 )
(9)
by a formal substitution of D with Dk in ฮฆ0 , we obtain the
analytical form of the term pij
k.
D. Discrete time evolution on each node
Indeed, the physical nature of the adopted law works in
the entire variable space, however for the problem at hand
discrete-time simplifications are needed. Let us suppose that
for a given discrete time step ฯ = 0 node ni effectively
measures the network latencies of a set of nodes {nj }, then
an ordered set โฆi as in equation (2) is computed. Now,
every node ni computes probability Pkij for each of its own
file fragment zk and for every node nj . This probability
corresponds to a statistical prevision of the possible file
fragments spreading onto other nodes.
Suppose that for a while no more measures for ฮด have
been taken, and at a later discrete time step ฯ file fragment
zki be copied to the first node to be served, which is chosen
according to the minimum probability of diffusion, latencies
and time since last measures were taken (see following
subsection and equation (12)).
Moreover, such a file fragment is reaching other nodes if
the latency for such nodes is less than time ti , computed as
tik (ฯ )
=
ฯ
X
ฮฑk =0
ฮด(n
i
, niฮฑ )
(10)
Index k is used in equation (10) to refer to file fragment zki .
Indeed, since nodes need and offer their own file fragments, the ordered set of nodes referred by a given node
depend on resource zk , i.e. โฆik = {niฮฑk }.
It is now possible to have a complete mapping of the
probability of diffusion by reducing the time dependence
from (t0 , t) to a single variable dependence from the discrete
time-step ฯ . For each resource zk as Pkij (ฯ ) stated that it
is possible to reduce Dk (t0 , t) to a one-variable function
Dk (ฯ ) by assuming that at t0 we have ฯ = 0 and considering
only the values of Dk (t0 , t) when t is the execution moment
of a computational step ฯ .
E. Assigning priorities and corrections
Once all the Pkij (ฯ ) have been computed, and values
stored to a proper data structure, it is actually simple to
determine the most urgent file fragment to share, which is
the resource that has the least probability to be spread, i.e.
the k for which Pkij (ฯ ) is minimum.
Furthermore, we consider that while time goes on an old
measured ฮด differs from the actual value, hence the measure
becomes less reliable. To take into account the staleness of ฮด
values, we gradually consider less bound to ฮด the choice of
a fragment, and this behaviour is provided by the negative
exponential in equation (11). Given enough time, the choice
will be based only on the number of available fragments.
However, we consider that by that time a new value for ฮด
would have been measured and incorporated again into the
model choosing the fragment.
Generally, for nodes having the highest latencies with
respect to a given node ni , more time will be needed to
receive a fragment from the node ni . We aim at compensating such a delay by incorporating into our model the
inescapable latencies of a P2P network. Therefore, the node
that will receive a fragment first will be chosen according
to its distance.
In order to model the fact that distant nodes, having the
highest values for ฮด, will take more time to send or receive
file fragments, we have chosen a decay law. Now it is
possible to obtain a complete time-variant analytical form
of the spreading of file fragments
ฯij
k (ฯ ) =
eโcฯ ฮด
ij
Pkij (ฯ )
(11)
where the decay constant c can be chosen heuristically,
without harming the said law, and tuned according to other
parameters. If k indicates a file fragment and k โ the index of
the most urgent file fragment to share, this latter is trivially
found as the solution of a maximum problem so that
n
o
ij
k โ : ฯij
(12)
kโ (ฯ ) = max ฯk (ฯ )
k
Of course, all the priorities depend on the value of the bidimensional matrix of values of Pkij (we mark that the index
An innovative neuro-wavelet method for reconstruction of photometric data
7
1.728
step of the series, a set of coefficients di and residuals ai ,
and so that
x 10
Original signal
Forward reconstruction
Backward reconstruction
Midpoint reconstruction
1.727
Wฬi [aiโ1 (ฯ )] = [di (ฯ ), ai (ฯ )]
1.726
Topology of the WRNN
Corrected Flux [ADU]
1.725
Figure 1.
7
โ i โ [1, M ] โฉ N
(13)
where we intend a0 (ฯ ) = x(ฯ ). The input set can then be
represented as an N ร (M + 1) matrix of N time steps of
a M level wavelet decomposition, where the ฯ -esime row
represents the ฯ -esime time step as the decomposition
1.724
Mid Point
Forward NNET
1.723
1.722
Backward NNET
1.721
u(ฯ ) = [d1 (ฯ ), d2 (ฯ ), . . . , dM (ฯ ), aM (ฯ )]
(14)
i does not variate within the same node n ). Among these
Each row of this dataset is given as input value to the
values, there is no need to compute elements where j = i
M
input neurons of the proposed WRNN (Figure 1). The
j
and for those elements where the node n is not in the queue
ij
properties
of this network make it possible, starting from
for resource zk . In both these cases it is assumed Pk = 1.
an
input
at
a time step ฯn , (right)
to predict the effective number
Fig.
4.
Neural
networks
structures
(left),
Forward
and
Backward
reconstruction
i
Moreover, after n having completed to transfer zk to the
of
requests
(or
offers)
at
a
time
step ฯn+r . In this way the
j
node n , the element of indexes (j, k) is set to 1. In a similar
WRNN
acts
like
a
functional
fashion, each peer is able to identify a possible resource
to ask for in order to maximize the diffusion of rare ones
Nฬ [u(ฯ
(15)
n )] = xฬ(ฯ
becauseones.
wavelets do not verify some basic properties such as the
absence
of n+r )
instead this
of common
local minima, and does not provide by itself a su๏ฌciently
response
where r is graded
the number
of time[17].
steps of forecast in the future
the existent
rangeAND
of possible
transfer functions
some
particular
andonly
xฬ the
predicted
serie. classes
IV.InWRNN
PREDICTORS
U SERS BEHAVIOR
i
1.72
1.719
0
0.05
0.1
0.15
0.2
0.25
Time [Julian Days]
0.3
0.35
0.4
0.45
approximate the functional form of a wavelet. In this work the radial basis func-
In order
make thewere
P2P chosen
system able
to properly
reB.
Predicted
behaviour
tionsto(radbas)
as transfer
functions,
indeed
this user
particular
kind of
act to peaks of requests, as well as very fast changes
by even
equation
(15), it is then possible to
functions well describes in first approximation halfAsof described
a wavelet,
if these
of fragments availability and/or share ratio, we propose
obtain
future
prediction
the number of requests for
functions do not verify the properties shown by (1)
and a(2).
Anyway,
afterofscalan innovative solution based on Wavelet Recurrent Neural
a
specific
torrent,
as
well
as
its
ing,
shift and
chosen
activation
it is possible to obtainavailability in the future.
Networks
(WRNN)
to repetition
characteriseofthethe
user
behaviour
and function,
+ fact, by considering both the predicted xฬk (ฯn+r ) and
In
several
mother forecast.
wavelet For
filters.
Let ftorrent,
: [โ1;the
1] โ R to be the choosen transfer
producing
a short-term
a given
the modeled ฯk (ฯn+r ), it is possible, at a time step ฯn ,
function,
then
wavelet analysis provides compression and denoising on
to take counteracting actions and improve the probability
the observed time series of the amount of!users prividing
diffusion
+ f (2x + 1) x of
โ [โ
1 , 0 ]for a rare torrent. This is achieved, in practice,
or requesting fragments;
fห(x) a=proper
fห(x +recurrent
2k) = neural network
โk values
โ Z for Dk(4)
by
using
(ฯn+r ), which account for
โ f (2x
โ 1) x โ [ 0 , 1altered
]
(RNN), trained with the said observed time series,
provides
the forecast of future time steps. Such modified values are
well-timed estimations of future data. The ensamble of the
computed
by ourfor
WRNN,
e.g. in a computing node of a
verifies
all the
properties
of a wavelet
function.
it is possible
the selected
said wavelet
analysis
and
RNN is called
WRNN [5],
[15], Socloud.
Therefore,
predicted
values
neural
networks
to for
simulate
a wavelet
by that
using the radbas function defined
in for Tk (ฯn+r ), Sk (ฯn+r )
[16] and
provides
forecasts
the number
of users
and ฯk (ฯn+r ) are sent to each node acting as a peer.
thea[โ1;
1] realSeveral
domain.
It isnetworks
indeed possible
that
will share
fragment.
neural
have beento verify
Each time a new torrent becomes shared on the P2P
employed to find polaritons propagation
" 2k+1 and metal thicknetwork, then a new WRNN is created and trained on
ness correspondence [3]; to predict the behaviour
a cloud system, to provide
fห(x) dx of
= users
0 โ h <a kserver,
โ Z e.g. requested from (5)
requesting resources [17], to perform
wavelet transform in
2h+1
predictions related to the availability and peers of the novel
a recursive lifting procedure [4], [20].
set of shared fragments for that torrent. The predictions will
It was shown that, in order to simulate a wavelet function, the chosen transfer
be sent to the peers periodically, and allow peers to update
functions
wavelet.
Thisupdate
is thefrequency can be tuned in
A. WRNN
setup must be symmetrically periodical to emulate
the valuesa of
Dk (ฯ ). The
reason
for
choosing
a
pair
number
of
neurons
in
the
aim
to
have
the
same
number
order to correctly match the dynamic of hosts.
For this work, the initial datasets consists of a time series
of positive
weights
in theorreconstruction layer. Theoretically,
representing
requestsand
for negative
a torrent,layer
coming
from peers,
V. E XPERIMENTS
if this happens,
then the
neuron
of the
exactly
given declaration
of availability
for the
torrentpairs
coming
fromsecond layer are emulating
a
reconstruction
filter.
Althoug
this
was
a
theoretical
schema,
there
are
both peers and seeds. Independently of the specificities of
As shown in Figure 2, strong
for the initial condition of the
reasons
for this
theseries
weights,
thisฯ experimental
to havesome
a non-zero
sum, for a torrent happen to
such data,
let us call
x(ฯ ), in
where
is the discrete setup,
P2P system
file fragments
because
neuralwith
network
beyond
perform
the
inverse wavelet
transform
time step
of data,the
sampled
intervals
of onetohour.
A
be heterogeneously
spread
among peers (e.g. no one shares
biorthogonal
of the
time series has
fragment n. 2, and very few nodes have fragment n. 5). We
must wavelet
performdecomposition
also the signal
prediction.
been computed to obtain the correct input set for the WRNN
as required by the devised architecture shown in Figure 1.
This decomposition can be achieved by applying the wavelet
transform as a recursive couple of conjugate filters in such
a way that the i-esime recursion Wฬi produces, for any time
report a simulation comprising 11 peers and 5 file fragments,
and an evolution in only 5 time steps. In the order, step after
step, peer n0 selects file fragment z4 and sends this to peer
n10 . Both the fragment to spread and the destination peer
have been chosen according to equation (12).
i
In order: the initial condition (white cells represent the fragments), the normalised ฯij
k (ฯ ) for a certain node n at different time steps ฯ
VI. R ELATED W ORK
Several studies have analysed the behaviour of BitTorrent
systems from the point of view of fairness, i.e. how to
have users contribute with contents that can be uploaded
by other users, levelling the amount of downloads with
that of upload. Fewer works have studied the problem
of unavailability of contents in P2P BitTorrent networks.
In [19], authors proposed to order peers according to their
1
0.8
1
(
3
)
2
(
3
)
3
(
3
)
0.6
( )
Later on, as soon as possible, peer n0 selects another
fragment, i.e. z3 to spread. Such a fragment could be send
just after the transfer of the previous fragment has been
completed, or concurrently to the first transmission. The
shown evolution does not consider that the file fragment
could have been passed, e.g., to node n10 , and so that for
the next time step the value of ฯ for n10 would drop to zero.
Note that the highest values of ฯ are an indication of the
urgency of receiving a fragment.
The described model and formula allow subsequent sharing activities, after the initial time steps, to be determined, in
terms of which fragments should be sent. Figure 2 shows that
after the first time steps it becomes more and more urgent
for node n0 to obtain the missing fragments z2 and z5 . It is
possible to see that the highest priority is for fragment z2
since its share ratio and the relative availability are very
low with respect to fragment z5 . This was the expected
behaviour of the developed model. For the simulation shown
in Figure 2, all fragments, except z2 since it is actually
unavailable, would be spread to peers in a very low number
of time steps. Figure 3 shows the decay of several computed
ฯ for different peers requiring fragment number 3. On the
long run, this law will benefit nearby nodes, while on the
short term, distant nodes are given the highest priority.
j
3
Figure 2.
0.4
0.2
0
1
Figure 3.
2
3
4
5
6
7
8
9
10
Time decay of normalised ฯjk (ฯ ) for increasing time steps ฯ
uploading bandwidth, hence when providing contents the
selection of peers is performed accordingly. One of the
mechanism proposed to increase files availability has been to
use multi-torrent, i.e. for ensuring fairness, instead of forcing
users stay longer, they provide their contribution to uploaders
for fragments belonging to different files [12]. Similarly,
in [13] authors show that by using multi-torrent availability
can be easily increased, and confirm that fast replication of
rare fragments is essential. Furthermore, bundling, i.e. the
dissemination of a number of related files together, has been
proposed to increase availability [14].
The above proposed mechanisms differ from our proposal,
since we take into account several novel factors: the dynamic
of data exchange between distant peers, a decay for the
availability of peers, and the forecast of contents availability.
Such factors have been related into a proposed model that
manages to select the rarest content to be spread taking into
account the future availability, and the peers that should
provide and take such a content.
VII. C ONCLUSIONS
This paper proposed to improve availability of fragments
on a P2P system by adopting a mathematical model and
a neural network. The former describes the fragments diffusion and the urgency to share fragments, whereas the
latter provides an estimation of the availability of peers,
and hence fragments, at later time. By using the estimate
of future availability into the diffusion model, we can select
the fragments that need to be spread to counteract their
disappearance due to users disconnections.
ACKNOWLEDGMENT
This work has been supported by project PRISMA
PON04a2 A/F funded by the Italian Ministry of University
and Research within PON 2007-2013 framework.
R EFERENCES
[1] F. Bannoฬ, D. Marletta, G. Pappalardo, and E. Tramontana.
Tackling consistency issues for runtime updating distributed systems. In Proceedings of International
Symposium on Parallel & Distributed Processing, Workshops and Phd Forum (IPDPSW), pages 1โ8. IEEE, 2010.
DOI: 10.1109/IPDPSW.2010.5470863.
[2] B. S. Bokshtein, M. I. Mendelev, and D. J. Srolovitz. Thermodynamics and kinetics in materials science: a short course.
Oxford University Press Oxford, 2005.
[3] F. Bonanno, G. Capizzi, G. Lo Sciuto, C. Napoli, G. Pappalardo, and E. Tramontana. A cascade neural network
architecture investigating surface plasmon polaritons propagation for thin metals in openmp. In Proceedings of Artificial
Intelligence and Soft Computing, volume 8467, pages 22โ33.
Springer, 2014.
[4] G. Capizzi, C. Napoli, and F. Bonanno. Innovative secondgeneration wavelets construction with recurrent neural networks for solar radiation forecasting. IEEE Transactions on
Neural Networks and Learning Systems, 23(11):1805โ1815,
2012.
[5] G. Capizzi, C. Napoli, and L. Paternoฬ. An innovative hybrid
neuro-wavelet method for reconstruction of missing data in
astronomical photometric surveys. In Artificial Intelligence
and Soft Computing, pages 21โ29. Springer, 2012.
[6] M. Chiani, D. Dardari, and M. K. Simon. New exponential
bounds and approximations for the computation of error
probability in fading channels. IEEE Transactions on Wireless
Communications, 2(4):840โ845, July 2003.
[9] R. Giunta, F. Messina, G. Pappalardo, and E. Tramontana.
Augmenting a web server with QoS by means of an aspectoriented architecture. In Proceedings of WETICE, pages 179โ
184. IEEE, 2012. DOI: 10.1109/WETICE.2012.105.
[10] R. Giunta, F. Messina, G. Pappalardo, and E. Tramontana.
Providing qos strategies and cloud-integration to web servers
by means of aspects. Concurrency and Computation: Practice
and Experience, 2013. DOI:10.1002/cpe.3031.
[11] R. Giunta, F. Messina, G. Pappalardo, and E. Tramontana.
Kaqudai: a dependable web infrastructure made out of existing components. In Proceedings of WETICE, pages 146โ151.
IEEE, 2013. DOI:10.1109/WETICE.2013.47.
[12] L. Guo, S. Chen, Z. Xiao, E. Tan, X. Ding, and X. Zhang.
Measurements, analysis, and modeling of bittorrent-like systems. In Proceedings of ACM SIGCOMM conference on
Internet Measurement. USENIX Association, 2005.
[13] S. Kaune, R. C. Rumin, G. Tyson, A. Mauthe, C. Guerrero,
and R. Steinmetz. Unraveling bittorrentโs file unavailability:
Measurements and analysis. In Proceedings of P2P, pages
1โ9. IEEE, 2010.
[14] D. S. Menasche, A. A. Rocha, B. Li, D. Towsley, and
A. Venkataramani. Content availability and bundling in
swarming systems. In Proceedings of Co-NEXT, pages 121โ
132. ACM, 2009.
[15] C. Napoli, F. Bonanno, and G. Capizzi. Exploiting solar wind
time series correlation with magnetospheric response by using
an hybrid neuro-wavelet approach. In Advances in Plasma
Astrophysics, number S274 in Proceedings of the International
Astronomical Union, pages 250โ252. Cambridge University
Press, 2010.
[16] C. Napoli, F. Bonanno, and G. Capizzi. An hybrid neurowavelet approach for long-term prediction of solar wind. In
Advances in Plasma Astrophysics, number S274 in Proceedings of the International Astronomical Union, pages 247โ249.
Cambridge University Press, 2010.
[17] C. Napoli, G. Pappalardo, and E. Tramontana. A hybrid
neuroโwavelet predictor for qos control and stability. In AI*IA
2013: Advances in Artificial Intelligence, volume 8249, pages
527โ538. Springer, 2013.
[18] G. Novelli, G. Pappalardo, C. Santoro, and E. Tramontana.
A grid-based infrastructure to support multimedia content
distribution. In Proceedings of UPGRADE-CN, pages 57โ64.
ACM, 2007. DOI: 10.1145/1272980.1272983.
[19] D. Qiu and R. Srikant. Modeling and performance analysis of
bittorrent-like peer-to-peer networks. SIGCOMM Computer
Communication Review, 34(4):367โ378, 2004.
[7] B. Cohen. Incentives build robustness in bittorrent. In
Workshop on Economics of Peer-to-Peer systems, volume 6,
pages 68โ72, 2003.
[20] W. Sweldens. The lifting scheme: A construction of second
generation wavelets. Journal on Mathematical Analysis,
29(2):511โ546, 1998.
[8] R. Giunta, F. Messina, G. Pappalardo, L. Toscano, and
E. Tramontana. Testing Replica Selection Policies in a PanEuropean Grid VO. In Proceedings of WETICE, pages 210โ
215. IEEE, June 2008. DOI: 10.1109/WETICE.2008.48.
[21] J. L. Vaฬzquez. The Porous Medium Equation: Mathematical
Theory: Mathematical Theory. Oxford University Press,
2006.
| 9cs.NE
|
IEEE TRANSACTIONS ON INFORMATION THEORY
1
Sum-networks from incidence structures:
construction and capacity analysis
arXiv:1611.01887v2 [cs.IT] 29 Jan 2018
Ardhendu Tripathy, Student Member, IEEE, and Aditya Ramamoorthy, Member, IEEE
AbstractโA sum-network is an instance of a function computation problem over a directed acyclic network in which each
terminal node wants to compute the sum over a finite field of the
information observed at all the source nodes. Many characteristics of the well-studied multiple unicast network communication
problem also hold for sum-networks due to a known reduction
between the two problems. In this work, we describe an algorithm
to construct families of sum-network instances using incidence
structures. The computation capacity of several of these sumnetwork families is evaluated. Unlike the coding capacity of
a multiple unicast problem, the computation capacity of sumnetworks depends on the characteristic of the finite field over
which the sum is computed. This dependence is very strong;
we show examples of sum-networks that have a rate-1 solution
over one characteristic but a rate close to zero over a different
characteristic. Additionally, a sum-network can have arbitrarily
different computation capacities for different alphabets.
Index Termsโnetwork coding, function computation, sumnetworks, characteristic, incidence structures
I. I NTRODUCTION
Applications as diverse as parallel processing, distributed
data analytics and sensor networks often deal with variants of
the problem of distributed computation. This has motivated
the study of various problems in the fields of computer
science, automatic control and information theory. Broadly
speaking, one can model this question in the following manner.
Consider a directed acyclic network with its edges denoting
communication links. A subset of the nodes observe certain
information, these nodes are called sources. A different subset
of nodes, called terminals, wish to compute functions of the
observed information with a certain fidelity. The computation
is carried out by the terminals with the aid of the information
received over their incoming edges. The demand functions
and the network topology are a part of the problem instance
and can be arbitrary. This framework is very general and
encompasses several problems that have received significant
research attention.
Prior work [1], [2], [3] concerning information theoretic
issues in function computation worked under the setting of
correlated information observed at the sources and simple
network structures, which were simple in the sense that there
were edges connecting the sources to the terminal without any
intermediate nodes or relays. For instance, [2] characterizes
This work was supported in part by the National Science Foundation (NSF)
under grants CCF-1149860, CCF-1320416 and CCF-1718470. The material
in this work has appeared in part at the 52nd Allerton Conference on Communication, Control and Computing, 2014 and the 2015 IEEE International
Symposium on Information Theory. The authors are with the Department of
Electrical and Computer Engineering, Iowa State University, Ames, IA, 50011
USA. e-mail: {[email protected], [email protected]}
the amount of information that a source must transmit so that
a terminal with some correlated side-information can reliably
compute a function of the message observed at the source
and the side-information. Reference [3] considered distributed
functional compression, in which two messages are separately
encoded and given to a decoder that computes a function of
the two messages with an arbitrarily small probability of error.
With the advent of network coding [4], [5], the scope
of the questions considered included the setting in which
the information observed at the sources is independent and
the network topology is more complex. Under this setting,
information is sent from a source to a terminal over a path
of edges in the directed acyclic network with one or more
intermediate nodes in it, these relay nodes have no limit on
their memory or computational power. The communication
edges are abstracted into error-free, delay-free links with a
certain capacity for information transfer and are sometimes
referred to as bit-pipes. The messages are required to be
recovered with zero distortion. The multicast scenario, in
which the message observed at the only source in the network
is demanded by all terminals in the network, is solved in [4],
[5], [6]. A sufficient condition for solvability in the multicast
scenario is that each terminal has a max-flow from the source
that is at least the entropy rate of the message random process
[4]. Reference [6] established that linear network codes over
a sufficiently large alphabet can solve this problem and [5]
provided necessary and sufficient conditions for solving a
multicast problem instance in an algebraic framework. The
work in [5] also gave a simple algorithm to construct a network
code that satisfies it.
Unlike the multicast problem, the multiple unicast problem
does not admit such a clean solution. This scenario has multiple source-terminal pairs over a directed acyclic network of
bit-pipes and each terminal wants to recover the message sent
by its corresponding source with the help of the information
transmitted on the network. To begin with, there are problem
instances where more than one use of the network is required
to solve it. To model this, each network edge is viewed as
carrying a vector of n alphabet symbols, while each message
is a vector of m alphabet symbols. A network code specifies
the relationship between the vector transmitted on each edge
of the network and the message vectors, and it solves a
network coding problem instance if m = n. It is shown that
linear network codes are in general not sufficient to solve this
problem [7]. One can define the notion of coding capacity
of a network as the supremum of the ratio m/n over all
network codes that allow each terminal to recover its desired
message; this ratio m/n for a particular network code is called
IEEE TRANSACTIONS ON INFORMATION THEORY
its rate. The coding capacity of a network is independent
of the alphabet used [8]. While a network code with any
rational rate less than the coding capacity exists by definition
and zero-padding, a network code with rate equal to coding
capacity does not exist for certain networks, even if the coding
capacity is rational [9]. The multi-commodity flow solution to
the multiple unicast problem is called a routing solution, as the
different messages can be interpreted as distinct commodities
routed through the intermediate nodes. It is well-known that in
the case of multicast, network coding can provide a gain in rate
over traditional routing of messages that scales with the size of
the network [10]. However, evaluating the coding capacity for
an arbitrary instance of the network coding problem is known
to be hard in general [11], [12], [13], [14].
Expanding the scope of the demands of the terminals,
[15] considered function computation over directed acyclic
networks with only one terminal; the value to be recovered
at the terminal was allowed to be a function of the messages
as opposed to being a subset of the set of all messages.
This computation is performed using information transmitted
over the edges by a network code. Analogous to the coding
capacity, a notion of computation capacity can be defined in
this case. A rate-m/n network code that allows the terminal
to compute its demand function has the interpretation that
the function can be computed by the terminal m times in
n uses of the network. Cut-set based upper bounds for the
computation capacity of a directed acyclic network with one
terminal were given in [15], [16]. A matching lower bound
for function computation in tree-networks was given in [15]
and the computation capacity of linear and non-linear network
codes for different classes of demand functions was explored
in [17].
A different flavor of the function computation problem, often called the sum-network problem, considers directed acyclic
networks with multiple terminals, each of which demands the
finite-field sum of all the messages observed at the sources
[18], [19]. Reference [20] characterized the requirements that
sum-networks with two or three sources or terminals must
satisfy so that each terminal can recover the sum at unit
rate. Similar to the network coding scenario, a sum-network
whose terminals are satisfied by a rate-1 network code are
called solvable sum-networks. Reference [19] established that
deciding whether an arbitrary instance of a sum-network
problem instance is solvable is at least as hard as deciding
whether a suitably defined multiple unicast instance is solvable. As a result of this reduction the various characteristics
of the solvability problem for network coding instances are
also true for the solvability problem for sum-networks; this
establishes the broadness of the class of sum-networks within
all communication problems on directed acyclic networks.
While solvable sum-networks and solvable network coding
instances are intimately related, the results in this paper
indicate that these classes of problems diverge when we focus
on coding/computation capacity, which can be strictly less
than one. In [8, Section VI], the coding capacity of networks
is shown to be independent of the finite field chosen as the
alphabet for the messages and the information transmitted over
the edges. We show that an analogous statement is not true
2
for sum-networks by demonstrating infinite families of sumnetwork problem instances whose computation capacity vary
depending on the finite field alphabet. Moreover, the gap in
computation capacity on two different finite fields is shown
to scale with the network size for certain classes of sumnetworks. For two alphabets F1 , F2 of different cardinality
and a network N , the authors in [8, Theorem VI.5] described
a procedure to simulate a rate-m2 /n2 network code on F2
for N using a rate-m1 /n1 network code on F1 for the same
network, such that m2 /n2 โฅ (m1 /n1 ) โ for any > 0. That
procedure does not apply for sum-networks. Along the lines
of the counterexample given in [20] regarding minimum maxflow connectivity required for solvability of sum-networks
with three sources and terminals, we provide an infinite family
of counterexamples that mandate certain value of max-flow
connectivity to allow solvability (over some finite field) of
a general sum-network with more than three sources and
terminals. These sum-network problem instances are arrived
at using a systematic construction procedure on combinatorial
objects called incidence structures. Incidence structures are
structured set systems and include, e.g., graphs and combinatorial designs [21]. We note here that combinatorial designs have
recently been used to address issues such as the construction
of distributed storage systems [22], [23] and coded caching
systems [24]โ[26].
This paper is organized as follows. Section II describes
previous work related to the problem considered and summarizes the contributions. Section III describes the problem
model formally and Section IV describes the construction
procedure we use to obtain the sum-network problem instances
considered in this work. Section V gives an upper bound on
the computation capacity of these sum-networks and Section
VI describes a method to obtain linear network codes that
achieve the upper bound on rate for several families of the
sum-networks constructed. Section VII interprets the results
in this paper and outlines the key conclusions drawn in this
paper. Section VIII concludes the paper and discusses avenues
for future work.
II. BACKGROUND , R ELATED W ORK AND S UMMARY OF
C ONTRIBUTIONS
The problem setting in which we will work is such that
the information observed at the sources are independent and
uniformly distributed over a finite field alphabet F. The
network links are error-free and assumed to have unit-capacity.
Each of the possibly many terminals wants to recover the
finite field sum of all the messages with zero error. This
problem was introduced in the work of [18]. Intuitively, it is
reasonable to assume the network resources, i.e., the capacity
of the network links and the network structure have an effect
on whether the sum can be computed successfully by all the
terminals in the network. Reference [20] characterized this
notion for the class of sum-networks that have either two
sources and/or two terminals. For this class of sum-networks
it was shown that if the source messages had unit-entropy,
a max-flow of one between each source-terminal pair was
enough to solve the problem. It was shown by means of
IEEE TRANSACTIONS ON INFORMATION THEORY
a counterexample that a max-flow of one was not enough
to solve a sum-network with three sources and terminals.
However, it was also shown that a max-flow of two between
each source-terminal pair was sufficient to solve any sumnetwork with three sources and three terminals. Reference
[27] considered the computation capacity of the class of sumnetworks that have three sources and three or more terminals or
vice versa. It was shown that for any integer k โฅ 2, there exist
three-source, n-terminal sum-networks (where n โฅ 3) whose
k
. The work most closely related
computation capacity is k+1
to this paper is [28], which gives a construction procedure
that for any positive rational number p/q returns a sumnetwork whose computation capacity is p/q. Assuming that
p and q are relatively prime, the procedure described
in [28]
constructs a sum-network that has 2q โ 1 + 2qโ1
sources
and
2
2qโ1
2q+ 2 terminals, which can be very large when q is large.
The authors asked the question if there exist smaller sumnetworks (i.e., with fewer sources and terminals) that have the
computation capacity as p/q. Our work in [29] answered it in
the affirmative and proposed a general construction procedure
that returned sum-networks with a prescribed computation
capacity. The sum-networks in [28] could be obtained as
special cases of this construction procedure. Some smaller
instances of sum-networks for specific values were presented
in [30]. Small sum-network instances can be useful in determining sufficiency conditions for larger networks. The scope
of the construction procedure proposed in [29] was widened
in [31], as a result of which, it was shown that there exist
sum-network instances whose computation capacity depends
rather strongly on the finite field alphabet. This work builds
on the contributions in [29], [31]. In particular, we present
a systematic algebraic technique that encompasses the prior
results. We also include proofs of all results and discuss the
implications of our results in depth.
A. Summary of contributions
In this work, we define several classes of sum-networks for
which we can explicitly determine the computation capacity.
These networks are constructed by using appropriately defined
incidence structures. The main contributions of our work are
as follows.
โข We demonstrate novel techniques for determining upper
and lower bounds on the computation capacity of the
constructed sum-networks. In most cases, these bounds
match, thus resulting in a determination of the capacity
of these sum-networks.
โข We demonstrate a strong dependence of the computation
capacity on the characteristic of the finite field over which
the computation is taking place. In particular, for the same
network, the computation capacity changes based on the
characteristic of the underlying field. This is unlike the
coding capacity for the multiple unicast problem which is
known to be independent of the network coding alphabet.
โข Consider the class of networks where every sourceterminal pair has a minimum cut of value at least ฮฑ, where
ฮฑ is an arbitrary positive integer. We demonstrate that
there exists a sum-network within this class (with a large
3
number of sources and terminals) whose computation
capacity can be made arbitrarily small. This implies that
the capacity of sum-networks cannot be characterized just
by individual source-terminal minimum cuts.
III. P ROBLEM FORMULATION AND P RELIMINARIES
We consider communication over a directed acyclic graph
(DAG) G = (V, E) where V is the set of nodes and E โ V ร
V ร Z+ are the edges denoting the delay-free communication
links between them. The edges are given an additional index
as the model allows for multiple edges between two distinct
nodes. For instance, if there are two edges between nodes
u and v, these will be represented as (u, v, 1) and (u, v, 2).
Subset S โ V denotes the source nodes and T โ V denotes
the terminal nodes. The source nodes have no incoming edges
and the terminal nodes have no outgoing edges. Each source
node si โ S observes an independent random process Xi , such
that the sequence of random variables Xi1 , Xi2 , . . . indexed
by time (denoted by a positive integer) are i.i.d. and each
Xij takes values that are uniformly distributed over a finite
alphabet F. The alphabet F is assumed to be a finite field with
|F| = q and its characteristic denoted as ch(F). Each edge
represents a communication channel of unit capacity, i.e., it
can transmit one symbol from F per time slot. When referring
to a communication link (or edge) without its third index, we
will assume that it is the set of all edges between its two
nodes. For such a set denoted by (u, v), we define its capacity
cap(u, v) as the number of edges between u and v. We use
the notation In(v) and In(e) to represent the set of incoming
edges at node v โ V and edge e โ E. For the edge e = (u, v)
let head(e) = v and tail(e) = u. Each terminal node t โ T
demands thePsum (over F) of the individual source messages.
Let Zj =
{i:si โS} Xij for all j โ N (the set of natural
numbers); then each t โ T wants to recover the sequence
Z := (Z1 , Z2 , . . . ) from the information it receives on its
incoming edges, i.e., the set In(t).
A network code is an assignment of local encoding functions to each edge e โ E (denoted as ฯฬe (ยท)) and a decoding
function to each terminal t โ T (denoted as ฯt (ยท)) such
that all the terminals can compute Z. The local encoding
function for an edge connected to a set of sources only has
the messages observed at those particular source nodes as its
input arguments. Likewise, the input arguments for the local
encoding function of an edge that is not connected to any
source are the values received on its incoming edges and
the inputs for the decoding function of a terminal are the
values received on its incoming edges. As we consider directed
acyclic networks, it can be seen that there is a global encoding
function that expresses the value transmitted on an edge in
terms of the source messages in the set X := {Xi : si โ S}.
The global encoding function for an edge e is denoted as
ฯe (X).
The following notation describes the domain and range of
the local encoding and decoding functions using two natural
numbers m and n for a general vector network code. m is the
number of i.i.d. source values that are encoded simultaneously
by the local encoding function of an edge that emanates from
IEEE TRANSACTIONS ON INFORMATION THEORY
4
1
a source node. n is the number of symbols from F that are
transmitted across an edge in the network. Thus for such an
edge e whose tail(e) = s โ S, the local encoding function
is ฯฬe (Xs1 , Xs2 , . . . , Xsm ) โ F n . We will be using both row
and column vectors in this paper and they will be explicitly
mentioned while defining them. If u is a vector, the uT
represents its transpose.
โข Local encoding function for edge e โ E.
2
7
6
ฯฬe : F m โ F n if tail(e) โ S,
ฯฬe : F n| In(tail(e))| โ F n if tail(e) โ
/ S.
โข
3
Decoding function for the terminal t โ T .
ฯt : F n| In(t)| โ F m .
A network code is linear over the finite field F if all the
local encoding and decoding functions are linear transformations over F. In this case the local encoding functions
can be represented via matrix products where the matrix
elements are from F. For example, for an edge e such that
tail(e) โ
/ S, let c โ N be such that c = | In(tail(e))| and
In(tail(e)) = {e1 , e2 , . . . , ec }. Also, let each ฯei (X) โ F n
be denoted as a column vector of size n whose elements are
from F. Then the value transmitted on e can be evaluated as
ฯe (X) = ฯฬe (ฯe1 (X), ฯe2 (X), . . . , ฯec (X)),
T
= Me ฯe1 (X)T ฯe2 (X)T . . . ฯec (X)T ,
where Me โ F nรnc is a matrix indicating the local encoding
function for edge e. For the sum-networks that we consider, a
valid (m, n) fractional network code solution over F has the
interpretation that the component-wise sum over F of m i.i.d.
source symbols can be communicated to all the terminals in
n time slots.
Definition 1: The rate of a (m, n) network code is defined
to be the ratio m/n. A sum-network is solvable if it has a
(m, m) network coding solution for some m โ N.
Definition 2: The computation capacity of a sum-network
is defined as
m there is a valid (m, n) network code
:
sup
for the given sum-network.
n
We use different types of incidence structures for constructing sum-networks throughout this paper. We now formally
define and present some examples of incidence structures.
Definition 3: Incidence Structure. Let P be a set of elements
called points, and B be a set of elements called blocks, where
each block is a subset of P. The incidence structure I is
defined as the pair (P, B). If p โ P, B โ B such that p โ B,
then we say that point p is incident to block B. In general B
can be a multiset, i.e., it can contain repeated elements, but
we will not be considering them in our work. Thus for any
two distinct blocks B1 , B2 there is at least one point which is
incident to one of B1 and B2 and not the other.
We denote the cardinalities of the sets P and B by the
constants v and b respectively. Thus the set of points and
blocks can be indexed by a subscript, and we have that
P = {p1 , p2 , . . . , pv }, and B = {B1 , B2 , . . . , Bb }.
4
5
Fig. 1. A pictorial depiction of the Fano plane. The point set P = {1, . . . , 7}.
The blocks are indicated by a straight line joining their constituent points. The
points 2, 4 and 6 lying on the circle also depict a block.
Definition 4: Incidence matrix. The incidence matrix associated with the incidence structure I is a (0, 1)-matrix of
dimension v ร b defined as follows.
AI (i, j) :=
1
0
if pi โ Bj ,
otherwise.
Thus, incidence matrices can be viewed as general set systems. For example, a simple undirected graph can be viewed
as an incidence structure where the vertices are the points and
edges are the blocks (each block is of size two). Combinatorial
designs [21] form another large and well-investigated class of
incidence structures. In this work we will use the properties
of t-designs which are defined next.
Definition 5: t-design. An incidence structure I = (P, B)
is a t-(v, k, ฮป) design, if
โข
โข
โข
it has v points, i.e., |P| = v,
each block B โ B is a k-subset of the point set P, and
P and B satisfy the t-design property, i.e., any t-subset
of P is present in exactly ฮป blocks.
A t-(v, k, ฮป) design is called simple if there are no repeated
blocks. These designs have been the subject of much investigation when t = 2; in this case they are also called balanced
incomplete block designs (BIBDs).
Example 1: A famous example of a 2-design with ฮป = 1
is the Fano plane I = (P, B) shown in Figure 1. Letting
numerals denote points and alphabets denote blocks for this
design, we can write:
P = {1, 2, 3, 4, 5, 6, 7}, B = {A, B, C, D, E, F, G}, where
A = {1, 2, 3}, B = {3, 4, 5}, C = {1, 5, 6}, D = {1, 4, 7},
E = {2, 5, 7}, F = {3, 6, 7}, G = {2, 4, 6}.
The corresponding incidence matrix AI , with rows and
columns arranged in numerical and alphabetical order, is
IEEE TRANSACTIONS ON INFORMATION THEORY
5
shown below.
๏ฃฎ
1
๏ฃฏ1
๏ฃฏ
๏ฃฏ1
๏ฃฏ
AI = ๏ฃฏ
๏ฃฏ0
๏ฃฏ0
๏ฃฏ
๏ฃฐ0
0
0
0
1
1
1
0
0
1
0
0
0
1
1
0
1
0
0
1
0
0
1
0
1
0
0
1
0
1
0
0
1
0
0
1
1
๏ฃน
0
1๏ฃบ
๏ฃบ
0๏ฃบ
๏ฃบ
1๏ฃบ
๏ฃบ.
0๏ฃบ
๏ฃบ
1๏ฃป
0
(1)
It can be verified that every pair of points in P appears in
exactly one block in B.
There are some well-known conditions that the parameters
of a t-(v, k, ฮป) design satisfy (see [21]).
โข For integer i โค t the number of blocks incident to any
i-subset of P is the same. We let bi denote that constant.
Then,
vโi
kโi
bi = ฮป
/
, โi โ {0, 1, 2, . . . , t}. (2)
tโi
tโi
โข
We note that b0 is simply the total number of blocks
denoted by b. Likewise, b1 represents the number of
blocks that each point is incident to; we use the symbol
ฯ to represent it. Furthermore, bt = ฮป.
It follows that a necessary condition
for the existence
of
vโi
a t-(v, k, ฮป) design is that kโi
divides
ฮป
for
all
tโi
tโi
i = 1, 2, . . . , t.
Counting the number of ones in the point-block incidence
matrix for a particular design in two different ways, we
arrive at the equation bk = vฯ.
IV. C ONSTRUCTION OF A FAMILY OF SUM - NETWORKS
Let [t] := {1, 2, . . . , t} for any t โ N. Our construction
takes as input a (0, 1)-matrix A of dimension r ร c.
Definition 6: Notation for row and column of A. Let pi
denote the i-th row vector of A for i โ [r] and Bj denote the
j-th column vector of A for j โ [c] 1 .
It turns out that the constructed sum-networks have interesting
properties when the matrix A is the incidence matrix of
appropriately chosen incidence structures. The construction
algorithm is presented in Algorithm 1. The various steps in
the algorithm that construct components of the sum-network
G = (V, E) are described below.
1) Source node set S and terminal node set T : S and T
both contain r+c nodes, one for each row and column of
A. The source nodes are denoted at line 4 as spi , sBj if
they correspond to the i-th row, j-th column respectively.
The terminal nodes are also denoted in a similar manner
at line 5. They are added to the vertex set V of the sumnetwork at line 6.
2) Bottleneck edges: We add r unit-capacity edges indexed
as ei for i โ [r] in line 2 to the edge set E. Each edge
ei corresponds to a row of the matrix A. We also add
the required tail and head vertices of these edges to V .
1 A justification for this notation is that later when we use the incidence
matrix (AI ) of an incidence structure I to construct a sum-network, the rows
and columns of the incidence matrix will correspond to the points and blocks
of I respectively.
3) Edges between S โช T and the bottleneck edges: For
every i โ [r], we connect tail(ei ) to the source node
corresponding to the row pi and to the source nodes
that correspond to all columns of A with a 1 in the i-th
row. This is described in line 8 of the algorithm. Line
9 describes a similar operation used to connect each
head(ei ) to certain terminal nodes.
4) Direct edges between S and T : For each terminal in
T , these edges directly connect it to source nodes that
do not have a path to that particular terminal through
the bottleneck edges. Using the notation for rows and
columns of the matrix A, they can be characterized as
in lines 12 and 15.
Algorithm 1 SUM-NET-CONS
Input: A.
Output: G = (V, E).
1: Initialize V, E, S, T โ ฯ.
2: E โ {ei : i โ [r]}.
3: V โ {head(ei ), tail(ei ) : i โ [r]}.
4: S โ {spi : i โ [r]} โช {sBj : j โ [c]}.
5: T โ {tpi : i โ [r]} โช {tBj : j โ [c]}.
6: V โ V โช S โช T .
7: for all i โ [r] do
8:
E โ E โช {(sBj , tail(ei )) : A(i, j) = 1; j โ [c]} โช
{(spi , tail(ei ))}.
9:
E โ E โช {(head(ei ), tBj ) : A(i, j) = 1; j โ [c]} โช
{(head(ei ), tpi )}.
10: end for
11: for all i โ [r] do
12:
E โ E โช {(spj , tpi ) : i 6= j; j โ [r]} โช {(sBj , tpi ) :
A(i, j) = 0; j โ [c]}.
13: end for
14: for all j โ [c] do
15:
E โ E โช {(spi , tBj ) : A(i, j) = 0; i โ [r]} โช
{(sBj0 , tBj ) : BjT Bj 0 = 0; j 0 โ [c]}.
16: end for
17: return G โ (V, E).
For an incidence structure I, let AI represent its incidence
matrix. The sum-networks constructed in the paper are such
that the matrix A used in the SUM-NET-CONS algorithm is
either equal to AI or ATI for some incidence structure I. When
A = AI , we call the sum-network constructed as the normal
sum-network for I. Otherwise when A = ATI , we call the
sum-network constructed as the transpose sum-network for I.
The following definitions are useful for analysis. For every
p โ P, we denote the set of blocks that contain the point p as
hpi := {B โ B : p โ B},
(3)
and for every B โ B, the collection of blocks that have a
non-empty intersection with B is denoted by the set
hBi := {B 0 โ B : B 0 โฉ B 6= ฯ}
0
T
0
= {B โ B : B B 6= 0},
(4)
(5)
where boldface B indicates the column of AI corresponding
to block B โ B.
IEEE TRANSACTIONS ON INFORMATION THEORY
s1
6
sB
s2
s{1,2}
sA
e1
s1
e2
sC
s2
s3
e2
t1
t{1,2}
t2
s{1,2}
s2
e1
e3
(a)
s1
t1
e{1,2}
t2
t3
tA
tC
tB
t1
t{1,2}
t2
(b)
Fig. 2. Two sum-networks obtained from the line graph on two vertices
described in Example 2. The source set S and the terminal set T contain
three nodes each. All edges are unit-capacity and point downward. The edges
with the arrowheads are the bottleneck edges constructed in step 2 of the
construction procedure. (a) Normal sum-network, and (b) transposed sumnetwork.
The inner product above is computed over the reals. In the
sequel, we will occasionally need to perform operations similar
to the inner product over a finite field. This shall be explicitly
pointed out.
We now present some examples of sum-networks constructed using the above technique.
Example 2: Let I be the unique simple line graph on two
vertices, with points corresponding to the vertices and blocks
corresponding to the edges of the graph. Denoting the points
as natural numbers, we get that P = {1, 2} and B = {{1, 2}}.
Then the associated incidence matrices are as follows.
AI =
1
, and ATI = 1
1
1 .
Following the SUM-NET-CONS algorithm the two sumnetworks obtained are as shown in the Figure 2.
Example 3: In this example we construct a sum-network
using a simple t-design. Let I denote the 2-(3, 2, 1) design
with its points denoted by the numbers {1, 2, 3} and its blocks
denoted by the letters {A, B, C}. For this design we have
that A = {1, 2}, B = {1, 3}, C = {2, 3} and its associated
incidence matrix under row and column permutations can be
Fig. 3. The normal sum-network obtained for the incidence structure I
described in Example 3. All edges are unit-capacity and directed downward.
The edges with the arrowheads are the bottleneck edges, and the edges denoted
by dashed lines correspond to the direct edges introduced in step 4 of the
construction procedure. For this case, the normal and the transposed sumnetwork are identical.
written as follows.
๏ฃฎ
1
AI = ๏ฃฐ1
0
1
0
1
๏ฃน
0
1๏ฃป
1
Note that AI = ATI . Hence the normal sum-network and the
transposed sum-network are identical in this case. Following
the SUM-NET-CONS algorithm, we obtain the sum-network
shown in Figure 3.
Remark 1: Note that each edge added in the SUM-NETCONS algorithm has unit capacity. Proposition 6 in Section
VII modifies the SUM-NET-CONS algorithm so that each
edge e in the sum-network has cap(e) = ฮฑ > 1, ฮฑ โ N.
V. U PPER BOUND ON THE COMPUTATION CAPACITY
In this section, we describe an upper bound on the computation capacity of a sum-network obtained from a (0, 1)-matrix
A of dimension r ร c. We assume that there exists a (m, n)
fractional network code assignment, i.e., ฯฬe for e โ E (and
corresponding global encoding functions ฯe (X)) and decoding
functions ฯt for t โ T so that all the terminals in T can recover
the sum of all the independent sources.
For convenience of presentation, we will change notation
slightly and let the messages observed at the source nodes
corresponding to the rows of A as Xpi for i โ [r] and those
corresponding to the columns of A as XBj for j โ [c]. Each
of the messages is a column vector of length m over F. The
set of all source messages is represented by X. We let ฯe (X)
denote the n-length column vector of symbols from F that are
IEEE TRANSACTIONS ON INFORMATION THEORY
7
transmitted by the edge e โ E, as it is the value returned by
the global encoding function ฯe for edge e on the set of source
messages denoted by X. As is apparent, non-trivial encoding
functions can only be employed on the bottleneck edges, i.e.,
ei for i โ [r] as these are the only edges that have more than
one input. For brevity, we denote ฯi (X) = ฯei (X). We define
the following set of global encoding functions.
ฯIn(v) (X) := {ฯe (X) : e โ In(v)}, โv โ V.
Let H(Y ) be the entropy function for a random variable Y .
We let {Yi }l1 denote the set {Y1 , Y2 , . . . , Yl } for any l > 1.
The following lemma demonstrates that certain partial sums
can be computed by observing subsets of the bottleneck edges.
Lemma 1: If a network code allows each terminal
0
to compute
P the demanded sum, then the value Xpi :=
Xpi + j:A(i,j)=1 XBj can be computed from ฯi (X), i.e.,
H Xp0 i |ฯi (X) = P
0 for all i โ [r]. Similarly
for any j โ [c]
P
0
:=
the value XB
X
+
0
p
i
i:A(i,j)=1
j :Bj 0 โhBj i XBj 0 can
j
be computed from the set of values {ฯi (X) : for i โ
[r], A(i, j) = 1}.
Proof: We let for any i โ [r]
X
X
X
Z1 =
Xpi0 , Z2 =
XBj and Z3 =
XBj ,
i0 6=i
j:A(i,j)=1
Pr Xp0 i = x0pi , {Xpi0 = xpi0 : i0 6= i},
{XBj = xBj : A(i, j) = 0}|ฯi (X) = ฯi (x)
(a)
= Pr(Xp0 i = x0pi , ฯi (X) = ฯi (x))/ Pr(ฯi (X) = ฯi (x))
ยท Pr({Xpi0 = xpi0 : i0 6= i}, {XBj = xBj : A(i, j) = 0})
(b)
= Pr Xp0 i = x0pi |ฯi (X) = ฯi (x)
ยท Pr {Xpi0 = xpi0 : i0 6= i}, {XBj = xBj : A(i, j) = 0}
|ฯi (X) = ฯi (x) ,
where equalities (a) and (b) are due to the fact that the source
messages are independent and ฯi (x) is only a function of xpi
and the set {xBj : A(i, j) = 1}.
Since terminal tpi can compute Z, H Z|ฯIn(tp ) (X) = 0
i
and we get from eq. (6) that H(Xpi + Z2 |ฯi (X)) = 0.
For the second part of the lemma, we argue similarly as
follows. We let for any j โ [c]
X
X
Z1 =
Xpi , Z2 =
Xpi ,
i:A(i,j)=1
Z3 =
j:A(i,j)=0
such that the sum Z = Xpi +Z1 +Z2 +Z3 and Xp0 i = Xpi +Z2 .
By our assumption that each terminal can recover the
demanded sum, we know that Z can be evaluated
from
ฯIn(tp ) (X) for all i โ [r], i.e., H Z|ฯIn(tpi ) (X) = 0 for
i
all i โ [r]. Since {Xpi0 : i0 6= i} and {XBj : A(i, j) = 0}
determine the value of Z1 and Z3 respectively and also
determine the values transmitted on each of the direct edges
that connect a source node to tpi , we get that
H Z|ฯIn(tp ) (X)
i
= H Z|ฯi (X), {ฯ(sp 0 ,tpi ) (X) : i0 6= i},
i
{ฯ(sBj ,tpi ) : A(i, j) = 0}
(a)
bold lowercase symbols represent specific realizations of the
random variables.
0
โฅ H Xpi + Z1 + Z2 + Z3 |ฯi (X), {Xpi0 : i 6= i},
{XBj : A(i, j) = 0}
= H Xp0 i |ฯi (X), {Xpi0 : i0 6= i}, {XBj : A(i, j) = 0}
= H Xp0 i , {Xpi0 : i0 6= i}, {XBj : A(i, j) = 0}|ฯi (X)
โ H {Xpi0 : i0 6= i}, {XBj : A(i, j) = 0}|ฯi (X)
= H Xp0 i |ฯi (X)
+ H {Xpi0 : i0 6= i}, {XBj : A(i, j) = 0}|Xp0 i , ฯi (X)
โ H {Xpi0 : i0 6= i}, {XBj : A(i, j) = 0}|ฯi (X)
(b)
(6)
= H Xp0 i |ฯi (X) ,
where inequality (a) follows from the fact that ฯ(sp 0 ,tpi ) (X)
i
is a function of Xpi0 for i0 6= i and ฯ(sBj ,tpi ) (X) is a
function of {XBj : A(i, j) = 0} and equality (b) is due
to the fact that Xp0 i is conditionally independent of both
{Xpi0 : i0 6= i} and {XBj : A(i, j) = 0} given ฯi (X).
This conditional independence can be checked as follows. Let
X
BโhBj i
i:A(i,j)=0
XB , Z4 =
X
XB
B โhB
/ ji
0
= Z1 +Z3 . By our
such that Z = Z1 +Z2 +Z3 +Z4 and XB
j
assumption, for all j โ [c], H Z|ฯIn(tB ) (X) = 0. The sets
j
{Xp : p โ
/ Bj } and {XB : B โ
/ hBj i} determine the value of
Z2 and Z4 respectively and also the values transmitted on each
of the direct edges that connect a source node to the terminal
tBj . Let ฮฆ denote the set {ฯi (X) : A(i, j) = 1}. Then,
H Z|ฯIn(tB ) (X)
j
= H Z1 + Z2 + Z3 + Z4 |ฮฆ, {ฯ(spi ,tBj ) (X) : A(i, j) = 0},
{ฯ(sB ,tBj ) : B โ
/ hBj i}
(a)
โฅ H (Z1 + Z2 + Z3 + Z4 |ฮฆ, {Xpi : A(i, j) = 0},
{XB : B โ
/ hBj i})
0
= H XB
|ฮฆ, {Xpi : A(i, j) = 0}, {XB : B โ
/ hBj i}
j
0
= H XB
,
{X
:
A(i,
j)
=
0},
{X
:
B
โ
/
hB
i}|ฮฆ
p
B
j
i
j
=
(b)
โ H ({Xpi : A(i, j) = 0}, {XB : B โ
/ hBj i}|ฮฆ)
0
H(XB
|ฮฆ)
j
โH({Xpi : A(i, j) = 0}, {XB : B โ
/ hBj i}|ฮฆ)
0
+ H({Xpi : A(i, j) = 0}, {XB : B โ
/ hBj i}|XB
, ฮฆ)
j
0
= H(XB
|ฮฆ).
j
Inequality (a) is due to the fact that ฯ(spi ,tBj ) (X) is a function
of Xpi and similarly for ฯ(sB ,tBj ) (X). Equality (b) follows
from the fact that Z1 +Z3 is conditionally independent of both
{Xpi : A(i, j) = 0} and {XBj0 : B โ
/ hBj i} given the set of
random variables {ฯi (X) : A(i, j) = 1}. This can be verified
in a manner similar to as was done previously. This gives us
0
the result that H(XB
|{ฯi (X) : A(i, j) = 1}) = 0.
j
IEEE TRANSACTIONS ON INFORMATION THEORY
Next, we show the fact that the messages observed at the
source nodes are independent and uniformly distributed over
F m imply that the random variables Xp0 i for all i โ [r] are
also uniform i.i.d. over F m . To do that, we introduce some
notation. For a matrix N โ F rรc , for any two index sets
R โ [r], C โ [c], we define the submatrix of N containing the
rows indexed by R and the columns indexed by C as N [R, C].
Consider two (0, 1)-matrices N1 , N2 of dimensions r1 ร t and
tรc2 respectively. Here 1 and 0 indicate the multiplicative and
additive identities of the finite field F respectively. The i-th
row of N1 is denoted by the row submatrix N1 [i, [t]] โ {0, 1}t
and the j-th column of N2 be denoted by the column submatrix
N2 [[t], j] โ {0, 1}t . Then we define a matrix function on
N1 N2 that returns a r1 ร c2 matrix (N1 N2 )# as follows.
๏ฃฑ
๏ฃฒ1, if the product N1 [i, [t]] N2 [[t], j]
over Z is positive,
(N1 N2 )# (i, j) =
๏ฃณ0, otherwise.
For an incidence structure I = (P, B) with r ร c incidence
matrix A, let Xp , โp โ P and XB , โB โ B be m-length
vectors with each component i.i.d. uniformly distributed over
F. We collect all the independent source random variables
in a column vector X having m(r + c) elements from F as
follows
T T
T
T
ยท ยท ยท XB
XB
.
X := XpT1 XpT2 ยท ยท ยท XpTr XB
c
2
1
Recall that pi denotes the i-th row and Bj denotes the j-th
column of the matrix A. For all i โ [r] let ei โ F r denote the
column vector with 1 in its i-th component and zero elsewhere.
0
as defined in lemma 1, one can check that
Then for Xp0 i , XB
j
(โ indicates the Kronecker product of two matrices)
0
Xpi = eTi pi โ Im X, for all i โ [r] and
(7)
T
0
T
T
XBj = Bj (Bj B1 )# . . . (Bj Bc )# โ Im X, (8)
for all j โ [c] where Im is the identity matrix of size m.
By stacking these values in the correct order, we can get the
following matrix equation.
0T
0
0
0 T
Xp1 ยท ยท ยท XpTr XBT1 ยท ยท ยท XBTc = (MA โ Im )X
(9)
where the matrix MA โ F (r+c)ร(r+c) is defined as
Ir
A
MA :=
.
(10)
AT (AT A)#
Note that the first r rows of MA are linearly independent.
There is a natural correspondence between the rows of MA and
the points and blocks of I of which A is the incidence matrix.
If 1 โค i โค r, then the i-th row MA [i, [r + c]] corresponds to
the point pi โ P and if r + 1 โค j โค r + c, then the j-th row
MA [j, [r + c]] corresponds to the block Bj โ B.
0
Lemma 2: For a (0, 1)-matrix A of size rรc, let Xp0 i , XB
โ
j
m
F be as defined in Eqs. (7), (8) and matrix MA be as defined
in eq. (10). Let r + t := rankF MA for some non-negative
integer t and index set S 0 โ {r + 1, r + 2, . . . , r + c} be
such that rankF MA [[r] โช S 0 , [r + c]] = r + t. Let BS 0 :=
{BS10 , BS20 , . . . , BSt0 } โ B be the set of blocks that correspond
8
to the rows of MA indexed by S 0 in increasing order. Then
we have
0
0
0
0
Pr Xp0 1 = x01 , . . . , Xp0 r = x0r , XB
=
y
,
.
.
.
,
X
=
y
1
BS 0
t
S0
t
1
= q โm(r+t) , and (11)
Pr
Xp0 i
=
x0i
= Pr
0
XB
S0
j
=
yj0
= q โm , โi โ [r], j โ [t].
Proof: The quantities in the statement of the lemma
satisfy the following system of equations
T
T T
ยท ยท ยท XB
(M [[r] โช S 0, [r + c]] โ Im ) XpT1 ยท ยท ยท XpTr XB
1
c
h 0
iT
0
0
0
T
T
T
T
= Xp1 ยท ยท ยท Xpr XBS 0 ยท ยท ยท XBS 0 .
1
t
T
T T
ยท ยท ยท XB
The vector XpT1 ยท ยท ยท XpTr XB
is uniform
1
c
over F m(r+c) . Since the matrix M [[r] โช S 0 , [r + c]] โ Im has
full row rank equal to m(r + t), the R.H.S. of the above
equation is uniformly distributed over F m(r+t) , giving the first
statement. The second statement is true by marginalization.
Theorem 1: The computation capacity of any sum-network
constructed by the SUM-NET-CONS algorithm is at most 1.
Proof: By the construction procedure, there is a terminal
tpi which is connected to the sources spi and {sBj : A(i, j) =
1} through the edge ei . By lemmas 1 and 2 we have that
H(ฯi (X)) โฅ m log2 q bits. From the definition of n the
maximum amount of information transmitted on ei is n log2 q
bits and that implies that m โค n.
Next, we show that the upper bound on the computation
capacity exhibits a strong dependence on the characteristic of
the field (denoted ch(F)) over which the computation takes
place.
Theorem 2: Let A be a (0, 1)-matrix of dimension r ร c and
suppose that we construct a sum-network corresponding to A
using the SUM-NET-CONS algorithm. The matrix MA is as
defined in eq. (10). If rankF MA = r + t, the upper bound on
computation capacity of the sum-network is r/(r + t).
Proof: Let BS 0 โ B be as defined in lemma
2. Then from
0
|ฯ
(X)
=
0,
โi โ [r] and
lemmas
1
and
2,
we
have
H
X
i
p
i
0
H XB
|{ฯi (X) : A(i, j) = 1}
S0
j
H({ฯi (X)}r1 )
= 0, โj โ [t]. Hence we
have that
โฅ m(r + t) log q. From the definition
of n, we get nr log q โฅ H({ฯi (X)}r1 ) โฅ m(r + t) log q =โ
m/n โค r/(r + t).
Proposition 1: We have that
rankF MA = r + t if and only
if rankF (AT A)# โ AT A = t. Furthermore, rankF MA =
r + c if and only if ch(F) - detZ MA , where detZ indicates
the determinant of the matrix with its elements interpreted as
0 or 1 in Z.
Proof: From eq. (10), we have that
I
A
MA = rT
A
(AT A)#
I
0 Ir
0
Ir A
= rT
, (12)
A
Ic 0 (AT A)# โ AT A 0 Ic
which gives us the rank condition. Since MA is a (0, 1)matrix, if it has full rank, then its determinant is some non-zero
element of F, where F is the base subfield of F having prime
order. We could also interpret the elements of MA as integers
IEEE TRANSACTIONS ON INFORMATION THEORY
9
and evaluate its determinant detZ MA . Then if MA has full
rank, we have that ch(F) - detZ MA .
Example 4: Consider the normal sum-network obtained
from using the Fano plane for which the incidence matrix AI
is as defined in eq. (1), so that r = c = 7. It can be verified
that rankGF (2) MAI = 7. Hence theorem 2 gives an upper
bound of 1 for the computation capacity. In fact, there is a
rate-1 network code that satisfies all terminals in the normal
sum-network obtained using the Fano plane as described later
in proposition 4.
We can obtain a different upper bound on the computation
capacity by considering submatrices of MA that do not necessarily contain all the initial r rows. To do this we define a
00
new index set S based on an index set S โ [r] as follows.
00
S โ {r + 1, r + 2, . . . , r + c} such that
00
โi โ S , AT [i โ r, [r]] โ Span{Ir [j, [r]] : j โ S}. (13)
Here Span indicates the subspace spanned by the vectors in a
set. The submatrix of MA that contains all the rows indexed
00
00
by numbers in S โช S is M [S โช S , [r + c]].
Theorem 3: Let A be a (0, 1)-matrix of dimension r ร c
and suppose that we construct a sum-network corresponding
to A using the SUM-NET-CONS algorithm. For any (m, n)network code that enables all the terminals to compute the
sum, we must have that
|S|
m
โค min
,
n
xS
Sโ[r]
00
00
where xS := rankF MA [S โช S , [r + c]] and S is as defined
in eq. (13).
Proof: Note that for the choice S = [r], the index set
00
S is the same as the index set S 0 defined in lemma 2 and
xS = rankF MA , thus recovering the r/ rankF MA upper
bound on the computation capacity from theorem 2. For S =
00
{S1 , . . . , S|S| } โ [r], we have an index set T โ S such that
00
xS = rankF MA [S โช S , [r + c]],
= rankF MA [S โช T , [r + c]] = |S| + |T |.
We collect the blocks indexed in increasing order by T in the
set BT = {BT1 , . . . , BTy } โ B, where y := |T |. Then one
can recover the L.H.S. of the following equation from the set
of messages {ฯi (X) : i โ S}
h
0
XpTS1
0
0
0
ยท ยท ยท XpTS
XBTT ยท ยท ยท XBTTy
1
|S|
MA [S, [r + c]]
=
โ Im X.
MA [T , [r + c]]
iT
Hence we have that q n|S| โฅ q m(|S|+y) =โ m/n โค |S|/xS .
The same reasoning is valid for any choice of S โ [r] and
that gives us the result.
Example 5: Consider the transposed sum-network corresponding to the undirected graph G shown in Figure 4.
One can check that the matrix MATG when the rows and
3
2
B
A
1
C
5
D
6
4
Fig. 4. A simple undirected graph G with two connected components. It has
6 vertices and 4 edges.
columns of the incidence matrix ATG are arranged in increasing
alphabetical and numeric order is as follows.
๏ฃน
๏ฃฎ
1 0 0 0 1 1 0 0 0 0
๏ฃฏ 0 1 0 0 1 0 1 0 0 0 ๏ฃบ
๏ฃบ
๏ฃฏ
๏ฃฏ 0 0 1 0 1 0 0 1 0 0 ๏ฃบ
๏ฃบ
๏ฃฏ
๏ฃฏ 0 0 0 1 0 0 0 0 1 1 ๏ฃบ
๏ฃบ
๏ฃฏ
๏ฃฏ 1 1 1 0 1 1 1 1 0 0 ๏ฃบ
๏ฃบ
๏ฃฏ
MATG = ๏ฃฏ
๏ฃบ
๏ฃฏ 1 0 0 0 1 1 0 0 0 0 ๏ฃบ
๏ฃฏ 0 1 0 0 1 0 1 0 0 0 ๏ฃบ
๏ฃบ
๏ฃฏ
๏ฃฏ 0 0 1 0 1 0 0 1 0 0 ๏ฃบ
๏ฃบ
๏ฃฏ
๏ฃฐ 0 0 0 1 0 0 0 0 1 1 ๏ฃป
0 0 0 1 0 0 0 0 1 1
We choose our finite field alphabet to be GF (3) in this example. Then rankGF (3) MATG = 5 and theorem 2 gives that the
computation capacity is at most 4/5. However, theorem 3 gives
a tighter upper bound in this case. Specifically, if S = {1, 2, 3}
00
00
then S = {5, 6, 7, 8} and rankGF (3) MATG [S โช S , [10]] = 4.
Hence theorem 3 states that the computation capacity of the
transposed sum-network for the graph G is at most 3/4.
We apply the above theorems to obtain characteristic dependent upper bounds on the computation capacity of some
infinite families of sum-networks constructed using the given
procedure.
Corollary 1: Let I = (P, B) be an incidence structure
obtained from a simple undirected graph where P denotes
the set of vertices and B consists of the 2-subsets of P
corresponding to the edges. Let deg(p) โ Z represent the
degree of vertex p โ P. The incidence matrix AI has
dimension |P| ร |B|. The computation capacity of the normal
|P|
sum-network constructed using AI is at most |P|+|B|
for any
finite field F.
Let F be the finite field alphabet of operation and define
P 0 โ P as P 0 := {p : ch(F) - (deg(p) โ 1), p โ P}. Consider
the set of edges B 0 := โชpโP 0 hpi. The computation capacity of
0
|
the transposed sum-network is at most |B0|B
|+|P 0 | .
Proof: Recall that BiT is the i-th row of ATI for all i โ
[|B|]. Then the inner product over F between two rows is
๏ฃฑ
๏ฃด
2 (mod ch(F)), if i = j,
๏ฃด
๏ฃฒ
if edges indexed by i and
T
Bi Bj = 1,
j have a common vertex,
๏ฃด
๏ฃด
๏ฃณ
0,
otherwise.
IEEE TRANSACTIONS ON INFORMATION THEORY
10
It can be observed that the matrix of interest, i.e., (ATI AI )# โ
ATI AI = โI|B| has full rank over every finite field.
The transposed sum-network for I is obtained by applying
the SUM-NET-CONS algorithm on the |B|ร|P| matrix ATI , so
that the parameters r = |B|, c = |P|. We apply theorem 3 by
choosing the index set S โ [|B|] such that S = {j : Bj โ B 0 }.
00
Defined this way, |S| = |B 0 | and S is obtained from S using
eq. (13). We collect all the points corresponding to the rows in
00
the submatrix MATI [S , [r + c]] in a set PS 00 โ P. Note that
PS 00 depends on the set of edges B 0 . By definitions of B 0 and
00
S , we have that P 0 โ PS 00 . This is true because B 0 consists
of all the edges that are incident to at least one point in P 0
00
while indices in the set S correspond to all points that are
not incident to any edge outside B 0 . For instance, in Example
5 above, as F = GF (3), P 0 = {1}. Then B 0 = {A, B, C}
and PS 00 = {1, 2, 3, 4}.
00
We now show that rankF MA [S โช S ] = |B 0 | + |P 0 | and
that gives us the result using theorem 3. Recall that pi denotes
the i-th row of AI , which corresponds to the vertex pi for all
i โ [|P|]. It follows that the inner product between pi , pj over
F is
๏ฃฑ
๏ฃด
๏ฃฒdeg(pi ) (mod ch(F)), if i = j,
T
pi pj = 1,
if {i, j} โ B,
๏ฃด
๏ฃณ
0,
otherwise.
together in exactly one block. Thus, we have the inner product
over F as
(
vโ1
(mod ch(F)), if j = i,
T
pi pj = kโ1
1,
otherwise.
h
i
vโ1
This implies that AI ATI โ (AI ATI )# =
โ
1
Iv =
kโ1
i
h
vโk
kโ1 Iv and setting its determinant non-zero gives the result.
For the normal sum-network, we argue as follows. Note
that BiT Bi = k (mod ch(F)) for any i. Since any two points
determine a unique block, two blocks can either have one point
or none in common. Hence, for i 6= j, the inner product over
F is
(
1, if Bi โฉ Bj 6= โ
,
T
Bi Bj =
0, otherwise.
Because of the above equation, all the off-diagonal terms in
the matrix (AI ATI )# โ AI ATI are equal to zero. We focus
00
on the submatrix M [S โช S , [r + c]] obtained from eq. (12),
00
00
letting S|B| = {j โ |B| : j โ S } we get that
ch(F) - [ฯ โ b2 + v(b2 โ 1)](ฯ โ b2 )vโ1 .
#
0
h
i
00
00
00
M [S โช S , [r + c]] =
AI [S|B| , S] I|P| S|B| , S|B|
I
ATI
ยท ฮ ยท |B|
,
0 I|P|
"
00
I|B| [S, S]
Proof: By definition, we have that the inner product over
F between two rows is
(
ฯ (mod ch(F)), if j = i,
T
pi pj =
b2 (mod ch(F)), otherwise.
It follows that AI ATI โ (AI ATI )# has the value (ฯ โ 1) on
the diagonal and (b2 โ 1) elsewhere. That is,
AI ATI โ (AI ATI )#
where
ฮ :=
Then ATI AI โ (ATI AI )# = [(k โ 1)] Ib and setting its
determinant as non-zero gives the result.
Corollary 3: Let I = (P, B) be a t-(v, k, ฮป) design,for t โฅ
kโ1
2. From eq. (2), each point is present in ฯ := ฮป vโ1
tโ1 / tโ1
blocks and the number of
blocks
incident to any pair of points
kโ2
is given by b2 := ฮป vโ2
/
tโ2
tโ2 . Consider the transposed sumnetwork constructed using the incidence matrix ATI which
has dimension |B| ร |P|. The computation capacity of the
|B|
transposed sum-network is at most |B|+|P|
if
"
I|B| [S, [|B|]]
0
#
0
(AI ATI )# โ AI ATI
h
i
00
.
S|B| , [|P|]
By definition of P 0 the points in the set PS 00 \ P 0 are such
that deg(pi ) โ 1 โก 0 (mod ch(F)), i.e., the diagonal entry
corresponding to those points in (AI ATI )# โ AI ATI in the
matrix ฮ is zero. Thus, ฮ has exactly |B 0 | + |P 0 | rows which
are not equal to the all-zero row vector. The first and third
matrices are invertible, and hence we get that rankF MA [S โช
00
S , [r + c]] = |B 0 | + |P 0 |.
Corollary 2: Let I = (P, B) be a 2-(v, k, 1) design. For the
normal sum-network constructed using the |P| ร |B| incidence
|P|
matrix AI , the computation capacity is at most |P|+|B|
if
ch(F) - (k โ 1). For the transposed sum-network constructed
|B|
using ATI , the computation capacity is at most |P|+|B|
if
vโk
ch(F) - kโ1 .
Proof: We first describe the case of the transposed sumnetwork. From eq. (2) each point in a 2-(v, k, 1) design is
vโ1
incident to ฯ = kโ1
blocks. Moreover any two points occur
= [(ฯโb2 ) (mod ch(F))] Iv + [(b2 โ1) (mod ch(F))] Jv ,
where Jv denotes the square all ones matrix of dimension v. Then by elementary
row and columns operations,
det AI ATI โ (AI ATI )# can be evaluated to be equal to
[ฯ โ b2 + v(b2 โ 1)](ฯ โ b2 )vโ1 (mod ch(F)).
Corollary 4: Let D = (P, B) be a t-(v, t + 1, ฮป) design
with ฮป 6= 1 and incidence matrix AD . We define a higher
incidence matrix AD0 of dimension |P|
t ร |B| such that each
row corresponds to a distinct t-subset of P and each column
corresponds to
ablock in B. AD0 is a (0, 1)-matrix such that
for any i โ vt , j โ [|B|], its entry AD0 (i, j) = 1 if each
of the points in the t-subset corresponding to the i-th row is
incident to the block Bj โ B and zero otherwise. The computation capacity of the normal sum-network constructed using
(vt)
t+1
= ฮป+t+1
if ch(F) - t. The computation
AD0 is at most v +|B|
(t)
capacity of the transposed sum-network constructed using ATD0
|B|
ฮป
is at most |B|+
= ฮป+t+1
if ch(F) - (ฮป โ 1).
(vt)
Proof: The
incidence
matrix AD0 is a (0, 1) matrix of
ฮป v
dimension vt ร t+1
t . Let pi , Bu denote the i-th row and
IEEE TRANSACTIONS ON INFORMATION THEORY
11
h
i
ฮป v
u-th column respectively of AD0 for i โ vt , u โ t+1
t .
Each row of AD0 corresponds to a distinct t-subset of P. By tdesign criterion, any set of t points belongs to exactly ฮป blocks.
Since the columns have a one-to-one correspondence with the
blocks in B, each row of AD0 has exactly ฮป 1โs. Two rows
will have a 1 in the same column if the block corresponding to
the column is incident to both the t-subsets corresponding to
the two rows. Since each block has t + 1 points, there cannot
be more than one block incident to two different t-subsets.
T
Hence, for the inner product over F, we
vhave
that pi pi = ฮป
(mod ch(F)) and for all i 6= j; i, j, โ t ,
๏ฃฑ
๏ฃฒ1, if the union of the t-subsets corresponding to
the i-th and j-th rows is a block in B,
pi pTj =
๏ฃณ0, otherwise.
most 2/3. We describe a network code with m = 2, n = 3.
The global encoding functions for the two bottleneck edges
are shown in Table I. Using the values transmitted, all three
Then AD0 ATD0 โ (AD0 ATD0 )# = [(ฮป โ 1) (mod ch(F))] I(v)
t
and that gives the result for the transposed sum-network.
For the normal sum-network, we look at the columns of
AD0 in a similar manner. Each column of AD0 corresponds to
a block in B. Since
the size of each block is t+1, each column
has exactly t+1
= t + 1 elements as 1. Also, two different
t
blocks can have at most t points in common, and only when
that happens, will the two columns have a 1 in the same row.
Hence, for the inner product over F, we have that
BuT Bu =
v
(t + 1) (mod ch(F)) and for all u 6= v; u, v โ t ,
๏ฃฑ
๏ฃฒ1, if the u-th and v-th blocks have t points
in common,
BuT Bv =
๏ฃณ0, otherwise.
terminals can recover the sum in the following manner. t1
receives the value of X2 from the direct edge (s2 , t1 ) while
t2 receives the value of X1 from the direct edge (s1 , t2 ). Then
t1 recovers the sum using the first two components of ฯ1 (X)
while t2 recovers the sum using the first two components of
ฯ2 (X). Additionally, t{1,2} receives both ฯ1 (X), ฯ2 (X) and
can carry out the operation (X1 + X{1,2} ) + (X2 + X{1,2} ) โ
X{1,2} . Thus, each terminal is satisfied.
Then ATD0 AD0 โ (ATD0 AD0 )# = t (mod ch(F))I ฮป (v) and
t+1 t
theorem 2 gives the result.
VI. L INEAR NETWORK CODES FOR CONSTRUCTED
SUM - NETWORKS
In this section, we propose linear network codes for the
sum-networks constructed using the SUM-NET-CONS algorithm. Recall that the algorithm takes a (0, 1)-matrix A that
has r rows and c columns as its input. In Section V, we
demonstrated that the incidence matrix of certain incidence
structures result in sum-networks whose capacity can be upper
bounded (cf. Corollaries 1, 2, 4). We now demonstrate that
under certain conditions, we can obtain network codes whose
rate matches the corresponding upper bound. Thus, we are able
to characterize the capacity of a large family of sum-networks.
We emphasize that random linear network codes that have
been used widely in the literature for multicast code constructions are not applicable in our context. In particular, it is not
too hard to argue that a random linear network code would
result in each terminal obtaining a different linear function
or subspace. Thus, constructing codes for these sum-networks
requires newer ideas. We outline the key ideas by means of
the following example.
Example 6: Consider the sum-network shown in Figure 2(a).
The matrix AI used in its construction is of dimension r ร c
where r = 2, c = 1 and is described
in Example 2. It can
be observed that ATI AI โ ATI AI # = 1. Then theorem 2
states that the computation capacity of this sum-network is at
TABLE I
T HE FUNCTION VALUES TRANSMITTED ACROSS e1 , e2 IN F IGURE 2( A )
FOR A NETWORK CODE WITH RATE = 2/3. E ACH MESSAGE X1 , X2 ,
X{1,2} IS A VECTOR WITH 2 COMPONENTS , AND ฯ1 (X), ฯ2 (X) ARE
VECTORS WITH 3 COMPONENTS EACH . A NUMBER WITHIN SQUARE
BRACKETS ADJOINING A VECTOR INDICATES A PARTICULAR COMPONENT
OF THE VECTOR .
Component
1
2
3
ฯ1 (X)
X1 [1] + X{1,2} [1]
X1 [2] + X{1,2} [2]
X{1,2} [1]
ฯ2 (X)
X2 [1] + X{1,2} [1]
X2 [2] + X{1,2} [2]
X{1,2} [2]
The network code in the example has the following structure. For each bottleneck edge, the first r components of the
global encoding vector are the sum of all messages that are
incident to that bottleneck. The remaining c components of
the encoding vectors transmit certain components of messages
observed at source nodes that correspond to columns in the
matrix AI . In the example, t{1,2} received the first component
of X{1,2} from ฯ1 (X) and the second component from ฯ2 (X).
Thus it was able to recover the value of X{1,2} , which it used
in computing the demanded sum.
Our construction of network codes for sum-networks will
have this structure, i.e., the first r components on a bottleneck
edge will be used to transmit a partial sum of the messages
observed at the sources that are connected to that bottleneck
edge and the remaining c components will transmit portions of
certain sources in an uncoded manner. For a given incidence
matrix A, our first step is to identify (if possible) a corresponding non-negative integral matrix D of the same dimensions
with the following properties.
โข D(i, j) = 0 if A(i, j) = 0.
โข Each row in D sums to r.
โข Each column in D sums to c.
Under certain conditions on the incidence matrix A, we will
show that D can be used to construct suitable network codes
for the sum-networks under consideration.
The existence of our proposed network codes are thus
intimately related to the existence of non-negative integral
matrices that satisfy certain constraints. The following theorem
[32, Corollary 1.4.2] is a special case of a more general
theorem in [33] that gives the necessary and sufficient conditions for the existence of non-negative integral matrices with
constraints on their row and column sums. We give the proof
here since we use some ideas from it in the eventual network
code assignment.
IEEE TRANSACTIONS ON INFORMATION THEORY
Theorem 4: Let R = (r1 , r2 , . . . , rm ) and S = (s1 , s2 , . . . ,
sn ) be non-negative integral vectors satisfying r1 +. . .+rm =
s1 +. . .+sn . There exists an mรn nonnegative integral matrix
D such that
0 โค D(i, j) โค cij , โi โ [m], โj โ [n],
n
X
D(i, j) = ri , โi โ [m], and
12
Theorem 5: Let I = (P, B) be an incidence structure and let
AI denote the corresponding incidence matrix of dimension
v ร b. Suppose that the following conditions are satisfied.
T
T
โข AI AI โ (AI AI )# = diag(ยต1 , . . . , ยตb ) (mod ch(F)),
where ยตi is a non-zero element of F โi โ {1, 2, . . . , b}.
โข There exists a matrix DI with integer elements of the
same dimension as AI whose entries satisfy
j=1
m
X
i=1
v
X
D(i, j) = sj , โj โ [n]
if and only if for all I โ [m] and J โ [n], we have that
XX
X
X
cij โฅ
sj โ
ri .
(14)
iโI jโJ
jโJ
iโI
/
Proof: Consider a capacity-limited flow-network modelled using a bipartite graph on m + n nodes. The left part
has m nodes denoted as xi , โi โ [m] and the right part has n
nodes denoted as yj , โj โ [n]. For all i, j there is a directed
edge (xi , yj ) with capacity cij . There are two additional nodes
in the flow-network, the source node S โ and terminal node
T โ . There are directed edges (S โ , xi ) with capacity ri for
all i โ [m] and directed edges (yj , T โ ) with capacity sj for
all j โ [n]. Let xI be the set of all nodes in the left part
whose indices are in I and let yJยฏ be the set of all nodes
in the right part whose indices are not in J. Consider a cut
separating nodes in {S โ } โช xI โช yJยฏ from its complement. Let
f โ be the value of the maximum S โ -T โ flow in this network.
Then we must have that for all possible choice of subsets
I โ [m], J โ [n],
X
X
X
ri +
cij +
sj โฅ f โ .
(15)
iโI
/
(i,j):iโI,jโJ
โ
j โJ
/
jโJ
(17)
DI (i, j) = v, and
(18)
DI (i, j) = b.
(19)
j=1
Then the computation capacity of the sum-network constructed
v
. This rate
using AI via the SUM-NET-CONS algorithm is v+b
can be achieved by a linear network code.
Proof: Note that ATI AI โ (ATI AI )# has full rank by
assumption, theorem 2 states that the computation capacity of
the sum-network is at most v/(v + b). We construct a (m, n)
linear network code with m = v, n = v + b using the matrix
DI . Since m = v, each message vector has v components. For
a vector t โ F v , the notation t[l1 : l2 ] for two positive integers
l1 , l2 โ [v] denotes a (l2 โl1 +1) length vector that contains the
components of t with indices in the set {l1 , l1 + 1, . . . , l2 } in
order. We need to specify the global encoding vectors ฯi (X)
only for the bottleneck edges ei , i โ [v] as all the other edges
in the network act as repeaters. The linear network code is
such that the first v components of the vector transmitted along
ei โi โ [v] is
X
ฯi (X)[1 : v] = Xpi +
XBj .
j:AI (i,j)=1
P
In particular, suppose that f =
jโ[n] sj in the flownetwork. Substituting this in eq. (15), we get the condition
that for all possible subsets I โ [m], J โ [n],
XX
X
X
cij โฅ
sj โ
ri .
(16)
iโI jโJ
i=1
b
X
DI (i, j) = 0, if AI (i, j) = 0,
iโI
/
Note that by choosing all possible subsets I, J, we are
considering every possible S โ -T โ cut in the network. Then
by the maxflow-mincut theorem, the set of conditions of the
form of eq. (16) for all I, J are not only necessaryPbut also
sufficient for the existence of a flow of value f โ = jโ[n] sj
in the network.
A feasible flow with this value can be used to arrive at the
matrix D as follows. We set the value of element D(i, j) in
the matrix to be equal to the value of the feasible flow on the
edge (xi , yj ) for all i โ [m], j โ [n]. It is easy to verify that
the matrix D satisfies the required conditions.
Using the existence theorem for nonnegative integral matrices,
we can obtain network codes for sum-networks constructed
from certain incidence structures. The following theorem describes a set of sufficient conditions that, if satisfied by an
incidence structure, allow us to construct a linear network code
that has the same rate as the computation capacity of that sumnetwork. The proof of the theorem is constructive and results
in an explicit network code.
By construction, each tpi โi โ [v] is connected to the source
nodes in {spi0 : i0 6= i}โช{sBj : AI (i, j) = 0} by direct edges.
tpi can then compute the following value from the information
received on the direct edges.
X
X
Xpi +
XBj .
i0 6=i
j:AI (i,j)=0
Adding the above value to ฯi (X)[1 : v] enables tpi to compute
the required sum. In what follows, we focus on terminals of
the form tBj โj โ [b].
Since n = v+b, each vector ฯi (X) โ F n has b components
that havenโt been specified yet. We describe a particular
assignment for the b components on every ฯi (X), i โ [v] using
the matrix DI that enables each tBj โj โ [b] to compute the
sum.
Recall the bipartite flow network constructed in the proof of
theorem 4. The nodes in the left part are denoted as pi โi โ [v]
and the nodes in the right part are denoted as Bj โj โ [b].
There is an edge (pi , Bj ) if and only if AI (i, j) = 1. The flow
on the edge (pi , Bj ) is denoted as f (pi , Bj ) and its value is
determined by DI (i, j), i.e., f (pi , Bj ) := DI (i, j).
By constraints on the row and column sums of DI , we
conclude that the value of the flow through any pi โi โ [v] is b
and the value of the flow through any Bj โj โ [b] is v. Without
IEEE TRANSACTIONS ON INFORMATION THEORY
13
loss of generality, assume that Bj = {p1 , p2 , ยท ยท ยท , p|Bj | }.
We can partition the v components of message vector XBj
into |Bj | parts such that the i-th partition contains f (pi , Bj )
distinct components of XBj . Such a partitioning can be done
for all message vectors XBj , j โ [b]. Then the flow f (pi , Bj )
indicates that the vector ฯi (X)[v+1 : v+b] includes f (pi , Bj )
uncoded components of XBj . Assigning such an interpretation
to every edge in the flow-network is possible as the total
number of components available in each ฯi (X) is b and that
is also equal to the flow through the point pi .
By construction, terminal tBj is connected to all bottleneck
edges in the set {ei : AI (i, j) = 1}. From the assignment
based on the flow, tBj receives f (pi , Bj ) distinct components
of XBj from ฯi (X) for all {i : AI (i, j) = 1}. Since
P
v
i=1 f (pi , Bj ) = v, it can recover all v components of XBj
in a piecewise fashion.
By adding the first v components transmitted on all the
bottleneck edges that are connected to tBj , it can recover
X
ฯi (X)[1 : v]
1
2
=
Xpi +
i:AI (i,j)=1
X
=
X
Xpi +
sE
sB
sA
e1
sD
e2
e3
tB
tE
BjT Bl XBl .
Bl โhBj i
Bl โhBj i\Bj
By the flow-based assignment, each tBj obtains the value of
XBj in a piecewise manner. It can then carry out the following
X
ฯi (X)[1 : v] โ ยตj XBj
Xpi + (ยตj + 1)XBj +
=
pโBj
Xp +
X
XBl โ ยตj XBj ,
Bl โhBj i\Bj
i:AI (i,j)=1
X
tC
tD
(b)
A
XA [1 : 2]
XA [3 : 4]
1
XBl .
Bl โhBj i
The messages not present in this partial sum, i.e., {Xp : p โ
/
Bj } โช {XB : B โ
/ hBj i} are available at tBj through direct
edges by construction. Hence, terminals that correspond to a
column of AI are also able to compute the required sum.
We illustrate the linear network code proposed above by
means of the following example.
Example 7: Consider the normal sum-network obtained
from the undirected simple graph G shown in Figure 5(a).
A part of the sum-network is shown in Figure 5(b). The 4 ร 5
incidence matrix AG satisfies the condition of theorem 4 and
therefore has an associated matrix DG with row-sum as 5 and
column-sum 4 as shown below. The rows and columns of AG
are arranged in increasing numeric and alphabetical order.
๏ฃฎ
๏ฃน
๏ฃฎ
๏ฃน
1 0 0 1 1
2 0 0 2 1
๏ฃฏ1 1 0 0 0๏ฃบ
๏ฃฏ2 3 0 0 0๏ฃบ
๏ฃบ
๏ฃฏ
๏ฃบ
AG = ๏ฃฏ
๏ฃฐ0 1 1 0 1๏ฃป , DG = ๏ฃฐ0 1 1 0 3๏ฃป .
0 0 1 1 0
0 0 3 2 0
B
2
XD [1 : 2]
C
3
XE [1]
D
4
E
i:AI (i,j)=1
X
e4
XBl ,
Because of the condition that ATI AI โ (ATI AI )# =
diag(ยต1 , ยต2 , . . . , ยตb ), one can verify that
X
X
BjT Bl XBl = (ยตj + 1)XBj +
XBl .
=
sC
Bl โhBj i
i:AI (i,j)=1
X
3
(a)
i:AI (i,j)=1 l:AI (i,l)=1
X
C
B
tA
X
4
E
A
i:AI (i,j)=1
X
D
(c)
Fig. 5. (a) Undirected graph considered in Example 7. (b) Part of the
corresponding normal sum-network constructed for the undirected graph in
(a). The full normal sum-network has nine nodes each in the source set
S and the terminal set T . However, for clarity, only the five sources and
terminals that correspond to the columns of the incidence matrix of the graph
are shown. Also, the direct edges constructed in Step 4 of the construction
procedure are not shown. All edges are unit-capacity and point downward.
The edges with the arrowheads are the bottleneck edges constructed in step 2
of the construction procedure. (c) Bipartite flow network as constructed in the
proof of theorem 4 for this sum-network. The message values corresponding
to the flow on the solid lines are also shown.
Using the matrix DG , one can construct a structured linear
network code with rate = v/(v + b) = 4/9 as shown in Table
II. One can check that it enables all the terminals to compute
the required sum. The flow-network corresponding to DG is
shown in Figure 5(c), and the messages corresponding to the
flow on the solid edges are shown alongside the respective
edge.
We can also consider the transposed sum-network for the
same graph G. Corollary 1 gives an upper bound on the
computation capacity that depends on F. If F = GF (2),
IEEE TRANSACTIONS ON INFORMATION THEORY
14
then the subset of points P 0 = {2, 4} and the upper bound is
4/6. Note that theorem 5 is not applicable here as the matrix
ATG AG โ (ATG AG )# does not have all its diagonal elements
as non-zero over GF (2). Proposition 3 gives a condition for
the existence of a network code for transposed sum-networks
obtained using irregular graphs. We apply that condition to
the transposed sum-network of the graph G considered here
in Example 8.
In the following proposition we show that certain infinite
families of incidence structures satisfy the requirements stated
in theorem 5. In particular, the incidence structures considered
in Corollaries 1, 2 and 4 satisfy the conditions and hence the
computation capacity of the associated sum-networks can be
calculated.
Proposition 2: The following incidence structures and their
transposes satisfy condition (ii) in theorem 5, i.e., if their
incidence matrix of dimension v ร b is denoted by AI , there
exists a corresponding non-negative integral matrix DI that
satisfies the conditions in equations (17) โ (19).
1) Incidence structures derived from a regular graph or a
biregular bipartite graph.
2) t-(v, k, ฮป) designs with ฮป = 1.
3) The higher incidence structure of a t-(n, t + 1, ฮป) design
with ฮป 6= 1 obtained using the procedure described in
corollary 4.
Proof: The existence of DI with row-sums as v and
column-sums b is the same as the existence of DIT with rowsums as b and column-sums v. Thus, it suffices to argue for
DI . To check the validity of the condition we first choose the
bounds on the elements of the matrix DI . We set ri = b and
sj = v for all i โ [v], j โ [b] and
0,
if AI (i, j) = 0,
cij =
โ, if AI (i, j) = 1.
By this choice the condition in inequality (14) is trivially
satisfied whenever I, J are chosen such that there is a point
in I which is incident to some block in J, i.e., there exist
i โ I, j โ J such that AI (i, j) = 1. Hence we restrict our
attention to choices of I and J such that none of the points
in I are incident to any block in J. Under this restriction, the
L.H.S. of inequality (14) is 0 and the condition is equivalent
to (v โ |I|)b โฅ |J|v. We will assume that
โI โ [v], J โ [b] such that
(20)
AI (i, j) = 0 โi โ I, j โ J, and (v โ |I|)b < |J|v,
and show that it leads to a contradiction for each of the three
incidence structures considered.
If I corresponds to a d-regular simple graph, then b = dv/2.
Consider the point-block incidence matrix AI , which is a
(0, 1)-matrix of size v ร b. For the chosen I in eq. (20), we
look at the submatrix AI [I, [b]] of size |I| ร b that consists of
the rows of AI indexed by the points in I and all the columns.
Let l1 be the number of columns with a single 1 in AI [I, [b]]
and l2 be the number of columns with two 1s in AI [I, [b]].
By counting the total number of 1s in AI [I, [b]] in two ways,
we get that
d|I|
.
d|I| = l1 + 2l2 โค 2(l1 + l2 ) =โ l1 + l2 โฅ
2
Since the number of edges incident to at least one point in I
is l1 + l2 , any subset J of the edges that has no incidence with
any point in I satisfies |J| โค b โ d|I|/2. Using these in eq.
(20) we get that
dv d|I|
dv
<
โ
v,
(v โ |I|)b < |J|v =โ (v โ |I|)
2
2
2
which is a contradiction.
Now suppose that I corresponds to a biregular bipartite
graph, with L vertices having degree dL in the left part and R
vertices having degree dR in the right part. Then b = LdL =
RdR . Consider a subset IL โช IR of its vertices. Let EL (resp.
ER ) be the set of edges which are incident to some vertex in IL
(resp. IR ) but not incident to any vertex in IR (resp. IL ). The
number of edges that are not incident to any vertex in IL โช IR
is equal to (Lโ|IL |)dL โ|ER | = (Rโ|IR |)dR โ|EL |. Suppose
there is a choice of I in eq. (20) is such that I = IL โช IR for
some IL , IR . Then we have that
(v โ |I|)b < |J|v,
LdL + RdR
2
(L โ |IL |)dL โ ER + (R โ |IR |)dR โ |EL |
(L + R),
<
2
|Il |dL + |IR |dR + |EL | + |ER |
|IL | + |IR |
=โ
,
<
LdL + RdR
L+R
=โ (L+R)(|EL |+|ER |) < (LโR)|IL |dL +(RโL)|IR |dR ,
=โ (L + R โ (|IL | + |IR |))
=โ (L + R)(|EL | + |ER |) < (L โ R)(|EL | โ |ER |).
If L > R or |EL | > |ER |, then we have a contradiction. That
leaves the case when L < R and |EL | < |ER |, which implies
(L + R)(|EL | + |ER |) < (R โ L)(|ER | โ |EL |) and that is
also a contradiction.
Next, consider a t-(v, k, 1) design with b blocks such that
repetition degree of each point is ฯ and we have that bk = vฯ.
With the I of eq. (20), we employ a similar procedure as
for the case of the d-regular graph. We choose the submatrix
AI [I, [b]] of size |I| ร b that corresponds to the rows indexed
by the points in I and let li , โi โ [k] denote the number of
columns with exactly i 1s in AI [I, [b]]. We count the total
number of 1s in AI [I, [b]] in two ways, yielding
ฯ|I| = l1 + 2l2 + ยท ยท ยท + (k โ 1)lkโ1 + klk โค k
=โ
k
X
i=1
li โฅ
k
X
li ,
i=1
ฯ|I|
b|I|
=
.
k
v
The number of
that are incident to at least one point in
Pblocks
k
I is equal to i=1 li . Hence any subset J of blocks that has
no incidence with any point in I satisfies |J| โค b โ |I|b/v.
Using this in eq. (20) we get that
|I|b
(v โ |I|)b < |J|v =โ (v โ |I|)b < b โ
v,
v
which is a contradiction.
If I = (P, B) is the higher incidence structure obtained
from a t-(n, t + 1, ฮป) design
as describedin corollary 4, then
ฮป n
we have that |P| = nt and |B| = t+1
t . By definition of t
IEEE TRANSACTIONS ON INFORMATION THEORY
15
TABLE II
T HE FUNCTION VALUES TRANSMITTED ACROSS e1 , e2 , e3 , e4 IN F IGURE 5( B ) FOR A NETWORK CODE WITH RATE = 4/9. E ACH MESSAGE
XA , XB , XC , XD , XE IS A VECTOR WITH 4 COMPONENTS , AND ฯ1 (X), ฯ2 (X), ฯ3 (X), ฯ4 (X) ARE VECTORS WITH 9 COMPONENTS EACH . T HE
NUMBER INSIDE SQUARE BRACKETS ADJOINING A VECTOR INDICATES A PARTICULAR COMPONENT OF THE VECTOR .
Component
1 to 4
5
6
7
8
9
ฯ1 (X)
X1 + XA + XD + XE
XA [1]
XA [2]
XD [1]
XD [2]
XE [1]
ฯ2 (X)
X2 + XA + XB
XA [3]
XA [4]
XB [1]
XB [2]
XB [3]
for the original design, we have that each of the points in P
are incident
to exactly ฮป blocks. Also, each block in B consists
of t+1
= t + 1 points. For the submatrix AI [I, [b]] whose
t
rows correspond to the points in I from Condition 20, we let
li , โi โ [t+1] denote the number of columns that have exactly
i 1s in them. By counting the total number of 1s in AI [I, [b]]
in two ways we get that
t+1
X
t+1
X
t+1
X
ฮป|I|
.
ฮป|I| =
ili โค (t + 1)
li =โ
li โฅ
t+1
i=1
i=1
i=1
The
number of blocks incident to at least one point in I
Ptotal
t+1
is i=1 li . Then the number of blocks |J| that are not incident
to any point in I satisfy |J| โค |B| โ |I|ฮป/(t + 1). Using these
we get that
(v โ |I|)b < |J|v,
n
ฮป
n
n
n
ฮป
<
โ |I|
,
=โ
โ |I|
t+1 t
t+1
t
t
t
which is a contradiction. Thus in all the three kinds of
incidence structures considered, we have shown that they
admit the existence of the associated matrix DI under the
stated qualifying conditions. This enables us to apply theorem
5 and obtain a lower bound on the computation capacity of
these sum-networks.
For an undirected graph I = (P, B) that is not regular,
proposition 2 is not applicable. Theorem 5 describes a sufficient condition for the existence of a linear network code
that achieves the upper bound on the computation capacity of
normal sum-networks constructed from undirected graphs that
are not necessarily regular. The upper bound on the capacity
of the transposed sum-network constructed using the incidence
|B|
matrix ATI however can be different from |B|+|P|
depending
on the finite field F (cf. corollary 1) and theorem 5 needs to be
modified to be applicable in that case. The following example
illustrates this.
Example 8: Consider the transposed sum-network for the
irregular graph G described in Example 7. Corollary 1 gives
an upper bound of 4/6 on the computation capacity when F =
GF (2), as for that case P 0 = {2, 4} and B 0 = {A, B, C, D}.
We show the submatrix ATG [B 0 , P 0 ] in the equation below and
also an associated matrix DG whose support is the same as that
of ATG [B 0 , P 0 ] and whose row-sum = 6 โ 4 = 2 and column-
ฯ3 (X)
X3 + XB + XC + XE
XB [4]
XC [1]
XE [2]
XE [3]
XE [4]
ฯ4 (X)
X4 + XC + XD
XC [2]
XC [3]
XC [4]
XD [3]
XD [4]
sum = 4. The rows and columns are arranged in increasing
alphabetical and numeric order.
๏ฃฎ
๏ฃน
๏ฃฎ
๏ฃน
2 0
1 0
๏ฃฏ2 0๏ฃบ
๏ฃฏ1 0๏ฃบ
๏ฃฏ
๏ฃบ
๏ฃบ
ATG [B 0 , P 0 ] = ๏ฃฏ
๏ฃฐ0 1๏ฃป , DG = ๏ฃฐ0 2๏ฃป .
0 2
0 1
Using DG we can construct a rate-4/6 linear network code,
shown in Table III, that achieves the computation capacity
for F = GF (2) of the transposed sum-network constructed
using the irregular graph G shown in Figure 5(a). In particular,
terminals t1 , t3 donโt need any information other than the
partial sums obtained over their respective bottleneck edges
to compute the sum. Terminals t2 , t4 need the value X2 , X4
respectively, and that is transmitted in a piecewise fashion
according to the matrix DG over the bottleneck edges.
For an undirected graph I = (P, B) that is not regular,
let P 0 , B 0 be the set of points and edges as chosen in the
statement of corollary 1. We describe a condition on the
submatrix ATI [B 0 , P 0 ] which consists of the rows and columns
of ATI corresponding to the blocks and points in the sets B 0 , P 0
respectively. This condition allows us to construct a capacityachieving linear network code for the transposed sum-network.
Proposition 3: For an undirected graph I = (P, B), let
|P 0 | = v 0 , |B 0 | = b0 , where P 0 , B 0 are subsets of points and
blocks as defined in corollary 1 and let ATI [B 0 , P 0 ](i, j) indicate an element of the submatrix for indices i โ [b0 ], j โ [v 0 ].
Suppose there is a matrix DI of dimension b0 ร v 0 such that
0
b
X
i=1
DI (i, j) = 0, if ATI [B 0 , P 0 ](i, j) = 0,
DI (i, j) = b0 , for all j โ [v 0 ], and
0
v
X
j=1
DI (i, j) = v 0 , for all i โ [b0 ].
0
b
Then there is linear network code of rate b0 +v
0 that allows each
terminal in the transposed sum-network constructed using I
to compute the required sum.
Proof: We describe a rate-b0 /(b0 + v 0 ) network code that
enables each terminal to compute the sum. Then by corollary
1 we know that this is a capacity-achieving code. Since this
is a transposed sum-network, the bottleneck edges in the sumnetwork correspond to the blocks in the undirected graph I.
IEEE TRANSACTIONS ON INFORMATION THEORY
16
TABLE III
T HE FUNCTION VALUES TRANSMITTED ACROSS THE BOTTLENECK EDGES OF THE TRANSPOSED SUM - NETWORK CORRESPONDING TO THE GRAPH
SHOWN IN F IGURE 5( A ) FOR A RATE -4/6 NETWORK OVER GF (2). E ACH MESSAGE X2 , X4 IS A VECTOR WITH 4 COMPONENTS , AND
ฯA (X), ฯB (X), ฯC (X), ฯD (X), ฯE (X) ARE VECTORS WITH 6 COMPONENTS EACH . T HE NUMBER INSIDE SQUARE BRACKETS ADJOINING A VECTOR
INDICATES A PARTICULAR COMPONENT OF THE VECTOR . A DASH INDICATES THAT THE VALUE TRANSMITTED ON THAT COMPONENT IS NOT USED IN
DECODING BY ANY TERMINAL .
Component
1 to 4
5
6
ฯA (X)
X1 + X2 + XA
X2 [1]
X2 [2]
ฯB (X)
X2 + X3 + XB
X2 [3]
X2 [4]
The first b0 components transmitted over each bottleneck is
obtained by the following equation.
X
ฯi (X)[1 : b0 ] = XBi +
Xpj , for all Bi โ B.
j:pj โBi
We show that this partial sum satisfies all the terminals in
the set {tBi : Bi โ B} โช {tpj : pj โ
/ P 0 }. Terminals in
{tBi : Bi โ B} can recover the sum as all messages not
present in the partial sum are available to tBi through direct
edges. For terminals in the set {tp : p โ
/ P 0 }, they carry out
the following operation as a part of their decoding procedure.
๏ฃซ
๏ฃถ
X
X
X
๏ฃญXBi +
ฯi (X)[1 : b0 ] =
Xpj ๏ฃธ (21)
i:Bi โhpi
=
X
i:Bi โhpi
i:Bi โhpi
XBi +
X
ppTj Xpj
j:pj โBi
+ deg(p)Xp .
(22)
j:{p,pj }โB
For pj 6= p, we have that ppTj = 1 if {p, pj } โ B. Also
by condition on the points that are not in P 0 , we have that
deg(p) โก 1 (mod ch(F)), and hence all the coefficients in
the above partial sum are 1. The messages in the set {XB :
B โ
/ hpi} โช {Xpj : {pj , p} โ
/ B} are available to tp through
direct edges and hence it can recover the sum.
The remaining v 0 components available on the bottleneck
edges {ei : Bi โ B0 } are used to transmit information that
enable the terminals in the set {tp : p โ P 0 } to compute the
sum. Specifically, we construct a flow on a bipartite graph
whose one part corresponds to the points in P 0 and the other
part corresponds to the blocks in B 0 , with incidence being
determined by the submatrix ATI [B 0 , P 0 ]. Since there exists
a matrix DI with specified row and column sums, we can
use it to construct a flow on the bipartite graph such that the
messages in the set {Xpi : pi โ P 0 } are transmitted in a
piecewise fashion over the bottleneck edges {ej : Bj โ B 0 }
in a manner similar to the proof of theorem 5. Arguing in the
same way, one can show that the network code based on the
flow solution allows each tp โp โ P 0 to obtain the value of
Xp from the information transmitted over the bottleneck edges
in the set {ei : Bi โ hpi}. Terminal tp computes the sum in
eq. (21) as a part of its decoding procedure. Since deg(p) 6โก 1
(mod ch(F)), every term in the RHS of eq. (22) except Xp
has its coefficient as 1. But since tp knows the value of Xp
it can subtract a multiple of it and recover the relevant partial
sum. The messages not present in this partial sum are available
to tp through direct edges and hence it can also compute the
value of the sum.
ฯC (X)
X3 + X4 + XC
X4 [1]
X4 [2]
ฯD (X)
X1 + X4 + XD
X4 [3]
X4 [4]
ฯE (X)
X1 + X3 + XE
โ
โ
Proposition 2 describes families of incidence structures for
which the sum-networks constructed admit capacity-achieving
linear network codes. The upper bound on the computation
capacity of these sum-networks is obtained from Corollaries 1,
2 and 4. We now describe a rate-1 linear network code for the
sum-networks when their corresponding incidence structures
do not satisfy the qualifying conditions for the upper bounds.
By theorem 1, the computation capacity of any sum-network
obtained using the SUM-NET-CONS algorithm is at most 1.
Proposition 4: For an incidence structure I = (P, B) and
a finite field F, there exists a rate-1 linear network code that
satisfies the following listed sum-networks. If
โข I is a 2-(v, k, 1) design:
โ the normal sum-network with ch(F) | k โ 1,
โ the transpose sum-network with ch(F) | vโk
kโ1 ,
โข I is a t-(v, t + 1, ฮป) design:
โ the normal sum-network obtained using the higher
incidence matrix with ch(F) | t,
โ the transpose sum-network obtained using the higher
incidence matrix with ch(F) | ฮป โ 1.
Proof: Suppose we construct a sum-network using the
SUM-NET-CONS algorithm on a (0, 1)-matrix A of dimension r ร c. If AT A = (AT A)# , the following rate-1 linear
network code
X
ฯi (X) = Xpi +
XBj , โ i โ [r],
j:Bj โhpi i
satisfies every terminal in the sum-network in the following
manner. A terminal tpi , โi โ [r] receives all the messages
not present in the partial sum transmitted along ei through
direct edges, and hence it can compute the sum. A terminal
tB , โB โ B can carry out the following operation.
X
X X
X
ฯi (X)=
Xpi +
XBj
i:pi โBj
pi โB
=
X
pi โB
pi โB Bj โhpi i
Xpi +
X
BlT Bj XBl .
l:Bl โhBj i
Since AT A P
= (AT A)# , all the coefficients in the above sum
are 1 and
i:pi โBj ฯi (X) is equal to the sum of all the
messages in the set {Xpi : pi โ Bj } โช {XB : B โ hBj i}.
All the messages that are not present in this set are available
to tBj through direct edges.
Such a rate-1 linear network code gives us our proposition in
vโ1
the following manner. Let AI be the v ร kโ1
incidence matrix
0
for a 2-(v, k, 1) design and let AI be the higher incidence
IEEE TRANSACTIONS ON INFORMATION THEORY
17
matrix as defined in corollary 2 for a t-(v, t + 1, ฮป) design
with ฮป 6= 1. Then, we have (from proofs of Corollaries 2, 4)
S6
S14
S10
ATI AI โ (ATI AI )# = (k โ 1)I,
vโk
AI ATI โ (AI ATI )# =
I,
kโ1
0
0
AIT A0I โ (AIT A0I )# = tI,
a
b
c
0
0
A0I AIT โ (A0I AIT )# = (ฮป โ 1)I.
Thus, whenever any of the above matrices is a zero matrix,
we have a scalar linear network code that achieves the computation capacity of the associated sum-network.
VII. D ISCUSSION AND COMPARISON WITH PRIOR WORK
The discussion in Sections V and VI establishes the computation capacity for sum-networks derived from several classes
of incidence structures. We now discuss the broader implications of these results by appealing to existence results for
these incidence structures. BIBDs have been the subject of
much investigation in the literature on combinatorial designs.
In particular, the following two theorems are well-known.
Theorem 6: [21, Theorem 6.17] There exists a (v, 3, 1)BIBD (also known as a Steiner triple system) if and only if
v โก 1, 3 (mod 6); v โฅ 7.
Theorem 7: [21, Theorem 7.31] There exists a (v, 4, 1)BIBD if and only if v โก 1, 4 (mod 12); v โฅ 13.
In particular, these results show that there are an infinite
family of Steiner triple systems and BIBDs with block size
4 and ฮป = 1. Since k = 3 for any Steiner triple system,
we can demonstrate the existence of sum-networks whose
computation capacity is greatly affected by the choice of the
finite field F used for communication.
Proposition 5: Consider the normal sum-network constructed using a 2-(v, 3, 1) design. If ch(F) = 2, then the
computation capacity of the sum-network is 1. For odd ch(F),
6
the computation capacity is 5+v
. For the normal sum-network
constructed using a (v, 4, 1)-BIBD, the computation capacity
12
is 1 if ch(F) = 3 and 11+v
otherwise.
Proof: The number of blocks in a 2-(v, 3, 1) design is
equal to v(vโ1)/6. From corollary 2, if ch(F) is odd, then the
computation capacity of the sum-network constructed using a
6
v
Steiner triple system is at most v+v(vโ1)/6
= 5+v
. Moreover
by proposition 2, we can construct a linear network code with
rate equal to the upper bound. On the other hand, if ch(F) = 2,
then the computation capacity of the same sum-network is 1
by proposition 4.
The number of blocks in a 2-(v, 4, 1) design is v(v โ 1)/12.
We can recover the result for the computation capacity of a
normal sum-network constructed using it in a manner similar
to the previous case.
Thus, this result shows that for the same network, computing
the sum over even characteristic has capacity 1, while the capacity goes to zero as O(1/v) for odd characteristic. Moreover,
this dichotomy is not unique to the prime number 2. Similar
results hold for sum-networks derived from higher incidence
structures (cf. corollary 4).
Fig. 6. The schematic shown represents an undirected graph with three
components: S6 , S14 and S10 . St denotes the star graph on t + 1 vertices,
with only one vertex having degree t while the rest have degree 1. The
vertices with the maximum degree in the three star graphs are a, b, c
respectively. In addition, a is connected to b and b is connected to c, such
that deg(a) = 7, deg(b) = 16, deg(c) = 11.
Theorem 8: [34] For two integers t, v such that v โฅ t+1 >
0 and v โก t (mod (t + 1)!2t+1 ), a t-(v, t + 1, (t + 1)!2t+1 )
design with no repeated blocks exists.
The number of blocks in a t-(v, t + 1, (t + 1)!2t+1 ) design
2t+1
. We consider the normal
can be evaluated to be vt (t+1)!
t+1
sum-network obtained using the higher incidence matrix of
this t-design. If ch(F) - t, then by corollary 4 and proposition
2, we have that the computation capacity of this sum-network
is
v
1
t
=
.
2
v
v (t+1)!2t+1
1 + t! (t + 1)!2tโ1
+
t
t
t+1
On the other hand, if ch(F) is a divisor of t, then by theorem 1
and proposition 4 we have that the computation capacity of the
normal sum-network constructed using the higher incidence
matrix is 1. Thus for the same sum-network, computing the
sum over a field whose characteristic divides the parameter t
can be done at rate = 1. However, if the field characteristic
does not divide t, zero-error computation ofthe sumcan only
โt2
be done at a rate which goes to zero as O et
.
Theorem 6 describes an infinite family of BIBDs with k = 3
and ฮป = 1. There are further existence results for BIBDs with
ฮป = 1 and k 6= 3. In particular, for ฮป = 1, k โค 9 there
exist BIBDs with value of v as given in Table 3.3 in [35,
Section II.3.1]. As an example, if k = 5, then there exists a 2(v, 5, 1) design whenever v โก 1, 5 (mod 2)0. For any choice
of a BIBD from this infinite family, we can construct a corresponding normal sum-network, whose computation capacity
for a particular finite field can be found using corollary 2 and
proposition 2. Even though theorem 8 states the existence of
t-designs for v, t that satisfy the qualifying conditions, explicit
constructions of such t-designs with t โฅ 6 are very rare.
For a transposed sum-network obtained from an undirected
graph that is not regular, the computation capacity can show
a more involved dependence on the finite field alphabet as the
following example demonstrates.
Example 9: Consider the transposed sum-network obtained
by applying the SUM-NET-CONS algorithm on the undirected
graph I shown in Figure 6. Corollary 1 gives us an upper
bound on the computation capacity of the transposed sumnetwork based on the finite field alphabet F. The upper bound
for three different choices of F is as follows.
IEEE TRANSACTIONS ON INFORMATION THEORY
F = GF (2): Then P 0 = {b}, so the upper bound is
16/(16 + 1) = 16/17.
0
โข F = GF (3): Then P = {c}, so the upper bound is
11/(11 + 1) = 11/12.
0
โข F = GF (5): Then P = {a}, so the upper bound is
7/(7 + 1) = 7/8.
We use proposition 3 to check if we can construct a linear
network code in each case that has the same rate as the
respective upper bound. To do that, we focus on the appropriate submatrix of AI for each case and see if it satisfies
the required condition on row and column sums. The rows of
AI corresponding to the vertices a, b, c (in order) are shown
below.
๏ฃฎ
๏ฃน
16 1
0 ยทยทยท 0
๏ฃฐ06 1 114 1 010 ๏ฃป ,
0 ยทยทยท 0
1 110
โข
where 1, 0 indicate all-one and all-zero row vectors of size
specified by their subscripts. Using this, one can verify that
the appropriate submatrix for each of the three choices of F
satisfies the conditions of proposition 3 and hence we can
construct a capacity-achieving linear network code in each
case.
Thus, as the previous example demonstrates, the computation capacity of a particular sum-network need not take just
one of two possible values, and can have a range of different
values based on the finite field chosen. We can generalize the
example to obtain sum-networks that have arbitrary different
possible values for their computation capacity.
Our constructed sum-networks have a unit maximum flow
between any source and any terminal. We can modify our
construction so that each edge in the network has a capacity
of ฮฑ > 1. Specifically, the following result can be shown.
Proposition 6: Let N denote the sum-network obtained by
applying the SUM-NET-CONS algorithm on a matrix A of
dimension r ร c. For an integer ฮฑ > 1, let Nฮฑ denote the
sum-network obtained by modifying the SUM-NET-CONS algorithm such that Nฮฑ has the same structure as N but each
edge eฮฑ in Nฮฑ has cap(eฮฑ ) = ฮฑ > 1. Then, if A satisfies the
qualifying conditions in Theorems 2 and 5, the computation
ฮฑr
.
capacity of Nฮฑ is r+c
Proof: Since A satisfies the conditions in theorem 5, there
exists a (m, n) vector linear network code with m = r, n =
r + c. For every unit-capacity edge in N , we have ฮฑ unitcapacity edges between the same tail and head in Nฮฑ . At the
tail of every edge in Nฮฑ , we can apply the same network
code except now we have ฮฑ distinct edges on which we can
transmit the encoded value. Thus we need transmit only r+c
ฮฑ
symbols on each of those edges. If r+c
ฮฑ is not an integer, one
can appropriately multiply both m, n with a constant. This
ฮฑr
. Since A also satisfies
modified network code has rate = r+c
the conditions in theorem 2, we have that an upper bound
on the computation capacity of N is r/(r + c). Applying the
same argument on Nฮฑ , we get that an upper bound on the
ฮฑr
computation capacity of Nฮฑ is r+c
. This matches the rate of
the modified vector linear network code described above.
This result can be interpreted as follows. Consider the
class of sum-networks where the maximum flow between any
18
source-terminal pair is at least ฮฑ. Our results indicate, that for
any ฮฑ, we can always demonstrate the existence of a sumnetwork, where the computation capacity is strictly smaller
than 1. Once again, this indicates the crucial role of the
network topology in function computation.
A. Comparison with prior work
The work of Rai and Das [28] is closest in spirit to our
work. In [28], the authors gave a construction procedure to
obtain a sum-network with computation capacity equal to
p/q, where p, q are any two co-prime natural numbers. The
procedure involved first constructing a sum-network whose
capacity was 1/q. Each edge in this sum-network had unitcapacity. By inflating the capacity of each edge in the sumnetwork to p > 1, the modified sum-network was shown to
have computation capacity as p/q.
Our work is a significant generalization of their work.
In particular, their sum-network with capacity 1/q can be
obtained by applying the SUM-NET-CONS algorithm to the
incidence matrix of a complete graph on 2q โ 1 vertices [29].
We provide a systematic procedure for constructing these sumnetworks for much larger classes of incidence structures.
In [28], the authors also posed the question if smaller sumnetworks (with lesser sources and terminals) with capacity as
p/q existed. Using the procedure described in this paper, we
can answer that question in the affirmative.
Example 10: The normal sum-network for the undirected
graph in Figure 5(a) has computation capacity = 4/9 and
has nine sources and terminals. To obtain a sum-network with
the same computation capacity using the method described in
[28] would involve constructing the normal sum-network for a
complete graph on 17 vertices, and such a sum-network would
have 153 source nodes and terminal nodes each.
In [20], it was shown by a counter-example that for the class
of sum-networks with |S| = |T | = 3, a maximum flow of 1
between each source-terminal pair was not enough to guarantee solvability (i.e., no network code of rate 1 exists for the
counterexample). It can be observed that their counter-example
is the sum-network shown in Figure 2(a). Our characterization
of computation capacity for a family of sum-networks provides
significantly more general impossibility results in a similar
vein. In particular, note that for the ฮฑ-capacity edge version
of a sum-network, the maximum flow between any sourceterminal pair is at least ฮฑ. Then suppose we consider the class
of sum-networks with |S| = |T | = x = ฮฒ(ฮฒ + 1)/2 for some
ฮฒ โ N. Consider a complete graph Kฮฒ = (V, E) on ฮฒ vertices;
then |V | + |E| = x. Consider the sum-network obtained by
applying the procedure on Kฮฒ , with each edge added having
capacity as ฮฑ. Then the computation capacity of this sumnetwork is ฮฑฮฒ/x, which is less than 1 if ฮฑ < (ฮฒ + 1)/2. This
implies that a max-flow of (ฮฒ + 1)/2 between each sourceterminal pair is a necessary condition for ensuring all sumnetworks with |S| = |T | = x are solvable. When x cannot
be written as ฮฒ(ฮฒ + 1)/2 for some ฮฒ, a similar argument can
be made by finding an undirected graph G = (V, E) (whose
incidence matrix AG satisfies the condition in theorem 5) such
that |V | is minimal and |V | + |E| = x.
IEEE TRANSACTIONS ON INFORMATION THEORY
VIII. C ONCLUSIONS AND F UTURE W ORK
Sum-networks are a large class of function computation
problems over directed acyclic networks. The notion of computation capacity is central in function computation problems,
and various counterexamples and problem instances have been
used by different authors to obtain a better understanding
of solvability and computation capacity of general networks.
We provide an algorithm to systematically construct sumnetwork instances using combinatorial objects called incidence
structures. We propose novel upper bounds on their computation capacity, and in most cases, give matching achievable
schemes that leverage results on the existence of non-negative
integer matrices with prescribed row and column sums. We
demonstrate that the dependence of computation capacity on
the underlying field characteristic can be rather strong.
There are several opportunities for future work. Our proposed linear network codes for the constructed sum-networks
require the corresponding incidence structures to have a specific property. In particular, our techniques only work in the
case when AT A โ (AT A)# is a diagonal matrix. It would be
interesting to find capacity achieving network codes in cases
when AT A โ (AT A)# is not diagonal. More generally, it
would be interesting to obtain achievability schemes and upper
bounds for sum-networks with more general topologies.
R EFERENCES
[1] J. Korner and K. Marton, โHow to encode the modulo-2 sum of binary
sources,โ IEEE Trans. on Info. Th., vol. 25, no. 2, pp. 219โ221, 1979.
[2] A. Orlitsky and J. Roche, โCoding for computing,โ IEEE Trans. on Info.
Th., vol. 47, no. 3, pp. 903โ917, Mar 2001.
[3] V. Doshi, D. Shah, M. Medard, and M. Effros, โFunctional compression
through graph coloring,โ IEEE Trans. on Info. Th., vol. 56, no. 8, pp.
3901โ3917, Aug 2010.
[4] R. Ahlswede, N. Cai, S.-Y. Li, and R. W. Yeung, โNetwork Information
Flow,โ IEEE Trans. on Info. Th., vol. 46, no. 4, pp. 1204โ1216, 2000.
[5] R. Koetter and M. Medard, โAn algebraic approach to network coding,โ
IEEE/ACM Transactions on Networking, vol. 11, no. 5, pp. 782โ795,
Oct 2003.
[6] S. Y. R. Li, R. W. Yeung, and N. Cai, โLinear network coding,โ IEEE
Trans. on Info. Th., vol. 49, no. 2, pp. 371โ381, Feb 2003.
[7] R. Dougherty, C. Freiling, and K. Zeger, โInsufficiency of linear coding
in network information flow,โ IEEE Trans. on Info. Th., vol. 51, no. 8,
pp. 2745โ2759, Aug. 2005.
[8] J. Cannons, R. Dougherty, C. Freiling, and K. Zeger, โNetwork routing
capacity,โ IEEE Trans. on Info. Th., vol. 52, no. 3, pp. 777โ788, Mar.
2006.
[9] R. Dougherty, C. Freiling, and K. Zeger, โUnachievability of network
coding capacity,โ IEEE Trans. on Info. Th., vol. 52, no. 6, pp. 2365โ
2372, June 2006.
[10] S. Jaggi, P. Sanders, P. A. Chou, M. Effros, S. Egner, K. Jain, and L. M.
G. M. Tolhuizen, โPolynomial time algorithms for multicast network
code construction,โ IEEE Trans. on Info. Th., vol. 51, no. 6, pp. 1973โ
1982, June 2005.
[11] S. Huang and A. Ramamoorthy, โAn achievable region for the double
unicast problem based on a minimum cut analysis,โ IEEE Trans. on
Comm., vol. 61, no. 7, pp. 2890โ2899, 2013.
[12] โโ, โOn the multiple unicast capacity of 3-source, 3-terminal directed
acyclic networks,โ IEEE/ACM Trans. on Networking, vol. 22, no.1, pp.
285โ299, 2014.
[13] A. R. Lehman and E. Lehman, โComplexity classification of network
information flow problems,โ in Proceedings of the Fifteenth Annual
ACM-SIAM Symposium on Discrete Algorithms, Jan 2004, pp. 142โ150.
[14] S. Kamath, D. N. C. Tse, and C. C. Wang, โTwo-unicast is hard,โ in
IEEE Intl. Symposium on Info. Th., June 2014, pp. 2147โ2151.
[15] R. Appuswamy, M. Franceschetti, N. Karamchandani, and K. Zeger,
โNetwork coding for computing: Cut-set bounds,โ IEEE Trans. on Info.
Th., vol. 57, no. 2, pp. 1015โ1030, Feb 2011.
19
[16] C. Huang, Z. Tan, and S. Yang, โUpper bound on function computation
in directed acyclic networks,โ in IEEE Info. Th. Workshop, April 2015,
pp. 1โ5.
[17] R. Appuswamy, M. Franceschetti, N. Karamchandani, and K. Zeger,
โLinear codes, target function classes, and network computing capacity,โ
IEEE Trans. on Info. Th., vol. 59, no. 9, pp. 5741โ5753, Sept 2013.
[18] A. Ramamoorthy, โCommunicating the sum of sources over a network,โ
in IEEE Intl. Symposium on Info. Th., July 2008, pp. 1646โ1650.
[19] B. K. Rai and B. K. Dey, โOn network coding for sum-networks,โ IEEE
Trans. on Info. Th., vol. 58, no. 1, pp. 50 โ63, 2012.
[20] A. Ramamoorthy and M. Langberg, โCommunicating the sum of sources
over a network,โ IEEE J. Select. Areas Comm., vol. 31, no. 4, pp. 655โ
665, 2013.
[21] D. R. Stinson, Combinatorial Designs: Construction and Analysis.
Springer, 2003.
[22] O. Olmez and A. Ramamoorthy, โFractional repetition codes with
flexible repair from combinatorial designs,โ IEEE Trans. on Info. Th.,
vol. 62, no. 4, pp. 1565 โ1591, 2016.
[23] S. E. Rouayheb and K. Ramchandran, โFractional repetition codes
for repair in distributed storage systems,โ in 48th Annual Allerton
Conference on Comm., Control & Computing, Sept 2010, pp. 1510 โ
1517.
[24] L. Tang and A. Ramamoorthy, โCoded caching with low subpacketization levels,โ in Intl. Symp. on Network Coding (NetCod), Dec 2016, pp.
1โ6.
[25] โโ, โCoded caching for networks with the resolvability property,โ in
IEEE Intl. Symposium on Info. Th., 2016.
[26] โโ, โLow Subpacketization Schemes for Coded Caching,โ 2017 [Online] Available: https://arxiv.org/abs/1706.00101.
[27] B. K. Rai and N. Das, โOn the capacity of ms/3t and 3s/nt sumnetworks,โ in IEEE Info. Th. Workshop, Sep. 2013, pp. 1โ5.
[28] B. Rai and N. Das, โOn the capacity of sum-networks,โ in 51st Annual
Allerton Conference on Comm., Control & Computing, Oct 2013, pp.
1545โ1552.
[29] A. Tripathy and A. Ramamoorthy, โSum-networks from undirected
graphs: Construction and capacity analysis,โ in 52nd Annual Allerton
Conference on Comm., Control & Computing, Sept 2014, pp. 651โ658.
[30] N. Das and B. K. Rai, โOn the number of sources and terminals
of sum-networks with capacity p/q,โ in 21st National Conference on
Communications (NCC), Feb 2015, pp. 1โ6.
[31] A. Tripathy and A. Ramamoorthy, โCapacity of sum-networks for
different message alphabets,โ in IEEE Intl. Symposium on Info. Th.,
June 2015, pp. 606โ610.
[32] R. A. Brualdi, Combinatorial matrix classes. Cambridge University
Press, 2006, vol. 13.
[33] L. Mirsky, โCombinatorial theorems and integral matrices,โ Journal of
Combinatorial Theory, vol. 5, no. 1, pp. 30โ44, 1968.
[34] L. Teirlinck, โNon-trivial t-designs without repeated blocks exist for all
t,โ Discrete Mathematics, vol. 65, no. 3, pp. 301โ311, 1987.
[35] C. J. Colbourn and J. H. Dinitz, Handbook of combinatorial designs.
CRC press, 2006.
Ardhendu Tripathy (Sโ15) is a Ph.D. student in the Department of Electrical
and Computer Engineering at Iowa State University. He obtained his B.Tech.
degree in Electrical Engineering from the Indian Institute of Technology,
Kanpur in 2012. His research interests are in the areas of information theory,
machine learning and signal processing.
Aditya Ramamoorthy (Mโ05) received the B.Tech. degree in electrical
engineering from the Indian Institute of Technology, Delhi, in 1999, and
the M.S. and Ph.D. degrees from the University of California, Los Angeles
(UCLA), in 2002 and 2005, respectively. He was a systems engineer with
Biomorphic VLSI Inc. until 2001. From 2005 to 2006, he was with the Data
Storage Signal Processing Group of Marvell Semiconductor Inc. Since fall
2006, he has been with the Electrical and Computer Engineering Department
at Iowa State University, Ames, IA 50011, USA. His research interests
are in the areas of network information theory, channel coding and signal
processing for bioinformatics and nanotechnology. Dr. Ramamoorthy served
as an editor for the IEEE Transactions on Communications from 2011 โ 2015.
He is currently serving as an associate editor for the IEEE Transactions on
Information Theory. He is the recipient of the 2012 Early Career Engineering
Faculty Research Award from Iowa State University, the 2012 NSF CAREER
award, and the Harpole-Pentair professorship in 2009 and 2010.
| 7cs.IT
|
FROM ISOLATED SUBGROUPS TO GENERIC PERMUTATION
REPRESENTATIONS
arXiv:1601.07538v1 [math.GR] 27 Jan 2016
YAIR GLASNER, DANIEL KITROSER, AND JULIEN MELLERAY
Abstract. Let G be a countable group, Sub(G) the (compact, metric) space of all subgroups of G with the Chabauty topology and Is(G) โ Sub(G) the collection of isolated
points. We denote by X! the (Polish) group of all permutations of a countable set X. Then
the following properties are equivalent: (i) Is(G) is dense in Sub(G), (ii) G admits a โgeneric
permutation representationโ. Namely there exists some ฯ โ โ Hom(G, X!) such that the collection of permutation representations {ฯ โ Hom(G, X!) | ฯ is permutation isomorphic to ฯ โ }
is co-meager in Hom(G, X!). We call groups satisfying these properties solitary. Examples
of solitary groups include finitely generated LERF groups and groups with countably many
subgroups.
1. Introduction
Let G be a countable group and Sub(G), the space of all subgroups of G endowed with the
Chabauty topology, which makes it into a compact metrizable totally disconnected space.
The easiest way to define this topology is to embed Sub(G) โ {0, 1}G as a closed subset and
induce the Tychonoff topology on {0, 1}G . The group G acts on Sub(G) continuously by
conjugation g ยท โ = gโg โ1 . One is naturally led to the question of how the structure of the
topological space Sub(G), or more generally the topological dynamical system (G, Sub(G)),
is reflected in the algebraic structure of G.
The Cantor-Bendixon structure theory of compact spaces leads us to consider the decomposition Sub(G) = Is(G) โ Sub(G)โฒ . Here Is(G) is the collection of isolated points, or isolated
subgroups as we shall refer to them, and Sub(G)โฒ is its complement. Isolated subgroups are
special from the algebraic point of view! Clearly there are only countably many of them.
One can think of isolated subgroups in algorithmic terms as subgroups that are detectable
or recognizable via a finite algorithmic procedure. A subgroup โ โ Sub(G) is isolated if and
only if it can be identified by making a finite number of membership and non-membership
tests for specific elements. It is sometimes convenient to think of this in terms of Schreier
graphs. Let S be a symmetric generating set for G. A subgroup โ โ Sub(G) is isolated if
one can find a finite algorithm that would recognize the Schreier graph Sch(G, โ, S) out of
all Schreier graphs of the group G. Note that S might very well be infinite, and consequently
the Schreier graphs in question may fail to be locally finite. Still the algorithm is allowed to
look only at finitely many edges. From these characterizations it is easy to see that isolated
groups are always finitely generated. In the special case where G itself is finitely generated
every finite index subgroup is isolated and we obtain inclusions Subfi (G) โ Is(G) โ Subfg (G)
where Subfi (G), Subfg (G) stand for finite index and finitely generated subgroups respectively.
2010 Mathematics Subject Classification. Primary 20E26; Secondary 0B07, 03E15.
Key words and phrases. Isolated subgroups, Solitary groups, LERF groups, amenable groups, ample
generics, amenable actions.
1
It is clear that Is(G) is always a discrete countable open subset of Sub(G). Our main new
definition is the following:
Definition 1.1. A group G is called solitary if the isolated points Is(G) are dense in Sub(G).
Let X be a countable set and X! the group of all permutations of X. The topology of
pointwise convergence makes X! into a Polish group: separable, metrizable and complete.
The space Hom(G, X!) is the space of all permutation representations of G and is clearly
also a Polish space. There is a natural action
X! ร Hom(G, X!) โ Hom(G, X!)
(1)
(ฮฑ, ฯ) 7โ ฮฑ ยท ฯ : g 7โ ฮฑฯ(g)ฮฑโ1
Two permutation representations that are in the same orbit are said to be isomorphic as
permutation representations. We will be interested in Baire generic properties of permutation
representations and in particular in the existence of a generic permutation representation in
the sense of the following:
Definition 1.2. The group G is said to have a generic permutation representation if there
is a permutation representation ฯ โ โ Hom(G, X!) whose orbit
X!(ฯ โ ) = {ฮฑ ยท ฯ โ | ฮฑ โ X!}
= {ฯ โ Hom(G, X!) | ฯ is a permutation isomorphic to ฯ โ }
is co-meager in Hom(G, X!).
It turns out that the existence of a generic permutation representation is captured by the
structure of the topological space Sub(G).
Theorem 1.3. (Main theorem) A countable group G admits a generic permutation representation if and only if it is solitary.
Definition 1.4. A group G is called subgroup separable or locally extended residually finite
(LERF for short), if every finitely generated subgroup of G is the intersection of finite
index subgroups. Or equivalently if any finitely generated subgroup is closed in the profinite
topology on G.
Examples of LERF groups include finitely generated abelian groups, free groups [Hal49],
surface groups [Sco85] and more generally, limit groups [Wil08], the Grigorchuk group
[GW03], many lamplighter groups [GK14]. Recently the LERF property attracted a lot
of attention as Agolโs proof of the LERF property for the fundamental group of a closed
hyperbolic 3-manifold [Ago13] was a central ingredient in his solution to Thrustonโs virtual
Haken conjecture.
The following theorem is analogous to our main theorem above. It shows in particular
that finitely generated LERF groups are solitary.
Theorem 1.5. Let G be a finitely generated group, then the following conditions are equivalent:
(1) G is LERF.
(2) The collection Subfi (G) of finite index subgroups is dense in Sub(G).
(3) G has a generic permutation representation, all of whose orbits are finite.
2
Remark 1.6. The fact that the first and third condition above are equivalent also follows from earlier work of Rosendal: Proposition 8(B) in [Ros11a] proves that G is LERF if
and only if a generic permutation representation has only finite orbits, while Theorem 11 of
[Ros11b] shows that a finitely generated LERF group admits a generic permutation representation. Note that Theorem 11 of [Ros11b] is only formulated for groups acting by isometries
on the rational Urysohn space, but see the remark in the last paragraph of [Ros11b], where
it is pointed out that the proofs adapt to other metric spaces, notably the Urysohn space
with distances {0, 1}, that is, an infinite countable set.
In the paper we state and prove a more detailed version of this theorem that holds also for
countable groups. Once we leave the realm of finitely generated groups isolated subgroups
and solitary groups no longer generalize finite index subgroups and LERF groups respectively.
Each of these theories goes in its own way. Our impression is that in some settings the choice
of isolated subgroups and solitary groups is the more natural one. The following theorem
summarizes some examples and structural results we have about solitary groups.
Theorem 1.7. Some properties of solitary groups.
(1) Finitely generated LERF groups are solitary.
(2) If Sub(G) is countable then G is solitary.
(3) Let 1 โ N โ H โ G โ 1 be a short exact sequence of countable groups such that
N is finitely generated, as an abstract group. If H is solitary then so is G.
(4) The free product of two countable groups G โ H is solitary if and only if one of the
following two options hold:
โข both G and H are LERF and finitely generated.
โข G is solitary and H is trivial, or vice-versa.
The situation considered in condition (3) above is identical to the one appearing in the
famous Rips construction. This naturally leads to the following:
Question 1.8. Is it true that every finitely generated solitary group G can be placed in a
short exact sequence 1 โ N โ H โ G โ 1 where H is solitary and hyperbolic and N is
finitely generated as an abstract group.
Theorem 1.3 is tightly connected to the notion of ample generics in Polish groups. We
adopt the notation of [MT13] ; [Ros11b] was the first paper to express this property in term
of generic orbits on โpresentation varietiesโ.
Definition 1.9. We say that a Polish group P has ample generics, if Hom(Fn , P ) admits a
generic P orbit for every n โ N.
The notion of ample generics was first introduced in [HHLS93] in order to study the small
index property in Polish groups. Namely that every subgroup of index < 2โต0 is open. Indeed
this and additional consequences such as automatic continuity of abstract homomorphisms
into any separable group were subsequently established for all groups with ample generics
in [KR07]. We refer the readers to all of the above mentioned papers (see also the survey
[GW08]) and the references therein. With this terminology in place Theorem 1.5 shows that
the following two well known facts:
โข X! has ample generics,
โข finitely generated free groups Fn are LERF,
3
are in fact two different realizations of the same phenomenon. In both cases one seeks a
generic P -orbit in Hom(G, P ). But in the study of groups with ample generics, one fixes G
(or more precisely lets G range over all finitely generated free groups) and lets the Polish
group P vary; whereas in the study of solitary groups we fix the Polish group P = X! and
consider the class of all the countable groups G that give rise to a generic orbit. In view of
the very natural characterization that arises from Theorem 1.5 the following question seems
natural:
Question 1.10. Given a Polish group P , describe the class of all finitely generated groups
G for which Hom(G, P ) has a generic P -orbit.
In particular, the answer should contain all finitely generated free groups whenever P has
ample generics. The group X! is probably the simplest example of a Polish group with ample
generics, but there are many others.
We now turn to generalizing Theorem 1.5, and the notion of LERF groups, in a different
direction. A subgroup H โค G is called co-amenable if there is a G-invariant mean on G/H
(see also Definitions 6.1, 6.2). Co-amenable subgroups generalize finite index subgroups in
much the same way that amenable groups generalize finite groups. In view of that and of
Theorems 1.5 and 1.3 we can generalize the notion of LERF groups as follows:
Definition 1.11. A group G is amenably separable, or A-separable for short, if the set of
co-amenable subgroups of G is dense in Sub(G).
In view of the Theorem 1.5, every LERF group is A-separable. Another obvious source
for examples is the class of all amenable groups. These are A-separable since all of their
subgroups are co-amenable. In chapter 6 of this work, we initiate the study of A-separable
groups. Our hope is that the notion of A-separability will prove to be a useful generalization
of the, a-priori very different, properties of LERF and amenability. This situation is perhaps
reminiscent of the way in which sofic groups simultaneously generalize the notions of residual
finiteness and amenability. In these terms the analogue of Theorem 1.3 is the following
Theorem 1.12. A countable group G is A-separable if and only if for a generic action of G
on a countable set, the action on every orbit is amenable.
Here are some properties of A-separable groups.
Theorem 1.13. The following properties hold for the class of A-separable groups:
โข LERF groups and amenable groups are A-separable.
โข The class of A-separable groups is closed under free products.
โข There exist A-separable groups which are neither LERF nor amenable.
โข A group with property (T) is A-separable if and only if it is LERF.
โข Higher rank lattices in non-compact simple Lie groups which satisfy the congruence
subgroup property are never A-separable.
The paper is arranged as follows. Section 2 is dedicated to a systematic investigation of
the topological spaces Sub(G), Hom(G, X!) and the standard stabilizer map Hom(G, X!) โ
Sub(G) between them. In Section 3 we prove Theorem 1.5. Chapter 4 is dedicated to solitary
groups and there we prove Theorems 1.3 and 1.7. Finally, in chapter 6 we prove Theorems
1.12 and 1.13 and give examples of non amenable, non LERF groups that are A-separable.
The results in this work also to appear as part of the Ph.D. dissertation of the second author
[Kit15].
4
2. Dense and generic properties of actions and subgroups
2.1. The space of permutation representations Hom(G, X!). Let X be a countable set
and X! the full symmetric group of all bijections of X onto itself. We endow X! with the
topology of pointwise convergence which makes it into a Polish topological group. In other
words a topological group that is separable, and admits a complete metric. The latter fact
is important for us because it shows that X! is a Baire space; though we will never consider
any specific metric. An explicit basis for the topology can be given by the sets
U(ฮฑ, A) := ฮฒ โ X! | ฮฒ A = ฮฑ A
(ฮฑ โ X!, A โ X finite).
On X!n we will always put the product topology, which is still Polish for every n โ N โช {โ}.
Let G be a countable group with a given presentation G = hS | Ri where S = {s1 , s2 , . . . }.
Then, we can identify Hom(G, X!) with a closed subset of X!S via the following embedding:
Hom(G, X!) โ {ฮฑ โ X!S | โw โ R : w(ฮฑ) = 1X } โ X!S
ฯ 7โ {ฯ(si )}siโS
Thus Hom(G, X!) is a closed subspace of X!S and the induced topology makes it into a
Polish space (note that this topology does not depend on the choice of presentation). A
basis for the topology on Hom(G, X!) is given by:
O(ฯ, T, A) := {ฯ โ Hom(G, X!) | โt โ T : ฯ(t)
A
= ฯ(t) A }
(ฯ โ Hom(G, X!), T โ G and A โ X both finite).
If S itself happens to be finite, then the sets O(ฯ, S, A) form a basis for Hom(G, X!).
As mentioned in the introduction (see Equation 1) the group X! acts, from the left, on
Hom(G, X!) and the orbits of this action are exactly the standard isomorphism classes of
permutation representations. It is well known that two permutation representations are
isomorphic if and only if they contain the same transitive components, appearing with the
same multiplicity. The transitive components, in turn, are isomorphic to quasiregular actions
of the form G y G/H for some H โ Sub(G). If {Hi } โ Sub(G) is a countable or finite
collection of subgroups and if di โ N โช {โ} we will denote the (isomorphism class of)
the permutation representation that has exactly di transitive components isomorphic to
ฮทi
G y G/Hi by
G
G
di ยท (G/Hi ) =
di ยท ฮทi .
i
i
Some care is due with this notation. It is not always possible to identify such an action with
an element of Hom(G, X!) because if the sum is finite and Hi are all of finite index then the
underlying set is finite. When this is not the case we can identify such an action with an
element of Hom(G, X!) via an arbitrary bijection between โi G/Hi โผ
= X. Different choices
of this bijection will yield all the different points in the corresponding X! orbit.
We will make frequent use of the following:
Definition 2.1. Let G y X, x โ X, g1 , . . . , gn โ G and let w = wk wkโ1 ยท ยท ยท w1 be a word
over {g1ยฑ1, . . . , gnยฑ1}. The trace of x under w is the set:
tracew (x) = {x, w1 x, . . . , wkโ1 ยท ยท ยท w1 x, wx}.
5
2.2. The space of subgroups. Let G be a countable group and consider the space {0, 1}G
of subsets of G, equipped with the product topology. This is a compact, metrizable space.
Let Sub(G) denote the set of all subgroups of G. It is easy to verify that Sub(G) is closed in
{0, 1}G and so it is a compact, metrizable space. The induced topology on Sub(G) is called
the Chabauty topology and a basis for this topology can be given by the sets
W(H, โฆ) = {K โ Sub(G) | K โฉ โฆ = H โฉ โฆ} (H โ Sub(G), โฆ โ G finite).
If H โ Sub(G) we denote by
Env(H) = {K โ Sub(G) | K โฅ H}
the envelope of H. Both subsets Sub(H) and Env(H) are closed in Sub(G). If H is finitely
generated then Env(H) is also open. Denoting by Subfg (G) โ Sub(G) the collection of
finitely generated subgroups, it is easy to check that the collection
[
{Env(H) | H โ Subfg (G)}
{Sub(G) r Env(H) | H โ Subfg (G)}
forms another basis for the topology of Sub(G).
2.3. Isolated subgroups. Let Is(G) and Occ(G) denote the isolated points of Sub(G) and
the subgroups of G with open conjugacy classes respectively. Note that a subgroup H is in
Occ(G) if and only if there is an open neighborhood of H, consisting of only conjugates of
H. Both subsets are open and conjugation invariant.
Proposition 2.2. Here are some basic properties of these subgroups:
(1) Is(G) = Occ(G).
(2) Every H โ Is(G) is finitely generated.
(3) if H โ Subfg (G) then Env(H) is an open neighborhood of H.
(4) When G itself is finitely generated then every finite index subgroup is isolated.
(5) If H โ Subfg (G) and |Env(H)| < โ then H is isolated. In particular every finitely
generated maximal subgroup is isolated.
Proof. It is clear that Is(G) โ Occ(G) and that both sets are open. The opposite inclusion
follows from Baireโs theorem: Let K โ Occ(G) and let [K] = {gKg โ1 | g โ G} be its
conjugacy class, which is open by definition. Since G is countable, [K] is a countable (or
finite) union of closed points so by Baireโs theorem one of them has to be open. Since G is
transitive on [K] all of these points are open and in particular K โ Is(G). This proves (1).
If H is not finitely generated then we can find a sequence of finitely generated subgroups
H1 < H2 < H3 < . . . with โชi Hi = H. Clearly Hi โ H in the topology of Sub(G) but none
of these subgroups is equal to H because H is not finitely generated. (3) is clear and (5)
follows directly from (3). Finally if G itself is finitely generated then so is every finite index
subgroup and (4) follows directly from (5).
Thus, for a finitely generated group G isolated subgroups form a class of subgroups that
sits between the finitely generated subgroups and the subgroups of finite index, namely:
Subfg (G) โ Is(G) โ Subfg (G).
We find it very useful to think of isolated subgroups as generalizations of finite index subgroups.
6
2.4. Generic properties. A subset A โ Y in a Polish space is called generic (or alternatively residual or co-meager) if it contains a countable intersection of dense open
sets. By Baireโs category theorem generic sets are always dense. We say that the property (P) is generic in Y or that a generic element of Y has the property (P) if the set
{y โ Y | y has the property (P)} is generic in Y .
In this paper we will be interested in generic properties of permutation representations
Hom(G, X!). The simplest example is Hom(Z, X!) โผ
= X!. The following, well known proposition, summarizes the generic properties of this space. Its proof is an exercise in Baireโs
category theorem which we leave to the readers. We chose to mention it here because our
main theorem, and its proof, are basically far reaching generalizations of this fact.
Proposition 2.3. X! has a residual conjugacy class. This conjugacy class can be described
explicitly:
G
ฯโ =
โ ยท (Z/nZ)
nโN
In terms of the definition below, the above proposition just says that G = Z admits a
generic permutation representation.
Definition 2.4. We say that G admits a generic permutation representation if there exists a permutation representation ฯ โ โ Hom(G, X!) whose orbit under the action X! y
Hom(G, X!) is residual in Hom(G, X!).
2.5. Properties of the stabilizer map. Given a permutation representation ฯ โ Hom(G, X!)
and a point x โ X, we denote by Gx (ฯ) = {g โ G | ฯ(g)x = x} the stabilizer of this point.
Fixing x this gives rise to a stabilizer map
Gx : Hom(G, X!) โ Sub(G)
ฯ 7โ Gx (ฯ)
(2)
Lemma 2.5. (Main lemma) For every x โ X, the stabilizer map Gx : Hom(G, X!) โ
Sub(G) is continuous, surjective and open.
Proof. It is clear that this map is surjective. Let ฯ โ Hom(G, X!) and let โฆ โ G be finite.
If ฯ โ O(ฯ, โฆ, {x}) then
โg โ โฆ : g โ Gx (ฯ) โ x = ฯ(g)x = ฯ(g)x โ g โ Gx (ฯ)
i.e Gx (ฯ) โ W(Gx (ฯ), โฆ). This proves that the map Gx is continuous.
To prove that this map is open let ฯ โ O = O(ฯ, S, A) โ Hom(G, X!) be a basic open
neighborhood in Hom(G, X!) and a point therein. By extending S we may assume that this
set contains the identity and is symmetric, i.e. that S = S โ1 . We have to exhibit an open
neighborhood W โ Sub(G) such that Gx (ฯ ) โ W โ Gx (O(ฯ, S, A)).
Let Y = ฯ (G)x โ X be the orbit of x under ฯ and L = Gx (ฯ ) be the stabilizer. We can
identify Y = G/L under the orbit map gL 7โ ฯ (g)x. Set AY := A โฉ Y . Let โฆ โ G be a
finite symmetric set such that
[
ฯ (s)AY โ ฯ (โฆ)x = {ฯ (ฯ)x | ฯ โ โฆ}.
sโS
7
We claim that the basic open set W = W(L, โฆSโฆ) satisfies all our requirements. Where
โฆSโฆ = {ฯ1 sฯ2 | ฯi โ โฆ, s โ S} is the set product. Fixing a group K โ W, we will complete
our proof by finding ฮท โ O such that K = Gx (ฮท).
Consider the finite subset โฆK = {ฯK โ G/K | ฯ โ โฆ} and define a partial map:
f : โฆK โ Y
ฯK 7โ ฯ (ฯ)x,
โฯ โ โฆ.
This map is well-defined and injective on its domain, since by the definition of the open set
W we have ฯ1 K = ฯ2 K โโ ฯ1 L1 = ฯ2 L1 โโ ฯ1 L = ฯ2 L โโ ฯ (ฯ1 )x = ฯ (ฯ2 )x for
every ฯ1 , ฯ2 โ โฆ. For a similar reason this map partially respects the G action on both sides
in the sense that
sf (ฯK) = f (sฯK) โฯ โ โฆ, s โ S.
Define a bijection fห : G/K โ X โ X satisfying the following conditions:
โข fห extends f , namely fห(ฯK) = f (ฯK), โฯ โ โฆ.
โข fห is the identity on โชsโS ฯ (s)(A) \ Y .
Now let us define an action ฯ1 of G on G/K โ X where G acts on G/K by the quasi-regular
action on on X by ฯ and let ฯ =โ Hom(G, X!) be defined by ฯ(g)x = fหฯ1 (g)fหโ1 (x). It is
easy to verify that K = Gx (ฯ). Also for every s โ S and y โ A we have ฯ(s)y = ฯ (s)y.
Indeed if y โ AY then by our choice of โฆ, we have y = ฯ ฯx for some ฯ โ โฆ and hence:
(
feฯ1 (s)feโ1 y = f sf โ1 ฯ (ฯ)x = f sฯK = ฯ (sฯ)x = ฯ (s)y, y โ AY
ฯ(s)y =
feฯ1 (s)feโ1 y = feฯ (s)feโ1 y = ฯ (s)y
y 6โ AY
This concludes the proof that Gx is open.
Corollary 2.6. For a subset D โ Sub(G) denote
e := {ฯ โ Hom(G, X!) | Gx (ฯ) โ D โx} =
D
\
(Gx )โ1 (D).
xโX
Then
e is dense in Hom(G, X!).
(1) If D is conjugation-invariant and dense in Sub(G) then D
e is Gฮด in Hom(G, X!).
(2) If D is Gฮด in Sub(G) then D
e is generic whenever D is.
In particular, D
Proof. Suppose D is conjugation-invariant and dense in Sub(G), let ฯ โ Hom(G, X!) and let
S โ G, A โ X be finite. Let x โ A. By Lemma 2.5, the set Gโ1
x (D) is dense in Hom(G, X!)
and so there exists ฯ1 โ Hom(G, X!) such that ฯ1 โ O(ฯ, S, A) and Gx (ฯ1 ) โ D. Denote
Y1 = ฯ1 (G)x and note that since D is conjugation-invariant we have Gy (ฯ1 ) โ D for all
y โ Y1 . Now, if z โ A r Y1 , we can apply the same argument and get a permutation
representation ฯ2 of G on X r Y1 such that ฯ2 (s) agrees with ฯ1 (s) on A โฉ (X r Y1 ) for all
s โ S and such that all the stabilizers of points belonging to Y2 = ฯ2 (G)z are in D. We get
that the action ฯ โ Hom(G, X!) defined by
(
ฯ1 (g)x, x โ Y1
โg โ G, x โ X : ฯ(g)x =
ฯ2 (g)x, x โ X r Y1
8
belongs to O(ฯ, S, A) and every stabilizer of a point belonging to the ฯ-invariant set Y1 โช Y2
is in D. By repeating the process described above, we get after finitely many steps an action
ฯ โ O(ฯ, S, A) and a ฯ-invariant set Y โ X such that A โ Y and such that Gy (ฯ) โ D for
ฯ
every y โ Y . Finally, extend the action G y Y to an action ฯe โ Hom(G, X!) in such a way
e and since A โ Y we have
that all stabilizers of points in X r Y belong to D. Thus, ฯe โ D
e
ฯ(s)
= ฯ(s) A = ฯ(s) A for all s โ S, i.e. ฯe โ T
O(ฯ, S, A). This proves part 1.
A
Now, assume D is Gฮด so we can write D =T n Dn , where Dn is open for every n โ N.
โ1
Then, for every x โ X we have Gโ1
x (D) =
n Gx (Dn ). Since Dn is open we get from
โ1
Lemma 2.5 that Gx (Dn ) is open for every x โ X and n โ N and so Gโ1
x (D) is Gฮด . Since X
T
โ1
e
is countable this means that D = xโX (Gx ) (D) is also Gฮด and part 2 is proven.
Lemma 2.7. Let U โ Sub(G) be open and non-empty. Then for a generic permutation
representation ฯ โ Hom(G, X!) we have
|{x โ X | Gx (ฯ) โ U}| = โ.
Proof. Let
ฮm = {ฯ โ Hom(G, X!) | |{x โ X | Gx (ฯ) โ U}| > m} .
\
ฮ=
ฮm .
mโN
We claim that ฮ is generic, and by Baireโs theorem it would be enough to show that ฮm is
open and dense for each m โ N. The fact that ฮm is open follows directly from the continuity
of the map Gx . To prove density we just add m new orbits with a stabilizer from U far away.
This is made explicit in the following way. Given a basic open set O(ฯ, S, A) โ Hom(G, X!)
we want to find an element ฮท โ O(ฯ, S, A) โฉ ฮm . Fix any subgroup H โ U and consider
the set Y = X โ (G/H)m endowed with the diagonal G action ฮท โฒ โ Hom(G, Y !) given by
ฮท โฒ (g)(x, g1H, . . . , gm H) = (ฯ(g)x, gg1H, . . . , ggm H). Now, let ฮน : X โ Y be the identity map
from X toSthe copy of X contained in Y , ฮน|A : A โ Y be its restriction to the finite set
A=Aโช
sโSโชS โ1 ฯ(s)A and let I : X โ Y be an extension of ฮน|A to a bijection between
X and Y . One easily checks that
ฮท = I โ1 โฆ ฮท โฒ โฆ I โ O(ฯ, S, A) โฉ ฮm
is as required.
Lemma 2.8. To any given ฯ โ Hom(G, X!) there is an arbitrarily close action, with infinitely
many fixed points.
Proof. Given finite sets S โ G, A โ X we seek an action ฯโฒ โ O(ฯ, S, A) with infinitely many
(ฯ,1)
fixed points. Consider the action G y X โ N, obtained from ฯ by adding countably many
fixed points. The desired action ฯโฒ = ฯโ1 (ฯ, 1)ฯ is obtained by intertwining this action via
any bijection
ฯ :X โ X โ N with the property that ฯ is the identity when restricted to
S
Aโช
ฯ(s)A
.
sโS
3. The LERF property
In this section we prove Theorem 1.5. In fact, as promised in the introduction, we will
prove the following slightly more general version of the theorem that for arbitrary countable
groups (not necessarily finitely generated).
9
Theorem 3.1. Let G be a finitely generated group, then the following conditions are equivalent:
(1) G is LERF.
(2) The collection of finite index subgroups of G is dense in Sub(G).
(3) The collection of permutation representations all of whose orbits are finite is dense
in Hom(G, X!).
(4) The collection of permutation representations all of whose orbits are finite is generic
in Hom(G, X!).
(5) G has a generic permutation representation, all of whose orbits are finite.
When G is countable, but not necessarily finitely generated, then only the first three conditions
are equivalent.
It is easy to verify that this theorem implies Theorem 1.5 when G is finitely generated. The
apparent complications when G fails to be finitely generated, and lack thereof in the proof
of Theorem 1.3, emphasize one of our main points: Isolated subgroups are more natural than
finite index subgroups in this setting. We mention again that the equivalence of the first,
third and fourth conditions is already present in Rosendalโs works [Ros11a] and [Ros11b]
(see the discussion in the introduction).
Proof of Theorem 3.1. In a countable group G every subgroup is an ascending union of
finitely generated subgroups. Hence Subfg is dense in Sub(G). The LERF property implies
that Subfg โ Subfi as every finitely generated subgroup is a descending intersection of finite
index subgroups. This shows (1) =โ (2). Now (2) =โ (3) follows directly from Corollary
(2.6). To prove (3) =โ (1), assume we are given a finitely generated infinite index subgroup
L = hSi and g โ G r L. Let ฯ โ Hom(G, X!) be any permutation representation which is
isomorphic to the quasiregular action G y (G/L) in such a way that x โ X is identified
with the trivial coset eL. If ฯ โ O(ฯ, S โช {g}, {x}) is an action with finite orbits then
[L : Gx (ฯ)] < โ, L < Gx (ฯ) but g 6โ Gx (ฯ) proving the LERF property.
Assume now that G is finitely generated. The implications (5) =โ (4) =โ (3) are
obvious, so it is enough to prove the implication (2) =โ (5). We start by describing the
generic permutation representation ฯ โ โ Hom(G, X!). Let Subfg (G) = {H1 , H2 , . . . } be an
enumeration of the finite index subgroups of G, let ฯn be the quasi-regular representation of
G on G/Hn and define:
G
ฯโ =
โ ยท ฯn .
Namely, take countably many copies of each representation in the list, and let G act naturally
on the disjoint union of the corresponding sets. It follows from Corollary 2.6, applied to the
open dense set D = Subfi (G) โ Sub(G), that the collection of permutation representations
all of whose orbits are finite is generic. It follows from Lemma 2.7 applied to the open
set {Hi } โ Sub(G) that the collection of permutation representations in which ฯi appears
countably many times as a transitive component is also generic. By Baireโs category theorem
a generic permutation representation has only finite orbits and each ฯi appears in it countably
many times. But such a permutation representation must be permutation isomorphic to
ฯ โ.
Remark 3.2. As the examples below demonstrate if G is an infinitely generated LERF
group it is no longer true that a generic permutation representation has only finite orbits. It
10
is still true, however, that the restriction of such a generic action to every finitely generated
subgroup H < G has only finite orbits. It is even true that the restriction of a generic
permutation to H admits a well defined isomorphism type (up to isomorphism of permutation
representations of H). The details of the proof are quite similar to our proof above and we
leave them to the reader.
In order to demonstrate the use of Theorem 1.5 above and give some basic examples we
analyze the situation in free groups. Providing a short proof to Hallโs theorem that free
groups are LERF.
Proposition 3.3. Let Fn , 1 โค n โค โ be a free group.
(1) Fn is LERF.
(2) A generic permutation representation ฯ โ Hom(Fโ , X!) is transitive.
(3) If ฮ is a countable LERF group that is not finitely generated then Sub(ฮ) is perfect.
Proof. First notice that Hom(Fn , X!) = X!n . Let X!(f ) < X! be
subgroup of
the dense
n
(f ) n
(f )
finitely supported permutations. Clearly Hom(Fn , X! ) = X!
โ X! = Hom(Fn , X!)
is a dense set of permutation representations all of whose orbits are finite. This proves (1)
by establishing Theorem 1.5(3).
To prove (2) it is enough, by Baireโs theorem, to show that the set ฮ(x, y) = {ฯ โ
Hom(Fโ , X!) | y โ ฯ(Fโ )x} is open and dense. Openness is obvious. For the density, fix
a free generating set Fโ = hx1 , x2 , . . .i. Given a basic open set O(ฯ, S, A) โ Hom(Fโ , X!)
the finite set S โ Fโ contains words that involve only finitely many of the generators, say
S โ hx1 , x2 , . . . , xr i. We can find ฯ โ O(ฯ, S, A) โฉ ฮ(x, y) by setting ฯ(xi ) = ฯ(xi ) for every
1 โค i โค r and then defining ฯ(xr+1 ) in such a way that ฯ(xr+1 )x = y.
Finally if ฮ fails to be finitely generated then so do her finite index subgroups. So by
Proposition 2.2(2) none of these are isolated. If ฮ is also LERF then the finite index subgroups are dense and in particular there can be no isolated subgroups at all. This proves
(3).
4. Solitary groups
This section is dedicated to the proof of Theorem 1.3.
Proof. Assume that Is(G) is dense in Sub(G). Let Is(G) = {โ1 , โ2 , โ3 , . . . , ฮฃ1 , ฮฃ2 , . . .} be
representatives for the conjugacy classes of these isolated subgroups of G. Where we made a
distinction between the groups โi that are of finite index in their normalizer and the groups
ฮดi
ฯi
ฮฃi that are not. We denote by G y G/โi , G y G/ฮฃi the corresponding quasiregular
actions. It is important to note that in G/โi there are finitely many points whose stabilizer
is โi under the ฮดi action. In G/ฮฃi there are infinitely many similar points. With this
terminology in place we can describe the generic permutation representation. It will have
countably many orbits isomorphic to each ฮดi and one orbit isomorphic to each ฯi :
!
!
G
G
โ
ฯ =
โต0 ฮดi โ
ฯj .
i
j
Applying Corollary 2.6 to the open dense subset Is(G) โ Sub(G) we conclude that a
generic permutation representation has all of its stabilizers in Is(G). In other words a generic
(โi di ฮดi ) โ (โi si ฯi ) for some di , si โ N โช {โ}. By Lemma 2.7, applied to the open set {โi }
11
we know that a generic representation has infinitely many points whose stabilizer is โi ,
which immediately implies that di = โ, โi. Note that an identical argument tells us that a
generic representation has countably many points whose stabilizer is ฮฃi , but even one orbit
isomorphic to ฯi is enough to ensure that so this does not add any information about the
coefficients si .
All that is left to prove is that a generic representation has only one orbit isomorphic to
ฯi for every i. In order to simplify the notation we will hence fix the index i and denote
ฯ = ฯi , ฮฃ = ฮฃi . Let us denote by [ฮฃ] = {gฮฃg โ1 | g โ G} โ Sub(G) the conjugacy class of
ฮฃ. The bad event is the existence of two different orbits with stabilizers in [ฮฃ]:
[
ฮ =
ฮx,y
x,yโX
ฮx,y = {ฯ โ Hom(G, X!) | Gx (ฯ) = Gy (ฯ) = ฮฃ; but ฯ(G)x 6= ฯ(G)y}
By continuity of the stabilizer map (Lemma 2.5) the sets Gxโ1 ({ฮฃ}), Gโ1
y ({ฮฃ}) and hence
also ฮx,y are closed. So by Baireโs theorem it suffices to prove that ฮx,y is nowhere dense.
Assume to the contrary that O = O(ฯ, S, A) โ ฮx,y for some basic open set. Replacing
โ1
if necessary O by a smaller basic open set, we may assume
S that S = S and that O โ
โ1
โ1
Gx ({ฮฃ}) โฉ Gy ({ฮฃ}). Let Ax = ฯ(G)x โฉ A and โฆx = sโS ฯ(s)Ax . We define Ay , โฆy
similarly.
Consider the quasiregular action ฯ : G y G/ฮฃ, if g โ NG (ฮฃ) then there is a unique G
invariant isomorphism
ฮทgฮฃ : ฯ(G)x โ G/ฮฃ
ฯ(h)x 7โ hgฮฃ.
Since [NG (ฮฃ) : ฮฃ] = โ by assumption there are infinitely many possible choices of points
gฮฃ that would work for x and similarly for y. Let gx ฮฃ, gy ฮฃ be two such choices satisfying
the additional property
ฮทgx (โฆx ) โฉ ฮทgy (โฆy ) = โ
.
Let ฮฑ : ฯ(G)x โ ฯ(G)y โ G/ฮฃ be any bijection such that ฮฑ(z) = ฮทgx (z), โz โ โฆx and
ฮฑ(z) = ฮทgy (z), โz โ โฆy . We define a new action ฯ โ O by the following formula:
โ1
ฮฑ (gฮฑ(x)) if x โ ฯ(G)x โ ฯ(G)y
ฯ(g)(x) =
ฯ(g)x
otherwise
It is easy to verify that ฯ โ O, that Gx (ฯ), Gy (ฯ) = ฮฃ and that x, y are in the same
ฯ(G)-orbit. Which completes the proof of the first implication.
Assume now that there exists a generic permutation representation ฯ โ โ Hom(G, X!), by
assumption its isomorphism class ฮฆ = {aฯ โ aโ1 | a โ X!} is co-meager in Hom(G, X!). The
collection of subgroups appearing as point stabilizers of ฯ โ are given by O = {Gx (ฯ โ ) | x โ
X} = Gx0 (ฮฆ) โ Sub(G), where x0 is an arbitrary basepoint. Since, by Lemma 2.5, the map
Gx0 is surjective and continuous O is dense in Sub(G). In particular O โ Is(G).
We will show that O โ Is(G) thus showing that the latter is dense and completing the
proof. Let ฮฃ โ O and [ฮฃ] = {gฮฃg โ1 | g โ G} its conjugacy class. By Proposition 2.2(1) it
is enough to show that [ฮฃ] is open. If [ฮฃ] fails to be open it must have an empty interior,
12
because G acts transitively on [ฮฃ]. Since [ฮฃ] is countable it follows from Baireโs theorem
that Sub(G) \ [ฮฃ] is a dense Gฮด set. By Corollary 2.6
^\ [ฮฃ] = {ฯ โ Hom(G, X!) | Gx (ฯ) 6โ [ฮฃ], โx โ X}
Sub(G)
is also a dense Gฮด set. But this contradicts the fact that ฮฆ is dense Gฮด as the intersection of
these two sets is empty.
We conclude this section by proving Theorem 1.7.
Proof. (of Theorem 1.7) In view of the fact that in a finitely generated group G finite index
subgroups are isolated (1) follows directly from the comparison of Theorems 1.3 and 1.5.
Density of isolated points (statement 2) is a general fact about countable Baire spaces.
Indeed the set Sub(G) \ Is(G) is nowhere dense since it is a countable union of closed,
nowhere dense points. Consider a short exact sequence as in statement (3). Since N is
finitely generated Env(N) is clopen. It is easy to verify that the correspondence principle,
between subgroups of G and subgroups of H containing N, gives rise to a homeomorphism
Env(N) โ Sub(G)
ฮ 7โ ฯ(ฮ)
Claim (3) follows immediately.
It is well known that the free product of two LERF groups is LERF [Rom69, Bur71]. If
one of the groups, say H is trivial then G โ hei โผ
= G and the situation is clear. Thus to
establish (4) we have to show that if neither group is trivial and G fails to be LERF then
G โ H cannot be solitary. Let ฮฃ โ Subfg (G) \ Subfi be some finitely generated subgroup that
cannot be approximated by finite index subgroups. Let ฮท : G โ H โ G be the map that is
the identity on G and trivial on H. We will show that ฮ := ฮท โ1 (ฮฃ) = ฮฃ ker(ฮท) โ Sub(G โ H)
is a subgroup that cannot be approximated by isolated subgroups. Indeed let โฆ โ G be
some finite set such that the neighborhood WSub(G) (ฮฃ, โฆ) does not contain any finite index
subgroup. We can use the same โฆ to define an open neighborhood in G โ H and it is clear
that [G : โ โฉ G] = โ for every โ โ SubSub(GโH) (ฮ, โฆ). Thus our theorem is proved in view
of the following lemma, which seems very useful in its own right.
Lemma 4.1. Let G, H be two countable groups with G infinite and H non-trivial. If โ โ
Is(G โ H) then [G : G โฉ โ] < โ.
Proof. It will be more convenient to argue at the level of actions and Schreier graphs. Note
that Hom(G โ H, X!) โผ
= Hom(G, X!) ร Hom(H, X!). We will denote this isomorphism by
ฯ โ ฯ 7โ (ฯ, ฯ), namely ฯ โ ฯ is the unique action of G โ H whose restriction to G is ฯ and
to H is ฯ.
Let โ โ Sub(G โ H) and assume that [G : G โฉ โ] = โ. Let ฯ โ ฯ โ Hom(G โ H, X!)
be any action which is isomorphic to the quasiregular action G โ H y (G โ H)/โ with
x โ X identified with the trivial coset eโ. Note that, while the action of G โ H is transitive,
ฯ, ฯ themselves need not be transitive. Still, by our assumption we know that the orbit
Y := ฯ(G)x โ X is infinite. The argument now is simple enough : we obtain approximating
n
actions of the form ฯ โ ฯn โ ฯ โ ฯ by carrying out small perturbations on the action of
H. Since the orbit Y is infinite we can do arbitrarily small such perturbations on the action
while still affecting the stabilizer of the point x. We elaborate below but this is basically a
complete proof.
13
Let x โ A0 โ A1 โ A2 . . . be finite sets ascending to the whole of X, Tn โ H finite
sets ascending to a generating set of H. We can assume that 1 โ Tn = Tnโ1 . Of course if
H is finitely generated we can just take Tn = T, โn โ N to be some fixed symmetric set
of generators. Set Bn = โชtโTn ฯ(t)(An ) and ฮพn โ Y \ Bn . Since X is infinite we can find
bijections fn : X โ X ร {0, 1}, with the additional properties that fn (x) = (x, 0), โx โ An
and fn (ฮพn ) = (ฮพn , 1). Let ฮท โ hom(H, X!) be any fixed action of H on X. Using all this data
we construct a sequence of actions ฯ ฮท โ Hom(H, (X ร {0, 1})!) as follows:
(ฯ(h)x, 0), i = 0
ฮท
ฯ (h)(x, i) =
(ฮท(h)x, 1), i = 1
and let ฯnฮท (h) = (fn )โ1 โฆ ฯ ฮท โฆ fn . It is clear from the definitions that ฯnฮท โ O(ฯ, Tn , An ) and
in particular ฯnฮท โ ฯ as n โ โ. Consequently of course ฯ โ ฮจฮทn โ ฯ โ ฯ in Hom(G โ H, X!).
Let 1, ฮป โ Hom(H, X!) be the trivial and the regular left action of H on X. The latter is
defined via an arbitrarily chosen identification of X with H which will not play a role in the
discussion. If H is finite we replace the regular left action by countably many copies of the
same action, just to make sure ฮป is an action on an infinite set. We use these to obtain two
convergent sequences of actions and hence two convergent sequences of subgroups
ฯ โ ฯn1 โ ฯ โ ฯ
ฯ โ ฯnฮป โ ฯ โ ฯ
(G โ H)x (ฯ โ ฯn1 ) โ โ
(G โ H)x (ฯ โ ฯnฮป ) โ โ
These sequences are different because if gn โ Gn is any element such that ฯ(gn )x = ฮพn then
for any 1 6= h โ H we have
gnโ1hgn โ (G โ H)x (ฯ โ ฯn1 ) \ (G โ H)x (ฯ โ ฯnฮป ).
Thus at least one of these sequences is not eventually constant, proving that the limit point
โ is not isolated.
5. Sketch of another proof of Theorem 1.3
We briefly sketch another proof of Theorem 1.3, which is more along the lines of the
arguments in [KR07]. First, we note that for any countable group G, the action of X! on
Hom(G, X!) is topologically transitive, that is, given any two nonempty open subsets U, V
of Hom(G, X!), there always exists ฮฑ โ X! such that ฮฑ ยท U โฉ V 6= โ
(equivalently, there exists
elements in Hom(G, X!) which have a dense conjugacy class). This is true simply because
any two actions ฯ1 , ฯ2 of G on an infinite countable set embed in a third one ฯ3 (for instance,
obtained by considering a disjoint union of two infinite countable sets, with G acting as ฯ1
on the first copy, and ฯ2 on the second copy). Then the closure of the conjugacy class of ฯ3
contains both ฯ1 and ฯ2 , proving the desired result.
This brings us to the setting of the following lemma; the equivalence between (1) and (3)
below is the criterion we will be using, and is due to C. Rosendal. The equivalence of these
conditions with (2) appears to be new, and seems potentially useful so we are including it
here even though it will not be needed.
Lemma 5.1. Assume that P is a Polish group acting continuously and topologically transitively on a Polish space Z. Then the following conditions are equivalent:
(1) There exists a comeager orbit.
14
(2) For any open identity neighborhood 1 โ V โ P the collection of points
{z โ Z | V (z) is somewhere dense} = {z โ Z | Int(V (z)) 6= โ
}
is dense in Z.
(3) For any open identity neighborhood 1 โ V โ P and any nonempty open subset U of Z,
there exists a nonempty open U โฒ โ U such that, for any nonempty open W1 , W2 โ U โฒ ,
one has V W1 โฉ W2 6= โ
.
Proof. Fix an open identity neighborhood V and a sequence of group elements such that
โชn ฮฑn V = P . If there exists a comeager orbit then by Baireโs category theorem for every z
in this orbit there exists an n such that ฮฑn V (z) is somewhere dense. Translating by ฮฑn we
deduce that V (z) itself is somewhere dense. This proves that (1) implies (2).
Assume that (2) holds; fix an open identity neighborhood 1 โ V โ P and a nonempty open
subset U of Z. Using our assumption, and continuity of the action, we may find a symmetric
open identity neighborhood V โฒ such that V โฒ V โฒ โ V , an open U โฒ โ U and x โ U such that
the closure of V โฒ (x) contains U โฒ . Then, for any W1 , W2 nonempty open and contained in U โฒ ,
we have some v1 , v2 โ V โฒ such that v1 x โ W1 , v2 x โ W2 . Thus v2 v1โ1 W1 โฉ W2 6= โ
and (3)
holds.
Finally, assume that (1) is false; since there exist dense orbits, any orbit must be meager
or comeager, by the 0โ1 topological law [RR74]. So in this case all orbits are meager.
Given z S
โ Z, we then have an family of closed subsets Fn with empty interior such that
P (z) โ Fn ; some {g โ P : gz โ Fn } must have nonempty interior, proving that there
exists some open neighborhood V of 1 such that V (z) is nowhere dense. Thus Z is the union
of sets of the form {z โ Z : V (z) is nowhere dense}, where V ranges over a countable basis of
neighborhoods of 1; one of these sets must be nonmeagre, hence (since these sets are Borel)
comeagre in some nonempty open U. Assume that (3) holds, and pick U โฒ โ U witnessing it.
The assumption of (3) amounts to saying that {z โ U โฒ : V (z) โฉ W 6= โ
} is dense open in U โฒ
for any nonempty open W โ U โฒ ; this implies that {z โ U โฒ : V (z) is dense in U โฒ } is comeagre
in U โฒ . This is a contradiction with the fact that V (z) must be nowhere dense for a generic
element of U, hence also of U โฒ .
Now, we need to understand when the above criterion is satisfied, for G a countable group,
P = X! and Z = Hom(G, X!). Given an open set U = O(ฯ, S, A), let i(ฯ) denote the number
of distinct G-orbits of elements of A; we may pick ฯ such that i(ฯ) number is minimal among
elements of U. Then, enlarging S and shrinking A as needed, we can reduce to the situation
where
โฯ โ U โa 6= aโฒ โ A โg โ G ฯ(g)(a) 6= aโฒ .
We are now in a situation where orbits of elements of A cannot interfere with each other;
this enables us to reduce to the case where A = {a} is a singleton and we are working inside
the Polish space Z โฒ of transitive G-actions. Consider an open set U = O(ฯ, S, a) โฉ Z โฒ ; let
Ga denote the stabilizer of a for this action, and let V be the group of permutations fixing
a finite set F . Enlarging S if needed, we assume that F โ Sa. Then, it is readily checked
that two elements ฯ1 , ฯ2 of U belong to the same V -orbit iff the stabilizers of a for ฯ1 and ฯ2
are the same. Let
S1 = {g2 g1โ1 : g1 , g2 โ S and g1 (a) = g2 (a)} , S2 = {g โ S : g(a) 6= a} .
15
The discussion above shows that the criterion (3) of Lemma 5.1 is satisfied iff there exists
an open set W = O(ฯฬ, Sฬ, a) โฉ Z โฒ contained in U such that the stabilizer of a is the same for
any two elements of W ; that is, if and only if there exist finite sets Sฬ1 , Sฬ2 โ G, with Sฬ1 โ S1
and Sฬ2 โ S2 , and a subgroup Gโฒa such that:
โH โ Sub(G) (โg โ S1 g โ H and โg โ S2 g 6โ H) โ (H = Gโฒa ) .
Thus H is an isolated point in Sub(G); since Ga was an arbitrary subgroup of G, and
S1 , S2 encode an arbitrary open neighborhood of Ga , we just established that there exists a
generic action in Hom(G, X!) if, and only if, G is solitary.
One can try to use the same approach as above to understand when there exists generic
conjugacy classes in Hom(G, P ) for other Polish groups P . But, as the structure of P becomes
more complicated, the above analysis is harder to carry out (in particular, the reduction to
transitive actions no longer works). One case when one can do it is when P = Aut(R) is
the automorphism group of the random graph. Then, reasoning in much the same way as
above, one obtains the following criterion, which probably can be further simplified.
Proposition 5.2. Given G a countable group, there exists a generic element in Hom(G, Aut(R))
iff the following condition is satisfied:
For any finitely-generated subgroups H1 , . . . , Hn of G, and any finite Ki,j โ G with Hi Hj โฉ
Ki,j = โ
for all i โค j, there exists finitely generated subgroups H1โฒ , . . . , Hnโฒ such that:
โข For all i Hiโฒ contains Hi .
โข For all i, j the double coset space Hiโฒ\G/Hjโฒ is finite.
โข For all i โค j one has HiโฒHjโฒ โฉ Ki,j = โ
.
The above property is hard to grasp; it does imply that G is finitely generated, and that
any finitely generated subgroup of G is an intersection of finitely generated subgroups with
finite bi-index. Must a group satisfying the previous conditions be LERF?
6. A-separability
Definition 6.1. An action G y X of a discrete, countable group G is called amenable if it
satisfies any one of the following equivalent conditions:
โข For every ฮต > 0 and โฆ โ G finite, X admits an (ฮต, โฆ)-Fรธlner subset, that is, a finite
|gF โF |
set F โ X such that
< ฮต for all g โ โฆ.
|F |
โข There exists a finitely additive G-invariant probability measure on X.
When the action is transitive, of the form G y G/K, these conditions are further equivalent
to the following:
โข If G acts continuously on a compact space and K admits an invariant Borel measure,
then so does G.
In the transitive case it is sometimes convenient to adopt group theoretic terminology as
follows:
Definition 6.2. A subgroup K of a group G is called co-amenable if the quasiregular action
G y G/K is amenable.
16
The equivalence of these three conditions is classical. By definition, an amenable action
always admits a Fรธlner-sequence. This is a sequence of finite subsets Fn โ X such that for
|gFn โณFn |
all g โ G we have lim
= 0. We recall the following:
nโโ
|Fn |
Remark 6.3. A Fรธlner-sequence can be chosen to be increasing (with respect to inclusion).
As defined in the introduction, a group G is A-separable if the set of co-amenable subgroups
is dense in Sub(G). We now prove Theorem 1.12, giving a characterization of A-separability
in the language of generic actions:
Proof of Theorem 1.12. Denote by CoAm(G) the set of all co-amenable subgroups of G.
Note For x โ X denote
ฯ
ฮฃ(x) = {ฯ โ Hom(G, X!) | G y (G)x is amenable}
= {ฯ โ Hom(G, X!) | Gx (ฯ) โ CoAm(G)}.
and ฮฃ = โฉxโX ฮฃ(x). If ฮฃ is generic then ฮฃ(x) is dense in Hom(G, X!) and by Lemma 2.5 the
image of this set {Gx (ฯ) | ฯ โ ฮฃ(x)} is a dense subset of Sub(G) consisting of co-amenable
subgroups.
Conversely, assume that CoAm(G) is dense in Sub(G) and we wish to prove that the
set ฮฃ is generic in Hom(G, X!). It is enough to show that ฮฃ(x) is generic in Hom(G, X!)
for every x โ X. The density of ฮฃ(x) is assured by the hypothesis, the fact that ฮฃ(x) =
Gโ1
x (CoAm(G)) and Lemma 2.5. To show that ฮฃ(x) is Gฮด , it is enough to show that the
condition that a specific finite set F โ ฯ(G)x is (ฮต, โฆ)-Fรธlner is open, where ฮต > 0 and โฆ โ G
is finite. Assume this is the case for some ฯ โ Hom(G, X!) we seek an open neighborhood
ฯ โ O โ Hom(G, X!) such that F is still contained in the orbit, and is still Fรธlner for every
ฯ โ O. For every f โ F pick a group element gf โ G such that f = ฯ(gf )x. Let F โฒ = F โช{x}
and โฆโฒ = โฆ โช {gf | f โ F } - the desired neighborhood is given by O = O(ฯ, F โฒ , โฆโฒ ).
As mentioned in the introduction, LERF groups and amenable groups are A-separable but
they are not the only examples of A-separable groups. In order to give an example of an Aseparable group which is neither LERF nor amenable, we will first prove that A-separability
is closed under taking free products:
Theorem 6.4. Let G and K be countable groups. If G and K are A-separable then so is
G โ K.
Proof. Every element of Hom(G โ K, X!) is of theform ฯ โ ฯ for ฯ โ Hom(G, X!), ฯ โ
Hom(K, X!); where ฯ โ ฯ is defined by setting ฯ โ ฯ (g) = ฯ(g) and ฯ โ ฯ (k) = ฯ(k), โg โ
G, k โ K and expanding the definition to the free product.
For every x โ X, ฮต > 0 and finite subsets S โ G, T โ K let
ฮฃ(x, ฮต, S, T ) = {ฯ โ ฯ โ Hom(G โ K, X!) | the (ฯ โ ฯ )-orbit of x
contains an (ฮต, S โช T )-Fรธlner set}.
We want to prove that ฮฃ = ฮฃ(x, n1 , S, T ) x โ X, n โ N, S โ G, T โ K finite is generic
in Hom(G โ K, X!). Since X, G and K are countable, it is enough to show that the sets
ฮฃ(x, ฮต, S, T ) are open and dense for every x โ X, ฮต > 0 and finite subsets S โ G, T โ K.
The argument that shows that ฮฃ(x, ฮต, S, T ) is open was given in the proof of Theorem 1.12.
T
17
Fix x, ฮต, S and T as above. We prove that ฮฃ(x, ฮต, S, T ) is dense in Hom(G โ K, X!). Let
ฯ โ ฯ โ Hom(G โ K, X!) and let A โ X be finite. We will find ฯโฒ โ Hom(G, X!) and
ฯ โฒ โ Hom(K, X!) such that ฯโฒ (s)a = ฯ(s)a, ฯ โฒ (t)a = ฯ(t)a for all s โ S, t โ T, a โ A
and such that ฯโฒ โ ฯ โฒ โ ฮฃ(x, ฮต, S, T ). We can assume that x โ A. By A-separability, there
exist ฯ โ Hom(G, X!) and ฯ โ Hom(K, X!) such that ฯ(s)a = ฯ(s)a, ฯ (t)a = ฯ(t)a for all
ฯ
ฯ
s โ S, t โ T, a โ A and such that the actions G y X and K y X are amenable on every
orbit. Let L := ฯ โ ฯ (G โ K) = hฯ(G), ฯ (K)i.
Case 1: all the ฯ and ฯ orbits which are contained
S in Lx are finite. Let B โ Lx be a
finite, ฯ-invariant set containing AโฉLx and let C = bโB ฯ (K)b. We define a representation
ฯโฒ โ Hom(G, X!) by declaring every c โ C r B and every element in the ฯ-orbit of c to be a
fixed point for ฯโฒ and on every other element of X, ฯโฒ (g) identifies with ฯ(g) for all g โ G.
Notice that since B is ฯ-invariant, ฯโฒ (g) is well defined and acts the same as ฯ(g) on B for
all g โ G. In particular, ฯโฒ (g) agrees with ฯ(g) on A. We have that C is finite, invariant
under both ฯโฒ and ฯ and contains x. Setting ฯ โฒ = ฯ , the (ฯโฒ โ ฯ โฒ )-orbit of x is finite so the
orbit itself is an (ฮต, S โช T )-Fรธlner set for ฯโฒ โ ฯ โฒ .
Case 2: Lx contains either an infinite ฯ-orbit or an infinite ฯ -orbit. Assume,
S without
loss of generality, that Lx contains an infinite ฯ -orbit Y . Denote B = A โช
sโS ฯ(s)A
and let Fn be an increasing Fรธlner-sequence in Y for the ฯ -action. Since the sets Fn are
finite, none of them is ฯ -invariant and so the Fรธlner-sequence does not stabilize. This
implies that |Fn | โ โ and in particular, Y contains an (ฮต, T )-Fรธlner set F such that
2(|B| + 1)
|F | >
. Now, let z โ G โ K be such that (ฯ โ ฯ )(z)x โ F and such that z is of
ฮต
minimal length with respect to the canonical presentation: z = gn kn gnโ1knโ1 ยท ยท ยท g1 k1 (gi โ
G, kj โ K, g1, . . . , gnโ1 , k2 , . . . , kn 6= 1). Denote y = (ฯ โ ฯ )(z)x. By Lemma 2.8, we can
assume that ฯ has infinitely many fixed points. In particular, there exits a set C โ X on
which ฯ(G) acts trivially, such that |C| = |F r (B โช {y})| and such that C does not intersect
the finite set B โช F โช trace(ฯโฯ )(z) (x) where we think of (ฯ โ ฯ )(z) as the word over X!
corresponding to the given presentation of z. Denote D = F r (B โช {y}) and let ฮพ โ X! be a
permutation of order 2 that takes C bijectively onto D and acts trivially on X r(C โชD). We
define an action ฯโฒ โ Hom(G, X!) by ฯโฒ (g) = ฮพ โ1 ฯ(g)ฮพ for all g โ G. Since ฮพ acts trivially
on B we have that โs โ S, โa โ A : ฯโฒ (s)a = ฯ(s)a = ฯ(s)a and that every element of D is
fixed under ฯโฒ (s) for all s โ S. Hence:
โs โ S :
2|F r D|
2(|B| + 1)
|ฯโฒ (s)F โF |
โค
โค
< ฮต.
|F |
|F |
|F |
Thus F is (ฮต, S)-Fรธlner for ฯโฒ and (ฮต, T )-Fรธlner for ฯ โฒ := ฯ and thus F is (ฮต, S โชT )-Fรธlner for
ฯโฒ โฯ โฒ. Notice that by the minimality of the length of z we have that trace(ฯโฯ )(z) (x)โฉF = {y}
and so ฮพ acts trivially on trace(ฯโฯ )(z) (x). This means that (ฯโฒ โ ฯ โฒ )(z)x = y โ F and since
F is contained in a ฯ -orbit this implies that F is contained in the (ฯโฒ โ ฯ โฒ )-orbit of x, as
required.
Recall that the (m, n) Baumslag-Solitar group is the group BS(m, n) = hs, t | tโ1 sm t =
sn i. It is well known that BS(m, n) is solvable (hence amenable) if and only if m = 1.
Proposition 6.5. For every n, the group BS(1, n) is not LERF.
18
Proof. Write: BS(1, n) = hs, t | tโ1 st = sn i and notice that tโ1 hsit = hsn i $ hsi. Thus, an
element of hsi r tโ1 hsit cannot be separated from tโ1 hsit by a homomorphism into a finite
group.
Corollary 6.6. There exist non-LERF, non-amenable A-separable groups.
Proof. Let G = BS(1, n) for some n. G is amenable hence A-separable and so, by Proposition
6.4, G โ G is A-separable. On the other hand, G โ G is not LERF since G is not LERF and
the LERF property passes to subgroups. G โ G is also not amenable since it contains a free
subgroup on two generators.
In order to complete the proofs of all the statements promised in the introduction we prove
the following:
Proposition 6.7. A group G with Kazhdan property (T) is A-separable if and only if it is
LERF. In particular the following groups are never A-separable:
โข Groups with property (T) that are not residually finite, and in particular any simple
group with property (T).
โข Irreducible lattices in higher rank semi-simple Lie groups with no compact factors
that satisfy the congruence subgroup property.
Proof. This follows directly from the fact that a transitive action G y G/H is amenable if
and only if G/H is finite. The argument for that follows from property (T). If this action
is amenable and F โ G/H is an (K, ฮต) Fรธlner set then 1F โ โ2 (G/H) is a (K, ฮต)-almost
invariant vector. Taking (K, ฮต) to be Kazhdan constants for G we can deduce the existence
of a non-zero invariant vector f โ โ2 (G/H). Since the action of G on G/H is transitive f
must be a constant function. But a non-zero constant function is in โ2 if and only if G/H is
finite.
Now if ฮ is a lattice as in the statement of the theorem it cannot be LERF because by
the strong approximation theorem [LS03, Window 9],[Nik11] every Zariski dense subgroup
has a finite index closure in the pro-congruence topology; which coincides with the profinite
topology by assumption. By Kazhdanโs theorem such a lattice has property (T) and the
statement follows.
Note that conjecturally the congruence subgroup property automatically holds for such
higher rank lattices, and this is indeed proven in many different cases. In particular the
groups SLn (Z), n โฅ 3 are good examples for generically finite groups that is not A-separable.
We conjecture further that the LERF property can never occur in a nontrivial way for
property (T) groups namely:
Conjecture 6.8. A countable group G with Kazhdan property (T) is LERF if and only if it
is finite.
It was pointed out to us by Matthew Stover that A similar question was already asked by
Long and Reid in [LR08, Question 4.5]. We are grateful to some very constructive comments
on the previous version of this paper by Mikloฬs Abeฬrt, Eli Glasner, and Matthew Stover.
J.M wishes to thank Romain Tessera for interesting conversations and suggestions about
solitary groups.
This work was written while the first author was on sabbatical at the University of Utah.
I am grateful to the math department there for their hospitality. Y.G. acknowledges support
19
from U.S. National Science Foundation grants DMS 1107452, 1107263, 1107367 โRNMS:
Geometric structures And Representation varietiesโ (the GEAR Network) that enabled this
visit. The first and second authors were both partially supported by the Israel Science
Foundation grant ISF 2095/15, and the third author was partially supported by Agence
Nationale de la Recherche grant Grupoloco (ANR-11-JS01-0008).
References
[Ago13]
Ian Agol. The virtual Haken conjecture. Doc. Math., 18:1045โ1087, 2013. With an appendix by
Agol, Daniel Groves, and Jason Manning.
[Bur71]
R. G. Burns. On finitely generated subgroups of free products. J. Austral. Math. Soc., 12:358โ364,
1971.
[GK14]
R. Grigorchuk and R. Kravchenko. On the lattice of subgroups of the lamplighter group. Internat.
J. Algebra Comput., 24(6):837โ877, 2014.
[GW03] R. I. Grigorchuk and J. S. Wilson. A structural property concerning abstract commensurability
of subgroups. J. London Math. Soc. (2), 68(3):671โ682, 2003.
[GW08] Eli Glasner and Benjamin Weiss. Topological groups with Rokhlin properties. Colloq. Math.,
110(1):51โ80, 2008.
[Hal49]
Marshall Hall, Jr. Subgroups of finite index in free groups. Canadian J. Math., 1:187โ190, 1949.
[HHLS93] Wilfrid Hodges, Ian Hodkinson, Daniel Lascar, and Saharon Shelah. The small index property for
ฯ-stable ฯ-categorical structures and for the random graph. J. London Math. Soc. (2), 48(2):204โ
218, 1993.
[Kit15]
Daniel Kitroser. Generic Actions of Countable Groups. PhD thesis, Ben-Gurion university of the
Negev, 2015.
[KR07]
Alexander S. Kechris and Christian Rosendal. Turbulence, amalgamation, and generic automorphisms of homogeneous structures. Proc. Lond. Math. Soc. (3), 94(2):302โ350, 2007.
[LR08]
D. D. Long and A. W. Reid. Subgroup separability and virtual retractions of groups. Topology,
47(3):137โ159, 2008.
[LS03]
Alexander Lubotzky and Dan Segal. Subgroup growth, volume 212 of Progress in Mathematics.
Birkhaฬuser Verlag, Basel, 2003.
[MT13]
Julien Melleray and Todor Tsankov. Generic representations of abelian groups and extreme
amenability. Israel J. Math., 198(1):129โ167, 2013.
[Nik11]
Nikolay Nikolov. Strong approximation methods. In Lectures on profinite topics in group theory,
volume 77 of London Math. Soc. Stud. Texts, pages 63โ97. Cambridge Univ. Press, Cambridge,
2011.
[Rom69] N. S. Romanovskiฤฑฬ. On the residual finiteness of free products with respect to subgroups. Izv.
Akad. Nauk SSSR Ser. Mat., 33:1324โ1329, 1969.
[Ros11a] Christian Rosendal. Finitely approximable groups and actions part I: The Ribes-Zalesskiฤฑฬ property.
J. Symbolic Logic, 76(4):1297โ1306, 2011.
[Ros11b] Christian Rosendal. Finitely approximable groups and actions part II: Generic representations.
J. Symbolic Logic, 76(4):1307โ1321, 2011.
[RR74]
M. Bhaskara Rao and K. P. S. Bhaskara Rao. A category analogue of the Hewitt-Savage zero-one
law. Proc. Amer. Math. Soc., 44:497โ499, 1974.
[Sco85]
Peter Scott. Correction to: โSubgroups of surface groups are almost geometricโ [J. London Math.
Soc. (2) 17 (1978), no. 3, 555โ565; MR0494062 (58 #12996)]. J. London Math. Soc. (2), 32(2):217โ
220, 1985.
[Wil08]
Henry Wilton. Hallโs theorem for limit groups. Geom. Funct. Anal., 18(1):271โ303, 2008.
Yair Glasner. Department of Mathematics. Ben-Gurion University of the Negev. P.O.B.
653, Beโer Sheva 84105, Israel. [email protected]
Daniel Kitroser. Department of Mathematics. Ben-Gurion University of the Negev.
P.O.B. 653, Beโer Sheva 84105, Israel. [email protected]
20
Julien Melleray. Universiteฬ Claude Bernard โ Lyon 1 . Institut Camille Jordan, CNRS
UMR 5208 . 43 boulevard du 11 novembre 1918, 69622 Villeurbanne Cedex, [email protected]
21
| 4math.GR
|
arXiv:1802.05662v1 [cs.DS] 15 Feb 2018
List Heaps
Andrew Frohmaderโ
February 2018
Abstract
This paper presents a simple extension of the binary heap, the List
Heap. We use List Heaps to demonstrate the idea of adaptive heaps:
heaps whose performance is a function of both the size of the problem
instance and the disorder of the problem instance. We focus on the presortedness of the input sequence as a measure of disorder for the problem
instance. A number of practical applications that rely on heaps deal with
input that is not random. Even random input contains presorted subsequences. Devising heaps that exploit this structure may provide a means
for improving practical performance. We present some basic empirical
tests to support this claim. Additionally, adaptive heaps may provide an
interesting direction for theoretical investigation.
1
Introduction
A heap is a data structure which holds a finite set of items. Each item is
associated with a key drawn from a totally ordered set. Heaps support the
following operations:
make heap (h):
insert (h, x, k):
find min (h):
delete min (h):
decrease key (h, x, k):
delete (h, x):
meld (h1 , h2 ):
Create and return a new, empty heap h
Insert item x with key k into heap h and return
a reference to where x is stored in h
Return a reference to where the item with the
minimum key is stored in heap h
Delete the item with the minimum key from
heap h and return it
Decrease the key of item x in heap h to k
Delete item x from heap h
Return a heap formed by taking the union of
heaps h1 and h2
The binary heap was introduced by Williams in 1964 [14]. Its simplicity and
speed have made it and its generalization, the d-array heap, a popular choice in
โ [email protected]
1
practice. It supports insert, delete min, and decrease key in O(log n) time. It
can be used to sort n items in O(n log n), which matches the worst-case lower
bound for a comparison sort. Vuilleminโs introduction of the binomial queue in
1978 [13], added meld to the list of operations supported in O(log n).
In 1984, Fibonacci heaps [8], an extension of the binomial queue, achieved
O(1) amortized time for insert, decrease key, and meld. The decrease key result
was particularly important in that it improved the worst-case bounds for a
number of well-known graph algorithms. More recently, a few structures have
achieved worst-case O(1) time for decrease key and meld, see [2] or [4]. While this
work has produced interesting and important theoretical results, it has failed to
yield a structure that consistently outperforms the original binary heap and its
variants in practice [9].
In this paper, we return to the binary heap and develop a simple extension,
the List Heap. This straightforward extension can be given adaptive operations:
operations whose performance depends not only on the problem size, but also
on the level of presortedness (disorder) in the problem instance. A bit of work
has gone into developing the theory of adaptive sorting algorithms, see [7], but
to our knowledge, this work has not migrated into the related work on heap
data structures, [3]. We believe that adaptive heaps may provide an interesting
angle for theoretical investigation. Additionally, they may provide a means of
improving the empirical performance of current heap variants. The List Heap
is a first step in this direction.
List Heaps support decrease key, insert, and delete min in O(log k), where
k is the number of lists in the List Heap. As we will show, the number of lists
in a List Heap is a function of both the size of the problem instance and the
disorder of the problem instance. We returned to the binary heap because of
its simplicity and ubiquity, but this was not without costs. List Heaps lose the
O(1) insert, decrease key, and meld of more sophisticated structures.
1.1
Preliminaries
Here we present notational conventions and definitions used through the remainder of this paper. Let X = hx1 , ..., xn i be a sequence of n distinct elements
xi from some totally ordered set. If x1 < x2 < ... < xn , X is monotonically increasing or just increasing. If x1 > x2 > ... > xn , X is monotonically decreasing
or just decreasing. A sequence is monotonic if it is either increasing or decreasing. The head of a sequence X is x1 , the tail is xn . If A is a set, then ||A||
is its cardinality. If X is a sequence, then |X| is its length. For two sequences
X = hx1 , ..., xn i and Y = hy1 , ..., ym i, their concatenation XY is the sequence
hx1 , ..., xn , y1 , ..., ym i. If the sequence X contains no elements, we write X = โ
.
A sequence obtained by deleting zero or more elements from X is called a
subsequence of X. A subsequence Y = hxi , ..., xj i of X is consecutive if the
indices i, ..., j are consecutive integers.
Let Y = hxi , ..., xj i and Z = hxk , ..., xl i be subsequences of X. The intersection of Y and Z, Y โฉ Z, is the subsequence of X obtained by deleting from
X all xh not in both Y and Z for 1 โค h โค n. Similarly, the union of Y and Z,
2
Y โช Z, is the subsequence of X obtained by deleting from X all xh not in either
Y or Z for 1 โค h โค n. Y and Z are disjoint if Y โฉ Z = โ
. Let P = {X1 , ..., Xk }
be a set of disjoint subsequences of X, if the union of all subsequences in P
equals X, then P is a partition of X.
1.2
Adaptive Sorting
This section gives a very brief review of adaptive sorting. Heaps solve a generalized sorting problem, so adaptive sorting provides some intuition for why
adaptive heaps might be useful. For a more detailed survey of adaptive sorting,
see [7] or [11].
Consider the sorting problem: take as input some arbitrary sequence X =
hx1 , ..., xn i of elements from a totally ordered set and return a permutation of
the sequence that is in increasing sorted order. Comparison based sorting has
a well-know worst-case lower bound of โฆ(n log n) [5]. However, it is clear that
this lower bound must not always hold. What if our input sequence is already
sorted? What if only one element is out of place? What if it is the concatenation
of two sorted subsequences? The lower bound can be refined if we account for
the disorder in the input sequence.
The main achievements of the adaptive sorting literature are: proposing a
variety of measures of disorder, proving new lower bounds with respect to these
measures, developing sorting algorithms whose performance matches these new
lower bounds, and developing a partial order on the set of measures.
We stop here and again direct the reader to [7] or [11] for more information.
1.3
Outline of Paper
The remainder of the paper is organized as follows. Section 2 discusses why
adaptive heaps might be worth developing. Section 3 presents List Heaps their structure and operations. Section 4 presents the results of a series of brief
empirical tests suggesting List Heaps may have promise in practice. Section 5
summarizes results obtained.
2
Adaptive Heaps
This section presents a few reasons for developing adaptive heaps.
We use the term adaptive heap loosely throughout this paper to refer to a
heap whose performance is some function of the level of presortedness (disorder) of the input sequence. There are clearly complications we are glossing over,
the largest of which is how to deal with decrease key. Further, heap problem
instances can have disorder of different types, not just related to the presortedness of the input sequence. A starting point to formalize these notions is the
adaptive sorting literature. It is fairly easy to extend the results of adaptive
sorting to arbitrary sequences of insert and delete min; decrease key may prove
more challenging.
3
Why build a heap whose performance adapts to the presortedness of the
input sequence? Just as the lower bound for sorting can be restated as a function
of the presortedness of the input sequence, the lower bound for an arbitrary heap
problem can be restated as a function of the disorder of the problem instance. As
delete min is the only operation for which O(1) performance is not available, the
disorder of the problem directly impacts the bound on delete min. Thus, we can
restate the bound on delete min as O(log k) where k is some measure of disorder
less than or equal to the number of elements in the heap. Then, intuitively, the
bound on delete min ranges from O(1) for sorted input to O(log n) for random
input.
The bounds on algorithms which rely on heaps, such as Dijkstraโs shortest
path algorithm [15], can similarly be adjusted to reflect disorder. For example,
we can restate the Dijkstra bound as O(n log k + m) where n is the number of
vertices, m is the number of edges, and k is a measure of disorder with k โค n.
The discussion above suggests that heap-based applications that have input
sequences with some level of presortedness could benefit from adaptivity. What
is less obvious is that even heap-based applications that have random input
sequence can benefit from adaptivity. Here, the benefit is not in asymptotic
performance, but in constant factors. Let X be a random sequence of n elements.
As n โ โ, the minimum number of
โ increasing subsequences into which X can
be partitioned is approximately 2 n subsequences [1]. As we will show in
Section 3.3, we can create an extension of the binary heap that is adaptive to
the minimum number of increasing subsequences. Thus, where a binary heap
constructed from X performs roughly 2 log n comparisons to delete min in the
worst-case, an adaptive heap constructed from X can perform delete min in
worst-case log n comparisons - cutting the constant factor in half.
3
List Heaps
This section introduces the List Heap. The List Heap structure closely mirrors
that of the binary heap. The hope is that this similarity makes the changes
required to add adaptivity to heaps clear. Additionally, we believe adaptive
variants of the binary heap have the greatest potential to be immediately useful
in practice. However, binary heaps are flawed as a choice in that decrease key
and insert take O(log n) time while O(1) implementations of these operations
are clearly possible. Thus the List Heap cannot be optimal on all problem
instances. We tolerate this flaw and show that we can construct a heap whose
performance is a function of a number of measures of disorder. In particular,
we will focus on developing heaps that are adaptive to runs, SU S, and Enc
(defined later). These measures of disorder partition the input into monotonic
subsequences which are particularly simple for a heap to use.
This paper focuses only on insert, delete min, and decrease key and assumes
all keys are unique. We first consider the structure of the heap. Next, we
outline operations that are adaptive with respect to runs. Finally, we present
operations that are adaptive with respect to SU S and Enc.
4
3.1
Structure
A List Heap h is an array of circular doubly linked lists of nodes, h = hl1 , ..., lk i.
Each node has a unique key associated with it. Throughout this paper we will
refer to the node x and its key interchangeably. We use the notation x(i,j) to
refer to the jth node in list li . List Heaps must maintain two invariants.
1. For any list li in heap h, the nodes of li are in increasing sorted order by
key value, li = hx(i,1) , ..., x(i,j) i, with x(i,1) < x(i,2) < ... < x(i,j) .
2. The lists are arranged in heap order in the array, that is lโi/2โ < li where
we define li < lj if x(i,1) < x(j,1) .
With the invariants above, we can view a List Heap as a standard binary
heap of elements: each binary heap element is a list and the key for each list is
the key of its head node. With this structure, the minimum node is x(1,1) - the
head node of list l1 . We will refer to l1 as the root list of the heap.
0
1
l1
1
3
2
l2
4
14
15
3
l3
2
8
9
4
l4
5
13
5
l5
6
10
6
l6
11
7
l7
7
12
16
Figure 1: The List Heap Structure
The sorted linked lists are the key feature of the List Heap. They enable us
to capture some of the existing order in the input sequence. As a result, List
Heaps can be given operations that are adaptive with respect to some measures
of disorder.
3.2
A Runs Adaptive List Heap
In this section, we present operations for a List Heap that is adaptive with
respect to runs, abbreviated RA List Heap. We show that the performance of
each heap operation is a function of the number of lists in the heap and that the
insert operation partitions the sequence of inserted elements into L lists where
L is less than or equal to the number of runs in the sequence.
5
Definition 1. A run is a consecutive decreasing subsequence of maximum
length.
A subsequence Xi = hxj , ..., xk i of X is a run if and only if j, ..., k are
consecutive integers and xjโ1 < xj > ... > xk < xk+1 . The total number
of runs in a sequence gives a measure of disorder. For example, consider the
following random sequence,
h3, 15, 14, 4, 9, 13, 5, 12, 10, 6, 1, 11, 8, 16, 2, 7i.
(1)
This sequence of sixteen elements can be partitioned into eight runs,
h3i, h15, 14, 4i, h9i, h13, 5i, h12, 10, 6, 1i, h11, 8i, h16, 2i, h7i.
(2)
A decreasing sequence will consist of just one run, an increasing sequence
of n elements will contain n runs, each with only one element. We now outline
operations for the RA List Heap.
3.2.1
Insert
To insert a new item x into heap h = hl1 , ..., lk i, do the following. If x is less than
the head node of lk , (recall that we denote this x < lk ), set i = k. Otherwise,
set i = k + 1. Then, while x < lโi/2โ , set i = โi/2โ and repeat. Once the loop
terminates, append x to the front of list li . Note that i might equal k + 1 in
which case a new empty list lk+1 will need to be created before x is appended.
Figure 1 shows the RA List Heap generated by inserting the random sequence
(1) into an empty heap.
3.2.2
Delete Min
To perform delete min on heap h, remove the head node x(1,1) from the root list
l1 and set x(1,1) to the return value of the function. If l1 is now empty, replace
it with the last list in the heap lk . If l1 is not empty, there is no need to swap it
with lk . Either way, at this point l1 might be out of heap order. Restore heap
order by calling heapify down. This is identical to the heapify operation of the
binary heap except that it manipulates entire lists instead of individual nodes.
To heapify down on a list li , compare li with its two children, l2i and l2i+1 . If
li is less than both children, do nothing. Otherwise, swap li with its smallest
child and repeat.
3.2.3
Decrease Key
To perform decrease key on a node x(i,j) , set x(i,j) โs key to the new value. Now
there are two cases.
1. If x(i,j) is a head node, that is if x(i,j) = x(i,1) , decreasing x(i,1) โs key
maintains the sorted order of the list li but may destroy the heap order
of the array. Call heapify up to restore the heap order. To heapify up a
6
list li , compare li to its parent lโi/2โ . If li < lโi/2โ swap the lists. Recurse
until heap order is restored.
2. If x(i,j) is not a head node, li may no longer be sorted. If x(i,j) is less than
its left sibling x(i,jโ1) , then the list li is out of sorted order. Remove x(i,j)
from li and reinsert x(i,j) into the List Heap using the insert routine.
3.2.4
Analysis
It is clear from their descriptions that each of these functions run in O(log k)
time, where k is the number of lists in the RA List Heap.
Theorem 1. A sequence of consecutive insert operations partitions the inserted
elements into L lists where L is less than or equal to the minimum number of
runs in the input sequence.
Proof. Say the consecutive sequence of elements inserted into heap h = hl1 , ...lk i
is X = hx1 , ..., xi , xi+1 , ...i. We must show that if xi > xi+1 , then xi+1 is
appended to an existing list. There are a couple of cases to consider.
1. If xi < lk , xi is appended to lk or one of lk โs ancestors. Now, xi+1 < xi
so xi+1 < lk and xi+1 is also appended to lk or one of lk โs ancestors.
2. If xi > lk , xi is appended to lk+1 or one of its ancestors.
If xi is appended to lk+1 , the new list lk+1 must be created. Now, xi+1
is compared first to lk+1 . Since xi+1 < xi , xi+1 < lk+1 , thus xi+1 is
appended to lk+1 or one of lk+1 โs ancestors.
If instead xi was appended to an ancestor of lk+1 , lk+1 was not created.
Then xi+1 is compared first to lk . If xi+1 > lk , xi+1 is compared to the
ancestors of lk+1 . Since xi was appended to an ancestor of lk+1 , xi+1 must
be less than one of the ancestors, so xi+1 is appended to an existing list.
3.3
An Enc Adaptive List Heap
In this section we present operations for a List Heap that is adaptive with respect
to runs, SU S, and Enc. We will abbreviate this EA List Heap. SU S is due to
Levcopoulos and Petersson [10], Enc was proposed by Skiena [12].
Definition 2. SU S (Shuffled UpSubsequences) is the minimum number of increasing subsequences into which a sequence X can be partitioned.
This differs from runs in that the subsequences are increasing and they are
not required to be consecutive. For example, the sequence (1) can be partitioned
into the following seven increasing subsequences,
h3, 15, 16i, h14i, h4, 9, 13i, h5, 12i, h10, 11i, h6, 8i, h1, 2, 7i.
(3)
This is, in fact, an optimal partition, so SU S for the sequence (1) is seven.
7
Definition 3. An encroaching set is an ordered set of increasing sequences
hE1 , ..., Ek i such that the head(Ei ) < head(Ei+1 ) and tail(Ei ) > tail(Ei+1 ) for
1 โค i < k.
Thus, the increasing sequences nest or encroach upon one another. Skiena
describes an encroaching set by an algorithm, melsort, that builds them. Given
an input sequence Y = hy1 , ..., yn i that is a permutation of an ordered set, build
the encroaching set E = hE1 , ..., Ek i as follows. If the item yi fits on either
end of one of the increasing sequences Ej , put it there. Otherwise, form a new
sequence Ek+1 . Place each item on the oldest Ej upon which it fits. We note
that this strategy bears a lot of similarities to Patience Sorting, see [1]. The
encroaching set for our example sequence (1) is,
h1, 3, 15, 16i, h2, 4, 14i, h5, 9, 13i, h6, 10, 12i, h7, 8, 11i.
(4)
Thus, Enc for the sequence (1) is five. For adaptive sorting, an Enc optimal
algorithm is also SU S optimal and runs optimal [11]. Therefore, we focus on
developing a heap which is adaptive to Enc, thereby also achieving adaptivity
with respect to SU S and runs.
Again, we emphasize that this paper treats the notation of adaptivity informally. In order to achieve some level of adaptivity with respect to Enc, we only
need to alter our insert function. The decrease key and delete min functions
can remain the same as above.
3.3.1
Insert
The insert function attempts to build an encroaching set.
We adapt Skienaโs strategy to the dynamic context of heaps where there is
not a fixed input sequence. Let y be a new item to insert and h = hl1 , ..., lk i be
the heap. In this context, lj is roughly equal to Ej of the encroaching list set.
There are three cases.
1. Try to insert y at the front of a list in h. Use binary search on the lists
to find the list that has y < li and minimizes |y โ li |. Note, the lists are
maintained in heap order, not sorted order. As a result, this binary search
may only be an approximate heuristic. Moreover, the binary search may
have failed to consider li โs direct parent. Appending y to the front of li
without checking li โs parent could destroy heap order. Thus, we must also
compare y to li โs ancestors. If y < lโi/2โ , set i = โi/2โ and repeat. If we
find an li , we are done. Otherwise, we move on to Case 2.
2. Try to insert y at the tail of a list in h. Use binary search on the tail nodes
to find the list li that has tail(li ) < y and minimizes |y โ tail(li )|. If no li
is found, go to Case 3.
3. Create a new list lk+1 with the new node as its only element and insert
the list after lk in the array.
8
3.3.2
Analysis
It is easy to see that the insert routine described above runs in O(log k), where
k is the number of lists in the EA List Heap.
Theorem 2. A sequence of n consecutive inserts to an empty EA List Heap h
partitions the input into an optimal encroaching set.
Proof. Simply observe that the insert function reduces to the list creation phase
of melsort if the heap starts empty. The only algorithmic difference between
the insert routine above and Skienaโs melsort is the addition of the heap order
check.
Corollary 2.1. Given an empty EA List Heap h, perform n consecutive insert
operations of elements with uniformly random keys. Then, as n grows large, the
expected worst-case number of comparisons to delete the minimum item from h
is less than or equal to half the the number of comparisons required by a binary
heap.
Proof. By Theorem 2, h = hl1 , ..., lk i where the lists li form an optimal encroaching set. As mentioned above, an Enc optimal partition is also SU
โ S optimal,
[11], so k is less than or equal to SU S. Now, as nโโ โ, SU S โ 2 n. [1] Thus,
k approaches something less than or equal to 2 n. The worst-case number of
comparisons for delete min on a standard binary heap is 2โlog n โ 1โ. For the
Enc Adaptive List Heap, the worst-case
number of comparisons is less than or
โ
equal to 2โlog k โ 1โ โค 2โlog (2 n) โ 1โ = โlog nโ. As n โ โ, the binary heap
bound approaches 2โlog nโ.
4
Empirical Results
We implemented both the RA List Heap and the EA List Heap for testing
purposes, but made no attempts to optimize the code. The results of a series of
brief empirical tests against a similarly unoptimized binary heap are presented
below. The tests were performed using a codebase written in C and workloads
from the 5th DIMACS challenge [6] (with modifications) and a simple sorting
routine. The results presented below are raw wallclock times divided by the
minimum time attained by any heap. Thus, 1.00 is the minimum wallclock time
and k is k times the minimum.
RA List Heap
EA List Heap
Binary Heap
Sorted Sorting
1.00
1.15
12.62
Random Sorting
2.29
1.00
2.52
Random Dijkstra
1.00
1.10
1.22
Table 1: Normalized Wallclock Times
Sorted Sorting refers to the task of inserting an n-element decreasing sorted
sequence into the heap, followed by n consecutive calls to delete min. Random
9
sorting refers to the task of inserting an n-element random sequence into the
heap, followed by n consecutive calls to delete min. The results presented for
sorting are for n = 10 million. Random Dijkstra refers to Dijkstra workloads
from DIMACS. The results presented for Dijkstra are from a strongly connected
randomly generated network with 2 million nodes and 8 million edges.
These test results suggest that some variant of the List Heap may be useful
in practice. We stress that the results presented above were derived from very
simplistic testing. They are merely suggestive that List Heaps may have potential in practice. They are in no way the final word on the empirical performance
of the List Heap.
5
Conclusion
This paper introduced adaptive heaps - heaps whose performance is a function of
both the size of the problem instance and the disorder of the problem instance.
We introduced the List Heap as a generic structure that can be endowed with
adaptive operations. Finally, we presented operations for the List Heap that
are adaptive with respect to a number of measures of disorder on the input
sequence.
The discussion within this paper has been relatively informal and the List
Heap introduced is far from theoretically optimal. If there is interest in this
topic, there are a number of directions from here. Additional empirical testing
of the List Heap is needed. We presented two insert functions for the List
Heap, but there are clearly more (d-array, increasing/decreasing runs, etc.).
The optimal choice likely depends on the intended application. If decrease key
is not needed, List Heaps could be implemented entirely with arrays. On the
theory side, the List Heap and discussion of adaptivity included in this paper
leaves much to be desired. We are working on formalizing some notions of
adaptivity and have developed a variant of the Fibonacci Heap that is closer
to optimal from a theoretical perspective. Modification to other existing heap
variants may provide even better results.
References
[1] David Aldous and Persi Diaconis. Longest increasing subsequences: From
patience sorting to the baik-deift-johansson theorem. Bull. Amer. Math.
Soc, 36:413โ432, 1999.
[2] Gerth Stรธlting Brodal. Worst-case efficient priority queues. In Proceedings
of the Seventh Annual ACM-SIAM Symposium on Discrete Algorithms,
SODA โ96, pages 52โ58, Philadelphia, PA, USA, 1996. Society for Industrial
and Applied Mathematics.
[3] Gerth Stรธlting Brodal. A Survey on Priority Queues, pages 150โ163.
Springer Berlin Heidelberg, Berlin, Heidelberg, 2013.
10
[4] Gerth Stรธlting Brodal, George Lagogiannis, and Robert E. Tarjan. Strict
fibonacci heaps. In Proceedings of the Forty-fourth Annual ACM Symposium on Theory of Computing, STOC โ12, pages 1177โ1184, New York,
NY, USA, 2012. ACM.
[5] Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, and Clifford
Stein. Introduction to Algorithms, Third Edition. The MIT Press, 3rd
edition, 2009.
[6] DIMACS.
Dimacs
5th
challenge:
https://app.cs.amherst.edu/ ccmcgeoch/challenge5/.
Priority
queues.
[7] Vladmir Estivill-Castro and Derick Wood. A survey of adaptive sorting
algorithms. ACM Comput. Surv., 24(4):441โ476, December 1992.
[8] Michael L. Fredman and Robert Endre Tarjan. Fibonacci heaps and their
uses in improved network optimization algorithms. J. ACM, 34(3):596โ615,
July 1987.
[9] Daniel H. Larkin, Siddhartha Sen, and Robert E. Tarjan. A back-to-basics
empirical study of priority queues. In Proceedings of the Meeting on Algorithm Engineering & Expermiments, pages 61โ72, Philadelphia, PA, USA,
2014. Society for Industrial and Applied Mathematics.
[10] C. Levcopoulos and O. Petersson. Sorting shuffled monotone sequences.
Information and Computation, 112(1):37 โ 50, 1994.
[11] Ola Petersson and Alistair Moffat. A framework for adaptive sorting. Discrete Applied Mathematics, 59(2):153 โ 179, 1995.
[12] Steven S. Skiena. Encroaching lists as a measure of presortedness. BIT
Numerical Mathematics, 28(4):775โ784, Dec 1988.
[13] Jean Vuillemin. A data structure for manipulating priority queues. Commun. ACM, 21(4):309โ315, April 1978.
[14] John William Joseph Williams. Algorithm 232 - heapsort. Commun. ACM,
7(6):347โ349, June 1964.
[15] Edsger Wybe. Dijkstra. A note on two problems in connexion with graphs.
1:269โ271, 12 1959.
11
| 8cs.DS
|
Balancing Explicability and Explanations
Emergent Behaviors in Human-Aware Planning
Tathagata Chakraborti, Sarath Sreedharan, Subbarao Kambhampatiโ
School of Computing, Informatics, and Decision Systems Engineering
Arizona State University, Tempe, AZ 85281 USA
tchakra2,ssreedh3,[email protected]
arXiv:1708.00543v2 [cs.AI] 3 Feb 2018
ABSTRACT
Human aware planning requires an agent to be aware of the intentions, capabilities and mental model of the human in the loop
during its decision process. This can involve generating plans that
are explicable to a human observer as well as the ability to provide
explanations when such plans cannot be generated. In this paper,
we bring these two concepts together and show how an agent can
account for both these needs and achieve a trade-off during the plan
generation process itself by means of a model-space search method
MEGA. This in effect provides a comprehensive perspective of what it
means for a decision-making agent to be โhuman-awareโ by bringing together existing principles of planning under the umbrella
of a single plan generation process. We situate our discussion in
the context of recent work on explicable planning and explanation
generation, and illustrate these concepts in modified versions of
two well-known planning domains, as well as in a demonstration
of a robot involved in a typical search and reconnaissance task with
an external supervisor. Human factor studies in the latter highlight
the usefulness of the proposed approaches.
CCS CONCEPTS
โข Computing methodologies โ Artificial intelligence; Planning and scheduling; Cognitive robotics; โข Human-centered
computing; โข Computer systems organization โ Robotics;
KEYWORDS
Human-Aware Planning, Explicable Planning, Plan Explanations,
Explanation as Model Reconciliation, Minimal Explanations.
1
INTRODUCTION
Mh
first two authors contributed equally.
Mh
the robot instead attempts to update the humanโs mental model to
cR in which the robotโs original plan is
an intermediate model M
h
equivalent (with respect to a metric such as cost or similarity) to
โ
โ
the optimal and hence explicable, i.e. ฯ M
R โก ฯ cR .
Mh
Until now, these two processes of plan explanations and explicability have remained separate in so far as their role in an agentโs
deliberative process is considered - i.e. a planner either generates an
explicable plan to the best of its ability or it produces explanations
of its plans where they required. However, there may be situations
where a combination of both provide a much better course of action
โ if the expected human plan is too costly in the plannerโs model
(e.g. the human might not be aware of some safety constraints) or
the cost of communication overhead for explanations is too high
(e.g. limited communication bandwidth). Consider, for example,
a human working with a robot that has just received a software
update allowing it to perform new complex maneuvers. Instead of
directly trying to conceive all sorts of new interactions right away
that might end up spooking the user, the robot could instead reveal
only certain parts of the new model while still using its older model
(even though suboptimal) for the rest of the interactions so as to
slowly reconcile the drifted model of the user. This is the focus of
the current paper where we try to attain the sweet spot between
plan explanations and explicability.
1.1
It is often useful for a planning agent while interacting with a human
in the loop to use, in the process of its deliberation, not only the
model M R of the task it has on its own, but also the model MhR
that the human thinks it has (refer to Figure 1a). This mental model
of the human [9] is in addition to the physical model of the human.
This is, in essence, the fundamental thesis of the recent works on
plan explanations [10] and explicable planning [35], summarized
under the umbrella of multi-model planning, and is in addition to the
originally studied human-aware planning (HAP) problems where
actions of the human (and hence the actual human model and the
robotโs belief of it) are also involved in the planning process. The
need for explicable planning or plan explanations in fact occur
when these two models โ M R and MhR โ diverge. This means that
โ
โ
the optimal plans in the respective models โ ฯ M
R and ฯ
R โ may
โ The
not be the same and hence optimal behavior of the robot in its own
model is inexplicable to the human in the loop. In the explicable
planning process, the robot produces a plan ฯb that is closer to the
humanโs expected plan, i.e. ฯb โ ฯ โ R . In the explanation process,
Related Work
As AI agents become pervasive in our daily lives, the need for such
agents to be cognizant of the beliefs and expectations of the humans in their environment has been well documented [21]. From
the perspective of task planning, depending on the extent of involvement of the human in the life cycle of a plan, work in this
direction has ranged on a spectrum of โhuman-aware planningโ
[2, 3, 8, 11โ13, 22, 33] where a robot passively tries to account for the
plans of humans cohabiting its workspace, to โexplicable planningโ
[14, 23, 34, 35] where a robot generates plans that are explicable or
predictable to a human observer, to โplan explanationsโ [10, 17, 24]
where the agent uses explanations to bring the human (who may
have a different understanding of the agentโs abilities) on to the
same page, to โhuman-in-the-loop planningโ [1, 4, 16, 25, 30] in
general where humans and planners are participating in the plan
generation and/or execution process together.
Technical Report, 2018, ASU
Tathagata Chakraborti, Sarath Sreedharan, Subbarao Kambhampati
(a) The evolving scope of Human-Aware Planning (HAP)
(b) A Subsumption Architecture for HAP
Figure 1: The expanding scope of human-aware planning (HAP) acknowledging the need to account for the mental model
of the human in the loop in the deliberative process of an autonomous agent. The planner can, for example, choose to bring
the humanโs model closer to the ground truth using explanations via a process called model reconciliation (MRP) so that an
otherwise inexplicable plan makes sense in the humanโs updated model or it can compute explicable plans which are closer
to the humanโs expectation. These capabilities can be stacked to realize more and more complex behavior โ in this paper we
will concentrate on the explicability versus explanation trade-off as a form of argumentation during human-aware planning.
1.1.1 The Evolving Scope of Human-Aware Planning. The ongoing efforts to make planning more โhuman-awareโ is illustrated in
Figure 1a โ initial work on this topic had largely focused on incorporating an agentโs understanding of the human model M H into its
decision making process. Since then the importance of considering
the humanโs understanding MhR of the agentโs actual model M R
in the planning process has also been acknowledged, sometimes
implicitly [3] and later explicitly [10, 35]. These considerations engender interesting behaviors both in the space of plans and models.
For example, in the model space, the modifications to the human
mental model MhR is used for explanations in [10] while reasoning
over the actual model M H can reveal interesting behavior by affecting the belief state of the human, such as in planning for serendipity
[8]. In the plan space, a human-aware agent can use M H and MhR
to compute joint plans for teamwork [32] or generate behavior
that conforms to the humanโs preferences [11, 22] and expectations
[23, 34, 35]. From the point of view of the planner, this is, in a sense,
an asymmetric epistemic setting with single-level nested beliefs
over its models. Indeed, existing literature on epistemic reasoning
[19, 27, 28] can also provide interesting insights in the planning
process of an agent in these settings.
1.1.2 A Subsumption Architecture for HAP. These different forms
of behavior can be composed to form more and more sophisticated
forms of human-aware behavior. This hierarchical composition of
behaviors can be viewed in the form of a subsumption architecture
for human-aware planning, similar in motivation to [7]. This is illustrated in Figure 1b. The basic reasoning engines are the Plan and
MRP (Model Reconciliation) modules. The former accepts model(s)
of planning problems and produces a plan, the latter accepts the
same and an produces a new model. The former operates in plan
space and gives rise to classical, joint and explicable planning depending on the models it is operating on, while the latter operates
in model space to produce explanations and belief shaping behavior. These are then composed to form argumentation modules for
trading of explanations and explicability (which is the topic of the
current paper) and human-aware planning in general.
1.1.3 The Explicability-Explanation Trade-off. From the perspective of design of autonomy, this trade-off has two important implications โ (1) the agent can now not only explain but also plan
in the multi-model setting with the trade-off between compromise
on its optimality and possible explanations in mind; and (2) the
argumentation process is known to be a crucial function of the
reasoning capabilities of humans [26], and now by extension of autonomous agents as well, as a result of algorithms we develop here
to incorporate the explanation generation process into the agentโs
decision making process itself. General argumentation frameworks
Balancing Explicability and Explanations
for resolving disputes over plans have indeed been explored before [6, 15]. Our work can be seen as the specific case where the
argumentation process is over a set of constraints that prove the
correctness and quality of plans by considering the cost of the
argument specifically as it relate to the trade-off in plan quality
and the cost of explaining that plan. This is the first of its kind
algorithm that can achieve this in the scope of plan explanations
and explicable in presence of model differences with the human.
HUMAN-AWARE PLANNING REVISITED
The problem formulation closely follows that introduced in [10],
reproduced here for clarity of methods built on the same definitions.
A Classical Planning Problem. is a tuple M = โจD, I, Gโฉ 1 with
domain D = โจF , Aโฉ - where F is a set of fluents that define a state
s โ F , and A is a set of actions - and initial and goal states I, G โ F .
Action a โ A is a tuple โจc a , pre(a), effยฑ (a)โฉ where c a is the cost, and
pre(a), effยฑ (a) โ F are the preconditions and add/delete effects, i.e.
ฮด M (s, a) |= โฅ if s ฬธ |= pre(a); else ฮด M (s, a) |= s โช eff+ (a) \ effโ (a)
where ฮด M (ยท) is the transition function. The cumulative transition
function is ฮด M (s, โจa 1 , a 2 , . . . , an โฉ) = ฮด M (ฮด M (s, a 1 ), โจa 2 , . . . , an โฉ).
The solution to the planning problem is a sequence of actions or
a (satisficing) plan ฯ = โจa 1 , a 2 , . . . , an โฉ such that ฮด M (I, ฯ ) |= G.
ร
The cost of a plan ฯ is C(ฯ , M) = a โฯ c a if ฮด M (I, ฯ ) |= G; โ
otherwise. The cheapest plan ฯ โ = arg minฯ C(ฯ , M) is the (cost)
optimal plan. We refer to this cost as M as C โM .
A Human-Aware Planning (HAP) Problem. is given by the tuple
ฮจ = โจM R , M H , MhR โฉ where M R = โจD R , I R , G R โฉ is the plannerโs
model of a planning problem, while M H = โจD H , I H , G H โฉ and
MhR = โจDhR , IhR , GhR โฉ are respectively the plannerโs estimate of the
humanโs model and the humanโs understanding of its own model.
The solution to the human-aware planning problem is a joint plan
[8] ฯ = โจa 1 , a 2 , . . . , an โฉ; ai โ {D R โช D rH } such that ฮด ฮจ (I R โช
IrH , ฯ ) |= G R โช GrH . The robotโs component in the plan is referred
to as ฯ (R) = โจai | ai โ ฯ โง D R โฉ. For the purposes of this paper, we
ignore the robotโs belief of the human model, i.e. MrH = โจ{}, {}, {}โฉ
โ in effect, making the human an observer only or a passive consumer of the plan โ and focus instead on the challenges involves in
planning with the humanโs model of the planner. Planning with the
human model has indeed been studied extensively in the literature,
as noted above, and this assumption does not change in any way
the relevance of the work here. Specifically, the following concepts
are built on top of the joint planning problem โ e.g. an explicable
plan in this paper would, in the general sense, correspond to the
robotโs component in the joint plan being explicable to the human
in the loop. Thus, for the purposes of this paper, we have ฯ (R) โก ฯ ;
without loss of generality, we focus on the simplified setting with
only the model of the planner and the humanโs approximation of it.
Explicable Planning
In โexplicable planning" a solution to the human-aware planning
problem is a plan ฯ such that (1) it is executable (but may no longer
Technical Report, 2018, ASU
be optimal) in the robotโs model but is (2) โcloserโ to the expected
plan in the humanโs model, given a particular planning problem โ
(1) ฮด M R (I R , ฯ ) |= G R ; and
(2) C(ฯ , MhR ) โ C โ R .
Mh
โClosenessโ or distance to the expected plan is modeled here in
terms of cost optimality, but in general this can be any preference
metric like plan similarity. In existing literature [23, 34, 35] this has
been usually achieved by modifying the search process so that the
heuristic that guides the search is driven by the robotโs knowledge
of the humanโs mental model. Such a heuristic can be either derived
directly [23] from the humanโs model (if it is known) or learned
[35] through interactions in the form of affinity functions between
plans and their purported goals.
Plan Explanations
The other approach would be to (1) compute optimal plans in the
plannerโs model as usual, but also provide an explanation (2) in the
form of a model update to the human so that (3) the same plan is
now also optimal in the humanโs updated model of the problem.
Thus, a solution involves a plan ฯ and an explanation E such that โ
(1) C(ฯ , M R ) = C โM R ;
cR โโ M R + E; and
(2) M
h
Mh
Note that here a model update, as indicated by the + operator may
include a correction to the belief (goals or state information) as
well as information pertaining to the action model itself. In [10]
the authors explored various ways of generating such solutions
โ including methods to minimize the lengths of the explanations
given as a result. However, this was done in an after-the-fact fashion, i.e. the optimal plan was already generated and it was just a
matter of finding the best explanation for it. This not only ignores
the possibility of finding better plans (that are equally optimal)
with smaller explanations, but also avenues of compromise in a
manner we discussed previously whereby the planner sacrifices its
optimality to further reduce overhead in the explanation process.
MEGA
We bring the notions of explicability and explanations together in
a novel planning technique MEGA (Multi-model Explanation Generation Algorithm) that trades off the relative cost of explicability to
providing explanations during the plan generation process itself2 .
The output of MEGA is a plan ฯ and an explanation E such that (1)
ฯ is executable in the robotโs model, and with the explanation (2)
in the form of model updates it is (3) optimal in the updated human
model while (4) the cost (length) of the explanations, and the cost
of deviation from optimality in its own model to be explicable to
the human, is traded off according to a constant ฮฑ โ
(1) ฮด M R (I R , ฯ ) |= G R ;
cR โโ M R + E;
(2) M
h
h
cR ) = C โ ; and
(3) C(ฯ , M
h
2 As
1 Note
that the โmodel of a planning problemโ includes the action model as well as the
initial and goal states of an agent.
h
cR ) = C โ .
(3) C(ฯ , M
h
cR
cR
M
h
in [10] we assume that the human mental model is known and has the same
computation power ([10] also suggests possible ways to address these issues, the same
discussions apply here as well). Also refer to the discussion on model learning later.
Technical Report, 2018, ASU
Tathagata Chakraborti, Sarath Sreedharan, Subbarao Kambhampati
(4) ฯ = arg minฯ { |E | + ฮฑ ร | C(ฯ , M R ) โ C โM R | }.
Clearly, with higher values of ฮฑ the planner will produce plans
that require more explanation, with lower ฮฑ it will generate more
explicable plans. Thus, with the help of this hyperparameter ฮฑ, an
autonomous agent can deliberate over the trade-off in the costs it
incurs in being explicable to the human (second minimizing term
in (4)) versus explaining its decisions (first minimizing term in (4)).
Note that this trade-off is irrespective of the cognitive burden of
those decisions on the human in the loop. For example, for a robot in
a collapsed building during a search and rescue task, or the rover on
Mars, may have limited bandwidth for communication and hence
prefer to be explicable instead instead.
We employ a model space Aโ search (Algorithm 1) to compute
the expected plan and explanations for a given value of ฮฑ. Similar to
[10] we define a state representation over planning problems with
a mapping function ฮ : a M 7โ F which represents a planning
problem by transforming every condition in it into a predicate. The
set ฮ of actions contains unit model change actions ฮป : F โ F
which make a single change to a domain at a time.
We start by initializing the min node tuple (N ) with the human
mental model and an empty explanation. For each new possible
model we come across during our model space search, we test if
the objective value of the new node is smaller than the current min
node. We stop the search once we identify a model that is capable
of producing a plan that is also optimal in the robotโs own model.
This is different from the stopping condition used by the original
MCE-search3 in [10], where the authors are just trying to identify
the first node where the given plan is optimal.
Algorithm 1 MEGA
1:
2:
3:
4:
5:
6:
7:
8:
9:
Mh
This is beyond what is offered by the model reconciliation search
in [10], which only computes the smallest explanation given as a
plan that is optimal in the plannerโs model.
Property 2. ฮฑ = | M R โ MhR | yields the most optimal plan in
the plannerโs model along with the minimal explanation possible
given a human-aware planning problem.
This is easy to see, since with โE, |E | โค | M R โ MhR |, the latter
being the total model difference, the penalty for departure from
explicable plans is high enough that the planner must choose from
possible explanations only (note that the explicability penalty is
cR ) =
always positive until the search hits the nodes with C(ฯ , M
h
โ
C cR , at which point onwards the penalty is exactly zero). In general
Mh
this works for any ฮฑ โฅ |MCE| but since an MCE will only be known
retrospectively after the search is complete, the above condition
suffices since the entire model difference is known up front and is
the largest possible explanation in the worst case.
3 An
MCE or a minimally complete explanation is the shortest model update so that a
given plan optimal in the robot model is also optimal in the updated human model.
โท Closed list
โท Node with minimum objective value
โท Optimal plan being explained
โท Plan expected by human
Nmin โ โจMhR , { }โฉ
ฯ Rโ โ ฯ โ
ฯhR โ ฯ s.t. C(ฯ, MhR ) = C โ R
M
h
10:
fringe.push(โจM R , { }โฉ, priority = 0)
11:
while True do
h
12:
c E โฉ, c โ fringe.pop( M)
c
โจ M,
13:
c E โฉ) โค OBJ_VAL(Nmin ) then
if OBJ_VAL(โจ M,
14:
15:
16:
17:
18:
19:
20:
21:
22:
โท Update min node
c Eโฉ
Nmin โ โจ M,
if C(ฯ โ , M R ) = C โ R then
c
M
M
โจMmin , Emin โฉ โ Nmin
, Emin โฉ
min
โท If ฯ โc is optimal in M R
return โจฯ M
M
else
c
c_list โ c_list โช M
c \ ฮ(M R ) do
for f โ ฮ( M)
c}, { }, {f }โฉ
ฮป โ โจ1, { M
c ฮป) < c_list then
if ฮด R
(ฮ( M),
M , MR
โท Models that satisfy condition 1
c
โท Removes f from M
h
23:
fringe.push(โจฮด
24:
c do
for f โ ฮ(M R ) \ ฮ( M)
25:
26:
MR , MR
h
c ฮป), E โช ฮป โฉ, c + 1)
(ฮ( M),
c}, {f }, { }โฉ
ฮป โ โจ1, { M
c ฮป) < c_list then
if ฮด R
(ฮ( M),
M , MR
โท Models that satisfy condition 2
c
โท Adds f to M
h
27:
28:
29:
Property 1. MEGA yields the smallest possible explanation for a
given human-aware planning problem.
This means that with a high enough ฮฑ (see below) the algorithm is
guaranteed to compute the best possible plan for the planner as well
as the smallest explanation associated with it. This is by construction of the search process itself, i.e. the search only terminates after
cR ) = C โ have been exhausted.
the all the nodes that allow C(ฯ , M
h
cR
procedure MEGA-Search
Input: HAP ฮจ = โจM R , M R โฉ , ฮฑ
h
Output: Plan ฯ and Explanation E
Procedure:
fringe โ Priority_Queue()
c_list โ {}
fringe.push(โจฮด
MR , MR
h
c ฮป), E โช ฮป โฉ, c + 1)
(ฮ( M),
c E โฉ)
procedure OBJ_VAL( โจ M,
return | E | + ฮฑ ร | C(ฯ โ , M R ) โ C โ R |
c
M
M
Property 3. ฮฑ = 0 yields the most explicable plan.
Under this condition, the planner has to minimize the cost of explanations only. Of course, at this point it will produce the plan that
requires the shortest explanation, and hence the most explicable
plan. Note that this is distinct from just computing the optimal plan
in the humanโs model, since such a plan may not be executable in
the plannerโs model so that some explanations are required even in
the worst case. This is also a welcome additions to the explicability only view of plan generation introduced in [23, 34, 35], where
the human model only also guides the plan generation process
instead of doing so directly, though none of these works provided
any insight into how to make the remainder of the model reconciliation possible in such cases, as done here with the explanations
associated with the generated plans.
Property 4. MEGA-search is required only once per problem, and
is independent of ฮฑ.
Algorithm 1 terminates only after all the nodes containing a minimally complete explanation3 have been explored. This means that
for different values of ฮฑ, the agent only needs to post-process the
nodes with the new objective function in mind. Thus, a large part of
the reasoning process for a particular problem can be pre-computed.
2
EVALUATIONS
We will now provide internal evaluations of MEGA in modified
versions of two well-known IPC domains Rover and Barman [20]
Balancing Explicability and Explanations
Domain Name
Problem
โ=2
Technical Report, 2018, ASU
โ=7
โ = 10
|E |
Time (secs)
|E |
Time (secs)
|E |
Time (secs)
Rover
p1
p2
p3
0
1
0
1.22
1.79
8.35
1
5
2
5.83
125.64
10.46
3
6
3
143.84
1061.82
53.22
Barman
p1
p2
p3
2
2
2
18.70
2.43
45.32
6
4
5
163.94
57.83
4183.55
6
6
6
5576.06
953.47
5061.50
Table 1: Computation time for human-aware plans in Rover
and Barman domains along with the length of explanations.
demonstrating the trade-off in the cost and computation time of
plans with respect to varying size of the model difference and the
hyper-parameter ฮฑ and follow it up with a demonstration of MEGA in
action on a robot in a search and reconnaissance domain. Finally,
we will report on human factor studies on how this trade-off is received by users. The code and the domain models will be available
after the double-blind review process is over.
2.1
(a) The Rover (Meets a Martian) Domain
Empirical Results: Cost Trade-off
The value of ฮฑ determines how much an agent is willing to sacrifice its own optimality versus the cost of explaining a (perceived)
suboptimal plan to the human. In the following, we illustrate this
trade-off on modified versions of two well-known IPC domains.
2.1.1 The Rover (Meets a Martian) Domain. Here the Mars Rover
has a model as described in the IPC domain, but has gone an update
whereby it can carry all the rock and soil samples needed for a
mission at the same time. This means that it does not need to empty
the store before collecting new rock and soil samples anymore so
that the new action definitions for sample_soil and sample_rock
no longer contain the precondition (empty ?s).
During its mission it runs across a Martian who is unaware of
the robotโs expanded storage capacity, and has an older, extremely
cautious, model of the rover it has learned while spying on it from its
cave. It believes that any time we collect a rock sample, we also need
to collect a soil sample and need to communicate this information
to the lander. It also believes that before the rover can perform
take_image action, it needs to send the soil data and rock data
of the waypoint from where it is taking the image. Clearly, if the
rover was to follow this model in order not to spook the Martians, it
will end up spending a lot of time performing unnecessary actions
(like dropping old samples and collecting unnecessary samples). For
example, if the rover is to communicate an image of an objective
objective2, all it needs to do is move to a waypoint (waypoint3)
from where objective2 is visible and perform the action โ
(take_image waypoint3 objective2 camera0 high_res)
If the rover was to produce a plan that better represents the Martianโs expectations, it would look like โ
(sample_soil store waypoint3)
(communicate_soil_data general waypoint3 waypoint3 waypoint0)
(drop_off store)
(sample_rock store waypoint3)
(communicate_rock_data general waypoint3 waypoint3 waypoint0)
(take_image waypoint3 objective1 camera0 high_res)
(b) The Barman (in a Bar) Domain
Figure 2: Trade-off between explicability versus explanation
cost for plans produced at different values of ฮฑ.
Now if the rover chose to directly use an MCE it could end
up explaining up to six different model differences based on the
problem and the plan under execution. In some case, this may be
acceptable, but in others, it may make more sense for the rover to
bear the extra cost rather than laboriously walking through all the
updates with an impatient Martian. MEGA lets us naturally model
these scenarios through the use of the ฮฑ parameter โ the rover
would choose to execute the Martianโs expected optimal plan when
the ฮฑ parameter is set to zero (which means the rover does not care
about the extra cost it needs to incur to ensure that the plan makes
sense to the Martian with the least explaining involved).
Figure 2 shows how the explicability cost and explanation cost
varies for three typical problem instances in this domain. The algorithm starts converging to the smallest possible MCE, when ฮฑ is
set to one. For smaller ฮฑ, MEGA chooses to save explanation costs
by choosing more expensive (and explicable) plans.
2.1.2 The Barman (in a Bar) Domain. Here, the brand new twohanded Barman robot is wowing onlookers with its single-handed
Technical Report, 2018, ASU
Tathagata Chakraborti, Sarath Sreedharan, Subbarao Kambhampati
skills, even as its admirers who may be unsure of its capabilities expect, much like in the original IPC domain, that it is required to have
one hand free to perform actions like fill-shot, refill-shot,
shake etc. This means that to make a single shot of a cocktail with
two shots of the same ingredient with three shots and one shaker,
the human expects the robot to execute the following plan โ
(fill-shot shot2 ingredient2 left right dispenser2)
(pour-shot-to-used-shaker shot2 ingredient3 shaker1 left l1 l2)
(refill-shot shot2 ingredient3 left right dispenser3)
(pour-shot-to-used-shaker shot2 ingredient3 shaker1 left l1 l2)
(leave left shot2)
(grasp left shaker1)
The robot can, however, directly start by picking both the shot
and the shaker and does not need to put either of them down
while making the cocktail. Similar to the Rover domain, we again
illustrate on three typical problems from the barman domain (Figure
2) how at lower values of ฮฑ the robot choose to perform plans that
require less explanation. As ฮฑ increases the algorithm produces
plans that require larger explanations with the explanations finally
converging at the smallest MCE required for that problem.
2.2
Empirical Results: Computation Time
Contrary to classical notions of planning that occurs in state or
plan space, we are now planning in the model space, i.e. every node
in the search tree is a new planning problem. As seen in Table 1 this
becomes quite time consuming with increasing number of model
differences between the human and the robot, even as there are
significant gains to be had in terms of minimality of explanations,
and the reduction in cost of explicable plans as a result of it. This
motivates the need for developing approximations and heuristics
[10] for the search for multi-model explanations.
2.3
Demonstration: The USAR Domain
We first demonstrate MEGA on a robot performing an Urban Search
And Reconnaissance (USAR) task โ here a remote robot is put into
disaster response operation often controlled partly or fully by an
external human commander. This is a typical USAR setup [5], where
the robotโs job is to infiltrate areas that may be otherwise harmful
to humans, and report on its surroundings as and when required /
instructed by the external. The external usually has a map of the
environment, but this map is no longer accurate in a disaster setting
- e.g. new paths may have opened up, or older paths may no longer
be available, due to rubble from collapsed structures like walls
and doors. The robot (internal) however may not need to inform
the external of all these changes so as not to cause information
overload of the commander who may be otherwise engaged in
orchestrating the entire operation. This calls for an instantiation of
the MEGA algorithm where the model differences are contributed to
by changes in the map, i.e. the initial state of the planning problem
(the human model has the original unaffected model of the world).
Figure 3 shows a relevant section of the map of the environment
where this whole scenario plays out. The orange marks indicate
rubble that has blocked a passage, while the green marks indicate
collapsed walls. The robot (Fetch), currently located at the position
marked with a blue O, is tasked with taking a picture at location
marked with an orange O in the figure. The external commanderโs
Figure 3: A typical search and reconnaissance scenario with
an internal semi-autonomous agent (robot) and an external
supervisor (human) โ a video demonstration can be accessed
at https://www.youtube.com/watch?v=u_t1TQotzo4.
expects the robot to take the path shown in red, which is no longer
possible. The robot armed with MEGA has two choices โ it can either
follow the green path and explain the revealed passageway due to
the collapse, or compromise on its optimal path, clear the rubble and
proceed along the blue path. A video demonstration of the scenario
can be viewed at https:// www.youtube.com/ watch?v=u_t1TQotzo4.
The first part of the video demonstrates the plan generated by
MEGA for low ฮฑ values. As expected, it chooses the blue path that
requires the least amount of explanation, and is thus the most
explicable plan. In fact, the robot only needs to explain a single
initial state change to make this plan optimal, namely โ
Explanation >> remove-has-initial-state-clear_path p1 p8
This is also an instance where the plan closest to the human expectation, i.e. the most explicable plan, still requires an explanation,
Balancing Explicability and Explanations
Technical Report, 2018, ASU
which previous approaches in the literature cannot provide. Moreover, in order to follow this plan, the robot must perform the costly
clear_passage p2 p3 action to traverse the corridor between p2
and p3, which it could have avoided in its optimal plan (shown in
green on the map). Indeed, MEGA switches to the robotโs optimal
plan for higher values of ฮฑ along with the following explanation โ
Explanation >> add-has-initial-state-clear_path p6 p7
Explanation >> add-has-initial-state-clear_path p7 p5
Explanation >> remove-has-initial-state-clear_path p1 p8
By providing this explanation, the robot is able to convey to the
human the optimality of the current plan as well as the infeasibility
of the humanโs expected plan (shown in red).
2.4
Human Factors Evaluations
Finally, we will now use the above search and reconnaissance domain to analyze how humans respond to the explicability versus
explanations trade-off. This is done by exposing the external commanderโs interface to participants who get to analyze plans in a
mock USAR scenario. The participants were incentivized to make
sure that the explanation does indeed help them understand the
optimality of the plans in question by formulating the interaction in
the form of a game. This is to make sure that participants were sufficiently invested in the outcome as well as mimic the high-stakes
nature of USAR settings to accurately evaluate the explanations.
Figure 4 shows a screenshot of the interface which displays to
each participant an initial map (which they are told may differ
from the robotโs actual map), the starting point and the goal. A
plan is illustrated in the form of a series of paths through various
waypoints highlighted on the map. The participant has to identify
if the plan shown is optimal. If the player is unsure, they can ask
for an explanation. The explanation is provided to the participant
in the form of a set of model changes in the playerโs map.
The scoring scheme for the game is as follows. Each player
is awarded 50 points for correctly identifying the plan as either
optimal or satisficing. Incorrectly identification costs them 20 points.
Every request for explanation further costs them 5 points, while
skipping a map does not result in any penalty. The participants
were additionally told that selecting an inexecutable plan as either
feasible or optimal would result in a penalty of 400 points. Even
though there were no actual incorrect plans in the dataset, this
information was provided to deter participants from taking chances
with plans they did not understand well.
Each participant was paid $10 dollars and received additional
bonuses based on the following payment scheme โ
-
Scores higher than or equal to 540 were paid $10.
Scores higher than 540 and 440 were paid $7.
Scores higher than 440 and 340 were paid $5.
Scores higher than 340 and 240 were paid $3.
Scores below 240 received no bonuses.
The scoring systems for the game was designed to make sure โ
โข Participants should only ask for an explanation when they
are unsure about the quality of the plan (due to small negative points on explanations).
Figure 4: Interface to the external commander in a mock
search and reconnaissance study.
Figure 5: Responses to explicable plans versus balanced or
robot optimal plans with explanations.
Figure 6: Click-through rates for explanations.
โข Participants are incentivized to identify the feasibility and
optimality of the given plan correctly (large reward and
penalty on doing this wrongly).
Each participant was shown a total of 12 maps. For 6 of the 12
maps, the participant was assigned the optimal robot plan, and
when they asked for an explanation, they were randomly shown
different types of explanations as introduced in [10]. For the rest of
the maps, in place of the robotโs optimal plan, participants could potentially be assigned a plan that is optimal in the human model (i.e.
an explicable plan) with no explanation or somewhere in between
(i.e. the balanced plan) with a shorter explanation. Note that out
of the 6 maps, only 3 had both balanced plans as well as explicable
plans, the other 3 either had a balanced plan or the optimal human
plan. In total, we had 27 participants for the study, including 4
female and 22 male participants between the age range of 19-31 (1
participant did not reveal their demographic).
Technical Report, 2018, ASU
Optimal Plan
| E | C(ฯ, M R )
2.5
5.5
Balanced Plan
| E | C(ฯ, M R )
1
8.5
Tathagata Chakraborti, Sarath Sreedharan, Subbarao Kambhampati
Explicable Plan
| E | C(ฯ, M R )
16
Table 2: Statistics of explicability versus explanation tradeoff with respect to explanation length and plan cost.
Figure 5 shows how people responded to the different kinds of
explanations / plans. These results are from 382 problem instances
that required explanations, and 25 and 40 instances that contained
balanced and explicable plans respectively. From the perspective
of the human, the balanced plan and the robot optimal plan do not
make any difference since both of them appear suboptimal. This is
evident from the fact that the click-through rate for explanations in
these two conditions are similar. However, the rate of explanations
is significantly less in case of explicable plans as desired.
Table 2 shows the statistics of the explanations / plans. These
results are from 124 problem instances that required minimal explanations as per [10], and 25 and 40 instances that contained balanced
and explicable plans respectively, as before. As desired, the robot
gains in length of explanations but loses out in cost of plans produced as it progresses along the spectrum of optimal to explicable
plans. Thus, while Table 2 demonstrates the cost of explanation
versus explicability trade-off from the robotโs point of view, Figure 5
shows how this trade-off is perceived from the humanโs perspective.
It is interesting to see that in Figure 5 about a third of the time
participants still asked for explanations even when the plan was
explicable, and thus optimal in their map. This is an artifact of
the risk-averse behavior incentivized by the gamification of the
explanation process and indicative of the cognitive burden on the
humans who are not (cost) optimal planners. Thus, going forward,
the objective function should incorporate the cost or difficulty of
analyzing the plans and explanations from the point of view of
the human in addition to the current costs in equation MEGA(4) and
Table 2 modeled from the perspective of the robot model.
Finally, in Figure 6, we show how the participants responded to
inexplicable plans, in terms of their click-through rate on the explanation request button. Such information can be used to model the ฮฑ
parameter to situate the explicability versus explanation trade-off
according to preferences of individual users. It is interesting to see
that the distribution of participants (right inset) seem to be bimodal
indicating that there are people who are particularly skewed towards risk-averse behavior and others who are not, rather than
a normal distribution of response to the explanation-explicability
trade-off. This further motivates the need for learning ฮฑ interactively with the particular human in the loop.
3
DISCUSSION AND FUTURE WORK
In the following section, we will elaborate on some of the exciting
avenues of future research borne out of this work.
3.1
Model learning and picking the right ฮฑ
We assumed that the hyper-parameter ฮฑ is set by the designer in
determining how much to trade-off the costs of explicability versus
explanations on the part of the autonomous agent. However, the
design of ฮฑ itself can be more adaptive and โhuman-awareโ in the
sense that the parameter can be learned in course of interactions
with the human in the loop to determine what kind of plans are
preferred (as seen in Figure 6) and how much information can be
transmitted. This is also relevant in cases where the human mental
model is not known precisely or if there is uncertainty towards
what the new model is after an update or explanation. This is a
topic of future work; existing literature on iterative model learning
[18, 29] can provide useful guidance towards the same. Authors in
[9] discuss a few useful representations for learning such models
for the purposes of task planning at various levels of granularity.
Note that search with uncertainty over a learned human (mental)
model can often times be compiled to the same planning process as
described in [31] by using annotated models, so the same techniques
as introduced in this paper still apply.
3.2
Cost of explanations and cognitive load
Currently, we only considered the cost of explanations and explicability from the point of view of the robot. However, there might be
additional (cognitive) burden on the human โ measured in terms
of the complexity of interpreting an explanation and how far away
the final plan is from the optimal plan in the humanโs mental model.
This again ties back to the assumptions on the cognitive abilities
(i.e. optimality) of the human in the loop, and needs calibration
[18, 29] based on repeated interactions (as seen in Figure 5).
4
CONCLUSION
We saw how an agent can achieve human-aware behavior while
at the same time keeping in mind the cost of departure from its
own optimality which could otherwise have been explained away if
given the opportunity. This raises several intriguing challenges in
the plan generation process, most notably in finding better heuristics in speeding up the model space search process as well as dealing
with model uncertainty and identifying the sweet spot of the algorithm in explicability-explanations trade-off. Indeed, the revised
human-aware planning paradigm opens up exciting new avenues
of research such as learning human mental models, providing explanations at different levels of abstractions, and so on.
REFERENCES
[1] Mitchell Ai-Chang, John Bresina, Len Charest, Adam Chase, JC-J Hsu, Ari Jonsson,
Bob Kanefsky, Paul Morris, Kanna Rajan, Jeffrey Yglesias, et al. 2004. MAPGEN:
Mixed-Initiative Planning and Scheduling for the Mars Exploration Rover Mission.
IEEE Intelligent Systems (2004).
[2] Rachid Alami, Aurรฉlie Clodic, Vincent Montreuil, Emrah Akin Sisbot, and Raja
Chatila. 2006. Toward Human-Aware Robot Task Planning. In AAAI Spring
Symposium: To Boldly Go Where No Human-Robot Team Has Gone Before.
[3] Rachid Alami, Mamoun Gharbi, Benjamin Vadant, Raphaรซl Lallement, and Adolfo
Suarez. 2014. On human-aware task and motion planning abilities for a teammate
robot. In Human-Robot Collaboration for Industrial Manufacturing Workshop, RSS.
[4] James F Allen. 1994. Mixed initiative planning: Position paper. In ARPA/Rome
Labs Planning Initiative Workshop.
[5] Cade Earl Bartlett. 2015. Communication between Teammates in Urban Search
and Rescue. Thesis (2015).
[6] Alexandros Belesiotis, Michael Rovatsos, and Iyad Rahwan. 2010. Agreeing on
plans through iterated disputes. In Proceedings of the 9th International Conference
on Autonomous Agents and Multiagent Systems: volume 1-Volume 1. International
Foundation for Autonomous Agents and Multiagent Systems, 765โ772.
[7] Rodney Brooks. 1986. A robust layered control system for a mobile robot. IEEE
journal on robotics and automation 2, 1 (1986), 14โ23.
[8] T. Chakraborti, G. Briggs, K. Talamadupula, Yu Zhang, M. Scheutz, D. Smith, and
S. Kambhampati. 2015. Planning for serendipity. In IROS.
Balancing Explicability and Explanations
[9] Tathagata Chakraborti, Subbarao Kambhampati, Matthias Scheutz, and Yu Zhang.
2017. AI Challenges in Human-Robot Cognitive Teaming. arXiv preprint
arXiv:1707.04775 (2017).
[10] Tathagata Chakraborti, Sarath Sreedharan, Yu Zhang, and Subbarao Kambhampati. 2017. Plan Explanations as Model Reconciliation: Moving Beyond Explanation as Soliloquy. In IJCAI.
[11] Tathagata Chakraborti, Yu Zhang, David Smith, and Subbarao Kambhampati. 2016.
Planning with Resource Conflicts in Human-Robot Cohabitation. In AAMAS.
[12] Marcello Cirillo. 2010. Planning in inhabited environments: human-aware task
planning and activity recognition. Ph.D. Dissertation. รrebro university.
[13] Marcello Cirillo, Lars Karlsson, and Alessandro Saffiotti. 2010. Human-aware
Task Planning: An Application to Mobile Robots. ACM Transactions on Intelligent
Systems and Technology (2010).
[14] Anca Dragan, Kenton Lee, and Siddhartha Srinivasa. 2013. Legibility and Predictability of Robot Motion. In Human-Robot Interaction.
[15] Chukwuemeka D Emele, Timothy J Norman, and Simon Parsons. 2011. Argumentation strategies for plan resourcing. In The 10th International Conference on
Autonomous Agents and Multiagent Systems-Volume 3. International Foundation
for Autonomous Agents and Multiagent Systems, 913โ920.
[16] George Ferguson, James F Allen, Bradford W Miller, et al. 1996. TRAINS-95:
Towards a Mixed-Initiative Planning Assistant. In AIPS.
[17] Maria Fox, Derek Long, and Daniele Magazzeni. 2017. Explainable Planning. In
IJCAI XAI Workshop.
[18] Dylan Hadfield-Menell, Stuart J Russell, Pieter Abbeel, and Anca Dragan. 2016.
Cooperative inverse reinforcement learning. In NIPS.
[19] Marc Hanheide, Moritz Gรถbelbecker, Graham S Horn, Andrzej Pronobis, Kristoffer
Sjรถรถ, Alper Aydemir, Patric Jensfelt, Charles Gretton, Richard Dearden, Miroslav
Janicek, et al. 2015. Robot task planning and explanation in open and uncertain
worlds. Artificial Intelligence (2015).
[20] International Planning Competition. 2011. IPC Competition Domains. https:
//goo.gl/i35bxc. (2011).
[21] Subbarao Kambhampati and Kartik Talamadupula. 2014. Human-in-the-Loop
Planning and Decision Support. http://rakaposhi.eas.asu.edu/hilp-tutorial/.
(2014).
[22] Uwe Koeckemann, Federico Pecora, and Lars Karlsson. 2014. Grandpa Hates
Robots - Interaction Constraints for Planning in Inhabited Environments. In
AAAI.
[23] Anagha Kulkarni, Tathagata Chakraborti, Yantian Zha, Satya Gautam Vadlamudi,
Yu Zhang, and Subbarao Kambhampati. 2016. Explicable Robot Planning as
Minimizing Distance from Expected Behavior. CoRR abs/1611.05497 (2016).
[24] Pat Langley, Ben Meadows, Mohan Sridharan, and Dongkyu Choi. 2017. Explainable Agency for Intelligent Autonomous Systems. In AAAI/IAAI.
[25] Lydia Manikonda, Tathagata Chakraborti, Kartik Talamadupula, and Subbarao
Kambhampati. 2017. Herding the Crowd: Using Automated Planning for Better
Crowdsourced Planning. Journal of Human Computation (2017).
[26] Hugo Mercier and Dan Sperber. 2010. Why Do Humans Reason? Arguments for
an Argumentative Theory. Behavioral and Brain Sciences (2010).
[27] Tim Miller, Jens Pfau, Liz Sonenberg, and Yoshihisa Kashima. 2017. Logics of
common ground. Journal of Artificial Intelligence Research (2017).
[28] Christian J Muise, Paolo Felli, Tim Miller, Adrian R Pearce, and Liz Sonenberg.
2016. Planning for a Single Agent in a Multi-Agent Environment Using FOND..
In IJCAI.
[29] Stefanos Nikolaidis, Przemyslaw Lasota, Ramya Ramakrishnan, and Julie Shah.
2015. Improved humanโrobot team performance through cross-training, an
approach inspired by human team training practices. International Journal of
Robotics Research (2015).
[30] Sailik Sengupta, Tathagata Chakraborti, Sarath Sreedharan, and Subbarao Kambhampati. 2017. RADAR - A Proactive Decision Support System for Human-inthe-Loop Planning. In AAAI Fall Symposium on Human-Agent Groups.
[31] S. Sreedharan, T. Chakraborti, and S. Kambhampati. 2017. Explanations as Model
Reconciliation - A Mutli-Agent Perspective. In AAAI Fall Symposium on HumanAgent Groups.
[32] Kartik Talamadupula, Gordon Briggs, Tathagata Chakraborti, Matthias Scheutz,
and Subbarao Kambhampati. 2014. Coordination in human-robot teams using
mental modeling and plan recognition. In Intelligent Robots and Systems (IROS
2014), 2014 IEEE/RSJ International Conference on. IEEE, 2957โ2962.
[33] Stevan Tomic, Federico Pecora, and Alessandro Saffiotti. 2014. Too Cool for
School??? Adding Social Constraints in Human Aware Planning. In Workshop on
Cognitive Robotics (CogRob).
[34] Yu Zhang, Sarath Sreedharan, Anagha Kulkarni, Tathagata Chakraborti,
Hankz Hankui Zhuo, and Subbarao Kambhampati. 2016. Plan Explicability for
Robot Task Planning. In RSS Workshop on Planning for Human-Robot Interaction.
[35] Yu Zhang, Sarath Sreedharan, Anagha Kulkarni, Tathagata Chakraborti,
Hankz Hankui Zhuo, and Subbarao Kambhampati. 2017. Plan Explicability
and Predictability for Robot Task Planning. In ICRA.
Technical Report, 2018, ASU
| 2cs.AI
|
Action and perception for spatiotemporal patterns
Martin Biehl1,2 and Daniel Polani 2
1
2
Araya, Tokyo, 151-0001
University of Hertfordshire, Hatfield, AL10 9AB
arXiv:1706.03576v1 [cs.AI] 12 Jun 2017
[email protected]
Abstract
This is a contribution to the formalization of the concept of
agents in multivariate Markov chains. Agents are commonly
defined as entities that act, perceive, and are goal-directed. In
a multivariate Markov chain (e.g. a cellular automaton) the
transition matrix completely determines the dynamics. This
seems to contradict the possibility of acting entities within
such a system. Here we present definitions of actions and perceptions within multivariate Markov chains based on entitysets. Entity-sets represent a largely independent choice of a
set of spatiotemporal patterns that are considered as all the
entities within the Markov chain. For example, the entityset can be chosen according to operational closure conditions
or complete specific integration. Importantly, the perceptionaction loop also induces an entity-set and is a multivariate
Markov chain. We then show that our definition of actions
leads to non-heteronomy and that of perceptions specialize to
the usual concept of perception in the perception-action loop.
1 Introduction
The perception-action loop (PA-loop) has been used to
formalize, in mostly information theoretic terms, various
properties associated to agents. These include empowerment Klyubin et al. (2005), autonomy (Bertschinger et al.,
2008), decisions (Tishby and Polani, 2011), and embodiment (Zahedi and Ay, 2013).
In the literature agents are usually seen as entities that
act, perceive, and are in some way goal-directed (cmp.
Barandiaran et al., 2009).
The PA-loop assumes that the entities that make up agents
as well as their environments can be captured by interacting
stochastic processes. This is a convenient assumption since
actions and perceptions can then be easily identified with
the interactions (see Section 3). Further requirements (e.g.
autonomy) can then be introduced to distinguish stochastic
processes that actually constitute agents.
It has not been formally established whether the assumption that the set of entities that contains agents can be represented by stochastic processes is justified. We have argued
in previous work, that (naively) using stochastic processes
to capture entities within a given multivariate Markov chain
(for example cellular automata like the Game of Life) fails
to account for essential proporties of agents irrespective of
chosen additional conditions. Instead, we have argued for
the use of spatiotemporal patterns (STPs, previously employed by Beer, 2014b,a) to represent entities. The immediate advantage is that STPs are a superset of structures like
gliders in the game of life, spots in reaction diffusion systems (Virgo, 2011; Froese et al., 2014; Bartlett and Bullock,
2015), and particle based systems exhibiting individuation
into multi-particle โcellsโ (Schmickl et al., 2016). Formally
capturing these structures then becomes a matter of selecting
the according subsets of STPs i.e. the entity-sets (see below).
A disadvantage of the STP based entities is that they lack
the formal construction/interpretation of actions and perceptions that the PA-loop provides. As far as we know, no
formal definitions of actions and perception exists for STP
based entities. The first contribution of this paper are proposals of such formal definitions called entity action (Section 4) and entity perception (Section 5).
The second contribution is a formal connection between
the PA-loop and our STP-based entity actions and perceptions (Section 6). This connection is achieved via the notion of entity-sets. This is just the set of those STPs in a
multivariate Markov chain that are considered as entities according to an independently specified criterion (e.g. organizational closure (Beer, 2014a) or complete local integration
(Biehl et al., 2017, 2016)). Importantly, we can quite naturally identify an entity-set for the PA-loop and use our definitions of entity action and entity perception for this entity-set.
The result is that our entity perception coincides with the
standard notion of perceptions in the PA-loop and that entity actions are a necessary and sufficient condition for nonheteronomy. Non-heteronomy (i.e. not being determined by
the environment) was proposed in Bertschinger et al. (2008)
as part of an information theoretic measure of autonomy.
The most closely related work is that of Beer (2014b).
Apart from a generalization to stochastic systems our set of
entity perceptions seems to be a straightforward (but surprisingingly tedious) formalization of the cognitive domain
of STPs described for the glider in game of life. We use
โperceptionsโ instead of โcognitive domainโ only because
our motivation came more from the PA-loop and unlike Beer
(2014b) not directly from autopoiesis. Concerning the entity actions we deviate from Beer (2014b) by requiring more
from an action than just the continuation of the entity.
We note that Ikegami and Taiji (1998) propose to use possible/compatible counterfactual trajectories of game players
as signs of autonomy. We construct the capability to act
from the counterfactual trajectories and find that they imply
non-heteronomy which is a related to autonomy.
E0
E1
E2
M0
M1
M2
Figure 1: First timesteps of the PA-loop BN. The processes represent environment tEt utPT , and agent memory tMt utPT .
2 Notation
We restrict ourselves to finite, time-discrete, multivariate
Markov chains. These are unrolled in time and can then be
formally described as Bayesian networks (BNs). We index
the random variables in the BN via the index set V โ J ห T
where T is the set of all timesteps and J is the set of (spatial) degrees of freedom. If i P V is an index we also write
i โ pj, tq P J ห T where convenient. The BN is then a set
tXi uiPV of random variables together with a set of edges determining the parents papiq โ papj, tq of each node i P V ,
and associated mechanisms ppj,tq pxj,t |xpapj,tq q. We assume
that the parents of any node are a subset of the nodes at the
previous timestep papj, tq ฤ pJ, tq :โ tpj, tq|j P Ju. We
write XA :โ pXi qiPA for the joint random variable consisting of random variables indexed by elements of A ฤ V . We
also sometimes write At :โ tpj, tq|j P Au for the elements
in A that correspond to indices at timestep t. We refer to At
as the time-slice of A at t. The state space of random variable
Xi is denoted as Xi and the specific values are denoted by
lower case letters xi , yล
i , xฬi , ... P Xi . For joint random variables we write XA :โ iPA Xi and xA , yA , xฬA , ... P XA .
A spatiotemporal pattern (STP) is a value xA P XA of
a joint random variable XA with A ฤ V . Since A ฤ V
is an arbitrary subset of V a STP can specify the values
of random variables at multiple timesteps
ลค and multiple spatial locations. The set of all STPs is: AฤV XA โ txA P
XA |A ฤ V u . It is important to envision the difference between the set of all STPs and the set of all subsets of random
variables of tXi uiPV . The latter
ลค is isomorphic to the power
set of V and can be written as AฤV tXA u โ tXA |A ฤ V u
and is a set of random variables not a set of values of random
variables.
A trajectory is a STP xV that occupies all random variables in the BN tXi uiPV . We then say that a STP yA P XA
occurs within trajectory xV if yA โ xA .
An entity-set EptXi uiPV q is a subset of all STPs. One
choice would be to use the entire set of STPs as the entity
set. Other choices include using organizational closure conditions like in Beer (2014b) or the complete specific integration criterion (Biehl et al., 2016, 2017). The following
definitions and theorems all assume that tXi uiPV is a multivariate Markov chain with V โ J ห T and E is a given
entity-set.
3
Perception-action loop
Given two interacting stochastic processes (e.g. Fig. 1) we
can always extract random stochastic process that explicitly
represent the interactions. If we see one of the processes as
the agentโs memory process tMt utPT and the other as the
environment process tEt utPT then these extracted random
variables can be seen as the perceptions and actions of the
agent. Perceptions tSt utPT then capture exactly all the influence of the environment on the agent and actions tAt utPT
capture the influence of the agent on the environment.
This means we introduce another BN containing two
more processes, the action process tAt utPT and the sensor process tSt utPT . The result of this extraction is an extended BN (Fig. 2) with identical joint probability distribution over the two initial stochastic processes tMt utPT and
tEt utPT . This perception action loop is used for example in
Bertschinger et al. (2008).
The idea behind the extraction of perceptions tSt utPT
(and conversely actions tAt utPT ) is to partition the state
space Et of the environment at t into blocks having identical
influence on the next memory state Mt`1 . These blocks are
then the possible perceptions i.e. the states of St . Formally:
Definition 1. For each time t P T and eฬt , eฬt P Et let
eฬt โวซt eฬt
รด @mt`1 P Mt`1 , mt P Mt :
pMt`1 pmt`1 |mt , eฬt q โ pMt`1 pmt`1 |mt , eฬt q.
(1)
Then:
(i) The sensor partition1 วซt is then defined as the set of equivalence classes of the equivalence relation โวซt .
(ii) The set of sensor values is defined as St :โ วซt and an
element st P St (which is also a block in วซt is called a
perception of a sensor value.
In the symmetrical way we define actions via a partition
of Mt and arrive at the extended PA-loop of Fig. 2. It is then
straightforward to prove the following theorem:
1
The construction of the sensor partition is not new. It is also
used for example in Balduzzi (2011) to obtain coarser states (alphabet) of joint random variables. The authors thank Benjamin Heuer
for originally pointing them to this construction.
E0
M0
E1
E2
S0
S1
A0
A1
M1
M2
Figure 2: First time-steps of the BN of the extended PA-loop. The
processes tAt utPT and tSt utPT mediate all interactions between
tMt utPT and tEt utPT without changing the probability distributions over the latter (see Theorem 1).
Theorem 1 (Invariant extension theorem). Given a perception action loop tXi uiPV โ tMt , Et utPT and its extended PA-loop tXi uiPW โ tMt , At , St , Et utPN` . Let
pV โ pMT ,ET be the probability distribution over the entire perception action loop tXi uiPV and let pw
MT ,ET be the
marginal probability distribution over the memory and environment process obtained from the probability distribution
pw
W over the entire extended PA-loop. Then
pMT ,ET โ pw
MT ,ET .
(2)
Proof. This is probably fairly well known but see Biehl
(2017) for an explicit proof.
This shows that the introduction of action and sensor process in the above way only makes the interactions between
agent and environment processes explicit and does not introduce any additional dynamics. The theorem also shows that
the sensor process (and conversely the actions) captures all
influences from the environment on the agent. Else the dynamics of the original processes could not remain identical.
In Section 5 we want to capture all influences of the environment on a set of STPs / entities instead of on a stochastic
process like tMt utPT . This will require a generalization of
the perception extraction procedure in Definition 1.
4 Entity action
We now define a concept of actions for a given entity-set in a
multivariate Markov chain. First we briefly sketch the main
ideas behind the definition.
Due to our setting of a given multivariate Markov chain
that actions have to occur within our concept of actions differs from other approaches. Paraphrasing Wilson and Shpall
(2012) only slightly, what distinguishes actions among
events is that they do not merely happen to individuals but
rather that they are made to happen by the individuals.
This is problematic in our setting where STPs (as entities)
take the role of individuals. What โhappensโ in a multivariate Markov chain are the trajectories and the STPs occurring
within them. The Markov chainโs dynamics are determined
by its mechanisms pj,t with j P J, t P T . These in turn determine (possibly stochastically) what is going to happen at
all times anywhere within the chain.
Therefore, it is impossible that a multivariate Markov
chain contains an STP or entity that can make something
happen beyond what happens anyway due to the mechanisms. This means we have to explain and define actions
in a different way.
We should also note that unlike other accounts of actions
(Wilson and Shpall, 2012) we do not require actions to be
necessarily purposeful or goal-directed in any way. The way
we conceive agency an entity with actions will be considered
goal-directed if its actions are goal-directed in some sense.
To get to our own definition of actions we note that events
called actions are usually attributed to a limited or bounded
region or part of the universe e.g. the body of a living organism or sometimes just its brain if it has one. These
parts usually contain mechanisms or configurations of matter that are either aq not directly observable to a human observer e.g. hidden in an opaque container, or bq not well
understood by the human observer, or cq both. These factors inevitably lead to unpredictability of such events. In
other words, events that are attributed to well understood
and therefore predictable mechanisms, e.g. sunrises, are not
considered actions.
From this point of view actions are not, beyond their possibly complex and unobserved origin, special events but may
appear as special to observers that lack the sensory and computational capacity to resolve or understand them. In our approach we construct actions as events in such a way that they
are fundamentally unpredictable by any observer within the
system. As we will see this can be done without the need for
a definition of an observer.
Note that this approach remains compatible with
observer-dependent notions of apparent or as-if actions
(cmp. McGregor, 2017). The โfundamentalโ actions are apparent actions for every possible observer while other events
are actions for some observers and plain, predictable events
for others.
Up to now we have ignored randomness. True randomness (in the sense of stochastic independence of the event
from any other event in the universe), if it exists in a system, can never be explained, predicted, or understood. Combined with our reasoning above this suggests that all random
events are actions and fundamentally so.
This is against our intuition, random events should not be
seen as actions of agents. However, we place the burden of
ruling out random events from being interpreted as actions of
agents on the entity-set and/or goal-directedness. We expect
useful notions of entities not to consist of (completely) independent events which would prevent such events from becoming actions in our approach. Furthermore independent
events seem not to be useful in order to achieve a particular
goal. However, the usefulness of random number generators
might be seen as a counterexample. As of now we have no
formal definition of goal-directedness such that answering
these questions is future work.
When we want to define actions for entities the first issue
we run into is that entities are already fixed STPs.
Therefore each entity xA P E already consists of the consequences of whatever actions (if any) it took. It is in this
sense the result of its own actions. There is no freedom left.
In order to investigate the actions we therefore have to deconstruct the entity and see what other actions it could have
taken time-slice by time-slice. For this we look for counterfactual entities yB whose time-slice at t can occur in exactly
the same environment xVt zAt and has a different immediate
future. Requiring the co-occurrence with the same environment makes the different futures unpredictable for anything
part of that environment. No observer can therefore predict
these futures either. Even an observer that distinguished the
two entities in the past is in the same state at t independent
of the entity it is faced with. Therefore it must have forgotten their difference. In this way we get a definition of actions
as unpredictable events for observers without needing to formally define observers.
For the formal definition we first define:
Definition 2 (Environment of an STP). Let xA be a STP.
Then the environment of xA at time t is the spatial pattern
xVt zAt .
We now state the definition of an action of an entity at a
time t in a particular trajectory formally.
Definition 3 (Action and co-action of an entity). Let xV P
XV with pV pxV q ฤ
0. Also let xA be an entity with nonempty time-slices at t, t ` 1. Then xA performs an action
xAt`1 at time t in trajectory xV if there exists an entity yB
with non-empty time-slices at t, t ` 1 such that
(i) yB occurs in yV โฐ xV with pV pyV q ฤ
0,
(ii) at t the entities xA and yB occupy the same random variables: Bt โ At ,
(iii) at t the trajectories xV and yV are otherwise identical:
xVt zAt โ yVt zAt ,
(iv) at t ` 1 the entities are different: xAt`1 โฐ yBt`1 .
We also call yB a co-action entity, yV a co-action trajectory,
and yBt`1 a co-action.
Note that all requirements are symmetric. Therefore, if
xA performs an action then its co-action also performs an
action. Also, the notion of co-action entities can easily be
extended to more than one co-action entity. We only have
to make sure that all entities in a set of co-action entities are
mutually different at t ` 1. Furthermore, it is easy to generalise the definition of actions to situations where xA and
yB must occupy the same variables for an interval of time
rt ยด m : ts before the action. In that case, the environment
xVrtยดm:ts zArtยดm:ts must be identical during this interval.
Finally, note that the condition that the two acting entities
differ at time t ` 1 can be fulfilled in two ways. If At`1 โฐ
Bt`1 then we call these actions extent actions. Else, if the
actions differ only in value i.e. we have At`1 โ Bt`1 so
that xAt`1 โฐ yAt`1 then we call these actions value actions.
The difference between value actions and extent actions
is made possible due to our definition of entities as STPs.
An intriguing question for the future is whether the capabilities of agents to act both in value and extent are truly
superior to agents that only act in value such as those modelled by PA-loops. As we will see in Section 6 probabilistic
and information theoretic expressions are easy to formulate
for actions in value only. However, for actions in extent this
has not been done yet.
5
Entity perception
In this section we formally define perception for (STP-) entities. We make no distinction here between perception,
experience, and sensory input. In the tradition of modelling agent-environment systems using dynamical systems
or their probabilistic generalisations as stochastic processes
in PA-loops we define perception as all effects that the environment has on an individual/agent (Beer, 1995).
We run into a similar problem as with the actions. An entity is already a fixed STP that contains all influence that it
may have been subjected to. It is in this sense the result of
influence (or no influences) from its surroundings. In order
to investigate these influences we therefore have to deconstruct the entity and see how it was โformedโ by external
influences / perceptions time-slice by time-slice.
The idea is to fix the past of the entity up to t and use
the set of counterfactual entities with the same past as the
alternative futures. We can then partition the possible environments of these counterfactual entities according to their
influence on the probability distribution over the entitiesโ futures. This is done in basically the same way as we defined
perception in the PA-loop in Definition 1. However, there
are some technical issues to overcome.
The set of entities with identical pasts up to time t can be
interpreted as the set of entities that are the most like xA up
to t. These are different entities but they only differ in the
future. Their futures (including their next time-slices) are
therefore a close analogue to the next states mt`1 of agent
memories in the PA-loop. To make sure however that the
entities have a next time-slice we also require that they have
non-empty next time-slice. These requirements together define the notion of the co-perception entities of an entity xA
at time t. These are entities that also perceive something
(maybe the same thing) at t (in their trajectories) if xA perceives something at t.
Definition 4 (Co-perception entities of an entity at t). Let
xA P E be an entity with non-empty time-slices at t and
t ` 1. The set of co-perception entities SpxA , tq of entity xA
at t is the set of entities with non-empty time-slices at t and
t ` 1, and that are identical up to t:
SpxA , tq :โ tyB P E : Bt , Bt`1 โฐ H, yBฤบt โ xAฤบt u.
(3)
Next we want to define a conditional probability
distribution over these co-perception entities similar to
pMt`1 pmt`1 |et , mt q. For this we need a random variable
that ranges over all the possible futures of the co-perception
entities. The naivest way to do this would be to use for
xkAk P SpxA , tq:
pS pxkAk |xVt zAt , xAฤบt q :โ
ฤ
t
pAk ,Vt zAt pxkAk , xVt zAt , xAฤบt q
ฤ
t
pVt zAt ,Aฤบt pxVt zAt , xAฤบt q
.
(4)
However, this has two problems. The first is that in general the denominator may vanish for some environments
xVt zAt P XVt zAt . The second is that it is not a conditional probability since the sum over all co-perception indices is not necessarily one. These problems can be solved
by restricting the set of environments and by introducing
a mutual-exclusivity condition on the futures of the coperception entities.
To restrict the environments we therefore define the coperception environments in the following way.
Definition 5 (Co-perception environments). Let xA P E
be an entity with non-empty time-slices at t and t ` 1 and
SpxA , tq its co-perception entities. Then define the associated co-perception environments XVSt zAt ฤ XVt zAt by
XVSt zAt :โ
txฬVt zAt : DyB P SpxA , tq, pB,Vt zAt pyB , xฬVt zAt q ฤ
0u.
(5)
The co-perception environments of a co-perception set
SpxA , tq are then the spatial patterns XVt zAt at t that can
co-occur with at least one co-perception environment. By
definition of the co-perception environments the denominator of Eq. (4) cannot vanish anymore if we require that the
construction only allows co-perception environments. However, in order for the sum over all co-perception entities to
equal one (for all co-perception environments) we need to
have
รฟ
pAk ,XVt zAt pxkAk , xVt zAt , xAฤบt q
ฤ
t
k
(6)
โ pVt zAt ,Aฤบt pxkAk , xVt zAt , xAฤบt q.
ฤ
t
This is the case in general if for all xVt zAt P XVSt bsAt and
all co-perception entitiesโ futures are mutually exclusive, i.e.
for all xkAk โฐ xlAl P SpxA , tq we have
PrpxkAk , xlAl , xVt zAt , xAฤบt q โ 0.
(7)
This condition can be guaranteed if we require a form
of non-interpenetration. This condition on entity-sets states
that there cannot be two different entities which are identical up to some point in time t and then, in the same single
trajectory (with positive probability), at some point โrevealโ
their difference. If entities with identical pasts ever reveal
their difference they must be in different trajectories i.e. they
must be mutually exclusive.
Definition
ลค 6 (Non-interpenetration). An entity-set
E ฤ
BฤV XB satisfies non-interpenetration or is
non-interpenetrating if for all yB , zC P E we have
Dt P T : yBฤบt โ zCฤบt and yBtฤ โฐ zCtฤ
รฑ PrpXBtฤ โ yBtฤ , XBtฤ โ zCtฤ |yBฤบt q โ 0.
(8)
Non-interpenetration implies that co-perception entities
are mutually exclusive:
Theorem 2. Let xA P E be an entity with non-empty timeslices at t and t ` 1 and SpxA , tq its co-perception entities.
If E satisfies non-interpenetration then SpxA , tq is mutually
exclusive.
Proof. Let yB , zC P SpxA , tq with yB โฐ zC . Then they
have identical pasts and so we have yBฤบt โ zCฤบt . From
non-interpenetration we then get
PrpXB โ yB , XC โ zC q โ 0.
(9)
This is stronger than Eq. (7).
This means that under non-interpenetration Eq. (4) is a
well defined conditional probability distribution . However,
this conditional probability distribution is still quite different from pMt`1 pmt`1 |et , mt q since it ranges over the entire
futures xkAk of the co-perception entities and not just next
ฤ
t
timesteps.
At each transition from time-step t to t ` 1 the coperception entities SpxA , tq split up into sets of entities that
are identical up to t`1 (we will call these sets the branches).
Only one of these sets is the set SpxA , t ` 1q. For example
an entity yB P SpxA , tq with the same past up to t but with
a different time-slice at t ` 1 i.e. yBt`1 โฐ xAt`1 is part of a
different branch. In that case this branch is SpyB , t ` 1q and
we have SpyB , t ` 1q X SpxA , t ` 1q โ H. In summary
then the dynamics of the system split up the co-perception
entities of xA up to t into disjoint sets (the branches) of entities with identical pasts up to t ` 1. We can then interpret
the branches at the time t ` 1 as the distinctions among the
co-perception entities that are revealed at time t ` 1. Further distinctions among the co-perception entities are only
revealed at later times. This also means that these are all
differences that could possibly be due to the influence of the
environment at t and that show their effect at t`1 (not later).
In this way the perceptions at t should also be defined with
respect to these branches. We call the partition that is defined via the identification of entities in SpxA , tq that are
identical up to t ` 1 the branching partition.
Definition 7 (Branching partition). Let xA P E be an entity
with non-empty time-slices at t and t ` 1 and SpxA , tq its
co-perception entities. Then define the branching partition
ฮทpxA , tq of SpxA , tq as the partition induced by the equivalence classes of the equivalence relation
yB โzC
รด yBt`1 โ zCt`1 ,
(10)
where yB , zC P SpxA , tq.
We note that the definition of the branching partition can
easily be generalised to more than one time-step into the future. Instead of requiring equality at t ` 1 we can require
equality for the next r time-steps.
Given the branching partition ฮทpxA , tq for a noninterpenetrating entity set we can then define a conditional
probability distribution over the branches by just summing
up the probabilities of all entities in each branch (remember
that they are all mutually exclusive) to get the probability of
a branch. This gives us the branch-morph defined below.2
Definition 8 (Branch-morph). Let tXi uiPV be a multivariate Markov chain with index set V โ J ห T and entity set E.
Let xA P E be an entity with non-empty time-slices at t and
t`1 and SpxA , tq its co-perception entities and ฮทpxA , tq the
branching partition. Furthermore, let XVSt zAt ฤ XVt zAt be
the associated co-perception environments. Also write for
every block b P ฮทpxA , tq:
รฟ
ppb|xฬVt zAt , xAฤบt q :โ
pBtฤ ,Vt zAt pyBtฤ |xฬVt zAt , xAฤบt q.
yB Pb
(11)
Then for each xฬVt zAt P XVSt zAt we define the branchmorph over ฮทpxA , tq as the probability distribution
pฮทpxA ,tq p.|xฬVt zAt , xAฤบt q : ฮทpxA , tq ร r0, 1s with
pฮทpxA ,tq pb|xฬVt zAt , xAฤบt q :โ ล
ppb|xฬVt zAt , xAฤบt q
,
cPฮทpxA ,tq ppc|xฬVt zAt , xAฤบt q
(12)
for all b P ฮทpxA , tq.
With the branch-morph we can then define, as expected,
the perceptions as equivalence classes of the co-perception
environments with respect to the associated branch-morph.
First we define a partition of the co-perception environments
called the co-perception environment partition. The perceptions are then the blocks of this partition.
Definition 9. Let tXi uiPV be a multivariate Markov chain
with index set V โ J ห T and entity set E. Let xA P E be an
entity with non-empty time-slices at t and t`1 and SpxA , tq
its co-perception entities and ฮทpxA , tq the branching partition. Furthermore, let XVSt zAt ฤ XVt zAt be the associated
co-perception environments. Then define the co-perception
environment partition ฯ S pxA , tq of XVSt zAt as the partition
induced by the equivalence classes of the equivalence relation
xฬVt zAt โ xฬVt zAt
รด @b P ฮทpxA , tq :
pฮทpxA ,tq pb|xฬVt zAt , xAฤบt q โ pฮทpxA ,tq pb|xฬVt zAt , xAฤบt q.
(13)
This means all associated co-perception environments in
the same block of ฯ S pxA , tq have the same branch-morph.
In other words they lead to the same branch of entity futures (i.e. the same future branch) with the same probabilities. Then all elements of these environment blocks have
identical effects on the future branches and these branches
cannot distinguish between environments within the blocks.
Definition 10 (Perceptions). Let tXi uiPV be a multivariate Markov chain with index set V โ J ห T and entity set
E. Let xA P E be an entity with non-empty time-slices at t
and t ` 1 and SpxA , tq its co-perception entities. Furthermore, let XVSt zAt ฤ XVt zAt be the associated co-perception
environments and ฯ S pxA , tq its co-perception environment
partition.
Then the blocks of ฯ S pxA , tq are called the perceptions
of xA at t.
6 Entity action and perception in the PA-loop
We now show that agent-environment systems as modelled
by the PA-loop are multivariate Markov chains containing a
specific choice of entity sets.
In the PA-loop each trajectory xV is considered to consist
of a time-evolution mT of the agent and a time-evolution
of the environment eT . The agent therefore occurs in every
trajectory and occupies the same degree of freedom in every
trajectory. Each of the time-evolutions mT is a STP in the
PA-loop. Since for us entities are STPs we define the entityset EP A of a PA-loop as the set of time-evolutions of the
agent process i.e.
ลบ
EP A :โ tmT P
Mt u.
(14)
tPT
Similarly, we can define entities for the environments and
add them to EP A .
2
We note here that for entity-sets that exhibit interpenetration
we can still define branch-morphs for mutually-exclusive subsets
of the co-perception entities. Since the choice of these subsets is
arbitrary however this does not lead to a uniquely defined notion of
perception. For more details see Biehl (2017).
Entity actions in the PA-loop We can write every trajectory as a pair pmT , eT q where mT is an entity. The entity
mT then performs an entity action at time t in trajectory
pmT , eT q with pMT ,ET pmT , eT q ฤ
0 if there is an entity
mฬt such that
โข mฬT occurs in pmฬT , eฬT q
โฐ
pmT , eT q with
pMT ,ET pmฬT , eฬT q ฤ
0,
โข at t entities mT and mฬT occupy the same random variables, which is the case for all entities in EP A ,
โข at t environments of mT and mฬT are identical: et โ eฬt ,
โข at t ` 1 the entities are different: mt`1 โฐ mฬt`1 .
Since all entities occupy the same random variables we can
only have value actions in the PA-loop.
If we assume that these conditions are fulfilled at
some time t for two entities mT , mฬT we can derive that
the conditional entropy HpMt`1 |Et q of the next agent
state given the current environment state is greater than
zero. To see this note that from pMT ,ET pmT , eT q ฤ
0 and pMT ,ET pmฬT , eฬT q ฤ
0 it directly follows that
pMt`1 pmt`1 |et q ฤ
0, pMt`1 pmฬt`1 |et q ฤ
0 and pEt pet q ฤ
0. Plugging this into the definition we get HpMt`1 |Et q ฤ
0.
It can also be seen that the more different co-action entities there are for a time t the higher the conditional entropy
HpMt`1 |Et q can get. The final value of HpMt`1 |Et q depends on the actual probabilities but the maximum value for
n co-actions is log n. Also note that if there are no actions
at t i.e. no co-action entity in no co-action trajectory at t
then HpMt`1 |Et q โ 0. Entity actions of entities in EP A are
therefore necessary and sufficient for HpMt`1 |Et q ฤ
0. The
conditional entropy HpMt`1 |Et q measures the uncertainty
about the next agent state when the current environment state
is known. It has been proposed as part of an autonomy measure as a measure of non-heteronomy in Bertschinger et al.
(2008). Non-heteronomy means that the agent is not determined by the history of the environment. In this terminology entity actions are a necessary and sufficient condition
for non-heteronomy.
Entity perception in the PA-loop We now look at how
entity perception as defined in Section 5 specialises to the
case of the PA-loop. This argument in effect constitutes
a proof that our Definition 8 of the branch-morph is a
generalisation of the conditional probability distributions
pMt`1 p.|mt , et q : Mt`1 ร r0, 1s to non-interpenetrating
arbitrary sets of co-perception entities This result is not surprising since we set out to do just this but it is also instructive to work through the recovery of the original expression
of the conditional probability distribution starting from the
general branch-morph.
We pick an entity mT from the entity set EP A and consider its perceptions at an arbitrary time-step t P T . In order
to get the perceptions at t we need
1. the co-perception entities SpmT , tq of mT at t,
2. the branching partition ฮทpmT , tq with its branches,
3. the co-perception environments,
4. the branch-morphs for each environment,
5. and the co-perception environment partition ฯ S pxA , tq
with its blocks, the perceptions.
These can be identified in the following way.
1. The co-perception entities SpmT , tq are the entities in
EP A that have non-empty time-slices at t, t ` 1, and that are
identical to mT up to t. All entities in EP A have non-empty
time slices at all times. So we have:
SpmT , tq โ tmฬT P EP A : mฬฤบt โ mฤบt u
(15)
PA
2. First note that the entity set E
satisfies noninterpenetration since they all occupy the same set tMt utPT
of random variables. The branching partition ฮทpmT , tq is
composed out of blocks (the branches) of co-perception entities that are identical up to t ` 1 i.e.
mฬT โmฬT
รด mฬt`1 โ mฬt`1 .
(16)
We can therefore identify the blocks of ฮทpmT , tq i.e. the future branches by the values that the entities take at t ` 1.
Define the branch bpmฬt`1 q associated to mฬt`1 P Mt`1 via
bpmฬt`1 q :โ tmฬT P SpmT , tq : mฬt`1 โ mฬt`1 u.
(17)
The branching partition is then:
ฮทpmT , tq โ tbpmฬt`1 q ฤ SpmT , tq : mฬt`1 P Mt`1 u.
(18)
3. The co-perception environments are the STPs xVt zAt
compatible with at least one co-perception entity. For the
PA-loop and entity mT at t we have XVt zAt โ Et and therefore XVSt zAt โ EtS . Where EtS is
EtS โ tet P Et : DmฬT P SpmT , tq, pMT ,Et pmฬT , et q ฤ
0u.
(19)
If we marginalize over Mฤ
t we can see that this is equivalent
to
(20)
EtS โ tet P Et : pMt ,Et pmฬt , et q ฤ
0u.
4. The branch-morphs are the probability distributions
pฮทpmT ,tq p.|et , mฤบt q : ฮทpmT , tq ร r0, 1s over the branches
for each co-perception environment et P EtS . These are defined using Eq. (11) which for the perception-loop becomes
รฟ
ppbpmฬt`1 q, et |mฤบt q :โ
pMtฤ ,Et pmฬtฤ , et |mฤบt q.
mฬT Pbpmฬt`1 q
(21)
We can rewrite the sum on the right hand side using Eq. (17)
for bpmฬt`1 q and then SpmT , tqtฤ โ Mtฤ :
ppbpmฬt`1 q, et |mฤบt q โ pMt`1 ,Et pmฬt`1 , et |mฤบt q.
(22)
The definition of the branch-morph for the PA-loop is
ppbpmฬt`1 q, et |mฤบt q
pฮทpmT ,tq pbpmฬt`1 q|et , mฤบt q : โ ล
bPฮทpmT ,tq ppb, et |mฤบt q
(23)
which can be rewritten (with some work) as
pฮทpmT ,tq pbpmฬt`1 q|et , mฤบt q โ pMt`1 pmฬt`1 |et , mฤบt q (24)
โ pMt`1 pmฬt`1 |et , mt q
(25)
where we used the BN of the PA-loop.
5.The co-perception environment partition ฯ S pmT , tq of
S
Et โ is induced by Eq. (13) which, using the PA-loop and
Eq. (24) becomes
eฬt โ eฬt
รด @mt`1 P Mt`1 :
(26)
pMt`1 pmt`1 |eฬt , mt q โ pMt`1 pmt`1 |eฬt , mt q
which is just the equivalence relation of Eq. (1) used to extract the sensor-values in Section 3.
So we have seen that our definitions of Section 5 specialise in the case of the PA-loop to the same concept of
perception as in Section 3.
7 Conclusion
We have defined actions and perceptions for entity-sets and
therefore for sets of spatiotemporal patterns. This provides
a formally defined way to associate gliders and similar spatiotemporal patterns in reaction-diffusion systems with actions and perceptions. This is a step towards a foramization of agency of such patterns. Here a notion of goaldirectedness is still missing and future work. We have
also shown how our definitions specialize to a necessary
and sufficient condition for non-heteronomy and the standard notion of perceptions of the agent process in the PAloop. For future research it is interesting to note that the
branch-morphs are generalisations of the conditional probability distribution pMt`1 p.|et , mt q. These conditional probability distributions play a role in various information theoretic concepts formulated for the PA-loop. This suggests we
might be able to translate bakc and forth between PA-loop
concepts and those for spatiotemporal patterns in the future.
We noted that a unique definition of entity perception is
dependent on the condition of non-interpenetration of the
entity-set.
Beer, R. D. (1995). A dynamical systems perspective on agentenvironment interaction. Artificial Intelligence, 72(1-2):173โ
215.
Beer, R. D. (2014a). Characterizing autopoiesis in the game of life.
Artificial Life, 21(1):1โ19.
Beer, R. D. (2014b). The cognitive domain of a glider in the game
of life. Artificial Life, 20(2):183โ206.
Bertschinger, N., Olbrich, E., Ay, N., and Jost, J. (2008). Autonomy: An information theoretic perspective. Biosystems,
91(2):331โ345.
Biehl, M., Ikegami, T., and Polani, D. (2016). Towards information
based spatiotemporal patterns as a foundation for agent representation in dynamical systems. In Proceedings of the Artificial Life Conference 2016, pages 722โ729. The MIT Press.
Biehl, M., Ikegami, T., and Polani, D. (2017). Specific and Complete Local Integration of Patterns in Bayesian Networks. Entropy, 19(5):230.
Biehl, M. A. (2017). Formal Approaches to a Definition of Agents.
PhD thesis, University of Hertfordshire, Hatfield.
Froese, T., Virgo, N., and Ikegami, T. (2014). Motility at the origin of life: Its characterization and a model. Artificial Life,
20(1):55โ76.
Ikegami, T. and Taiji, M. (1998).
Uncertainty, possible worlds and coupled dynamical recognizers.
http://sacral.c.u-tokyo.ac.jp/pdf/ikegami_polytechn
Klyubin, A., Polani, D., and Nehaniv, C. (2005). Empowerment:
a universal agent-centric measure of control. In The 2005
IEEE Congress on Evolutionary Computation, 2005, volume 1, pages 128โ135 Vol.1.
McGregor, S. (2017). The Bayesian stance: Equations for
โas-ifโ sensorimotor agency.
Adaptive Behavior, page
105971231770050.
Schmickl, T., Stefanec, M., and Crailsheim, K. (2016). How a lifelike system emerges from a simplistic particle motion law.
Scientific Reports, 6:37969.
Tishby, N. and Polani, D. (2011). Information Theory of Decisions
and Actions. In Cutsuridis, V., Hussain, A., and Taylor, J. G.,
editors, Perception-Action Cycle, Springer Series in Cognitive and Neural Systems, pages 601โ636. Springer New York.
DOI: 10.1007/978-1-4419-1452-1 19.
References
Virgo, N. (2011). Thermodynamics and the Structure of Living
Systems. University of Sussex. Unpublished PhD thesis.
Balduzzi, D. (2011). Detecting emergent processes in cellular automata with excess information. Advances in Artificial Life,
ECAL, abs/1105.0158.
Wilson, G. and Shpall, S. (2012). Action. In Zalta, E. N., editor, The Stanford Encyclopedia of Philosophy. Summer 2012
edition.
Barandiaran, X. E., Paolo, E. D., and Rohde, M. (2009). Defining
agency: Individuality, normativity, asymmetry, and spatiotemporality in action. Adaptive Behavior, 17(5):367โ386.
Zahedi, K. and Ay, N. (2013). Quantifying morphological computation. Entropy, 15(5):1887โ1915. arXiv:1301.6975 [cs,
math].
Bartlett, S. and Bullock, S. (2015). Emergence of Competition
between Different Dissipative Structures for the Same Free
Energy Source. In Proceedings of the European Conference
on Artificial Life, pages 415โ422. The MIT Press.
| 2cs.AI
|
GATED RECURRENT NETWORKS FOR SEIZURE DETECTION
M. Golmohammadi, S. Ziyabari, V. Shah, E. Von Weltin, C. Campbell, I. Obeid and J. Picone
Neural Engineering Data Consortium, Temple University, Philadelphia, Pennsylvania, USA
{meysam, saeedeh, vinitshah, eva.vonweltin, christopher.campbell, obeid, picone}@temple.edu
Abstractโ Recurrent Neural Networks (RNNs) with
sophisticated units that implement a gating mechanism
have emerged as powerful technique for modeling
sequential signals such as speech or electroencephalography
(EEG). The latter is the focus on this paper. A significant
big data resource, known as the TUH EEG Corpus
(TUEEG), has recently become available for EEG research,
creating a unique opportunity to evaluate these recurrent
units on the task of seizure detection. In this study, we
compare two types of recurrent units: long short-term
memory units (LSTM) and gated recurrent units (GRU).
These are evaluated using a state of the art hybrid
architecture that integrates Convolutional Neural
Networks (CNNs) with RNNs. We also investigate a variety
of initialization methods and show that initialization is
crucial since poorly initialized networks cannot be trained.
Furthermore, we explore regularization of these
convolutional gated recurrent networks to address the
problem of overfitting. Our experiments revealed that
convolutional LSTM networks can achieve significantly
better performance than convolutional GRU networks. The
convolutional LSTM architecture with proper initialization
and regularization delivers 30% sensitivity at 6 false alarms
per 24 hours.
I. INTRODUCTION
Diagnosis of clinical conditions such as epilepsy are
dependent on electroencephalography (EEG), the
recording of the brainโs electrical activity through
electrodes placed on the scalp. Delivering a conclusive
diagnosis of a brain-related illness without an EEG is
often unfeasible [1]. The large amounts of time required
by specialized neurologists to interpret these records, has
created a workflow bottleneck โ neurologists are
overwhelmed with the amount of data that needs to be
manually reviewed [2]. There is a great need for partial
or complete automation of the EEG analysis process, and
automated technology is slowly emerging to fill this void
[3][4]. Automatic analysis of EEG scans reduces time to
diagnosis, reduces error and enhances a neurologistโs
ability to administer medications. The ability to search
EEG records symbolically greatly accelerates the review
process.
In this paper, we focus specifically on the problem of
seizure detection. Many algorithms have been applied to
this problem including timeโfrequency analysis methods
[5][6], nonlinear statistical models [7] and more modern
machine learning approaches such as neural networks
and support vector machines [8]. Despite much progress,
current EEG analysis methodologies are far from perfect
with many being considered impractical due to high false
detection rates [9]-[11]. The machine learning challenges
of this application are described extensively in [1].
A significant big data resource, known as the TUH EEG
Corpus (TUEEG) [12], has become available for EEG
interpretation creating a unique opportunity to advance
technology. Using a subset of this data that has been
manually annotated for seizure events [13], a novel deep
structure has been recently introduced which achieves a
low false alarm rate on EEG signals [14]. This system
integrates convolutional neural networks (CNNs) with
recurrent neural networks (RNNs) to deliver state of the
art performance. In this paper, our goal is to investigate
the use of RNNs using the high-performance architecture
described in [13]. We also explore improved
initialization methods and regularization approaches.
II. RECURRENT NEURAL NETWORKS
A recurrent neural network (RNN) is an extension of a
conventional feedforward neural network which can
handle a variable-length input. The RNN handles the
variable-length sequence by having a recurrent hidden
state whose activation at each time is dependent on that
of the previous time. Standard RNNs are hard to train due
to the well-known vanishing or exploding gradient
problems [15][16]. To address the vanishing gradient
problem, the gated recurrent network architectures such
as long short-term memory (LSTM) [17] unit and gated
recurrent unit (GRU) were proposed [18].
LSTM was presented in [17]. The most commonly used
architecture was described in [19], and is formulated as:
+๐ ),
= ๐(๐ ๐ฅ + ๐ ๐ + ๐ โ ๐ + ๐ ) ,
= ๐ โ ๐ + ๐ โ ๐(๐ ๐ฅ + ๐ ๐ + ๐ ) ,
= ๐(๐ ๐ฅ + ๐ ๐ + ๐ โ ๐ + ๐ ) ,
= ๐ โ ๐(๐ ) .
๐ = ๐(๐ ๐ฅ + ๐ ๐
๐
๐
๐
๐
+๐ โ๐
(1)
(2)
(3)
(4)
(5)
where ๐ , ๐ , ๐ , ๐ , and ๐ are the input gate, forget gate,
cell state, output gate and block output at time instance t,
respectively; ๐ฅ is the input at time t; ๐ โ , and ๐ โ are the
weight matrices applied on input and recurrent hidden
units, respectively; ๐(. ) and ๐(. )are the sigmoid and
tangent activation functions, respectively; ๐โ and ๐ โ are
the peep-hole connections and biases, respectively; and โ
means element-wise product.
As an alternative to the LSTM, the Gated Recurrent Unit
(GRU) architecture was proposed in [20]. In [18], a GRU
architecture was found to achieve better performance
than LSTM on some tasks. A GRU is formulated as:
๐
๐ง
๐ ฬ
๐
=
=
=
=
๐(๐ ๐ฅ
๐(๐ ๐ฅ
๐(๐ ๐ฅ
๐ง โ๐
+๐ ๐ +๐ ),
+๐ ๐ +๐ ),
+ ๐ โ (๐ ๐ ) + ๐ ,
+ (1 โ ๐ง ) โ ๐ ฬ .
(6)
(7)
(8)
(9)
As one can see, a GRU architecture is similar to LSTM
but without a separate memory cell. Unlike LSTM, a
GRU does not include output activation functions and
peep-hole connections. It also integrates the input and
forget gates into an update gate, ๐ง , to balance between
the previous activation, ๐ , and the candidate
activation, ๐ ฬ . The reset gate, ๐ , allows it to forget the
previous state [21].
III. EXPERIMENTAL DESIGN
Our basic architecture, which employs a convolutional
recurrent neural network, is presented in Figure 1. In this
architecture, we integrate 2D CNNs, 1-D CNNs and
LSTM networks to better exploit long-term
dependencies. This structure currently uses LSTMs.
However, we can easily replace LSTMs with GRUs.
Feature extraction is performed using a fairly standard
linear frequency cepstral coefficient-based feature
extraction approach (LFCCs) popularized in applications
such as speech recognition [22][23]. We also use first and
second derivatives of the features since these provide a
small improvement in performance [22].
Drawing on a video classification analogy, input data to
the first layer of CNNs is composed of frames distributed
in time where each frame is an image of width (W) equal
to the length of a feature vector, the height (H) equals the
number of EEG channels, and the number of image
channels (N) equals one. Input data consists of T frames
where T is equal to the window length multiplied by the
number of samples per second.
In our optimized system with a window duration of 21
seconds, the first 2D convolutional layer filters 210
frames (T = 21 ร 10) of EEGs distributed in time with a
size of 26 ร 22 ร 1 (W=26, H=22, N=1) using 16 kernels
of size 3 ร 3 and with a stride of 1. The first 2D max
pooling layer takes as input a vector which is 260 frames
distributed in time with a size of 26 ร 22 ร 16 and applies
a pooling size of 2 ร 2. This process is repeated two times
with two 2D convolutional layers with 32 and 64 kernels
of size 3 ร 3 respectively and two 2D max pooling layers
with a pooling size 2 ร 2.
The output of the third max pooling layer is flattened to
210 frames with size of 384 ร 1. Then a 1D convolutional
layer filters the output of the flattening layer using 16
kernels of size 3 which decreases the dimensionality in
space to 210 ร 16. Then we apply a 1D maxpooling layer
with a size of 8 to decrease the dimensionality to 26 ร 16.
This is the input to a deep bidirectional LSTM network
where the dimensionality of the output space is 128 and
256. The output of the last bidirectional LSTM layer is
fed to a 2-way sigmoid function which produces a final
classification of an epoch. Epochs are typically 1 sec in
duration.
Figure 1: A deep recurrent convolutional architecture for two-dimensional decoding of EEG signals that integrates 2D CNNs, 1-D
CNNs and LSTM networks is shown. In this structure, LSTMs can be easily replaced by GRUs.
To overcome the problem of overfitting and force the
system to learn more robust features, regularizations are
used in first two layers of CNNs. To increase nonlinearity, Exponential Linear Units (ELU) are used [24].
Adam is used in the optimization process along with a
mean squared error loss function [14].
System
CNN/GRU
CNN/LSTM
Sensitivity
30.83%
30.83%
Specificity
91.49%
97.10%
FA/24 Hrs.
21
6
Table 2. Recognition results for convolutional recurrent neural
networks using GRU and LSTM architectures, for sensitivity
in range of 30%.
IV. RESULTS
The lack of big data resources that can be used to train
sophisticated statistical models compounds a major
problem in automatic seizure detection. Inter-rater
agreement for this task is low, especially when
considering short seizure events [1]. Manual annotation
of a large amount of data by a team of certified
neurologists is extremely expensive and time consuming.
It is difficult to employ large numbers of board-certified
neurologists to perform this task. In this study, we are
reporting results on the TUH EEG Seizure Corpus
(TUSZ) [13]. This dataset, which is publicly available, is
a subset of the TUH EEG Corpus that focuses on the
problem of seizure detection. A summary of the corpus
(v1.1.1) is shown in Table 1.
A comparison of the performance of the convolutional
recurrent neural networks using GRU and LSTM
architectures, for sensitivity in range of 30%, are shown
in Table 2 The related DET curve is illustrated in Figure 2
These systems were evaluated using a method of scoring
popular in the EEG research community known as the
overlap method [25]. True positives (TP) are defined as
the number of epochs identified as a seizure in the
reference annotations and correctly labeled as a seizure
by the system. True negatives (TN) are defined as the
number of epochs correctly identified as non-seizures.
False positives (FP) are defined as the number of epochs
incorrectly labeled as seizure while false negatives (FN)
are defined as the number of epochs incorrectly labeled
as non-seizure. Sensitivity shown in Table 2 is computed
as TP/(TP+FN). Specificity is computed as TN/(TN+FP).
The false alarm rate is the number of FPs per 24 hours.
By comparing the results of CNN/LSTM with
CNN/GRU, demonstrated in Figure 2, we find that in
lower false positive rates, CNN/LSTM has significantly
better performance from CNN/GRU, due to the fact that
while GRU unit controls the flow of information like the
LSTM unit, but it does not have a memory unit. LSTMs
Description
Patients
Sessions
Files
Seizure (secs)
Non-Seizure (secs)
Total (secs)
Train
196
456
1505
51,140
877,821
928,962
Eval
50
230
984
53,930
547,728
601,659
Table 1. An overview of the TUH EEG Seizure Corpus (v1.1.1)
Figure 2. DET Curves for convolutional recurrent neural
networks using GRU and LSTM architectures.
can remember longer sequences better than GRUs and
outperform it in this task, since seizure detection requires
modeling long distance relationships. Additionally, the
training time of CNN/GRU was 10% less than
CNN/LSTM. Hence, the training time of these two
systems is comparable, since most of the cycles are used
for training of convolutional layers.
In neural networks, determining the proper initialization
strategy for the parameters in the model is part of the
difficulty in training. Hence, we investigated a variety of
initialization methods using the structure introduced in
Figure 1. These results are presented in Table 4. The
related DET curve is illustrated in Figure 4. In our
experiments, we observed that the proper initialization of
weights in a convolutional recurrent neural network is
critical to convergence. For example, initialization with
zeros or ones methods completely stalled the
convergence process. Also, as we can see in Table 4, the
performance of the system for the same sensitivity of
30% can change from 7 to 40, for different initialization
methods. This decrease in performance and deceleration
of convergence arises because some initializations can
result in the deeper layers receiving inputs with small
variances, which in turn slows down back propagation,
and retards the overall convergence process.
The best performance is achieved using orthogonal
initialization. This method is a simple yet effective way
of combatting exploding and vanishing gradients.
Orthogonal matrices preserve the norm of a vector and
their eigenvalues have absolute value of one. This means
that, no matter how many times we perform repeated
matrix multiplication, the resulting matrix doesn't
explode or vanish [26]. Also in orthogonal matrices,
columns and rows are all orthonormal to one another,
which helps the weights to learn different input features.
Initialization
Orthogonal [26]
Lecun Uniform [27]
Glorot Uniform [28]
Glorot Normal [28]
Variance Scaling [26]
Lecun Normal [27]
He Normal [29]
Random Uniform [26]
Truncated Normal [26]
He Uniform [29]
Sensitivity Specificity FAs
30.8%
96.9%
7
30.3%
96.5%
8
31.0%
94.2% 13
29.5%
92.4% 18
31.8%
92.1% 19
31.8%
92.1% 19
31.3%
91.1% 22
30.2%
90.0% 25
31.6%
87.8% 31
29.2%
85.1% 40
Initialization
L1/L2
Dropout
Gaussian
L2
L1
Sensitivity
30.8%
30.8%
30.8%
30.2%
30.0%
Specificity FAs
97.1%
6
96.9%
7
95.8%
9
95.6% 10
43.7% 276
Table 3. Recognition results for convolutional LSTM
architecture, for sensitivity in range of 30%, using different
regularizations.
Table 4. Results for CNN/LSTM, for sensitivity in the range
of 30%, using different initialization methods.
Figure 3. DET curves for the CNN/LSTM architecture using
different regularizations.
SUMMARY
Figure 4. DET curves for the CNN/LSTM architecture using
different initialization methods.
Overfitting is a serious problem in deep neural nets with
many parameters. In this study, we used five popular
regularization methods to address this problem. By using
L1, L2 and L1/L2 techniques, we apply penalties on layer
parameters during optimization [30]. These penalties are
incorporated in the loss function that the network
optimizes. In an alternative approach, we used dropout to
prevents units from co-adapting too much by randomly
dropping units and their connections from the neural
network during training [30]. Also, we studied the impact
of introducing zero-centered Gaussian noise to the
network [30]. The results of these experiments are
presented in Table 3 along with a DET curve in Figure 3.
While generally L1/L2 has the best performance, as we
move towards a low FA rate, dropout delivers a lower FA
rate. Additionally, we found that the primary error
modalities observed were false alarms generated during
brief delta range slowing patterns such as intermittent
rhythmic delta activity. Our closed-loop experiments
showed us that all the regularizing methods presented in
Table 3 are playing an important role in increasing the
false alarms of slowing patterns. Even though dropout is
effective in CNNs, when dropout is placed over kernels
it leads to diminished results. To solve this problem, in
our future work, an efficient Bayesian convolutional
neural network is being explored that places a probability
distribution over the CNNโs kernels [31]. This approach
offers better robustness to overfitting on small data and
show improve the robustness of our training process.
In this paper, we investigated two deep learning
architectures (LSTM and GRU) for automatic
classification of EEGs using CNNs. LSTMs
outperformed GRUs. We also studied initialization and
regularizations of these networks. In future research, we
are designing a more powerful architecture based on
reinforcement learning concepts. We are also optimizing
regularization and initialization algorithms for these
approaches. Our goal is to approach human performance
which is in the range of 75% sensitivity with a false alarm
rate of 1 per 24 hours [11]. Robust training procedures
are needed to make this technology relevant to a wide
range of healthcare applications.
ACKNOWLEDGEMENTS
Research reported in this publication was most recently
supported by the National Human Genome Research
Institute of the National Institutes of Health under award
number U01HG008468. The content is solely the
responsibility of the authors and does not necessarily
represent the official views of the National Institutes of
Health. This material is also based in part upon work
supported by the National Science Foundation under
Grant No. IIP-1622765. Any opinions, findings, and
conclusions or recommendations expressed in this
material are those of the author(s) and do not necessarily
reflect the views of the National Science Foundation. The
TUH EEG Corpus work was funded by (1) the Defense
Advanced Research Projects Agency (DARPA) MTO
under the auspices of Dr. Doug Weber through the
Contract No. D13AP00065, (2) Temple Universityโs
College of Engineering and (3) Temple Universityโs
Office of the Senior Vice-Provost for Research.
REFERENCES
[1]
I. Obeid and J. Picone, โMachine Learning Approaches to
Automatic Interpretation of EEGs,โ in Biomedical Signal
Processing in Big Data, 1st ed., E. Sejdik and T. Falk, Eds. Boca
Raton, Florida, USA: CRC Press, 2017, p. N/A.
[2]
Lopez, S., Suarez, G., Jungries, D., Obeid, I., & Picone, J. (2015).
Automated Identification of Abnormal EEGs. In IEEE Signal
Processing in Medicine and Biology Symposium (pp. 1โ4).
Philadelphia, Pennsylvania, USA.
B. Direito, C. Teixeira, B. Ribeiro, M. Castelo-Branco, F. Sales,
and A. Dourado, โModeling epileptic brain states using EEG
spectral analysis and topographic mapping,โ J. Neurosci.
Methods, vol. 210, no. 2, pp. 220โ229, 2012.
[3]
[4]
[5]
A. Temko, E. Thomas, W. Marnane, G. Lightbody, and G.
Boylan, โEEG-based neonatal seizure detection with Support
Vector Machines,โ Clin. Neurophysiol., vol. 122, no. 3, pp. 464โ
473, 2011.
[20]
[21]
[22]
[23]
[24]
J. Gotman, โAutomatic recognition of epileptic seizures in the
EEG,โ Electroencephalogr. Clin. Neurophysiol., vol. 54, no. 5,
pp. 530โ540, Nov. 1982.
[25]
[6]
J. Gotman, โAutomatic detection of seizures and spikes.,โ J. Clin.
Neurophysiol., vol. 16, no. 2, pp. 130โ140, 1999.
[26]
[7]
C. J. Stam, โNonlinear dynamical analysis of EEG and MEG:
Review of an emerging field,โ Clinical Neurophysiology, vol.
116, no. 10. pp. 2266โ2301, 2005.
[8]
T. Alotaiby, S. Alshebeili, T. Alshawi, I. Ahmad, and F. Abd ElSamie, โEEG seizure detection and prediction algorithms: a
survey,โ EURASIP J. Adv. Signal Process., vol. 2014, no. 1, pp.
1โ21, 2014.
S. Ramgopal, โSeizure detection, seizure prediction, and closedloop warning systems in epilepsy,โ Epilepsy Behav., vol. 37, pp.
291โ307, 2014.
A. Varsavsky and I. Mareels, โPatient un-specific detection of
epileptic seizures through changes in variance,โ in Proceedings of
the Annual International Conference of the IEEE Engineering in
Medicine and Biology Society, 2006, pp. 3747โ3750.
C. B. Swisher, C. R. White, B. E. Mace, and K. E. Dombrowski,
โDiagnostic Accuracy of Electrographic Seizure Detection by
Neurophysiologists and Non-Neurophysiologists in the Adult
ICU Using a Panel of Quantitative EEG Trends,โ J. Clin.
Neurophysiol., vol. 32, no. 4, pp. 324โ330, Jan. 2015.
I. Obeid and J. Picone, โThe Temple University Hospital EEG
Data Corpus,โ Front. Neurosci. Sect. Neural Technol., vol. 10, p.
196, 2016.
M. Golmohammadi et al., โThe TUH EEG Seizure Corpus,โ in
Proceedings of the American Clinical Neurophysiology Society
Annual Meeting, 2017, p. 1.
M. Golmohammadi, S. Ziyabari, V. Shah, I. Obeid, and J. Picone,
โDeep Architectures for Automated Seizure Detection in Scalp
EEGs,โ in Proceedings of the AAAI Conference on Artifical
Intelligence, 2018, pp. 1โ8.
Y. Bengio, P. Simard, and P. Frasconi, โLearning Long-Term
Dependencies with Gradient Descent is Difficult,โ IEEE Trans.
Neural Networks, vol. 5, no. 2, pp. 157โ166, 1994.
R. Pascanu, T. Mikolov, and Y. Bengio, โOn the difficulty of
training recurrent neural networks,โ in International Conference
on Machine Learning, 2013, no. 2, pp. 1310โ1318.
S. Hochreiter, S. Hochreiter, J. Schmidhuber, and J. Schmidhuber,
โLong short-term memory.,โ Neural Comput., vol. 9, no. 8, pp.
1735โ80, 1997.
J. Chung, C. Gulcehre, K. Cho, and Y. Bengio, โEmpirical
Evaluation of Gated Recurrent Neural Networks on Sequence
Modeling,โ arXiv Prepr. arXiv1412.3555, pp. 1โ9, 2014.
A. Graves and J. Schmidhuber, โFramewise phoneme
classification with bidirectional LSTM networks,โ in Proceedings
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[27]
[28]
[29]
[30]
[31]
of the International Joint Conference on Neural Networks, 2005,
vol. 4, pp. 2047โ2052.
K. Cho et al., โLearning phrase representations using rnn encoderdecoder for statistical machine translation,โ arXiv Prepr.
arXiv1406.1078, 2014.
Z. Wu and S. King, โInvestigating gated recurrent networks for
speech synthesis,โ in International Conference on Acoustics,
Speech and Signal Processing, 2016.
A. Harati, M. Golmohammadi, S. Lopez, I. Obeid, and J. Picone,
โImproved EEG Event Classification Using Differential Energy,โ
in Proceedings of the IEEE Signal Processing in Medicine and
Biology Symposium, 2015, pp. 1โ4.
S. Lopez, M. Golammadi, I. Obeid, and J. Picone, โAn Analysis
of Two Common Reference Points for EEGs,โ in Proceedings of
the IEEE Signal Processing in Medicine and Biology Symposium,
2016, pp. 1โ4.
D. Clevert, T. Unterthiner, and S. Hochreiter, โFast and Accurate
Deep Network Learning by Exponential Linear Units (ELUs),โ
arXiv Prepr. arXiv1511.07289, pp. 1โ14, 2016.
S. B. Wilson, M. L. Scheuer, C. Plummer, B. Young, and S. Pacia,
โSeizure detection: correlation of human experts,โ Clin.
Neurophysiol., vol. 114, no. 11, pp. 2156โ2164, Nov. 2003.
A. M. Saxe, J. L. McClelland, and S. Ganguli, โExact solutions to
the nonlinear dynamics of learning in deep linear neural
networks,โ in International Conference on Learning
Representations, 2014, pp. 1โ22.
Y. A. LeCun, L. Bottou, G. B. Orr, and K. R. Mulller, โEfficient
backprop,โ Lect. Notes Comput. Sci, 2012, pp. 1โ44.
X. Glorot and Y. Bengio, โUnderstanding the difficulty of training
deep feedforward neural networks,โ Proc. 13th Int. Conf. Artif.
Intell. Stat., pp. 1โ8, 2010.
K. He, X. Zhang, S. Ren, and J. Sun, โDelving deep into rectifiers:
Surpassing human-level performance on imagenet classification,โ
in Proceedings of the IEEE International Conference on
Computer Vision, pp. 1โ11, 2015.
N. Srivastava, G. Hinton, A. Krizhevsky, I. Sutskever, and R.
Salakhutdinov, โDropout: A Simple Way to Prevent Neural
Networks from Overfitting,โ J. Mach. Learn. Res., vol. 15, pp.
1929โ1958, 2014.
Y. Gal and Z. Ghahramani, โBayesian convolutional neural
networks with bernoulli approximate variational inference,โ arXiv
Prepr. arXiv:1506.02158, pp. 1โ12, 2016.
| 2cs.AI
|
NodeTrix Planarity Testing with Small Clusters
Emilio Di Giacomo1 , Giuseppe Liotta1 ,
Maurizio Patrignani2 , Alessandra Tappini1
arXiv:1708.09281v2 [cs.DS] 4 Sep 2017
1
Universitaฬ degli Studi di Perugia, Italy
{emilio.digiacomo,giuseppe.liotta}@unipg.it
[email protected]
2
Roma Tre University, Italy
[email protected]
Abstract. We study the NodeTrix planarity testing problem for flat
clustered graphs when the maximum size of each cluster is bounded by
a constant k. We consider both the case when the sides of the matrices
to which the edges are incident are fixed and the case when they can be
arbitrarily chosen. We show that NodeTrix planarity testing with fixed
3
sides can be solved in O(k3k+ 2 n3 ) time for every flat clustered graph
that can be reduced to a partial 2-tree by collapsing its clusters into
single vertices. In the general case, NodeTrix planarity testing with fixed
sides can be solved in O(n3 ) time for k = 2, but it is NP-complete for
any k โฅ 3. NodeTrix planarity testing remains NP-complete also in the
free side model when k > 4.
1
Introduction
Motivated by the need of visually exploring non-planar graphs, hybrid planarity
is one of the emerging topics in graph drawing (see, e.g., [1,2,3,8]). A hybrid
planar drawing of a non-planar graph suitably represents in restricted geometric regions those dense subgraphs for which a classical node-link representation
paradigm would not be visually effective. These regions are connected by edges
that do not cross each other. Different representation paradigms for the dense
subgraphs give rise to different types of hybrid planar drawings.
Angelini et al. [1] consider hybrid planar drawings where dense portions of the
graph are represented as intersection graphs of sets of rectangles and study the
complexity of testing whether a non-planar graph admits such a representation.
In the context of social network analysis, Henry et al. [8] introduce NodeTrix
representations, where the dense subgraphs are represented as adjacency matrices. Batagelj et al. [2] study the question of minimizing the size of the matrices
in a NodeTrix representation of a graph while guaranteeing the planarity of the
edges that connect different matrices. While Batagelj et al. can choose the subgraphs to be represented as matrices, Da Lozzo et al. [3] consider the problem
of testing whether a flat clustered graph (i.e. a graph with clusters and no subclusters) admits a NodeTrix planar representation. In the paper of Da Lozzo
et al. each cluster must be represented by a different adjacency matrix and the
inter-cluster edges are represented as non-intersecting simple Jordan arcs. They
prove that NodeTrix planarity testing for flat clustered graphs is NP-hard even
in the constrained case where for each matrix it is specified which inter-cluster
edges must be incident on the top, or on the left, or on the bottom, or on the
right side.
Motivated by these hardness results, in this paper we study whether NodeTrix
planarity testing can be efficiently solved when the size of the clusters is not
โtoo bigโ. More precisely, we consider flat clustered graphs whose clusters have
size bounded by a fixed parameter k and we want to understand whether the
NodeTrix planarity testing problem is fixed parameter tractable, i.e. it can be
solved in time f (k)T (n), where T (n) is a polynomial in n and f (k) is a function
that depends only on k. Our main results can be listed as follows:
3
โ We describe an O(k 3k+ 2 ยทn3 )-time algorithm to test NodeTrix planarity with
fixed sides for flat clustered graphs that are partial 2-trees. Informally, a flat
clustered graph G is a partial 2-tree if the graph obtained by collapsing every
cluster of G into a single vertex is a partial 2-tree.
โ When the flat clustered graph is not a partial 2-tree, NodeTrix planarity
testing with fixed sides can still be solved in O(n3 ) time for k = 2, but it
becomes NP-complete for any larger value of k.
โ Finally, we extend the above hardness result to the free sides model and show
that NodeTrix planarity testing remains NP-complete when the maximum
cluster dimension is larger than four. This is done by proving that NAE3SAT
is NP-complete even for triconnected Boolean formulas, which may be a
result of independent interest.
Our polynomial-time solution solves a special type of the planarity testing
problem where the order of the edges around each vertex is suitably constrained
to take into account the fact that a vertex of a matrix M has four copies along
the four sides of M . It may be worth recalling that Gutwenger et al. [6] have
considered an apparently similar problem. Namely, they studied planarity testing
where the order of the edges around the vertices may not be arbitrarily permuted.
Unfortunately, not only our problem does not fall in any of the cases addressed
by Gutwenger et al., but it does not seem solvable by introducing a gadget
of polynomial size that models the embedding constraints at each vertex. This
characteristic associates NodeTrix planarity testing with other known variants
of planarity testing, including clustered planarity, where the use of gadgets of
polynomial size has been so far an elusive goal.
The rest of the paper is organized as follows. Preliminary definitions are in
Section 2. Sections 3 and 4 describe a polynomial time algorithm for clustered
2-trees with bounded cluster-size. In Section 5 we show that for general flat
clustered graphs and fixed sides NodeTrix planarity testing can be solved in
polynomial time for k = 2 but it is NP-complete for k โฅ 3. In the same section
we extend this completeness result to NodeTrix planarity testing of flat clustered
graphs with free sides. Finally open problems can be found in Section 6. Some
proofs can be found in the appendix.
2
Preliminaries
We assume familiarity with basic definitions of graph theory and graph drawing
and in particular with the notions of block-cut-vertex tree and of SPQR-tree
(see, e.g., [4,7]).
A flat clustered graph G = (V, E, C) is a simple graph with vertex set V ,
edge set E, and a partition C of V into sets V1 , . . . , Vh , called clusters. An edge
(u, v) โ E with u โ Vi and v โ Vj is an intra-cluster edge if i = j and it is an
inter-cluster edge if i 6= j.
A NodeTrix representation of a flat clustered graph G is such that: (i) Each
cluster Vi with |Vi | = 1 (called trivial cluster) is represented as a distinct point
in the plane. (ii) Each cluster Vi with |Vi | > 1 (called non-trivial cluster) is
represented by a symmetric adjacency matrix Mi (with |Vi | rows and columns),
where Mi is drawn in the plane so that its boundary is a square with sides
parallel to the coordinate axes. (iii) There is no intersection between two distinct
matrices or between a point representing a vertex and a matrix. (iv) Each intracluster edge of a cluster Vi is represented by the adjacency matrix Mi . (v) Each
inter-cluster edge (u, v) with u โ Vi and v โ Vj is represented by a simple
Jordan arc connecting a point on the boundary of matrix Mi with a point on
the boudary of matrix Mj , where the point on Mi (on Mj ) belongs to the column
or to the row of Mi (resp. of Mj ) associated with u (resp. with v).
A NodeTrix representation of a flat clustered graph G is planar if there is
no intersection between any two inter-cluster edges (except possibly at common
end-points) nor an intersection between an inter-cluster edge and a matrix. A flat
clustered graph is NodeTrix planar if it admits a planar NodeTrix representation.
Fig. 1(a) is an example of a NodeTrix planar representation.
A formal definition of the problem investigated in the paper is as follows. Let
G = (V, E, C) be a flat clustered graph with n vertices and let k be the maximum
cardinality of a cluster in C. Clustered graph G is NodeTrix planar with fixed
sides if it has a NodeTrix planar representation where for each inter-cluster
edge, the sides of matrices it attaches to is specified as part of the input; G is
NodeTrix planar with free sides if the sides of the matrices to which inter-cluster
edges attach can be arbitrarily chosen.
Let Mi be the matrix representing cluster Vi in a NodeTrix representation
of G; let v be a vertex of Vi and let (u, v) be an inter-cluster edge. Edge (u, v)
can intersect the boundary of Mi in four points pv,t , pv,b , pv,l , and pv,r since the
row and column that represent v in Mi intersect the four sides of the boundary
of Mi . We call such points the top copy, bottom copy, left copy, and right copy
of v in Mi , respectively.
A side assignment for Vi โ C specifies for each inter-cluster edge whether the
edge must attach to the matrix Mi representing Vi in its top,
S left, right, or bottom
side. More precisely, a side assignment is a mapping ฯi : j6=i Ei,j โ {t, b, l, r},
where Ei,j is the set of inter-cluster edges between the clusters Vi and Vj (Vi
and Vj are adjacent if Ei,j 6= โ
). A side assignment for C is a set ฮฆ of side
assignments for each Vi โ C.
We denote as G = (V, E, C, ฮฆ) a flat clustered graph G = (V, E, C) with a
given side assignment ฮฆ = {ฯ1 , ฯ2 , . . . , ฯ|C| }. Let ฮ be a NodeTrix representation
of G such that, for every inter-cluster edge e = (u, v) โ E with u โ Vi and v โ Vj ,
the incidence points of e with the matrices Mi and Mj representing Vi and Vj in
ฮ are exactly the points pu,ฯi (e) and pv,ฯj (e) , respectively. We call ฮ a NodeTrix
representation of G consistent with ฮฆ. We say that G = (V, E, C, ฮฆ) is NodeTrix
planar if it admits a NodeTrix planar representation consistent with ฮฆ.
An inter-cluster edge is heavy if both its end-vertices belong to non-trivial
clusters. It is light otherwise. A flat clustered graph is light if every intercluster edge is light. A 1-subdivision of a heavy edge e = (u, v) of a flat clustered graph G = (V, E, C) replaces e with a path u0 = u, u1 , u2 = v and
defines a new flat clustered graph G0 = (V 0 , E 0 , C 0 ), where V 0 = V โช {u1 },
E 0 = E/e โช {(u0 , u1 ), (u1 , u2 )}, and C 0 = C โช {u1 }. The light reduction of G
is the flat clustered graph G0 obtained by performing a 1-subdivision of every
heavy inter-cluster edge of G. A consequence of Theorem 1 in [5] about the edge
density of NodeTrix planar graphs, is that the light reduction G0 of a NodeTrix
planar flat clustered graph G has O(|V |) vertices and O(|V |) inter-cluster edges.
Property 1. A flat clustered graph G is NodeTrix planar if and only if its light
reduction G0 is NodeTrix planar.
Based on Property 1, in the remainder we shall assume that flat clustered
graphs are always light and we call them clustered graphs, for short.
The frame of a clustered graph G = (V, E, C) is the graph F obtained by
collapsing each cluster Vi โ C, with |Vi | > 1, into a single vertex ci of F , called
the representative vertex of Vi in F . Let ci and cj be the two representative
vertices of Vi and Vj in F , respectively. For every inter-cluster edge connecting
a vertex of Vi to a vertex of Vj in G there is an edge in F connecting ci and cj .
Observe that the frame graph F of G is in general a multigraph; however, F is
simple when G is light.
Since the NodeTrix planarity of a clustered graph implies the planarity of
its frame graph, we will test NodeTrix planarity only on those clustered graphs
that have a planar frame.
A 2-tree is a graph recursively defined as follows: (i) an edge is a 2-tree; (ii)
the graph obtained by adding a vertex v to a 2-tree G and by connecting v to
two adjacent vertices of G is a 2-tree. A (planar) graph is a partial 2-tree if it is
a subgraph of a (planar) 2-tree. A biconnected partial 2-tree is a series-parallel
graph. A clustered graph is a partial 2-tree if its frame is a partial 2-tree. We
will sometimes talk about series-parallel clustered graphs when their frames are
series parallel.
3
NodeTrix Representations and Wheel Reductions
The polynomial-time algorithms described in Sections 4 and 5 are based on
decomposing the planar frame F of a clustered graph G = (V, E, C, ฮฆ) into
its biconnected components and storing them into a block-cut-vertex tree. We
process each block of F by using an SPQR decomposition tree that is rooted at
a reference edge and visited from the leaves to the root. For each visited node
ยต of the decomposition tree of a block of F we test whether the subgraph of G
whose frame is the pertinent graph of ยต satisfies the planar constraints imposed
by the side assignment on the inter-cluster edges. A key ingredient to efficiently
perform the test at ยต is the notion of wheel replacement.
Let G = (V, E, C, ฮฆ) be a clustered graph with side assignment ฮฆ and let Vi โ
C be a cluster with k > 1 vertices. Vi admits k! permutations of its vertices and
we associate a suitable graph to each such permutation. Let ฯi = v0 , v1 , . . . , vkโ1
be a permutation of the vertices of Vi . The wheel of Vi consistent with ฯi is the
wheel graph consisting of a vertex v of degree 4k adjacent to the vertices of an
oriented cycle v0,t , v1,t , . . . , vkโ1,t , v0,r , v1,r , . . . , vkโ1,r , vkโ1,b , vkโ2,b , . . . , v0,b ,
vkโ1,l , vkโ2,l , . . . , v0,l where each edge of the cycle is oriented forward. Intuitively, this oriented cycle will be embedded clockwise to encode the constraints
induced by a matrix Mi representing Vi when its left-to-right order of columns
is ฯi . More precisely, a wheel replacement of cluster Vi consistent with ฯi is the
clustered graph obtained as follows: (i) remove Vi and all the inter-cluster edges
incident to Vi ; (ii) insert the wheel Wi of Vi consistent with ฯi ; and (iii) for each
inter-cluster edge e = (u, vj ), with vj โ Vi , insert edge (u, vj,ฯi (e) ) incident to
Wi . We call edge (u, vj,ฯi (e) ) the image of edge e = (u, vj ).
Let G = (V, E, C, ฮฆ, ฮ ) be a clustered graph with side assignment ฮฆ where
ฮ is a set of permutations {ฯ1 , ฯ2 , . . . , ฯ|C| }, one for each cluster Vi (with i =
1, . . . , |C|). We call ฮ the permutation assignment of G and we say that G
is NodeTrix planar with side assignment ฮฆ and permutation assignment ฮ if
G admits a NodeTrix planar representation with side assignment ฮฆ where for
each matrix Mi the permutation of its columns is ฯi . The wheel reduction of G
consistent with ฮ is the graph obtained by performing a wheel replacement of
Vi โ C consistent with ฯi for each i = 1, . . . , |C|.
Theorem 1. Let G = (V, E, C, ฮฆ, ฮ ) be a clustered graph with side assignment
ฮฆ and permutation assignment ฮ . G is NodeTrix planar if and only if the planar
wheel reduction of G admits a planar embedding where the external oriented cycle
of each wheel Wi is embedded clockwise.
Fig. 1(a) and Fig. 1(b) show respectively a NodeTrix planar representation
of a clustered graph G and the corresponding wheel reduction with its planar
embedding.
Based on Theorem 1, we can test the graph G = (V, E, C, ฮฆ) for NodeTrix
planarity by exploring the space of the possible permutation sets ฮ and corresponding wheel reductions in search of a NodeTrix planar G = (V, E, C, ฮฆ, ฮ ).
Note that, if the maximum size of a cluster is given as a parameter k, every
cluster Vi can be replaced by k! wheel graphs, one for each possible permutation
of the vertices of Vi . In order to test planarity, for any such wheel replacement
Wi , the cyclic order of the inter-cluster edges incident to the same vertex of Wi
can be arbitrarily permuted. While each wheel reduction yields an instance of
constrained planarity testing that can be solved with the linear-time algorithm
u2
v2,L
u0,L
v1,R
u1,L
v2,R
u2,L
vo
id
vo
id
vo
id
,T
,T
u2
,T
v0,R
u1
u0
,T
,T
,T
v2
v
v1,L
u1
v2
Wtยต
v0,L
u0
v1
v1
v0
v0
u
u0,R
void
u1,R
void
u2,R
void
Wtยต
void
v
ext
int-ext
id
vo
t
in
id
vo
,B
,B
u2
,B
u1
u0
,B
,B
,B
v2
v1
v0
2,
T
1,
T
w
w
w
0,
T
ยต
w0,L
w0
w0,R
w
w1,L
w1
w2
w2,L
w2,R
,B
,B
,B
w2
w1
w0
(a)
w1,R
Ws ยต
(b)
(c)
Fig. 1. (a) A NodeTrix planar representation of a clustered graph. (b) The planar
embedding of the corresponding wheel reduction. (c) Labeling of the vertices of
Wtยต ; the complete internal and external sequences are highlighted.
described in [6], a brute-force approach that repeats this algorithm on each possible wheel reduction may lead to testing planarity on |C|k! different instances.
Instead, for each visited node ยต of the decomposition tree T we compute a succinct description of the possible NodeTrix planar representations of the subgraph
Gยต of G represented by the subtree of T rooted at ยต. This is done by storing
for the poles of ยต those pairs of wheel graphs that are compatible with a NodeTrix planar representation of Gยต . How to efficiently compute such a succinct
description will be the subject of the next sections.
4
Testing NodeTrix Planarity for Partial 2-Trees
In this section we prove that NodeTrix planarity testing with fixed sides can
be solved in polynomial time for a clustered graph G = (V, E, C, ฮฆ) when the
maximum size of any cluster of C is bounded by a constant and the frame graph
is a partial 2-tree. This contrasts with the NP-hardness of NodeTrix planarity
testing with fixed sides proved in [3] in the case where the size of the clusters is
unbounded.
We first study the case of a clustered graph whose frame graph is a seriesparallel graph, i.e., it is biconnected and its SPQR decomposition tree only has
Q-, P-, and S-nodes. We then consider the case of partial 2-trees, i.e., graphs
whose biconnected components are series-parallel.
4.1
Series-Parallel Frame Graphs
In this section we prove that NodeTrix planarity testing with fixed sides can
3
be solved in O(k 3k+ 2 ยท n2 ) time for clustered graphs whose frame graphs are
series-parallel and have cluster size at most k.
Let G = (V, E, C, ฮฆ) be a series-parallel clustered graph with side assignment
ฮฆ and let F be its frame graph. Let T be the SPQ decomposition tree of F
rooted at any Q-node. To simplify the description and without loss of generality,
we assume that every S-node of T has exactly two children. Let ยต be a node of
T , and let sยต , tยต be the poles of ยต. Consider the pertinent graph Fยต represented
by the subtree of T rooted at ยต and let vยต be a pole of ยต (vยต โ {sยต , tยต }). Pole
vยต in the frame graph F may correspond to a non-trivial cluster Vi of C. In this
case, we call vยต a non-trivial pole of ยต and cluster Vi the pertinent cluster of vยต .
The edges of Fยต incident to vยต are the intra-component edges of vยต . The
other edges of F incident to vยต are the extra-component edges of vยต . Each intracomponent (extra-component) edge of vยต corresponds to an inter-cluster edge e0
of G incident to one vertex of the pertinent cluster Vยต of vยต . We call e0 an intracomponent edge (extra-component edge) of Vยต . We associate k! wheel graphs
to each non-trivial pole vยต of ยต. Each of them is a wheel replacement of the
pertinent cluster of vยต , consistent with one of the k! permutations of its vertices.
Let vยต be a non-trivial pole of ยต, let Vยต be the pertinent cluster of vยต , let ฯยต
be a permutation of the vertices of Vยต , and let Wยต be the wheel replacement of
Vยต consistent with ฯยต . Every edge e incident to Wยต such that e is the image of
an inter-cluster edge e0 of G is labeled either int or ext, depending on whether
e0 is an intra-component or an extra-component edge of Vยต . A vertex w of the
external cycle of Wยต is assigned one label of the set {void, int, ext, int-ext}
as follows. Vertex w is labeled void if no edge incident to w is the image of
an inter-cluster edge. Vertex w is labeled int (resp. ext) if we have a label
int (resp. ext) on every edge e incident to w such that e is the image of an
inter-cluster edge. Otherwise, vertex w is labeled int-ext. See Fig. 1(c) for an
example concerning the wheel Wtยต of Fig. 1(b); the dashed curve of Fig. 1(b)
shows the subgraph of the wheel reduction corresponding to Fยต .
A clockwise sequence v0 , v1 , . . . , vj of vertices of the external cycle of Wยต is
an external sequence of pole vยต consistent with ฯยต if v0 and vj are labeled either
ext or int-ext and all the other vertices of the sequence are labeled either
void or ext. An external clockwise sequence of pole vยต is complete if it contains
all the vertices of Wยต that are labeled ext and int-ext. Note that a complete
external sequence may contain many void vertices but no int vertex. Internal
and complete internal sequences of pole vยต are defined analogously. Observe that
a complete internal sequence and a complete external sequence of vยต may not
exist when vertices labeled int and vertices labeled ext alternate more than
twice when traversing clockwise the external cycle of Wยต , or when three vertices
are labeled int-ext. A special case is when Wยต has exactly two vertices w1 and
w2 labeled int-ext and all other vertices are void. In this case, the clockwise
sequence from w1 to w2 and the clockwise sequence from w2 to w1 are both
complete internal and complete external sequences.
In order to test G = (V, E, C, ฮฆ) for NodeTrix planarity, we implicitly take
into account all possible permutation assignments ฮ by considering, for each
non-trivial pole wยต of each node ยต of T , its k! possible wheels and by computing
their complete internal and complete external sequences. We visit the SP Q
decomposition tree T from the leaves to the root and equip each node ยต of T with
information regarding the complete internal and complete external sequences of
its non-trivial poles. Let ยต be an internal node of T , let vยต be a non-trivial pole
of ยต, let ฯvยต be a permutation of the pertinent cluster Vยต of vยต , and let Wยต be
the wheel of Vยต consistent with ฯvยต . We denote as ISeq(ยต, vยต , ฯvยต ) the complete
internal sequence of vยต consistent with ฯvยต in pole ยต and as ESeq(ยต, vยต , ฯvยต ) the
complete external sequence of vยต consistent with ฯvยต in pole ยต. We distinguish
between the different types of nodes of T .
Node ยต is a Q-node. Since G is light, at most one of its poles is non-trivial.
Let e be an edge of F that is the pertinent graph of ยต. One end-vertex of e is
the representative vertex in F of the pertinent cluster of the non-trivial pole vยต .
In fact, edge e corresponds to an edge e0 = (u, z) of G such that u โ Vยต and z
is a trivial cluster. The side assignment ฯvยต defines whether e is incident to the
top, bottom, left, or right copy uW of u in the wheel Wยต of Vยต . For any possible
permutation ฯvยต we have ISeq(ยต, vยต , ฯvยต ) = uW . If uW is labeled int-ext, then
ESeq(ยต, vยต , ฯvยต ) is the external cycle of Wยต starting at uW and ending at uW .
Otherwise, traverse the external cycle of Wยต starting at uW and following the
direction of the edges; ESeq(ยต, vยต , ฯvยต ) consists of all the encountered vertices
from the first labeled ext to the last labeled ext.
Node ยต is a P-node. Let ฮฝ0 , ฮฝ1 , . . . , ฮฝhโ1 be the children of ยต. Observe that
vยต is a non-trivial pole also for the children ฮฝ0 , ฮฝ1 , . . . , ฮฝhโ1 of ยต. We consider
every permutation ฯvยต such that ฮฝ0 , ฮฝ1 , . . . , ฮฝhโ1 have both a complete internal sequence and a complete external sequence compatible with ฯvยต . The complete internal sequence of vยต consistent with ฯvยต is the union of the complete
internal sequences of the children ฮฝ0 , ฮฝ1 , . . . , ฮฝhโ1 , that is ISeq(ยต, vยต , ฯvยต ) =
โชhโ1
i=0 ISeq(ฮฝi , vยต , ฯvยต ).
To determine the complete external sequence of vยต consistent with ฯvยต we
consider the intersection of the complete external sequences of the children of
ยต. If this intersection consists of exactly one sequence of consecutive vertices,
hโ1
then ESeq(ยต, vยต , ฯvยต ) = โฉi=0
ESeq(ฮฝi , vยต , ฯvยต ). Otherwise (i.e., the intersection
is empty or it consists of more than one sequence of consecutive vertices), vยต
does not have a complete external sequence consistent with ฯvยต .
Node ยต is an S-node. Let ฮฝ be the child of ยต that shares the pole vยต with ยต.
We consider every permutation ฯvยต such that ฮฝ has both ISeq(ฮฝ, vยต , ฯvยต ) and
ESeq(ฮฝ, vยต , ฯvยต ). The complete internal (external) sequence of vยต consistent with
ฯvยต is ISeq(ยต, vยต , ฯvยต ) = ISeq(ฮฝ, vยต , ฯvยต ) (ESeq(ยต, vยต , ฯvยต ) = ESeq(ฮฝ, vยต , ฯvยต )).
To test G for NodeTrix planarity we execute a bottom-up traversal of T
and, for each node ยต with poles sยต and tยต , we check whether each possible pair
(ฯsยต , ฯtยต ) induces complete internal and external sequences for sยต and tยต that
are โcompatibleโ with a planar embedding of the wheel reduction of G. If this is
the case, by Theorem 1, G is NodeTrix planar, otherwise we reject G.
More formally, let ฯsยต (ฯtยต , respectively) be a permutation such that sยต (tยต ,
respectively) has both a complete internal sequence and a complete external
sequence compatible with ฯsยต (ฯtยต , respectively). We say that (ฯsยต , ฯtยต ) is a
compatible pair of permutations for ยต if either one of the poles is a trivial pole
or one of the following cases applies.
Node ยต is a Q-node. In this case all k! possible pairs of permutations for sยต
or tยต (recall that only one of them is non-trivial) are compatible for ยต.
Node ยต is a P-node. Let ฮฝ0 , ฮฝ1 , . . . , ฮฝhโ1 be the children of ยต. Consider a pair
of permutations (ฯsยต , ฯtยต ); we recall that, for i = 0, . . . , hโ1, each ฮฝi has poles sยต
and tยต . A first condition for pair (ฯsยต , ฯtยต ) to be a compatible pair for ยต is that
(ฯsยต , ฯtยต ) is also a compatible pair for ฮฝi , with i = 0, . . . , hโ1. A second condition
asks that the pair (ฯsยต , ฯtยต ) defines opposite orders on the poles of ยต. Namely, let
Wยตs (resp., Wยตt ) be the wheel of Vsยต (resp., Vtยต ) consistent with ฯsยต (resp., ฯtยต ).
Traversing clockwise the external cycle of Wยตs starting from the first vertex of
ESeq(ยต, sยต , ฯsยต ), let ISeq(ฮฝ0 , sยต , ฯsยต ), ISeq(ฮฝ1 , sยต , ฯsยต ), . . . , ISeq(ฮฝhโ1 , sยต , ฯsยต )
be the order by which the internal sequences are encountered. Pair (ฯsยต , ฯtยต )
defines opposite orders on the poles of ยต if, traversing clockwise the external
cycle of Wยตt starting from the first vertex of ESeq(ยต, tยต , ฯsยต ), the order by which
we encounter the internal sequences of ฮฝ0 , ฮฝ1 , . . . , ฮฝhโ1 is the opposite one, i.e.,
the order is ISeq(ฮฝhโ1 , tยต , ฯtยต ), ISeq(ฮฝhโ2 , tยต , ฯtยต ), . . . , ISeq(ฮฝ0 , tยต , ฯtยต ).
Node ยต is an S-node. Let ฮฝ0 and ฮฝ1 be the children of ยต such that sฮฝ0 = sยต ,
tฮฝ0 = sฮฝ1 , and tฮฝ1 = tยต . A pair (ฯsยต , ฯtยต ) is a compatible pair for ยต if there exists
a permutation ฯtฮฝ0 such that the pair (ฯsยต , ฯtฮฝ0 ) is compatible for ฮฝ0 and the
pair (ฯtฮฝ0 , ฯtยต ) is compatible for ฮฝ1 .
Fig. 2 suggests that a NodeTrix planar representation of a clustered graph
G defines a permutation assignment ฮ such that, for every node ยต of T , pair
(ฯsยต , ฯtยต ) is a compatible pair for ยต.
Lemma 1. Let G = (V, E, C, ฮฆ) be a clustered graph with side assignment ฮฆ
and let T be the SPQ decomposition tree of the frame graph of G. Graph G is
NodeTrix planar if and only if there exists a permutation assignment ฮ such that,
for every node ยต of T with poles sยต and tยต , we have that permutation ฯsยต โ ฮ
and permutation ฯtยต โ ฮ form a compatible pair of permutations for ยต.
Lemma 2. Let G = (V, E, C, ฮฆ) be a series-parallel clustered graph with side
assignment ฮฆ. Let k be the maximum size of any cluster in C and let n be the
3
cardinality of V . There exists an O(k 3k+ 2 ยท n2 )-time algorithm that tests whether
G is NodeTrix planar with side assignment ฮฆ and if so, it computes a NodeTrix
planar representation of G consistent with ฮฆ.
Proof. Let F be the frame graph of G; for any possible choice of an edge e
of F we repeat the following procedure. We construct the SPQ decomposition
tree of G rooted at the Q-node whose pertinent graph is e. We visit T from the
leaves to the root and test whether G has a permutation assignment ฮ such that
G = (V, E, C, ฮฆ, ฮ ) is NodeTrix planar. We first equip each non-trivial pole vยต
of every node ยต of T with its possible complete internal and complete external
sequences. The maximum number of complete internal sequences of vยต is k!. The
same is true for the complete external sequences. If each complete (internal or
Wtยต
ยต
Wsยต
(a)
(b)
Fig. 2. (a) A NodeTrix planar representation ฮ of G = (V, E, C, ฮฆ). (b) ฮ induces
a permutation assignment and a planar embedding of a wheel reduction of G; the
complete internal and external sequences for a pair of poles are also highlighted.
external) sequence of pole vยต is encoded by means of its first and last vertex in the
clockwise order around Wvยต , then each complete internal or external sequence
needs constant space. It follows that the intersection or the union of two complete
internal or external sequences can be computed in constant time. Therefore, all
complete internal and external sequences for each non-trivial pole of T can be
computed in O(k!) time. Hence, the whole bottom-up traversal to equip all
non-trivial poles with every possible complete internal/external sequence can
be executed in O(k! ยท n) time. We now test whether there exists a permutation
assignment ฮ such that any node ยต of T has a compatible pair of permutations.
To this aim, we look at the complete internal and external sequences for the pair
of poles of the children of ยต. For each pair (ฯsยต , ฯtยต ) of permutations of the poles
of ยต we equip ยต with the information about whether such pair is compatible
for ยต. This requires O(k!2 ) space. If ยต is a Q-node, every pair of permutations
(ฯsยต , ฯtยต ) is compatible for ยต. It follows that all compatible pairs for ยต can be
computed in O(k!) time (recall that one between sยต and tยต is non-trivial) and,
hence, in O(k! ยท n) time for all the Q-nodes of T . If ยต is a P-node with children
ฮฝ0 , ฮฝ1 , . . . , ฮฝhโ1 , ฯsยต is one of the permutations that equip sยต , and ฯtยต is one of the
permutations that equip tยต , testing whether the pair (ฯsยต , ฯtยต ) is a compatible
pair for ยต can be executed in O(h) time. It follows that all compatible pairs for ยต
can be computed in O(k!2 ยท h) time and, hence, in O(k!2 ยท n) time for all P-nodes
of T . If ยต is an S-node with children ฮฝ0 and ฮฝ1 , ฯsยต is one of the permutations
that equip sยต , and ฯtยต is one of the permutations that equip tยต , testing whether
the pair (ฯsยต , ฯtยต ) is a compatible pair for ยต can be executed in O(k!) time,
corresponding to choosing all possible permutations for the pole shared between
ฮฝ0 and ฮฝ1 . It follows that all compatible pairs for ยต can be computed in O(k!3 )
time and, hence, in O(k!3 ยท n) time for all S-nodes of T .
In conclusion, the time complexity of a bottom-up visit of T rooted at e is
O(k!3 ยท n). By rooting T at all possible Q-nodes, we obtainโan overall time complexity of O(k!3 ยท n2 ). By Stirlingโs approximation, k! โผ 2ฯk( ke )k and thus a
series-parallel clustered graph G with n vertices, side assignment ฮฆ, and maxi3
mum cluster size k can be tested for NodeTrix planarity in O(k 3k+ 2 ยท n2 ) time.
Note that the compatible pair of permutations stored at each node ยต of T implicitly define a planar embedding of a wheel reduction of G. It can be shown
that it is possible to construct a NodeTrix planar representation of G in time
proportional to the number of edges of G, which is O(n ยท k) [5]. The statement
of the lemma follows.
4.2
Partial 2-Trees
We now consider clustered graphs whose cluster size is at most k and such that
their frame graph is a partial 2-tree, i.e. it is a planar graph whose biconnected
components are series-parallel. We handle this case by decomposing the frame
graph into its blocks and we store them into a block-cut-vertex tree. The following theorem generalizes the result of Lemma 2.
Theorem 2. Let G = (V, E, C, ฮฆ) be a partial 2-tree clustered graph with side
assignment ฮฆ. Let k be the maximum size of any cluster in C and let n be the
3
cardinality of V . There exists an O(k 3k+ 2 ยท n3 )-time algorithm that tests whether
G is NodeTrix planar with side assignment ฮฆ and if so, it computes a NodeTrix
planar representation of G consistent with ฮฆ.
5
General Planar Frame Graphs
In this section we study the problem of extending Theorem 2 to planar frame
graphs that may not be partial 2-trees. We prove that NodeTrix planarity testing
with fixed sides can be solved in polynomial time for maximum cluster size k = 2.
However, the problem becomes NP-complete with fixed sides for k โฅ 3 and it
remains NP-complete even in the free sides scenario for k โฅ 5.
Every block of the frame graph can be decomposed into its triconnected components by means of an SPQR decomposition tree. For each block, we adopt the
same approach as for series-parallel graphs and look for a permutation assignment ฮ such that, for every pair of poles sยต and tยต , (ฯsยต , ฯtยต ) forms a compatible
pair for ยต when ยต is either a Q-node, a P-node, or an S-node. We extend the
definition of compatible pairs of permutations for an R-node as follows.
Let G = (V, E, C, ฮฆ) be a clustered graph with side assignment ฮฆ, let F be
the frame graph of G, and let T be the SPQR decomposition tree of F . Let
ยต be an R-node of T with poles sยต and tยต . A pair of permutations (ฯsยต , ฯtยต )
forms a compatible pair for ยต if there exists a planar embedding of the skeleton skel(ยต) of ยต for which the following conditions hold: (i) For each vertex
v of skel(ยต), let e0 , e1 , . . . ehโ1 be the virtual edges of skel(ยต) incident to v in
clockwise order around v. Each such edge ei is associated with a child ฮฝi of
ยต. There exists a permutation ฯv such that the complete internal sequences
ISeq(ฮฝ0 , v, ฯv ), ISeq(ฮฝ1 , v, ฯv ), . . . , ISeq(ฮฝhโ1 , v, ฯv ) appear in this clockwise
order around v. (ii) Every vertex v of skel(ยต) can be assigned a permutation ฯv
such that: ฯv = ฯsยต if v = sยต and ฯv = ฯsยต if v = tยต , and for each virtual edge
e = (u, v) in skel(ยต) that corresponds to a child ฮฝ of ยต, the permutation pair
(ฯu , ฯv ) is compatible for ฮฝ.
Observe that, in the case of maximum cluster size k = 2, the possible permutations of the induced cluster Vv of a vertex v of skel(ยต) are exactly two,
denoted by ฯv+ and ฯvโ . In order to test whether (ฯsยต , ฯtยต ) forms a compatible
pair for ยต, we perform a traversal of skel(ยต) starting at sยต . Permutation ฯsยต and
the clockwise order of the edges incident to sยต can impose to choose only one of
+
โ
the two permutations ฯw
o ฯw
available for each vertex w adjacent to sยต and
corresponding to a non-trivial cluster of G. Each such w and its incident edges,
in turn, propagate constraints on the possible permutations to their neighbors,
till tยต is reached. Therefore, testing whether ฯsยต and ฯtยต form a compatible pair
for ยต can be reduced to a suitable problem of labeling the edges and vertices of
skel(ยต) and verifying that at the end sยต and tยต are labeled with ฯtยต and ฯsยต .
Theorem 3. Let G = (V, E, C, ฮฆ) be an n-vertex clustered graph with side assignment ฮฆ such that the maximum size of any cluster in C is two. There exists
an O(n3 )-time algorithm that tests whether G is NodeTrix planar with the given
side assignment and if so, computes a NodeTrix planar representation of G consistent with ฮฆ.
The proof of the following theorem is based on a reduction from (non-planar)
NAE3SAT.
Theorem 4. NodeTrix planarity testing with fixed sides and cluster size at most
k is NP-complete for any k โฅ 3.
Now, we extend the above hardness result to the free sides model and show
that NodeTrix planarity testing remains NP-complete when the maximum cluster dimension is larger than four. This is done by proving that NAE3SAT is
NP-complete even for triconnected Boolean formulas, which may be a result of
independent interest.
Theorem 5. NAE3SAT is NP-complete for triconnected Boolean formulas.
Theorem 6. NodeTrix planarity testing with free sides and cluster size at most
k is NP-complete for any k โฅ 5.
6
Open Problems
We conclude the paper by listing some open problems that, in our opinion, are
worth investigating. (i) Study the complexity of NodeTrix planarity testing in the
free sides scenario for values of k between 2 and 5. (ii) Study families of clustered
graphs for which NodeTrix planarity testing is fixed parameter tractable in the
free sides scenario. (iii) Determine whether the time complexity of the algorithms
in Theorems 2 and 3 can be improved.
References
1. Angelini, P., Da Lozzo, G., Di Battista, G., Frati, F., Patrignani, M., Rutter, I.:
Intersection-link representations of graphs. In: Di Giacomo, E., Lubiw, A. (eds.)
Proceedings of 23rd International Symposium on Graph Drawing and Network
Visualization (GD โ15). Lecture Notes in Computer Science, vol. 9411, pp. 217โ
230 (2015)
2. Batagelj, V., Brandenburg, F., Didimo, W., Liotta, G., Palladino, P., Patrignani,
M.: Visual analysis of large graphs using (X,Y)-clustering and hybrid visualizations.
IEEE Trans. Vis. Comput. Graph. 17(11), 1587โ1598 (2011)
3. Da Lozzo, G., Di Battista, G., Frati, F., Patrignani, M.: Computing NodeTrix representations of clustered graphs. In: Noฬllenburg, M., Hu, Y. (eds.) Graph Drawing
and Network Visualization (GD โ16). Lecture Notes in Computer Science, vol. 9801,
pp. 107โ120 (2016)
4. Di Battista, G., Eades, P., Tamassia, R., Tollis, I.G.: Graph Drawing. Prentice
Hall, Upper Saddle River, NJ (1999)
5. Di Giacomo, E., Liotta, G., Patrignani, M., Tappini, A.: Planar k-NodeTrix Graphs
- a new family of beyond planar graphs. In: Frati, F., Ma, K. (eds.) Graph Drawing
and Network Visualization (GD 2017). LNCS, Springer, to appear
6. Gutwenger, C., Klein, K., Mutzel, P.: Planarity testing and optimal edge insertion
with embedding constraints. J. Graph Algorithms Appl. 12(1), 73โ95 (2008)
7. Harary, F.: Graph Theory. Addison-Wesley Series in Mathematics, Addison Wesley
(1969)
8. Henry, N., Fekete, J., McGuffin, M.J.: NodeTrix: a hybrid visualization of social
networks. IEEE Trans. Vis. Comput. Graph. 13(6), 1302โ1309 (2007)
9. Kratochvฤฑฬl, J.: A special planar satisfiability problem and a consequence of its
NP-completeness. Discrete Applied Mathematics 52(3), 233 โ 252 (1994)
10. Moret, B.M.E.: Planar NAE3SAT is in P. SIGACT News 19(2), 51โ54 (1988)
11. Schaefer, T.J.: The complexity of satisfiability problems. In: Proceedings of the
10th Annual ACM Symposium on Theory of Computing. pp. 216โ226 (1978)
A
A.1
Omitted Proofs
Proof of Theorem 1
Theorem 1. Let G = (V, E, C, ฮฆ, ฮ ) be a clustered graph with side assignment ฮฆ and permutation assignment ฮ .
G is NodeTrix planar if and only if the planar wheel reduction of G admits a planar embedding where the external
oriented cycle of each wheel Wi is embedded clockwise.
Proof. If G is NodeTrix planar, we construct a planar embedding of a wheel reduction of G where the external
oriented cycle of each wheel is embedded clockwise as follows. Let ฮ be a NodeTrix planar representation of G.
We replace each matrix Mi representing a cluster Vi โ C with the wheel Wi of Vi consistent with the permutation
ฯi โ ฮ of Vi . Also Wi is embedded in such a way that a forward traversal of its external cycle is a clockwise traversal
of the cycle. Every inter-cluster edge e = (u, vj ), with vj โ Vi , is incident to the vertex vj,ฯi (e) of the wheel Wi .
Also, for all j = 0, 1, . . . , k โ 1 and for all x โ {t, b, l, r}, the cyclic order of the inter-cluster edges incident to vj,x
in Wi is the same as the cyclic order of the inter-cluster edges incident to pvj ,x in Mi . It is immediate to see that,
since no two inter-cluster edges cross in ฮ , no two edges cross in the constructed embedding of the wheel reduction
of G.
Conversely, suppose that we are given a planar embedding of the wheel reduction of G where the external
oriented cycle of each wheel is embedded clockwise. We show how to construct a NodeTrix planar representation of
G. For each wheel Wi we remove the center vertex of the wheel and insert a matrix Mi inside the created face. We
now morph every vertex vj,ฯi (e) of the external cycle of Wi to point pvj ,ฯi (e) in Mi and maintain around pvj ,ฯi (e)
the cyclic order of the inter-cluster edges incident to vj,ฯi (e) in the planar embedding of the wheel reduction.
A.2
Proof of Lemma 1
Lemma 1. Let G = (V, E, C, ฮฆ) be a clustered graph with side assignment ฮฆ and let T be the SPQ decomposition
tree of the frame graph of G. Graph G is NodeTrix planar if and only if there exists a permutation assignment ฮ
such that, for every node ยต of T with poles sยต and tยต , we have that permutation ฯsยต โ ฮ and permutation ฯtยต โ ฮ
form a compatible pair of permutations for ยต.
Proof. We prove first that, if G = (V, E, C, ฮฆ) is NodeTrix planar, then there exists a permutation assignment ฮ
such that, for every node ยต of T with poles sยต and tยต , the pair (ฯsยต , ฯtยต ) is compatible for ยต.
Let ฮ be a NodeTrix planar representation of G with side assignment ฮฆ and let M0 , M1 , . . . , Mhโ1 be the matrices
representing the non-trivial clusters of G. For each matrix Mi (i = 0, . . . , h โ 1) of ฮ , let ฯi = v0 , v1 , . . . , vkโ1 be the
left to right order of the columns of Mi . We replace Mi with a wheel Wi consisting of a vertex wi of degree 4k adjacent
to all vertices of a cycle v0,t , v1,t , . . . , vkโ1,t , v0,r , v1,r , . . . , vkโ1,r , vkโ1,b , vkโ2,b , . . . , v0,b , vkโ1,l , vkโ2,l , . . . , v0,l . For
all j = 0, 1, . . . , k โ 1 and for all x โ {t, b, l, r}, vertex vj,x is drawn at the point pvj ,x , that represents the
attachment of the inter-cluster edges incident to vertex vj on the side x of matrix Mi . The edges of the external
cycle of Wi are drawn along the external boundary of Mi . Every inter-cluster edge e = (u, vj ), with vj โ Mi , is
incident to the vertex vj,ฯi (e) of the wheel Wi . Also, for all j = 0, 1, . . . , k โ 1 and for all x โ {t, b, l, r}, the
cyclic order of the inter-cluster edges incident to vj,x in Wi is the same as the cyclic order of the inter-cluster edges
incident to pvj ,x in Mi . It is straightforward to verify that the computed drawing defines a planar embedding for
the wheel reduction of G = (V, E, C, ฮฆ) consistent with ฮ = {ฯ1 , ฯ2 , . . . , ฯ|C| }. From the planarity of the wheel
reduction of G it follows that each non-trivial pole vยต of the frame graph F has a complete internal and a complete
external sequence consistent with ฯvยต and that for every node ยต of the SPQ decomposition tree of F having poles
sยต and tยต , the pair (ฯsยต , ฯtยต ), with ฯsยต , ฯtยต โ ฮ , is compatible for ยต. An example of the above described procedure
is illustrated in Fig. 2
We now show that, if there exists a permutation assignment ฮ such that for every node ยต of T with poles sยต
and tยต we have that permutation pair (ฯsยต , ฯtยต ) is compatible for ยต, then G = (V, E, C, ฮฆ) is NodeTrix planar with
side assignment ฮฆ. We construct a planar embedding of the wheel reduction of G consistent with ฮ such that all
external cycles of the wheels are embedded clockwise which, by Theorem 1, implies that G is NodeTrix planar. Let
Wsยต and Wtยต be the two wheels consistent with ฯsยต and ฯtยต of sยต and tยต , respectively. We visit T from the leaves
to the root and incrementally construct the desired planar embedding of the wheel reduction of G.
If the visited node ยต is a Q-node, at most one of its poles is non-trivial because G is light; assume, without loss
of generality, that the non-trivial pole of ยต is sยต and let Vsยต be the cluster of G represented by sยต in the frame
graph of G. We embed the wheel Wsยต of Vsยต consistent with ฯsยต โ ฮ such that, when traversing the edges of the
external cycle of Wsยต in the forward direction, the cycle is traversed clockwise. We embed tยต in the external face of
Wsยต and planarly connect the top, bottom, left, or right copy of its end-vertex on Wsยต as specified by ฮฆ.
Suppose now ยต is an S-node and let ฮฝ0 and ฮฝ1 be the children of ยต such that sฮฝ0 = sยต , tฮฝ0 = sฮฝ1 , and tฮฝ1 = tยต .
The planar embedding of the wheel reduction at node ยต is obtained by composing the planar embedding of the
wheel reduction at node ฮฝ0 with the planar embedding of the wheel reduction at ฮฝ1 . This is done by identifying the
planar embedding of the wheel Wtฮฝ0 consistent with ฯtฮฝ0 with the planar embedding of the wheel Wsฮฝ1 consistent
with ฯsฮฝ1 . Note that this is possible because ฯtฮฝ0 is the same as ฯsฮฝ1 , (ฯsยต , ฯtฮฝ0 ) is a compatible pair for ฮฝ0 , and
(ฯsฮฝ1 , ฯtยต ) is a compatible pair for ฮฝ1 .
Finally, assume ยต is a P-node and let ฮฝ0 , ฮฝ1 , . . . , ฮฝhโ1 be the children of ยต. Similar to the case of the S-node, the
planar embedding of the wheel reduction at node ยต is obtained by composing the planar embeddings of the wheel
reductions at nodes ฮฝ0 , ฮฝ1 , . . . , ฮฝhโ1 . Since pair (ฯsยต , ฯtยต ) is compatible for ยต, it defines opposite orders on the poles
of ยต. These opposite circular orders correspond to a planar embedding of the wheel reduction at ยต obtained by
combining the planarly embedded wheel reductions at its children ฮฝ0 , ฮฝ1 , . . . ฮฝhโ1 . It follows that G = (V, E, C, ฮฆ) is
NodeTrix planar with permutation assignment ฮ .
A.3
Proof of Theorem 2
Theorem 2. Let G = (V, E, C, ฮฆ) be a partial 2-tree clustered graph with side assignment ฮฆ. Let k be the maximum
3
size of any cluster in C and let n be the cardinality of V . There exists an O(k 3k+ 2 ยท n3 )-time algorithm that tests
whether G is NodeTrix planar with side assignment ฮฆ and if so, it computes a NodeTrix planar representation of
G consistent with ฮฆ.
Proof. We compute a block-cut-vertex tree Tbcv of the frame graph of G, we root it at a block Broot and visit
Tbcv bottom-up. Let Bi be the currently visited block and let c be the parent cut-vertex of Bi in Tbcv . We execute
the testing algorithm of Lemma 2 by rooting the SPQ decomposition tree of Bi only at those Q-nodes that have
c as one of their poles. If the test fails at any block of Tbcv , we conclude that G is not NodeTrix planar with the
given side assignment for the chosen root Broot of Tbcv and we repeat the test by rooting Tbcv at a different block.
Otherwise, we test whether, among the permutation assignments computed for the blocks B0 , B1 , . . . , Bhโ1 that
are children of a same cut-vertex c, there exists a set {ฮ 0 , ฮ 1 , . . . , ฮ hโ1 } such that: (i) ฯ0,c = ฯ1,c = ยท ยท ยท = ฯhโ1,c
with ฯj,c โ ฮ j , for j = 0, 1, . . . , h โ 1, and (ii) the complete internal sequence of c for the block Bj and for the
permutation assignment ฯj,c does not overlap with the complete internal sequence of c for the block Bi and the
permutation assignment ฯi,c , with i 6= j, i, j = 0, . . . , h โ 1. We equip c with all the permutations that pass this test.
Let B 0 be the block that is the parent of c in Tbcv . When testing B 0 for NodeTrix planarity, we consider for c only
the permutations that have been computed when processing blocks B0 , B1 , . . . , Bhโ1 and check that the complete
internal sequences of c in Bj , j = 0, . . . , h โ 1, do not intersect with the complete internal sequences of c in B 0 . Let
nB be the number of vertices of a block B. By using Lemma 2, the procedure described above can be executed in
3
3
time O(k 3k+ 2 ยท n2B ) per block. Therefore, a bottom-up visit of Tbcv can be computed in O(k 3k+ 2 ยท n2 ) time for each
3
root block. Since there are O(n) possible roots for Tbcv , it follows that the overall time complexity is O(k 3k+ 2 ยท n3 ).
A.4
Proof of Theorem 3
The lemmas and the discussion in this section prove Theorem 3. For completeness we report the statement of the
theorem.
Theorem 3. Let G = (V, E, C, ฮฆ) be an n-vertex clustered graph with side assignment ฮฆ such that the maximum
size of any cluster in C is two. There exists an O(n3 )-time algorithm that tests whether G is NodeTrix planar with
the given side assignment and if so, computes a NodeTrix planar representation of G consistent with ฮฆ.
Let G = (V, E, C, ฮฆ) be a clustered graph with side assignment ฮฆ and let F be its frame graph. Assume first
that the frame graph F of G is biconnected. Let T be the SPQR decomposition tree of F .
Analogously to the case of series-parallel frame graph described in Section 4.1, we traverse T from the leaves to
the root and compute, for each node ยต of T with poles sยต and tยต , all the pairs of permutations (ฯsยต , ฯtยต ) compatible
for ยต (the formal definitions of pair of permutations compatible for a Q-node, an S-node, or a P-node can be found
in Section 4.1; the formal definition of pair of permutations compatible for an R-node is in Section 5).
Differently from the algorithm for series-parallel frame graphs, we have to handle the case of an R-node ยต, where
the skeleton skel(ยต) is a triconnected graph. In fact, the cases of Q-node, S-node and P-node can be handled exactly
as described in Section 4.1, with an overall time complexity O(n2 ) (Lemma 2).
Let ยต be an R-node of T with poles sยต and tยต and with children ฮฝ0 , ฮฝ1 , . . . , ฮฝhโ1 . Given a non-trivial vertex w of
skel(ยต), since the maximum cluster size is two, the possible permutations of Vw are exactly two, that we denote by
+
โ
ฯw
and ฯw
. For the sake of simplicity, we assume that each vertex w of skel(ยต) is labeled with one or two labels in
+
โ
+
โ
the set {ฯw
, ฯw
} corresponding to the two possible permutations ฯw
and ฯw
of the pertinent cluster Vw of w. Also,
we assume that each edge ei = (u, v) of skel(ยต), corresponding to child ฮฝi of ยต, is assigned one or more labels in
the set {(ฯu+ , ฯv+ ), (ฯu+ , ฯvโ ), (ฯuโ , ฯv+ ), (ฯuโ , ฯvโ )} that are initialized based on the pairs of permutations compatible
with child ฮฝi .
In the first phase of the algorithm for node ยต we discard the edge and vertex labels that do not give rise
to a planar embedding for skel(ยต). In particular, we consider each one of the two possible planar embeddings
for ยต, one after the other. Let Eยต be the chosen embedding of ยต. We perform a Rotation Coherence Check, that
+
has the purpose of enforcing the compatibility with respect to the embedding Eยต of the two permutations ฯw
โ
and ฯw of each vertex w of skel(ยต). Namely, consider a vertex w of skel(ยต) and one of its possible permutations
โ
+
โ
ฯw
โ {ฯw
, ฯw
}. Let e0 , e1 , . . . ehโ1 be the virtual edges of skel(ยต) as they appear in clockwise order around w in
the embedding Eยต of skel(ยต) and let ฮฝ0 , ฮฝ1 , . . . , ฮฝhโ1 be the corresponding nodes of T , respectively. If the complete
โ
internal sequences ISeq(ฮฝi , w, ฯw
), with i = 0, 2, . . . , hโ1, appear in a different clockwise order around w with respect
to the corresponding virtual edges e0 , e1 , . . . , ehโ1 , then G is not NodeTrix planar with permutation assignment ฮ
โ
โ
โ
when ฯw
โ ฮ . Hence, label ฯw
can be discarded for w (and, correspondingly, permutation ฯw
can be discarded
for cluster Vw ). If at the end of this phase a vertex or an edge remains without any label, then G is not NodeTrix
planar with the given embedding Eยต .
Now, we want to decide whether there are pairs of permutations that are compatible for ยต and, in the affirmative
case, we want to compute them. The problem of deciding whether there are permutations pairs compatible with ยต
is equivalent to the following Coherent-Labeling-Problem: Given a plane graph G where each vertex w has at
+
โ
least a label in {ฯw
, ฯw
} and each edge (u, v) has at least one label in {(ฯu+ , ฯv+ ), (ฯu+ , ฯvโ ), (ฯuโ , ฯv+ ), (ฯuโ , ฯvโ )}, can
โ
a label ฯw be selected for each vertex w in such a way that each edge (u, v) has the label (ฯuโ , ฯvโ )? We call a plane
graph G with the described labeling for its vertices and edges an instance of the Coherent-Labeling-Problem
and a solution for G a coherent labeling for G.
Observe that the vertex and edge labels can be further filtered off based on the following obvious properties:
โ
+
โ
} cannot be selected for vertex w if there
, ฯw
โ {ฯw
Vertex Coherence: In any coherent labeling for G, label ฯw
โ
exists a virtual edge ei = (w, v) of skel(ยต) that does not have any label (ฯw
, ฯvร ), with ฯvร โ {ฯv+ , ฯvโ }.
ร
โ
Edge Coherence: In any coherent labeling for G, label (ฯw , ฯv ) cannot be selected for the virtual edge e = (w, v)
โ
or v does not admit label ฯvร .
of skel(ยต) if w does not admit label ฯw
Hence, we can discard vertex and edge labels that do not satisfy the above properties. An instance of the
Coherent-Labeling-Problem where each vertex label satisfies Property Vertex Coherence and each edge label
satisfies Property Edge Coherence is said to be succinct. Observe that, each time a vertex label is discarded because
of Property Vertex Coherence at vertex w, the labels of each virtual edge incident to w have to be checked against
Property Edge Coherence. Also, each time an edge label is discarded because of Property Edge Coherence, Property
Vertex Coherence has to be checked for the labels of one of its incident vertices. Due to the fact that at most one
label per vertex and at most three labels per edge can be discarded (otherwise the instance is not NodeTrix planar),
an instance of Coherent-Labeling-Problem can be reduced to a succinct instance in time linear in the number
of edges of skel(ยต).
A succinct instance G of the Coherent-Labeling-Problem is called reduced if each vertex of G has exactly
two labels and each edge of G has exactly three labels. We use the following lemma to efficiently solve the problem.
Lemma 3. Let G be an instance of the Coherent-Labeling-Problem. There exists a reduced instance Gโ such
that G admits a coherent labeling if and only if Gโ admits a coherent labeling.
Proof. Graph Gโ can be found through a sequence of transformations starting from the original instance G. The
first transformation is described in the proof of the following claim.
Claim 1 Let G be a succinct instance of the Coherent-Labeling-Problem. There exists a succinct instance Gโ
+
โ
whose vertices have both the labels ฯw
and ฯw
and such that G admits a coherent labeling if and only if Gโ admits
a coherent labeling.
Proof of claim. Let w be a vertex of G that has only one label and let Gโw be the graph obtained from G by
removing w and all its incident edges. We show that Gโw admits a coherent labeling if and only if G admits one.
One direction is easy to prove: Every solution for G is also a solution for Gโw , since all vertices and edges of Gโw
+
are also vertices and edges of G. We now prove the opposite direction. Suppose vertex w has only label ฯw
(the
โ
case of ฯw being analogous) and consider any edge (v, w) incident to w. By Property Edge Coherence, (v, w) cannot
โ
โ
+
+
). It follows that edge (v, w) may have: (1) label (ฯv+ , ฯw
); (2) label (ฯvโ , ฯw
); or
have labels (ฯv+ , ฯw
) and (ฯvโ , ฯw
+
+
โ
+
(3) both labels (ฯv , ฯw ) and (ฯv , ฯw ).
In turn, by Property Vertex Coherence for the labels of vertex v, we have the following three cases, respectively:
(1) vertex v has only label ฯv+ ; (2) vertex v has only label ฯvโ ; and (3) vertex v has both labels ฯv+ and ฯvโ .
Suppose Gโw admits a solution. You can easily obtain a solution for the original instance G by reinserting w
+
and all its incident edges and by selecting their labels as follows. (a) Select label ฯw
for w. (b) Select, for each edge
+
โ
+
+
+
), respectively. Depending
e = (v, w) incident to w, depending on the label ฯv or ฯv of v, label (ฯv , ฯw ) or (ฯvโ , ฯw
on the three cases above, we prove that G admits a coherent labeling.
+
+
1. Since any solution of Gโw selects label ฯv+ for vertex v, selecting label ฯw
for vertex w and label (ฯv+ , ฯw
) for
edge (v, w) yields a solution for G.
+
+
2. Since any solution of Gโw selects label ฯvโ for vertex v, selecting label ฯw
for vertex w and label (ฯvโ , ฯw
) for
edge (v, w) yields a solution for G.
+
3. A solution of Gโw may select either label ฯv+ (Case A) or label ฯvโ (Case B) for vertex v. Selecting label ฯw
for
โ
+
โ
+
vertex w and label (ฯv , ฯw ) in Case A or (ฯv , ฯw ) in Case B for edge (v, w) yields a solution for G.
By repeating this procedure for every vertex of G that has only one label, an equivalent instance Gโ such that
all vertices have both labels is obtained. Finally, observe that, since the removal of edges from an instance of
Coherent-Labeling-Problem does not disrupt the properties of vertex coherence and edge coherence of its
labels, when applying the transformation described above we obtain a succinct instance Gโ whenever the original
instance G was succinct.
Claim 1 has several important consequences. In order to explicit them, we need some further notation. We say
that an edge (u, v) has label set x, with x โ {1, 2, . . . , 16}, if (u, v) has the following sets of labels:
Label set (ฯu+ , ฯv+ ) (ฯu+ , ฯvโ ) (ฯuโ , ฯv+ ) (ฯuโ , ฯvโ )
1
2
ร
3
ร
4
ร
5
ร
6
ร
ร
7
ร
ร
8
ร
ร
9
ร
ร
10
ร
ร
11
ร
ร
12
ร
ร
ร
13
ร
ร
ร
14
ร
ร
ร
15
ร
ร
ร
16
ร
ร
ร
ร
An immediate consequence of Claim 1 is the following property.
+
โ
Claim 2 If each vertex w of an instance G of the Coherent-Labeling-Problem has both the labels ฯw
and ฯw
,
then edges have exclusively label sets in {8, 9, 12, 13, 14, 15, 16}.
Proof of claim. The proof is based on the observation that the remaining label sets either miss ฯu+ (label sets 1, 4, 5,
and 11), or miss ฯuโ (among others, label sets 2, 3, and 6), or miss ฯv+ (among others, label set 10), or ฯvโ (among
others, label set 7). However, by Property Vertex Coherence, u and v cannot have both labels if there is some edge
that does not allow both of them.
Claim 3 Let G be a succinct instance of the Coherent-Labeling-Problem. There exists a succinct instance Gโ
such that no edge has label set 16 and such that Gโ admits a coherent labeling if and only if G admits one. Further,
a coherent labeling for G can be obtained from a coherent labeling for Gโ in constant time.
Proof of claim. If an edge (u, v) has all four labels (ฯu+ , ฯv+ ), (ฯu+ , ฯvโ ), (ฯuโ , ฯv+ ), and (ฯuโ , ฯvโ ), one could remove
(u, v), compute a coherent labeling of the obtained instance Gโ , and then insert back again (u, v) with a suitable
label depending on the pair of labels selected for its end-vertices.
Claim 4 Let G be a succinct instance of the Coherent-Labeling-Problem. There exists a succinct instance Gโ
such that no edge has label set 8 and such that Gโ admits a coherent labeling if and only if G admits one. Further,
a coherent labeling for G can be obtained from a coherent labeling for Gโ in constant time.
Proof of claim. Suppose edge (u, v) only has labels (ฯu+ , ฯv+ ) and (ฯuโ , ฯvโ ). Contract edge (u, v) and merge vertices
u and v into a new vertex w. Suppose that the obtained graph Gโ admits a coherent labeling. Expand the vertex
+
w back into u and v. If w has label ฯw
, select label ฯu+ for u, label ฯv+ for v, and label (ฯu+ , ฯv+ ) for edge (u, v).
Otherwise, select label ฯuโ for u, label ฯvโ for v, and label (ฯuโ , ฯvโ ) for (u, v). It is easy to verify that the obtained
selection of labels is a coherent labeling for G.
Claim 5 Let G be a succinct instance of the Coherent-Labeling-Problem. There exists a succinct instance Gโ
such that no edge has label set 9 and such that Gโ admits a coherent labeling if and only if G admits one. Further,
a coherent labeling for G can be obtained from a coherent labeling for Gโ in constant time.
Proof of claim. Suppose edge (u, v) only has labels (ฯu+ , ฯvโ ) and (ฯuโ , ฯv+ ). Replace ฯvโ with ฯv+ and ฯv+ with ฯvโ
for the labels of v and for all the labels of the edges incident to v. Observe that the instance where the labels have
been renamed admits a coherent labeling if and only if instance G admits one. In particular, edges with label set
9 (12, 13, 14, 15, respectively) have now label set 8 (13, 12, 15, 14, respectively). Hence, for edge (u, v) Claim 4
applies, and the edge can be contracted and reinserted after a coherent labeling for the resulting instance Gโ is
found.
Claims 1, 2, 3, 4, and 5, imply that we can assume that every vertex has both labels and every edge has a label
set in {12, 13, 14, 15}. Hence, the obtained instance Gโ is a reduced instance of the Coherent-Labeling-Problem
equivalent to instance G, which concludes the proof of Lemma 3.
โ
+
} and every
, ฯw
Based on Lemma 3, we can assume that every vertex w of G has exactly two labels in {ฯw
edge (u, v) of G has exactly three labels in {(ฯu+ , ฯv+ ), (ฯu+ , ฯvโ ), (ฯuโ , ฯv+ ), (ฯuโ , ฯvโ )}. Consider an edge (u, v) whose
missing label is (ฯu+ , ฯv+ ). This implies that, if the instance G of the Coherent-Labeling-Problem has a coherent
labeling in which label ฯu+ is selected for vertex u, then the label selected for vertex v in this solution must be ฯvโ .
This consideration can be generalized as follows:
Property 2. Let G be a reduced instance of the Coherent-Labeling-Problem and let e = (u, v) be an edge of G
missing label {ฯuโ , ฯvโ }, with ฯuโ โ {ฯu+ , ฯuโ } and ฯvโ โ {ฯv+ , ฯvโ }. In any coherent labeling of G, if the label selected
for u is ฯuโ , then the label selected for v is the label different from ฯvโ . Analogously, if the label selected for v is ฯvโ ,
then the label selected for u is the label different from ฯuโ .
Property 2 shows that selecting a label for a vertex may have consequences on the label that have to be selected
for the neighbor vertices, and a local choice may propagate in the graph. However, Property 2 also implies the
following property.
Property 3. If the missing label of edge (u, v) is such that the selection of a label ฯuโ for vertex u, with ฯuโ โ {ฯu+ , ฯuโ },
has no implication on the selection of the label for v, then any selection of a label ฯvโ for vertex v, with ฯvโ โ {ฯv+ , ฯvโ },
is compatible with the selection of label ฯuโ for vertex u.
This gives rise to the following procedure to compute all pairs of permutations (ฯsโยต , ฯtโยต ) compatible for R-node
ยต. Since skel(ยต) has two possible planar embeddings, the procedure will be repeated twice, once for each embedding.
Let Eยต be the current embedding of skel(ยต).
โ Build an instance G of Coherent-Labeling-Problem (if a vertex or edge has zero labels, then ยต does not
admit any compatible pair when Eยต is the embedding chosen for skel(ยต)).
โ Obtain a reduced instance Gโ of the Coherent-Labeling-Problem that admits a coherent labeling if and
only if G admits one. Let sโ and tโ be the two vertices of Gโ corresponding to the vertices sยต and tยต of the
original instance G.
โ Consider one by one the four possible permutation pairs of ยต. To decide whether a permutation pair {ฯsโยต , ฯtโยต }
is compatible for ยต, select for sโ the label ฯsโโ corresponding to ฯsโยต and propagate the selection through G
+
according to Property 2. If a vertex w is reached two times, once by imposing the selection of label ฯw
and
โ
โ
โ
once by imposing the selection of label ฯw , then the pair {ฯsยต , ฯtยต } is not compatible for ยต. Suppose this first
propagation phase stops without any such contradiction. If a label for vertex tโ has not been selected yet, start
a second propagation by selecting for tโ the label ฯtโโ corresponding to ฯtโยต . While there are vertices for which no
label has been selected, start a new propagation phase selecting an arbitrary label for one of them. Property 3
guarantees that a vertex traversed during a propagation phase cannot be traversed in a successive propagation
phase. Hence, the labels selected during one propagation phase cannot cause a contradiction with the labels
selected in successive propagation phases. If no contradiction is found and if ฯtโโ is the selected label for tโ ,
permutation pair {ฯsโยต , ฯtโยต } is compatible for ยต.
The proof of Theorem 3 is concluded by observing that each of the transformations described in the proof of
Lemma 3 requires constant time and therefore the overall time complexity to compute all pairs of permutations
(ฯsโยต , ฯtโยต ) is linear in the number of edges of skel(ยต). This observation, together with Lemma 2, implies that NodeTrix
planarity with fixed sides can be tested in O(n2 ) time on a clustered graph whose maximum cluster size is two and
such that the frame graph is biconnected.
For the connected case we construct the block-cut-vertex tree Tbcv of the frame graph of G and apply the same
strategy described in the proof of Theorem 2. Namely, for every node ยต that is either a Q-, or an S-, or a P-node,
we test whether there exists a compatible pair for ยต by means of the procedure in Lemma 2; if ยต is an R-node we
use the strategy described above. This gives rise to an O(n2 )-time procedure for each possible choice of the root of
Tbcv . Since there are O(n) such possible choices, we have an overall time complexity of O(n3 ) if the frame graph is
not biconnected.
The statement of Theorem 3 follows.
A.5
Proof of Theorem 4
Theorem 4. NodeTrix planarity testing with fixed sides and cluster size at most k is NP-complete for any k โฅ 3.
Proof. NodeTrix planarity testing with fixed sides is trivially in NP. In fact, given a clustered graph G = (V, E, C, ฮฆ),
all possible permutations assignments ฮ could be non-deterministically computed and the problem of deciding
whether a clustered graph G = (V, E, C, ฮฆ, ฮ ) admits a NodeTrix planar representation with side assignment ฮฆ and
permutation assignment ฮ is solvable in linear time [3].
In order to prove its NP-hardness, we reduce NAE3SAT to it. An instance of NAE3SAT consists of a collection of
clauses on a set of Boolean variables, where each clause consists of exactly three literals. The problem asks whether
there exists a truth assignment to the variables so that each clause has at least one true literal and at least one
false literal. This problem has been shown to be NP-complete by Thomas J. Schaefer [11]. However, it is known to
be polynomial when the graph of the adjacencies of the variables and clauses is planar [10].
Starting from a (non-planar) instance of NAE3SAT with variables x1 , x2 , . . . , xn and clauses C1 , C2 , . . . , Cm , we
construct an instance G = (V, E, C, ฮฆ) of NodeTrix planarity testing with fixed sides as follows. First, we obtain
a (non-planar) drawing ฮ of the graph of its variables and clauses like the one in Fig. 3: The clause vertices are
vertically aligned, the variable vertices are horizontally aligned, and the edges are drawn with L-shapes. Clearly
this drawing can be computed in polynomial time and has a polynomial number of crossings.
โ
C1
+
+
+
C2
โ
โ
+
C3
+
+
+
C4
โ
โ
โ
C5
โ
โ
x1
x2
x3
x4
Fig. 3. A non-planar drawing of an instance of NAE3SAT. The small circled plus signs and circled minus signs
represent direct and negated occurrences of the variables in the clauses, respectively.
Then, we replace each vertex representing a variable with a variable gadget. The variable gadget for a variable
of degree h is composed by h size-two clusters connected together as depicted in Fig. 4(a) and 4(b). Namely, let
Vv,1 , Vv,2 , . . . , Vv,h be the h clusters of C composing the variable gadget of variable v and let {ui,1 , ui,2 } be the
nodes of Vv,i , with i = 1, . . . , h. We may encode a truth value with each one of the two possible representations
of cluster Vi : if in the matrix Mi representing Vi the column corresponding to the vertex ui,1 precedes the column
corresponding to the vertex ui,2 , we say that Mi is true. Otherwise, we say that Mi is false. Correspondingly, we
say that ฯi = ui,1 , ui,2 is the true permutation of cluster Vi and that ฯi = ui,2 , ui,1 is its false permutation. In
order to connect the clusters composing the variable gadget for v, we add to E, for i = 1, . . . , h โ 1, the inter-cluster
edges ei,1 = (ui,1 , ui+1,1 ) and ei,2 = (ui,2 , ui+1,2 ) and set ฯi (ei,1 ) = r, ฯi+1 (ei,1 ) = b, ฯi (ei,2 ) = r, ฯi+1 (ei,2 ) = b. It
is immediate that in any NodeTrix planar representation of G, all Mi , i = 1, . . . , h, are either simultaneously true
or simultaneously false. Correspondingly, we say that the variable gadget is true or false. Fig. 4(a) and 4(b)
show an example of a true and of a false drawing of a variable gadget.
FALSE
TRUE
2 1
1 2
1 2
1 2
2 1
2 1
TRUE
(a)
(b)
FALSE
(c)
(d)
Fig. 4. (a) The true configuration of a variable gadget for a variable of degree four. (b) The false configuration.
(c) The not gadget transforming an encoded true value into a false value. (d) The not gadget transforming an
encoded false value into a true value.
Each edge e attaching to a variable v in the drawing ฮ (refer to Fig. 3) corresponds to two โparallelโ inter-cluster
edges e1 and e2 attached to one of the clusters composing the variable gadget of v. Let Vj be such a cluster. We set
ฯj (e1 ) = t and ฯj (e2 ) = t. Observe that the order in which e1 and e2 exit Mj depends on the truth value encoded
by Mj and, hence, on the truth value encoded by the variable gadget for v.
Fig. 5 depicts the gadget we use to replace crossings in ฮ , consisting of a cluster Vx of size three. From the figure
it is apparent that, in any representation of Vx , the left-to-right order of the edges entering Mx from the bottom
side is the same as the left-to-right order of the edges exiting Mx from the top side. An analogous consideration
holds for the top-to-bottom order of the edges entering Mx from the right side and the top-to-bottom order of the
edges exiting Mx from the left side. This implies that the truth value encoded by the edges entering Mx is the same
as the truth value encoded by the edges exiting it.
FALSE
TRUE
1
2
3
2
1
(a)
3
3
1
2
TRUE
FALSE
(b)
(c)
TRUE
FALSE
3
2
1
FALSE
TRUE
FALSE
TRUE
FALSE
FALSE
TRUE
TRUE
FALSE
TRUE
TRUE
TRUE
1
3
FALSE
FALSE
(d)
2
2
3
TRUE
FALSE
TRUE
(e)
1
FALSE
(f)
Fig. 5. The six possible configurations of a crossing gadget.
We now describe the clause gadget. We assume that three pairs of edges, encoding the truth value of the variables
occurring in the clause, arrive to the clause gadget. Let v1 , v2 , and v3 be the three variables whose literals l1 , l2 , and
l3 occur in clause C. Before entering the clause gadget, if literal li is a negated literal of variable v (i.e., if li = v i )
then we attach the edges coming from vi to a not gadget, depicted in Fig. 4(c) and 4(d), and use the edges exiting
the not gadget instead of the edge coming directly from variable vi . This has the effect that all the three pairs of
edges entering the clause gadget encode a truth value that is true if the literal is true and false if the literal is
false. In the following, therefore, we will consider the truth values of the literals, rather than the truth values of
the variables.
The clause gadget, depicted in Fig. 6, is composed by three clusters V1 , V2 , and V3 of size three, each having
vertices {ui,a , ui,b , ui,c , }, i = 1, 2, 3. The three clusters are connected together in such a way that, in any NodeTrix
planar representation of G, their permutations ฯi , i = 1, 2, 3, always present the same sequence of the labels a, b, c.
For example, if ฯ1 = u1,c , u1,a , u1,b , then also ฯ2 = u2,c , u2,a , u2,b and ฯ3 = u3,c , u3,a , u3,b .
For i = 1, . . . , 3, the edges encoding the truth value of literal li attach to cluster Vi , where the prescribed side
is the right side of matrix Mi . The two edges e1,1 and e1,2 encoding the truth value of the literal l1 attach to u1,a
and u1,b , respectively. The two edges e2,1 and e2,2 encoding the truth value of the literal l2 attach to u2,b and u2,c ,
respectively. Finally, the two edges e3,1 and e3,2 encoding the truth value of the literal l3 attach to u3,c and u3,a ,
respectively. Hence, if literal l1 is true, matrix M1 must have a permutation of its columns such that column a
precedes column b, while if literal l1 is false, matrix M1 must have a permutation of its columns such that column
a follows column b. Analogously, the truth value of literal l2 determines whether in matrix M2 column b precedes
or follows column c, and the truth value of literal l3 determines whether in matrix M3 column c precedes or follows
column a.
TRUE if literal TRUE
TRUE if literal TRUE
TRUE if literal TRUE
Fig. 6. The clause gadget.
It follows that, if all three literals are true, then they induce unsatisfiable constraints on the ordering of the
columns of the matrices, since column a should precede column b, b should precede column c, and c should precede
a. The same holds if all three literals are false. It can be easily checked that, for any other combination of truth
values of the literals, there exists an ordering of the columns of matrices M1 , M2 , and M3 that makes a planar
drawing of the edges possible. Therefore, the constructed instance of NodeTrix planarity with fixed sides admits a
planar NodeTrix representation if and only if the original instance of NAE3SAT admits a solution.
A.6
Proof of Theorem 5
Theorem 5. NAE3SAT is NP-complete for triconnected Boolean formulas.
Proof. We use a reduction strategy that is similar to the one used in [9] to prove the hardness of Planar Triconnected 3SAT. Here, however, we do not have to worry about planarity, since we are searching for a non-planar
triconnected instance of NAE3SAT. Let ฯ be an instance of NAE3SAT such that the graph G that represents
the occurrences of the variables into the clauses of ฯ is not triconnected and, possibly, not biconnected and not
connected. We show how to construct an instance ฯโ such that its graph Gโ is triconnected. The strategy consists
of adding to ฯ a suitable number of variables and clauses such that the obtained instance ฯโ is triconnected and
has a solution if and only if ฯ has one.
Consider an edge e = (x, C) in the graph G (refer to Fig. 7(a)). Suppose that variable x occurs in clause C with
its direct literal (negated literal, respectively). We remove e (that is, we remove the occurrence of x into clause C)
and replace it with the occurrence of the direct literal (negated literal, respectively) of a new variable x0 . Also we
add a new variable y and the two clauses (x โจ x0 โจ y) and (x โจ x0 โจ y) (see Fig. 7(b)).
It can be shown that, in any assigment of truth values to the variables such that all clauses are satisfied in the
NAE3SAT sense, the truth value of x has to be the same as the truth value of x0 . In fact, whatever is the truth
x0
x
โ
C 00
x
+
C
C0
C1
C2
y
+
+
x1
(a)
+
C1 0
+
(b)
C2 0
โ
โ
+
x2 0
โ
x2
โ
y
+
โ
+
+
โ
+
โ
+
C2
x1 0
C
+
C1
x1
x2
(c)
โ
+
C1
00
+
+
C2
00
(d)
Fig. 7. (a) A variable x occurring in a clause C of an instance of NAE3SAT. (b) The gadget that replaces edge
(x, C). (c) A pair of edges (x1 , C1 ) and (x2 , C2 ) in the NAE3SAT graph. (c) The gadget that replaces edges (x1 , C1 )
and (x2 , C2 ).
value of variable y, literals x and x0 occur in a clause with a negative literal and a positive literal. Hence, they
cannot be both positive or both negative. This implies x = x0 . It follows that the obtained instance of NAE3SAT
admits a solution if and only if the original instance admits one.
Now, consider two edges e1 = (x1 , C1 ) and e2 = (x1 , C2 ) of G (see Fig. 7(c)). By replacing both edges with the
above described gadget and by identifying the y variables of the two gadgets, one obtains a bridge gadget for e1
and e2 . The instance of NAE3SAT where e1 and e2 have been replaced by their bridge gadget is equivalent to the
original instance and it has a path going from C1 to C2 and passing through y.
Hence, suppose you have a non-connected graph G and let e1 and e2 be two edges belonging to two different
connected components of G. Replacing e1 and e2 with their bridge gadget, the number of connected components of
G is decreased. Assume now that G is connected. Let Tbcv be the block-cut-vertex tree of G and let e1 and e2 be
two edges belonging to two different blocks of Tbcv . Replacing e1 and e2 with their bridge gadget, the number of
blocks of G is decreased (see for example Fig. 8). The same holds if we replace two edges e1 and e2 belonging to
two triconnected components of G.
B1
B2
B4
B1
B6
B5
B3
B7
(a)
B2
B8
B4
B6
B5
B3
B7
B8
(b)
Fig. 8. (a) The block-cut-vertex tree Tbcv of a graph (green vertices are the leaves of Tbcv ). (b) A bridge gadget
added to link two leaf blocks of Tbcv .
Therefore, we obtain a NAE3SAT instance ฯโ such that the graph that represents the occurrences of the variables
into the clauses is triconnected and such that ฯโ admits a solution if and only if ฯ admits one. Furthermore, the
size of the gadgets used in the replacement is constant and therefore the size of ฯโ is polynomial in the size of ฯ.
This concludes the proof.
A.7
Proof of Theorem 6
Theorem 6. NodeTrix planarity testing with free sides and cluster size at most k is NP-complete for any k โฅ 5.
Proof. The proof is based on a reduction from triconnected NAE3SAT. Starting from a triconnected instance ฯ
of NAE3SAT, we first build the instance Gfix of NodeTrix planarity with fixed sides, analogously to the proof of
Theorem 4, but using the drawing strategy shown in Fig. 9 instead of that shown in Fig. 3. Observe that, since ฯ is
triconnected and because of the special planarization strategy we used, the frame graph of Gfix is also triconnected.
In fact, inserting crossing gadgets is equivalent to planarizing the drawing of Fig. 9.
x1
โ
C1
+
+
+
C2
โ
โ
+
C3
+
+
+
C4
โ
โ
โ
โ
C5
โ
x2
x3
x4
Fig. 9. A non-planar drawing of an instance of NAE3SAT such that, by replacing crossings with dummy nodes,
you would obtain a planar and triconnected graph.
(a)
(b)
Fig. 10. (a) A cluster Vi of size three of the instance of NodeTrix planarity with fixed sides. (b) The gadget used
to replace Vi in the instance of NodeTrix planarity with free sides.
Second, we obtain an instance Gfree of NodeTrix planarity with free sides by replacing each cluster of maximum
size three, with the gadget depicted in Fig. 10(b) that uses exclusively clusters of size 5. Such a gadget consists of
nine clusters such that the corresponding nodes in the frame graph of Gfree form a wheel graph with an external
cycle of eight nodes all connected to a central one. Since the wheel has only one embedding (up to a flip), the gadget
admits a NodeTrix planar representation only if the hub of the wheel is drawn inside the cycle formed by the other
eight clusters. Also, the edges that in the instance Gfix are constrained to attach to a specific side of a matrix due
to the side assignment ฮฆ, are now all incident to the same cluster of the wheel. Since Gfree has a triconnected frame
graph, the embedding of the frame graph is fixed, and a NodeTrix planar representation with fixed sides of Gfix
can be immediately obtained from a NodeTrix planar representation with free sides of Gfree .
| 8cs.DS
|
TC0 circuits for algorithmic problems in nilpotent
groups
Alexei Myasnikov1 and Armin Weiร2
1
2
Stevens Institute of Technology, Hoboken, NJ, USA
Universitรคt Stuttgart, Germany
arXiv:1702.06616v2 [math.GR] 26 Jul 2017
Abstract
Recently, Macdonald et. al. showed that many algorithmic problems for finitely generated nilpotent groups including computation of normal forms, the subgroup membership problem, the conjugacy problem, and computation of subgroup presentations can be done in LOGSPACE. Here
we follow their approach and show that all these problems are complete for the uniform circuit
class TC0 โ uniformly for all r-generated nilpotent groups of class at most c for fixed r and c.
In order to solve these problems in TC0 , we show that the unary version of the extended gcd
problem (compute greatest common divisors and express them as linear combinations) is in TC0 .
Moreover, if we allow a certain binary representation of the inputs, then the word problem
and computation of normal forms is still in uniform TC0 , while all the other problems we examine
are shown to be TC0 -Turing reducible to the binary extended gcd problem.
Keywords and phrases nilpotent groups, TC0 , abelian groups, word problem, conjugacy problem,
subgroup membership problem, greatest common divisors
Contents
1 Introduction
2
2 Preliminaries
2.1 Complexity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.2 Nilpotent groups and Malโcev coordinates . . . . . . . . . . . . . . . . . . . .
3
3
5
3 Presentation of subgroups
3.1 Quotient presentations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
6
7
4 Word problem and computation of Malโcev coordinates
8
5 The extended gcd problem
9
6 Matrix reduction and subgroup membership problem
14
6.1 Subgroup membership problem . . . . . . . . . . . . . . . . . . . . . . . . . . 16
6.2 Subgroup presentations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
7 More algorithmic problems
18
7.1 Homorphisms and kernels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
7.2 Centralizers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
7.3 The conjugacy problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
8 Computing quotient presentations
20
9 Power problem and conjugacy in wreath products of nilpotent groups
21
10 Conclusion and Open Problem
22
ยฉ Alexei Myasnikov, Armin Weiร;
licensed under Creative Commons License CC-BY
Leibniz International Proceedings in Informatics
Schloss Dagstuhl โ Leibniz-Zentrum fรผr Informatik, Dagstuhl Publishing, Germany
2
A. Myasnikov, A. Weiร
1
Introduction
The word problem (given a word over the generators, does it represent the identity?) is one
of the fundamental algorithmic problems in group theory introduced by Dehn in 1911 [3].
While for general finitely presented groups all these problems are undecidable [23, 2], for
many particular classes of groups decidability results have been established โ not just for
the word problem but also for a wide range of other problems. Finitely generated nilpotent
groups are a class where many algorithmic problems are (efficiently) decidable (with some
exceptions like the problem of solving equations โ see e. g. [6]).
In 1958, Malโcev [18] established decidability of the word and subgroup membership
problem by investigating finite approximations of nilpotent groups. In 1965, Blackburn [1]
showed decidability of the conjugacy problem. However, these methods did not allow
any efficient (e. g. polynomial time) algorithms. Nevertheless, in 1966 Mostowski provided
โpracticalโ algorithms for the word problem and several other problems [20]. In terms of
complexity, a major step was the result by Lipton and Zalcstein [15] that the word problem
of linear groups is in LOGSPACE. Together with the fact that finitely generated nilpotent
groups are linear (see e. g. [7, 10]) this gives a LOGSPACE solution to the word problem of
nilpotent groups, which was later improved to uniform TC0 by Robinson [24].
A typical algorithmic approach to nilpotent groups is using so-called Malโcev (or Hallโ
Malโcev) bases (see e. g. [7, 10]), which allow to carry out group operations by evaluating
polynomials (see Lemma 3). This approach was systematically used in [11] and [20] or โ
in the more general setting of polycyclic presentations โ in [25] for solving (among others)
the subgroup membership and conjugacy problem of polycyclic groups. Recently in [21, 22]
polynomial time bounds for the equalizer and subgroup membership problems in nilpotent
groups have been given. Finally, in [16] the following problems were shown to be in
LOGSPACE using the Malโcev basis approach. Here, Nc,r denotes the class of nilpotent
groups of nilpotency class at most c generated by at most r elements.
The word problem: given G โ Nc,r and g โ G, is g = 1 in G?
Given G โ Nc,r and g โ G, compute the (Malโcev) normal form of g.
The subgroup membership problem: Given G โ Nc,r and g, h1 , . . . , hn โ G, decide whether
g โ hh1 , . . . , hn i and, if so, express g as a word over the subgroup generators h1 , . . . , hn
(in [16] only the decision version was shown to be in LOGSPACE โ for expressing g as a
word over the original subgroup generators a polynomial time bound was given).
Given G, H โ Nc,r and K = hg1 , . . . , gn i โค G, together with a homomorphism ฯ : K โ H
specified by ฯ(gi ) = hi , and some h โ Im(ฯ), compute a generating set for ker(ฯ) and
find g โ G such that ฯ(g) = h.
Given G โ Nc,r and K = hg1 , . . . , gn i โค G, compute a presentation for K.
Given G โ Nc,r and g โ G, compute a generating set for the centralizer of g.
The conjugacy problem: Given G โ Nc,r and g, h โ G, decide whether or not there exists
u โ G such that uโ1 gu = h and, if so, find such an element u.
These problems are not only of interest in themselves, but also might serve as building blocks
for solving the same problems in polycyclic groups โ which are of particular interest because
of their possible application in non-commutative cryptography [4]. In this work we follow
[16] and extend these results in several ways:
We give a complexity bound of uniform TC0 for all the above problems.
In order to derive this bound, we show that the extended gcd problem (given a1 , . . . , an โ Z,
P
compute x1 , . . . , xn โ Z with gcd(a1 , . . . , an ) = i ai xi ) with input and output in unary
is in uniform TC0 .
TC0 circuits for algorithmic problems in nilpotent groups
Our description of circuits is for the uniform setting where G โ Nc,r is part of the input
(in [16] the uniform setting is also considered; however, only in some short remarks).
Since nilpotent groups have polynomial growth, it is natural to allow compressed inputs:
we give a uniform TC0 solution for the word problem allowing words with binary exponents
as input โ this contrasts with the situation with straight-line programs (i. e., contextfree grammars which produces precisely one word โ another method of exponential
compression) as input: then the word problem is hard for C= L [12]. Thus, the difficulty of
the word problem with straight-line programs is not due to their compression but rather
due to the difficulty of evaluating a straight-line program.
We show that the other of the above problems are uniform-TC0 -Turing-reducible to
the (binary) extended gcd problem when the inputs (both the ambient group and the
subgroup etc.) are given as words with binary exponents.
We show how to solve the power problem in nilpotent groups. This allows us to apply a
result from [19] in order to show that iterated wreath products of nilpotent groups have
conjugacy problem in uniform TC0 .
Thus, in the unary case we settle the complexity of the above problems completely. Moreover,
it also seems rather difficult to solve the subgroup membership problem without computing
gcds โ in this case our results on binary inputs would be also optimal. Altogether, our results
mean that many algorithmic problems are no more complicated in nilpotent groups than in
abelian groups. Notice that while in [16] explicit length bounds on the outputs for all these
problems are proven, we obtain polynomial length bounds simply by the fact that everything
can be computed in uniform TC0 (for which in the following we only write TC0 ).
Throughout the paper we follow the outline of [16]. For a concise presentation, we copy
many definitions from [16]. Most of our theorems involve two statements: one for unary
encoded inputs and one for binary encoded inputs. In order to have a concise presentation,
we always put them in one result. We only consider finitely generated nilpotent groups
without mentioning that further.
Outline. We start with basic definitions on complexity as well as on nilpotent groups. In
Section 3 we describe how subgroups of nilpotent groups can be represented and develop
a โniceโ presentation for all groups in Nc,r . Section 4 deals with the word problem and
computation of normal forms. After that we solve the unary extended gcd problem in TC0
and introduce the so-called matrix reduction in order to solve the subgroup membership
problem. In Section 7 we present our result for the remaining of the above problems, in
Section 8 we explain how to compute โniceโ presentations, and in Section 9 we apply the
results of [19] in order to show that the conjugacy problem of iterated wreath products of
nilpotent groups is in TC0 . Finally, we conclude with some open questions.
2
2.1
Preliminaries
Complexity
For a finite alphabet ฮฃ, the set of words over ฮฃ is denoted by ฮฃโ . Computation or decision
problems are given by functions f : โโ โ ฮฃโ for some finite alphabets โ and ฮฃ. A decision
problem (= formal language) L is identified with its characteristic function ฯL : โโ โ {0, 1}
with ฯL (x) = 1 if, and only if, x โ L. (In particular, the word and conjugacy problems can
be seen as functions ฮฃโ โ {0, 1}.) We use circuit complexity as described in [26].
Circuit Classes. The class TC0 is defined as the class of functions computed by families of
circuits of constant depth and polynomial size with unbounded fan-in Boolean gates (and,
3
4
A. Myasnikov, A. Weiร
or, not) and majority gates. A majority gate (denoted by Maj) returns 1 if the number of 1s
in its input is greater or equal to the number of 0s. In the following we always assume that
the alphabets โ and ฮฃ are encoded over the binary alphabet {0, 1} such that each letter
uses the same number of bits. We say a function f is TC0 -computable if f โ TC0 .
In the following, we only consider Dlogtime-uniform circuit families and we simply
write TC0 as shorthand for Dlogtime-uniform TC0 . Dlogtime-uniform means that there is a
deterministic Turing machine which decides in time O(log n) on input of two gate numbers
(given in binary) and the string 1n whether there is a wire between the two gates in the
n-input circuit and also computes of which type some gates is. Note that the binary encoding
of the gate numbers requires only O(log n) bits โ thus, the Turing machine is allowed to use
time linear in the length of the encodings of the gates. For more details on these definitions
we refer to [26].
We have the following inclusions (note that even TC0 โ P is not known to be strict):
AC0 $ TC0 โ LOGSPACE โ P.
Reductions. A function f is TC0 -Turing-reducible to a function g if there is a Dlogtimeuniform family of TC0 circuits computing f which, in addition to the Boolean and majority
gates, also may use oracle gates for g (i. e., gates which on input x output g(x)). This is
expressed by f โ TC0 (g). Note that if f1 , . . . , fk are in TC0 , then TC0 (f1 , . . . , fk ) = TC0 .
In particular, if f and g are TC0 -computable functions, then also the composition g โฆ f is
TC0 -computable. We will extensively make use of this observation โ which will also guarantee
the polynomial size bound on the outputs of our circuits without additional calculations.
We will also use another fact frequently without giving further reference: on input of two
alphabets ฮฃ and โ (coded over the binary alphabet), a list of pairs (a, va ) with a โ ฮฃ and
va โ โโ such that each a โ ฮฃ occurs in precisely one pair, and a word w โ ฮฃโ , the image
ฯ(w) under the homomorphism ฯ defined by ฯ(a) = va can be computed in TC0 [13].
Encoding numbers: unary vs. binary. There are essentially two ways of representing integer
numbers: the usual way as a binary number where a string a0 ยท ยท ยท an with ai โ {0, 1} represents
P
ai 2nโi , and as a unary number where k โ N is represented by 1k = 11
ยท ยท ยท 1} (respectively
| {z
k
by 0nโk 1k if n is the number of input bits).
We will state most results in this paper with both representations. The unary representation corresponds to group elements given as words over the generators, whereas the binary
encoding will be used if inputs are given in a compressed form.
I Example 1. The following problem Count is in TC0 : given a bit-string u of length n and
a number j < n (we assume that it is given in unary as 0nโj 1j ), decide whether the number
of ones |u|1 in u is exactly j. We have |u|1 โฅ j if, and only if, u0j 1nโj 1 โฅ n. Thus,
Count(u, j) = Maj(u0j 1nโj ) โง ยฌMaj(u0j 1nโj ) .
In particular, the word problem of Z when 1 is encoded as 1 and โ1 as 0, which is simply
the question whether |u|1 = n/2 and n even, is in TC0 .
Arithmetic in TC0 . Iterated Addition (resp. Iterated Multiplication) are the
following computation problems: On input of n binary integers a1 , . . . , an each having n bits
Pn
(i. e., the input length is N = n2 ), compute the binary representation of the sum i=1 ai
Qn
(resp. product i=1 ai ). For Integer Division the input are two binary n-bit integers a, b;
the binary representation of the integer c = ba/bc has to be computed. The first statement
of Theorem 2 is a standard fact, see [26]; the other statements are due to Hesse, [8, 9].
TC0 circuits for algorithmic problems in nilpotent groups
5
I Theorem 2 ([8, 9, 26]). The problems Iterated Addition, Iterated Multiplication,
Integer Division are all in TC0 no matter whether inputs are given in unary or binary.
Note that if the numbers a and b are encoded in unary (as strings 1a and 1b ), division can
be seen to be in TC0 very easily: just try for all 0 โค c โค a whether 0 โค a โ bc < b.
Representing groups for algorithmic problems. We consider finitely generated groups G
together with finite generating sets A. Group elements are represented as words over the
generators and their inverses (i. e., as elements of (A โช Aโ1 )โ ). We make no distinction
between words and the group elements they represent. Whenever it might be unclear whether
we mean equality of words or of group elements, we write โg = h in Gโ for equality in G.
Words over the generators ยฑ1 of Z correspond to unary representation of integers. As
a generalization of binary encoded integers, we introduce the following notion: a word
with binary exponents is a sequence w1 , . . . , wn where the wi are from a fixed generating
set of the group together with a sequence of exponents x1 , . . . , xn where the xi โ Z are
encoded in binary. The word with binary exponents represents the word (or group element)
w = w1x1 ยท ยท ยท wnxn . Note that in a fixed nilpotent group every word of length n can be rewritten
as a word with binary exponents using O(log n) bits (this fact is well-known and also a
consequence of Theorem 6 below); thus, words with binary exponents are a natural way of
representing inputs for algorithmic problems in nilpotent groups.
2.2
Nilpotent groups and Malโcev coordinates
Let G be a group. For x, y โ G we write xy = y โ1 xy (x conjugated by y) and [x, y] =
xโ1 y โ1 xy (commutator of x and y). For subgroups H1 , H2 โค G, we have [H1 , H2 ] =
h{[h1 , h2 ] | h1 โ H1 , h2 โ H2 }i. A group G is called nilpotent if it has central series, i.e.
G = G1 โฅ G2 โฅ ยท ยท ยท โฅ Gc โฅ Gc+1 = 1
(1)
such that [G, Gi ] โค Gi+1 for all i = 1, . . . , c. If G is finitely generated, so are the abelian quotients Gi /Gi+1 , 1 โค i โค c. Let ai1 , . . . , aimi be a basis of Gi /Gi+1 , i.e. a generating set such
e
that Gi /Gi+1 has a presentation ai1 , . . . , aimi aijij , [aik , ai` ], for j โ Ti , k, ` โ {1, . . . , mi } ,
where Ti โ {1, . . . , mi } (here T stands for torsion) and eij โ Z>0 (be aware that we explicitly
allow eij = 1, which is necessary for our definition of quotient presentations in Section 3).
Formally put eij = โ for j โ
/ Ti . Note that
A = (a11 , a12 , . . . , acmc )
is a so-called polycyclic generating sequence for G, and we call A a Malโcev basis associated to the central series (1). Sometimes we use A interchangeably also for the set
A = {a11 , a12 , . . . , acmc }.
For convenience, we will also use a simplified notation, in which the generators aij and
P
exponents eij are renumbered by replacing each subscript ij with j +
m` , so the generating
`<j
sequence A can be written as A = (a1 , . . . , am ). We allow the expression ij to stand for
P
j+
m` in other notations as well. We also denote
`<j
T = {i | ei < โ}.
By the choice of {a1 , . . . , am }, every element g โ G may be written uniquely in the form
ฮฑm
1
g = aฮฑ
1 ยท ยท ยท am ,
6
A. Myasnikov, A. Weiร
where ฮฑi โ Z and 0 โค ฮฑi < ei whenever i โ T . The m-tuple (ฮฑ1 , . . . , ฮฑm ) is called the
coordinate vector or Malโcev coordinates of g and is denoted Coord(g), and the expression
ฮฑm
1
aฮฑ
1 ยท ยท ยท am is called the (Malโcev) normal form of g. We also denote ฮฑi = Coordi (g).
To a Malโcev basis A we associate a presentation of G as follows. For each 1 โค i โค m, let
ni be such that ai โ Gni Gni +1 . If i โ T , then aei i โ Gni +1 , hence a relation
aiei = aยต` i` ยท ยท ยท aยตmim
(2)
holds in G for ยตij โ Z and ` > i such that a` , . . . , am โ Gni +1 . Let 1 โค i < j โค m. Since
the series (1) is central, relations of the form
ฮฑ
ijm
aj ai = ai aj a` ij` ยท ยท ยท aฮฑ
m
(3)
ฮฒij`
ai aโ1
j a`
(4)
aโ1
j ai =
ยท ยท ยท aฮฒmijm
hold in G for ฮฑijk , ฮฒijk โ Z and l > j such that a` , . . . , am โ Gnj +1 . Now, G is the group
with generators {a1 , . . . , am } subject to the relation of the the form (2)โ(4).
A presentation with relations of the form (2)โ(4) for all i resp. i and j is called a nilpotent
presentation. Indeed, any presentation of this form will define a nilpotent group. It is called
consistent if the order of ai modulo hai+1 , . . . , am i is precisely ei for all i. While presentations
of this form need not, in general, be consistent, those derived from a central series of a group
G as above are consistent.
Given a consistent nilpotent presentation, there is an easy way to solve the word problem:
simply apply the rules of the form (3) and (4) to move all occurrences of aยฑ1
1 in the input
word to the left, then apply the power relations (2) to reduce their number modulo e1 ; finally,
continue with a2 and so on.
Multiplication functions. An crucial feature of the coordinate vectors for nilpotent groups
ฮฒ1
ฮฑm
ฮฒm
1
is that the coordinates of a product (aฮฑ
1 ยท ยท ยท am )(a1 ยท ยท ยท am ) may be computed as a โniceโ
function (polynomial if T = โ
) of the integers ฮฑ1 , . . . , ฮฑm , ฮฒ1 , . . . , ฮฒm .
I Lemma 3 ([7, 10]). Let G be a nilpotent group with Malโcev basis a1 , . . . , am and T = โ
.
There exist p1 , . . . , pm โ Z[x1 , . . . , xm , y1 , . . . , ym ] and q1 , . . . , qm โ Z[x1 , . . . , xm , z] such that
for g, h โ G with Coord(g) = (ฮณ1 , . . . , ฮณm ) and Coord(h) = (ฮด1 , . . . , ฮดm ) and l โ Z we have
(i) Coordi (gh) = pi (ฮณ1 , . . . , ฮณm , ฮด1 , . . . , ฮดm ),
(ii) Coordi (g l ) = qi (ฮณ1 , . . . , ฮณm , l),
(iii) Coord1 (gh) = ฮณ1 + ฮด1 and Coord1 (g l ) = lฮณ1 .
Notice that an explicit algorithm to construct the polynomials pi , qi is given in [14]. For
further background on nilpotent groups we refer to [7, 10].
3
Presentation of subgroups
Before we start with algorithmic problems, we introduce a canonical way how to represent
subgroups of nilpotent groups. This is important for two reasons: first, of course we need it
to solve the subgroup membership problem, and, second, for the uniform setting it allows us
to represent nilpotent groups as free nilpotent group modulo a kernel which is represented as
ฮฑim
i1
a subgroup. Let h1 , . . . , hn be elements of G given in normal form by hi = aฮฑ
1 ยท ยท ยท am , for
i = 1, . . . , n, and let H = hh1 , . . . , hn i. We associate the matrix of coordinates
๏ฃซ
๏ฃถ
ฮฑ11 ยท ยท ยท ฮฑ1m
๏ฃฌ
.. ๏ฃท ,
..
A = ๏ฃญ ...
(5)
.
. ๏ฃธ
ฮฑn1
ยทยทยท
ฮฑnm
TC0 circuits for algorithmic problems in nilpotent groups
to the tuple (h1 , . . . , hn ) and conversely, to any n ร m integer matrix, we associate an n-tuple
of elements of G, whose Malโcev coordinates are given as the rows of the matrix, and the
subgroup H generated by the tuple. For each i = 1, . . . , n where row i is non-zero, let ฯi be
the column of the first non-zero entry (โpivotโ) in row i. The sequence (h1 , . . . , hn ) is said
to be in standard form if the matrix of coordinates A is in row-echelon form and its pivot
columns are maximally reduced (similar to the Hermite normal form), more specifically, if A
satisfies the following properties:
(i) all rows of A are non-zero (i.e. no hi is trivial),
(ii) ฯ1 < ฯ2 < ยท ยท ยท < ฯs (where s is the number of pivots),
(iii) ฮฑiฯi > 0, for all i = 1, . . . , n,
(iv) 0 โค ฮฑkฯi < ฮฑiฯi , for all 1 โค k < i โค s
(v) if ฯi โ T , then ฮฑiฯi divides eฯi , for i = 1, . . . , s.
The sequence (resp. matrix) is called full if in addition
(vi) H โฉ hai , ai+1 , . . . , am i is generated by {hj | ฯj โฅ i}, for all 1 โค i โค m.
Note that {hj | ฯj โฅ i} consists of those elements having 0 in their first i โ 1 coordinates. It
is an easy exercise (see also [16]) to show that (vi) holds for a given i if, and only if,
โ1
for all 1 โค k < j โค s with ฯk < i, hโ1
k hj hk and hk hj hk are elements of h hl | l > k i, and
eฯ /ฮฑkฯ
k
for all 1 โค k โค s with ฯk < i and ฯk โ T , hk k
โ h hl | l > k i.
We will use full sequences and the associated matrices in full form interchangeably without
mentioning it explicitly. For simplicity we assume that the inputs of algorithms are given as
matrices. The importance of full sequences is described in the following lemma โ a proof can
be found in [25] Propositions 9.5.2 and 9.5.3.
I Lemma 4 ([16, Lem. 3.1]). Let H โค G. There is a unique full sequence U = (h1 , . . . , hs )
that generates H. We have s โค m and H = {hฮฒ1 1 ยท ยท ยท hฮฒs s | ฮฒi โ Z and 0 โค ฮฒi < eฯi if ฯi โ T }.
Thus, computing a full sequence will be the essential tool for solving the subgroup membership
problem. Before we focus on subgroup membership, we will first solve the word problem and
introduce how the nilpotent group can be part of the input.
3.1
Quotient presentations
Let c, r โ N be fixed. The free nilpotent group Fc,r of class c and rank r is defined
as Fc,r = h a1 , . . . , ar | [x1 , . . . , xc+1 ] = 1 for x1 , . . . , xc+1 โ Fc,r i where [x1 , . . . , xc+1 ] =
[[x1 , . . . , xc ], xc+1 ], i. e., Fc,r is the r-generated group only subject to the relations that
weight c + 1 commutators are trivial. Throughout, we fix a Malโcev basis A = (a1 , . . . , am )
(which we call the standard Malโcev basis) associated to the lower central series of Fc,r such
that the associated nilpotent presentation consists only of relations of the form (3) and (4)
(i. e., T = โ
โ such a presentation exists since Fc,r is torsion-free), a1 , . . . , ar generates Fc,r ,
and all other Malโcev generators are iterated commutators of a1 , . . . , ar .
Denote by Nc,r the set of r-generated nilpotent groups of class at most c. Every group
G โ Nc,r is a quotient of the free nilpotent group Fc,r , i. e., G = Fc,r /N for some normal
subgroup N โค Fc,r . Assume that T = (h1 , . . . , hs ) is a full sequence generating N . Adding
T to the set of relators of the free nilpotent group yields a new nilpotent presentation.
This presentation will be called quotient presentation of G. For inputs of algorithms, we
assume that a quotient presentation is always given as its matrix of coordinates in full form.
Depending whether the entries of the matrix are encoded in unary or binary, we call the
quotient presentation be given in unary or binary.
7
8
A. Myasnikov, A. Weiร
I Lemma 5 ([16, Prop. 5.1]). Let c and r be fixed integers and let A = (a1 , . . . , am ) be the
standard Malโcev basis of Fc,r . Moreover, denote by S the set of relators of Fc,r with respect
to A. Let G โ Nc,r with G = Fc,r /N and let T be the full-form sequence for the subgroup N
of Fc,r . Then, h A | S โช T i is a consistent nilpotent presentation of G.
Proof. Clearly, we have G ' hA | S โช T i. Since hA | Si is a nilpotent presentation and the
elements of T add relators of the form (2), the presentation is nilpotent. To prove that it is
consistent, suppose some ai โ A has order ฮฑi modulo hai+1 , . . . , am i in hA | S โช T i. Since
ฮฑm
i ฮฑi+1
the order is infinite in F , there must be element of the form aฮฑ
i ai+1 ยท ยท ยท am in N . But then,
0
ฮฑ0 ฮฑ
ฮฑ0
i+1
by Lemma 4, T must contain an element ai i ai+1
ยท ยท ยท amm where ฮฑi0 divides ฮฑi . Hence ฮฑi
cannot be smaller than ฮฑi0 and so the presentation is consistent.
J
For the following we always assume that a quotient presentation is part of the input,
but c and r are fixed. Later, we will show how to compute quotient presentations from an
arbitrary presentation.
I Remark. Lemma 5 ensures that each group element has a unique normal form with respect
to the quotient presentation; thus, it guarantees that all our manipulations of Malโcev
coordinates are well-defined.
4
Word problem and computation of Malโcev coordinates
In this section we deal with the word problem of nilpotent groups, which is well-known to be
in TC0 [24]. Here, we generalize this result by allowing words with binary exponents (recall
that word with binary exponents is a sequence w = w1x1 ยท ยท ยท wnxn where wi โ {a1 , . . . , am }
and the xi โ Z). By using words with binary exponents the input can be compressed
exponentially โ making the word problem, a priori, harder to solve. Nevertheless, it turns
out that the word problem still can be solved in TC0 when allowing the input to be given as
a word with binary exponents. Note that this contrasts with the situation where the input is
given as straight-line program (which like words with binary exponents allow an exponential
compression) โ then the word problem is complete for the counting class C= L [12].
I Theorem 6. Let c, r โฅ 1 be fixed and let (a1 , . . . , am ) be the standard Malโcev basis of Fc,r .
The following problem is TC0 -complete: on input of
G โ Nc,r given as a binary encoded quotient presentation and
a word with binary exponents w = w1x1 ยท ยท ยท wnxn ,
compute integers y1 , . . . , ym (in binary) such that w = ay11 ยท ยท ยท aymm in G and 0 โค yi < ei for
i โ T . Moreover, if the input is given in unary (both G and w), then the output is in unary.
Note that the statement for unary inputs is essentially the one of [24]. Be aware that in
the formulation of the theorem, T and ei for i โ T depend on the input group G. These
parameters can be read from the full matrix (ฮฑij )i,j of coordinates representing G (recall
that ฯi denotes the column index of the i-th pivot and here s is the number of rows of the
matrix):
T = {ฯi | i โ {1, . . . , s}}
(all columns which have a pivot) and ei = ฮฑji if ฯj = i. As an immediate consequence of
Theorem 6, we obtain:
I Corollary 7. Let c, r โฅ 1 be fixed. The uniform, binary version of the word problem for
groups in Nc,r is TC0 -complete (where the input is given as in Theorem 6).
TC0 circuits for algorithmic problems in nilpotent groups
The proof of Theorem 6 follows the outline given in Section 2.2; however, we cannot apply
the rules (2)โ(4) one by one. Instead we make only two steps for each generator: first apply
all possible rules (3) and (4) in one step and then apply the rules (2) in one step.
Proof of Theorem 6. The hardness part is clear since already the word problem of Z is
TC0 -complete. For describing a TC0 circuit, we proceed by induction along the standard
Malโcev basis (a1 , . . . , am ) of the free nilpotent group Fc,r . If w does not contain any letter
a1 , we have y1 = 0 and we can compute yi for i > 1 by induction.
Otherwise, we rewrite w as ay11 uv (with 0 โค y1 < e1 if 1 โ T ) such that u and v are
words with binary exponents not containing any a1 s. Once this is completed, uv can be
rewritten as ay22 ยท ยท ยท aymm by induction. For computing y1 , u and v, we proceed in two steps:
P
First, we rewrite w as ayฬ11 v with yฬ1 = wi =a1 xi (this is possible by Lemma 3 (iii)).
The exponent yฬ1 can be computed by iterated addition, which by Theorem 2 is in TC0 (in
the unary case yฬ1 can be written down in unary). Now, v consists of what remains from
w after a1 has been โeliminatedโ: for every position i in w with wi =
6 a1 , we compute
P
zi =
xj using iterated addition. Let wi = ak . By Lemma 3 (i) there are fixed
j>i
wj =a1
polynomials pk,k+1 , . . . , pk,m โ Z[x, y] such that in the free nilpotent group holds
p
k,k+1
axk ay1 = ay1 axk ak+1
(x,y)
p
ยท ยท ยท amk,m
(x,y)
for all x, y โ Z.
Hence, in order to obtain wฬ, it remains to replace every wixi with wi = a1 by the empty word
pk,k+1 (xi ,zi )
p
(x ,z )
and every wixi with wi = ak 6= a1 by axki ak+1
ยท ยท ยท amk,m i i , which is a word with
binary exponents (resp. as a word of polynomial length in the unary case), for k = 2, . . . , m.
The exponents can be computed in TC0 by Theorem 2. Since the pk,i are bounded by
pk,k+1 (xi ,zi )
p
(x ,z )
polynomials, in the unary case, axki ak+1
ยท ยท ยท amk,m i i can be written as a word
without exponents.
The second step is only applied if 1 โ T (as explained above, this can be decided and ei
can be read directly from the quotient presentation by checking whether there is a pivot in
the first column) โ otherwise y1 = yฬ1 and u is the empty word. We rewrite ayฬ11 to ay11 u with
y1 = yฬ1 mod e1 and a word with binary exponents u not containing any a1 . Again y1 can be
computed in TC0 by Theorem 2. Let ae11 = aยต2 12 ยท ยท ยท aยตm1m be the power relation for a1 (which
can be read from the quotient presentation โ it is just the row where the pivot is in the first
column) and write yฬ1 = s ยท e1 + y1 . Now, u should be equal to (aยต2 12 ยท ยท ยท aยตm1m )s in Fc,r . We
use the fixed polynomials qi โ Z[x1 , . . . , xm , z] from Lemma 3 (ii) for Fc,r yielding
q (0,ยต12 ,...,ยต1m ,s)
u = a22
ยท ยท ยท aqmm (0,ยต12 ,...,ยต1m ,s)
(which, in the binary setting, is a word with binary exponents, and in the unary setting a
word without exponents of polynomial length). Now, we have w = ay11 uv in G as desired. J
5
The extended gcd problem
Computing greatest common divisors and expressing them as a linear combination is an
essential step for solving the subgroup membership problem. Indeed, consider the nilpotent
group Z and let a, b, c โ Z. Then c โ ha, bi if, and only if, gcd(a, b) | c.
Binary gcds. The (binary) extended gcd problem (ExtGCD) is as follows: on input of
binary encoded numbers a1 , . . . , an โ Z, compute x1 , . . . , xn โ Z such that
x1 a1 + ยท ยท ยท + xn an = gcd(a1 , . . . , an ).
9
10
A. Myasnikov, A. Weiร
Clearly this can be done in P using the Euclidean algorithm, but it is not known whether it
is actually in NC. Since we need to compute greatest common divisors, we will reduce the
subgroup membership problem to the computation of gcds.
Unary gcds. Computing the gcd of numbers encoded in unary is straightforward in TC0 by
an exhaustive search; yet, it is not obvious how to express gcd(a1 , . . . , an ) as x1 a1 +ยท ยท ยท+xn an
in TC0 . By [17] such xi with |xi | โค 12 max{|a1 |, . . . , |an |} can be computed in LOGSPACE.
However, that algorithm uses a logarithmic number of rounds each depending on the outcome
of the previous one โ so it does not work in TC0 . Note that for n = 2 the problem is easy:
I Example 8. Let a, b โ Z. Then, there are x, y โ Z with |x| , |y| โค max {|a| , |b|} such that
ax + by = gcd(a, b). This is easy to see: assume a, b > 0 (the other cases are similar) and
we are given x, y with ax + by = gcd(a, b) and x โฅ b, then we can replace x with x โ b and
y with y + a. This does not change the sum and by iterating this step, we can assure that
0 โค x < b. Then we have y = โ axโgcd(a,b)
; hence, โa < y โค 1.
b
If a and b are given in unary, the coefficients x, y can be computed in TC0 by simply
checking all (polynomially many) values for x and y with |x| , |y| โค max {|a| , |b|}.
However, if we want to express the gcd of unboundedly many numbers ai as a linear
combination, we cannot check all possible values for x1 , . . . , xn in TC0 because there are
max{|a1 |n , . . . , |an |n } (i. e., exponentially) many. Expressing the gcd as a linear combination
can be viewed as a linear equation with integral coefficients. Recently, in [5, Thm. 3.14]
it has been shown that, if all the coefficients are given in unary, it can be decided in TC0
whether such an equation or a system of a fixed number of equations has a solution. Since
from the proof of [5, Thm. 3.14] it is not obvious how to find an actual solution, we prove
the following result:
I Theorem 9. The following problem is in TC0 : Given integers a1 , . . . , an as unary numbers,
compute x1 , . . . , xn โ Z (either in unary or binary) such that
x1 a1 + ยท ยท ยท + xn an = gcd(a1 , . . . , an )
2
with |xi | โค (n + 1) (max{|a1 |, . . . , |an |}) .
Proof. Let A = max{|a1 |, . . . , |an |}, which clearly can be computed in TC0 . W. l. o. g. we
assume that all the ai are positive. We assume that all numbers which appear as intermediate
results are encoded in binary (indeed, these numbers will grow too fast to encode them in
unary).
First observe that gcd(a1 , . . . , ai ) can be computed in TC0 for all i โ {1, . . . , n}. The
reason is simply that there are only linearly many numbers less than each ai . In fact, for
computing gcd(a1 , . . . , an ), the circuit just checks for all d โค A whether for every i there is
some ci โค ai with dci = ai . If for some d there are such ci for all i, we have found a common
divisor. The gcd is simply the largest one.
Thus, it remains to compute the coefficients xi . Since we can compute gcd(a1 , . . . , an ) in
0
TC , we can divide all numbers ai by the gcd and henceforth assume that gcd(a1 , . . . , an ) = 1
(note that this does not change the coefficients xi ).
The first step for computing the xi s, is to compute di = gcd(a1 , . . . , ai ) for i = 1, . . . , n
and d0 = 0 (note that by our assumption, dn = 1). We have
di = gcd(a1 , . . . , ai ) = gcd(gcd(a1 , . . . , aiโ1 ), ai ) = gcd(diโ1 , ai ).
TC0 circuits for algorithmic problems in nilpotent groups
11
Using this observation, the next step computes for each i integers yi and zi such that
di = yi diโ1 + zi ai . For all i this can be done in parallel in TC0 by simply trying all possible
values with |yi | , |zi | โค A as in Example 8. We set
n
Y
xi = zi
yj .
j=i+1
These xi can be computed in TC0 using iterated multiplication [8] โ see Theorem 2. Moreover,
an easy induction shows that
x1 a1 + ยท ยท ยท + xn an = gcd(a1 , . . . , an ).
There is only one problem with the numbers xi : in general, they do not meet the bounds
|xi | โค (n + 1)A2 . So, the next step will be to modify these xi in such a way that they meet
the desired bound. The idea is to apply a sequence of operations as in Example 8 to make
the coefficients small. The difficulty here is to find out where exactly to add/subtract a
multiple of which ai .
Let P = {i โ {1, . . . , n} | xi > 0} and N = {i โ {1, . . . , n} | xi < 0}. Note that P โฉN = โ
and w. l. o. g. we can assume that P โช N = {1, . . . , n}. For all i = 1, . . . n, we set
j x a k
โxi ai
i i
0
p0i = max 0,
,
n
=
max
0,
.
(6)
i
A2
A2
Obviously, we have p0i = 0 for i โ N and n0i = 0 for i โ P. The non-zero p0i correspond to
those indices which have a too large positive xi and the non-zero n0i to those indices which
have a too small negative xi (this is because we assumed the ai to be positive). Moreover,
xi should be decreased (resp. increased) by A2 p0i /ai (resp. A2 n0i /ai ) in order to make it
reasonably small. We will not be able to reach this aim completely, but with a sufficiently
small error.
Pi
Pi
Next, we set Pi0 = j=1 p0j and Ni0 = j=1 n0j . All the p0i , n0i , Pi0 , Ni0 and P and N can
be computed in TC0 using iterated addition and division โ see Theorem 2.
I Lemma 10.
Pn0 โ Nn0 โค |N | and Nn0 โ Pn0 โค |P|
Proof. For i โ P, we have 0 โค xi ai โ p0i A2 < A2 by definition of p0i . Likewise, we have
0 โฅ xi ai + n0i A2 > โA2 for i โ N . Since P โฉ N = โ
and P โช N = {1, . . . , n}, we obtain
(Pn0 โ Nn0 )A2 =
X
p0i A2 โ
iโP
X
n0i A2 <
iโN
X
xi ai +
iโP
X
(xi ai + A2 )
iโN
2
= x1 a1 + ยท ยท ยท + xn an + |N | A = 1 + |N | A2
meaning that Pn0 โ Nn0 โค |N |. The same argument yields (Pn0 โ Nn0 )A2 > 1 โ |P| A2 , and
thus Nn0 โ Pn0 < |P|.
J
Let D = Nn0 โ Pn0 . For i โ {1, . . . , n}, we set
pi =
(
p0i + 1
p0i
if i โ P and i โค D,
otherwise,
ni =
(
n0i + 1
n0i
if i โ N and i โค โD,
otherwise,
(7)
12
A. Myasnikov, A. Weiร
Pi
Pi
and Pi = j=1 pj and Ni = j=1 nj for i โ {0, . . . , n}. Because of Lemma 10, we have
Nn = Pn . Clearly, the pi , ni , Pi , Ni can be computed in TC0 and from now on we will work
with these numbers. Also, as an immediate consequence of (6) and (7), we have
โA2 โค xi ai โ pi A2 โค A2
2
2
โA โค xi ai + ni A โค A
for i โ P,
2
for i โ N .
(8)
Now, for i โ P and j โ N , we define
pj,i =
๏ฃฑ
๏ฃด
pi
๏ฃด
๏ฃด
๏ฃด
๏ฃด
๏ฃด
๏ฃด
๏ฃฒNj โ Piโ1
if Njโ1 โค Piโ1 < Pi โค Nj
if Njโ1 โค Piโ1 < Nj โค Pi
Pi โ Njโ1
๏ฃด
๏ฃด
๏ฃด
๏ฃด
nj
๏ฃด
๏ฃด
๏ฃด
๏ฃณ0
if Piโ1 โค Njโ1 < Pi โค Nj
if Piโ1 โค Njโ1 < Nj โค Pi
otherwise.
Note that the cases overlap. However, then the different definitions of pj,i agree. For i โ N
and j โ P, we set pj,i = pi,j and for i, j โ P or i, j โ N we set pj,i = 0.
X
X
I Lemma 11. We have
pj,i = pi and
pj,i = nj .
j
i
P
Proof. We only show j pj,i = pi ; the other statement follows by symmetry. First, assume
that pi = pi,j for some j. Then pi,j 0 = 0 for all j 0 6= j; hence, the lemma holds. Now, let
pi 6= pi,j for any j. We define
ฮฑi = min {j โ {1, . . . , n} | Piโ1 < Nj } ,
ฮฒi = max {j โ {1, . . . , n} | Njโ1 < Pi } .
In particular, we have pj,i = 0 for j < ฮฑi or j > ฮฒi . Notice that ฮฑi and ฮฒi exist for all
i โ P (since Nn = Pn ). Also ฮฑi < ฮฒi because ฮฑi = ฮฒi = j implies Njโ1 โค Piโ1 < Nj and
Njโ1 < Pi โค Nj ; thus, pj,i = pi . Moreover, we have pฮฑi ,i = Nฮฑi โPiโ1 and pฮฒi ,i = Pi โNฮฒi โ1
and pj,i = nj for ฮฑi < j < ฮฒi . Since
Pi โ Piโ1 =
i
X
pi โ
j=0
Nฮฒi โ1 โ Nฮฑi โ
iโ1
X
pi = pi
and
j=0
ฮฒX
i โ1
j=ฮฑi +1
nj =
ฮฒX
i โ1
nj โ
j=1
ฮฑi
X
nj โ
j=1
ฮฒX
i โ1
nj = 0,
j=ฮฑi +1
we obtain
X
pj,i = Nฮฑi โ Piโ1 + Pi โ Nฮฒi โ1 +
j
ฮฒX
i โ1
nj = p i .
j=ฮฑi +1
J
We set yj,i =
j
k
2
pj,i A
ai aj
for i, j = 1, . . . , n. Notice that, since ai aj โค A2 , this means that
(pj,i โ 1)A2 < yj,i ai aj โค pj,i A2 .
(9)
TC0 circuits for algorithmic problems in nilpotent groups
Finally, we define our new
๏ฃฑ
P
๏ฃด
๏ฃดxi โ j yj,i aj
๏ฃฒ
P
xฬi = xi + j yi,j aj
๏ฃด
๏ฃด
๏ฃณx
i
13
coefficients xฬi as follows:
if i โ P,
if i โ N ,
otherwise.
It remains to show the following:
(i) the numbers xฬi can be computed in TC0 ,
(ii) xฬ1 a1 + ยท ยท ยท + xฬn an = 1,
(iii) |xฬi | โค (n + 1)A2 for all i.
The first point is straightforward: we already remarked that the pi , ni , Pi , Ni and P and N
can be computed in TC0 . Hence, also the pj,i can be computed in TC0 (as simple Boolean
combination resp. addition of the previous numbers). Now, the yj,i can be computed using
division [8]. Finally, the computation of the xฬi is simply another application of iterated
addition.
For the second point observe that
X
X
xฬ1 a1 + ยท ยท ยท + xฬn an =
xฬi ai +
xฬi ai
iโP
iโN
๏ฃซ
=
X
๏ฃญxi โ
=
n
X
i=1
n
X
xi ai โ
xi ai โ
n
X
๏ฃซ
X
๏ฃถ
๏ฃญxi +
j
XX
yj,i aj ai +
iโN
XX
iโP jโN
yj,i aj ai +
X
yi,j aj ๏ฃธ ai
j
iโN
XX
iโP
i=1
=
yj,i aj ๏ฃธ ai +
j
iโP
=
๏ฃถ
X
yi,j aj ai
j
XX
yi,j aj ai
iโN jโP
xi ai
i=1
The last equality is due to the fact that yj,i = yi,j for all i, j and that yi,j = 0 if i and j are
both in P or both in N .
For the third point, let i โ P. Then,
X
X
xฬi ai = xi ai โ
yj,i aj ai โฅ xi ai โ
pj,i A2
(by (9))
j
= xi ai โ pi A
โฅ โA
j
2
(by Lemma 11)
2
(by (8))
and
xฬi ai = xi ai โ
X
yj,i aj ai โค xi ai โ
j
= xi ai โ A2 pi + nA2
โค (n + 1)A
X
(pj,i โ 1)A2
(by (9))
j
(by Lemma 11)
2
The case i โ N is completely symmetric. This concludes the proof of Theorem 9.
(by (8))
J
Notice that it is straightforward to improve the bounds of Theorem 9 further (e. g. getting
rid of the factor n + 1). However, since there is no need for that in order to perform the
matrix reduction, we do not do this additional effort. Also we could not find a TC0 circuit
which yields the bound xi โค 12 A (which is achievable in LOGSPACE by [17]).
14
A. Myasnikov, A. Weiร
6
Matrix reduction and subgroup membership problem
In [16], the so-called matrix reduction procedure converts an arbitrary matrix of coordinates
into its full form and, thus, is an essential step for solving the subgroup membership problem
and several other problems. It was first described in [25] โ however, without a precise
complexity estimate. In this section, we repeat the presentation from [16] and show that for
fixed c and r, it can be actually computed uniformly for groups in Nc,r in TC0 โ in the case
that the inputs are given in unary (as words). If the inputs are represented as words with
binary exponents, then we still can show that it is TC0 -Turing-reducible to ExtGCD. In
Section 3, we defined the matrix representation of subgroups of nilpotent groups. We adopt
all notation from Section 3.
As before, let c, r โ N be fixed and let (a1 , . . . , am ) be the standard Malโcev basis of Fc,r .
Let G โ Nc,r be given as quotient presentation, i. e., as a matrix in full form (either with
unary or binary coefficients). We define the following operations on tuples (h1 , . . . , hn ) (our
subgroup generators) of elements of G and the corresponding operations on the associated
matrix, with the goal of converting (h1 , . . . , hn ) to a sequence in full form generating the
same subgroup H = hh1 , . . . , hn i:
(1) Swap hi with hj . This corresponds to swapping row i with row j.
(2) Replace hi by hi hlj (i 6= j, l โ Z). This corresponds to replacing row i by Coord(hi hlj ).
(3) Add or remove a trivial element from the tuple. This corresponds to adding or removing
a row of zeros; or (3โ) a row of the form (0 . . . 0 ei ฮฑi+1 . . . ฮฑm ), where i โ T and
ฮฑi+1
i
m
aโe
= ai+1
ยท ยท ยท aฮฑ
m .
i
โ1
(4) Replace hi with hโ1
i . This corresponds to replacing row i by Coord(hi ).
(5) Append an arbitrary product hli11 ยท ยท ยท hlikk with i1 , . . . , ik โ {1, . . . , n} and l1 , . . . , lk โ Z to
the tuple: add a new row with Coord(hli11 ยท ยท ยท hlikk ).
Clearly, all these operations preserve H.
I Lemma 12. On input of a quotient presentation of G โ Nc,r in unary (resp. binary) and
a matrix of coordinates A given in unary (resp. binary), operations (1)โ(5) can be done in
TC0 . The output matrix will be also encoded in unary (resp. binary). For operations (2) and
(5), we require that the exponents l, l1 , . . . , lk are given in unary (resp. binary).
Moreover, as long as the rows in the matrix which are changed are pairwise distinct, a
polynomial number of such steps can be done in parallel in TC0 .
Proof. Operations (1) and (3), clearly can be done in TC0 . Notice that operation (3โ) means
simply that a row of the quotient presentation of G is appended to the matrix.
In the unary case, it follows directly from Theorem 6 that operations (2), (4), and (5) are
in TC0 because, since l, l1 , . . . , lk are given in unary, the respective group elements can be
written down as words.
In the case of binary inputs, (5) works as follows ((2) and (4) analogously): by Lemma 3
(ii), there are functions q1 , . . . , qm โ Z[x1 , . . . , xm , z] such that for every h โ Fc,r with
Coord(h) = (ฮณ1 , . . . , ฮณm ) anda l โ Z, we have Coordi (hl ) = qi (ฮณ1 , . . . , ฮณm , l) in Fc,r . These
l
functions can be used to compute Coord(hijj ) for j = 1, . . . , k. After that, hli11 ยท ยท ยท hlikk can be
written down as word with binary exponents and Theorem 6 can be applied.
J
Using the row operations defined above, in [16] it is shown how to reduce any coordinate
matrix to its unique full form. Let us repeat these steps:
Let A0 be a matrix of coordinates, as in (5) in Section 3. Recall that ฯk denotes the
column index of the k-th pivot (of the full form of A0 ). We produce matrices A1 , . . . , As ,
where s is the number of pivots in the full form of A0 , such that for every k = 1, . . . , s the
TC0 circuits for algorithmic problems in nilpotent groups
15
first ฯk columns of Ak form a matrix satisfying conditions (ii)-(v) of being a full sequence,
condition (vi) is satisfied for all i < ฯk+1 , and As is the full form of A0 . Here we formally
denote ฯs+1 = m + 1. Set ฯ0 = 0 and assume that Akโ1 has been constructed for some
k โฅ 1. In the steps below we construct Ak . We let n and m denote the number of rows
and columns, respectively, of Akโ1 . At all times during the computation, hi denotes the
group element corresponding to row i of Ak and ฮฑij denotes the (i, j)-entry of Ak , which is
Coordj (hi ). These may change after every operation.
Step 1. Locate the column ฯk of the next pivot, which is the minimum integer ฯkโ1 <
ฯk โค m such that ฮฑiฯk 6= 0 for at least one k โค i โค n. If no such integer exists, then
k โ 1 = s and As is already constructed. Otherwise, set Ak to be a copy of Akโ1 and
denote ฯ = ฯk . Compute a linear expression of
d = gcd(ฮฑkฯ , . . . , ฮฑnฯ ) = lk ฮฑkฯ + ยท ยท ยท + ln ฮฑnฯ .
Let hn+1 = hlkk ยท ยท ยท hlnn and note that hn+1 has coordinates of the form
Coord(hn+1 ) = (0, . . . , 0, d, . . .)
with d occurring in position ฯ. Perform operation (5) to append hn+1 as row n + 1 of Ak .
โฮฑ /d
Step 2. For each i = k, . . . , n, perform operation (2) to replace row i by Coord(hi ยท hn+1iฯ ).
โbฮฑ
/dc
and for each i = 1, . . . , k โ 1, use (2) to replace row i by Coord(hi ยท hn+1iฯ ). After
that, swap row k with row n + 1 using (1). At this point, properties (ii)-(iv) hold on the
first k columns of Ak .
Step 3. If ฯ โ T , we additionally ensure condition (v) as follows. Perform row operation (3โ),
with respect to ฯ, to append a trivial element hn+2 with Coord(hn+2 ) = (0, . . . , 0, eฯ , . . .)
to Ak . Let ฮด = gcd(d, eฯ ) and compute the linear expression ฮด = n1 d + n2 eฯ , with
2
|n1 |, |n2 | โค max{d, eฯ }. Let hn+3 = hnk 1 hnn+2
and append this row to Ak , as row n + 3.
Note that Coord(hn+3 ) = (0, . . . , 0, ฮด, . . .), with ฮด in position ฯ. Replace row k by
โeฯ /ฮด
โd/ฮด
Coord(hk ยท hn+3 ) and row n + 2 by Coord(hn+2 ยท hn+3
), producing zeros in column ฯ
in these rows. Swap row k with row n + 3. At this point, (ii), (iii), and (v) hold (for the
first ฯk columns) but (iv) need not, since the pivot entry is now ฮด instead of d. For each
โbฮฑ /ฮดc
j = 1, . . . , k โ 1, replace row j by Coord(hj ยท hk jฯ ), ensuring (iv).
Step 4. Identify the next pivot ฯk+1 (like in Step 1). If ฯk is the last pivot, we set
ฯk+1 = m + 1. We now ensure condition (vi) for i < ฯk+1 . Observe that Steps 1-3
preserve h hj | ฯj โฅ i i for all i < ฯk . Hence (vi) holds in Ak for i < ฯk since it holds
in Akโ1 for the same range. Now consider i in the range ฯk โค i < ฯk+1 . It suffices
to establish (vi.i) for all j > k and (vi.ii) for ฯk only. To obtain (vi.i), notice that
โ1
ยฑ1
hโ1
k hj hk , hk hj hk โ h h` | ` > k i if, and only if, [hj , hk ] โ h h` | ` > k i. Further, note
that the subgroup generated by
Sj = {1, hj , [hj , hk ], . . . , [hj , hk , . . . , hk ]},
where hk appears m โ ฯk times in the last commutator, is closed under commutation with
hk since if hk appears more than mโฯk times then the commutator is trivial. An inductive
`
argument shows that the subgroup hSj i coincides with hhโ`
k hj hk | 0 โค ` โค m โ ฯk i.
โ1
Similar observations can be made for conjugation by hk . Therefore, appending via
`
operation (5) rows Coord(hโ`
k hj hk ) for all 1 โค |`| โค m โ ฯk and all k < j โค n + 3 delivers
(vi.i) for all j > k. Note that (vi.i) remains true for i < ฯk .
ek /ฮฑkฯk
To obtain (vi.ii), in the case ฯk โ T , we add row Coord(hk
commutes with hk and therefore (vi.i) is preserved.
). Note that this element
16
A. Myasnikov, A. Weiร
Step 5. Using operation (3), eliminate all zero rows. The matrix Ak is now constructed.
We have to show that each step can be performed in TC0 given that all Malโcev coordinates
are encoded in unary (resp. in TC0 (ExtGCD) if Malโcev coordinates are encoded in binary).
Since the total number of steps is constant (only depending on the nilpotency class and
number of generators), this gives a TC0 (resp. TC0 (ExtGCD)) circuit for computing the
full form of a given subgroup.
Step 1. The next pivot can be found in TC0 since it is simply the next column in the matrix
with a non-zero entry, which can be found as a simple Boolean combination of test whether
the entries are zero. In the unary case, by Theorem 9, d = gcd(ฮฑkฯ , . . . , ฮฑnฯ ) can computed
in TC0 together with lk , . . . , ln encoded in unary such that d = lk ฮฑkฯ + ยท ยท ยท + ln ฮฑnฯ . Now,
by Lemma 12, Step 1 can be done in TC0 .
In the binary case, d and lk , . . . , ln can be computed using ExtGCD. Hence, by Lemma 12,
Step 1 can be done in TC0 (ExtGCD).
Step 2. The numbers bฮฑiฯ /dc (either in unary or binary) can be computed in TC0 for all
i in parallel by Theorem 2. After that one operation (2) is applied to each row of the
matrix. By Lemma 12, this can be done in parallel for all rows in TC0 . Finally, swapping
rows k and n + 1 can be done in TC0 .
Step 3. As explained in Section 4, T and ei for i โ T can be read directly from the
quotient presentation. Thus, it can be decided in TC0 whether Step 3 has to be executed.
Appending a new row is in TC0 . Computing gcd(d, eฯ ) = d = n1 dn2 eฯ is in TC0 by
Example 8 (in the unary case) and in TC0 (ExtGCD) in the binary case. After that one
operation (5) is followed by two operations (2), one operation (1), and, finally, k โ 1 times
operation (2), which all can be done in TC0 again by Lemma 12.
Step 4. The next pivot can be found in TC0 as outlined in Step 1. After that, Step 4
consists of an application of a constant number (only depending on the nilpotency class
and number of generators) of operations (5) and thus, by Lemma 12, is in TC0 .
Step 5. Clearly that is in TC0 .
Thus, we have completed the proof of our main result:
I Theorem 13. Let c, r โ N be fixed. The following problem is in TC0 : given a unary
encoded quotient presentation of G โ Nc,r and h1 , . . . , hn โ G, compute the full form of the
associated matrix of coordinates encoded in unary and hence the unique full-form sequence
(g1 , . . . , gs ) generating hh1 , . . . , hn i. Moreover, if the G and h1 , . . . , hn are given in binary,
then the full-form sequence with binary coefficients can be computed in TC0 (ExtGCD).
6.1
Subgroup membership problem
We can now apply the matrix reduction algorithm to solve the subgroup membership problem
in TC0 .
I Theorem 14. Let c, r โ N be fixed. The following problem is in TC0 (resp. TC0 (ExtGCD)
for binary inputs): given a quotient presentation of G โ Nc,r , elements h1 , . . . , hn โ G and
h โ G, decide whether or not h is an element of the subgroup H = hh1 , . . . , hn i.
Moreover, if h โ H, the circuit computes the unique expression h = g1ฮณ1 ยท ยท ยท gsฮณs where
(g1 , . . . , gs ) is the full-form sequence for H with the ฮณi encoded in unary (resp. binary).
Alternatively, for unary inputs, the output can be given as word h = hi11 ยท ยท ยท hitt where
ij โ {1, . . . , n} and j = ยฑ1.
Note that we do not know whether there is an analog of the second type of output for binary
inputs. A possible way of expressing the output would be as a word with binary exponents
TC0 circuits for algorithmic problems in nilpotent groups
over h1 , . . . , hn . However, simply applying the same procedure as for unary inputs will not
lead to a word with binary exponents.
Proof. The circuit works as follows: first, the the full form A of the coordinate matrix
corresponding to H and the standard-form sequence (g1 , . . . , gs ) are computed in TC0 (resp.
TC0 (ExtGCD)) using Theorem 13. As before, denote by ฮฑij the (i, j)-entry of A and by
ฯ1 , . . . , ฯs its pivots.
By Lemma 4, any element of H can be written as g1ฮณ1 ยท ยท ยท gsฮณs . We show how to find these
(j)
(j)
exponents. Denote h(1) = h and Coord(h(j) ) = (ฮฒ1 , . . . , ฮฒm ), with h(j) being defined below.
(j)
For j = 1, . . . , s, do the following. If ฮฒl 6= 0 for any 1 โค l < ฯj , then h โ
/ H. Otherwise,
(j)
check whether ฮฑjฯj divides ฮฒฯj . If not, then h โ
/ H. If yes, let
ฮณj = ฮฒฯ(j)
/ฮฑjฯj
j
and
โฮณj
h(j+1) = gj
h(j) .
If j < s, continue to j + 1. If j = s, then h = g1ฮณ1 ยท ยท ยท gsฮณs โ H if h(s+1) = 1 and h โ
/ H
otherwise.
Since s is bounded by a constant, there are only a constant number of steps. Each
step can be done in TC0 by Theorem 2 (division) and Theorem 6 (computation of Malโcev
coordinates).
For the second type of output in the unary case, while performing the matrix reduction,
we store for every row of the matrix also how that row can be expressed as a word over
the subgroup generators h1 , . . . , hn (here, we need the unary inputs, as otherwise the group
elements cannot be expressed as words in polynomial space). In every operation on the
matrix these words are updated correspondingly, which clearly can be done in TC0 . In the
end after writing h = g1ฮณ1 ยท ยท ยท gsฮณs , every gi can be substituted by the respective word.
J
Since abelian groups are nilpotent, we obtain:
I Corollary 15. Let r be fixed. The following problem is in TC0 : Given a list h1 , . . . , hn โ Zr
and g โ Zr (all as words over the generators), decide whether g โ hh1 , . . . , hn i. Moreover, in
the case of a positive answer, compute x1 , . . . , xn โ Z in unary such that g = x1 h1 +ยท ยท ยท+xn hn .
In other words: for fixed r, given a unary encoded system of linear equations (A, b) with
A โ Zrรn and b โ Zr , a unary encoded solution x โ Zn with Ax = b can be computed in
TC0 .
6.2
Subgroup presentations
The full-form sequence associated to a subgroup H forms a Malโcev basis for H. This allows
us to compute a consistent nilpotent presentation for H. Note, however, that the resulting
presentation is not a quotient presentation (although it can be transformed into one, see
Proposition 20) โ partly this is due to the fact that, in general, H โ
/ Nc,r . The following is
the extended version of [16, Thm. 3.11]:
I Theorem 16. Let c, r โ N be fixed. The following is in TC0 for unary inputs and in
TC0 (ExtGCD) for binary inputs:
Input: a quotient presentation for G โ Nc,r and elements h1 , . . . , hn โ G.
Output: a consistent nilpotent presentation for H = hh1 , . . . , hn i given by a list of
generators (g1 , . . . , gs ) and numbers ยตij , ฮฑijk , ฮฒijk โ Z encoded in unary (resp. binary) for
1 โค i < j < k โค s representing the relations (2)-(4).
17
18
A. Myasnikov, A. Weiร
Proof. First, the full sequence (g1 , . . . , gs ) for H is computed in TC0 (resp. TC0 (ExtGCD))
according to Theorem 13. Let Hi = hgi , gi+1 , . . . , gs i. In the proof of [16, Thm. 3.11], it is
shown that (g1 , . . . , gs ) is a Malโcev basis for H. Hence, it remains to compute the relators
(2)-(4) in order to give a consistent nilpotent presentation of H. The order e0i of gi modulo
Hi+1 is simply ei /Coordฯi (gi ) (as before T and ei for i โ T can be read from the quotient
presentation). Each relation (2) can be computed using the TC0 (resp. TC0 (ExtGCD))
e0
e0
circuit of Theorem 14 with input gi i and Hi+1 = hgi+1 , . . . , gs i. Since gi i โ Hi+1 and
(gi+1 , . . . , gs ) is the unique full sequence for Hi+1 , the membership algorithm returns the
expression on the right side of (2). Relations (3) and (4) are established using the same
method. Note that there are only a constant number of relations to establish โ so everything
can be done in TC0 (resp. TC0 (ExtGCD)).
J
7
More algorithmic problems
7.1
Homorphisms and kernels
Given nilpotent groups G and H and a subgroup K โค G and a generating set g1 , . . . , gn
of K, a homomorphism ฯ : K โ H can be specified by a list of elements h1 , . . . , hn where
ฯ(gi ) = hi for i = 1, . . . , n. For a homomorphism, we consider the problem of finding a
generating set for its kernel, and given h โ ฯ(K) finding g โ G such that ฯ(g) = h. Following
[16], both problems are solved using matrix reduction in the group H ร G.
I Theorem 17 (Kernels and preimages). Let c, r โ N be fixed. The following is in TC0 for
unary inputs and in TC0 (ExtGCD) for binary inputs: On input of
G, H โ Nc,r given as quotient presentations,
a subgroup K = hg1 , . . . , gn i โค G,
a list of elements h1 , . . . , hn defining a homomorphism ฯ : K โ H via ฯ(gi ) = hi , and
optionally, an element h โ H guaranteed to be in the image of ฯ,
compute
(i) a generating set X for the kernel of ฯ, and
(ii) an element g โ G such that ฯ(g) = h.
In case of unary inputs, X and g will be returned as words, and for binary inputs, as words
with binary exponents.
Proof. Let (a1 , . . . , am ) be the standard Malโcev basis of Fc,r and (b1 , . . . , bm0 ) the standard
Malโcev basis of Fc,2r We have two embeddings of ฯH , ฯG : Fc,r โ Fc,2r with ฯH (ai ) = bi
and ฯG (ai ) = br+i for i = i, . . . , r. We can assume that the Malโcev basis of Fc,2r is chosen in
such a way that these embeddings send all Malโcev generators of Fc,r to Malโcev generators
of Fc,2r . Note that we have ฯH (Fc,r ) โฉ ฯG (Fc,r ) = {1}.
Thus, we can read all relators of H and G in Fc,2r via the embeddings ฯH and ฯG ,
respectively. To obtain a quotient presentation of H ร G, we simply need to add the relations
that H and G commute โ that is we need to introduce additional relations bi = 1 for all
Malโcev generators which are not in the image of ฯG or ฯH . As the new quotient presentation
is basically a copy of those of H and G, it can be computed in TC0 . From now on we work
only in the direct product H ร G โ Nc,2r and identify G and H with their images under ฯG
and ฯH .
Let Q = hhi gi | 1 โค i โค ni and let W = (v1 u1 , . . . , vs us ) be the sequence in full form for
the subgroup Q, where ui โ G and vi โ H. Let 0 โค r โค s be the greatest integer such that
vr =
6 1 (with r = 0 if all vi are 1). Set X = (ur+1 , . . . , un ) and Y = (v1 , . . . , vr ). In [16, Thm.
TC0 circuits for algorithmic problems in nilpotent groups
4.1] it is shown that X is the full-form sequence for the kernel of ฯ and Y is the full-form
sequence for the image.
Now, to solve (i), it suffices to compute W using Theorem 13 and return the corresponding
X as defined above. For (ii), apply Theorem 14 to express h as h = v1ฮฒ1 ยท ยท ยท vrฮฒr โ then return
g = uฮฒ1 1 ยท ยท ยท uฮฒr r .
J
7.2
Centralizers
Before we focus on the conjugacy problem, we need one more preliminary result: the problem
of computing centralizers.
I Theorem 18 (Centralizers). Let c, r โ N be fixed. The following is in TC0 for unary inputs
and in TC0 (ExtGCD) for binary inputs:
On input of some G โ Nc,r given as quotient presentation and an element g โ G, compute
a generating set X for the centralizer of g in G (in case of binary inputs, the generating set
will be given as set of words with binary exponents).
Proof. Let Fc,r = ฮ0 โฅ ฮ1 โฅ ยท ยท ยท โฅ ฮc+1 = 1 be the lower central series of Fc,r . Clearly this
central series projects onto a central series of G and we simply write ฮi for its projection in
G. Denote with A = (a1 , . . . am ) the standard Malโcev basis of Fc,r , which is associated to
the lower central series โ in particular a1 , . . . , ar is a generating set for Fc,r .
We proceed by induction on c. If c = 1, then Fc,r and G are abelian and C(g) = G so the
output is {a1 , . . . , ar }. Assume that the theorem holds for groups in Ncโ1,r โ in particular,
for G/ฮc (we obtain a quotient presentation of G/ฮc by simply forgetting about the Malโcev
generators in ฮc ). A generating set K = {k1 ฮc , . . . , kn ฮc } for the centralizer of gฮc in G/ฮc
can be computed in TC0 (resp. TC0 (ExtGCD)) by induction. Let
J = hk1 , . . . , kn , am0 , . . . , am i ,
where {am0 , . . . , am } = A โฉ ฮc . Then J is the preimage of hKi under the homomorphism
G โ G/ฮc . Define f : J โ G by
f (u) = [g, u].
Since u โ J, u commutes with g modulo ฮc ; hence, [g, u] โ ฮc and so Im(f ) โ ฮc . Moreover,
f is a homomorphism: we have
f (g, u1 u2 ) = [g, u1 u2 ] = [g, u2 ][g, u1 ][[g, u1 ], u2 ],
and [g, u1 ] โ ฮc ; therefore, [[g, u1 ], u2 ] โ ฮc+1 = 1, and [g, u1 ] and [g, u2 ] commute, both
being elements of the abelian group ฮc .
If h commutes with g, then hฮc โ hKi, i. e., h โ J. Thus, the centralizer of g is precisely
the kernel of f : J โ ฮc . A generating set can be computed in TC0 (resp. TC0 (ExtGCD))
using Theorem 17.
J
7.3
The conjugacy problem
Now, we can combine the previous theorems to solve the conjugacy problem in TC0 following
[16, Thm. 4.6].
I Theorem 19 (Conjugacy Problem). Let c, r โ N be fixed. The following is in TC0 for
unary inputs and in TC0 (ExtGCD) for binary inputs: On input of some G โ Nc,r given as
quotient presentation and elements g, h โ G, either
19
20
A. Myasnikov, A. Weiร
produce some u โ G such that g = hu , or
determine that no such element u exists.
In case of unary inputs, u will be returned as a word, for binary inputs, as a word with binary
exponents.
Proof. Again we proceed by induction on c. If c = 1, then G is abelian and g is conjugate
to h if and only if g = h. If so, we return u = 1.
Now let us assume c > 1 and that the theorem holds for any nilpotent group of class
c โ 1 โ in particular, for G/ฮc . We use the notation as in the proof of Theorem 18.
The first step of the circuit is to check conjugacy of gฮc and hฮc in G/ฮc which can
be done in TC0 by induction. If these elements are not conjugate, then g and h are not
conjugate and the overall answer is โNoโ. Otherwise, we obtain some vฮc โ G/ฮc such that
gฮc = hv ฮc .
Let ฯ : G โ G/ฮc be the canonical homomorphism, J = ฯโ1 (C(gฮc )) (where C(gฮc )
denotes the centralizer of gฮc ), and define f : J โ ฮc by f (x) = [g, x]. As in the proof of
Theorem 18, the image of f is indeed in ฮc and f is a homomorphism. We claim that g and
h are conjugate if and only if g โ1 hv โ f (J). Indeed, if there exists w โ G such that g = hvw ,
then
1 ยท ฮc = g โ1 wโ1 hv w ยท ฮc = [g, w] ยท ฮc ,
hence w โ J, so wโ1 โ J as well. Then g โ1 hv = [g, wโ1 ] โ f (J), as required. The converse
is immediate. So it suffices to express, if possible, g โ1 hv as [g, w] with w โ J, in which case
the conjugator is u = vwโ1 .
Now, the circuit computes a generating set {w1 ฮc , . . . , wn ฮc } for C(gฮc ) using Theorem 18.
Then J is generated by {w1 , . . . , wn , am0 , . . . , am }, where again {am0 , . . . , am } = Aโฉฮc . After
that, Coord(g โ1 hv ) is computed and Theorem 14 used to determine whether g โ1 hv โ f (J).
If so, Theorem 17 is applied to find some w โ G such that g โ1 hv = f (w). Finally, u = vwโ1
is returned in case all previous tests succeed. Since we only concatenate a fixed constant
number of TC0 (resp. TC0 (ExtGCD)) computations, the whole computation is in TC0 (resp.
TC0 (ExtGCD)) again.
J
I Remark. We want to outline briefly how in the unary case the bounds of [16, Thm. 4.6]
can be used to directly solve the conjugacy problem of nilpotent groups in TC0 . Since [16,
Thm. 4.6] is for a non-uniform setting, we fix a nilpotent group G with generating set A. Let
g, h be words over Aยฑ1 as inputs for the conjugacy problem with of total length n. By [16,
Thm. 4.6], the length of conjugators is polynomial in n. By using binary exponents, the
conjugators can be written with respect to a Malโcev basis of G using only C log n bits for
some constant C which only depends on G (this is a well-known fact โ see e. g. [16, Thm.
2.3]). In particular, for all possible conjugators u which have bit-length at most C log n, it
can be checked in parallel by a uniform family of TC0 circuits whether g = hu in G by using
the circuits for the word problem [24] (note that for this purpose each u can be written down
in unary since it is of length at most nC ).
8
Computing quotient presentations
The results in the previous sections always required that the group is given as a quotient
presentation. However, we can use Theorem 13 to transform an arbitrary presentation with
at most r generators of a group in Nc,r into a quotient presentation.
TC0 circuits for algorithmic problems in nilpotent groups
I Proposition 20. Let c and r be fixed integers. The following is in TC0 : given an arbitrary
finite presentation with generators a1 , . . . , ar of a group G โ Nc,r (as a list of relators given
ยฑ1
as words over {a1 , . . . , ar } ), compute a quotient presentation of G (encoded in unary) and
an explicit isomorphism.
Moreover, if the relators are given as words with binary exponents, then the binary encoded
quotient presentation can be computed in TC0 (ExtGCD).
Proof. Let A = {a1 , . . . , ar } and let R be the set of relators, i. e., G is presented as
G = h A | R i. Let F = Fc,r = ha1 , . . . , ar i be the free nilpotent group of class c on
generators A. Let B = {b1 , . . . , bm } be the standard Malโcev basis of F such that bi = ai for
i = 1, . . . , r and let S denote the set of relations such that h B | S i is a consistent nilpotent
presentation for F .
Consider the natural surjection ฯ : F โ G and let N = ker(ฯ), which is the normal
closure of R in F . Denoting R = {r1 , . . . , rk }, N is generated by iterated commutators
[. . . [[ri , x1 ], x2 ], . . . , xj ], where i = 1, . . . , k, j โค c, and x1 , . . . , xj โ A โช Aโ1 . The total
length of these generators is linear since c and r are constant. Using Theorem 13 in the
group F , we can produce the full-form sequence T for N in TC0 (resp. in TC0 (ExtGCD)
for binary inputs).
Now G ' hB | S โช T i and by Lemma 5 this is a (consistent) quotient presentation. J
I Remark. Because of Proposition 20, in all theorems above where the input is a quotient
presentation, we can also take an arbitrary r-generated presentation of a group in Nc,r as
input. However, be aware that for the word problem (Theorem 6 and Corollary 7) the
complexity changes from TC0 to TC0 (ExtGCD) in the binary case.
9
Power problem and conjugacy in wreath products of nilpotent
groups
In [19], the conjugacy problem in iterated wreath products of abelian is shown to be in TC0
(for a definition of iterated wreath products we refer to [19]). The crucial step there is the
transfer result that the conjugacy problem in a wreath product A o B is TC0 -Turing-reducible
to the conjugacy problems of A and B and the so-called power problem of B.
The power problem of G is defined as follows: on input of g, h โ G (as words over the
generators) decide whether h is a power of g that is whether there is some k โ Z such that
g k = h in G. In the โyesโ case compute this k in binary representation. If g has finite order
in G, the computed k has to be the smallest non-negative such k.
By [19], also the power problem of A o B is TC0 -Turing-reducible to the power problems
of A and B given that torsion elements of B have uniformly bounded order. The latter
condition is also preserved by wreath products. Thus, in the light of [19], it remains to show
that the power problem of nilpotent groups is in TC0 and that the order of torsion elements
is uniformly bounded, in order to establish the following theorem (note that [19] is only for
fixed groups; therefore, we formulate also the following results in a non-uniform setting):
I Theorem 21. Let A and B be finitely generated nilpotent groups and let d โฅ 1, then the
conjugacy problem of the d-fold iterated wreath products A od B as well as A d o B is in TC0 .
Proof. The following two lemmas together with a repeated application of Theorem 3, Lemma
5, and Theorem 5 of [19].
J
I Lemma 22. Every finitely generated nilpotent group has a uniform bound on the order of
torsion elements.
21
22
A. Myasnikov, A. Weiร
Proof. We proceed by induction along a Malโcev basis (a1 , . . . , am ) of G. If a1 has infinite
order, we are done by induction. Otherwise, let k be the order of a1 and M be such that
g M = 1 for all torsion elements g โ ha2 , . . . , am i. Consider a torsion element h โ ha1 , . . . , am i.
Then hk โ ha2 , . . . , am i. Thus, hkM = 1. Therefore, kM is an upper bound on the order of
torsion elements in G.
J
I Lemma 23. For every finitely generated nilpotent group G, the power problem of G is in
uniform TC0 .
Proof. We show a slightly more general statement by induction along a Malโcev basis
(a1 , . . . , am ) of G: for every fixed arithmetic progression ฮฑ + ฮฒZ, the power problem restricted
to ฮฑ + ฮฒZ is in TC0 , i. e., given g, h โ G it can be decided in TC0 whether there is some
n โ ฮฑ + ฮฒZ with g n = h in G and, if so, that n can be computed in TC0 .
We consider the input words g and h in the quotient G/ {a2 = ยท ยท ยท = am = 1}. Let g = ak1
and h = a`1 in this quotient. If k = ` = 0, it remains to solve the power problem in the
subgroup ha2 , . . . , am i, which can be done by induction. Next, we distinguish the two cases
that a1 has infinite order and that it has finite order (in G/ {a2 = ยท ยท ยท = am = 1}).
In the case of infinite order, the only possible value for n can be computed as `/k (in
TC0 by Theorem 2). If this is not an integer or not contained in the arithmetic progression
(i. e., `/k 6โก ฮฑ mod ฮฒ), then h is not a power of g. Otherwise, one simply checks whether
g `/k = h in G (i. e., solving the word problem). As ` is bounded by the input length by
Lemma 3, this can be done in TC0 by Theorem 6.
In the case of finite order, let d denote the order of a1 . It can be checked for all 0 โค i < d
in parallel whether ki = ` mod d. In case that there is such an i, the answer to the power
problem is the same as the answer to the power problem in the subgroup ha2 , . . . , am i
restricted to the arithmetic progression i + dZ โฉ ฮฑ + ฮฒZ (the intersection can be hard-wired
since there are only finitely many possibilities for a fixed group since the modulo is bounded
by the least common multiple of the orders of finite order elements of the Malโcev basis) โ if
there is no such i, the answer is โnoโ.
J
10
Conclusion and Open Problem
We have seen that most problems which in [16] were shown to be in LOGSPACE indeed are
in TC0 even in the uniform setting where the number of generators and nilpotency class is
fixed. Moreover, their binary versions are in TC0 (ExtGCD) meaning that nilpotent groups
are no more complicated than abelian groups in many algorithmic aspects. This contrasts
with the slightly larger class of polycyclic groups: while the word problem is still in TC0
[24, 12], the conjugacy problem is not even known to be in NP. We conclude with some
possible generalizations of our results:
I Question 24. Does a uniform version of Theorem 6 hold (i. e., is the uniform word problem
still in TC0 ) for fixed nilpotency class but an arbitrary number of generators?
What happens to the complexity if also the nilpotency class is part of the input? Note
that in that case it is even not clear whether the word problem is still in polynomial time.
I Question 25. Is there a way to solve the conjugacy problem for nilpotent groups with
binary exponents in TC0 ? Notice that we needed to compute greatest common divisors for
solving the subgroup membership problem. However, there might be a way of solving the
conjugacy problem using another method.
I Question 26. What is the complexity of the uniform conjugacy problem when the nilpotency
class is not fixed?
TC0 circuits for algorithmic problems in nilpotent groups
On the way for proving that the subgroup membership problem of nilpotent groups is in
TC0 , we established that the extended gcd problem with unary inputs and outputs is in TC0 .
However, the computed solution is not as small as the one computed by the LOGSPACE
algorithm from [17]:
I Question 27. Is the following problem in TC0 : given unary encoded numbers a1 , . . . , an โ Z,
compute x1 , . . . , xn โ Z with |xi | โค 12 max {|a1 | , . . . , |an |} such that x1 a1 + ยท ยท ยท + xn an =
gcd(a1 , . . . , an )?
References
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
N. Blackburn. Conjugacy in nilpotent groups. Proceedings of the American Mathematical
Society, 16(1):143โ148, 1965.
W. W. Boone. The Word Problem. Ann. of Math., 70(2):207โ265, 1959.
M. Dehn. รber unendliche diskontinuierliche Gruppen. Math. Ann., 71(1):116โ144, 1911.
B. Eick and D. Kahrobaei. Polycyclic groups: A new platform for cryptology? ArXiv
Mathematics e-prints, 2004.
M. Elberfeld, A. Jakoby, and T. Tantau. Algorithmic meta theorems for circuit classes
of constant and logarithmic depth. Electronic Colloquium on Computational Complexity
(ECCC), 18:128, 2011.
A. Garreta, A. Miasnikov, and D. Ovchinnikov. Properties of random nilpotent groups.
ArXiv e-prints, Dec. 2016.
P. Hall. The Edmonton notes on nilpotent groups. Queen Mary College Mathematics Notes.
Mathematics Department, Queen Mary College, London, 1969.
W. Hesse. Division is in uniform TC0 . In F. Orejas, P. G. Spirakis, and J. van Leeuwen, editors, ICALP, volume 2076 of Lecture Notes in Computer Science, pages 104โ114. Springer,
2001.
W. Hesse, E. Allender, and D. A. M. Barrington. Uniform constant-depth threshold circuits
for division and iterated multiplication. J. Comput. Syst. Sci., 65:695โ716, 2002.
M. I. Kargapolov and J. I. Merzljakov. Fundamentals of the theory of groups, volume 62
of Graduate Texts in Mathematics. Springer-Verlag, New York, 1979. Translated from the
second Russian edition by Robert G. Burns.
M. I. Kargapolov, V. N. Remeslennikov, N. S. Romanovskii, V. A. Romanโkov, and V. A.
ฤurkin. Algorithmic questions for ฯ-powered groups. Algebra i Logika, 8:643โ659, 1969.
D. Kรถnig and M. Lohrey. Evaluating matrix circuits. In Computing and combinatorics,
volume 9198 of Lecture Notes in Comput. Sci., pages 235โ248. Springer, Cham, 2015.
K. Lange and P. McKenzie. On the complexity of free monoid morphisms. In K. Chwa and
O. H. Ibarra, editors, Algorithms and Computation, 9th International Symposium, ISAAC
โ98, Taejon, Korea, December 14-16, 1998, Proceedings, volume 1533 of Lecture Notes in
Computer Science, pages 247โ256. Springer, 1998.
C. R. Leedham-Green and L. H. Soicher. Symbolic collection using Deep Thought. LMS
J. Comput. Math., 1:9โ24 (electronic), 1998.
R. J. Lipton and Y. Zalcstein. Word problems solvable in logspace. J. ACM, 24(3):522โ526,
July 1977.
J. MacDonald, A. G. Myasnikov, A. Nikolaev, and S. Vassileva. Logspace and compressedword computations in nilpotent groups. CoRR, abs/1503.03888, 2015.
B. S. Majewski and G. Havas. The complexity of greatest common divisor computations.
In Algorithmic number theory (Ithaca, NY, 1994), volume 877 of Lecture Notes in Comput.
Sci., pages 184โ193. Springer, Berlin, 1994.
A. Malโcev. On homomorphisms onto finite groups. Transl., Ser. 2, Am. Math. Soc.,
119:67โ79, 1983. Translation from Uch. Zap. Ivanov. Gos. Pedagog Inst. 18, 49-60 (1958).
23
24
A. Myasnikov, A. Weiร
19
20
21
22
23
24
25
26
A. Miasnikov, S. Vassileva, and A. Weiร. The conjugacy problem in free solvable groups
and wreath product of abelian groups is in TC0 . In P. Weil, editor, Computer Science
- Theory and Applications - 12th International Computer Science Symposium in Russia,
CSR 2017, Kazan, Russia, June 8-12, 2017, Proceedings, volume 10304 of Lecture Notes in
Computer Science, pages 217โ231. Springer, 2017.
A. Mostowski. Computational algorithms for deciding some problems for nilpotent groups.
Fundamenta Mathematicae, 59(2):137โ152, 1966.
A. Myasnikov, A. Nikolaev, and A. Ushakov. The Post correspondence problem in groups.
J. Group Theory, 17(6):991โ1008, 2014.
A. Myasnikov, A. Nikolaev, and A. Ushakov. Non-commutative lattice problems. J. Group
Theory, 19(3):455โ475, 2016.
P. S. Novikov. On the algorithmic unsolvability of the word problem in group theory. Trudy
Mat. Inst. Steklov, pages 1โ143, 1955. In Russian.
D. Robinson. Parallel Algorithms for Group Word Problems. PhD thesis, University of
California, San Diego, 1993.
C. C. Sims. Computation with finitely presented groups, volume 48 of Encyclopedia of
Mathematics and its Applications. Cambridge University Press, Cambridge, 1994.
H. Vollmer. Introduction to Circuit Complexity. Springer, Berlin, 1999.
| 4math.GR
|
arXiv:1802.01730v1 [cs.MA] 5 Feb 2018
Local Wealth Redistribution Promotes Cooperation in
Multiagent Systems
Flรกvio L. Pinheiro
Fernando P. Santos
Collective Learning Group, The MIT Media Lab
Massachusetts Institute of Technology, 22 Ames Street,
Cambridge, Massachusetts
[email protected]
INESC-ID and Instituto Superior Tรฉcnico,
Universidade de Lisboa
2744-016 Porto Salvo, Portugal
[email protected]
ABSTRACT
Designing mechanisms that leverage cooperation between agents
has been a long-lasting goal in Multiagent Systems. The task is
especially challenging when agents are selfish, lack common goals
and face social dilemmas, i.e., situations in which individual interest conflicts with social welfare. Past works explored mechanisms
that explain cooperation in biological and social systems, providing important clues for the aim of designing cooperative artificial
societies. In particular, several works show that cooperation is able
to emerge when specific network structures underlie agentsโ interactions. Notwithstanding, social dilemmas in which defection
is highly tempting still pose challenges concerning the effective
sustainability of cooperation. Here we propose a new redistribution mechanism that can be applied in structured populations of
agents. Importantly, we show that, when implemented locally (i.e.,
agents share a fraction of their wealth surplus with their nearest
neighbors), redistribution excels in promoting cooperation under
regimes where, before, only defection prevailed.
CCS CONCEPTS
โข Computing methodologies โ Multi-agent systems; Cooperation and coordination;
KEYWORDS
Emergent behaviour; Social networks; Social simulation; Simulation
of complex systems; Cooperation
1
INTRODUCTION
Explaining cooperation among selfish and unrelated individuals has
been a central topic in evolutionary biology and social sciences [23].
Simultaneously, the challenge of designing cooperative Multiagent
Systems (MAS) has been a long standing goal of researchers in
artificial intelligence (AI) [10, 19]. More than thirty years ago it was
already clear that โIntelligent agents will inevitably need to interact
flexibly with other entities. The existence of conflicting goals will
Proc. of the 17th International Conference on Autonomous Agents and Multiagent Systems
(AAMAS 2018), M. Dastani, G. Sukthankar, E. Andre, S. Koenig (eds.), July 2018, Stockholm,
Sweden
ยฉ 2018 International Foundation for Autonomous Agents and Multiagent Systems
(www.ifaamas.org). All rights reserved.
This is the authorโs version of the work. It is posted here for your personal use. Not
for redistribution. The definitive Version of Record was published in Proceedings
of Proc. of the 17th International Conference on Autonomous Agents and Multiagent
Systems (AAMAS 2018), M. Dastani, G. Sukthankar, E. Andre, S. Koenig (eds.), July 2018,
https://doi.org/doi.
need to be handled by these automated agents, just as it is routinely
handled by humans.โ [10].
In Cooperative multiagent interactions, agents need to collaborate towards common goals, which introduces challenges associated
with coordination, communication and teamwork modeling [19, 28].
Self-interested interactions, in contrast, require the design of indirect incentive schemes that motivate selfish agents to cooperate
in a sustainable way [7, 19]. Cooperation is often framed as an
altruistic act that requires an agent to pay a cost (c) in order to
generate a benefit (b) to another. Refusing to incur in such a cost is
associated with an act of defection and results in no benefits generated. Whenever the benefit exceeds the cost (b > c) and plays occur
simultaneously, agents face the Prisonerโs Dilemma, a decisionmaking challenge that embodies a fundamental social dilemma
within MAS [21]: rational agents pursuing their self-interests are
expected to defect, while the optimal collective outcome requires
cooperation. If defection is the likely decision of rational agents,
however, how can we justify the ubiquity of cooperation in the real
world? Evolutionary biology has pursued this fundamental question
by searching for additional evolutionary mechanisms that might
help to explain the emergence of cooperative behavior [22, 23].
Some of these mechanisms allowed to develop solutions that found
applications in computer science, such as informing about ways of
incentivizing cooperation in p2p networks [9, 11], wireless sensor
networks [2], robotics [47] or resource allocation and distributed
work systems [43] โ to name a few.
Network reciprocity is one of the most popular mechanisms to
explain the evolution of cooperation in social and biological systems
[24, 26, 30โ32, 38]. In this context, populations are structured and
interactions among agents are constrained. These constraints are
often modelled by means of a complex network of interactions.
Applications of this mechanism have been explored in the design
of MAS that reach high levels of cooperation [1, 17, 29, 34]. Despite
these advances, cooperation on structured populations is still hard
to achieve when considering social dilemmas with high levels of
temptation to defect. Additional complementary mechanisms are
required.
Here we consider that agents contribute a percentage of their
surplus (defined below), which is later divided among a Beneficiary Set of other agents. In this context, we aim at answering the
following questions:
โข Does redistribution of wealth promote the evolution of cooperation?
โข How should Beneficiary Sets be selected?
โข What are the potential disadvantages of such a mechanism?
AAMASโ18, July 2018, Stockholm, Sweden
Using methods from Evolutionary Game Theory (EGT) [44] and
resorting to computer simulations, we explore how wealth redistribution impacts the evolution of cooperation on a population of
agents without memory (i.e. unable to recall past interactions) and
rationally bounded (i.e. lacking full information on payoff structure of the game they are engaging). We assume that agents resort
to social learning through peer imitation, which proves to be a
predominant adaptation scheme employed by humans [36]. Also,
we consider that strategies are binary โ Cooperate and Defect โ
opting to focus our attention on the complexity provided by 1)
heterogeneous populations, 2) the redistribution mechanism and 3)
the self-organizing process of agents when adapting over time. The
role of larger strategy spaces (such as in [29, 34, 41]) lies outside
the scope of the present work.
With redistribution, we show that cooperation emerges in a
parameter region where previously it was absent. Moreover, we
show that the optimal choice of redistributing groups consists in
picking the nearest neighbors (local redistribution). This result fits
with a local and polycentric view of incentive mechanisms [27, 46]
in MAS, which may not only be easier to implement but, as we
show, establish an optimal scale of interaction in terms of eliciting
cooperation.
2
RELATED WORK
The problem of Cooperation is a broad and intrinsically multidisciplinary topic, which has been part of the MAS research agenda for
a long time [10, 19]. In the realm of evolutionary biology, several
mechanisms were proposed to explain the evolution of cooperation
[22]. Kin selection [13], direct reciprocity [45], indirect reciprocity
[25, 42] and network reciprocity [26, 38] constitute some of the
most important mechanisms proposed. Remarkably, these mechanisms have been applied in AI in order to design MAS in which
cooperation emerges. For example, Waibel et al. associated kin selection with evolutionary robotics [47]; Griffiths employed indirect
reciprocity to promote cooperation in p2p networks while Ho et al.
investigated the social norms that, through a system of reputations
and indirect reciprocity, promote cooperation in crowdsourcing
markets [12, 16]. Similarly, Peleteiro et al. combined indirect reciprocity with complex networks to design a MAS where, again,
cooperation is able to emerge [29]. On top of that, Han applied
EGT โ as performed in our study โ in order to investigate the role
of punishment and commitments in multiagent cooperation, both
in pairwise [14] and group interactions [15]. Regarding alternative agent-oriented approaches to sustain cooperation in MAS, we
shall underline the role of electronic institutions [4, 8] whereby
agentsโ actions are explicitly constrained so that desirable collective
behaviors can be engineered.
The role of population structure and network reciprocity is, in
this context, a prolific area of research. In [31] it was shown that
complex networks are able to fundamentally change the dilemma
at stake, depending on the particular topology considered [18, 31];
Ranjbar-Sahraei et al. applied tools from control theory in order to
study the role of complex networks on the evolution of cooperation
[34]. Importantly, the role of dynamic networks โ i.e., agents are
able to rewire their links โ was also shown to significantly improve
the levels of cooperation, especially in networks with a high average
Flรกvio L. Pinheiro and Fernando P. Santos
degree of connectivity [32, 39]. A survey on the topic of complex
networks and the emergence of cooperation in MAS can be accessed
in [17].
Previous works found that cooperation in structured population
substantially decreases when the temptation to defect increases
(see Model for a proper definition of Temptation). Thereby, here
we contribute with an additional mechanism of cooperation on
structured populations. We consider a mechanism of redistribution, inspired in the wealth redistribution mechanisms that prevail
in modern economic/political systems, mainly through taxation.
We are particularly interested in understanding how to sample redistribution groups in an effective way. In this context, we shall
underline the works of Salazar et al. and Burguillo-Rial, in which
a system of taxes and coalitions was shown to promote cooperation on complex networks [37] and regular grids [5]. While [37]
and [5] do an excellent job showing how coalitions โ leaded by a
single agent โ emerge, here we consider a simpler/decentralized
model (e.g. no leaders are considered and taxes are redistributed
rather than centralized in a single entity) and focus our analysis on
showing that local redistribution sets are optimal. Our approach
does not require additional means of reciprocity, memory, leadership, punishment or knowledge about features of the network. We
cover a wide range of dilemma strengths and explicitly show when
the local redistribution promotes cooperation by itself. Notwithstanding, the analysis performed in [37] and [5] surely provides
important insights to address in future works, on how to explicitly
model the adherence to beneficiary sets and guarantee their stability. Also, while here we assume an egalitarian redistribution over
each individual in the Beneficiary Set, we shall note that different
redistribution heuristics may imply different levels of allocation
fairness [33]. In this context, a recent work introduces the concept
of Distributed Distributed Justice [20] and shows that local interactions may provide a reliable basis to build trust and reputation
between agents, which can be used to regulate, in a decentralized
way, the levels of justice in agentsโ actions. This way, it is rewarding to note that local interactions not only constitute an optimal
scale to form cooperative Beneficiary Sets (as we show, see below),
but also provide the convenient interaction environment to allow
justice in contributions to be sustained.
3 MODEL
3.1 Three Stage Redistribution Game
Here we propose a sequential game dynamics made of three stages.
Focusing on an arbitrary agent i, these stages can be described as
follows:
(1) Agent i participates in a one-shot game (here a Prisonerโs
Dilemma) with all his/her neighbors j. From each interaction
j, he/she obtains a payoff ฯi, j . After all interactions, agent i
ร
accumulates a total payoff ฮ i = j ฯi, j ;
(2) Next, agent i contributes a fraction ฮฑ of his/her payoff surplus (ฮ i โ ฮธ ) to be redistributed. The group that benefits
from agent i contribution is called Beneficiary Set i (Bi ).
(3) Finally, agent i receives his/her share from each Beneficiary
Set that he/she is part of.
We refer to ฮฑ as the level of taxation, as it defines the fraction of
the surplus that agents contribute, while ฮธ is the threshold level of
Local Wealth Redistribution Promotes Cooperation in Multiagent Systems
critical level of taxation, โบ*
1.0
0.8
๐=0
.99
AAMASโ18, July 2018, Stockholm, Sweden
a)
.90
๐=0
๐=0
0.6
.75
.50
๐=0 5
.2
๐=0
0
๐ = 0.0
0.4
0.2
b)
homogeneous network
c)
1.1
1.2
1.3
1.4
1.5
1.6
1.7
Temptation parameter, T
1.8
1.9
2.0
Figure 1: Solutions for the two-person game with wealth redistribution. Each curve indicates the critical taxation levels
(ฮฑ โ ) above which the nature of the social dilemma changes,
for different payoff thresholds (ฮธ ) and as a function of the
Temptation parameter (T ).
payoff that defines the surplus. By definition, agents with negative
payoff cannot contribute (i.e., ฮธ > 0); they might, however, receive
benefits from the Beneficiary Sets. Each agent i contributes only to
one Beneficiary Set Bi from which they cannot be part of, that is,
agents do not receive from the Beneficiary Set they contribute to.
A central question of this work is how to select Bi for each i. As
we show, this decision has a profound and non-trivial impact on
the overall cooperation levels in the system.
3.2
single peak
over hzi
fraction of nodes
1.0
fraction of nodes
0.0
Heterogeneous Network
d)
degree (z)
D(z) โก z
degree (z)
Figure 2: Graphical depiction of the specific structures used
in this work. a) Homogeneous Networks correspond to a
structure in which all nodes have the same degree. b) Heterogeneous Networks are characterized by a high variance
among the degree of nodes. The color of each node indicates
its degree: blue tones represent lower degree and red tones
higher degree. Panel c) and d) show, respectively, the degree
distributions of the Homogeneous and Heterogeneous networks under analysis. In particular, we use scale-free networks as representatives of heterogeneous structures; these
have a degree distribution that decays as a power law.
The Prisonerโs Dilemma Game
In general, all the possible outcomes of a two-strategy two-player
game, in which two agents engage in a one-shot interaction that
requires them to decide โ independently and simultaneously โ
whether they wish to Cooperate (C) or to Defect (D), can be summarized in a payoff matrix, such as
C
D
C
R
S
D
T
P
which reads as the payoff obtained by playing the row strategy
when facing an opponent with the column strategy. Here, R represents the Reward payoff for mutual cooperation and P the Punishment for mutual defection. When one of the individuals Defects
and the other Cooperates, the first receives the Temptation payoff
(T ) while the second obtains the Suckerโs payoff (S). In this manuscript we consider that agents interact according to the Prisonerโs
Dilemma (PD). Agents are said to face a PD whenever the relationship between the payoffs is such that T > R > P > S [44]. In such
a scenario, rational agents seeking to optimize their self-returns
are expected to always Defect. However, since the best aggregated
outcome would have both players cooperating (2R > 2P), agents are
said to face a social dilemma: optimizing self-returns clashes with
optimizing the social outcome. In this sense, mutual cooperation
is Pareto Optimal and contributes to increase both average payoff
(over mutual defection) and egalitarian social welfare (over unilateral cooperation) [6]. It is noteworthy to mention that other situations โ with different optimal rational responses โ arise when the
parameters take a different relationship [21]: the Stag Hunt game
when R > T > P > S; the Snowdrift Game when T > R > S > P;
the Harmony Game when R > T > S > P; or the Deadlock Game
when T > P > R > S, to name a few. Notwithstanding, the PD is
by far the most popular metaphor of social dilemmas [44] and the
one that presents the biggest challenge for cooperation to emerge.
For these reasons, PD shall be the main focus of study in this manuscript. We further simplify the parameter space by considering
that R = 1, P = 0, S = 1 โ T and 1 < T โค 2 with the game being
fully determined by the Temptation value (T). In that sense, higher
temptation creates more stringent conditions for the emergence of
cooperation.
3.3
Prisonerโs Dilemma with Wealth
Redistribution
As an introductory example, let us start by analyzing the particular
case of two interacting agents (i and j) in a one-shot event. In this
case, the Beneficiary Sets of each agent (Bi and B j ) are composed
only by the opponent. Wealth/payoff redistribution can thus be
analyzed by considering a slightly modified payoff matrix, that
takes into account the second and third stages. The resulting payoff
matrix becomes
C
D
C
1
1 โ T + ฮฑ(T โ ฮธ )
D
T โ ฮฑ(T โ ฮธ )
0
AAMASโ18, July 2018, Stockholm, Sweden
Flรกvio L. Pinheiro and Fernando P. Santos
(2)
Hence, depending on the choice of ฮธ and for a given T , ฮฑ โ is the
minimum level of taxation required to observe a change in the
nature of the game faced by agents. It is straightforward to notice
that the nature of the game changes from a Prisonerโs Dilemma to
an Harmony Game as the relationship moves from T > R > P > S
to R > T > S > P. Figure 1 shows ฮฑ โ for different values of T and ฮธ .
Clearly, in well-mixed populations and under the simple scenario of
a MAS composed by two agents, the redistribution mechanism has
the simple effect of reshaping the payoff matrix, trivially changing
the nature of the dilemma. Such a trivial conclusion cannot be
drawn with large populations playing on networks, where we will
show that different ways of assigning the Beneficiary Sets have a
profound impact on the ensuing levels of cooperation.
3.4
1.00
Structured Populations
Let us consider a population of Z agents in which agents correspond
to the nodes/vertices of a complex network, while links dictate who
interacts with whom. The structure reflects the existence of constraints that limit interactions between agents. These constraints
can arise from spatial or communication limitations.
The number of interactions that each agent i participates in defines his/her degree zi . The distribution of degrees, D(z), describes
the fraction of agents that has degree z. In this work we consider
two structures: Homogeneous Random Graphs [40, 41] and ScaleFree Barabรกsi Networks [3].
Homogeneous Random Graphs are generated by successively
randomizing the ends of pairs of links from an initially regular
graph (e.g. Lattice or Ring). The resulting structure has a random
interaction structure but all nodes in the network have the same
degree. Figure 2a) depicts graphically an example of such structures
and Figure 2c) the corresponding Degree distribution.
Scale-free networks are generated by an algorithm of growth
and preferential attachment [3]. This algorithm is as follows: 1)
start from three fully connected nodes; 2) add, sequentially, each
of the Z โ m remaining nodes; 3) each time a new node is added,
it connects to m pre-existing nodes, selecting preferentially nodes
level of cooperation
0.8
0.7
0.6
0.5
0.4
0.3
๐ = 1.00
0.2
0.1
0.0
1.0 1.1 1.2 1.3
1.4
1.5
1.6 1.7
0.75
0.50
0.25
0.00
1.8 1.9 2.0
Temptation Parameter, T
b)
Heterogeneous
1.0
0.9
1.00
0.8
level of cooperation
T โ1
ฮฑ >
(T โ ฮธ )
1.0
(1)
which results in the critical values of ฮฑ,
โ
Homogeneous
0.9
level of taxation, โบ
T โ ฮฑ(T โ ฮธ ) < 1
a)
level of taxation, โบ
where ฮธ is the payoff threshold and ฮฑ is the level of taxation. The
rationale to arrive at this payoff structure is the following: whenever
both players choose to act the same way the payoff remains the
same as their contributions (from taxes) and benefits (from receiving
the contributions of their opponent) cancel out. A Defector playing
against a Cooperator sees his payoff of T subtracted by an amount
ฮฑ(T โ ฮธ ) while not receiving any benefit, since the Cooperator has
negative payoff and does not contribute. Likewise, the Cooperator
is exempt from contributing but receives an additional contribution
of ฮฑ(T โ ฮธ ), which represents the amount taxed to the Defector.
To inspect whether wealth redistribution changes the nature of
the social dilemma (i.e. from a Prisonerโs Dilemma to another type
of game) we have to inspect whether there is a difference in the
relationship between the payoffs R and T or P and S. This sums up
to solving a single inequality,
0.7
0.6
0.5
0.4
0.3
๐ = 1.00
0.2
0.1
0.0
1.0 1.1 1.2 1.3
1.4
1.5
1.6 1.7
0.75
0.50
0.25
0.00
1.8 1.9 2.0
Temptation Parameter, T
Figure 3: Level of Cooperation on Homogeneous Random
Networks (a) and Heterogeneous (Scale-free) Networks (b).
Each plot shows the level of cooperation under a different
combination of taxation level, ฮฑ, and Temptation, T . In all
cases the fitness threshold is fixed at ฮธ = R = 1.0. Blue indicates regions where Cooperation dominates, Red delimits regions dominated by Defectors. Top bars above each panel indicate the level of cooperation in the absence of wealth redistribution, as a function of the Temptation payoff parameter.
The level of cooperation is computed by estimating the expected fraction of cooperators when the population reaches
a stationary state. To that end we run 104 independent simulations that start with 50% cooperators and 50% defectors.
Population size of Z = 103 and intensity of selection ฮฒ = 1.0.
with higher degree. Here we have used m = 3 The resulting network
is characterized by a heterogeneous degree distribution (one which
decays as a power law), in which the majority of the nodes have few
connections while a few have many. Figure 2b) shows a graphical
example of such structure and Figure 2d) the degree distribution.
In the following we explore the case of networks with Z = 103
ร
nodes and average degree of โจzโฉ = z zD(z) = 4. During the
Local Wealth Redistribution Promotes Cooperation in Multiagent Systems
Heterogeneous
a)
AAMASโ18, July 2018, Stockholm, Sweden
[๐ = 0.80, โบ = 0.50]
1.0
1.0
0.8
0.8
level of cooperation
Level of Cooperation
Heterogeneous
a)
[โบ=0.5]
0.6
0.4
No Wealth
Redistribution
0.2
Nearest Neighbors
(d = 1)
0.6
Random Group
0.4
0.2
0.0
0.0
1.0
1.1
1.2
1.3
1.4
1.5
1.6
1.7
1.8
1.9
1.0
2.0
1.1
1.2
1.3
Homogeneous
b)
1.4
1.5
1.6
1.7
1.8
1.9
2.0
1.9
2.0
Temptation parameter, T
Temptation Parameter, T
Homogeneous
[๐ = 1.00, โบ = 0.90]
b)
[โบ=0.8]
1.0
1.0
0.6
0.4
Nearest Neighbors
(d = 1)
0.8
๐ = 0.0
๐ = 0.4
๐ = 0.8
๐ = 1.2
๐ = 1.6
๐ = 2.0
level of cooperation
Level of Cooperation
Legend
0.8
0.6
0.4
Random Group
0.2
0.2
0.0
0.0
1.0
1.1
1.2
1.3
1.4
1.5
1.6
1.7
1.8
1.9
1.0
2.0
1.1
1.2
1.3
1.4
1.5
1.6
1.7
1.8
Temptation parameter, T
Temptation Parameter, T
Figure 4: Level of cooperation on Heterogeneous (a) and Homogeneous (b) populations for different values of the payoff
threshold (ฮธ ) as a function of the Temptation payoff parameter (T ). Gray Dashed line shows the results obtained in the
absence of a wealth redistribution scheme. Population size
of Z = 103 and intensity of selection ฮฒ = 1.0.
Figure 5: Comparison between the effects of assigning the
nearest neighbors of an agent i to the corresponding Beneficiary Set Bi (dark blue line) and when agents are assigned
at random to Bi (light blue), on the level of cooperation in
the domain of the Temptation payoff parameter, T. Panel a)
shows the results on Heterogeneous populations and panel
b) the impact on Homogeneous populations. Population size
of Z = 103 and intensity of selection ฮฒ = 1.0.
simulations we make use of 20 independently generated networks
of each type.
3.5
Games on Networks
We study the expected level of cooperation attained by the population. We estimate this quantity through computer simulations.
The level of cooperation corresponds to the expected fraction of
cooperators in a population that evolved after 2.5 ร 106 iterations.
We estimate this quantity by averaging the observed fraction of
cooperators at the final of each simulation, over 104 independent
simulations.
Each simulation starts from a population with an equal composition of Cooperators and Defectors, which are randomly placed
along the nodes of the network. In between each update round,
each agent i plays once with all his/her zi nearest neighbors (i.e.,
agents they are directly connected with). The accumulated payoff
over all interactions an agent i participates can be computed as
D
C
ฮ i = nC
i T โ ฯi (1 โ T )(ni + ni )
(3)
where niD (nC
i ) is the number of neighbors of i that Defect (Cooperate) and ฯi is equal to 1 if i is a Cooperator and 0 otherwise.
From the accumulated payoff, agents contribute to a pool a fraction
ฮฑ of the surplus ฮ โ ฮธ . The fitness fi of an agent i results from
subtracting from his/her accumulated payoff his/her contributions
plus the share he/she obtains from each of the Beneficiary Sets j
he/she participates in. We shall underline that, while T is the same
for all agents (that is, the dilemma is the same for everyone in the
population), heterogeneous populations introduce an additional
complexity layer by implying that different agents may vary in the
maximum values of accumulated payoff that they are able to earn.
This can be formalized as
fi = (1 โ ฮฑ)(ฮ i โ ฮธ ) +
Z
ร
j
ฮดi, j
ฮฑ(ฮ j โ ฮธ )
|B j |
(4)
where ฮดi, j is equal to one if i is part of the Beneficiary Set towards
which j contributes and zero otherwise, while |B j | denotes the size
of set B j .
Evolution in the frequency of strategies adopted in the population happens through a process of imitation or social learning. At
each iteration a random agent, say i, compares his fitness with the
AAMASโ18, July 2018, Stockholm, Sweden
Flรกvio L. Pinheiro and Fernando P. Santos
fitness of a neighbor, say j. Depending on the fitness difference, i
adopts the strategy of j with probability
Heterogeneous
[๐ = 0.8, โบ = 0.50]
a)
p=
1
1 + Exp(โฮฒ(f j โ fi ))
level of cooperation
1.0
(5)
The meaning of this sigmoid function can be understood as follows:
if j is performing much better than i, then i updates his/her strategy,
adopting the strategy of j. Conversely, if j is performing much worse,
i does not update the strategy. The parameter ฮฒ, often called the
intensity of selection and akin to a learning rate, dictates how sharp
is the transition between these two regimes, as f j โ fi approaches
zero. Large ฮฒ means that individuals act in a more deterministic
way, updating strategies at the minimum difference; small ฮฒ means
that individuals are prone to make imitation mistakes.
Nearest Neighbors
(d = 1)
d=2
0.6
d=4
0.4
Legend
d=1
d=2
d=3
d=4
0.2
0.0
1.0
1.1
1.2
1.3
1.4
1.5
1.6
1.7
1.8
1.9
2.0
Temptation parameter, T
Homogeneous
[๐ = 1.0, โบ = 0.90]
b)
level of cooperation
1.0
4 RESULTS
4.1 Wealth Redistribution and the Level of
Cooperation in Structured Populations
In this section we start by analyzing the scenario in which the Beneficiary Set of each agent i corresponds to his/her nearest neighbors.
Hence, the size of the Beneficiary set of i is |Bi | = zi . These are
also the agents from whom he/she interacts with and obtains a
payoff from. Figure 3 shows the achieved levels of cooperation
when the payoff threshold is set to ฮธ = R = 1.0, as a function of the
Temptation payoff (T ) and the level of taxation (ฮฑ). Figure 3a shows
the results on Homogeneous networks, and Figure 3b on Heterogeneous. We find that, for a fixed payoff threshold (ฮธ ), increasing
the level of taxation results in an increase in the levels of cooperation. This effect diminishes with an increase in the Temptation
(T ). That is, when increasing T the minimum value of ฮฑ necessary
to promote cooperation increases as well. The same behavior is
observed in both structures. However, there is a larger degree of
cooperation on Heterogeneous networks, where there is always a
level of taxation for a given Temptation that guarantees a 100% level
of cooperation. Hence, in order for cooperation to be evolutionary
viable on homogeneous networks, more stringent conditions are
necessary, e.g. higher tax levels.
Figure 4 shows how the level of cooperation depends on variations of the fitness threshold (0 โค ฮธ โค 2.0, in intervals of 0.4) while
keeping a fixed level of taxation (ฮฑ = 0.5) under different levels
of the Temptation payoff (T ). Figure 4a shows the results obtained
for Heterogeneous networks and panel b) the results on Homogeneous structures. For a constant level of taxation, ฮฑ, decreasing the
payoff threshold, ฮธ , increases the range of Temptation, T , under
which cooperation can possibly evolve. This is the case in both
types of structures. However, once again, the effect is more limited
in homogeneous populations.
Both Figure 3 and 4 highlight the positive impact of a local wealth
redistribution mechanism in the enhancement of cooperation. It
also puts in evidence that the success of such mechanism depends
on the volume of payoff that is redistributed. Ultimately, this can
be done by either increasing the level of taxation, ฮฑ or decreasing
the payoff threshold, ฮธ , that defines the taxable payoff.
0.8
0.8
Nearest Neighbors
(d = 1)
d=2
0.6
Legend
d=3
0.4
d=1
d=2
d=3
d=4
0.2
0.0
1.0
1.1
1.2
1.3
1.4
1.5
1.6
1.7
1.8
1.9
2.0
Temptation parameter, T
Figure 6: Panel a) compares how extending beneficiary sets,
from the nearest neighbors (d = 1) to nodes at a distance up
to d = 4 links away, impacts the level of cooperation on Heterogeneous networks. Panel b) shows how extended beneficiary sets impact the level of cooperation on Homogeneous
networks. In both cases extending the set of beneficiaries
has a negative a negative impact in the levels of cooperation.
Population size of Z = 103 and intensity of selection ฮฒ = 1.0.
4.2
Randomized Beneficiary Set
Next we explore to which extent the results obtained depend on the
way agents are being assigned to each Beneficiary Set. To that end,
we compare two cases: i) nearest set assignment โ the Beneficiary
Set of each agent corresponds to her/his nearest neighbors, as above;
and ii) random set assignment โ agents are assigned at random
to each Beneficiary Set. The number of agents assigned to each
set is equal to the degree of the contributing agent, in both cases,
which guarantees that the collected payoffs from each agent are
distributed among the same number of individuals in both i) and
ii).
Figure 5a and b show the results obtained, respectively, on Heterogeneous and Homogeneous networks. We consider ฮธ = 0.5,
ฮฑ = 0.9 and explore the domain 1.0 โค T โค 2. Dark blue curves
show the results obtained under the nearest set assignment and
light blue curves the results obtained under a random set assignment. The results show that the ability of a wealth redistribution
mechanism lies in the redistribution of the taxed payoff among the
agents that are spatially related. A random assignment of agents
Local Wealth Redistribution Promotes Cooperation in Multiagent Systems
a)
1.0
Homogeneous
0.9
number of generations
level of taxation, ฮฑ
0.8
0.7
0.6
0.5
0.4
0.3
0.2
=1.0
0.1
1000
316
100
32
10
0.0
1.0 1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 1.9 2.0
Temptation Parameter, T
b)
1.0
Heterogeneous
0.9
level of taxation, ฮฑ
0.7
0.6
0.5
0.4
0.3
0.2
= 1.0
0.1
number of generations
316
0.8
100
32
10
0.0
1.0 1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 1.9 2.0
Temptation Parameter, T
Figure 7: Panel a) shows the fixation times (in generations)
on homogeneous networks. Panel b) shows the fixation
times (in generations) in heterogeneous networks. A generation corresponds to Z iteration steps and the fixation times
indicate the expected time that the population takes to arrive to a state dominated by Cooperators or Defectors when
starting from a state with equal abundance of both strategies. Population size of Z = 103 and intensity of selection
ฮฒ = 1.0.
drastically decreases the levels of cooperation obtained in both
networks. But to which extent do the Beneficiary Sets need to be
constrained spatially?
4.3
Extended Beneficiary Set
To answer the previous question, we explore the case in which all
nodes (up to a distance of d links) are assigned to the Beneficiary
Set of a focal agent i; when d = 1 the previous results are thereby
obtained.
Figure 6a and b show the results up to d = 4 on Heterogeneous
and Homogeneous networks respectively. In both cases, we see
that an expansion in the size of the Beneficiary Set leads to a decrease in the levels of cooperation. This result further reinforces the
AAMASโ18, July 2018, Stockholm, Sweden
conclusion that wealth redistribution is only efficient when agents
return, in form of taxes, a share of the accumulated payoffs to the
agents they have engaged with. We shall underline that here both
distance and size of Bi play a role on the obtained results, while
in the previous section the size of Bi was kept constant for each i
across the different treatments, thus disambiguating the effect of
Bi size and distance on the resulting cooperation levels.
4.4
What is the cost of wealth redistribution?
Figure 7a and b shows the fixation times of populations when ฮธ =
1.0 along the domain bounded by 0.0 โค ฮฑ โค 1.0 and 1.0 โค T โค 2.0.
The fixation times correspond to the expected number of generations (i.e., sets of Z potential imitation steps) for the population
to reach a state in which only one strategy is present in the population. These plots map directly into Figure 3a and b, allowing to
compare the relative fixation times of regions with high/low levels
of cooperation.
We observe that the evolution of cooperation is associated with
an increase in the fixation times. This increase can be in some
situations an order of magnitude higher. The regions that exhibit
larger fixation times lie in the critical boundary that divides areas of
defectors and cooperators dominance (Figure 3). Hence, promoting
cooperation by redistributing wealth also requires a longer waiting
time for the population to reach a state of full cooperation. However,
setting higher taxation values than the bare minimum necessary for
the emergence of cooperation allows populations to reach fixation
quicker.
4.5
Multiple Contribution Brackets
In the real world, taxes are unlikely to be defined by a single threshold (ฮธ ) that separates agents who contribute from those that do not.
In reality taxes are progressive, in the sense that taxation levels
(ฮฑ) increase with increasing level of income (in this case accumulated payoff). In this section we implement a similar approach and
inspect the impact of increasing the number of taxation brackets.
Let us consider that, instead of a single threshold we now have B
taxation brackets divided by B โ 1 threshold levels. For each bracket
we define ฮฑb as the effective tax and ฮธb as the bottom threshold of
bracket b, where b โ {0, 1, 2, ..., B โ 1, B}.
By definition B = 0 corresponds to the case in which no taxes
are collected, and the redistribution of wealth is absent. Moreover,
B = 1, implies the existence of a single bracket were all individuals
would contribute, a case that we do not explore in this manuscript.
B = 2, corresponds to the case in which there are two brackets,
which is the scenario that we have explored until now.
We consider the case in which taxation increases linearly with
increasing brackets. Let us define ฮธb = bฮธ /B. Individuals in bracket
b have their payoff surplus taxed by ฮฑb = (b โ 1)ฮฑ/B when their
accumulated payoff falls into ฮธb < ฮ โค ฮธb+1 for b < B โ 1. For
b = B the tax level is ฮฑb = ฮฑ and affects all individuals with ฮ > ฮธ .
As an example, for B = 3 each bracket would be characterized
by the following tax levels
b
b
b
b
= 0)
= 1)
= 2)
= 3)
ฮฑb
ฮฑb
ฮฑb
ฮฑb
= 0 for all individuals with ฮ โค ฮธ /3;
= ฮฑ/3 for all individuals with ฮธ /3 < ฮ โค 2ฮธ /3;
= 2ฮฑ/3 for all individuals with 2ฮธ /3 < ฮ โค ฮธ ;
= ฮฑ for all individuals with ฮ > ฮธ .
AAMASโ18, July 2018, Stockholm, Sweden
Flรกvio L. Pinheiro and Fernando P. Santos
4.0
5
3.5
To sum up, we show that wealth redistribution embodies an effective
mechanism that significantly helps cooperation to evolve. It works
by fundamentally changing the nature of the dilemma at stake: by
appropriately choosing the level of taxation (ฮฑ) and payoff threshold
(ฮธ ) it is possible to shift from a Defector dominance to a Cooperator
dominance dynamics. Moreover, we find that in Heterogeneous
populations allow us to ease the redistribution mechanism โ that is,
imposing lower taxation rates and/or lower taxable surplus values
when compared with Homogeneously structured populations.
Additionally, we show, for the first time, that different assignments of Beneficiary Sets significantly impact the ensuing levels of
cooperation. Local Beneficiary Sets, where agents receive the contributions from their direct neighbors, constitute a judicious choice
when compared with Beneficiary Sets that are formed by 1) agents
randomly picked from the population or 2) by including agents at
higher distances. Naturally, a Local wealth redistribution scheme
may not only prove optimal in terms of achieved cooperation levels,
but also reveal much simpler to implement, by exempting the need
of central redistribution entities and by minimizing the number of
peers that agents need to interact with. We shall highlight, however, that promoting cooperation through a wealth redistribution
mechanism bears longer fixation times, in terms of the number of
iterations required to achieve overall cooperation.
Here we assume that the redistribution mechanism is externally
imposed. Agents are not able to opt out from the taxation scheme.
Given that this mechanism increases the overall cooperation and
average payoff in the system, an argument for its acceptance - by
rational agents - can be formulated based on the infamous veil of
ignorance proposed by John Rawls [35]: Agents should decide the
kind of society they would like to live in without knowing their
social position. Agents would, this way, prefer a cooperative society where redistribution exists, provided that here average payoff
is maximized. Notwithstanding, future research shall analyze the
role of more complex strategies that give opportunity of agents to
voluntarily engage (or not) in the proposed redistribution scheme.
Alongside, effective mechanisms that discourage the second order free riding problem (i.e., free riding by not contributing to the
redistribution pot, while expecting others to do so) shall be examined. Future works shall also evaluate whether alternative taxation
schemes are prone to be more efficient than the one proposed here.
In all these cases, an evolutionary game theoretic framework โ
such as the one here developed โ constitutes a promising toolkit to
employ.
๏ฟฝ๏ฟฝ๏ฟฝ
๏ฟฝ๏ฟฝ๏ฟฝ
๏ฟฝ๏ฟฝ๏ฟฝ
re
as
in
g
2.0
Varf / Varp
in
eq
ua
lit
y
๏ฟฝ๏ฟฝ๏ฟฝ
2.5
1.5
de
c
payoff threshold, ๐
3.0
๏ฟฝ๏ฟฝ๏ฟฝ
1.0
0.5
2.0
0.0
0.1
0.2
0.3 0.4
0.5
0.6 0.7
level of taxation, โบ
0.8
0.9
1.0
Figure 8: Relative wealth inequality after the redistribution
step, in a heterogeneous population dominated by cooperators and for different combinations of taxation level (ฮฑ) and
threshold (ฮธ ). We quantify the relative wealth inequality after the redistribution step as the ratio between the variance
of the fitness distribution (V ar f , i.e. variance in gains across
the population after redistribution) and the variance of the
accumulated payoff distribution (V arp , i.e. variance in gains
before redistribution). Population size of Z = 103 and intensity of selection ฮฒ = 1.0.
In this way we use ฮธ and ฮฑ as the upper level bound and only
parameters in this condition.
We find that variations in the number of taxation brackets (B=3,4,5)
have only a marginal impact in the overall levels of cooperation
observed when compared with the scenarios studied so far (B=2).
4.6
Wealth Inequality
Finally, we discuss the effect of wealth redistribution on fitness
inequality. First, it is important to highlight that the observed levels
of inequality depend, by default, on the distribution of strategies and
network degree. In homogeneous structures, if every agent adopts
the same strategy โ either Defectors or Cooperators โ everyone
obtains the same fitness. In heterogeneous structures, a Cooperation
dominance scenario bounds the feasible equality levels, given the
degree distribution of the population. In fact, some agents engage
in more interactions than others and Beneficiary Sets have different
sizes, depending on the particular connectivity of agents. We shall
focus on this scenario.
We compare the variance of fitness (i.e. gains after the redistribution step) and the variance of accumulated payoff (i.e. gains before
the redistribution step) in order to quantify the relative inequality
after we apply the proposed redistribution mechanism. In particular,
we use the ratio between the variance of fitness and the variance
of accumulated payoff as a metric of resulting wealth inequality.
Figure 8 shows how higher levels of ฮธ and ฮฑ reduce the resulting
inequality. In fact, while increasing payoff threshold limits taxation
to the richer agents, increasing level of taxation increases the flow
of fitness from rich agents to their Beneficiary Sets. In the most
strict case โ high ฮธ and ฮฑ โ the variance of the fitness distribution
is reduced to as low as 7% of the accumulated payoff distribution.
6
CONCLUSION
ACKNOWLEDGMENTS
The authors acknowledge the useful discussions with Francisco C.
Santos, Jorge M. Pacheco and Aamena Alshamsi. F.L.P. is thankful
to the Media Lab Consortium for financial support. F.P.S. acknowledges the financial support of Fundaรงรฃo para a Ciรชncia e Tecnologia
(FCT) through PhD scholarship SFRH/BD/94736/2013, multi-annual
funding of INESC-ID (UID/CEC/50021/2013) and grants PTDC/EEISII/5081/2014, PTDC/MAT/STA/3358/2014.
Local Wealth Redistribution Promotes Cooperation in Multiagent Systems
REFERENCES
[1] Stรฉphane Airiau, Sandip Sen, and Daniel Villatoro. 2014. Emergence of conventions through social learning. Autonomous Agents and Multi-Agent Systems 28, 5
(2014), 779โ804.
[2] Ian F Akyildiz, Weilian Su, Yogesh Sankarasubramaniam, and Erdal Cayirci. 2002.
Wireless sensor networks: a survey. Computer Networks 38, 4 (2002), 393โ422.
[3] Rรฉka Albert and Albert-Lรกszlรณ Barabรกsi. 2002. Statistical mechanics of complex
networks. Reviews of Modern Physics 74, 1 (2002), 47.
[4] Josep Ll Arcos, Marc Esteva, Pablo Noriega, Juan A Rodrรญguez-Aguilar, and
Carles Sierra. 2005. Engineering open environments with electronic institutions.
Engineering Applications of Artificial Intelligence 18, 2 (2005), 191โ204.
[5] Juan C Burguillo-Rial. 2009. A memetic framework for describing and simulating
spatial prisonerโs dilemma with coalition formation. In Proceedings of AAAIโ09.
AAAI Press, 441โ448.
[6] Ulle Endriss and Nicolas Maudet. 2003. Welfare engineering in multiagent
systems. In International Workshop on Engineering Societies in the Agents World.
Springer, 93โ106.
[7] Eithan Ephrati and Jeffrey S Rosenschein. 1996. Deriving consensus in multiagent
systems. Artificial Intelligence 87, 1-2 (1996), 21โ74.
[8] Marc Esteva, Bruno Rosell, Juan A Rodriguez-Aguilar, and Josep Ll Arcos. 2004.
AMELI: An agent-based middleware for electronic institutions. In Proceedings of
the Third International Joint Conference on Autonomous Agents and Multiagent
Systems. IEEE Computer Society, 236โ243.
[9] Michal Feldman and John Chuang. 2005. Overcoming free-riding behavior in
peer-to-peer systems. ACM SIGecom Exchanges 5, 4 (2005), 41โ50.
[10] Michael R Genesereth, Matthew L Ginsberg, and Jeffrey S Rosenschein. 1986.
Cooperation without communication. In Proceedings of AAAIโ86. AAAI Press.
[11] Philippe Golle, Kevin Leyton-Brown, Ilya Mironov, and Mark Lillibridge. 2001.
Incentives for sharing in peer-to-peer networks. In Electronic Commerce. Springer,
75โ87.
[12] Nathan Griffiths. 2008. Tags and image scoring for robust cooperation. In Proceedings of the 2008 International Conference on Autonomous Agents and Multi-agent
Systems. International Foundation for Autonomous Agents and Multiagent Systems, 575โ582.
[13] William D Hamilton. 1964. The genetical evolution of social behaviour. Journal
of Theoretical Biology 7, 1 (1964), 17โ52.
[14] TA Han. 2016. Emergence of Social Punishment and Cooperation through Prior
Commitments. In Proceedings of AAAIโ16. AAAI Press, 2494โ2500.
[15] TA Han, Luรญs Moniz Pereira, Luis A Martinez-Vaquero, and Tom Lenaerts. 2017.
Centralized vs. Personalized Commitments and their influence on Cooperation
in Group Interactions. In Proceedings of AAAIโ17. AAAI Press.
[16] Chien-Ju Ho, Yu Zhang, Jennifer Vaughan, and Mihaela Van Der Schaar. 2012.
Towards social norm design for crowdsourcing markets. In AAAIโ12 Technical
Report WS-12-08. AAAI Press.
[17] Lisa-Maria Hofmann, Nilanjan Chakraborty, and Katia Sycara. 2011. The evolution of cooperation in self-interested agent societies: a critical study. In Proceedings of the 2011 International Conference on Autonomous Agents and Multi-agent
Systems. International Foundation for Autonomous Agents and Multiagent Systems, 685โ692.
[18] Genki Ichinose, Yoshiki Satotani, and Hiroki Sayama. 2017. How mutation
alters fitness of cooperation in networked evolutionary games. arXiv preprint
arXiv:1706.03013 (2017).
[19] Nicholas R Jennings, Katia Sycara, and Michael Wooldridge. 1998. A roadmap of
agent research and development. Autonomous Agents and Multi-agent Systems 1,
1 (1998), 7โ38.
[20] David Burth Kurka and Jeremy Pitt. 2016. Distributed distributive justice. In
Self-Adaptive and Self-Organizing Systems (SASO), 2016 IEEE 10th International
Conference on. IEEE, 80โ89.
[21] Michael W Macy and Andreas Flache. 2002. Learning dynamics in social dilemmas.
Proceedings of the National Academy of Sciences 99 (2002), 7229โ7236.
[22] Martin A Nowak. 2006. Five rules for the evolution of cooperation. Science 314,
5805 (2006), 1560โ1563.
[23] Martin A Nowak. 2012. Evolving cooperation. Journal of Theoretical Biology 299
(2012), 1โ8.
[24] Martin A Nowak and Robert M May. 1992. Evolutionary games and spatial chaos.
Nature 359, 6398 (1992), 826โ829.
[25] Martin A Nowak and Karl Sigmund. 2005. Evolution of indirect reciprocity.
Nature (2005).
[26] Hisashi Ohtsuki, Christoph Hauert, Erez Lieberman, and Martin A Nowak. 2006.
A simple rule for the evolution of cooperation on graphs. Nature 441, 7092 (2006),
502.
[27] Elinor Ostrom. 2015. Governing the commons. Cambridge University Press.
[28] Liviu Panait and Sean Luke. 2005. Cooperative multi-agent learning: The state of
the art. Autonomous Agents and Multi-agent Systems 11, 3 (2005), 387โ434.
[29] Ana Peleteiro, Juan C Burguillo, and Siang Yew Chong. 2014. Exploring indirect
reciprocity in complex networks using coalitions and rewiring. In Proceedings of
the 2014 International Conference on Autonomous Agents and Multi-agent Systems.
[30]
[31]
[32]
[33]
[34]
[35]
[36]
[37]
[38]
[39]
[40]
[41]
[42]
[43]
[44]
[45]
[46]
[47]
AAMASโ18, July 2018, Stockholm, Sweden
International Foundation for Autonomous Agents and Multiagent Systems, 669โ
676.
Flรกvio L. Pinheiro and Dominik Hartmann. 2017. Intermediate Levels of Network
Heterogeneity Provide the Best Evolutionary Outcomes. Scientific Reports 7, 1
(2017), 15242.
Flavio L Pinheiro, Jorge M Pacheco, and Francisco C Santos. 2012. From local to
global dilemmas in social networks. PloS ONE 7, 2 (2012), e32114.
Flรกvio L Pinheiro, Francisco C Santos, and Jorge M Pacheco. 2016. Linking
individual and collective behavior in adaptive social networks. Physical Review
Letters 116, 12 (2016), 128702.
Jeremy Pitt, Julia Schaumeier, Didac Busquets, and Sam Macbeth. 2012. Selforganising common-pool resource allocation and canons of distributive justice.
In Self-Adaptive and Self-Organizing Systems (SASO), 2012 IEEE Sixth International
Conference on. IEEE, 119โ128.
Bijan Ranjbar-Sahraei, Haitham Bou Ammar, Daan Bloembergen, Karl Tuyls,
and Gerhard Weiss. 2014. Theory of cooperation in complex social networks. In
Proceedings of AAAIโ14. AAAI Press.
John Rawls. 2009. A theory of justice. Harvard University Press.
Luke Rendell, Robert Boyd, Daniel Cownden, Marquist Enquist, Kimmo Eriksson,
Marc W Feldman, Laurel Fogarty, Stefano Ghirlanda, Timothy Lillicrap, and
Kevin N Laland. 2010. Why copy others? Insights from the social learning
strategies tournament. Science 328, 5975 (2010), 208โ213.
Norman Salazar, Juan A Rodriguez-Aguilar, Josep Ll Arcos, Ana Peleteiro, and
Juan C Burguillo-Rial. 2011. Emerging cooperation on complex networks. In
Proceedings of the 2011 International Conference on Autonomous Agents and Multiagent Systems. International Foundation for Autonomous Agents and Multiagent
Systems, 669โ676.
Francisco C Santos and Jorge M Pacheco. 2005. Scale-free networks provide a
unifying framework for the emergence of cooperation. Physical Review Letters
95, 9 (2005), 098104.
Francisco C Santos, Jorge M Pacheco, and Tom Lenaerts. 2006. Cooperation
prevails when individuals adjust their social ties. PLoS Computational Biology 2,
10 (2006), e140.
Francisco C Santos, JF Rodrigues, and Jorge M Pacheco. 2005. Epidemic spreading
and cooperation dynamics on homogeneous small-world networks. Physical
Review E 72, 5 (2005), 056128.
Fernando P Santos, Jorge M Pacheco, Ana Paiva, and Francisco C Santos. 2017.
Structural power and the evolution of collective fairness in social networks. PloS
ONE 12, 4 (2017), e0175687.
Fernando P. Santos, Jorge M. Pacheco, and Francisco C. Santos. 2018. Social
norms of cooperation with costly reputation building. In AAAIโ18. AAAI Press.
Sven Seuken, Jie Tang, and David C Parkes. 2010. Accounting Mechanisms for
Distributed Work Systems. In AAAIโ10. AAAI Press.
Karl Sigmund. 2010. The calculus of selfishness. Princeton University Press.
Robert L Trivers. 1971. The evolution of reciprocal altruism. The Quarterly Review
of Biology 46, 1 (1971), 35โ57.
Vรญtor V Vasconcelos, Francisco C Santos, and Jorge M Pacheco. 2015. Cooperation
dynamics of polycentric climate governance. Mathematical Models and Methods
in Applied Sciences 25, 13 (2015), 2503โ2517.
Markus Waibel, Dario Floreano, and Laurent Keller. 2011. A quantitative test of
Hamiltonโs rule for the evolution of altruism. PLoS Biology 9, 5 (2011), e1000615.
| 2cs.AI
|
I/O-Efficient Generation of Massive Graphs
Following the LFR Benchmarkโ
Michael Hamannโ , Ulrich Meyerโก , Manuel Penschuckโก , Hung Tranโก , and
Dorothea Wagnerโ
โ
Institute of Theoretical Informatics, Karlsruhe Institute of Technology,
Am Fasanengarten 5, 76131 Karlsruhe, Germany
arXiv:1604.08738v3 [cs.DS] 14 Jun 2017
{michael.hamann, dorothea.wagner}@kit.edu
โก
Institute for Computer Science, Goethe-University Frankfurt,
Robert-Mayer-Straรe 11-15, 60325 Frankfurt am Main, Germany
{umeyer, htran, mpenschuck}@ae.cs.uni-frankfurt.de
June 15, 2017
Abstract
LFR is a popular benchmark graph generator used to evaluate community detection
algorithms. We present EM-LFR, the first external memory algorithm able to generate
massive complex networks following the LFR benchmark. Its most expensive component
is the generation of random graphs with prescribed degree sequences which can be divided
into two steps: the graphs are first materialized deterministically using the Havel-Hakimi
algorithm, and then randomized. Our main contributions are EM-HH and EM-ES, two I/Oefficient external memory algorithms for these two steps. We also propose EM-CM/ES, an
alternative sampling scheme using the Configuration Model and rewiring steps to obtain a
random simple graph. In an experimental evaluation we demonstrate their performance; our
implementation is able to handle graphs with more than 37 billion edges on a single machine,
is competitive with a massive parallel distributed algorithm, and is faster than a state-of-theart internal memory implementation even on instances fitting in main memory. EM-LFRโs
implementation is capable of generating large graph instances orders of magnitude faster than
the original implementation. We give evidence that both implementations yield graphs with
matching properties by applying clustering algorithms to generated instances. Similarly, we
analyse the evolution of graph properties as EM-ES is executed on networks obtained with
EM-CM/ES and find that the alternative approach can accelerate the sampling process.
โ
This work was partially supported by the DFG under grants ME 2088/3-2, WA 654/22-2. Parts of this paper
were published as [21].
1
1
Introduction
Complex networks, such as web graphs or social networks, are usually composed of communities, also called clusters, that are internally dense but externally sparsely connected. Finding
these clusters, which can be disjoint or overlapping, is a common task in network analysis. A
large number of algorithms trying to find meaningful clusters have been proposed (see [16, 22, 17]
for an overview). Commonly synthetic benchmarks are used to evaluate and compare these
clustering algorithms, since for most real-world networks it is unknown which communities they
contain and which of them are actually detectable through structure [4, 17]. In the last years,
the LFR benchmark [28, 27] has become a standard benchmark for such experimental studies,
both for disjoint and for overlapping communities [14].
With the emergence of massive networks that cannot be handled in the main memory of
a single computer, new clustering schemes have been proposed for advanced models of computation [9, 49]. Since such algorithms typically use hierarchical input representations, quality
results of small benchmarks may not be generalizable to larger instances. To produce such large
instances exceeding main memory, we propose a generator in the external memory (EM) model
of computation that follows the LFR benchmark.
The distributed CKB benchmark [11] is a step in a similar direction, however, it considers
only overlapping clusters and uses a different model of communities. In contrast, our approach is
a direct realization of the established LFR benchmark and supports both disjoint and overlapping
clusters.
1.1
Random Graphs from a prescribed Degree Sequence
In preliminary experiments, we identified the generation of random graphs with prescribed
degree sequence as the main issue when transferring the LFR benchmark into an EM setting
โ both in terms of algorithmic complexity and runtime. To do so, the LFR benchmark uses
the fixed degree sequence model (FDSM), also known as edge-switching Markov-chain algorithm
(e.g. [35]). It consists of a) generating a deterministic graph from a prescribed degree sequence
and b) randomizing this graph using random edge switches. For each edge switch, two edges
are chosen uniformly at random and two of the endpoints are swapped if the resulting graph
is still simple (for details, see section 5). Each edge switch can be seen as a transition in a
Markov chain. This Markov chain is irreducible [13], symmetric and aperiodic [18] and therefore
converges to the uniform distribution. It also has been shown to converge in polynomial time
if the maximum degree is not too large compared to the number of edges [19]. However, the
analytical bound of the mixing time is impractically high even for comparably small graphs as
it contains the sum of all degrees to the power of nine.
Experimental results on the occurrence of certain motifs in networks [35] suggest that 100m
steps should be more than enough where m is the number of edges. Further results for random
connected graphs [18] suggest that the average and maximum path length and link load converge
between 2m and 8m swaps. More recently, further theoretical arguments and experiments
showed that 10m to 30m steps are enough [39].
A faster way to realize a given degree sequence is the Configuration Model. The problem
here is that multi-edges and loops may be generated. In the Erased Configuration Model these
illegal edges are deleted. However, doing so alters the graph properties since skewed degree
distributions, necessary for the LFR benchmark, are not properly realized [43]. In this context
the question arises whether edge switches starting from the Configuration Model can be used to
uniformly sample simple graphs at random.
2
1.2
Our Contribution
Our main contributions are the first external memory versions of the LFR benchmark and the
FDSM. After defining our notation, we introduce the LFR benchmark in more detail and then
focus on the FDSM. We describe the realization of the two steps of the classic FDSM, namely
a) generating a deterministic graph from a prescribed degree sequence [EM-HH, section 4] and
b) randomizing this graph using random edge switches [EM-ES, section 5]. These steps form a
pipeline moving data from one algorithm to the next. In section 6, we describe the alternative
approach EM-CM/ES generating uniform random simple graphs using the Configuration Model
and edge rewiring.
Sections 7, 8 and 9 describe algorithms for the remaining steps of the external memory
LFR benchmark, EM-LFR. We conclude with an experimental evaluation of our algorithms
and demonstrate that our EM version of the FDSM is faster than an existing internal memory
implementation, scales well to large instances, and can compete with a distributed parallel
algorithm. Further, we compare EM-LFR to the original LFR implementation and show that
EM-LFR is significantly faster while producing equivalent networks in terms of community
detection algorithm performance and graph properties. We also investigate the mixing time
of EM-ES and EM-CM/ES, give evidence that our alternative sampling scheme quickly yields
uniform samples and that the number of swaps suggested by the original LFR implementation
can be kept for EM-LFR.
2
Preliminaries and Notation
Define [k] := {1, . . . , k} for k โ N>0 . A graph G = (V, E) has n = |V | sequentially numbered
nodes V = {v1 , . . . , vn } and m = |E| edges. Unless stated differently, graphs are assumed to be
undirected and unweighted. It is called simple if it contains neither multi-edges nor self-loops.
To obtain a unique representation of an undirected edge {u, v} โ E, we write [u, v] โ E where
u โค v; in contrast to a directed edge, the ordering shall be used algorithmically but does not
carry any meaning for the application. D = (d1 , . . . , dn ) is a degree sequence of graph G iff
โvi {โ}V : deg(vi ) = di .
We denote an integer powerlaw distribution with exponent โฮณ โ R for ฮณ โฅ 1 and values
between the limits a, b โ N>0 with a < b as Pld ([a, b), ฮณ). Let X be an integer random variable
drawn from Pld ([a, b), ฮณ) then P[X=k] โ k โฮณ (proportional to) if a โค k < b and P[X=k] = 0
otherwise. A statement depending on some number x > 0 is said to hold with high probability if
it is satisfied with probability at least 1 โ 1/xc for some constant c โฅ 1.
Also refer to Table 2 (Appendix) which contains a summary of commonly used definitions.
2.1
External-Memory Model
We use the commonly accepted external memory model by Aggarwal and Vitter [1]. It
features a two-level memory hierarchy with fast internal memory (IM) which may hold up to
M data items, and a slow disk of unbounded size. The input and output of an algorithm are
stored in EM while computation is only possible on values in IM. The measure of an algorithmโs
performance is the number of I/Os required. Each I/O transfers a block of B consecutive items
between memory levels. Reading or writing n contiguous items from or to disk requires scan(n) =
ฮ(n/B) I/Os. Sorting n consecutive items triggers sort(n) = ฮ((n/B) ยท logM/B (n/B)) I/Os.
For all realistic values of n, B and M , scan(n) < sort(n) n. Sorting complexity constitutes a
lower bound for most intuitively non-trivial EM tasks [1, 34].
3
Degrees, community sizes and memberships Sample intra- and inter-community edges
Intra-community edge
Inter-community edge
Remove (rewire) illegal edges
Community
Figure 1: Left: Sample node degrees and community sizes from two powerlaw distributions. The mixing
parameter ยต determines the fraction of the inter-community edges. Then, assign each node to sufficiently
large communities. Center: Sample intra-community graphs and inter-community edges. Right: Lastly,
remove illegal inter-community edges respective to the global graph.
2.2
Time Forward Processing
Let A be an algorithm performing discrete events over time (e.g., iterations of a loop) that
produce values which are reused by following events. The data dependencies of A can be modeled
using a directed acyclic graph G=(V, E) where every node v โ V corresponds to an event [31].
The edge (u, v) โ E indicates that the value produced by u will be required by v. When
computing a solution, the algorithm traverses G in some topological order. For simplicity, we
assume G to be already ordered, i.e. โ (u, v) โ E : u < v. Then, the Time Forward Processing
(TFP) technique uses a minimum priority queue (PQ) to provide the means to transport data
as implied by G: iterate over the events in increasing order and receive for each u the messages
sent to it by claiming and removing all items with priority u from the PQ. Inductively, these
messages have minimal priority amongst all items stored in the PQ. The event then computes
its result xu and sends it to every successor v by inserting xu into the PQ with priority v. Using
a suited EM PQ [3, 42], TFP incurs O(sort(k)) I/Os, where k is the number of messages sent.
3
The LFR Benchmark
The LFR benchmark [28] describes a generator for random graphs featuring a planted community structure, a powerlaw degree distribution, and a powerlaw community size distribution.
A revised version [27] also introduces weighted and directed graphs with overlapping communities. We consider the most commonly used versions with unweighted, undirected graphs and
possibly overlapping communities. All its parameters are listed in Table 1 and are fully supported by EM-LFR.
The revised generator [27] changes the original algorithm [28] even for the initial scenario
of unweighted, undirected graphs and non-overlapping communities. Here, we describe the
more recent approach which is also used in the authorโs implementation: initially, the degrees
D=(d1 , . . . , dn ), the number
(ฮฝ1 , . . . , ฮฝn ) of each node, and community sizes
PC of memberships
Pn
S = (s1 , . . . , sC ) with
ฮพ=1 sฮพ =
i=1 ฮฝi are randomly sampled according to the supplied
parameters. Observe that the number of communities C follows endogenously. For our analysis,
we assume that nodes are members in ฮฝ=O(1) communities which implies C=O(n).1
Depending on the mixing parameter 0 < ยต < 1, every node vi โ V features dext
= ยตdi interi
community edges and din
=
(1โยต)ยทd
edges
within
its
communities.
The
algorithm
assigns
every
i
i
node vi to either ฮฝi =1 or ฮฝi = ฮฝ communities at random such that the requested community
sizes and number of communities per node are realized. Further, the desired internal degree din
i
has to be strictly smaller than the size sฮพ of its community ฮพ.
In the case of overlapping communities, the internal degree is evenly split among all communities the node is part of. Both the computation of din
i and the splitting into several communities
use non-deterministic rounding to avoid biases.
1
If the maximal community size grows with ฮ(n ) for > 0, the number of communities is governed by C=o(n).
4
Parameter
n
Pld ([dmin , dmax ), ฮณ)
0โคOโคn, ฮฝโฅ1
Pld ([smin , smax ), ฮฒ)
0<ยต<1
Definition
Number of nodes to be produced
Degree distribution of nodes, typically ฮณ = 2
O random nodes belong to ฮฝ communities; remainder has one membership
Size distribution of communities, typically ฮฒ=1
Mixing parameter: fraction of neighbors of every node u that shall not share
a community with u
Table 1: Parameters of overlapping LFR. The typical values follow suggestions by [27].
As illustrated in Fig. 1, the LFR benchmark then generates the inter-community graph using
ext
FDSM on the degree sequence (dext
1 , . . . , dn ). In order not to violate the mixing parameter ยต,
rewiring steps are applied to the global inter-community graph to replace edges between two
nodes sharing a community. Analogously, an intra-community network is sampled for each
community. In the overlapping case, rewiring steps are used to remove edges that exist in
multiple communities and would result in duplicate edges in the final graph.
While for realistic parameters most intra-community graphs fit into main memory, we cannot
assume the same for the global graph. For the global graph and large communities, an EM
variant of the FDSM is applicable, which we implement using EM-HH and EM-ES described in
sections 4 and 5.
4
EM-HH : Deterministic Edges from a Degree Sequence
In this section, we introduce an EM-variant of the well-known Havel-Hakimi scheme that
takes a positive non-decreasing degree sequence2 D=(d1 , . . . , dn ) and, if possible, outputs a graph
GD which realizes these degrees. A sequence D is called graphical if a matching simple graph GD
exists. Havel [23] and Hakimi [20] gave inductive characterizations of graphical sequences which
directly lead to a graph generator: given D, connect the first node v1 with degree d1 (minimal
among all nodes) to d1 -many high-degree vertices by emitting edges to nodes vn โ (d1 โ1) , . . . , vn .
Then remove d1 from D and decrement the remaining degree of every new neighbor which yields
an updated sequence D0 .3 Subsequently, remove zero-entries and sort D0 while keeping track of
the original positions to be able to output the correct node indices. Finally, recurse until no
positive entries remain. After every iteration, the size of D is reduced by at least one resulting
in O(n) rounds.
For an implementation, it is non-trivial to keep the sequence ordered after decrementing the
neighborsโ degrees. Internal memory solutions typically employ priority queues optimized for
integer keys, e.g., bucket-lists [44, 47]. This approach incurs ฮ(sort(n + m)) I/Os using a naฤฑฬve
EM PQ since every edge triggers an update to the pending degree of at least one endpoint.
We propose the Havel-Hakimi variant EM-HH which emits a stream of edges in lexicographical order. It can be fed to any single-pass streaming algorithm without a round-trip to disk.
Additionally, EM-HH may be used in time O(n) to test whether a degree sequence D is graphical
or to drop problematic edges yielding a graphical sequence (cf. section 6). Thus, we consider
only internal I/Os and emphasize that storing the output โ if necessary by the application โ
requires O(m) time and O(scan(m)) I/Os where m is the number of edges produced.
2
Within our pipeline, we generate a monotonic degree sequence by first sampling a monotonic uniform sequence
online based on the ideas of [6, 48]. Applying the inverse sampling technique (carrying over the monotonicity)
yields the required distribution. Thus, no additional sorting steps are necessary for the inter-community graph.
3
This variant is due to [20]; in [23], the node of maximal degree is picked and connected.
5
4.1
Data structure
Instead of maintaining the degree of every node in D individually, EM-HH compacts nodes
with equal degrees into a group, yielding DD := {di : 1โคiโคn} groups. Since D is monotonic,
such nodes have consecutive ids and the compaction can be performed in a streaming fashion4 .
The sequence is then stored as a doubly linked list L = [gj ]1โคjโคDD where group gj =
(bj , nj , ฮดj ) assigns degree ฮดj to nodes vbj , . . . , vbj +(nj โ1) . The algorithm is built around the
following invariants holding at the begin of every iteration:
(I1) ฮดj < ฮดj+1 โ1 โค j < DD , i.e. the groups represent strictly monotonic degrees
(I2) bj + nj = bj+1 โ1 โค j < DD , i.e. there are no gaps in the node ids
These invariants allow us to bound the memory
P Dfootprint in two steps: first observe that a
list L of size DD describes a graph with at least D
i=1 i/2 edges due to (I1). Thus, graphs from
an arbitrary L filling the whole IM have โฆ(M 2 ) edges. Even under pessimistic assumptions this
amounts to an edge list of more than 1 PB of size on realistic machines.5 Therefore, even in
the worst case the whole data structure can be kept in IM for all practical scenarios. On top
of this, a probabilistic argument applies: While there exist graphs with DD =ฮ(n) (cf. Fig. 2),
Lemma 1 gives a sub-linear bound on DD if D is sampled from a powerlaw distribution (refer
also to section 10.1 for experimental results).
Lemma 1. Let D be a degree sequence with n nodes sampled from Pld ([1, n), ฮณ). Then, the
number of unique degrees DD = {di : 1 โค i โค n} is bounded by O(n1/ฮณ ) with high probability.
Proof. Consider random variables (X1 , . . . , Xn ) sampled i.i.d. from Pld ([1, n), ฮณ) as an unordered degree sequence. Fix an index 1โคjโคn. Due to the powerlaw distribution, Xj is likely
to have a small degree. Even if all degrees 1, . . . , n1/ฮณ were realized, their occurrences would be
covered by the claim. Thus, it suffices to bound the number of realized degrees larger than n1/ฮณ .
We first show that their total probability mass is small. Then we can argue that DD is
asymptotically unaffected by their rare occurrences:
Pnโ1
Pnโ1
R nโ1 โฮณ
nโ1
X
iโฮณ (i)
iโฮณ (ii)
dx
i=n1/ฮณ +1
i=n1/ฮณ +1
1/ฮณ
n1/ฮณRx
Pโ โฮณ โค
P[Xj >n ] =
P[Xj =i] = Pnโ1
=
โ
โฮณ
โฮณ
ฮถ(ฮณ) โ i=n i
ฮถ(ฮณ) โ n x dx
i=1 i
i=n1/ฮณ +1
1
1โฮณ โ n1/ฮณ /n
n1/ฮณ /n โ (n โ 1)1โฮณ
1โฮณ (nโ1)
=
=
= O(n1/ฮณ /n),
1
(ฮณ โ 1)ฮถ(ฮณ) โ n1โฮณ
ฮถ(ฮณ) + 1โฮณ
n1โฮณ
P
โฮณ is the Riemann zeta function which satisfies ฮถ(ฮณ) โฅ 1 for all ฮณโR, ฮณโฅ1.
where (i) ฮถ(ฮณ) = โ
i=1 i
R b+1
In (ii) we exploit the sumโs monotonicity to bound it between the two integrals a xโฮณ dx โค
R
Pb
โฮณ โค b xโฮณ dx.
i=a i
aโ1
In order to bound the number of occurrences, define Boolean indicator variables Yi with
Yi =1 iff Xi >n1/ฮณ . Observe that they modelPBernoulli trials
Yi โB(p) with p=O(n1/ฮณ /n). Thus,
P
the expected number of high degrees is E[ ni=1 Yi ] = ni=1 P[Xi >n1/ฮณ ] = O(n1/ฮณ ). Chernoffโs
inequality gives an exponentially decreasing bound on the tail distribution of the sum which
thus holds with high probability.
Due to Lemma 1, a graph sampled from a powerlaw distribution with m = O(M 2ฮณ ) can be
computed in IM with high probability.
4
While direct sampling of the groupโs multinomial distribution is not beneficial in LFR, it may be used to
omit the compaction phase for other applications.
5
A single item of L can be represented by its three values and two pointers, i.e. a total of 5ยท8=40 bytes per
item (assuming 64 bit integers and pointers). Just 2 GB of IM suffice for storing 5 ร 107 items, which result in
at least 6.25 ร 1014 edges, i.e. storing just two bytes per edge would require more than one Petabyte. Further,
standard tricks (e.g., exploiting the redundancy due to (I2)) can be used to reduce the memory footprint of L.
6
v1
v3
v5
1
2
3
v2kโ1
ยทยทยท
k
ยทยทยท
k
kโ1
kโ2
v2k
v2(kโ1)
v2(kโ2)
ยทยทยท
1
v2
Figure 2: Materialization of the degree sequence Dk = (1, 1, 2, 2, . . . , k, k) with DDk = k = ฮ(n) which
maximizes EM-HHโs memory consumption asymptotically. A nodeโs label corresponds to the vertexโ
degree.
4.2
Algorithm
EM-HH works in n rounds, where every iteration corresponds to a recursion step of the
original formulation. Each time it extracts vertex vb1 with the smallest available id and with
minimal degree ฮด1 . The extraction is achieved by incrementing the lowest node id (b01 โ b1 +1)
of group g1 and decreasing its size (n01 โ n1 โ1). If the group becomes empty (n01 = 0), it is
removed from L at the end of the iteration. We now connect node vb1 to ฮด1 nodes from the end
of L. Let gj be the group of smallest index to which vb1 connects to.
Then there are two cases:
(C1) If node vb1 connects to all nodes in gj , we directly emit the edges [u, x] | nโฮด1 < x โค n
and decrement the degrees of all groups gj , . . . , g|L| accordingly. Since degree ฮดjโ1 remains
unchanged, it may now match the decremented ฮดj . This violation of (I1) is resolved by
merging both groups. Due to (I2), the union of gjโ1 and gj contains consecutive ids and
it suffices to grow njโ1 โ njโ1 +nj and to delete group gj .
(C2) If vb1 connects only to a number a < nj of nodes in group gj , we split gj into two groups
gj0 and gj00 of sizes a and nj โa respectively. We then connect vertex u to all a nodes in the
first fragment gj0 and hence need to decrease its degree. Thus, a merge analogous to (C1)
may be required (see Fig. 3). Now, groups gj+1 , . . . , g|L| are consumed wholly as in (C1).
P|L|
If the requested degree ฮด1 cannot be met (i.e., ฮด1 > k=1 nk ), the input is not graphical [20].
Since the vast majority of nodes have low degrees, a sufficiently large random powerlaw degree
sequence D contains at most very few nodes that cannot be materialized as requested. Therefore,
we do not explicitly ensure that the sampled degree sequence is graphical and rather correct the
negligible inconsistencies later on by ignoring the unsatisfiable requests.
4.3
Improving the I/O-complexity
In the current formulation of EM-HH we perform constant work per edge which is already
optimal. However, we introduce a simple optimization which improves constant factors and
gives I/O-efficient accesses. It also allows EM-HH to test whether D is graphical in time O(n).
Observe that only groups in the vicinity of gj can be split or merge; we call these the active frontier. In contrast, the so-called stable groups gj+1 , . . . , gDD keep their relative degree differences
as the pending degrees of all their nodes are decremented by one in each iteration. Further, they
will become neighbors to all subsequently extracted nodes until group gj+1 eventually becomes
an active merge candidate. Thus, we do not have to update the stable degrees in every round,
but rather maintain a single global iteration counter I and count how many iterations a group
remained stable: when a group gk becomes stable in iteration I0 , we annotate it with I0 by
adding ฮดk โ ฮดk +I0 . If gk has to be activated again in iteration I > I0 , its updated degree
follows as ฮดk โ ฮดk โI. The degree ฮดk remains positive since (I1) enforces a timely activation.
7
List [(bi , ni , ฮดi )]i
(1, 2, 1), (3, 2, 2), (5, 2, 3)
(2, 1, 1), (3, 3, 2), (6, 1, 3)
(3, 4, 2)
(4, 2, 1), (6, 1, 2)
(5, 2, 1)
Uncompressed Degree Sequence D
merge
split
1
1
2
2 โ 3 2
3
extract
edge-to
merge
1
2
2
2 โ 3 2
extract
edge-to
split
2
2 1
2 1
2
extract edge-to edge-to
merge
1
1 โ 2 1
extract
edge-to
1
1 0
extract edge-to
Initial situation
group gj
group gi
dโ1
Splitting at gi (front)
group gj
group gi
dโ1
dโ1
d
Splitting at gj (back)
group gi
dโ1
dโ1
d
Before gi can be split, the degrees of
groups gj with j > i are decreased
group gj
dโ2
dโ1
dโ1
Figure 3: Left: EM-HH on D=(1, 1, 2, 2, 3, 3). Values of L and D in row i correspond to the state at
the beginning of the i-th iteration. Groups are visualized directly after extraction of the head vertex. The
number next to an edge-to symbol indicates the new degree. After these updates, splitting and merging
takes place. Right: Consider two adjacent groups gi , gj with degrees dโ1 and d. A split of gi (left) or
gj (right) directly triggers a merge, so the number of groups remains the same.
Lemma 2. The optimized variant of EM-HH requires O(scan(DD )) I/Os if L is stored in an
external memory list.
Proof. An external-memory list requires O(scan(k)) I/Os to execute any sequence of k sequential
read, insertion, and deletion requests to adjacent positions (i.e. if no seeking is necessary) [38].
We will argue that EM-HH scans L roughly twice, starting simultaneously from the front and
back.
Every iteration starts by extracting a node of minimal degree. Doing so corresponds to
accessing and eventually deleting the listโs first element gi . If the listโs head block is cached, we
only incur an I/O after deleting ฮ(B) head groups, yielding O(scan(DD )) I/Os during the whole
execution. The same is true for accesses to the back of the list: the minimal degree increases
monotonically during the algorithmโs execution until the extracted node has to be connected to
all remaining vertices. In a graphical sequence, this implies that only one group remains and we
can ignore the simple base case asymptotically. Neglecting splitting and merging, the distance
between the listโs head and the active frontier decreases monotonically triggering O(scan(DD ))
I/Os.
Merging. As described before, it may be necessary to reactivate stable groups, i.e. to reload
the group behind the active frontier (towards Lโs end). Thus, we not only keep the block F
containing the frontier cached, but also block G behind it. It does not incur additional I/O,
since we are scanning backwards through L and already read G before F . The reactivation of
stable groups hence only incurs an I/O when the whole block G is consumed and deleted. Since
this does not happen before โฆ(B) merges take place, reactivations may trigger O(scan(DD ))
I/Os in total.
Splitting. Observe that L at most doubles in size as splitting a group with degree d, which
has a neighbor of degree dยฑ1, directly triggers another merge (cf. Fig. 3). Since a split replaces
one group by two adjacent fragments which differ in their degree by exactly one, a second split
to one of the fragments does not increase the size of the list.
5
EM-ES: I/O-efficient Edge Switching
EM-ES is a central building block of our pipeline and is used to randomize and rewire existing
graphs. It applies a sequence S=[ฯs ]1โคsโคk of edge swaps ฯs to a simple graph G=(V, E), where
typically k = c|E| for a constant c โ [1, 100]. The graph is represented by a lexicographically
ordered edge list EL =[ei ]1โคiโคm which only stores the pair (u, v) and omits (v, u) for every ordered
edge [u, v] โ E. As illustrated in Fig. 4, a swap ฯ(ha, bi, d) is encoded by a direction bit d and
the edge ids a and b (i.e. the position in EL ) of the edges supposed to be swapped. The switched
edges are denoted as eฯa and eฯb and are given by (eฯa , eฯb ) := ฯ(ha, bi, d) as defined in Fig. 4.
8
1
a
a
d
c
input
a
b
1
2
c
b
2
d
ฯ(h1, 2i, false)
or
b
2
c
1
d
ฯ(h1, 2i, true)
(
({ฮฑ1 , ฮฒ1 }, {ฮฑ2 , ฮฒ2 }) if d = false
ฯ(ha, bi, d) =
,
({ฮฑ1 , ฮฒ2 }, {ฮฑ2 , ฮฒ1 }) if d = true
where [ฮฑ1 , ฮฑ2 ] = ea and [ฮฒ1 , ฮฒ2 ] = eb are the edges
at positions a and b in the edge list EL .
illegal (creates multi-edge)
Figure 4: A swap consists of two edge ids and a direction flag. The edge ids describe an induced subgraph
(left); the flag indicates how the incident nodes are shuffled.
We assume that the swapโs constituents are drawn independently and uniformly at random.
Thus, the sequence can contain illegal swaps that would introduce multi-edges or self-loops if
executed. Such illegal swaps are simply skipped. In order to do so, the following tasks have to
be addressed for each ฯ(ha, bi, d):
(T1)
(T2)
(T3)
(T4)
Gather the nodes incident to edges ea and eb .
Compute eฯa and eฯb and skip if a self-loop arises.
Verify that the graph remains simple, i.e. skip if edge eฯa or eฯb already exist in EL .
Update the graph representation EL .
If the whole graph fits in IM, a hash set per node storing all neighbors can be used for
adjacency queries and updates in expected constant time (e.g., VL-ES [47]). Then, (T3) and
(T4) can be executed for each swap in expected time O(1). However, in the EM model this
approach incurs โฆ(1) I/Os per swap with high probability for a graph with m โฅ cM and any
constant c > 1.
To improve the situation, we split S into smaller runs of r = ฮ(|E|) swaps which are then
batchwise processed. Note that two swaps within a run can depend on each other. If an edge
is contained in more than one swap, the nodes incident to the edge may change after the first
swap has been executed. We call this a source edge dependency. Since the resulting graph has
to remain simple, there further is a dependency between two swaps ฯi , ฯj through target edges
if executing ฯi creates or removes an edge created by ฯj . We model both types of dependencies
explicitly and forward information between dependent swaps using Time Forward Processing.
As illustrated in Fig. 5, EM-ES executes several phases for each run. They roughly correspond to the four tasks outlined above. For simplicityโs sake, we first assume that all swaps are
independent, i.e. that there are no two swaps that share any source edge id or target edge. We
will then explain how dependencies are handled.
5.1
EM-ES for Independent Swaps
During the request nodes phase, EM-ES requests for each swap ฯ(ha, bi, ยท) the endpoints
of the two edges at positions a and b in EL . These requests are then executed in the load
nodes phase. In combination, both implement task (T1). Subsequently, the step simulate swaps
computes eฯa and eฯb which corresponds to (T2). In the fourth step, load existence, we check
for each of these target edges whether it already exists. Then, the step perform swaps executes
swaps iff the graph remains simple; this corresponds to (T3). To implement (T4), the state of
all involved edges is materialized in the update graph phase.
The communication between the different phases is mostly realized via external memory
sorters6 . Independent swaps require only the communication shown at the top of Fig. 5.
6
The term sorter refers to a container with two modes of operation: in the first phase, items are pushed into
the write-only sorter in an arbitrary order by some algorithm. After an explicit switch, the filled data structure
becomes read-only and the elements are provided as a lexicographically non-decreasing stream which can be
rewound at any time. While a sorter is functionally equivalent to filling, sorting and reading back an EM vector,
the restricted access model reduces constant factors in the implementationโs runtime and I/O-complexity [5].
9
markers for edges that receive updates (InvalidEdge)
edge state to
first swap
(EdgeMsg)
request nodes
incident to
edge id (EdgeReq)
basic edge switching
dependency handling
Sorter
Stream
request
nodes
EL
(swap id)
Priority Queue
edge existence
request
(ExistReq)
load
nodes
simulate
swaps
(edge id)
(swap id)
inform about
successor swap
(IdSucc)
edge state
updates to
successor
EL
edge exist. info
to first swap
(ExistMsg)
edges after
processed swaps
(EdgeUpdates)
load
existence
perform
swaps
(edge)
(swap id)
inform about
successor swap
(ExistSucc)
EL
update
graph
EL
(edge)
edge state and
existence updates
to successor
Figure 5: Data flow during an EM-ES run. Communication between phases is implemented via EM
sorters, self-loops use a PQ-based TFP. Brackets within a phase represent the type of elements iterated
over. If multiple input streams are used, they are joined with this key.
5.1.1 Request nodes and load nodes
The goal of these two phases is to load every referenced edge. We iterate over the sequence
S of swaps. For the s-th swap ฯ(ha, bi, d), we push the two messages edge req(a, s, 0) and
edge req(b, s, 1) into the sorter EdgeReq. A messageโs third entry encodes whether the request
is issued for the first or second edge of a swap. This information only becomes relevant when
we allow dependencies. EM-ES then scans in parallel through the edge list EL and the requests EdgeReq, which are now sorted by edge ids. If there is a request edge req(i, s, p) for
an edge ei =[u, v], the edgeโs node pair is sent to the requesting swap by pushing a message
edge msg(s, p, (u, v)) into the sorter EdgeMsg.
Additionally, for every edge we push a bit into the sequence InvalidEdge, which is asserted
iff an edge received a request. These edges are considered invalid and will be deleted when
updating the graph. Since both phases produce only a constant amount of data per input
element, we obtain an I/O complexity of O(sort(r) + scan(m)).
5.1.2 Simulate swaps and load existence
The two phases gather all information required to decide whether a swap is legal. EM-ES
scans through the sequence S of swaps and EdgeMsg in parallel: For the s-th swap ฯ(ha, bi, d),
there are exactly two messages edge msg(s, 0, ea ) and edge msg(s, 1, eb ) in EdgeMsg. This information suffices to compute the switched edges eฯa and eฯb , but not to test for multi-edges.
To avoid these, it remains to check whether the switched edges already exist. Thus, we push
existence requests exist req(eฯa , s) and exist req(eฯb , s) in the sorter ExistReq (in contrast
to request nodes we use the node pairs rather than edge ids, which are not well defined here).
Afterwards, a parallel scan through the edge list EL and ExistReq is performed to answer the
requests. Only if an edge e requested by swap id s is found, the message exist msg(s, e) is
pushed into the sorter ExistMsg. Both phases hence incur a total of O(sort(r) + scan(m)) I/Os.
5.1.3 Perform swaps
We rewind the EdgeMsg sorter and jointly scan through the sequence of swaps S and the
sorters EdgeMsg and ExistMsg. As described in the simulation phase, EM-ES computes the
switched edges eฯa and eฯb from the original state ea and eb . The swap is marked illegal if a
switched edge is a self-loop or if an existence info is received via ExistMsg. If ฯ is legal we push
the switched edges eฯa and eฯb into the sorter EdgeUpdates, otherwise we propagate the unaltered
source edges ea and eb . This phase requires O(sort(r)) I/Os.
5.1.4 Update edge list
The new edge list EL0 is obtained by merging the original edge list EL and the updated edges
EdgeUpdates, triggering O(scan(m)) I/Os. During this process, we skip all edges in EL that
are flagged invalid in the bit stream InvalidEdge.
10
5.2
Inter-Swap Dependencies
In contrast to the earlier over-simplification, swaps may share source ids or target edges. In
this case, EM-ES produces the same result as a sequential processing of S. Two swaps containing
the same source edges are detected during the load nodes phase. In such a case there arrive
multiple requests for the same edge id. We record these dependencies as an explicit dependency
chain (see below for details).
In the simulation phase we do not know yet whether a swap can be executed. Therefore we
need to consider both cases (i.e. a swap has been executed or an existing edge prevented its
execution) and dynamically forward all possible edge states using a priority queue.
In the load existence phase, we detect whether several swaps might produce the same outcome; in this case both issue an existence request for the same edge during simulation. Again,
an explicit dependency chain is computed. During the perform swaps phase, EM-ES forwards
the source edge states and existence updates to successor swaps using information from both
dependency chains.
5.2.1 Target edge dependencies
Consider the case where a swap ฯs1 (ha, bi, d) changes the state of edges ea and eb to eฯa 1 and
ฯ1
eb respectively. Later, a second swap ฯ2 inquires about the existence of either of the four edges
which has obviously changed compared to the initial state. We extend the simulation phase in
order to track such edge modifications. Here, we not only push messages exist req(eฯa 1 , s1 ) and
exist req(eฯb 1 , s1 ) into sorter EdgeReq, but also report that the original edges may change. This
is achieved by using messages exist req(ea , s1 , may change) and exist req(eb , s1 , may change)
that are pushed into the same sorter. If there are dependencies, multiple messages are received
for the same edge e during the load existence phase. In this case, only the request of the first
swap involved is answered as before. Also, every swap ฯs1 is informed about its direct successor
ฯs2 (if any) by pushing the message exist succ(s1 , e, s2 ) into the sorter ExistSucc, yielding
the aforementioned dependency chain. As an optimization, may change requests at the end of
a chain are discarded since no recipient exists.
During the perform swaps phase, EM-ES executes the same steps as described earlier. The
swap may receive a successor for every edge it sent an existence request to, and it informs each
successor about the state of the appropriate edge after the swap is processed.
5.2.2 Source edge dependencies
Consider two swaps ฯs1 (ha1 , b1 i, d1 ) and ฯs2 (ha2 , b2 i, d2 ) with s1 <s2 which share a source
edge id, i.e. {a1 , b1 } โฉ {a2 , b2 } is non-empty. This dependency is detected during the load nodes
phase, where requests edge req(ei , s1 , p1 ) and edge req(ei , s2 , p2 ) arrive for the same edge id
ei . In this case, we answer only the request of s1 and build a dependency chain as described
before using messages id succ(s1 , p1 , s2 , p2 ) pushed into the sorter IdSucc.
During the simulation phase, EM-ES cannot decide whether a swap is legal. Therefore, s1
sends for every conflicting edge its original state e as well as the updated state eฯ1 to the p2 -th
slot of s2 using a PQ. If a swap receives multiple edge states per slot, it simulates the swap for
every possible combination.
During the perform swaps phase, EM-ES operates as described in the independent case: it
computes the swapped edges and determines whether the swap has to be skipped. If a successor
exists, the new state is not pushed into the EdgeUpdates sorter but rather forwarded to the
successor in a TFP fashion. This way, every invalidated edge id receives exactly one update in
EdgeUpdates and the merging remains correct.
Due to the second modification, EM-ESโs complexity increases with the number of swaps
that target the same edge id. This number is quite low in case r = O(m). Let Xi be a random
variable expressing the number of swaps that reference edge ei . Since every swap constitutes two
independent Bernoulli trials towards ei , the indicator Xi is binomially distributed with p = 1/m,
yielding an expected chain length of 2r/m.
11
Input
Degree sequence D = (1, 1, 2, 2, 2, 4)
Shuffled sequence
[6, 6,
4, 5,
6, 1,
3, 2,
3, 6]
1
4
5
[3, 6]
6
3
2
Matched edges
Materialized multi-set
[1, 2, 3, 3, 4, 4, 5, 5, 6, 6, 6, 6]
4, 5,
Resulting graph
[6, 6]
[4, 5] [4, 5] [1, 6] [2, 3]
Figure 6: A Configuration Model run on degree sequence D = (1, 1, 2, 2, 2, 4).
Also, for r = m/2 swaps, max1โคiโคn (Xi ) = O(ln(m)/ ln ln(m)) holds with high probability
based on a balls-into-bins argument [36]. Thus, we can bound the largest number of edge
states simulated with high probability by O(polylog(m)), assuming non-overlapping dependency
chains. Further observe that Xi converges towards an independent Poisson distribution for large
m. Then the expected state space per edge is O(1). Experiments suggest that this bound also
holds for overlapping dependency chains (cf. section 10.2).
In order to keep the dependency chains short, EM-ES splits the sequence of swaps S into
runs of equal size. Our experimental results show that a run size of r = m/8 is a suitable choice.
For every run, the algorithm executes the six phases as described before. Each time the graph
is updated, the mapping between an edge and its id may change. The switching probabilities,
however, remain unaltered due to the initial assumption of uniformly distributed swaps. Thus
EM-ES triggers O(k/m sort(m)) I/Os in total with high probability.
6
EM-CM/ES: Sampling of random graphs from prescribed degree sequence
In this section, we propose an alternative approach to generate a graph from a prescribed
degree sequence. In contrast to EM-HH which generates a highly biased but simple graph, we
use the Configuration Model to sample a random but non-simple graph. Thus, the resulting
graph may contain self-loops and multi-edges which we then remove to obtain a simple graph.
6.1
Configuration Model
Let D = [di ]1โคiโคn be a degree sequence with n nodes. The Configuration Model builds a
multiset of node ids which can be thought of as half-edges (or stubs). It produces a total of di
half-edges labelled vi for each node vi . The algorithm then chooses two half-edges uniformly at
random and creates an edge according to their labels. It repeats the last step with the remaining
half-edges until all are matched. In this naฤฑฬve implementation, the procedure requires โฆ(m) I/Os
with high probability for m โฅ cM and any constant c > 1. It is therefore impractical in the
fully external setting.
As illustrated in Fig. 6 and similar to [26], we instead materialize the multiset as a sequence
in which each node appears di times. Subsequently, the sequence is shuffled to obtain a random
permutation with O(sort(m)) I/Os by sorting the sequence by a uniform variate drawn for each
half-edge7 . Finally, we scan over the shuffled sequence and match pairs of adjacent half-edges.
We now give upper bounds for theP
number of self-loops and
P multi-edges introduced by the
Configuration Model. Define hDi := v dv /n and hD2 i := v d2v /n to be the mean and the
second moment of the sequence D.
In [2] and [37] the expected number of self-loops and multi-edges has already been studied.
The results are stated in the following two lemmata.
7
The random permutation can be obtained with O(scan(m)) I/Os in case M >
which does not affect the complexity of our total pipeline.
12
โ
mB(1 + o(1)) + O(B) [41]
Lemma 3. Let D be a degree sequence with n nodes. The expected number of self-loops is given
by
hD2 i โ hDi
hD2 i โ hDi
โโ
for n โ โ.
2(hDi โ 1/n)
2hDi
Lemma 4. Let D be a degree sequence with n nodes. The expected number of multi-edges is
bounded by
2
(hD2 i โ hDi)2
1 hD2 i โ hDi
1
โโ
for n โ โ.
2 (D โ 1/n)(D โ 3/n)
2
hDi
Let D be a degree sequence drawn from the powerlaw distribution Pld ([a, b), ฮณ). For fixed
ฮณ = 2, we bound the number of illegal edges as a function of a and b. Since each entry in D is
independently drawn, it suffices to give bounds for the expected value and the second moment
of the underlying distribution.
P
P
For general ฮณ, the expected value and second moment are given by bi=a iโฮณ+1 and bi=a iโฮณ+2
R b+1 โp
Pb
respectively. Both expressions are bound between the two integrals a x dx โค i=a iโp โค
Rb
โp dx where p = โฮณ + 1 or p = โฮณ + 2 respectively. In the case of ฮณ = 2, the secaโ1 x
P
ond moment is hD2 i = bi=a 1 = bโa+1. Then, by using this identity and the lower bound
R b+1 โ1
x dx โค hDi, we obtain the two following lemmata:
a
Lemma 5. Let D be drawn from Pld ([a, b), 2). The expected number of self-loops is bounded
by
1
bโa+1
.
2 ln(b + 1) โ ln(a)
Lemma 6. Let D be drawn from Pld ([a, b), 2). The expected number of multi-edges is bounded
by
2
1
bโa+1
.
2 ln(b + 1) โ ln(a)
6.2
Edge rewiring for non-simple graphs
As a consequence of lemmata 5 and 6, graphs generated using the Configuration Model
may contain multi-edges and self-loops. In order to detect them, we first sort the edge list
lexicographically. Then both types of illegal edges can be detected in a single scan. For each
self-loop we issue a swap with a randomly selected partner edge. Similarly, for each group of
f > 1 of parallel edges, we generate f โ1 swaps with random partner edges. Subsequently, we
execute the provisioned swaps using a variant of EM-ES (see below). The process is repeated
until all illegal edges have been removed. To accelerate the endgame, we double the number of
swaps for each remaining illegal edge in every iteration.
Since EM-ES is employed to remove parallel edges based on targeted swaps, it needs to
process non-simple graphs. Analogous to the initial formulation, we forbid swaps that introduce
multi-edges even if they would reduce the multiplicity of another edge (cf. [50]). Nevertheless,
EM-ES requires slight modifications for non-simple graphs.
Consider the case where the existence of a multi-edge is inquired several times. Since EL is
sorted, the initial edge multiplicities can be counted while scanning EL during the load existence
phase. In order to correctly process the dependency chain, we have to forward the (possibly updated) multiplicity information to successor swaps. We annotate the existence tokens
exist msg(s, e, #(e)) with these counters where #(e) is the multiplicity of edge e.
More precisely, during the perform swaps phase, swap ฯ1 = ฯ(ha, bi, d) is informed (amongst
others) of multiplicities of edges ea , eb , eฯa 1 and eฯb 1 by incoming existence messages. If ฯ1 is
legal, we send requested edges and multiplicities of the swapped state to any successor ฯ2 of ฯ1
provided in ExistSucc.
13
The swapped state consists of the same edges where multiplicities for eฯa 1 and eฯb 1 are incremented and decremented for ea and eb . Otherwise, we forward the edges and multiplicities
of the unchanged initial state. As an optimization, edges which have been removed (i.e. have
multiplicity zero) are omitted.
7
EM-CA: Community Assignment
For the sake of simplicity, we first restrict the EM community assignment EM-CA to the nonoverlapping case, in which every node belongs
P to exactly one community. Consider a sequence
of community sizes S=[sฮพ ]1โคฮพโคC with n= C
ฮพ=1 sฮพ and a sequence of intra-community degrees
in
D=[dv ]1โคvโคn . Let S and D be non-increasing and positive. The task is to find a random
surjective assignment ฯ : V โ[C] with:
(R1) Every community ฮพ is assigned sฮพ nodes as requested, with sฮพ := {v | v โ V โง ฯ(v)=ฮพ} .
(R2) Every node v โ V becomes member of a sufficiently large community ฯ(v) with sฯ(v) > din
v .
7.1
Ignoring constraint on community size (R2)
Without constraint (R2), the bipartite assignment graph8 ฯ can be sampled in the spirit of
the Configuration Model (cf. section 6): Draw a permutation ฯ of nodes uniformly at random
P
and assign nodes {vฯ(xฮพ +1) , . . . , vฯ(xฮพ +sฮพ ) } to community ฮพ where xฮพ := ฮพโ1
i=1 si . To ease later
modifications, we prefer an equivalent iterative formulation: while there exists a yet unassigned
node u, draw a community X with probability proportional to the number of its remaining free
slots (i.e. P[X=ฮพ] โ sฮพ ). Assign u to X, reduce the communityโs probability mass by updating
sX โ sX โ 1 and repeat. By construction, the first scheme is unbiased and the equivalence of
both approaches follows as a special case of Lemma 7.
We implement the random selection process efficiently based on a binary tree where each
community corresponds to a leaf with a weight equal to the number of free slots in the community.
Inner nodes store the total weight of their left subtree. In order
Pto draw a community, we sample
an integer Y โ [0, WC ) uniformly at random where WC := C
ฮพ=1 sฮพ is the treeโs total weight.
Following the tree according to Y yields the leaf corresponding to community X. An I/Oefficient data structure [32] based on lazy evaluation for such dynamic probability distributions
enables a fully external algorithm with O(n/B ยท logM/B (C/B)) = O(sort(n)) I/Os. However,
since C < M , we can store the tree in IM, allowing a semi-external algorithm which only needs
to scan through D, triggering O(scan(n)) I/Os.
7.2
Enforcing constraint on community size (R2)
To enforce (R2), we exploit the monotonicity of S and D. Define pv := max{ฮพ | sฮพ > din
v }
as the index of the smallest community node v may be assigned to. Since [pv ]v is therefore
monotonic itself, it can be computed online with O(1) additional IM and O(scan(n)) I/Os
in the fully external setting by scanning through S and D in parallel. In order to restrict the
random sampling to the communities {1,P
. . . , pv }, we reduce the aforementioned random interval
pv โ1
to [0, Wv ) where the partial sum Wv := ฮพ=1
sฮพ is available while computing pv . We generalize
the notation of uniformity to assignments subject to (R2) as follows:
Lemma 7. Given S={s1 , . . . , sC } and D, let u, v โ V be two nodes with the same constraints
(pu = pv ) and let c be an arbitrary community. Further, let ฯ be an assignment generated by
EM-CA. Then, P[ฯ(u)=c] = P[ฯ(v)=c].
Proof. Without loss of generality, assume that pu = p1 , i.e. u is one of the nodes with the
tightest constraints. If this is not the case, we just execute EM-CA until we reach a node u0
which has the same constraints as u does (i.e. pu0 = pu ), and apply the Lemma inductively.
8
Consider a bipartite graph where the partition classes are given by the communities [C] and nodes [n] respectively. Each edge then corresponds to an assignment.
14
This is legal since EM-CA streams through D in a single pass and is oblivious to any future
values. In case c > p1 , neither u nor v can become a member of c. Therefore, P[ฯ(u)=c] =
P[ฯ(v)=c] = 0 and the claim follows trivially.
(i)
Now consider the case c โค p1 . Let sc be the number of free slots in community c at the
P
(i)
beginning of round i โฅ 1 and W (i) = C
j=1 sj their sum at that time. By definition, EM-CA
(u)
assigns node u to community c with probability P[ฯ(u)=c] = sc /W (u) . Further, the algorithm
has to update the number of free slots. Thus, for iteration i โ [n] it holds that
s(i)
c
=
๏ฃฑ
๏ฃด
๏ฃฒsc
if i = 1
(iโ1)
sc
๏ฃด
๏ฃณ (iโ1)
sc
โ1
if iโ1 was assigned to c .
otherwise
The number of free slots is reduced by one in each step:
๏ฃซ
๏ฃถ
C
X
W (i) = ๏ฃญ
Sj ๏ฃธ โ (i โ 1)
j=1
(u)
(1)
It remains to show P[ฯ(u)=c] = sc /W (u) = sc /W (1) and the claim follows by transitivity.
For u=1 it is true by definition. Now, consider the induction step for u>1:
(u)
P[ฯ(u)=c] = s(u)
c /W
(uโ1)
= P[ฯ(uโ1)=c]
(uโ1)
=
7.3
sc
sc
โ1
W (u)
(uโ1)
(uโ1)
ยท W (uโ1) โ sc
W (uโ1) ยท W (u)
(uโ1)
(uโ1)
โ1
sc
sc
sc
+ P[ฯ(uโ1)6=c] (u) = (uโ1)
+
(u)
W
W
W
(uโ1)
=
(uโ1)
(W (uโ1) โ 1)
sc
sc
= (uโ1)
(uโ1)
W
ยท (W (uโ1) โ 1)
W
Ind. Hyp.
=
(uโ1)
sc
1 โ (uโ1)
W
!
(uโ1)
sc
W (u)
(1)
sc
W (1)
Assignment with overlapping communities
In the overlapping case, the weight of S increases to account for nodes with multiple memberships. There is further an additional input sequence [ฮฝv ]1โคvโคn corresponding to the number
of memberships a node v shall have, each of which has din
v intra-community neighbors. We then
sample not only one community per node v, but ฮฝv different ones.
Since the number of memberships ฮฝv M is small, a duplication check during the repeated
sampling is easy in the semi-external case and does not change the I/O complexity. However, it
is possible that near the end of the execution there are less free communities than memberships
requested. We address this issue by switching to an offline strategy for the last ฮ(M ) assignments
and keep them in IM. As ฮฝ = O(1), there are โฆ(ฮฝ) communities with free slots for the last ฮ(M )
vertices and a legal assignment exists with high probability. The offline strategy proceeds as
before until it is unable to find ฮฝ different communities for a node. In that case, it randomly
picks earlier assignments until swapping the communities is possible.
In the fully external setting, the I/O complexity grows linearly in the number of samples
taken and is thus bounded by O(ฮฝ sort(n)). However, the community memberships are obtained
lazily and out-of-order which may assign a node several times to the same community. This
corresponds to a multi-edge in the bipartite assignment graph. It can be removed using the
rewiring technique detailed in section 6.2.
15
8
8.1
Merging and repairing the intra- and inter-community graphs
Global Edge Rewiring
The global graph is materialized without taking the community structure into account. It
therefore can contain edges between nodes that share a community. Those edges have to be
removed as they increase the mixing parameter ยต.
In accordance with LFR, we use rewiring steps to do so and perform an edge swap for each
forbidden edge with a randomly selected partner. Since it is unlikely that such a random swap
introduces another illegal edge (if sufficiently many communities exist), the probabilistic approach effectively removes forbidden edges. We apply this idea iteratively and perform multiple
rounds until no forbidden edges remain.
The community assignment step outputs a lexicographically ordered sequence ฯ of (v, ฮพ)pairs containing the community ฮพ for each node v. For nodes that join multiple communities
several such pairs exist. Based on this, we annotate every edge with the communities of both
incident vertices by scanning through the edge list twice: once sorted by source nodes, once by
target nodes. For each forbidden edge, a swap is generated by drawing a random partner edge
id and a swap direction. Subsequently, all swaps are executed using EM-ES which now also
emits the set of edges involved. It suffices to restrict the scan for illegal edges to this set since
all edges not contained have to be legal.
Complexity. Each round needs O(sort(m)) I/Os for selecting the edges and executing the
swaps. The number of rounds is usually small but depends on the community size distribution:
the smaller the communities, the less likely are edges inside them.
8.2
Community Edge Rewiring
In the case of overlapping communities, an edge can be generated as part of multiple clusters.
Similarly to section 6.2, we iteratively apply semi-random swaps to remove those parallel edges.
Here, however, the selection of random partners is more involved. In order not to violate the
community size distribution, both edges of a swap have to belong to the same community. While
it is easy to achieve this by considering all communities independently, we need to consider the
whole merged graph to detect forbidden edges.
In order to do so, we annotate each edge with its community id and merge all communities
together into one graph that possibly contains parallel edges. During a scan through all sorted
edges, we select from each set of parallel edges all but one as candidates for rewiring. Then, a
random partner from the same community is drawn for each of these edges. For this, we sort all
edges and the selected candidates by community. By counting the edges per community, we can
sample random partners, load them in a second scan, randomize their order, and assign them
to the candidates of their community. For the execution, multi-edges need to be considered, i.e.
we do not only need to know if an edge exists, but also how often, and update that information
accordingly. Together with all loaded edges we also need to store community ids such that we
can uniquely identify them and update the correct information.
While these steps are possible in external memory, we exploit the fact that there are significantly less communities than nodes. Hence, storing some information per community in internal
memory is possible. We assume further that all candidates can be stored in internal memory. If
there were too many candidates, we would simply consider only some of them in each round.
We can avoid the expensive step of sorting all edges by community for every round using the
following observation: When scanning the edges, we can keep track of how many edges of each
community we have seen so far. We sort the edge ids to be loaded for every community and
keep a pointer on the current position in the list for every community. This allows us to load
specific edges of all communities without the need to sort all edges by community.
Complexity. The fully external rewiring requires O(sort(m)) I/Os for the initial step and
each following round. The semi-external variant triggers only O(scan(m)) I/Os per round. The
number of rounds is usually small and the overall runtime spend on this step is insignificant.
16
Nevertheless, the described scheme is a Las Vegas algorithm and there exist (unlikely) instances
on which it will fail.9 To mitigate this issue, we allow a small fraction of edges (e.g., 10โ3 ) to
be removed if we detect a slow convergence. To speed up the endgame, we also draw additional
swaps uniformly at random from communities which contain a multi-edge.
9
Implementation
We implemented the proposed algorithms in C++ based on the STXXL library [12], providing implementations of EM data structures, a parallel EM sorter, and an EM priority queue.
Among others, we applied the following optimizations for EM-ES:
โข Most message types contain both a swap id and a flag indicating which of the swapโs edges is
targeted. We encoded both of them in a single integer by using all but the least significant bit
for the swap id and store the flag in there. This significantly reduces the memory volume and
yields a simpler comparison operator since the standard integer comparison already ensures
the correct lexicographic order.
โข Instead of storing and reading the sequence of swaps several times, we exploit the implementationโs pipeline structure and directly issue edge id requests for every arriving swap. Since
this is the only time edge ids are read from a swap, only the remaining direction flag is stored
in an efficient EM vector, which uses one bit per flag and supports I/O-efficient writing and
reading. Both steps can be overlapped with an ongoing EM-ES run.
โข Instead of storing each edge in the sorted external edge list as a pair of nodes, we only store
each source node once and then list all targets of that vertex. This still supports sequential
scan and merge operations which are the only operations we need. This almost halves the
I/O volume of scanning or updating the edge list.
โข During the execution of several runs we can delay the updating of the edge list and combine
it with the load nodes phase of the next run. This reduces the number of scans per additional
run from three to two.
โข We use asynchronous stream adapters for tasks such as streaming from sorters or the generation of random numbers. These adapters run in parallel in the background to preprocess
and buffer portions of the stream in advance and hand them over to the main thread.
Besides parallel sorting and asynchronous pipeline stage, the current EM-LFR implementation facilitates parallelism only during the generation and randomization of intra-community
graphs which can be computed pleasingly parallel.
10
Experimental Results
The number of repetitions per data point (with different random seeds) is denoted with S.
Errorbars correspond to the unbiased estimation of the standard deviation. For LFR we perform
experiments based on two different scenarios:
โข (lin) โ In one setting, the maximal degrees and community sizes scale linearly as a
function of n. For a n and ฮฝ the parameters are chosen as: ยต โ {0.2, 0.4, 0.6}, dmin =10ฮฝ,
dmax =nฮฝ/20, ฮณ=2, smin =20, smax =n/10, ฮฒ=1, O=n.
โข (const) โ In the second setting, we keep the community sizes and the degrees constant
and consider only non-overlapping communities. The parameters are chosen as: dmin =50,
dmax =10,000, ฮณ=2, smin =50, smax =12,000, ฮฒ=1, O=n.
Real-world networks have been shown to have increasing average degrees as they become
larger [30]. Increasing the maximum degree as in our first setting (lin) increases the average
9
Consider a node which is a member of two communities in which it is connected to all other nodes. If only
one of its neighbors also appears in both communities, the multi-edge cannot be rewired.
17
100
ฮณ = 1 : 0.379 ยท x1/1
ฮณ = 2 : 1.380 ยท x1/2
5
10 ฮณ = 3 : 1.270 ยท x1/3
Relative frequency
Number of unique elements
106
104
103
102
Run size 0.05n
Run size 0.125n
Run size 0.5n
10โ1
10โ2
10โ3
10โ4
10โ5
10โ6
101
103
104
105
106
107
108
10
Number n of samples
100
Number of edge configuration received by swap
Figure 7: Left: Number of distinct elements in n samples (i.e. node degrees in a degree sequence) taken
from Pld ([1, n), ฮณ). Right: Overhead induced by tracing inter-swap dependencies. Fraction of swaps as
function of the number of edge configurations they receive during the simulation phase.
degree. Having a maximum community size of n/10 means, however, that a significant proportion of the nodes belongs to such huge communities which are not very tightly knit due to the
large number of nodes of low degree. While a more limited growth is probably more realistic,
the exact parameters depend on the network model.
Our second parameter set (const) shows an example of much smaller maximum degrees and
community sizes. We chose the parameters such that they approximate the degree distribution
of the Facebook network in May 2011 when it consisted of 721 million active users as reported
in [46]. Note however that strict powerlaw models are unable to accurately mimic Facebookโs
degree distribution [46]. Further, they show that the degree distribution of the U.S. users
(removing connections to non-U.S. users) is very similar to the one of the Facebook users of the
whole world, supporting our use of just one parameter set for different graph sizes.
The actual minimum degree of the Facebook network is 1, but the smaller degrees are significantly less prevalent than a power law degree sequence would suggest, which is why we chose a
larger value of 50. Our maximum degree of 10,000 is larger than the one reported for Facebook
(5000), but the latter was also an arbitrarily enforced limit by Facebook. The expected average
degree of this degree sequence is 264, which is slightly higher than the reported 190 (world) or
214 (U.S. only). Our parameters are chosen such that the median degree is approximately 99,
which matches the worldwide Facebook network. Similar to the first parameter set, we chose
the maximum community size slightly larger than the maximum degree of 12,000 nodes.
10.1
EM-HH โs state size
In Lemma 1, we bound the internal memory consumption of EM-HH by showing that a
sequence of n numbers randomly sampled from Pld ([1, n), ฮณ) contains only O(n1/ฮณ ) distinct
values with high probability.
In order to support Lemma 1 and to estimate the hidden constants, samples of varying size
between 103 and 108 are taken from distributions with exponents ฮณ โ {1, 2, 3}. Each time, the
number of unique elements is computed and averaged over S = 9 runs with identical configurations but different random seeds. The results illustrated in Fig. 7 support the predictions
โ
with small constants. For the commonly used exponent 2, we find 1.38 n distinct elements in
a sequence of length n.
10.2
Inter-Swap Dependencies
Whenever multiple swaps target the same edge, EM-ES simulates all possible states to be
able to retrieve conflicting edges. We argued that the number of dependencies (and thus the
state size) remains manageable if the sequence of swaps is split into sufficiently short runs. We
found that for m edges and k swaps, 8k/m runs minimize the runtime for large instances of
(lin). As indicated in Fig. 7, in this setting 78.7 % of swaps do not receive additional edge
configurations during the simulation phase and less than 0.4 % have to consider more than four
additional states. Similarly, 78.6 % of existence requests remain without dependencies.
18
106
104
105
Runtime [s]
Runtime [s]
105
103
102
101
100
104
106
107
103
ยฏ 100
VL-ES, d=
ยฏ 1000
VL-ES, d=
ยฏ 100
EM-ES, d=
ยฏ 1000
EM-ES, d=
102
Original LFR
EM-LFR
105
104
101
108
107
Number n of node
108
109
1010
Number m of edges
Figure 8: Left: Runtime on (SysA) of the original LFR implementation and EM-LFR for ยต=0.2. Right:
Runtime on (SysB) of IM VL-ES and EM-ES on a graph with m of edges and average degree dยฏ executing
k=10m swaps.
10.3
Performance benchmarks
Runtime measurements were conducted on the following systems:
โข (SysA) โ inexpensive compute server :
Intel Xeon E5-2630 v3 (8 cores/16 threads, 2.40GHz), 64 GB RAM, 3ร Samsung 850 PRO
SATA SSD (1 TB).
โข (SysB) โ commodity hardware:
Intel Core i7 CPU 970 (6 cores/12 threads, 3.2GHz), 12 GB RAM, 1ร Samsung 850 PRO
SATA SSD (1 TB).
Since edge switching scales linearly in the number of swaps (in case of EM-ES in the number
of runs), some of the measurements beyond 3 h runtime are extrapolated from the progress until
then. We verified that errors stay within the indicated margin using reference measurements
without extrapolation.
10.4
Performance of EM-HH
Our implementation of EM-HH produces 180 ยฑ 5 million edges per second on (SysA) up to at
least 2 ร 1010 edges. Here, we include the computation of the input degree sequence, EM-HH โs
compaction step, as well as the writing of the output to external memory.
10.5
Performance of EM-ES
Figure 8 presents the runtime required on (SysB) to process k=10m swaps in an input graph
with m edges and an average degree dยฏ โ {100, 1000}. For reference, the performance of the
existing internal memory edge swap algorithm VL-ES based on the authorsโ implementation [47]
is included. Here we report only on the edge swapping process excluding any precomputation.
To achieve comparability, we removed connectivity tests, fixed memory management issues, and
adopted the number of swaps. Further, we extended counters for edge ids and accumulated
degrees to 64 bit integers in order to support experiments with more than 230 edges. VL-ES
slows down by a factor of 25 if the data structure exceeds the available internal memory by less
than 10 %. We observe an analogous behavior on machines with larger RAM. EM-ES is faster
than VL-ES for all instances with m > 2.5 ร 108 edges; those graphs still fit into main memory.
FDSM has applications beyond synthetic graphs, and is for instance used on real data to
assess the statistical significance of observations [43]. In that spirit, we execute EM-ES on an
undirected version of the crawled ClueWeb12 graphโs core [45] which we obtain by deleting
all nodes corresponding to uncrawled URLs.10 Performing k = m swaps on this graph with
n โ 9.8 ร 108 nodes and m โ 3.7 ร 1010 edges is feasible in less than 19.1 h on (SysB).
10
We consider such vertices unrealistically (simple) as they have only degree 1 and account for โ84 % of nodes
in the original graph.
19
7.5
7.0
6.5
6.0
5.5
Nodes: 105 , Mixing: 1.0
ร109
Mean after 5m swaps
EM-ES, S = 1138
EM-CMES, S = 600
Degree assortativity
Number of triangles
3.05
3.00
2.95
2.90
2.85
ร108
0
1
2
3
Number of swaps per edge k/m
4
5
Nodes: 107 , Mixing: 0.2
1.00
0.98
0.96
0.94
0.92
0.90
Mean after 5m swaps
EM-ES, S = 40
EM-CMES, S = 40
0.50
0.48
0.46
0.44
0.42
0
1
2
3
Number of swaps per edge k/m
4
5
Figure 9: Left: Number of triangles on (const) with n = 1 ร 105 and ยต = 1.0. Right:
Degree
assortativity on (const) with n = 1 ร 107 and ยต = 0.2. In order to factor in the increased runtime of
EM-CM/ES compared to EM-HH, plots of EM-CM/ES are shifted by the runtime of this phase relative to
the execution of EM-ES. As EM-CM/ES is a Las-Vegas algorithm, this incurs an additional error along
the x-axis.
Bhuiyan et al. propose a distributed edge switching algorithm and evaluate it on a compute
cluster with 64 nodes each equipped with two Intel Xeon E5-2670 2.60GHz 8-core processors and
64GB RAM [7]. The authors report to perform k=1.15 ร 1011 swaps on a graph with m=1010
generated in a preferential attachment process in less than 3 h. We generate a preferential
attachment graph using an EM generator [32] matching the aforementioned properties and
carried out edge swaps using EM-ES on (SysA). We observe a slow down of only 8.3 on a
machine with 1/128 the number of comparable cores and 1/64 of internal memory.
10.6
Performance of EM-CM/ES and qualitative comparison with EM-ES
In section 6, we describe an alternative graph sampling method. Instead of seeding EMES with a highly biased graph using EM-HH , we employ the Configuration Model to quickly
generate a non-simple random graph. In order to obtain a simple graph, we then carry out
several EM-ES runs in a Las-Vegas fashion.
Since EM-ES scans through the edge list in each iteration, runs with very few swaps are
inefficient. For this reason, we start the subsequent Markov Chain early: First identify all
multi-edges and self-loops and generate swaps with random partners. In a second step, we then
introduce additional random swaps until the run contains at least m/10 operations11 .
For an experimental comparison between EM-ES and EM-CM/ES, we consider the runtime
until both yield a sufficiently uniform random sample. Of course, the uniformity is hard to
quantify; similarly to related studies (cf. section 1.1), we estimate the mixing times of both
approaches as follows. Starting from a common seed graph G(0) , we generate an ensemble
(k)
(k)
{G1 , . . . , GS } of S 1 instances by applying independent random sequences of k m swaps
(jm)
each. During this process, we regularly export snapshots Gi
of the intermediate instances
j โ [k/m] of graph Gi . For EM-CM/ES, we start from the same seed graph, apply the algorithm
and then carry out k swaps as described above.
For each snapshot, we compute a number of metrics, such as the average local clustering
coefficient (ACC), the number of triangles, and degree assortativity12 . We then investigate how
the distribution of these measures evolves within the ensemble as we carry out an increasing
number of swaps. We omit results for ACC since they are less sensitive compared to the other
measures (cf. section 10.7).
As illustrated in Fig. 9 and Appendix C, all proxy measures converge within 5m swaps with
a very small variance. No statistically significant change can be observed compared to a Markov
11
We chose this number as it yields execution times similar to the m/8-setting of EM-ES on simple graphs
In preliminary experiments, we also included spectral properties (such as extremal eigenvalues of the adjacency/laplacian matrix) and the closeness centrality of fixed nodes. As these measurement are more expensive to
compute and yield qualitatively similar results, we decided not to include them in the larger trials.
12
20
5.0
Local cluster coeff.
Degree assortativity
Triangle count
4.5
4.0
Covergence after k/m steps
Covergence after k/m steps
5.0
3.5
3.0
2.5
2.0
1.5
1.0 5
10
106
Number n of nodes
4.0
3.5
3.0
2.5
2.0
1.5
1.0 5
10
107
Local cluster coeff.
Degree assortativity
Triangle count
4.5
106
Number n of nodes
107
Figure 10: Number of swaps per edge after which ensembles of graphs with (const), 1 ร 105 โค n โค 1 ร 107
and ยต = 0.4 (left) and ยต = 0.6 (right) converge. Due to computation costs, the ensemble size is reduced
from S > 100 to S > 10 for large graphs.
chain with 30m operations (which was only computed for a subset of each ensemble). EMHH generates biased instances with special properties, such as a high number of triangles and
correlated node degrees, while the features of EM-CM/ESโs output nearly match the converged
ensemble. This suggests that the number of swaps to obtain a sufficiently uniform sample can
be reduced for EM-CM/ES.
Due to computational costs, the study was carried out on multiple machines executing several
tasks in parallel. Hence, absolute running times are not meaningful, and we rather measure the
computational costs in units of time required to carry out 1m swaps by the same process. This
accounts for the offset of EM-CM/ESโs first data point.
The number of rounds required to obtain a simple graph depends on the degree distribution.
For (const) with n = 1 ร 105 and ยต = 1, a fraction of 5.1 % of the edges produced by the
Configuration Model are illegal. EM-ES requires 18 ยฑ 2 rewiring runs in case a single swap is
used per round to rewire an illegal edge. In the default mode of operation, 5.0 ยฑ 0.0 rounds
suffice as the number of rewiring swaps per illegal edge is doubled in each round. For larger
graphs with n = 1 ร 107 , only 0.07 % of edges are illegal and need 2.25 ยฑ 0.40 rewiring runs.
10.7
Convergence of EM-ES
In a similar spirit to the previous section, we indirectly investigate the Markov chainโs mixing
time as a function of the number of nodes n. To do so, we generate ensembles as before with
1 ร 105 โค n โค 1 ร 107 and compute the same graph metrics. For each group and measure, we
then search for the first snapshot p in which the measureโs mean is within an interval of half the
standard deviation of the final values and subsequently remains there for at least three phases.
We then interpret p as a proxy for the mixing time. As depicted in Fig. 10, no measure shows a
systematic increase over the two orders of magnitude considered. It hence seems plausible not to
increase the number of swaps performed by EM-LFR compared to the original implementation.
10.8
Performance of EM-LFR
Figure 8 reports the runtime of the original LFR implementation and EM-LFR as a function of the number of nodes n and ฮฝ = 1. EM-LFR is faster for graphs with n โฅ 2.5 ร 104
nodes which feature approximately 5 ร 105 edges and are well in the IM domain. Further, the
implementation is capable of producing graphs with more than 1 ร 1010 edges in 17 h.13 Using
the same time budget, the original implementation generates graphs more than two orders of
magnitude smaller.
13
Roughly 1.5 h are spend in the end-game of the Global Rewiring (at that point less than one edge out of
106 is invalid). In this situation, an algorithm using random I/Os may yield a speed-up. Alternatively, we could
simply discard the few remaining invalid edges since they only constitute an insignificant fraction.
21
Mixing ยต = 0.6, Cluster: Louvain
1
1
0.8
0.8
0.6
0.6
0.4
0.2
0
AR
AR
Mixing ยต = 0.6, Cluster: Infomap
0.4
Orig
NetworKit
EM
103
0.2
104
0
105
Orig
NetworKit
EM
103
104
Number n of nodes
105
Number n of nodes
Figure 11: Adjusted rand measure of Infomap/Louvain and ground truth at ยต = 0.6 with disjoint clusters,
smin = 10, smax = n/20.
Mixing: ยต = 0.4, Cluster: OSLOM, Overlap: ฮฝ = 2
Mixing: ยต = 0.4, Cluster: OSLOM, Overlap: ฮฝ = 4
Orig
EM
1
0.8
NMI
NMI
0.8
0.6
0.4
0.2
0
Orig
EM
1
0.6
0.4
0.2
103
104
0
105
Number n of nodes
103
104
105
Number n of nodes
Figure 12: NMI of OSLOM and ground truth at ยต = 0.4 with 2/4 overlapping clusters per node.
10.9
Qualitative Comparison of EM-LFR
When designing EM-LFR, we made sure that it closely follows the LFR benchmark such
that we can expect it to produce graphs following the same distribution as the original LFR
generator. In order to show experimentally that we achieved this goal, we generated graphs with
identical parameters using the original LFR implementation and EM-LFR. For disjoint clusters
we also compare it with the implementation that is part of NetworKit [44]. Using NetworKit,
we evaluate the results of Infomap [40], Louvain [8] and OSLOM [29], three state-of-the-art
clustering algorithms [14, 9, 17], and compare them using the adjusted rand measure [24] and
NMI [15].
Further, we examine the average local clustering coefficient, a measure for the percentage
of closed triangles which shows the presence of locally denser areas as expected in communities
[25]. We report these measures for graphs ranging from 103 to 106 nodes. In Fig. 11, 13
and 12 we present a selection of results; all of them can be found in Appendix B. There are
only small differences within the range of random noise between the graphs generated by EMLFR and the other two implementations. Note that due to the computational costs above
105 edges, there is only one sample for the original implementation which explains the outliers
in Fig. 11. Similar to the results in [14], we also observe that the performance of clustering
algorithms drops significantly as the graphโs size grows. This might be due to less clearly
defined community structures since the parameters are scaled, and also due to limits of current
clustering algorithms. Such behavior clearly demonstrates the necessity of EM-LFR for being
able to study this phenomenon on even larger graphs and develop algorithms that are able to
handle such instances.
11
Outlook and Conclusion
We propose the first I/O-efficient graph generator for the LFR benchmark and the FDSM,
which is the most challenging step involved: EM-HH materializes a graph based on a prescribed
degree distribution without I/O for virtually all realistic parameters. Including the generation of
a powerlaw degree sequence and the writing of the output to disk, our implementation generates
22
Avg. Local Clustering Coeff.
Mixing: ยต = 0.6
Orig
NetworKit
EM
1
0.8
0.6
0.4
0.2
0
103
104
105
Number n of nodes
Figure 13: Average local clustering coefficient at ยต = 0.6 with disjoint clusters.
1.8 ร 108 edges per second for graphs exceeding main memory. EM-ES perturbs existing graphs
with m edges based on k edge switches using O(k/m ยท sort(m)) I/Os for k = โฆ(m).
We demonstrate that EM-ES is faster than the internal memory implementation [47] even
for large instances still fitting in main memory and scales well beyond the limited main memory.
Compared to the distributed approach by [7] on a cluster with 128 CPUs, EM-ES exhibits a
slow-down of only 8.3 on one CPU and hence poses a viable and cost-efficient alternative. Our
EM-LFR implementation is orders of magnitude faster than the original LFR implementation
for large instances and scales well to graphs exceeding main memory while the generated graphs
are equivalent. We further gave evidence indicating that commonly accepted parameters to
derive the length of the Edge Switching Markov Chain remain valid for graph sizes approaching
the external memory domain and that EM-CM/ES can be used to accelerate the process.
Currently, EM-ES does not yet fully exploit the parallelism offered by modern machines.
While dependencies between swaps make a parallelization challenging, preliminary experiments
indicate that an extension is possible: each run can be split further into smaller batches which
can be parallelized in the spirit of [33].
Another possibility for a speedup could be to use the recently proposed Curveball sampling
algorithm for graphs with fixed degree sequence [10]. Further studies are necessary to establish whether this really leads to a faster sampling in practice. While the underlying Markov
chain seems to require less steps to converge in practice, each step is more expensive. Also, a
combination of Curveball with EM-CM/ES seems possible.
Further, this is just the starting point for clustering large graphs that exceed main memory
using external memory. Not only are new clustering algorithms needed, but also the evaluation
of the results needs to be investigated since existing evaluation measures might not be easily
computable in external memory.
Acknowledgment
We thank Hannes Seiwert and Mark Ortmann for valuable discussions on EM-HH.
23
References
[1] Alok Aggarwal and Jeffrey S. Vitter. The input/output complexity of sorting and related
problems. Communications of the ACM, 31(9), pages 1116โ1127, 1988.
[2] Omer Angel, Remco van der Hofstad, and Cecilia Holmgren. Limit laws for self-loops and
multiple edges in the configuration model. CoRR, abs/1603.07172, 2017. URL: https:
//arxiv.org/abs/1603.07172.
[3] Lars Arge. The buffer tree: A new technique for optimal I/O-algorithms (extended abstract). In Algorithms and Data Structures, 4th International Workshop, WADS โ95,
Kingston, Ontario, Canada, August 16-18, 1995, Proceedings, pages 334โ345, 1995. URL:
http://dx.doi.org/10.1007/3-540-60220-8_74, doi:10.1007/3-540-60220-8_74.
[4] David A. Bader, Henning Meyerhenke, Peter Sanders, Christian Schulz, Andrea Kappes,
and Dorothea Wagner. Encyclopedia of Social Network Analysis and Mining, chapter Benchmarking for Graph Clustering and Partitioning, pages 73โ82. Springer New
York, 2014. URL: http://dx.doi.org/10.1007/978-1-4614-6170-8_23, doi:10.1007/
978-1-4614-6170-8_23.
[5] Andreas Beckmann, Roman Dementiev, and Johannes Singler. Building a parallel pipelined
external memory algorithm library. In 23rd IEEE International Symposium on Parallel and Distributed Processing, IPDPS 2009, Rome, Italy, May 23-29, 2009, pages 1โ10,
2009. URL: http://dx.doi.org/10.1109/IPDPS.2009.5161001, doi:10.1109/IPDPS.
2009.5161001.
[6] Jon Louis Bentley and James B. Saxe. Generating sorted lists of random numbers. ACM
Trans. Math. Softw., 6(3):359โ364, 1980. URL: http://doi.acm.org/10.1145/355900.
355907, doi:10.1145/355900.355907.
[7] Hasanuzzaman Bhuiyan, Jiangzhuo Chen, Maleq Khan, and Madhav V. Marathe. Fast
parallel algorithms for edge-switching to achieve a target visit rate in heterogeneous graphs.
In 43rd International Conference on Parallel Processing, ICPP 2014, Minneapolis, MN,
USA, September 9-12, 2014, pages 60โ69, 2014. URL: http://dx.doi.org/10.1109/ICPP.
2014.15, doi:10.1109/ICPP.2014.15.
[8] Vincent Blondel, Jean-Loup Guillaume, Renaud Lambiotte, and Etienne Lefebvre. Fast
unfolding of communities in large networks. Journal of Statistical Mechanics: Theory and
Experiment, 2008(10), 2008. URL: http://dx.doi.org/10.1088/1742-5468/2008/10/
P10008.
[9] Nazar Buzun, Anton Korshunov, Valeriy Avanesov, Ilya Filonenko, Ilya Kozlov, Denis
Turdakov, and Hangkyu Kim. Egolp: Fast and distributed community detection in billionnode social networks. In 2014 IEEE International Conference on Data Mining Workshop,
pages 533โ540, Dec 2014. doi:10.1109/ICDMW.2014.158.
[10] Corrie Jacobien Carstens, Annabell Berger, and Giovanni Strona. Curveball: a new generation of sampling algorithms for graphs with fixed degree sequence. ArXiv e-prints,
September 2016. arXiv:1609.05137.
[11] Kyrylo Chykhradze, Anton Korshunov, Nazar Buzun, Roman Pastukhov, Nikolay
Kuzyurin, Denis Turdakov, and Hangkyu Kim. Distributed generation of billion-node
social graphs with overlapping community structure. In Complex Networks V: Proceedings of the 5th Workshop on Complex Networks CompleNet, pages 199โ208. Springer
International, 2014. URL: http://dx.doi.org/10.1007/978-3-319-05401-8_19, doi:
10.1007/978-3-319-05401-8_19.
24
[12] Roman Dementiev, Lutz Kettner, and Peter Sanders. STXXL: standard template library
for XXL data sets. Softw., Pract. Exper., 38(6):589โ637, 2008. URL: http://dx.doi.org/
10.1002/spe.844, doi:10.1002/spe.844.
[13] Roger B. Eggleton and Derek Allan Holton. Simple and multigraphic realizations of
degree sequences. In Proceedings of the Eighth Australian Conference on Combinatorial Mathematics, Lecture Notes in Mathematics, pages 155โ172. Springer, 1980. URL:
http://dx.doi.org/10.1007/BFb0091817.
[14] Scott Emmons, Stephen G. Kobourov, Mike Gallant, and Katy Boฬrner. Analysis of Network
Clustering Algorithms and Cluster Quality Metrics at Scale. PLoS ONE, 11(7):1โ18, July
2016. URL: http://dx.doi.org/10.1371/journal.pone.0159161.
[15] Alcides Viamontes Esquivel and Martin Rosvall. Comparing network covers using mutual
information, 2012. arXiv:1202.0425. URL: http://arxiv.org/abs/1202.0425.
[16] Santo Fortunato.
Community detection in graphs.
Physics Reports, 486(35):75 โ 174, 2010.
URL: http://www.sciencedirect.com/science/article/pii/
S0370157309002841, doi:10.1016/j.physrep.2009.11.002.
[17] Santo Fortunato and Darko Hric. Community detection in networks: A user guide. Physics
Reports, 659:1โ44, 2016. URL: https://dx.doi.org/10.1016/j.physrep.2016.09.002.
[18] Christos Gkantsidis, Milena Mihail, and Ellen W. Zegura. The Markov Chain Simulation
Method for Generating Connected Power Law Random Graphs. In Proceedings of the 5th
Workshop on Algorithm Engineering and Experiments (ALENEXโ03), pages 16โ25. SIAM,
2003.
[19] Catherine S. Greenhill and Matteo Sfragara. The switch markov chain for sampling irregular
graphs and digraphs. CoRR, abs/1701.07101, 2017. URL: http://arxiv.org/abs/1701.
07101.
[20] Seifollah L. Hakimi. On realizability of a set of integers as degrees of the vertices of a linear
graph. i. Journal of the Society for Industrial and Applied Mathematics, 10(3):496โ506,
1962. doi:10.1137/0110037.
[21] Michael Hamann, Ulrich Meyer, Manuel Penschuck, and Dorothea Wagner. I/O-efficient
Generation of Massive Graphs Following the LFR Benchmark. In Proceedings of the 19th
Meeting on Algorithm Engineering and Experiments (ALENEXโ17), pages 58โ72. SIAM,
2017. URL: http://dx.doi.org/10.1137/1.9781611974768.5.
[22] Steve Harenberg, Gonzalo Bello, L. Gjeltema, Stephen Ranshous, Jitendra Harlalka, Ramona Seay, Kanchana Padmanabhan, and Nagiza Samatova. Community detection in largescale networks: a survey and empirical evaluation. Wiley Interdisciplinary Reviews: Computational Statistics, 6(6):426โ439, 2014. URL: http://dx.doi.org/10.1002/wics.1319,
doi:10.1002/wics.1319.
[23] Vaฬclav Havel. Poznaฬmka o existenci konecฬnyฬch grafuฬ. Cฬasopis pro peฬstovaฬnฤฑฬ matematiky,
080(4):477โ480, 1955. URL: http://eudml.org/doc/19050.
[24] Lawrence Hubert and Phipps Arabie. Comparing partitions. Journal of Classification,
2(1):193โ218, December 1985. URL: http://dx.doi.org/10.1007/BF01908075.
[25] Marcus Kaiser. Mean clustering coefficients: the role of isolated nodes and leafs on clustering
measures for small-world networks. New Journal of Physics, 10(8), 2008. URL: http:
//dx.doi.org/10.1088/1367-2630/10/8/083042.
25
[26] Panqanamala Ramana Kumar, Martin J Wainwright, and Riccardo Zecchina. Mathematical
Foundations of Complex Networked Information Systems: Politecnico Di Torino, Verreฬs,
Italy 2009, volume 2141. Springer, 2015.
[27] Andrea Lancichinetti and Santo Fortunato. Benchmarks for testing community detection algorithms on directed and weighted graphs with overlapping communities. Phys.
Rev. E, 80:016118, Jul 2009. Source code available at https://sites.google.com/site/
santofortunato/inthepress2. URL: http://link.aps.org/doi/10.1103/PhysRevE.
80.016118, doi:10.1103/PhysRevE.80.016118.
[28] Andrea Lancichinetti, Santo Fortunato, and Filippo Radicchi. Benchmark graphs for testing
community detection algorithms. Phys. Rev. E, 78:046110, Oct 2008. URL: http://link.
aps.org/doi/10.1103/PhysRevE.78.046110, doi:10.1103/PhysRevE.78.046110.
[29] Andrea Lancichinetti, Filippo Radicchi, Joseฬ J. Ramasco, and Santo Fortunato. Finding
Statistically Significant Communities in Networks. PLoS ONE, 6(4):1โ18, April 2011. URL:
http://dx.doi.org/10.1371/journal.pone.0018961.
[30] Jure Leskovec, Jon M. Kleinberg, and Christos Faloutsos. Graphs Over Time: Densification
Laws, Shrinking Diameters and Possible Explanations. In Proceedings of the 11th ACM
SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 177โ
187. ACM Press, 2005. URL: http://portal.acm.org/citation.cfm?id=1081893.
[31] Anil Maheshwari and Norbert Zeh. A survey of techniques for designing I/O-efficient
algorithms. In Algorithms for Memory Hierarchies, pages 36โ61, 2003. URL: http:
//dx.doi.org/10.1007/3-540-36574-5_3, doi:10.1007/3-540-36574-5_3.
[32] Ulrich Meyer and Manuel Penschuck. Generating massive scale-free networks under resource
constraints. In Proceedings of the Eighteenth Workshop on Algorithm Engineering and
Experiments (ALENEX 2016), pages 39โ52, 2016. URL: http://epubs.siam.org/doi/
abs/10.1137/1.9781611974317.4, doi:10.1137/1.9781611974317.4.
[33] Ulrich Meyer and Peter Sanders. Delta-stepping: A parallel single source shortest path
algorithm. In Algorithms - ESA โ98, 6th Annual European Symposium, Venice, Italy, August 24-26, 1998, Proceedings, pages 393โ404, 1998. URL: http://dx.doi.org/10.1007/
3-540-68530-8_33, doi:10.1007/3-540-68530-8_33.
[34] Ulrich Meyer, Peter Sanders, and Jop F. Sibeyn, editors. Algorithms for Memory Hierarchies, Advanced Lectures [Dagstuhl Research Seminar, March 10-14, 2002], volume 2625 of
Lecture Notes in Computer Science. Springer, 2003.
[35] Ron Milo, Nadav Kashtan, Shalev Itzkovitz, Mark E. J. Newman, and Uri. Alon. On the
uniform generation of random graphs with prescribed degree sequences. eprint arXiv:condmat/0312028, December 2003. arXiv:cond-mat/0312028.
[36] Rajeev Motwani and Prabhakar Raghavan. Randomized algorithms. Chapman & Hall/CRC,
2010.
[37] Mark Newman. Networks: An Introduction. Oxford University Press, Inc., New York, NY,
USA, 2010.
[38] Rasmus Pagh. Basic external memory data structures. In Algorithms for Memory Hierarchies, pages 14โ35. Springer, 2003.
[39] Jaideep Ray, Ali Pinar, and C. Seshadhri. Are We There Yet? When to Stop a
Markov Chain while Generating Random Graphs. In Algorithms and Models for the
26
Web-Graph, Proceedings of the 9th International Workshop, WAW 2012, Lecture Notes
in Computer Science, pages 153โ164. Springer, 2012. URL: https://doi.org/10.1007/
978-3-642-30541-2_12.
[40] Martin Rosvall, Daniel Axelsson, and Carl T. Bergstrom. The map equation. The European
Physical Journal Special Topics, 178(1):13โ23, 2009. URL: http://dx.doi.org/10.1140/
epjst/e2010-01179-1.
[41] Peter Sanders. Random permutations on distributed, external and hierarchical memory. Inf.
Process. Lett., 67(6):305โ309, 1998. URL: http://dx.doi.org/10.1016/S0020-0190(98)
00127-6, doi:10.1016/S0020-0190(98)00127-6.
[42] Peter Sanders. Fast priority queues for cached memory. Journal of Experimental Algorithmics (JEA), 5, 2000.
[43] Wolfgang E. Schlauch, Emoฬke Aฬgnes Horvaฬt, and Katharina A. Zweig. Different flavors of randomness: comparing random graph models with fixed degree sequences. Social Network Analysis and Mining, 5(1):1โ14, 2015. URL: http://dx.doi.org/10.1007/
s13278-015-0267-z, doi:10.1007/s13278-015-0267-z.
[44] Christian Staudt, Aleksejs Sazonovs, and Henning Meyerhenke. Networkit: A tool suite for
large-scale complex network analysis. Network Science, 4(4):508530, 2016. doi:10.1017/
nws.2016.20.
[45] The Lemur Project. ClueWeb12 Web Graph, Nov 2013. http://www.lemurproject.org/
clueweb12/webgraph.php.
[46] Johan Ugander, Brian Karrer, Lars Backstrom, and Cameron Marlow. The anatomy of the
facebook social graph. CoRR, abs/1111.4503, 2011. URL: http://arxiv.org/abs/1111.
4503.
[47] Fabien Viger and Matthieu Latapy. Fast generation of random connected graphs with
prescribed degrees. CoRR, abs/cs/0502085, 2005. Source code available at https:
//www-complexnetworks.lip6.fr/~latapy/FV/generation.html. URL: http://arxiv.
org/abs/cs/0502085.
[48] Jeffrey Scott Vitter. An efficient algorithm for sequential random sampling. ACM Trans.
Math. Softw., 13(1):58โ67, 1987. URL: http://doi.acm.org/10.1145/23002.23003, doi:
10.1145/23002.23003.
[49] Jianping Zeng and Hongfeng Yu. A study of graph partitioning schemes for parallel graph
community detection. Parallel Computing, 2016. URL: http://dx.doi.org/10.1016/j.
parco.2016.05.008.
[50] James Y. Zhao. Expand and contract: Sampling graphs with given degrees and other
combinatorial families. CoRR, abs/1308.6627, 2013. URL: http://arxiv.org/abs/1308.
6627.
27
A
Summary of Definitions
Symbol
[k]
[u, v]
B
dmin , dmax
din
v
D
DD
n
m
ยต
M
Pld ([a, b), ฮณ)
smin , smax
scan(n)
sort(n)
Description
[k] := {1, . . . , k} for k โ N+ (section 2)
Undirected simple edge with implication u < v (section 2)
Number of items in a block transferred between IM and EM (section 2.1)
Min/max degree of nodes in LFR benchmark (section 3)
din
v = (1โยต) ยท dv , intra-community degree of node v (section 3)
D = (d1 , . . . , dn ) with di โค di+1 โi. Degree sequence of a graph
(section 4)
DD = {di : 1 โค i โค n} where D = (d1 , . . . , dn ), degree support
(section 4)
Number of vertices in a graph (section 2)
Number of edges in a graph (section 2)
Mixing parameter in LFR benchmark, i.e. ratio of neighbors that
shall be in other communities (section 3)
Number of items fitting into internal memory (section 2.1)
Powerlaw distribution with exponent โฮณ on the interval [a, b) (section 2)
Min/max size of communities in LFR benchmark (section 3)
scan(n) = ฮ(n/B) I/Os, scan complexity (section 2.1)
sort(n) = ฮ((n/B) ยท logM/B (n/B)) I/Os, sort complexity (section 2.1)
Table 2: Definitions used in this paper.
28
B
Comparing LFR Implementations
Mixing ยต = 0.4, Cluster: Infomap
0.8
0.8
0.8
0.6
0.6
0.2
0
0.4
Orig
NetworKit
EM
103
0.2
104
0
105
AR
1
0.4
103
104
0.8
Orig
NetworKit
EM
0.6
0.4
0.2
0
105
NMI
0.8
0.6
104
Orig
NetworKit
EM
103
0.4
0
105
Mixing ยต = 0.4, Cluster: Louvain
0.8
0.8
0.6
0.6
0.4
Orig
NetworKit
EM
0.2
104
0
105
AR
0.8
AR
1
103
103
0.2
104
0
105
Mixing ยต = 0.4, Cluster: Louvain
0.8
0.8
0.6
Orig
NetworKit
EM
0.6
0.4
0.2
104
0
105
NMI
0.8
NMI
1
103
Orig
NetworKit
EM
103
Number n of nodes
0.4
0.2
104
0
105
Mixing: ยต = 0.4
106
106
106
Orig
NetworKit
EM
105
Orig
NetworKit
EM
104
103
105
103
Mixing: ยต = 0.2
Orig
NetworKit
EM
1
0.8
0.6
0.4
0.2
0
103
104
Number n of nodes
Orig
NetworKit
EM
104
103
105
103
105
Orig
NetworKit
EM
0.8
0.6
0.4
0.2
0
103
104
Number n of nodes
104
105
Number n of nodes
Mixing: ยต = 0.4
1
105
105
Number n of nodes
Avg. Local Clustering Coeff.
Number n of nodes
104
105
Avg. Local Clustering Coeff.
104
Edges
107
Edges
108
107
105
104
Mixing: ยต = 0.6
108
103
103
Number n of nodes
107
103
Orig
NetworKit
EM
Number n of nodes
Mixing: ยต = 0.2
105
0.6
108
104
104
Mixing ยต = 0.6, Cluster: Louvain
1
0
103
Number n of nodes
1
0.2
Orig
NetworKit
EM
Number n of nodes
Mixing ยต = 0.2, Cluster: Louvain
105
0.6
0.4
Orig
NetworKit
EM
Number n of nodes
0.4
104
Mixing ยต = 0.6, Cluster: Louvain
1
0
103
Number n of nodes
1
0.2
Orig
NetworKit
EM
Number n of nodes
Mixing ยต = 0.2, Cluster: Louvain
105
0.6
0.2
104
Number n of nodes
0.4
104
Mixing ยต = 0.6, Cluster: Infomap
0.8
103
103
Number n of nodes
1
0.4
Orig
NetworKit
EM
Mixing ยต = 0.4, Cluster: Infomap
NMI
NMI
105
1
0
AR
0
1
0.2
NMI
0.2
Number n of nodes
Mixing ยต = 0.2, Cluster: Infomap
Edges
0.6
0.4
Orig
NetworKit
EM
Number n of nodes
Avg. Local Clustering Coeff.
Mixing ยต = 0.6, Cluster: Infomap
1
AR
AR
Mixing ยต = 0.2, Cluster: Infomap
1
Mixing: ยต = 0.6
Orig
NetworKit
EM
1
0.8
0.6
0.4
0.2
0
103
104
105
Number n of nodes
Comparison of the original LFR implementation, the NetworKit implementation and our
EM solution for values of 103 โค n โค 106 , ยตโ{0.2, 0.4, 0.6}, ฮณ=2, ฮฒ= โ 1 dmin =10, dmax =n/20,
smin =10, smax =n/20. Clustering is performed using Infomap and Louvain and compared to
the ground-truth emitted by the generator using AdjustedRandMeasure (AR) and Normalized
Mutual Information (NMI); S โฅ 8. Due to the computational costs, graphs with n โฅ 105 have
a reduced multiplicity. In case of the original implementation it may be based on a single run
which accounts for the few outliers.
29
Mixing: ยต = 0.2, Cluster: OSLOM, Overlap: ฮฝ = 2
Mixing: ยต = 0.4, Cluster: OSLOM, Overlap: ฮฝ = 2
Orig
EM
1
0.4
0.2
0.6
0.4
0.2
104
0
105
Orig
EM
0.8
0.6
0.4
0.2
103
104
105
Orig
EM
0.6
0.4
0.2
0
103
0.6
0.4
0.2
104
0.6
0.4
0.2
103
0
0
104
105
0.4
0.2
104
105
0.4
0.2
104
Orig
EM
0.8
0.6
0.4
0.2
0
103
105
0.4
103
0.6
0.4
0.2
104
Mixing: ยต = 0.6
Orig
EM
0.8
0.6
0.4
0.2
0
103
0.8
0.6
0.4
0.2
103
0.2
Orig
EM
0.8
0.6
0.4
0
105
0.6
0.4
0.2
103
104
0
105
103
Number n of nodes
Orig
EM
0.8
0.6
0.4
0.2
105
Avg. Local Clustering Coeff.
Number n of nodes
Mixing: ยต = 0.2
Orig
EM
0.8
0.6
0.4
0.2
103
104
Number n of nodes
30
104
105
Number n of nodes
Mixing: ยต = 0.4
1
0
105
Mixing: ยต = 0.6, Cluster: OSLOM, Overlap: ฮฝ = 4
1
0.2
104
104
Number n of nodes
NMI
NMI
0.4
105
Orig
EM
1
0
105
0.8
0.6
104
Mixing: ยต = 0.6, Degree Assortativity, Overlap: ฮฝ = 3
Orig
EM
1
105
Number n of nodes
Orig
EM
103
104
1
Mixing: ยต = 0.4, Cluster: OSLOM, Overlap: ฮฝ = 4
Orig
EM
105
Orig
EM
Number n of nodes
0.8
NMI
105
0.8
Mixing: ยต = 0.2, Cluster: OSLOM, Overlap: ฮฝ = 4
Avg. Local Clustering Coeff.
104
1
0
104
Number n of nodes
Mixing: ยต = 0.4
Number n of nodes
Number n of nodes
103
0.6
0
105
Degree Assortativity
0.6
104
0.2
Mixing: ยต = 0.4, Degree Assortativity, Overlap: ฮฝ = 3
Degree Assortativity
Degree Assortativity
Orig
EM
103
0.4
Number n of nodes
0.8
0
104
1
Mixing: ยต = 0.2, Degree Assortativity, Overlap: ฮฝ = 3
1
0.6
0.2
103
Number n of nodes
103
0.8
1
Avg. Local Clustering Coeff.
0.6
Avg. Local Clustering Coeff.
Avg. Local Clustering Coeff.
0.8
0
Orig
EM
1
Number n of nodes
Orig
EM
105
0.8
Number n of nodes
Mixing: ยต = 0.2
104
Mixing: ยต = 0.6, Cluster: OSLOM, Overlap: ฮฝ = 3
Orig
EM
0.4
0.2
1
103
Number n of nodes
0.6
0.2
103
0
0
105
NMI
NMI
NMI
0.4
1
0.2
Mixing: ยต = 0.6, Degree Assortativity, Overlap: ฮฝ = 2
0.8
0.6
0
104
1
0.8
103
0.4
Mixing: ยต = 0.4, Cluster: OSLOM, Overlap: ฮฝ = 3
Orig
EM
1
0.6
Number n of nodes
Mixing: ยต = 0.2, Cluster: OSLOM, Overlap: ฮฝ = 3
103
Orig
EM
0.8
Number n of nodes
Orig
EM
Number n of nodes
0
105
0.8
0
105
105
Mixing: ยต = 0.6
Mixing: ยต = 0.4, Degree Assortativity, Overlap: ฮฝ = 2
Degree Assortativity
Degree Assortativity
0.8
1
104
1
104
1
Number n of nodes
Orig
EM
103
103
Number n of nodes
0.8
Mixing: ยต = 0.2, Degree Assortativity, Overlap: ฮฝ = 2
0
0
105
Mixing: ยต = 0.4
1
Number n of nodes
1
104
Avg. Local Clustering Coeff.
Mixing: ยต = 0.2
0
0.4
Number n of nodes
Avg. Local Clustering Coeff.
Avg. Local Clustering Coeff.
Number n of nodes
1
0.6
0.2
103
Degree Assortativity
103
105
Avg. Local Clustering Coeff.
0
0.8
NMI
0.6
Orig
EM
1
0.8
NMI
NMI
0.8
Mixing: ยต = 0.6, Cluster: OSLOM, Overlap: ฮฝ = 2
Orig
EM
1
Mixing: ยต = 0.6
Orig
EM
1
0.8
0.6
0.4
0.2
0
103
104
Number n of nodes
105
0.8
0.6
0.4
0.2
0
103
104
Number n of nodes
Mixing: ยต = 0.4, Degree Assortativity, Overlap: ฮฝ = 4
105
Orig
EM
1
0.8
0.6
0.4
0.2
0
103
104
Number n of nodes
Mixing: ยต = 0.6, Degree Assortativity, Overlap: ฮฝ = 4
Degree Assortativity
Orig
EM
Degree Assortativity
Degree Assortativity
Mixing: ยต = 0.2, Degree Assortativity, Overlap: ฮฝ = 4
1
105
Orig
EM
1
0.8
0.6
0.4
0.2
0
103
104
105
Number n of nodes
Comparison of the original LFR implementation and our EM solution for values values
of 103 โค n โค 106 , ยตโ{0.2, 0.4, 0.6}, ฮฝโ{2, 3, 4}, O = n, ฮณ=2, ฮฒ= โ 1 dmin =10, dmax =n/20,
smin =10ฮฝ, smax =ฮฝ ยท n/20. Clustering is performed using OSLOM and compared to the groundtruth emitted by the generator using a generalized Normalized Mutual Information (NMI);
S โฅ 5.
31
Comparing EM-ES and EM-CM/ES
Mean after 5m swaps
EM-ES, S = 1170
EM-CMES, S = 600
ร107
2
3
Number of swaps per edge k/m
4
3.05
3.00
2.95
2.90
2.85
7.5
7.0
6.5
6.0
5.5
5
Nodes: 105 , Mixing: 1.0
ร109
Mean after 5m swaps
EM-ES, S = 1138
EM-CMES, S = 600
ร108
0
1
Nodes: 105 , Mixing: 0.2
0.90
0.88
0.86
0.84
0.82
0.80
0.50
0.48
0.46
0.44
0.42
0.40
1
4
1
2
3
Number of swaps per edge k/m
4
2.4
2.2
2.0
1.8
1.6
1.4
1.2
5
1
2
3
Number of swaps per edge k/m
4
5
Nodes: 107 , Mixing: 1.0
ร1010
Mean after 5m swaps
EM-ES, S = 20
EM-CMES, S = 20
ร109
0
0.50
0.48
0.46
0.44
0.42
4
6.38
6.36
6.34
6.32
6.30
6.28
6.26
5
Mean after 5m swaps
EM-ES, S = 40
EM-CMES, S = 40
2
3
Number of swaps per edge k/m
5
Mean after 5m swaps
EM-ES, S = 1138
EM-CMES, S = 720
0
Nodes: 107 , Mixing: 0.2
1
4
0.39
0.38
0.37
0.36
0.35
0.34
0.33
0.32
5
Mean after 5m swaps
EM-ES, S = 40
EM-CMES, S = 40
1.00
0.98
0.96
0.94
0.92
0.90
0
0.61
0.60
0.59
0.58
0.57
0.56
0.55
0.54
Nodes: 107 , Mixing: 0.2
ร108
5.12
5.10
5.08
5.06
5.04
5.02
ร107
2.0
1.8
1.6
1.4
1.2
1.0
0
2
3
Number of swaps per edge k/m
2
3
Number of swaps per edge k/m
Nodes: 105 , Mixing: 1.0
Mean after 5m swaps
EM-ES, S = 1170
EM-CMES, S = 600
0
Number of triangles
1
Number of triangles
Degree assortativity
0
Degree assortativity
Number of triangles
1.3
1.2
1.1
1.0
0.9
0.8
Nodes: 105 , Mixing: 0.2
ร108
Degree assortativity
1.25
1.24
1.23
1.22
1.21
1.20
Degree assortativity
Number of triangles
C
1
2
3
Number of swaps per edge k/m
4
5
Nodes: 107 , Mixing: 1.0
1.00
0.98
0.96
0.94
0.92
0.90
Mean after 5m swaps
EM-ES, S = 20
EM-CMES, S = 20
0.50
0.48
0.46
0.44
0.42
0
1
2
3
Number of swaps per edge k/m
4
5
Triangle count and degree assortativity of a graph ensemble obtained by applying random
swaps/the Configuration Model to a common seed graph. Refer to section 10.6 for experimental
details.
32
| 8cs.DS
|
arXiv:1510.08568v2 [cs.NE] 8 Apr 2016
Feature-Based Diversity Optimization for
Problem Instance Classification
Wanru Gao
Optimisation and Logistics
School of Computer Science
The University of Adelaide
Adelaide, Australia
Samadhi Nallaperuma
Department of Computer Science
The University of Sheffield
Sheffield,UK
Frank Neumann
Optimisation and Logistics
School of Computer Science
The University of Adelaide
Adelaide, Australia
April 11, 2016
Abstract
Understanding the behaviour of heuristic search methods is a challenge. This
even holds for simple local search methods such as 2-OPT for the Traveling Salesperson problem. In this paper, we present a general framework that is able to construct a diverse set of instances that are hard or easy for a given search heuristic.
Such a diverse set is obtained by using an evolutionary algorithm for constructing hard or easy instances that are diverse with respect to different features of
the underlying problem. Examining the constructed instance sets, we show that
many combinations of two or three features give a good classification of the TSP
instances in terms of whether they are hard to be solved by 2-OPT.
1
Introduction
Heuristic search methods such as local search, simulated annealing, evolutionary algorithms and ant colony optimization have been shown to be very successful for various
combinatorial optimization problems. Although they usually donโt come with performance guarantees on their runtime and/or approximation behaviour, they often perform
very well in several situations. Understanding the conditions under which optimization
algorithms perform well is essential for automatic algorithm selection, configuration
and effective algorithm design. In both the artificial intelligence (AI) [23, 9, 22, 5, 7]
and operational research communities [17, 21], this topic has become a major point of
interest.
1
The feature-based analysis of heuristic search algorithms has become an important
part in understanding such type of algorithms [11, 18]. This approach characterizes
algorithms and their performance for a given problem based on features of problem
instances. Thereby, it provides an important tool for bridging the gap between pure
experimental investigations and mathematical methods for analysing the performance
of search algorithms [15, 10, 6]. Current methods for the feature-based analysis are
based on constructing hard and easy instances for an investigated search heuristic and a
given optimization problem by evolving instances using an evolutionary algorithm [11,
14, 13]. This evolutionary algorithm constructs problem instances where the examined
algorithm either shows a bad (good) approximation behaviour and/or requires a large
(small) computational effort to come up with good or optimal solutions. Although the
evolutionary algorithm for constructing such instances is usually run several times to
obtain a large set of hard (easy) instances, the question arises whether the results in
terms of features of the instances obtained give a good characterization of problem
difficulty.
In the paper, we propose a new approach of constructing hard and easy instances.
Following some recent work on using evolutionary algorithms for generating diverse
sets of instances that are all of high quality [19, 20], we introduce an evolutionary algorithm which maximizes diversity of the obtained instances in terms of a given feature.
Our approach allows to generate a set of instances that is much more diverse with respect to the problem feature at hand. Carrying out this process for several features of
the considered problem and algorithm gives a much better classification of instances
according to their difficulty of being solved by the considered algorithm.
To show the benefit of our approach compared to previous methods, we consider the
classical 2-OPT algorithm for the TSP. Previous feature-based analyses have already
considered hard and easy instances in terms of approximation ratio and analyzed the
features of such hard (easy) instances obtained by an evolutionary algorithm. The experimental results of our new approach show that diversity optimization of the features
results in an improved coverage of the feature space over classical instance generation
methods. In particular, the results show that for some combinations of two features it is
possible to classify hard and easy instances into two clusters with a wider coverage of
the feature space compared to the classical methods. Moreover, the three-feature combinations further improve the classification of hard and easy instances for most of the
feature combinations. Furthermore, a classification model is built using these diverse
instances that can classify TSP instances based on hardness for 2-OPT.
The remainder of this paper is organized as follows. Firstly, we introduce the Euclidean TSP and the background on feature based analysis. Afterwards, we state our
diversity optimization approach for evolving instances according to feature values and
report on the impact of diversity optimization in terms of the range of feature values.
As features value can be very diverse both for easy and hard instances, we consider the
combinations of several features for instance classification afterwards. We then build
a classification model that can classify instances based on hardness and finally finish
with some conclusions.
2
2
Background
We consider the classical NP-hard Euclidean Traveling Salesperson problem (TSP) as
the example problem for evolving hard and easy instances which have a diverse set of
features. Our methodology can be applied to any optimization problem, but using the
TSP in our study has the advantage that it has already been investigated extensively
from different perspectives including the area of feature-based analysis.
The input of the problem is given by a set V = {v1 , ..., vn } of n cities in the Euclidean plane and Euclidean distances d : V รV โ Rโฅ0 between the cities. The goal is
to find a Hamiltonian cycle whose sum of distances is minimal. A candidate solution
for the TSP is often represented by a permutation ฯ = (ฯ1 , . . . , ฯn ) of the n cities and
the goal is to find a permutation ฯ โ which minimizes the tour length given by
nโ1
c(ฯ) = d(ฯn , ฯ1 ) + โ d(ฯi , ฯi+1 ).
i=1
For our investigations cities are always in the normalized plane [0, 1]2 , i. e. each city
has an x- and y-coordinate in the interval [0, 1]. In following, a TSP instance always
consists of a set of n points in [0, 1]2 and the Euclidean distances between them.
Local search heuristics have been shown to be very successful when dealing with
the TSP and the most prominent local search operator is the 2-OPT operator [4]. The
resulting local search algorithm starts with a random permutation of the cities and
repeatedly checks whether removing two edges and reconnecting the two resulting
paths by two other edges leads to a shorter tour. If no improvement can be found by
carrying out any 2-OPT operation, the tour is called locally optimal and the algorithm
terminates.
The key factor in the area of feature-based analysis is to identify the problem features and their contribution to the problem hardness for a particular algorithm and problem combination. This can be achieved through investigating hard and easy instances
of the problem. Using an evolutionary algorithm, it is possible to evolve sets of hard
and easy instances by maximizing or minimizing the fitness (tour length in the case of
the TSP) of each instance [21, 17, 11, 18]. However, none of these approaches have
considered the diversity of the instances explicitly. Within this study we expect to improve the evolutionary algorithm based instance generation approach by introducing
diversity optimization.
The structural features are dependent on the underlying problem. In [11], there are
47 features in 8 groups used to provide an understanding of algorithm performance
for the TSP. The different feature classes established are distance features, mode features, cluster features, centroid features, MST features, angle features and convex hull
features. The feature values are regarded as indicators which allow to predict the performance of a given algorithm on a given instance.
3
Feature-Based Diversity Optimization
In this section, we introduce our approach of evolving a diverse set of easy or hard
instances which are diverse with respect to important problem features. As in previous
3
Algorithm 1: (ยต + ฮป )-EAD
1
2
3
4
5
Initialize the population P with ยต TSP instances of approximation ratio at least
ฮฑh .
Let C โ P where |C| = ฮป .
For each I โ C, produce an offspring I 0 of I by mutation. If ฮฑA (I 0 ) > ฮฑh , add I 0
to P.
While |P| > ยต, remove an individual I = arg minJโP d(J, P) uniformly at
random.
Repeat step 2 to 4 until termination criterion is reached.
studies, we measure hardness of a given instance by the ratio of the solution quality
obtained by the considered algorithm and the value of an optimal solution.
The approximation ratio of an algorithm A for a given instance I is defined as
ฮฑA (I) = A(I)/OPT (I)
where A(I) is value of the solution produced by algorithm A for the given instance
I, and OPT (I) is value of an optimal solution for instance I. Within this study, A(I)
is the tour length obtained by 2-OPT for a given TSP instance I and OPT (I) is the
optimal tour length which we obtain in our experiments by using the exact TSP solver
Concorde [1].
We propose to use an evolutionary algorithm to construct sets of instances of the
TSP that are quantified as either easy or hard in terms of approximation and are diverse
with respect to underlying features of the produced problem instances. Our evolutionary algorithm (shown in Algorithm 1) evolves instances which are diverse with respect
to given features and meet given approximation ratio thresholds.
The algorithm is initialized with a population P consisting of ยต TSP instances
which have an approximation ratio at least ฮฑh in the case of generating a diverse set of
hard instances. In the case of easy instances, we start with a population where all instances have an approximation ratio of at most ฮฑe and only instances of approximation
ratio at most ฮฑe can be accepted for the next iteration. In each iteration, ฮป โค ยต offspring
are produced by selecting ฮป parents and applying mutation to the selected individuals.
Offsprings that donโt meet the approximation threshold are rejected immediately.
The new parent population is formed by reducing the set consisting of parents and
offsprings satisfying the approximation threshold until a set of ยต solutions is achieved.
This is done by removing instances one by one based on their contribution to the diversity according to the considered feature.
The core of our algorithm is the selection among individuals meeting the threshold
values for the approximation quality according to feature values. Let I1 , . . . , Ik be the
elements of P and f (Ii ) be their features values. Furthermore, assume that f (Ii ) โ [0, R],
i.e. feature values are non-negative and upper bounded by R.
We assume that f (I1 ) โค f (I2 ) โค . . . โค f (Ik ) holds. The diversity contribution of an
instance I to a population of instances P is defined as
d(I, P) = c(I, P)
4
where c(I, P) is a contribution based on other individuals in the population
Let Ii be an individual for which f (Ii ) 6= f (I1 ) and f (Ii ) 6= f (Ik ). We set
c(Ii , P) = ( f (Ii ) โ f (Iiโ1 )) ยท ( f (Ii+1 ) โ f (Ii ))
which assigns the diversity contribution of an individual based on the next smaller
and next larger feature values. If f (Ii ) = f (I1 ) or f (Ii ) = f (Ik ), we set c(Ii , P) = R2 if
there is no other individual I 6= Ii in P with f (I) = f (Ii ) and c(Ii , P) = 0 otherwise. This
implies an individual Ii with feature value equal to any other instances in the population
gains c(Ii , P) = 0.
Furthermore, an individual with the unique smallest and largest feature value always stays in the population when working with ยต โฅ 2.
In [11], 47 features of TSP instances for characterizing easy and hard TSP instances
have been studied. We consider 7 features coming from different feature classes which
have shown to be well suited for classification and prediction. These features are:
โข angle mean :- mean value of the angles made by each point with its two nearest
neighbor points
โข centroid mean distance to centroid :- mean value of the distances from the points
to the centroid
โข chull area : - area covered by the convex hull
โข cluster 10pct mean distance to centroid :- mean value of the distances to cluster
centroids at 10% levels of reachability
โข mst depth mean :- mean depth of the minimum spanning tree
โข nnds mean :- mean distance between nearest neighbours
โข mst dists mean :- mean distance of the minimum spanning tree
We refer the reader to [11] for a detailed explanation for each feature. We carry
out our diversity optimization approach for these features and use the evolutionary
algorithm to evolve for each feature a diverse population of instances that meets the
approximation criteria for hard/easy instances given by the approximation ratio thresholds.
All programs in our experiments are written in R and run in R environment [16].
We use the functions in tspmeta package to compute the feature values [11].
The setting of the evolutionary algorithm for diversity optimization used in our
experiments is as follows. We use ยต = 30 and ฮป = 5 for the parent and offspring
population size, respectively. The 2-OPT algorithm is executed on each instance I five
times with different initial solutions and we set A(I) to the average tour length obtained.
The examined instance sizes n are 25, 50 and 100, which are denoted by the number of
cities in one instance. Based on previous investigations in [11] and initial experimental
investigations, we set ฮฑe = 1 for instances of size 25 and 50, and ฮฑe = 1.03 for instances
of size 100. Evolving hard instances, we use ฮฑh = 1.15, 1.18, 1.2 for instances of size
n = 25, 50, 100, respectively. The mutation operator picks in each step one city for the
5
Figure 1: (left)The boxplots for centroid mean distance to centroid feature values of a
population consisting of 100 different hard or easy TSP instances of different number of cities
without or with diversity mechnism.(right)The boxplots for cluster 10% distance distance to
centroid feature values of a population consisting of 100 different hard or easy TSP instances of
different number of cities without or with diversity mechnism. Easy and hard instances from
conventional approach and diversity optimization are indicated by e(a), h(a) and e(b), h(b)
respectively.
given parent uniformly at random and changes its x- and y-coordinator by choosing an
offset according to the Normal-distribution with standard deviation ฯ . Coordinates that
are out of the interval are reset to the value of the parent. Based on initial experiments
we use two mutation operators with different values of ฯ . We use ฯ = 0.025 with
probability 0.9 and ฯ = 0.05 with probability 0.1 in a mutation step. The evolutionary
algorithm terminates after 10, 000 generations which allows to obtain a good diversity
for the considered features. For each n = 25, 50, 100 and each of the 7 features, a set
of easy and hard instances are generated, which results in 42 independent runs of the
(ยต+ฮป )-EAD .
4
Range of Feature Values
We first evaluate our diversity optimization approach in terms of the diversity that is
obtained with respect to a single feature. Focusing on a single feature in each run
provides the insight of the possible range of a certain feature value for hard or easy
instances. The previous study [11], suggests that there are some differences in the
possible range of feature values for easy and hard instances. We study the effect of the
diversity optimization on the range of features by comparing the instances generated by
diversity optimization to the instances generated by the conventional approach in [11].
Evolving hard instances based on the conventional evolutionary algorithm, the obtained
instances have mean approximation ratios of 1.12 for n = 25, 1.16 for n = 50, and 1.18
for n = 100. For easy instances, the mean approximation ratios are 1 for n = 25, 50 and
1.03 for n = 100.
Figure 1 (left) presents the variation of the mean distance of the distances between
points and the centroid feature (centroid mean distance to centroid) for hard and easy
instances of the three considered sizes 25, 50 and 100. Each set consists of 100 instances generated by independent runs [11]. As shown in Figure 1 (left) the hard in6
stances have higher feature values than for easy instances for all instance sizes. For
example, for instance size 100 and for the hard instances the median value (indicated
by the red line) is 0.4157 while its only 0.0.4032 for the easy instances. The respective
range of the feature value is 0.0577 for the hard instances and 0.0645 for the easy instances. For the instances generated by diversity optimization (easy and hard instances
are indicated by e (b) and h (b) respectively), there is a difference in the median feature
values for the hard and easy instances similar to the instances generated by the conventional approach. Additionally, the range of the feature values for both the hard and easy
instances has significantly increased. For example, for the instance size 100, the median value for easy instances is 0.4028 and the range is 0.2382. For the hard instances
of the same size, the median is 0.04157 while the range is 0.1917 (see Figure 1 (left)).
Similarly, Figure 1 (right) presents the variation of cluster 10% distance to centroid
(cluster 10pct distance to centroid) feature for the hard and easy instances generated
by the conventional approach (indicated by (e (a) and h (a)) and for the hard and easy
instances generated by diversity optimization (indicated by (e (b) and h (b))). The general observations from these box plots are quite similar to the observations from the
mst dist mean shown in Figure 1 (left). For the easy instances of size 100, the range
of the feature value is 0.0919 for conventional instances and 0.3471 for the instances
generated by diversity optimization. Similarly, for the hard instances the range of the
feature values has increased from 0.0577 to 0.1776 by the diversity optimization approach. As shown in Figure 1 (right), there is a significant increase in the range for
other instance sizes as well. Improved ranges in feature values are observed for all
considered features however, due to space limitations these are not included in the paper.
The above results suggest that the diversity optimization approach has resulted in
a significant increase in the coverage over the feature space. Having the threshold for
approximation ratios (ฮฑe and ฮฑh ) our method guarantees the hardness of the instances.
These approximation thresholds are more extreme than the mean approximation values
obtained by the conventional method. Furthermore, starting with initial population of
duplicated instances and a hard coded threshold, the modified (ยต + ฮป )-EA is able to
achieve hard instances with approximation ratio 1.347, 1.493 and 1.259, respectively
for instance size 25, 50 and 100. The majority of the instances are clustered in a small
region in the feature space while some other points are dispersed across the whole
space. This is evident in the median values similar to the values for the instances with
respect to conventional approach and with significantly larger range in feature value.
The conventional approach has failed to explore certain regions in the feature space
and missed some instances existing in those regions. Being able to discover all these
instances spread in the whole feature space, our approach provides a strong basis for
more effective feature based prediction.
As a result of the increased ranges and the similar gap in median feature values
for hard and easy instances compared to the conventional instances, there is a strong
overlap in the ranges of the features for easy and hard instances generated by the
diversity optimization. This is observed in the results for mst dist mean and cluster 10pct distance to centroid shown in Figure 1. Similar pattern holds for the other
features as well. This prevents a good classification of problem instances based on
single feature value.
7
Figure 2: 2D Plots of feature combinations which provide a separation between easy
and hard instances. The blue dots and orange dots represent hard and easy instances
respectively.
5
Classification Based on Multiple Features
As a single feature is not capable in clearly classifying the hard/easy instances, combinations of two or three different features are examined in the following. Our analysis
mainly focuses on combinations of the 7 previously introduced features.
5.1
Diversity Maximization over Single Feature Value
Firstly, we represent the instances according to the combination of two different features in the 2-dimensional feature value space (see Figure 2 for an example).
According to the observation and discussion in [11], the two features distance max
and angle mean can be considered together to provide an accurate classification of the
hard and easy instances. Whereas after increasing the diversity over the seven different
feature values and a wider coverage of the 2D space is achieved, the separation of easy
and hard instances is not so obvious. The clusters of dots representing hard and easy
instances have some overlapping as shown in the left graphs of Figure 2. There are
large overlapping areas lying between the two groups of instances. Another example
of some separation given by two-feature combination is mst dists mean and chull area
which measure the mean distance of the minimum spanning tree and the area of the
convex hull. However, as the number of cities in an instance increases, the overlapping
area becomes larger. It is hard to do classification based on this.
8
Figure 3: 2D Plots of feature combinations which does not provide a clear separation
between easy and hard instances. The blue dots and orange dots represent hard and
easy instances respectively.
After examining the 21 different combinations of two features out of the seven
features, we found out that some combinations of two features provide a fair separation
between hard and easy instances after increasing the diversity over different feature
values. As shown in Figure 2, taking both mst dists mean and chull area features
into consideration, some separations can be spotted between hard and easy instances.
However, most combinations are not able to give a clear classification between hard and
easy instances, for example in Figure 3, neither the combination of features nnds mean
and centroid mean distance to centroid nor features mst depth mean and chull area
shows clear classification between instances of different hardness. Moreover, along
with the instance size increment, the overlapping area of the dots standing for hard and
easy instances grows.
Since the majority of two-feature combinations are not capable of classifying easy
and hard instances, the idea of combining three different feature is put forward. As in
the analysis of two-feature combination, the values of the three selected features are
plotted in 3D space.
By considering a third feature in the combination, in the 35 different combinations,
it is clear that there are some separations between the two groups of 210 instances
from the 3D-plots. A good selection of features results in an accurate classification
of the instances. The three-feature combinations with the features measuring statistics
about minimum spanning tree always provide good separation between hard and easy
instances as shown in Figure 4 and Figure 5. Although there is an overlapping in the
9
area between the two clusters of hard and easy instances, from the 3D-plots, we can
spot some areas where there are only dots for instances of certain hardness.
Taken another feature value into consideration, the two-feature combination that
is not able to provide good separation can give some clear classification in hard and
easy instances. An example illustrating this is included as Figure 6, where together
with an additional feature mst dists mean, the two-feature combination of features
mst depth mean and chull area shows a clear separation between easy and hard instances comparing to the results shown in the left graph in Figure 3.
From the investigation of both the two-feature combination and three-feature combination, we found out that the range of feature values for larger TSP instances is
smaller. Some of the good combinations for classifying the hardness of smaller instances may not work for larger instances, such as centroid features which performs
well when combining with another feature in classifying the hardness of instances of
25 cities while does not show a clear separation with instance size 50 and 100 in our
study. However, there exist some three-feature combinations that give good classification of easy and hard instances without regarding to the instance size, for example mst dists mean, chull area and nnds mean, and mst dists mean, chull area and
mst depth mean.
5.2
Diversity Maximization over Multiple Feature Values
In order to examine the relationship between feature combination and hardness of the
instances, a weighted population diversity based on multiple features is introduced.
The weighted population diversity for a certain set of features { f1 , f2 , ..., fk } is defined
as the weighted sum of the normalised population diversity over these k features. The
contribution of an instance I to the weighted population diversity is defined as
k
d 0 (I, P) = โ (wi ยท d fi (I, P)),
i=1
where d fi (I, P) denotes the normalised contribution to the population diversity d(I, P)
over certain feature i and wi represents the weight of feature i. The contribution of an
individual to the population diversity on certain feature is normalised based on the maximum population diversity on the feature, in order to reduce the bias among different
features.
This weighted population diversity is used in Algorithm 1 to gain some insight
of the relationship between features combination and instance quality. The same parent and offspring population sizes are used for these experiments, which are ยต = 30
and ฮป = 5. The instance sizes examined are still 25, 50 and 100. The 2-OPT algorithm is executed five times to obtain the approximation quality. In the experiments,
(ยต+ฮป )-EAD execute for 10, 000 generation as previous. Since it is shown in Section 4
that a combination of three features is able to provide a good separation between hard
and easy instances, some of the good three-feature combinations are chosen for exploration. The weight distributions for { f1 , f2 , f3 } considered in the experiments are
{1, 1, 1}, {2, 1, 1}, {1, 2, 1}, {1, 1, 2}, {2, 2, 1}, {2, 1, 2}, {1, 2, 2}. The same hardness
thresholds are used in these experiments as previous. After the seven independent runs
10
Figure 4: 3D Plots of combining experiment results from maximizing the diversity
over features mst dists mean, nnds mean and chull area, which provides a good
separation of easy and hard instances. Hard and easy instances are represented as blue
dots and orange dots respectively.
11
Figure 5: 3D Plots of combining experiment results from maximizing the diversity
over features mst dists mean, chull area and centroid mean distance to centroid,
which provides a good separation of easy and hard instances. Legend is the same as
that in Figure 4.
12
Figure 6: 3D Plots of combining experiment results from maximizing the diversity
over features mst dists mean, chull area and mst depth mean, which provides a good
separation of easy and hard instances. Legend is the same as that in Figure 4.
13
Figure 7: 3D Plots of combining experiment results from maximizing the diversity
over features mst dists mean, nnds mean and chull area with considering of
weighting, which provides a good separation of easy and hard instances. Legend is the
same as that in Figure 4.
14
for easy and hard instances, the final solution sets are put together. Therefore the results
set has 210 instances for each instance size and hardness type, which is the same as previous experiments. The results are plotted in 3D space and compared to the previous
experiments on single feature discussed in Section 3 and 4.
The weighted population diversity offers a way to examine the overlapping area of
hard and easy instances. With the weighting technique, it takes consideration about
the relationship between the different features examined. Since most of these features
are not independent from each others and the weighted population diversity considers
multiple features at the same time, it is predictable that with the weighted population
diversity the extreme value for each single feature may not reach.
An example is shown in Figure 7 focusing on maximizing the weighted population
diversity over the combination of features mst dists mean, nnds mean and chull area,
which is shown to be a good combination for separating the hard and easy instances.
From the comparison between Figure 4 and Figure 7, we can see that although the
results from maximizing weighted population diversity does not cover a wider search
space, it provides a detailed insight into the intersection between the hard and easy
instances. The 3D plots of different instance sizes show that the combination of these
three certain features provide a clear separation between hard and easy instances. There
are some overlapping areas in the search space, but it is clear that this combination of
features provide some hints for predicting of hard or easy instances.
6
Instances Classification Using Support Vector Machine
Support vector machines (SVMs) are well-known supervised learning models in machine learning which can be used for classification, regression and outliers detection
[3, 8]. In order to quantify the separation between instances of different hardness based
on the feature values, SVM models are constructed for each combination of features.
6.1
Linear SVM
The linear classifier is the first model tried in classifying the dataset. In SVM the linear
classifiers that can separate the data with maximum margin is termed as the optimal
separating hyper-plane. From the plots in Figure 2, 3, 4 and 5, it is clear that none
of the datasets are linearly separable. Taken the trade-off between maximizing the
margin and minimizing the number of misclassified data points into consideration, the
soft-margin SVM is used for classification.
Let ACCn be the training accuracy of a feature combination in separating the hard
and easy instances of size n. We define ACCn as the ratio of number of instances which
are correctly classified by the model to the total number of instances in the dataset. All
classification experiments are done in R with library{e1071} [12]. The training data of
the SVM models are the population of 420 instances generated as in Section 3 and the
training accuracy is regarded as a quantified measurement of the separation between
hard and easy instances. The feature combinations used for classification are the 21
two-feature combinations and 35 three-feature combinations discussed in Section 5.
15
From experiment results, ACC25 for two-feature combinations lie in the range of
0.5095 to 0.7548 with an average accuracy of 0.6672, while the ACC25 for three-feature
combination lie between 0.6286 to 0.7786 with average value 0.7079. In the case of
instances with city number of 50, two-feature combination results in ACC50 lying in
the range of 0.5286 to 0.7738 with an average of 0.6544 while ACC50 of three-feature
combinations are from 0.5381 to 0.85 with average accuracy equal to 0.6969. For
larger instance size, ACC100 are in the range between 0.5738 and 0.8119 with average
0.6986 for two-feature combination, whereas those for three-feature combination lie in
the scope of 0.6238 to 0.8524 with average 0.7382.
Although three-feature combinations show better accuracy in separation of hard
and easy instances than those two-feature combinations, there is no significant difference in ACC for two-feature combinations and three-feature combinations. Moreover,
the general low accuracy implies the high possibility that the linear models are not
suitable for separating the hard and easy instances based on most of the feature combinations.
We then move to applying kernel function for non-linear mapping of the feature
combination.
6.2
Nonlinear Classification with RBF Kernel
The linearly non-separable features can become linearly separable after mapped to a
higher dimension feature space. The Radial Basis Function (RBF) kernel is one of the
well-known kernel function used in SVM classification.
There are two parameters need to be selected when applying RBF, which are C(cost)
and ฮณ. The parameter setting for RBF is crucial, since increasing C and ฮณ leads to accurate separation of the training data but at the same time causes over-fitting. The
SVMs here are generated for quantifying the separation rate between hard and easy
instances rather than classifying other instances. After some initial trials, (C, ฮณ) is set
to (100, 2) in all the tests to avoid over-fitting. This parameter setting may not be the
best parameters for the certain feature combination in SVM classifying, but it helps
us to gain some understanding of the separation of hard and easy instances generated
from previous experiments based on the same condition.
Table 1 and 2 show the accuracy of different two features or three features combination in hard and easy instances separation. With RBF kernel, SVM with certain
parameter setting can generate a model separating the dataset with average accuracy of
0.8170, 0.8244 and 0.8346 in 2D feature space for instance size 25, 50 and 100 respectively. Whereas with three features, SVM with the same parameter setting provides a
separation with average accuracy of 0.9503, 0.9584 and 0.9422 for instance size 25, 50
and 100 respectively.
From the results, it can be concluded that there are better separations between hard
and easy instances in the 3D feature space.
16
Feature 1
angle mean
angle mean
angle mean
angle mean
angle mean
angle mean
centroid mean distance to centroid
centroid mean distance to centroid
centroid mean distance to centroid
centroid mean distance to centroid
centroid mean distance to centroid
chull area
chull area
chull area
chull area
cluster 10pct mean distance to centroid
cluster 10pct mean distance to centroid
cluster 10pct mean distance to centroid
mst depth mean
mst depth mean
nnds mean
Feature 2
centroid mean distance to centroid
chull area
cluster 10pct mean distance to centroid
mst depth mean
nnds mean
mst dists mean
chull area
cluster 10pct mean distance to centroid
mst depth mean
nnds mean
mst dists mean
cluster 10pct mean distance to centroid
mst depth mean
nnds mean
mst dists mean
mst depth mean
nnds mean
mst dists mean
nnds mean
mst dists mean
mst dists mean
ACC25
0.8476
0.7857
0.7810
0.7524
0.8167
0.8119
0.8619
0.8524
0.8381
0.8786
0.8905
0.8000
0.7429
0.8071
0.8619
0.7619
0.8190
0.8095
0.7786
0.8095
0.8500
ACC50
0.8071
0.7810
0.7786
0.7381
0.8833
0.8024
0.7667
0.8357
0.7643
0.9524
0.8571
0.7881
0.7429
0.8905
0.8643
0.7714
0.8833
0.8095
0.8595
0.8214
0.9143
ACC100
0.8071
0.7929
0.8000
0.8000
0.8452
0.8405
0.8381
0.7548
0.8095
0.8476
0.8762
0.8548
0.7571
0.8452
0.9024
0.7929
0.8643
0.8738
0.8405
0.8810
0.9024
Table 1: This table lists the accuracy of SVM with RBF kernel separating the hard and
easy instances in 21 different two-feature space.
Feature 1
angle mean
angle mean
angle mean
angle mean
angle mean
angle mean
angle mean
angle mean
angle mean
angle mean
angle mean
angle mean
angle mean
angle mean
angle mean
centroid mean distance to centroid
centroid mean distance to centroid
centroid mean distance to centroid
centroid mean distance to centroid
centroid mean distance to centroid
centroid mean distance to centroid
centroid mean distance to centroid
centroid mean distance to centroid
centroid mean distance to centroid
centroid mean distance to centroid
chull area
chull area
chull area
chull area
chull area
chull area
cluster 10pct mean distance to centroid
cluster 10pct mean distance to centroid
cluster 10pct mean distance to centroid
mst depth mean
Feature 2
centroid mean distance to centroid
centroid mean distance to centroid
centroid mean distance to centroid
centroid mean distance to centroid
centroid mean distance to centroid
chull area
chull area
chull area
chull area
cluster 10pct mean distance to centroid
cluster 10pct mean distance to centroid
cluster 10pct mean distance to centroid
mst depth mean
mst depth mean
nnds mean
chull area
chull area
chull area
chull area
cluster 10pct mean distance to centroid
cluster 10pct mean distance to centroid
cluster 10pct mean distance to centroid
mst depth mean
mst depth mean
nnds mean
cluster 10pct mean distance to centroid
cluster 10pct mean distance to centroid
cluster 10pct mean distance to centroid
mst depth mean
mst depth mean
nnds mean
mst depth mean
mst depth mean
nnds mean
nnds mean
Feature 3
chull area
cluster 10pct mean distance to centroid
mst depth mean
nnds mean
mst dists mean
cluster 10pct mean distance to centroid
mst depth mean
nnds mean
mst dists mean
mst depth mean
nnds mean
mst dists mean
nnds mean
mst dists mean
mst dists mean
cluster 10pct mean distance to centroid
mst depth mean
nnds mean
mst dists mean
mst depth mean
nnds mean
mst dists mean
nnds mean
mst dists mean
mst dists mean
mst depth mean
nnds mean
mst dists mean
nnds mean
mst dists mean
mst dists mean
nnds mean
mst dists mean
mst dists mean
mst dists mean
ACC25
0.9500
0.9405
0.9548
0.9452
0.9571
0.9524
0.9357
0.9405
0.9667
0.9214
0.9476
0.9571
0.9310
0.9476
0.9429
0.9476
0.9595
0.9667
0.9714
0.9476
0.9643
0.9500
0.9500
0.9548
0.9667
0.9286
0.9524
0.9595
0.9381
0.9476
0.9714
0.9214
0.9500
0.9643
0.9429
ACC50
0.9190
0.9357
0.9548
0.9952
0.9500
0.9310
0.9238
0.9714
0.9619
0.9143
0.9690
0.9143
0.9762
0.9262
0.9762
0.9333
0.8762
0.9881
0.9714
0.9286
0.9905
0.9595
0.9881
0.9548
1.0000
0.9524
0.9667
0.9595
0.9857
0.9738
0.9857
0.9857
0.9476
0.9833
0.9929
ACC100
0.9452
0.8214
0.9214
0.9833
0.9524
0.8881
0.9500
0.9571
0.9143
0.9810
0.9333
0.9405
0.9238
0.9476
0.8833
0.9310
0.9762
0.9929
0.8381
0.8571
0.8810
0.9190
0.9595
0.9595
0.9952
0.9333
0.9667
0.9929
0.9476
0.9833
0.9667
0.9738
0.9643
0.9976
0.9929
Table 2: This table lists the accuracy of SVM with RBF kernel separating the hard and
easy instances in 35 different three-feature space.
17
7
Conclusions
With this paper, we have introduced a new methodology of evolving easy/hard instances which are diverse with respect to feature sets of the optimization problem at
hand. Using our diversity optimization approach we have shown that the easy and hard
instances obtained by our approach covers a much wider range in the feature space
than previous methods. The diversity optimization approach provides instances which
are diverse with respect to the investigated features. The proposed population diversity
measurements provide good evaluation of the diverse over single or multiple feature
values. Our experimental investigations for 2-OPT and TSP have shown that our large
set of diverse instances can be classified quite well into easy and hard instances when
considering a suitable combination of multiple features which provide some guidance
for predication as the next step. In particular, the SVM classification model built with
the diverse instances that can classify TSP instances based on problem hardness provides a strong basis for future performance prediction models that lead to automatic
algorithm selection and configuration. Building such models would require further
experimentation to determine the minimal set of strong features that can predict performance accurately.
References
[1] D. Applegate, W. Cook, S. Dash, and A. Rohe. Solution of a min-max vehicle
routing problem. INFORMS Journal on Computing, 14(2):132โ143, Apr. 2002.
[2] B. Bonet and S. Koenig, editors. Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, January 25-30, 2015, Austin, Texas, USA. AAAI
Press, 2015.
[3] C. Cortes and V. Vapnik. Support-vector networks. Machine Learning, 20(3):273โ
297, 1995.
[4] G. A. Croes. A method for solving traveling-salesman problems. Operations Research, 6(6):791โ812, 1958.
[5] K. Eggensperger, F. Hutter, H. H. Hoos, and K. Leyton-Brown. Efficient benchmarking of hyperparameter optimizers via surrogates. In Bonet and Koenig [2],
pages 1114โ1120.
[6] M. Englert, H. Roฬglin, and B. Voฬcking. Worst case and probabilistic analysis of
the 2-opt algorithm for the TSP. Algorithmica, 68(1):190โ264, 2014.
[7] M. Feurer, J. T. Springenberg, and F. Hutter. Initializing bayesian hyperparameter
optimization via meta-learning. In Bonet and Koenig [2], pages 1128โ1135.
[8] S. R. Gunn. Support vector machines for classification and regression, 1998.
[9] F. Hutter, L. Xu, H. H. Hoos, and K. Leyton-Brown. Algorithm runtime prediction:
Methods & evaluation. Artif. Intell., 206:79โ111, Jan. 2014.
18
[10] T. Koฬtzing, F. Neumann, H. Roฬglin, and C. Witt. Theoretical analysis of two
ACO approaches for the traveling salesman problem. Swarm Intelligence, 6(1):1โ
21, 2012.
[11] O. Mersmann, B. Bischl, H. Trautmann, M. Wagner, J. Bossek, and F. Neumann. A novel feature-based approach to characterize algorithm performance for
the traveling salesperson problem. Annals of Mathematics and Artificial Intelligence, 69(2):151โ182, 2013.
[12] D. Meyer, E. Dimitriadou, K. Hornik, A. Weingessel, and F. Leisch. e1071:
Misc Functions of the Department of Statistics, Probability Theory Group (Formerly: E1071), TU Wien, 2015. R package version 1.6-7.
[13] S. Nallaperuma, M. Wagner, and F. Neumann. Parameter prediction based on
features of evolved instances for ant colony optimization and the traveling salesperson problem. In PPSN XIII - 13th International Conference, Ljubljana, Slovenia,
September 13-17, 2014. Proceedings, pages 100โ109, 2014.
[14] S. Nallaperuma, M. Wagner, F. Neumann, B. Bischl, O. Mersmann, and H. Trautmann. A feature-based comparison of local search and the christofides algorithm
for the travelling salesperson problem. In FOGA โ13, pages 147โ160, 2013.
[15] F. Neumann and C. Witt. Bioinspired Computation in Combinatorial Optimization:Algorithms and Their Computational Complexity. Springer-Verlag New York,
Inc., New York, NY, USA, 1st edition, 2010.
[16] R Core Team. R: A Language and Environment for Statistical Computing. R
Foundation for Statistical Computing, Vienna, Austria, 2015.
[17] K. Smith-Miles and L. Lopes. Measuring instance difficulty for combinatorial
optimization problems. Computers & OR, 39(5):875โ889, 2012.
[18] K. Smith-Miles, J. van Hemert, and X. Y. Lim. Understanding TSP difficulty by
learning from evolved instances. In 4th International Conference on Learning and
Intelligent Optimization (LION), LIONโ10, pages 266โ280. Springer, 2010.
[19] T. Ulrich, J. Bader, and L. Thiele. Defining and optimizing indicator-based diversity measures in multiobjective search. In R. Schaefer, C. Cotta, J. Kolodziej, and
G. Rudolph, editors, PPSN (1), volume 6238 of Lecture Notes in Computer Science,
pages 707โ717. Springer, 2010.
[20] T. Ulrich, J. Bader, and E. Zitzler. Integrating decision space diversity into
hypervolume-based multiobjective search. In M. Pelikan and J. Branke, editors,
GECCO, pages 455โ462. ACM, 2010.
[21] J. I. van Hemert. Evolving combinatorial problem instances that are difficult to
solve. Evolutionary Computation, 14(4):433โ462, Dec. 2006.
[22] R. Vilalta and Y. Drissi. A perspective view and survey of meta-learning. Artificial
Intelligence Review, 18(2):77โ95, Oct. 2002.
19
[23] L. Xu, F. Hutter, H. H. Hoos, and K. Leyton-Brown. Satzilla: portfolio-based
algorithm selection for sat. Journal of Artificial Intelligence Research, 32(1):565โ
606, June 2008.
20
| 9cs.NE
|
Variants of Plane Diameter Completionโโ
Petr A. Golovachโก
Clment Requilยง
Dimitrios M. Thilikosยถ
arXiv:1509.00757v1 [cs.DS] 2 Sep 2015
Abstract
The Plane Diameter Completion problem asks, given a plane graph G and
a positive integer d, if it is a spanning subgraph of a plane graph H that has
diameter at most d. We examine two variants of this problem where the input
comes with another parameter k. In the first variant, called BPDC, k upper
bounds the total number of edges to be added and in the second, called BFPDC,
k upper bounds the number of additional edges per face. We prove that both
problems are NP-complete, the first even for 3-connected graphs of face-degree at
most 4 and the second even when k = 1 on 3-connected graphs of face-degree at
most 5. In this paper we give parameterized algorithms for both problems that
run in O(n3 ) + 22
1
O((kd)2 log d)
ยท n steps.
Introduction
In 1987, Chung [3, Problem 5] introduced the following problem: find the optimum way
to add q edges to a given graph G so that the resulting graph has minimum diameter.
(Notice that in all problems defined in this paper we can directly assume that G is
a simple graph as loops do not contribute to the diameter of a graph and the same
holds if we take simple edges instead of multiple ones.) This problem was proved to
be NP-hard if the aim is to obtain a graph of diameter at most 3 [19], and later the
NP-hardness was shown even for the Diameter-2 Completion problem [14]. It is
also know that Diameter-2 Completion is W[2]-hard when parameterized by q [9].
For planar graphs, Dejter and Fellows introduced in [5] the Planar Diameter
Completion problem that asks whether it is possible to obtain a planar graph of
โ The first author was supported by the European Research Council under the European Unionโs
Seventh Framework Programme (FP/2007-2013) / ERC Grant Agreement n. 267959. The second
author was supported by the FP7-PEOPLE-2013-CIG project CountGraph (ref. 630749), the collateral
PROCOPE-DAAD project RanConGraph (ref. 57134837), and the Berlin Mathematical School. The
research of the third author was co-financed by the European Union (European Social Fund ESF) and
Greek national funds through the Operational Program โEducation and Lifelong Learningโ of the
National Strategic Reference Framework (NSRF), Research Funding Program: ARISTEIA II.
โ Emails: [email protected], [email protected], [email protected].
โก Department of Informatics, University of Bergen, Bergen, Norway.
ยง Freie Universitaฬt Berlin, Institut fuฬr Mathematik und Informatik, Berlin, Germany.
ยถ AlGCo project team, CNRS, LIRMM, France, Department of Mathematics, University of Athens,
Athens, Greece, and Computer Technology Institute & Press โDiophantusโ, Patras, Greece.
1
diameter at most d from a given planar graph by edge additions. It is not known whether
Planar Diameter Completion admits a polynomial time algorithm, but Dejter
and Fellows showed that, when parameterized by d, Planar Diameter Completion
is fixed parameter tractable [5]. The proof is based on the fact that the yes-instances
of the problem are closed under taking minors. Because of the Robertson and Seymour
theorem [18] and the algorithm in [16], this implies that, for each d, the set of graphs G
for which (G, d) is a yes-instance can be characterized by a finite set of forbidden minors.
This fact, along with the minor-checking algorithm in [17] implies that there exists an
O(f (d) ยท n3 )-step algorithm (i.e. an FPT-algorithm) deciding whether a plane graph G
has a plane completion of diameter at most d. Using the parameterized complexity,
this means that Planar Diameter Completion is FPT, when parameterized by
d. To make this result constructive, one requires the set of forbidden minors for each
d, which is unknown. To find a constructive FPT-algorithm for this parameterized
problem remains a major open problem in parameterized algorithm design.
Our results. We denote by S0 the 3-dimensional sphere. By a plane graph G we
mean a simple planar graph G with the vertex set V (G) and the edge set E(G) drawn
in S0 such that no two edges of this embedding intersect. A plane graph H is a a
plane completion (or, simply completion) of another plane graph G if H is a spanning
subgraph of G. A q-edge completion of a plane graph G is a completion H of G where
|E(H)| โ |E(G)| โค q. A k-face completion of a plane graph G is a completion H of G
where at most k edges are added in each face of G.
In this paper we consider the variants of the Plane Diameter Completion
problem:
Plane Diameter Completion (PDC)
Input: a plane graph G and d โ Nโฅ1 .
Output: is there a completion of G with diameter at most d?
Notice that the important difference between PDC and the aforementioned problems
is that we consider plane graphs, i.e., the aim is to reduce the diameter of a given
embedding of a planar graph preserving the embedding. In particular we are interested
in the following variants:
Bounded Budget PDC (BPDC)
Input: a plane graph G and q โ N, d โ Nโฅ1
Question: is there a completion H of G of diameter at most d that is also a q-edge
completion?
Bounded Budget/Face PDC (BFPDC)
Input: a plane graph G and k โ N, d โ Nโฅ1 .
Question: is there a completion H of G of diameter at most d that is also a k-face
completion?
We examine the complexity of the two above problems. Our hardness results are
the following.
2
Theorem 1. Both BPDC and BFPDC are NP-complete. Moreover, BPDC is
NP-complete even for 3-connected graphs of face-degree at most 4, and BFPDC is
NP-complete even for k = 1 on 3-connected graphs of face-degree at most 5.
The hardness results are proved in Section 6 using a series of reductions departing
from the Planar 3-Satisfiability problem that was shown to be NP-hard by
Lichtenstein in [15].
The results of Theorem 1 prompt us to examine the parameterized complexity1 of
the above problems. For this, we consider the following general problem:
Bounded Budget and Budget/Face BDC (BBFPDC)
Input: a plane graph G, q โ N โช {โ}, k โ N, and d โ Nโฅ1 .
Question: is there a completion H of G of diameter at most d that is also a q-edge
completion and a k-face completion?
Notice that when q = โ BBFPDC yields BFPDC and when q = k BBFPDC yields
BPDC. Our main result is that BBFPDC is fixed parameter tractable (belongs in the
parameterized class FPT) when parameterized by k and d.
O((kd) log d)
Theorem 2. It is possible to construct an O(n3 )+22
for BBFPDC.
ยท(ฮฑ(q))2 ยทn-step algorithm
(In the above statement and in the rest of this paper we use the function ฮฑ :
N โช {โ} โ N such that if q = โ, then ฮฑ(q) = 1, otherwise ฮฑ(q) = q.)
The main ideas of the algorithm of Theorem 2 are the following. We first observe
that yes-instances of PDC and all its variants have bounded branchwidth (for the
definition of branchwidth, see Section 2). The typical approach in this case is to derive
an FPT-algorithm by either expressing the problem in Monadic Second Order Logic โ
MSOL (using Courcelleโs theorem [4]) or to design a dynamic programming algorithm
for this problem. However, for completion problems, this is not really plausible as this
logic can quantify on existing edges or vertices of the graph and not on the โnon-existingโ
completion edges. This also indicates that to design a dynamic programming algorithm
for such problems is, in general, not an easy task. In this paper we show how to
tackle this problem for BBFPDC (and its special cases BPDC and BFPDC). Our
approach is to deal with the input G as a part of a more complicated graph with
O(k 2 ยท n) additional edges, namely its cylindrical enhancement G0 (see Section 3 for the
definition). Informally, sufficiently large cylindrical grids are placed inside the faces
of G and then internally vertex disjoint paths in these grids can be used to emulate
the edges of a solution of the original problem placed inside the corresponding faces.
Thus, by the enhancement we reduce BBFPDC to a new problem on G0 certified
by a suitable 3-partition of the additional edges. Roughly, this partition consists of
the 1-weighted edges that should be added in the completion, the 0-weighted edges
that should link these edges to the boundary of the face of G where they will be
1 For
more on parameterized complexity, we refer the reader to [8].
3
inserted, and the โ-weighted edges that will be the (useless) rest of the additional
edges. The new problem asks for such a partition that simulates a bounded diameter
completion. The good news is that, as long as the number of edges per face to be
added is bounded, which is the case for BBFPDC, the new graph G0 has still bounded
branchwidth and it is possible, in the new instance, to quantify this 3-partition of the
graph G0 . However, even under these circumstances, to express the new problem in
Monadic Second Order Logic is not easy. For these reasons we decided to follow the
more technical approach of designing a dynamic programming algorithm that leads to
the (better) complexity bounds of Theorem 2. This algorithm is quite involved due to
the technicalities of the translation of the BBFPDC to the new problem. It runs on
a sphere-cut decomposition of the plane embedding of G0 and its tables encode how
a partial solution is behaving inside a closed disk whose boundary meets only (a few
of) the edges of G0 . We stress that this encoding takes into account the topological
embedding and not just the combinatorial structure of G0 . Sphere-cut decompositions
as well as some necessary combinatorial structures for this encoding are presented in
Section 4. The dynamic programming algorithms is presented in Section 5 and is the
most technical part of this paper.
2
Definitions and preliminaries
Given a graph G, we denote by V (G) (respectively E(G)) the set of vertices (respectively
edges) of G. A graph G0 is a subgraph of a graph G if V (G0 ) โ V (G) and E(G0 ) โ E(G),
and we denote this by G0 โ G. Also, in case V (G) = V (G0 ), we say that H is a spanning
subgraph of G. If S is a set of vertices or a set of edges of a graph G, the graph G \ S
is the graph obtained from G after the removal of the elements of S. If S is a set of
edges, we define G[E] as the graph whose vertex set consists of the endpoints of the
edges of E and whose edge set of E.
Distance and diameter. Let G be a graph and let w : E(G) โ N โช {โ} (w is a
weighting of the edges of G). Given two vertices x, x0 โ V (G) we call (x, x0 )-path every
path of G with x and x0 as endpoints. We also define w-distG (x, x0 ) = min{w(E(P )) |
P is an (x, x0 )-path in G} and w-diam(G) = max{w-distG (x, y) | x, y โ V (G)} (if G
is not connected then w-diam(G) is infinite). When the graph is unweighted then we
use distG and diam instead of w-distG and w-diam.
Plane graphs. To simplify notations on plane graphs, we consider a plane graph G as
the union of the points of S0 in its embedding corresponding to its vertices and edges.
That way, a subgraph H of G can be seen as a graph H where H โ G. The faces
of a plane graph G, are the connected components of the set S0 \ G. A vertex v (an
edge e resp.) of a plane graph G is incident to a face f and, vice-versa, f is incident
to v (resp. e) if v (resp., e) lies on the boundary of f . Two faces f1 , f2 are adjacent
if they have a common incident edges. We denote by F (G) the set of all faces of G.
The degree of a face f โ F (G) is the number of edges incident to f where bridges of G
4
count double in this number. The face-degree of G is the maximum degree of a face in
F (G). Given a face f of G, we define BG (f ) as the graph whose set of points is the
boundary of f and whose vertices are the vertices incident to f .
A set โ โ S0 is an open disc if it is homeomorphic to {(x, y) : x2 + y 2 < 1}. Also,
โ is a closed disk of S0 if it is the closure of some open disk of S0 .
Branch decomposition. Given a graph H with n vertices, a branch decomposition
of H is a pair (T, ยต), where T is a tree with all internal vertices of degree three and
ยต : L โ E(H) is a bijection from the set of leaves of T to the edges of H. For every
edge e of T , we define the middle set mid(e) โ V (H) as follows: if T \ {e} has two
connected components T1 and T2 , and for i โ {1, 2}, let Hie = H[{ยต(f ) : f โ L โฉ V (Ti )],
and set mid(e) = V (H1e ) โฉ V (H2e ).
The width of (T, ยต) is the maximum order of the middle sets over all edges of T ,
i.e. max{|mid(e)| : e โ T }. The branchwidth of H is the minimum width of a branch
decomposition of H and is denoted by bw(H).
A grid annulus ฮk,h is the graph obtained by the cartesian product of a cycle of k
vertices and a path of h vertices. We need the following result.
Proposition 1 ([11]). Let G be a planar graph and k, h be integers with k โฅ 3 and
h โฅ 1. Then G has either a minor isomorphic to ฮk,h or a branch decomposition of
width at most k + 2h โ 2.
An central feature of the PDC problem and its variants is that its yes-instances
have bounded branchwidth.
Lemma 1. There exists a constant c1 such that if (G, d) is a yes-instance of PDC,
then bw(G) โค c1 ยท d. The same holds for the graphs in the yes-instances of BPDC,
BFPDC, and BBFPDC.
Proof. We examine only the case of PDC as a yes-instance of BPDC, BFPDC, and
BBFPDC is also a yes-instance of PDC.
Notice first that if G has a completion of diameter at most d and G0 is a minor2
of some G, then also G0 has a completion H of diameter at most d. Notice also
that every completion of the grid annulus ฮr+2,r+2 has diameter > r, therefore, if
(G, d) is a yes-instance of PDC, then G cannot contain a ฮr+2,r+2 as a minor. From
Proposition 1, G has branchwidth bounded by a linear function of d and the lemma
follows.
2A
graph G0 is a minor of a graph G if it can obtained applying edge contractions to some subgraph
of G.
5
3
3.1
The reduction
cylindrical enhancements
Grid-annulus. Let k and r be positive integers where k โ Nโฅ3 , r โ Nโฅ3 . We define
the graph ฮk,r as the (k ร r)-grid annulus, which is the Cartesian product of a path of
k vertices and a cycle of r vertices. Notice that ฮk,r is uniquely embeddable (up to
homeomorphism) in the plane and has exactly two non-square faces (i.e., faces incident
to 4 edges) f1 and f2 that are incident only with vertices of degree 3. We call one of
the faces f1 and f2 the interior of ฮk,r and the other the exterior of ฮk,r . We call the
vertices incident to the interior (exterior) of ฮk,r base (roof ) of ฮk,r . Given an edge
e in the base of ฮk,r , we define its ceilings as the set of edges of ฮk,r that contains e
and whose dual edges in ฮโk,r form a minimum length path between the duals of the
interior and the exterior face of ฮโk,r .
Cylindrical enhancement of a plane graph. Let G be a plane graph. We next
give the definition of the graph G(k) for k โ Nโฅ3 . Let fi โ F (G) and let C1i , . . . , Cฯi i be
the connected components of BG (fi ). For each Cji , we denote by ฯji the number of its
edges, agreeing that, in this number, bridge edges count twice and that if Cji consists of
only one vertex, then ฯji = 1. We then add a copy ฮij of ฮk,kยทฯji in the embedding of G
i
i
such that Cji is contained in the interior of ฮij and all C1i , . . . , Cjโ1
, . . . , Cj+1
. . . , Cฯi i
are contained in the exterior of ฮij (In Figure 1 the edges of each ฮij are colored red).
We then add, for each v โ Cji , ฮบ(v) ยท k edges (those around the disks C1 , . . . , C4 in
Figure 1) from v to the base of ฮij , where ฮบ(v) is the number of connected components
in Cji \ v (in the trivial case where Cji consists of only one vertex v, then ฮบ(v) = 1).
We add these edges in a way that the resulting embedding remains plane and no more
than a set Vv,i,j of k consecutive vertices of the base of Cji are connected with the
same vertex v of Cji ; observe that there is only one way to add edges so to fulfill these
restrictions. Notice that the set Vv,i,j always induces a path Pv,i,j in the resulting
graph except in the case where Cji consists of a single vertex v where Vv,i,j induces a
cycle. In the later case we pick a maximal path in this cycle and we denote it by Pv,i,j .
In the example of Figure 1 the Pv,i,j โs are the bold paths of the innermost cycle of each
ฮij . We apply this enhancement for each connected component of the boundary of each
(k)
face of G and we denote the resulting graph by RG .
(k)
We call a face fi of RG non-trivial if BR(k) (fi ) has more than one connected
G
components C1i , . . . , Cฯi i . Notice that if fi is non-trivial, each Cji is the roof of some
previously added grid-annulus. For each such grid-annulus, let Jj be k consecutive
vertices of its roof. We add inside fi a copy of ฮk,kยทฯi such that its base is a subset
of fi and let {I1 , . . . , Iฯi } be a partition of its roof in ฯi parts, each consisting of k
consecutive base vertices. In the example of Figure 1, the annulus ฮk,kยทฯi is the one
with the edges in the middle of the figure and its base is its innermost cycle. For each
j โ {1, . . . , ri } we add k edges (depicted as the โinterconnectingโ edges in Figure 1)
each connecting a vertex of Jj with some vertex of Ij in a way that the resulting
6
C4
C3
C1
C2
Figure 1: An example of a cylindrical enhancement for k = 3 inside a non-trivial face
of a graph with 4 connected components (i.e., the boundaries of the disks C1 , . . . , C4 ).
embedding remains plane (again, there is a unique way for this to be done). We apply
(k)
this enhancement for each non-trivial face of RG and we denote the resulting graph by
G(k) . Notice that G(k) is not uniquely defined as its definition depends on the choice of
the sets Jj . From now on, we always consider an arbitrary choice for G(k) and we call
G(k) the k-th cylindrical enhancement of G. By the construction of G(k) , it directly
follows that |V (G(k) )| = O(k 2 ยท n). We say that an edge of G(k) is an expansion edge
if it is an edge of Pv,i,j for some i, j, and v โ V (Ci,j ). Also we denote by Gฬ(k) the
graph created by G(k) if we contract all its expansion edges and all their ceilings of the
(k)
grid-annuli that were added during the construction of RG .
Primal-dual drawings. Let G be a connected plane graph. We denote by D(G) the
graph obtained if we draw G together with its dual so that dual edges are intersecting
to a single point and then introduce a vertex to each of these intersection points. We
recursively define D(k) (G) such that D(0) (G) = G and D(k) (G) = Dkโ1 (D(G)) for
every k โฅ 1. The next proposition is a direct consequence of [13, Lemma 4].
Proposition 2. There exists some constant c such that for every connected plane
graph G, it holds that bw(D(G)) โค 2 ยท bw(G).
7
Corollary 1. For every connected plane graph G and k โ Nโฅ1 , it holds that bw(D(k) (G)) โค
2k ยท bw(G).
Lemma 2. If G is a connected plane graph and k โ Nโฅ3 , then Gฬ(k) is a minor of
D(dlog(k+1)e+1) (G).
Proof. Notice first that Gฬ(3) is a minor of D(3) (G). It is then enough to observe that
for every i โฅ 3, if Gฬ(i) is a minor of D(i) (G), then Gฬ(2i+1) is a minor of D(i+1) (G).
The following lemma indicates that cylindrical enhancements do not considerably
increase the branchwidth of a graph.
Lemma 3. There is a constant c2 such that if G is an n-vertex plane graph and
k โ Nโฅ3 , then G(k) is 3-connected, bw(G(k) ) โค c2 ยท k ยท bw(G).
Proof. Let H be the graph created from G if we add a vertex vf to each non trivial
face f and for each of the connected components of BG (f ), we arbitrarily pick a vertex
and make it adjacent to vf by a path of 2k internal vertices. As the branchwidth
of a non-acyclic graph is the maximum branchwidth of its connected components, it
follows that bw(H) = bw(G). It is also easy to see that G(k) is a minor of Hฬ (k) . From
Lemma 2, Hฬ (k) is a minor of D(r) (H), where r = dlog(k + 1)e + 1. By Corollary 1, it
follows that bw(D(r) (H)) โค 2r ยท bw(H) = O(k ยท bw(G)).
3.2
Edge colorings of new edges.
Let G and H be two plane graphs such that G is a subgraph of H and let q โ N โช {โ},
k โ N, and d โ Nโฅ1 . Given a 3-partition p = {E 0 , E 1 , E โ } of E(H) \ E(G), we define
the function wp : E(H) โ N such that
wp
= {(e, 1) | e โ E(G)} โช {(e, 0) | E โ E 0 } โช
{(e, 1) | e โ E 1 } โช {(e, d + 1) | E โ E โ }.
We say that G has (q, k, d)-extension in H if there is a 3-partition p = {E 0 , E 1 , E โ }
of E(H) \ E(G) such that the following conditions hold
A. There is no path in H with endpoints in V (G) that consists of edges in E 0 ,
B. every face F of G contains at most k edges of E 1 ,
C. โx, y โ V (G), wp -distH (x, y) โค d, and
D. |E 1 | โค q.
Given a 3-partition p = {E 0 , E 1 , E โ } of E(H) \ E(G) we refer to its elements as
the 0-edges, the 1-edges, and the โ-edges respectively. We also call the edges of G
old-edges.
Our first step towards our algorithm is to reduce BBFPDC to a problem about
(q, k, d)-extensions of G.
8
Given a plane graph G and an open set ฮ of S0 , we define Ghฮi as the graph whose
edge set consists of the edges of G that are subsets of ฮ and whose vertex set consists
of their endpoints.
Disjoint paths. Let G be a graph. We say that two paths in G are disjoint if none of
the internal vertices of a path is a vertex of the other. Given a collection P of pairwise disjoint paths of G, we define L(P) = {{x, y} | x and y are the endpoints of a path in P}.
The proofs of the following proposition can be found in [2].
Proposition 3. Let G be a graph k โ Nโฅ1 and let H be a k-face completion of G.
For every face f โ F (G), there is a collection P of k disjoint paths in the graph
G(max{3,k}) hf i such that E(Ghf i) = L(P).
Lemma 4. Let G be a plane graph, with q โ N โช {โ}, k โ Nโฅ1 and d โ Nโฅ1 . Then
(G, q, k, d) is a yes-instance of BBFPDC if and only if G has a (q, k, d)-extension in
G(max{3,k}) .
Proof. Assume first that (G, q, k, d) is a yes-instance of BBFPDC and let H be a
completion H of G of diameter at most d that is also a q-edge completion and a k-face
completion. This means that for every f โ F (G), the graph Hf = Hhf i contains at
S
most k edges and that the graph H new = f โF (H) Hf contains at most q edges. From
Proposition 3, there is a collection Pf of yf = |E(Hf )| internally disjoint paths in
P
G(max{3,k}) . Let E 1 be a set of y = f โF (G) yf edges obtained if, for every f โ F (G),
S
S
we pick one edge from each of the paths in Pf . Let E 0 = E( f โF (G) P โPf ) \ E 1 and
let E โ = E(H new )\(E 0 โชE 1 ). We now observe that p = {E 0 , E 1 , E โ } is a 3-partition
of E(H new ) = E(G(max{3,k}) ) \ E(G). By its construction, p satisfies conditions 1โ4 of
the definition of a (q, k, d)-extension of G in G(max{3,k}) as required.
Let now p = {E 0 , E 1 , E โ } is a 3-partition of E(H new ) = E(G(max{3,k}) ) \ E(G)
that is a (q, k, d)-extension of G in G(max{3,k}) . We construct the graph H by removing
from G(max{3,k}) all edges in E โ and then, in the resulting graph, contract all edges in
E 0 . It is easy to observe that H is a completion of G that is also an q-edge completion
and a k-face completion
4
Structures for dynamic programming
For our dynamic programming algorithm we need a variant of branchwidth for plane
graphs whose middle sets have additional topological properties.
Sphere-cut decomposition. Let H be a plane graph. An arc is a subset O of
the plane homeomorphic to a circle and is called a noose of H if it meets H only in
vertices. We also set VO = V (H) โฉ O. An arc of a noose O is a connected component
of O \ VO while in the trivial case where VO = โ
, O does not have arcs. A sphere-cut
decomposition or sc-decomposition of H is a triple (T, ยต, ฯ) where (T, ยต) is a branch
decomposition of H and ฯ is a function mapping each e โ E(T ) to cyclic orderings
9
of vertices of H, such that for every e โ E(T ) there is a noose Oe of H where the
following properties are satisfied.
โข Oe meets every face of H at most once,
โข H1e is contained in one of the closed disks bounded by Oe and H2e is contained in
the other (H1e and H2e are as in the definition of branch decomposition).
โข ฯ(e) is a cyclic ordering of VOe defined by a clockwise traversal of Oe in the
embedding of H.
We denote Xe = VOe and we always assume that its vertices are clockwise enumerated according to ฯ(e). We denote by Ae the set containing the arcs of Oe . Also,
if ฯ(e) = [a1 , . . . , ak , a1 ], then we use the notation Ae = {a1,2 , a2,3 , . . . , akโ1,k , ak,1 }
where the boundary of the arc ai,i+1 consists of the vertices ai and ai+1 . We also define
He+ = (V (H), E(H โช Ae )), i.e., He+ is the embedding occurring if we add in H the
arcs of Oe as edges. A face of He+ is called internal if it is not incident to an arc in Ae ,
i.e., it is also a face of H. A face of He+ is marginal if it is a properly included is some
face of H.
For our dynamic programming we require to have in hand an optimal sphere-cut
decomposition. This is done combining the main result of [10] and [20, (5.1)] (see
also [7]) and is summarized to the following.
Proposition 4. There exists an algorithm that, with input a 3-connected plane graph
G and w โ N, outputs a sphere-cut decomposition of G of width at most w or reports
that bw(G) > w.
Our next step is to define a series of combinatorial structures that are necessary for
our dynamic programming. Given two sets A and B we denote by AB the set of all
functions from B to A.
(d, k, q)-configurations. Given a set X and a non-negative integer t, we say that the
pair (X , ฯ) is a t-labeled partition of X if X is a collection of pairwise disjoint non-empty
subsets of X and ฯ is a function mapping the integers in {1, . . . , |X |} to integers in
{0, . . . , t}. In case X = โ
, a t-labeled partition corresponds to the pair {โ
, โ
} where โ
is the โemptyโ function, i.e. the function whose domain is empty. Let X and A be
two finite sets. Given d, k โ N and q โ N โช {โ}, we define a (d, k, q)-configuration of
(X, A) as a quintuple ((X , ฯ), (A, ฮฑ), (F, E), ฮด, z) where
1. (X , ฯ) is a 1-labeled partition of X,
2. (A, ฮฑ) is a k-labeled partition of A,
3. (F, E) is a graph (possibly with loops) where F โ {0, . . . , d + 1}X ,
2
4. ฮด โ {0, . . . , d + 1}X , and
10
5. if q โ N, then z โค q, otherwise z = โ.
Fusions and restrictions. Let (X1 , ฯ1 ) and (X2 , ฯ2 ) be two t-labeled partitions of
the sets X1 and X2 respectively such that Xi = {X1i , . . . , Xฯi 1 }, i โ {1, 2}. We define
X1 โ X2 as follows: if x, x0 โ X1 โช X2 we say that x โผ x0 if there is a set in X1 โช X2 that
contains both of them. Let โผT be the transitive closure of โผ. Then X1 โX2 contains the
equivalence classes of โผT . We now define ฯ1 โ ฯ2 as follows: let X1 โ X2 = {Y1 , . . . , Yฯ }.
Then for each i โ {1, . . . , ฯ}, we define
P
P
ฯ1 โ ฯ2 (i) = min{t, X 10 โYi ฯ1 (i0 ) + X 20 โYi ฯ2 (i0 )}.
i
i
The fusion of the t-labeled partitions (X1 , ฯ1 ) and (X2 , ฯ2 ) is the pair (X1 โ
X2 , ฯ1 โ ฯ2 ) that is a (t + 1)-labeled partition and is denoted by (X1 , ฯ1 ) โ (X2 , ฯ2 ).
Given a t-labeled partition (X , ฯ) of a set X and given a subset X 0 of X we define
the restriction of (X , ฯ) to X 0 as the t-labeled partition (X 0 , ฯ0 ) of X 0 where X 0 =
{Xi โฉ X 0 | Xi โ X } \ {โ
} and ฯ0 = {(i, ฯ(i)) | Xi โฉ X 0 6= โ
} and we denote it by
(X , ฯ)|X 0 . We also define the intersection of (X , ฯ) with X 0 as the t-labeled partition
(X 0 , ฯ0 ) where X 0 = {Xi โ X | Xi โฉ (X \ X 0 ) 6= โ
} and ฯ0 = {(i, ฯ(i)) | Xi โฉ X 00 6= โ
}
where X 00 = โชXi0 โX 0 Xi and we denote it by (X , ฯ) โฉ X 0 . Notice that (X , ฯ)|X 0 and
(X , ฯ) โฉ X 0 are not always the same.
5
Dynamic programming
The following result is the main algorithmic contribution of this paper.
Lemma 5. There exists an algorithm that, given (G, H, q, k, d, D, b) as input where
G and H are plane graphs such that G is a subgraph of H, H is 3-connected, q โ
N โช {โ}, k โ N, d โ Nโฅ1 , b โ N, and D = (T, ยต, ฯ) is a sphere-cut decomposition of
H with width at most b, decides whether G has (q, k, d)-extension in H in (ฮฑ(q))2 ยท
2
O(b log d)
2O(b log d)+2
ยท n steps.
Proof. We use the notation E old = E(G) and E new = E(H) \ E(G), V old = V (G) and
V new = V (H) \ V (G). We choose an arbitrary edge eโ โ E(T ), subdivide it by adding
a new vertex vnew and update T by adding a new vertex r adjacent to vnew . We then
root T at this vertex r and we extend ยต by setting ยต(r) = โ
. In T we call leaf-edges all
its edges that are incident to its leaves except from the edge er = {r, vnew }. An edge of
T that is not a leaf-edge is called internal. We denote by L(T ) the set of the leaf-edges
of T and we denote by I(T ) the internal edges of T . We also call er root-edge. For each
e โ E(T ), let Te be the tree of the forest T \ {e} that does not contain r as a leaf and
let Ee be the edges that are images, via ยต, of the leaves of T that are also leaves of Te .
We denote He = H[Ee ] and Ve = V (He ) and observe that Her = H. For each edge
e โ I(T ), we define its children as the two edges that both belong in the connected
component of T \ e that does not contain the root r and that share a common endpoint
with e. Also, for each edge e โ E(T ), we define โe as the closed disk bounded by
11
Oe such that G โฉ โe = He . Finally, for each edge e โ E(T ), we set Xe = mid(e),
Venew = Ve โฉ V new , Veold = Ve โฉ V old , Eenew = Ee โฉ E new , and Eeold = Ee โฉ E old .
Distance signatures and dependency graphs. Let p = {Ee0 , Ee1 , Eeโ } be a 3partition of Eenew . For each vertex v โ Ve , we define the (Xe , p)-distance vector
of v as the function ฯv : Xe โ {0, . . . , d + 1} such that if x โ Xe then ฯv (x) =
min{wp -distGe (v, x), d + 1}. We define the (e, p)-dependency graph Ge,p = (Fe,p , Ee,p )
(that may contain loops) where Fe,p = {ฯv | v โ Ve } and such that two (not necessarily
distinct) vertices ฯ and ฯ0 of Fe,p are connected by an edge in Ee,p if and only if
there exist v, v 0 โ Ve such that ฯ = ฯv , ฯ0 = ฯv0 and wp -distHe (v, v 0 ) > d. Notice
|Xe |
that the set ฮฆe = {Ge,p | p is a 3-partition of Eenew } has at most 2(d+2)
elements
new
Xe
because {Fe,p | p is a 3-partition of Ee } โ {0, . . . , d + 1} and, to each Fe,p , assign
a unique edge set Ee,p . Intuitively, each Fe,p corresponds to a partition of the elements
of Ve such that vertices in the same part have the same (Xe , p)-distance signature.
Moreover the existence of an edge in the (e, p)-dependency graph between two such
parts implies that they contain vertices, one from each part, whose wp -distance in He
is bigger than d.
The tables. Our aim is to give a dynamic programming algorithm running on the
sc-decomposition T . For this, we describe, for each e โ E(T ), a table T(e) containing
information on partial solutions of the problem for the graph Ge in a way that the
table of an edge e โ E(T ) can be computed using the tables of the two children of e,
the size of each table does not depend on G and the final answer can be derived by the
table of the root-edge er .
We define the function T mapping each e โ E(T ) to a collection T(e) of (d, k, q)configurations of (Xe , Ae ). In particular, Q = ((X , ฯ), (A, ฮฑ), (F, E), ฮด, z) โ T(e) iff
there exists a 3-partition p = {Ee0 , Ee1 , Eeโ } of Eenew such that the following hold:
1. C1 , . . . , Ch are the connected components of (V (He ), Ee0 ), then
โข X = {V (C1 ) โฉ Xe , . . . , V (Ch ) โฉ Xe } and
โข โiโ{1,...,h} ฯ(i) = 1 if Ci contains some vertex of Veold , otherwise ฯ(i) = 0.
(The pair (X , ฯ) encodes the connected components of the 0-edges that contain
vertices of Xe and for each of them registers the number (0 or 1) of the vertices
in Veold in them. This information is important to control Condition A.)
2. A is a partition of Ae such that two arcs A, A0 โ Ae belong in the same set,
say Ai of A if and only if they are incident to the same marginal face fi of He+ .
Moreover, for each i โ {1, . . . , |A|}, ฮฑ(i) is equal to the number of edges in Ee1
that are inside fi .
(Here (A, ฮฑ) encodes the โpartialโ faces of the embedding of Ge that are inside โe . To
each of them we correspond the number of 1-edges that they contain in He . This is
useful in order to guarantee that during the algorithm, faces that stop being marginal
do not contain more than k 1-edges, as required by Condition B.)
12
3. (F, E) is the (e, p)-dependency graph, i.e., the graph Ge,p = (Fe,p , Ee,p ).
(Recall that F is the collection of all the different distance vectors of the vertices of
Ve . Notice also that there might be pairs of vertices x, x0 โ Ve whose wp -distance
in Ge is bigger than d. In order for G to have a completion of diameter d, these
two vertices should become connected, at some step of the algorithm, by paths
passing outside โe . To check this possibility, it is enough to know the distance
vectors of x and x0 and these are encoded in the set F. Moreover the fact that x
and x0 are still โfar awayโ inside Ge is certified by the existence of an edge (or a
loop) between their distance vectors in F.)
4. For each pair x, x0 โ Xe , ฮด(x, x0 ) = min{wp -distHe (x, x0 ), d + 1}.
(This information is complementary to the one stored in F and registers the
distances of the vertices in Xe inside He . As we will see, F and ฮด will be used in
order to compute the distance vectors as well as their dependencies during the
steps of the algorithm. )
5. There is no path in He with endpoints in Veold that consists of edges in Ee0 .
(This ensures that Condition A is satisfied for the current graph Ge .)
1
6. Every internal face of G+
e contains at most k edges in Ee .
(This ensures that Condition B holds for all the internal faces of Ge .)
7. โv, v 0 โ Ve , either wp -distHe (v, v 0 ) โค d or there are two vertices x, x0 โ Xe such
that ฯv (x) + ฯv0 (x0 ) โค d.
(Here we demand that if two vertices x1 , x2 of Ve are โfar awayโ (have wp -distance
> d) inside He then they have some chance to come โcloseโ (obtain wp -distance
โค d) in the final graph, so that Condition C is satisfied. This fact is already
stored by an edge in E between the two distance vectors of x and x0 and the
possibility that x1 and x2 may come close at some step of the algorithm, in what
concerns the graph Ge , depends only on these distance vectors and not on the
vertices x1 and x2 themselves.)
8. There are at most z edges of Ee1 inside the internal faces of G+
e (clearly, this last
condition becomes void when q = โ).
(This information helps us control Condition D during the algorithm.)
Notice that in case Xe = โ
the only graph that can correspond to the 6th step is the
graph ({โ
}, โ
) which, from now on will be denoted by Gโ
.
Bounding the set of characteristics. Our next step is to bound T(e) for each
e โ E(T ). Notice first that |Xe | = |Ae | โค b. This means that there are 2O(b log b)
instantiations of (X , ฯ) and 2O(k+b log b) instantiations of (A, ฮฑ). As we previously
O(b log d)
noticed, the different instantiations of (F, E) are |ฮฆe | = 22
. Moreover, there
13
2
are 2O(b log d) instantiations of ฮด and ฮฑ(q) instantiations of z. We conclude that there
exists a function f such that for each e โ V (T ), |T(e)| โค f (k, q, b, d). Moreover,
2
O(b log d)
f (k, q, b, d) = ฮฑ(q) ยท 2O(b log d)+2
.
The characteristic function on the root edge. Observe that Enew is (k, d, q, w)edge colorable in H if and only if T(er ) 6= โ
, i.e., ((โ
, โ
), (โ
, โ
), Gโ
,โ
, z) โ T(er ) for
some z โค q. Indeed, if this happens, conditions 1โ4 become void while conditions 5, 6,
7, and 8 imply that H = He satisfies the conditions A, B, C, and D respectively in the
definition of the (k, d, q, w)-edge colorability of E new .
The computation of the tables. We will now show how to compute T(e) for each
e โ E(T ).
We now give the definition of T(e) in the case where e is a leaf of T is the following:
Given a q โ N โช {โ}, we define A(q) = {โ} if q = โ, otherwise A(q) = {z | z โค q}.
Suppose now that el is a leaf-edge of T where ฯ(el ) = [a1 , a2 , a1 ] and Ael =
{a1,2 , a2,1 }.
1. If {a1 , a2 } โ Eeold , then
T(el )
{ ({{a1 }, {a2 }}, {(1, 1), (2, 1)}),
=
({{a1,2 }, {a2,1 }}, {(1, 0), (2, 0)}),
{(a1 , 0), (a2 , w({a1 , a2 }))}, {(a1 , w({a1 , a2 })), (a2 , 0)} , โ
,
{((a1 , a2 ), w({a1 , a2 }))}, z | z โ A(q)},
2. if {a1 , a2 } โ Eenew and {a1 , a2 } โ Veold , then T(el ) = Q1 โช Qโ where
Q1
{
=
({{a1 }, {a2 }}, {(1, 1), (2, 1)})
({{a1,2 , a2,1 }}, {(1, 1)})
( {(a1 , 0), (a2 , 1)}, {(a1 , 1), (a2 , 0)} , โ
)
{((a1 , a2 ), s)}, z | z โ A(q) โ {0}}
Qโ
{
=
({{a1 }, {a2 }}, {(1, 1), (2, 1)})
({{a1,2 , a2,1 }}, {(1, 0)})
( {(a1 , 0), (a2 , d + 1)}, {(a1 , d + 1), (a2 , 0)} , K)
{((a1 , a2 ), d + 1)}, z | z โ A(q)}
(the set K above contains a single edge that is not a loop), and if {a1 , a2 } โ Eenew
and {a1 , a2 } * Veold , then T(el ) = Q1 โช Qโ โช Q0 where
Q0
=
{
({{a1 , a2 }}, {(1, 1 โ h{a1 , a2 } โ Venew i)})
({{a1,2 , a2,1 }}, {(1, 0)})
({{(a1 , 0), (a2 , 0)}}, โ
)
{((a1 , a2 ), 0)}, z | z โ A(q)}
14
Assume now that e is a non-leaf edge of T with children el and er , the collection
T(e) is given by join(T(e1 ), T(e2 )) where join is a procedure that is depicted below.
Notice that Ae is the symmetric difference of Ael and Aer and Xe consists of the
endpoints of the arcs in Ae . We also set XeF = (Xel โช Xer ) \ Xe .
Procedure join
Input: two collections Cel and Cer of (d, k, q)-configurations of (Xel , Ael ) and (Xer , Aer ).
Output: a collection Cr of (d, k, q)-configurations of (Xe , Ae )
(1) set Ce = โ
(2) for every pair (Qel , Qer ) โ Cel ร Cer , if merge(Qel , Qer ) 6= void,
then let Ce โ Ce โช {merge(Qel , Qer )}.
(3) return Ce
It remains to describe the routine merge. For this, assume that it receives as
inputs the (d, k, q)-configurations Ql = ((Xl , ฯl ), (Al , ฮฑl ), (Fl , El ), ฮดl , zl ) and Qr =
((Xr , ฯr ), (Ar , ฮฑr ), (Fr , Er ), ฮดr , zr ) of (Xel , Ael ) and (Xer , Aer ) respectively. Procedure
merge(Qel , Qer ) returns a (d, k, q)-configuration ((X , ฯ), (A, ฮฑ), (F, E), ฮด, z) of (Xe , Ae )
constructed as follows:
1. If zr + zr > q, then return void, otherwise z = zl + zr
(This controls the number of 1-edges that are now contained in โe )
2. Let (X 0 , ฯ0 ) = (Xl , ฯl ) โ (Xr , ฯr ) and if ฯ0โ1 (2) 6= โ
then return void.
(This compute the โfusionโ of the connected components of (V (Hel , Ee0l )) and
(V (Her , Ee0r )) with vertices in Vel and Ver and makes sure that none of the created
components contains 2 or more 0-vertices.)
3. Let (X , ฯ) = (Xl0 , ฯ0l )|Ve
(This computes the fusion (Xl0 , ฯ0l ) is restricted on the boundary Oe of โe .)
4. Let (A0 , ฮฑ0 ) = (Al , ฮฑl ) โ (Ar , ฮฑr ) and if ฮฑ0โ1 (k + 1) 6= โ
then return void.
5. Let (A, ฮฑ) = (Al , ฮฑl ) โ (Ar , ฮฑr )|Ae .
6. Compute the function ฮณ : (Fel โช Fer โช Xe ) ร (Fel โช Fer โช Xe ) โ {0, . . . , d + 1},
whose description is given latter.
7. Take the disjoint union of the graphs (Fl , El ) and (Fr , Er ) and remove from it
every edge {ฯ1 , ฯ2 } for which ฮณ(ฯ1 , ฯ2 ) โค d. Let G + = (F + , E + ) be the obtained
graph.
8. If for some edge {ฯ1 , ฯ2 } โ E + it holds that for every x1 , x2 โ Ve , ฮณ(ฯ1 , x1 ) +
ฮณ(ฯ2 , x2 ) > d, then return void.
9. Consider the function ฮป : Fl โช Fr โ {1, . . . , d}Xe such that ฮป(ฯ) = {(x, ฮณ(ฯ, x)) |
x โ Xe }.
15
10. For every ฯ0 โ ฮป(Fl โช Fr ), do the following for every set F = ฮปโ1 (ฯ0 ): identify
in G + all vertices in F and if at least one pair of them is adjacent in G + , then
add an loop on the vertex created after this identification. Let G = (F, E) be the
resulting graph (notice that F = ฮป(Fl โช Fr )).
11. ฮด = {((x, x0 ), ฮณ(x, x0 )) | x, x0 โ Ve }.
The definition of function ฮณ. We present here the definition of the function ฮณ used
in the above description of the tables of the dynamic programming procedure.
Given a non-empty set X and q โ {0, 1} we define
ordq (X)
= {ฯ | โX 0 โ X : X 0 6= โ
โง |X 0 | mod 2 = q
โง ฯ is an ordering of X 0 }
Given ฮณl and ฮณr , we define ฮณ : (Fel โช Fer โช Xe ) ร (Fel โช Fer โช Xe ) โ {0, . . . , d + 1}
by distinguishing the following cases:
1. If (x โ Xe \ Xer โง ฯ โ Fel ) or (x โ Xe \ Xel โง ฯ โ Fer ), then
X
ฮดs(i) (pi , pi+1 ) +
ฮณ(ฯ, x) = min ฯ(x), min{ฯ(p1 ) +
J1,ฯโ1K
ฮดs(ฯ) (pฯ , x) | [p1 , . . . , pฯ ] โ ord0 (XeF )} ,
where s(i) = โlโ if hx โ Xe \ Xel i = (i mod 2), otherwise s(i) = โrโ.
2. If (x โ Xe \ Xel โง ฯ โ Fel ) or (x โ Xe \ Xer โง ฯ โ Fer ), then
X
ฮณ(ฯ, x) = min ฯ(p1 ) +
ฮดt(i) (pi , pi+1 ) + ฮดt(ฯ) (pฯ , x)
J1,ฯโ1K
| [p1 , . . . , pฯ ] โ ord1 (XeF )} ,
where t(i) = โlโ if hx โ Xe \ Xel i =
6 (i mod 2), otherwise t(i) = โrโ.
3. If x is one of the (at most two) vertices in (Xer โฉ Xer ) \ XeF and ฯ โ Fel โช Fer ,
then
ฮณ(ฯ, x) = min ฯ(x),
X
min{ฯ(p1 ) +
ฮดu(i) (pi , pi+1 ) + ฮดu(q) (pฯ , x)
J1,ฯโ1K
| [p1 , . . . , pฯ ] โ ordq (XeF )} | q โ {0, 1}
where u(i) = โrโ if hฯ โ Fel i = (i mod 2), otherwise u(i) = โlโ.
4. If ฯ, ฯ0 โ Fl โช Fr , then
ฮณ(ฯ, ฯ0 )
=
X
min ฯ(p1 ) +
ฮดu(i) (pi , pi+1 ) + ฯ0 (pฯ )
J1,ฯโ1K
| [p1 , . . . , pฯ ] โ ordq (XeF )
16
In this equality, q = 1 if ฯ and ฯ0 belong in different sets in {Fl , Fr }, otherwise
q = 0. The function u is the same as in the previous case.
5. If x1 , x2 โ Xe \ Xer or x1 , x2 โ Xe \ Xel , then
ฮด(x1 , x2 )
=
min ฮดy(0,x1 ) (x1 , x2 ), min{ฮดy(0,x1 ) (x1 , p1 ) +
X
ฮดy(i,x1 ) (pi , pi+1 ) +
iโJ1,ฯโ1K
ฮดy(0,x2 ) (pฯ , x2 ) | [p1 , . . . , pฯ ] โ ord0 (XeF )}
In this equality y(i, x) = โlโ if hx โ Xe \ Xer i = hi mod 2 = 0i otherwise
y(i, x) = โrโ.
6. If x1 , x2 belong in different sets is {Xe \ Xer , Xe \ Xel }, then
X
ฮด(x1 , x2 ) = min ฮดy(0,x1 ) (x1 , p1 ) +
ฮดy(i,x1 ) (pi , pi+1 ) +
J1,ฯโ1K
ฮดy(0,x2 ) (pฯ , x2 ) | [p1 , . . . , pฯ ] โ ord1 (XeF )
The function y is the same as in the previous case.
7. If exactly one, say x2 , of x1 , x2 belongs in Xer โฉ Xer ) \ XeF , then
ฮด(x1 , x2 ) = min ฮดy(0,x1 ) (x1 , x2 ),
X
min min{ฮดy(0,x1 ) (x1 , p1 ) +
ฮดy(i,x1 ) (pi , pi+1 ) +
J1,ฯโ1K
ฮดy(0,x2 ) (pฯ , x2 ) | [p1 , . . . , pฯ ] โ ord
q
(XeF )} | q
โ {0, 1}
The function y is the same as in the two previous cases. In case x1 belongs in
Xer โฉ Xer ) \ XeF , then just swap the positions of x1 and x2 in the above equation.
8. If both x1 , x2 belong in Xer โฉ Xer ) \ XeF , then
ฮด(x1 , x2 )
=
min ฮดl (x1 , x2 ), ฮดr (x1 , x2 ),
min{min{ฮดz(0,j) (x1 , p1 ) +
X
J1,ฯโ1K
ฮดz(i,j) (pi , pi+1 ) + ฮดz(q,j) (pฯ , x2 ) |
[p1 , . . . , pฯ ] โ ordq (XeF )} | (q, j) โ {0, 1}2 }
In the previous equality, z(i, j) = โlโ if (i + j mod 2) = 0, otehrwise z(i, x) = โrโ.
Running time analysis. It now remains to prove that procedure join runs in
2
O(b log d)
(ฮฑ(q))2 ยท 2O(k )+2
steps. Recall that there exists a function f such that |T(e)| โค
f (k, q, b, d). Therefore merge will be called in Step (2) at most (f (k, q, b, d))2 times.
17
The first computationally non-trivial step of merge is Step 5, where function ฮณ is
computed. Notice that ฮณ has at most ((d + 1)|Xel | + (d + 1)|Xer | + |Xe |)2 = 2O(bยทlog d)
entries and each of their values require running over all permutations of the subsets
of XeF that are at most b! = 2O(bยทlog b) . These facts imply that the computation of ฮณ
takes 2O(bยทlog b) steps. As Steps 610 deal with graphs of 2O(bยทlog d) vertices, the running
time of join is the claimed one.
We are now in position to prove the main algorithmic result of this paper.
Proof of Theorem 2. Given an input I = (G, q, k, d) of BBFPDC, we consider the
graph H = G(max{3,k}) whose construction takes O(k 2 n) steps, because of Lemma 3.
Then run the algorithm of Proposition 4 with (H, w) as input, where w = c1 ยท c2 ยท k ยท d.
If the answer is that bw(H) > w, then, From Proposition 3, tw(G) > c1 ยท d, therefore,
from Lemma 1, we can safely report that I is a no-instance. If the algorithm of
Proposition 4 outputs a sphere-cut decomposition D = (T, ยต) of width at most w =
O(k ยท d) then we call the dynamic programming algorithm of Lemma 5, with input
(G, H, q, k, d, D, b). This, from Lemma 4, provides an answer to BBFPDC for the
2
O((kd) log d)
O((kd) log d)
instance I in (ฮฑ(q))2 ยท 2O((kd) log d)+2
ยท n = (ฮฑ(q))2 ยท 22
ยท n steps and
this completes the proof of the theorem.
6
NP-hardness proofs
In this section we show that the Bounded Budget Plane Diameter Completion
and Bounded Budget/Face Plane Diameter Completion problems are NPcomplete.
Here we consider R2 -plane graphs, i.e., graphs embedded in the plane R2 . Each
2
R -plane graph has exactly one unbounded face, called the outer face, and all other
faces are called inner faces. Take in mind that every S0 -plane graph has as many
embeddings in R2 as the number of its faces (each correspond on which face of the
embedding in S0 will be chosen to be the outer face in R2 ). All our problems can be
equivalently restated on R2 -plane graphs. We choose such embeddings because they
facilitate the presentation of the result of this section.
We also need some additional terminology. A walk in a graph G of is a sequence
P = v0 , e1 , v1 , e2 , . . . , es , vs of vertices and edges of G such that v0 , . . . , vs โ V (G),
e1 , . . . , es โ E(G), the edges e1 , . . . , es are pairwise distinct, and for i โ {1, . . . , s},
ei = {viโ1 , vi }; v0 , vs are the end-vertices of the walk. A walk is closed if its end-vertices
are the same. The length of a walk P is the number of edges in P . For a walk P with
end-vertices u, v, we say that P is a (u, v)-walk. A walk is a path if v0 , . . . , vs and
e1 , . . . , es are pairwise distinct with possible exception v0 = vs , and a cycle is a closed
path. We write P = v0 . . . vs to denote a walk P = v0 , e1 , . . . , es , vs omitting edges.
Recall that the 3-Satisfiability problem for a given Boolean formula ฯ = C1 โง
. . . โง Cm with clauses C1 , . . . , Cm with 3 literals each over variables x1 , . . . , xn , asks
18
whether x1 , . . . , xn have an assignment that satisfies ฯ. We write that a literal xi โ Cj
(xi โ Cj resp.) if this interval is in Cj . For an instance ฯ of 3-Satisfiability, we define
the graphs Gฯ and G0ฯ as follows. The vertex set of Gฯ is {x1 , . . . , xn } โช {C1 , . . . , Cm },
and for i โ {1, . . . , n} and j โ {1, . . . , m}, {xi , Cj } โ E(Gฯ ) if and only if Cj contains
either xi or xi . Respectively, V (G0ฯ ) = {x1 , x1 , . . . , xn , xn }โช{C1 , . . . , Cm } and E(G0ฯ ) =
{{xi , xi }|1 โค i โค n}โช{{xi , Cj }|xi โ Cj , 1 โค i โค n, 1 โค j โค m}โช{{xi , Cj }|xi โ Cj , 1 โค
i โค n, 1 โค j โค m}.
Let ฯ over variables x1 , . . . , xn be an instance of 3-Satisfiability such that G0ฯ
is planar, and let G0 be a plane embedding of G0ฯ . Let also Rฯ = {{xi , xi }|1 โค i โค
n} โ E(G0 ). We define the bipartite graph H(G0 ) as the graph with the vertex set
Rฯ โช F (G0 ) and the edge set {{e, f }|e โ Rฯ , f โ F (G0 ) such that e is incident to f }.
We consider the following special variant of Satisfiability.
Plane Satisfiability with Connectivity of Variables
Input: A Boolean formula ฯ = C1 โง . . . โง Cm with clauses C1 , . . . , Cm with at most 3
literals each over variables x1 , . . . , xn such that G0ฯ is planar, and a plane embedding G0 of
G0ฯ such that H(G0 ) is connected.
Output: Is it possible to satisfy ฯ?
We show that this problem is hard.
Lemma 6. Plane Satisfiability with Connectivity of Variables is NPcomplete.
Proof. It is straightforward to see that Plane Satisfiability with Connectivity
of Variables is in NP. To show NP-hardness, we reduce Planar 3-Satisfiability,
i.e. the 3-Satisfiability problem restricted to instances ฯ such that Gฯ is planar.
This problem was shown to be NP-complete by Lichtenstein in [15].
Let ฯ = C1 โง . . . โง Cm over variables x1 , . . . , xn be an instance of Planar 3Satisfiability. For the plane graph Gฯ , we construct its plane embedding G. It is
well known that it can be done in polynomial time, e.g., by the classical algorithm of
Hopcroft and Tarjan [12] or by the algorithm of Boyer and Myrvold [1]. We consequently
consider variables x1 , . . . , xn and modify ฯ and G.
Suppose that a variable xi occurs in the clauses Cj1 , . . . , Cjp(i) . Without loss of
generality we assume that the edges {xi , Cj1 }, . . . , {xi , Cjp(i) } are ordered clockwise in
G as shown in Fig. 2 a). We perform the following modifications of ฯ and G.
โข Replace xi by 2p(i) new variables xi,1 , . . . , xi,2p(i) .
โข For k โ {1, . . . , p(i)}, replace xi in Cjk by xi,2kโ1 .
2p(i)
โข Construct 2p(i) clauses Ci1 , . . . , Ci
we assume that xi,0 = xi,2p(i) .
where Cik = xi,kโ1 โจxi,k for k โ {1, . . . 2p(i)};
โข Modify the current plane graph as it is shown in Fig. 2.3
3 Here and further we demonstrate constructions of plane embeddings in figures instead of long
technical formal descriptions.
19
Denote the obtained Boolean formula and plane graph by ฯฬ and Gฬ respectively. By
the construction, Gฬ is a plane embedding of Gฯฬ .
C j1
xi,1
Ci1
Cj1
Ci2
xi,2
xi,2p
xi
Ci2p
xi,3
xi,2pโ1
Cj2
Cjp
C j2
Cjp
a)
b)
Figure 2: Modification of ฯ and G: a) before the modification and b) after; p = p(i).
We show that ฯ can be satisfied if and only if ฯฬ has a satisfying assignment. Suppose
that the variables have assigned values such that ฯ = true. For each i โ {1, . . . , n}, we
assign the same value as xi for all the variables xi,1 , . . . , xi,2p(i) that replace xi in ฯฬ. It is
straightforward to verify that ฯฬ = true for this assignment. Assume now that ฯฬ = true
for some values of the variables. Observe that for each i โ {1, . . . , n}, the variables
2p(i)
xi,1 , . . . , xi,2p(i) that replace xi should have the same value to satisfy Ci1 , . . . , Ci
. It
remains to observe that if each xi has the same value as xi,1 , . . . , xi,2p(i) , then ฯ = true
by the construction of ฯฬ.
C j1
xi,1
xi,1
Ci2
Ci1
xi,2
xi,2p
xi,2
xi,2p
Ci2p
fi
xi,2pโ1
xi,2pโ1
xi,3
xi,3
C j2
Cjp
Figure 3: Construction of Gฬ0 ; it is assumed that Cj1 contains xi , Cj2 contains xi and
Cjp(i) contains xi , and p = p(i).
Observe that each variable xi,k in ฯฬ occurs in at most 3 clauses, and it occurs at
least once in positive and at least once with negation. It implies that a plane embedding
Gฬ0 of G0ฯฬ can be constructed from Gฬ by โsplittingโ the variable vertices as shown in
Fig. 3. Clearly, Gฬ0 can be constructed in polynomial time.
We claim that H(Gฬ0 ) is connected. To see it, observe that Gฬ0 is constructed from G
by replacing each variable-vertex xi by the cycle Li = Ci1 xi,1 xi,1 Ci2 . . . Ci1 (see Fig. 3).
20
Respectively, this graph has n new faces that are inner faces of these cycles. All other
faces correspond to the faces of G. Denote by fi the inner face of Li for i โ {1, . . . , n}.
Notice that Rฯฬ contains edges from the cycles Li . It follows that each vertex of Rฯฬ is
adjacent to some vertex fi in H(Gฬ0 ). Hence, to prove the connectivity of H(Gฬ0 ), it is
sufficient to show that for any two vertices h1 , h2 โ F (Gฬ0 ), H(Gฬ0 ) has a (h1 , h2 )-walk.
Consider the dual Gโ of Gฬ0 . Recall that V (Gโ ) = F (Gฬ0 ) and two vertices of Gโ are
adjacent if and only if the corresponding faces of Gฬ0 are adjacent. It is straightforward
to observe that the dual of any plane graph is always connected. Hence, to show
that for any two vertices h1 , h2 โ F (Gฬ0 ) of H(Gฬ0 ), H(Gฬ0 ) has a (h1 , h2 )-walk, it is
sufficient to prove that it holds for any two h1 , h2 that are adjacent vertices of Gโ , i.e.,
adjacent faces of Gฬ0 . Suppose that h1 = fi for some i โ {1, . . . , n}. Then h2 is a face
corresponding to a face h02 of G such that the vertex xi lies on the boundary of h02 .
Then by the construction of Gฬ0 , there is an edge e = {xi,j , xi,j } of Gฬ0 that lies on the
boundaries of h1 and h2 . Because e is a vertex of H(Gฬ0 ) adjacent to h1 , h2 , there is
a (h1 , h2 )-walk in H(Gฬ0 ). Assume now that h1 , h2 are faces of Gฬ0 distinct from fi for
i โ {1, . . . , n}. Because h1 , h2 are adjacent in Gโ , the faces h1 , h2 correspond to faces
h01 , h02 of G such that h01 , h02 has a common vertex xi on their boundaries. It implies
that h1 , h2 are adjacent to fi in Gโ . We already proved that H(Gฬ0 ) has (fi , h1 ) and
(fi , h2 )-walks. Therefore, H(Gฬ0 ) has an (h1 , h2 )-walk.
It completes the proof of connectedness of H(Gฬ0 ) and the proof of the lemma.
For the proof of our main result, we need some special gadgets. We introduce them
and prove their properties that will be useful further.
Let r โฅ 3 be a positive integer. We construct the graph Wr (v1 , . . . , vr ) as follows
(see Fig. 4).
โข Construct vertices v1 , . . . , vr and a vertex u.
โข For i โ {1, . . . , r}, construct a (vi , u) path xi0 . . . xir of length r, vi = xi0 , u = xir .
โข For j โ {1, . . . , r โ 1}, construct a cycle x1j . . . xrj x1j .
i
โข For i โ {1, . . . , r} and j โ {1, . . . , r โ 1}, construct an edge {xiโ1
jโ1 , xj }; we assume
that x0j = xrj for j โ {0, . . . , r}.
We say that the vertices of V (Wr (v1 , . . . , vr )) \ {v1 , . . . , vr } are the inner vertices of
the gadget.
Let G be a plane graph with a face f , and let v1 . . . vr v1 , r โฅ 3, be a facial walk
for f . We say that G0 is obtained from G by attaching a web to f if G0 is constructed
by adding a copy of Wr (v1 , . . . , vr ), where the vertices v1 , . . . , vr of the gadget are
identified with the vertices with the same names in the facial walk, and embedding
Wr (v1 , . . . , vr ) if f as is shown in Fig. 5. Notice that some vertices in the facial walk
can occur several times.
Lemma 7. Let G be a plane graph with a face f that has a facial walk of length r โฅ 3,
and let G0 be a plane graph obtained from G by attaching a web to f .
21
v1
v2
v5
v3
v4
Figure 4: Construction of W5 (v1 , . . . , v5 ).
Wr (v1 , . . . , vr )
f
Figure 5: Attachment of a web.
i) For any two vertices u, v โ V (G), distG0 (u, v) = distG (u, v). Moreover, any
shortest (u, v)-path in G0 has no inner vertices of Wr (v1 , . . . , vr ) attached to f .
ii) For any vertex v โ V (Wr (v1 , . . . , vr )), there is a vertex u โ V (G) such that
distG0 (u, v) โค r.
Proof. Let v1 . . . vr v0 be a facial walk for f . To prove i), it is sufficient to observe
that for all vi , vj , the length of any (vi , vj )-path in Wr (v1 , . . . , vr ) is greater that the
length of a shortest (vi , vj )-path in G that lies on the boundary of f . The definition of
Wr (v1 , . . . , vr ) immediately implies ii).
Let h be a positive integer. The graph Mh (u1 , u2 , u3 ) is defined as follows (see
Fig. 6).
โข Construct vertices u1 , u2 , u3 and v1 , v2 , v3 .
โข For i โ {1, 2, 3}, construct a (ui , vi ) path xi0 . . . xir of length `, ui = xi0 , vi = xih .
โข For j โ {1, . . . , h}, construct a cycle x1j . . . xrj x1j .
โข For j โ {1, . . . , h}, construct edges {x1jโ1 , x2j }, {x1jโ1 , x3j } and {x2jโ1 , x3j }.
We say that the vertices of V (Mh (u1 , u2 , u3 )) \ {u1 , u2 , u3 } are the inner vertices of
the gadget. We also say that u1 is the root and v1 is the pole of M` (u1 , u2 , u3 ).
Let G be a plane graph, and let u1 โ V (G) be a vertex incident to a face f with
a triangle facial walk u1 u2 u3 u1 . Let also ` be a positive integer. We say that G0 is
22
u2
u3
v1
u1
Figure 6: Construction of M3 (u1 , u2 , u3 ).
obtained from G by attaching a mast of height h rooted in u1 to f if G0 is constructed by
adding a copy of Mh (u1 , u2 , u3 ), where the vertices u1 , u2 , u3 of the gadget are identified
with the vertices with the same names in the facial walk, and embedding Mh (u1 , u2 , u3 )
in f . We need the properties summarized in the following straightforward lemma.
Lemma 8. Let ` be a positive integer. Let G be a plane graph, and let u1 be a vertex
of G incident to a face f with a triangle facial walk u1 u2 u3 u1 . Let also G0 be a plane
graph obtained from G by attaching a mast of height h rooted in u1 to f .
i) For any two vertices u, v โ V (G), distG0 (u, v) = distG (u, v). Moreover, any
shortest (u, v)-path in G0 has no inner vertices of Mh (u1 , u2 , u2 ) attached to f .
ii) For any vertex v โ V (Mh (u1 , u2 , u2 )), distG0 (u1 , v) โค h.
iii) If v is the pole of Mh (u1 , u2 , u2 ), then distG0 (u1 , v) = h and distG0 (u2 , v) >
h, distG0 (u3 , v) > h.
iv) For any inner vertices x, y of Mh (u1 , u2 , u2 ), distG0 (x, y) โค h.
Now we are ready to prove the main result of the section.
Proof of Theorem 1. It is straightforward to see that BPDC and BFPDC are in NP.
To show NP-hardness, we reduce Plane Satisfiability with Connectivity of
Variables that was shown to be NP-complete in Lemma 6.
First, we consider BPDC.
Let (ฯ, G0 ) be an instance of Plane Satisfiability with Connectivity of
Variables, where ฯ = C1 โง . . . โง Cm is a Boolean formula with clauses C1 , . . . , Cm
with at most 3 literals each over variables x1 , . . . , xn such that G0ฯ is planar, and
G0 is a plane embedding of G0ฯ such that H(G0 ) is connected. Recall that H(G0 ) is
the bipartite graph with the bipartition of the vertex set (Rฯ , F (G0 )), where Rฯ =
{{xi , xi }|1 โค i โค n} โ E(G0 ), and F (G0 ) is the set of faces of G0 , and for e โ Rฯ and
f โ F (G0 ), {e, f } โ E(H(G0 )) if and only if the edge e is incident to the face f in G0 .
Notice that degH(G0 ) (e) โค 2 for any e โ Rฯ .
We select an arbitrary vertex r โ F (G0 ) of H(G0 ). Using the connectedness of
H(G0 ), we find in polynomial time a tree T of shortest (r, e)-paths for e โ Rฯ by the
23
breadth-first search. We assume that T is rooted in r and it defines the parent-child
relation on T . Let L โ Rฯ be the set of leaves of T , and let s = max{distT (r, e)|e โ L}.
vp
vp
yi
yi
fi
yi
fi
fi
zi
xi
xi
xi
yi
fi
zi
xi
wi
vc
b)
a)
Figure 7: Construction of gadgets for {xi , xi }.
We construct the plane graph Gฬ as follows.
i) Construct a copy of G0 .
ii) For each vertex f โ V (T ) such that f โ F (G0 ), crate a vertex vf embedded in
the face f .
iii) For each e = {xi , xi } โ Rฯ \ L, denote by p its parent and by c its child
in T , construct vertices yi , y i , zi and edges {xi , yi }, {yi , vp }, {xi , vc }, {xi , zi },
{xi , y i }, {y i , vp }, {xi , vc }, {xi , zi }, {zi , vp } and embed them as is shown in Fig. 7
a). Denote by fi the inner face of the cycle xi yi vp zi xi and by f i the inner face
of the cycle xi y i vp zi xi .
iv) For each e = {xi , xi } โ L, denote by p its parent in T , construct vertices
yi , y i , zi , wi and edges {xi , yi }, {yi , vp }, {xi , wi }, {xi , zi }, {xi , y i }, {y i , vp }, {xi , wi },
{xi , zi }, {zi , vp } and embed them as is shown in Fig 7 b). Denote by fi the inner
face of the cycle xi yi vp zi xi and by f i the inner face of the cycle xi y i vp zi xi .
v) For each i โ {1, . . . , n} and j โ {1, . . . , m}, if {xi , Cj } โ E(G0 ) ({xi , Cj } โ E(G0 )
resp.), replace this edge by a (xi , Cj )-path (by (xi , Cj )-path resp.) of length
2s โ distT (r, {xi , xi }).
We denote the constructed at this stage graph by Gฬ1 . Observe that Gฬ1 is connected.
Hence, each face has a facial walk. Denote by ` the length of a longest facial walk in
Gฬ1 . Now we proceed with construction of Gฬ.
vi) For each face f โ F (Gฬ1 ) distinct from the faces fi , f i for i โ {1, . . . , n}, attach a
web to f .
Denote the constructed at this stage graph by Gฬ2 . Notice that Gฬ2 is 3-connected due
to attached webs.
vii) For j โ {1, . . . , m}, select a face f of the obtained graph such that Cj is incident
to f and attach a mast of height `+2s rooted in Cj to f (notice that the boundary
of f is a triangle because of attached webs).
24
viii) For each e = {xi , xi } โ L, attach a mast of height ` + 4s โ 1 โ distT (r, e) rooted
in wi to the face with the facial walk wi xi xi wi .
ix) For the vertex vr , select a face f with a triangle boundary such that vr is incident
to f (such a face always exists due to attached webs) and attach a mast of height
` + 8s rooted in vr to f .
Notice that the obtained graph Gฬ is 3-connected because Gฬ2 is 3-connected and
attachments of masts cannot destroy 3-connectivity. Also only the faces fi , f i for
i โ {1, . . . , n} have degree 4, and all other faces have degree 3.
To complete the construction of an instance of BPDC, we set q = n and d = 2`+12s.
We show that (ฯ, G0 ) is a yes-instance of Plane Satisfiability with Connectivity of Variables if and only if (Gฬ, q, d) is a yes-instance of BPDC.
Suppose that (ฯ, G0 ) is a yes-instance of Plane Satisfiability with Connectivity of Variables. Assume that the variables x1 , . . . , xn have values such that
ฯ = true. For i โ {1, . . . , n}, if xi = true, then we add an edge {xi , vp } for the parent
p of {xi , xi } in T and embed this edge in fi . Respectively, we add an edge {xi , vp } and
embed this edge in f i if xi = f alse. Denote the obtained graph by Gฬ0 . We show that
diam(Gฬ0 ) โค d.
By the construction of Gฬ1 , for any vertex v โ V (Gฬ1 ), distGฬ1 (vr , v) โค 3s. By
Lemma 7, any vertex v โ V (Gฬ2 ) is at distance at most ` from a vertex of Gฬ1 in Gฬ2 .
Hence, for any vertex v โ V (Gฬ2 ), distGฬ2 (vr , v) โค ` + 3s. Observe also that for any
e = {xi , xi } โ L, distGฬ0 (vr , wi ) = distT (r, e) + 1. To show that for any u, v โ V (Gฬ0 ),
distGฬ0 (u, v) โค d, we consider five cases.
Case 1. u, v โ V (Gฬ2 ). Because distGฬ2 (vr , u) โค ` + 3s and distGฬ2 (vr , v) โค ` + 3s,
distGฬ0 (u, v) โค distGฬ2 (u, v) โค 2` + 6s โค d.
Case 2. u, v are vertices of the same mast attached to a face of Gฬ2 . By Lemma 8,
distGฬ0 (u, v) is at most the height of the mast, and we have that distGฬ0 (u, v) โค `+8s โค d.
Case 3. u โ V (Gฬ2 ) and v is a vertex of a mast attached to a face of Gฬ2 . By
Lemma 8, distGฬ0 (u, vr ) โค ` + 8s if the mast is rooted in vr . Suppose that this mast
is rooted in some other vertex z, i.e., z = wi or z = Cj for some i โ {1, . . . , n},
j โ {1, . . . , m}. Then distGฬ0 (u, vr ) โค ` + 4s โ 1 + distGฬ1 (z, r) โค ` + 8s. Because
distGฬ0 (vr , v) โค distGฬ2 (vr , v) โค ` + 3s, distGฬ0 (u, v) โค 2` + 11s โค d.
Case 4. u, v are vertices of distinct masts attached to faces of Gฬ2 that are rooted
in z, z 0 6= vr respectively. If z = wi for some i โ {1, . . . , n}, then distGฬ0 (u, vr ) โค
` + 4s โ 1 โ distT (r, e) + distGฬ0 (vr , wi ) โค (` + 4s โ 1 โ distT (r, e)) + (distT (r, e) + 1) โค
` + 4s where e = {xi , xi }. If z = Cj for some j โ {1, . . . , m}, then distGฬ0 (u, vr ) โค
` + 2s + distGฬ1 (Cj , vr ) โค ` + 5s. Clearly, the same bounds hold for distGฬ0 (v, vr ). We
have that distGฬ0 (u, v) โค distGฬ0 (u, vr ) + distGฬ0 (vr , v) โค 2` + 10s โค d.
It remains to consider the last case.
Case 5. u, v are vertices of masts attached to faces of Gฬ2 such that u is in the mast
rooted in vr and v is in a mast rooted in z 6= vr . Suppose that z = wi for some
i โ {1, . . . , n}. Then e = {xi , xi } โ L. We have that distGฬ0 (u, v) โค distGฬ0 (u, vr ) +
25
distGฬ0 (vr , wi ) + distGฬ0 (wi , v) โค (` + 8s) + (distT (r, e) + 1) + (` + 4s โ 1 โ distT (r, e)) โค
2` + 12s โค d. Assume that z = Cj for j โ {1, . . . , m}. Then the clause Cj in ฯ contains
a literal that has the value true. Let xi be such a literal (the case when Cj contains
some xi = true is symmetric). Notice that if xi = true, then for the vertex xi โ V (Gฬ0 ),
distGฬ0 (xi , vr ) = distT (e, r) for e = {xi , xi } by the construction of Gฬ and the selection
of the added edges. Then, distGฬ0 (u, v) โค distGฬ0 (u, vr )+distGฬ0 (vr , xi )+distGฬ0 (xi , Cj )+
distGฬ0 (Cj , v) โค (` + 8s) + distT (r, e) + (2s โ distT (r, e)) + (` + 2s) โค 2` + 12s โค d.
Suppose now that (Gฬ, q, d) is a yes-instance of BPDC. Let A be a set of at most
q edges such that the graph Gฬ0 obtained from Gฬ by the addition of A has diameter
at most d. Because only the faces fi , f i for i โ {1, . . . , n} have degree 4 and all other
faces have degree 3, each edge of A has its end-vertices in the boundary of some fi
or f i and is embedded in this face. Using this observation, denote by Gฬ01 and Gฬ02 the
graphs obtained from Gฬ1 and Gฬ2 respectively by the addition of A. Let vr0 be the pole
of the mast rooted in vr . Because diam(Gฬ0 ) โค d, for any u โ V (Gฬ0 ), distGฬ0 (vr0 , u) โค d
and, in particular, it holds for poles of other masts.
Consider masts rooted in wi for e = {xi , xi } โ L. For a mast rooted in wi ,
denote by wi0 its pole. By Lemma 8, distGฬ0 (vr0 , wi0 ) = distGฬ0 (vr0 , vr ) + distGฬ0 (vr , wi ) +
distGฬ0 (wi , wi0 ) = (` + 8s) + distGฬ0 (vr , wi ) + (` + 4s โ 1 โ distT (r, e)), and by Lemma 7,
2
distGฬ0 (vr , wi ) = distGฬ0 (vr , wi ). We conclude that distGฬ0 (vr , wi ) โค distT (r, e) + 1.
2
1
1
Because distT (r, e) + 1 โค s + 1, a shortest (vr , wi )-path in Gฬ01 does not contain the
vertices Cj for j โ {1, . . . , m}. We obtain that for every edge e0 = {xh , xh } that lies on
the unique (r, e)-path in T , {xi , vp } โ A or {xi , vp } โ A where p is the parent of e0 in
T . This holds for each leaf of T . Because Rฯ โ V (T ) and k = n, we have that for each
h โ {1, . . . , n}, either {xi , vp } โ A or {xi , vp } โ A where p is the parent of {xh , xh } in
T . For h โ {1, . . . , n}, we let the variable xh = true if {xi , vp } โ A and xh = f alse
otherwise. We show that this assignment satisfies ฯ.
Consider a clause Cj for j โ {1, . . . , m}. To simplify notations, assume that Cj
contains literals xi1 , xi2 , xi3 (the cases when Cj contains two literals and/or some
literals are negations of variables are considered in the same way). Let Cj0 be the
pole of the mast rooted in the vertex Cj . We have that distGฬ0 (vr0 , Cj0 ) โค d. By
Lemma 8,distGฬ0 (vr0 , Cj0 ) = distGฬ0 (vr0 , vr ) + distGฬ0 (vr , Cj ) + distGฬ0 (Cj , Cj0 ) = (` + 8s) +
distGฬ0 (vr , Cj ) + (` + 2s), and by Lemma 7, distGฬ0 (vr , Cj ) = distGฬ0 (vr , Cj ). Therefore,
2
2
1
distGฬ0 (vr , Cj ) โค 2s. Let eh = {xih , xih } for h โ {1, 2, 3}. By the construction
1
of Gฬ0 , distGฬ0 (vr , Cj ) = min{distGฬ0 (vr , xih ) + (2s โ distT (r, eh ))|1 โค h โค 3}. Let
1
1
distGฬ0 (vr , Cj ) = distGฬ0 (vr , xih ) + (2s โ distT (r, eh )) for h โ {1, 2, 3}. It follows that
1
1
distGฬ0 (vr , xih ) โค distT (r, eh ), and this immediately implies that {vp , xih } โ A where
1
p is the parent of eh in T . By the definition, xih = true and, therefore, Cj = true.
This holds for each Cj for j โ {1, . . . , m}, and we conclude that ฯ = true.
To complete the proof of the NP-hardness of BPDC, it remains to observe that Gฬ
can be constructed in polynomial time.
To show NP-hardness of BFPDC, we use similar arguments.
26
Let (ฯ, G0 ) be an instance of Plane Satisfiability with Connectivity of
Variables, where ฯ = C1 โง . . . โง Cm is a Boolean formula with clauses C1 , . . . , Cm
with at most 3 literals each over variables x1 , . . . , xn such that G0ฯ is planar, and G0 is
a plane embedding of G0ฯ such that H(G0 ) is connected. As before, we pick an arbitrary
vertex r โ F (G0 ) of H(G0 ) and find a tree T rooted in r of shortest (r, e)-paths for
e โ Rฯ with the set of leaves L โ Rฯ . Let s = max{distT (r, e)|e โ L}.
vp
vp
yi
yi
yi
yi
fi
fi
xi
xi
xi
xi
wi
vc
b)
a)
Figure 8: Construction of gadgets for {xi , xi }.
We construct the plane graph Gฬ similarly to the construction of Gฬ above. The only
difference is that Steps iii) and iv) are replaced by the following steps iiiโ ) and ivโ ).
iiiโ ) For each e = {xi , xi } โ Rฯ \ L, denote by p its parent and by c its child in T , construct vertices yi , y i and edges {xi , yi }, {yi , vp }, {xi , vc }, {xi , y i }, {y i , vp }, {xi , vc }
and embed them as is shown in Fig. 8 a). Denote by fi the inner face of the cycle
xi yi v p y i xi xi .
ivโ ) For each e = {xi , xi } โ L, denote by p its parent in T , construct vertices yi , y i , wi
and edges {xi , yi }, {yi , vp }, {xi , wi }, {xi , y i }, {y i , vp }, {xi , wi } and embed them
as is shown in Fig 8 b). Denote by fi the inner face of the cycle xi yi vp y i xi xi .
Observe that Gฬ can be obtained from Gฬ by the deletion of the vertices z1 , . . . , zn , and
for any u, v โ V (Gฬ), distGฬ (u, v) = distGฬ (u, v). Notice that the obtained graph Gฬ is
3-connected, the faces f1 , . . . , fn have degree 5, and all other faces have degree 3. To
complete the construction of an instance of BFPDC, we set k = 1 and d = 2` + 12s.
We show that (ฯ, G0 ) is a yes-instance of Plane Satisfiability with Connectivity of Variables if and only if (Gฬ, k, d) is a yes-instance of BFPDC.
Suppose that (ฯ, G0 ) is a yes-instance of Plane Satisfiability with Connectivity of Variables. Assume that the variables x1 , . . . , xn have values such that
ฯ = true. For i โ {1, . . . , n}, if xi = true, then we add an edge {xi , vp } for the parent
p of {xi , xi } in T and embed this edge in fi . Respectively, we add an edge {xi , vp }
and embed this edge in fi if xi = f alse. Denote the obtained graph by Gฬ0 . By exactly
the same arguments as for the proof of the inequality diam(Gฬ0 ) โค d, we have that
diam(Gฬ0 ) โค d.
Suppose now that (Gฬ, k, d) is a yes-instance of BFPDC. Let A be a set of edges
such that the graph Gฬ0 obtained from Gฬ by the addition of A has diameter at most
27
d. Because only the faces f1 , . . . , fn have degree 5 and all other faces have degree 3,
each edge of A has its end-vertices in the boundary of some fi and is embedded in this
face. Because k = 1, at most one edge of A is embedded in fi for i โ {1, . . . , n}. Let
vr0 be the pole of the mast rooted in vr . Because diam(Gฬ0 ) โค d, for any u โ V (Gฬ0 ),
distGฬ0 (vr0 , u) โค d and, in particular, it holds for poles of other masts. Consider masts
rooted in wi for e = {xi , xi } โ L. For a mast rooted in wi , denote by wi0 its pole.
Because distGฬ0 (vr0 , wi0 ) โค d, by the same arguments that were used above in the proof of
the NP-hardness of BPDC, we obtain that it implies that for each h โ {1, . . . , n}, either
{xi , vp } โ A or {xi , vp } โ A where p is the parent of {xh , xh } in T . For h โ {1, . . . , n},
we let the variable xh = true if {xi , vp } โ A and xh = f alse otherwise. To prove that
this assignment satisfies ฯ, we again use the same arguments as above: it follows from
the fact that for each clause Cj , distGฬ0 (vr0 , Cj0 ) โค d where Cj0 is the pole of the mast
rooted in the vertex Cj .
To complete the proof of the NP-hardness of BPDC, it remains to observe that Gฬ
can be constructed in polynomial time.
We proved that BPDC is NP-complete for 3-connected planar graphs. By the
Whitneyโs theorem (see, e.g., [6]), any two plane embeddings of a 3-connected plane
graphs are equivalent. It gives the following corollary.
Bounded Budget Planar Diameter Completion
Input: A planar graph G, non-negative integers k and d.
Output: Is it possible to obtain a planar graph G0 of diameter at most d from G by adding
at most k edges?
Corollary 2. Bounded Budget Planar Diameter Completion is NP-complete
for 3-connected planar graphs.
7
Discussion
We remark that our algorithm still works for the classic PDC problem when the
face-degree of the input graph is bounded. For this we define the following problem:
Bounded Face BDC (FPDC)
Input: a plane graph G with face-degree at most k โ Nโฅ3 , and d โ N
Question: is it possible to add edges in G such that the resulting embedding remains plane
and has diameter at most d?
We directly have the following corollary of Theorem 2.
O((kd) log d)
Theorem 3. It is possible to construct an O(n3 ) + 22
FPDC.
ยท n-step algorithm for
To construct an FPT-algorithm for PDC when parameterized by d remains an
insisting open problem. The reason why our approach does not apply (at least directly)
for PDC is that, as long as a completion may add an arbitrary number of edges in each
28
face, we cannot guarantee that our dynamic programming algorithm will be applied
on a graph of bounded branchwidth. We believe that our approach and, in particular,
the machinery of our dynamic programming algorithm, might be useful for further
investigations on this problem.
All the problems in this paper are defined on plane graphs. However, one may also
consider the โnon-embeddedโ counterparts of the problems PDC and BPDC by asking
that their input is a planar combinatorial graphs (without a particular embedding).
Similarly, such a counterpart can also be defined for the case of BFPDC if we ask
whether the completion has an embedding with at most k new edges per face. Again,
all these parameterized problems are known to be (non-constructively) in FPT, because
of the results in [18, 16]. However, our approach fails to design the corresponding
algorithms as it strongly requires an embedding of the input graph. For this reason we
believe that even the non-embedded versions of BPDC and BFPDC are as challenging
as the general Planar Diameter Completion problem.
Acknowledgement. We would like to thank the anonymous referees of an earlier
version of this paper for their remarks and suggestions that improved the presentation
of the paper.
References
[1] John M. Boyer and Wendy J. Myrvold. On the cutting edge: Simplified O(n)
planarity by edge addition. J. Graph Algorithms Appl., 8(2):241โ273, 2004.
[2] Dimitris Chatzidimitriou, Archontia C. Giannopoulou, Spyros Maniatis, Clment
Requil, Dimitrios M. Thilikos, and Dimitris Zoros. Fixed parameter algorithms
for completion problems on planar graphs. Manuscript, 2015.
[3] F. R. K. Chung. Diameters of graphs: Old problems and new results. Congressus
Numerantium, 60, 1987.
[4] Bruno Courcelle. The expression of graph properties and graph transformations in
monadic second-order logic. Handbook of Graph Grammars, pages 313โ400, 1997.
[5] Italo J. Dejter and Michael R. Fellows. Improving the diameter of a planar graph.
Manuscript, may 1993.
[6] Reinhard Diestel. Graph Theory, 4th Edition, volume 173 of Graduate texts in
mathematics. Springer, 2012.
[7] Frederic Dorn, Eelko Penninkx, Hans L. Bodlaender, and Fedor V. Fomin. Efficient exact algorithms on planar graphs: Exploiting sphere cut decompositions.
Algorithmica, 58(3):790โ810, 2010.
29
[8] Rodney G. Downey and Michael R. Fellows. Fundamentals of Parameterized
Complexity. Texts in Computer Science. Springer, 2013.
[9] Yong Gao, Donovan R. Hare, and James Nastos. The parametric complexity of
graph diameter augmentation. Disc. Appl. Math., 161(10-11):1626โ1631, 2013.
[10] Qian-Ping Gu and Hisao Tamaki. Optimal branch-decomposition of planar graphs
in O(n3 ) time. ACM Transactions on Algorithms, 4(3), 2008.
[11] Qian-Ping Gu and Hisao Tamaki. Improved bounds on the planar branchwidth
with respect to the largest grid minor size. In Algorithms and Computation - 21st
International Symposium, (ISAAC 2010), pages 85โ96, 2010.
[12] John E. Hopcroft and Robert Endre Tarjan. Efficient planarity testing. J. ACM,
21(4):549โ568, 1974.
[13] Athanassios Koutsonas and Dimitrios M. Thilikos. Planar feedback vertex set and
face cover: Combinatorial bounds and subexponential algorithms. Algorithmica,
60(4):987โ1003, 2011.
[14] Chung-Lun Li, S. Thomas McCormick, and David Simchi-Levi. On the minimumcardinality-bounded-diameter and the bounded-cardinality-minimum-diameter
edge addition problems. Oper. Res. Lett., 11(5):303โ308, 1992.
[15] David Lichtenstein. Planar formulae and their uses. SIAM Journal on Computing,
11(2):329โ343, 1982.
[16] Neil Robertson and Paul D. Seymour. Graph minors XIII. The disjoint paths
problem. J. Comb. Theory, Ser. B, 63(1):65โ110, 1995.
[17] Neil Robertson and Paul D. Seymour. Graph Minors. XIII. The disjoint paths
problem. J. Combin. Theory, Ser. B, 63(1):65โ110, 1995.
[18] Neil Robertson and Paul D. Seymour. Graph minors. XX. Wagnerโs conjecture.
J. Combin. Theory Ser. B, 92(2):325โ357, 2004.
[19] Anneke A. Schoone, Hans L. Bodlaender, and Jan van Leeuwen. Diameter increase
caused by edge deletion. Journal of Graph Theory, 11(3):409โ427, 1987.
[20] Paul D. Seymour and Robin Thomas. Call routing and the ratcatcher. Combinatorica, 14(2):217โ241, 1994.
30
| 8cs.DS
|
A Centralized Local Algorithm for the Sparse Spanning Graph
Problem
Christoph Lenzen
โ
Reut Levi
โ
arXiv:1703.05418v2 [cs.DS] 18 Jul 2017
July 20, 2017
Abstract
Constructing a sparse spanning subgraph is a fundamental primitive in graph theory. In
this paper, we study this problem in the Centralized Local model, where the goal is to decide
whether an edge is part of the spanning subgraph by examining only a small part of the input;
yet, answers must be globally consistent and independent of prior queries.
Unfortunately, maximally sparse spanning subgraphs, i.e., spanning trees, cannot be constructed efficiently in this model. Therefore, we settle for a spanning subgraph containing at
most (1 + )n edges (where n is the number of vertices and is a given approximation/sparsity
parameter). We achieve a query complexity of Oฬ(poly(โ/ฮต)n2/3 ),1 where โ is the maximum
degree of the input graph. Our algorithm is the first to do so on arbitrary bounded degree
graphs. Moreover, we achieve the additional property that our algorithm outputs a spanner, i.e.,
distances are approximately preserved. With high probability, for each deleted edge there is a
path of O(log n ยท (โ + log n)/) hops in the output that connects its endpoints.
1
Introduction
When operating on very large graphs, it is often impractical or infeasible to (i) hold the entire graph
in the local memory of a processing unit, (ii) run linear-time (or even slower) algorithms, or even
(iii) have only a single processing unit perform computations sequentially. These constraints inspired
the Centralized Local model [17], which essentially views the input as being stored in a (likely
distributed) database that provides query access to external processing units. To minimize the
coordination overhead of such a system, it is furthermore required that there is no shared memory
or communication between the querying processes, except for shared randomness provided alongside
the access to the input. The idea is now to run sublinear-time algorithms that extract useful global
properties of the graph and/or to examine the input graph locally upon demand by applications.
Studying graphs in this model leads to the need for query access to a variety of graph-theoretical
structures like, e.g., independent or dominating sets. In such a case, it is crucial that locally
evaluating whether a node participates in such a set is consistent with the same evaluation for
other nodes. This is a non-trivial task, as local decisions can only be coordinated implicitly via the
structure of the input (which is to be examined as little as possible) and the shared randomness.
โ
MPI for Informatics, Saarbruฬcken 66123, Germany, [email protected]
MPI for Informatics, Saarbruฬcken 66123, Germany, [email protected]
1
Oฬ-notation hides polylogarithmic factors in n.
โ
1
Nonetheless, this budding field brought forth a number of elegant algorithms solving, e.g., maximal
independent set, hypergraph coloring, k-CNF, approximate maximum matching and approximate
minimum vertex cover for bipartite graphs [1, 4, 5, 11, 12, 13, 17].
In this work, we consider another very basic graph structure: sparse spanning subgraphs. Here,
the task is to select a subset of the edges of the (connected) input graph so that the output is still
connected, but has only few edges. By โfewโ we mean that, for some input parameter ฮต > 0, the
number of selected edges is at most (1 + ฮต)n, where n denotes the number of nodes. One may see
this as a relaxed version of the problem of outputting a spanning tree of the graph, which is a too
rigid requirement when looking for fast algorithms: on a cycle, a single edge has to be deleted, but
this necessitates to first verify that the input graph is not, in fact, a line.
Definition 1 ([9]) An algorithm A is a Local Sparse Spanning Graph (LSSG) algorithm if, given
n, โ โฅ 1, a parameter โฅ 0, and query access to the incidence list representation of a connected
graph G = (V, E) over n vertices and of degree at most โ, it provides oracle access to a subgraph
G0 = (V, E 0 ) of G such that:
1. G0 is connected.
2. |E 0 | โค (1 + ) ยท n with high probability (w.h.p.),2 where E 0 is determined by G and the internal
randomness of A.
By โproviding oracle access to G0 โ we mean that on input {u, v} โ E, A returns whether {u, v} โ E 0 ,
and for any sequence of edges, A answers consistently with respect to the same G0 .
We are interested in LLSG algorithms that, for each given edge, perform as few queries as
possible to G. Observe that Item 2 implies that the answers of an LLSG algorithm to queries cannot
depend on previously asked queries.
We note that relaxing from requiring a tree as output makes it possible to ask for additional
guarantees that, in general, cannot be met by a spanning tree. Instead of merely preserving
connectivity, it becomes possible to maintain distances up to small factors. Such subgraphs are
known as (sparse, multiplicative) spanners [14, 15]. In fact, choosing ฮต โ o(1) then yields ultra-sparse
spanners that are o(n) edges away from being trees.
1.1
Our Contribution
We give the first non-trivial LSSG algorithm in the Centralized Local model that runs on arbitrary
graphs. We achieve a query complexity of Oฬ(poly(โ/ฮต)n2/3 ) per edge, w.h.p. Moreover, we
guarantee that for each edge that is not selected into the spanner, w.h.p. there is a path of
O(log n ยท (โ + log n)/) hops consisting of edges that are selected into the spanner; this is referred
to as a stretch of O(log n ยท (โ + log n)/).
For simplicity, assume for the moment that โ and ฮต are constants. Our algorithm combines the
following key ideas.
โข We classify edges as expanding if there are sufficiently many (roughly n1/3 ) nodes within
O(log n) hops of their endpoints. For non-expanding edges, we can efficiently simulate a
standard distributed spanner algorithm at small query complexity, as solutions of running
time O(log n) are known (e.g. [3]).
2
That is, with probability at least 1 โ 1/nc for an arbitrary constant c > 0 that is chosen upfront.
2
โข On the node set induced by expanding edges, we can construct a partition into Voronoi cells
with respect to roughly n2/3 randomly sampled centers. The Voronoi cells are spanned by
trees of depth O(log n), as expanding nodes have their closest center within O(log n) hops
w.h.p. Finding the closest center has query complexity Oฬ(n1/3 ).
โข We refine the partition into Voronoi cells further into clusters of Oฬ(n1/3 ) nodes. We simply let
a node be a singleton cluster if its subtree in the spanning tree of its cell contains more than
Oฬ(n1/3 ) nodes. This construction has query complexity Oฬ(n2/3 ) for constructing a complete
cluster, yet ensures that there are Oฬ(n2/3 ) clusters in total due to the low depth of the trees;
moreover, each cluster is completely contained in some Voronoi cell.
โข It remains to select few edges to interconnect the Voronoi cells. This is the main challenge, for
which the above properties of the partition are crucial. To keep the number of selected edges
small in expectation, we mark a subset of expected size ฮฬ(n1/3 ) of the clusters by marking
each Voronoi cell (and thereby its constituent clusters) with probability nโ1/3 . We then try to
ensure that (i) clusters select an edge to each adjacent marked Voronoi cell and (ii) for each
marked Voronoi cell adjacent to an adjacent cluster, they select one edge connecting to some
cluster adjacent to this cell.
โข The main issue with the previous step is that we cannot afford to construct each adjacent
cluster, preventing us from guaranteeing (ii). We circumvent this obstacle by identifying for
adjacent clusters in which cell they are and keeping an edge for the purpose of (ii) if it satisfies
a certain minimality requirement with respect to the rank of the cell used for symmetry
breaking purposes. This way, we avoid construction of adjacent clusters, instead needing
to determine the rank of their Voronoi cells only. This way, we maintain query complexity
Oฬ(n2/3 ).
โข However, this now entails an inductive argument for ensuring connectivity, which also affects
stretch. By choosing Voronoi cell ranks uniformly at random, we ensure that the length of
such an inductive chain is bounded by O(log n) w.h.p. Together with the depth of the Voronoi
cell trees of O(log n) and the stretch of the spanner algorithm for non-expanding edges (also
O(log n)), this yields the total bound of O(log2 n) on the stretch of our scheme.
Finally, we note that we can place the above routine in a wrapper verifying that, w.h.p., the
number of globally selected edges does not significantly exceed the expectation. If this is not the
case, the wrapper starts the process all over. Since in each attempt the success probability is
constant (and the verifier succeeds w.h.p.), we get within O(log n) attempts that the bound on the
number of selected edges is satisfied w.h.p. and the routine terminates.
Relation to Property Testing. As observed in [10], testing cycle-freeness with one sidederror in the bounded-degree model can be reduced to the LSSG problem. From this reduction it
follows that we obtain a tester for cycle-freeness that works in Oฬ(n2/3 ) time. Czumaj et al. [2]
studied the problem of Ck -minor freeness with one sided-error. For cycle-freeness (C3 -minor freeness)
โ
their complexity is Oฬ( n), therefore their complexity is better than ours. However, we would like
to point out that an LSSG algorithm gives a stronger guarantee than a one-sided error tester for
cycle-freeness. An LSSG algorithm can be used to find for all but at most (1 + )|V | edges e a cycle
that e belongs to, i.e., a witness for the violation by e can be provided. In constrast, a one-sided
error tester merely guarantees to find a single cycle in instances that are -far from being cycle-free.
Perhaps more importantly, our approach proves useful when testing for other minors. Recently,
Fichtenberger et al. [6] built on our work to construct one-sided error testers for each minor of the
3
(k ร 2)-grid.
1.2
Related work
The problem of finding a sparse spanning subgraph in the Centralized Local model was first studied
โ
in [9], where the authors show a lower bound of โฆ( n) queries for constant and โ (see also survey
by Rubinfeld [18]). They also present an upper bound with nearly tight query complexity for graphs
that have very good expansion properties. However, for general (bounded degree) graphs their
algorithm might query the entire graph for completing a single call to the oracle. They also provide
an efficient algorithm for minor-free graphs that was later improved in [8]. The algorithm presented
in [8] achieves a query complexity that is polynomial in โ and 1/ and is independent of n. The
stretch factor of this algorithm is also independent of n and depends only on โ, 1/, and the size of
the excluded minor.
A characterization of the query complexity of the problem was presented in [7]. Specifically, this
work provides an upper bound (which builds on an algorithm in [9]) that has a query complexity
that is independent of n (however, super-exponential in 1/) for families of graphs which are, roughly
speaking, sufficiently non-expanding everywhere. On the other hand, they show that, for a family of
graphs with expansion properties that are slightly better, any local algorithm must have a query
complexity that depends on n.
In the (distributed) Local model, Ram and Vicari [16] study the same problem and provide an
algorithm that runs in min{D, O(log n)} rounds, where D denotes the diameter of the input graph.
Their algorithm achieves the sparsity property by breaking all short cycles.
2
Preliminaries
The graphs we consider are undirected and have a known degree bound โ, and we assume we have
query access to their incidence list representation. Namely, for any vertex v and index 1 โค i โค โ, it
is possible to obtain the ith neighbor of v by performing a query to the graph (if v has less than i
neighbors, then a special symbol is returned). Without loss of generality, we assume that graphs
are simple, i.e., contain neither loops nor parallel edges.3 The number of vertices in the graph is n
and we assume that each vertex v has a unique id, which for simplicity we also denote by v. There
is a total order on the ids, i.e., given any two distinct ids u and v, we can decide whether u < v or
v < u.
Let G = (V, E) be a graph, where V = [n]. We denote the distance between two vertices u and
v in G by dG (u, v). For vertex v โ V and an integer r, let ฮr (v, G) denote the set of vertices at
distance at most r from v. When the graph G is clear from the context, we shall use the shorthands
d(u, v) and ฮr (v) for dG (u, v) and ฮr (v, G), respectively.
The total order on the vertices induces a total order r on the edges of the graph in the
following straightforward manner: r({u, v}) < r({u0 , v 0 }) if and only if min{u, v} < min{u0 , v 0 } or
min{u, v} = min{u0 , v 0 } and max{u, v} < max{u0 , v 0 }. The total order over the vertices also induces
an order over those vertices visited by a Breadth First Search (BFS) starting from any given vertex
v, and whenever we refer to a BFS, we mean that it is performed according to this order.
3
The answer on a self-loop can always be negative, and we can default to rejecting all but the first edge between
two nodes.
4
Figure 1: Partition of a graph into cells and clusters, where k = 6. Black lines are the borders of
Voronoi cells, whose centers have black fillings. Red edges belong to the BFS trees spanning the
clusters, while dashed gray lines are non-tree edges. Red circles indicate singleton clusters (if the
node has a red child) or the roots of subtrees that form a cluster (if the children are black).
Whenever referring to one of the above orders, we may refer to the rank of an element in
the respective order. This is simply the index of the respective element when listing all elements
ascendingly with respect to the order.
For a graph G = (V, E) and a pair of disjoint subsets of vertices A โ V and B โ V let
def
EG (A, B) = {(u, v) โ E | u โ A โง v โ B}. When it is clear from the context, we omit the subscript.
We say that a pair of subsets of vertices A and B are adjacent if EG (A, B) 6= โ
.
3
An Algorithm that Works under a Promise
We begin by describing an LSSG algorithm which works under the following promise on the input
graph G = (V, E). Sample ` uniformly at random from [2 log n/ log(1 + ), 2 log n/ log(1 + ) + โ/}],
def
and let k = cn1/3 ln n ยท `โ/, where c is a constant that will be determined later. For every v โ V ,
def
let iv = minr {|ฮr (v)| โฅ k}. We are promised that maxvโV {iv } โค `. In words, we assume that the
`-hop neighborhood of every vertex in G contains at least k vertices. First, we fix a simple partition
of V .
5
3.1
The Underlying Partition
def
Centers. Pick a set S โ |V | of r = ฮ(n2/3 / ln n) vertices at random. We shall refer to the
vertices in S as centers. For each vertex v โ V , its center, denoted by c(v), is the center which is
closest to v amongst all centers (break ties between centers according to the id of the center).
Voronoi cells. The Voronoi cell of a vertex v, denoted by Vor(v), is the set of all vertices
u for which c(u) = c(v). Additionally, we assign to each cell a random rank, so that there is a
uniformly random total order on the cells; note carefully that the rank of a cell thus differs from the
rank of its center (which is given by its identifier, which is not assigned randomly). We remark that
we can determine the rank of the cell from the shared randomness and the cellโs identifier, for which
we simply use the identifier of its center.
Clusters. For each Voronoi cell, consider the BFS tree spanning it, which is rooted at the
respective center. For every v โ V , let p(v) denote the parent of v in this BFS tree. If v is a center
then p(v) = v. For every v โ V \ S, let T (v) denote the subtree of v in the above-mentioned BFS
tree when we remove the edge {v, p(v)}; for v โ S, T (v) is simply the entire tree. Now consider a
Voronoi cell. If the cell contains at most k vertices, then the cluster of all the vertices in the Voronoi
cell is the cell itself. Otherwise, there are two cases. If T (v) contains at least k vertices, then the
cluster of v is the singleton {v}. Otherwise, v has a unique ancestor u (including v) for which T (u)
contains less than k vertices and T (p(u)) contains at least k vertices. The cluster of v is the set of
vertices in T (u). For a cluster C, let c(C) denote the center of the vertices in C (all the vertices in
the cluster have the same center). Let Vor(C) denote the Voronoi cell of the vertices in C.
This describes a partition of V into Voronoi cells, and a refinement of this partition into clusters.
See Figure 1 for an illustration.
3.2
The Edge Set
Our spanner, H = (V, E 0 ), initially contains, for each Voronoi cell Vor the edges of the BFS tree
that spans Vor, i.e., the BFS tree rooted at the center of Vor spanning the subgraph induced by
Vor (see Section 2 for more details). Clearly, these edges also span the clusters. Next, we describe
which edges we add to E 0 in order to connect the clusters.
Marked Clusters and Clusters-of-Clusters
def
Each center is marked independently with probability p = 1/n1/3 . If a center is marked, then we
say that its Voronoi cell is marked and all the clusters in this cell are marked as well.
Cluster-of-clusters. For every marked cluster, C, define the cluster-of-clusters of C, denoted
by C(C), to be the set of clusters which consists of C and all the clusters which are adjacent to C.
A cluster B is participating in C(C) if B โ C(C) and the edge of minimum rank in E(B, Vor(C))
also belongs to E(B, C). Thus, if B is adjacent to Vor(C) and Vor(C) is marked, then there is a
unique cluster D โ Vor(C) such that B participates in C(D). See Figure 2 for a visualization.
6
E
F
C(C)
D
C
Figure 2: Illustration of marked clusters and clusters of clusters. Thick red and black ovals are
marked and unmarked cells, respectively. Thin circles are clusters, where cluster C comprises its
entire cell. Thick edges are the ones of minimum rank between their incident clusters, while the
dotted edges do not meet this criterion. The arrows of red edges indicate participation in the
respective adjacent marked cluster; note that D does not participate in C(F ), as for each adjacent
marked cell Vor it exclusively participates in the cluster-of-clusters connected to it by the edge of
minimum rank in E(D, Vor). C(C) is marked in blue; all its constituent clusters also participate in
C(C), as Vor(C) = C.
The Edges between Clusters
By saying that we connect two adjacent subsets of vertices A and B, we mean that we add the
def
minimum ranked edge in E(A, B) to E 0 . For a cluster A, define its adjacent centers Vor(โA) =
{Vor(v) | u โ A โง {u, v} โ E} \ {Vor(A)}, i.e., the set of Voronoi cells that are adjacent to A. This
definition explicitly excludes Vor(A), as there is no need to connect A to its own Voronoi cell.
We next describe how we connect the clusters. The high-level idea is to make sure that every
marked cluster and the clusters that participate in the respective cluster-of-clusters remain connected.
For clusters which are not adjacent to any marked cluster we make sure to keep them connected to
all adjacent Voronoi cells. Formally:
1. We connect every cluster to every adjacent marked cluster.
2. Each cluster A that is not participating in any cluster-of-clusters (i.e., no cell adjacent to A is
marked) we connect to each adjacent cell.
3. Suppose cluster A is adjacent to cluster B, where B is adjacent to a marked cell Vor. Denote
by C the (unique) cluster in cell Vor for which B participates in C(C). We connect A with B
if the following conditions hold:
โข Vor(B) has minimum rank amongst Vor(โA) โฉ Vor(โC)
7
C
A
B
D
Figure 3: Illustration of the third edge selection rule. In this example, the thick black edge has
minimum rank in E(A, Vor(B)) and B has minimum rank in โA โฉ โC. However, the rank of Vor(D)
is smaller than that of Vor(B), and hence the dashed edge is not selected. Here, A will select the
direct edge connecting it to D, due to the first rule.
โข the minimum ranked edge in E(A, Vor(B)) is also in E(A, B)
Figure 3 showcases the third rule.
3.3
Sparsity
Lemma 1 The number of clusters, denoted by s, is at most |S| + n`(โ + 1)/k.
Proof: We first observe that, due to the promise on G, it follows that for every v โ V , d(v, c(v)) โค `
w.h.p. Recall the terminology from Subsection 3.1. Consider v for which |T (v)| โฅ k and therefore
its cluster is the singleton {v}. We say that a vertex u is special if |T (u)| โฅ k and for every child of
u in T (u), t, it holds that |T (t)| < k. By an inductive argument, it follows that v is an ancestor of a
special vertex. Since for every pair of special vertices u and w, T (u) and T (w) are vertex disjoint,
we obtain that there are at most n/k special vertices. Since for every special vertex, there are at
most ` ancestors, the total number of vertices v with |T (v)| โฅ k is bounded by n`/k.
Observe that any cluster either (i) is a singleton {v} with |T (v)| โฅ k, (ii) contains a node v such
that |T (p(v))| โฅ k, or (iii) is an entire Voronoi cell. We just bounded the number of clusters of
type (i) by n`/k, and immediately get a bound on the number of type (ii) clusters of n`โ/k. The
number of type (iii) clusters is bounded by the number of Voronoi cells |S|, showing the desired
bound on s.
Lemma 2 Exp(|E 0 |) โค (1 + O())|V |.
8
Proof: The number of edges we add due to the BFS trees of the Voronoi cells is at most |V | โ 1.
The number of edges which are taken due to Condition 1 is at most s times the number of
marked clusters. In expectation, there are s ยท p marked clusters, yielding at most s2 p edges in
expectation. Since s = O(n2/3 / ln n) and p = 1/n1/3 we obtain that s2 p = O(n/ ln n).
Let A be a cluster. The number of edges which are adjacent to A and are taken due to Condition 3
is bounded by the total number of clusters-of-clusters. The number of clusters-of-clusters is exactly
the number of marked clusters. Thus, the total number of edges which are taken due to Condition 3
is bounded by s2 p.
Observe that the probability that cluster A is not adjacent to a marked cell is (1 โ p)|Vor(โA)| โค
eโp|Vor(โA)| . Hence, if |Vor(โA)| โฅ 3pโ1 ln n, A is adjacent to a marked cell w.h.p. Using a union
bound over all clusters, it follows that w.h.p. each cluster A without an adjacent marked cell satisfies
that |Vor(โA)| โค 3pโ1 ln n with probabilty at least 1 โ 1/n2 ; the probability at most 1/n2 event
that this bound is violated cannot contribute more than |E|/n2 < 1 to the expectation. Therefore,
the total number of edges which are taken due to Condition 2 is bounded by (3s ln n)/p + 1 = O(n).
To conclude, the total number of edges in E 0 is at most |V |(1 + O()) in expectation, as desired.
3.4
Connectivity and Stretch
Lemma 3 H is connected.
Proof: Recall that H contains a spanning tree on every Voronoi cell, hence it suffices to show that
we can connect any pair of Voronoi cells by a path between some of their vertices. Moreover, the
facts that G is connected and the Voronoi cells are a partition of V imply that it is sufficient to
prove this for any pair of adjacent Voronoi cells. Accordingly, let Vor and Vor1 be two cells such
that E(Vor, Vor1 ) 6= โ
.
Consider clusters A โ Vor and B โ Vor1 such that the edge e of minimum rank in E(Vor, Vor1 )
is in E(A, B). If B is not adjacent to a marked cell, then Condition 2 implies that e is selected
into H. Thus, we may assume that B is adjacent to a marked cell Vor0 . Accordingly, there exists a
marked cluster C โ Vor0 such that B is participating in C(C).
If the rank of Vor1 is minimum in Vor(โC) โฉ Vor(โA), then e is selected into H by Condition 3
and we are done. Otherwise, observe that Vor1 is connected to Vor0 , as the edge of minimum rank
in E(B, C) is selected into H by Condition 1. Therefore, it suffices to show that Vor gets connected
to Vor0 . Let Vor2 be the cell of minimum rank among Vor(โC) โฉ Vor(โA). Let D โ Vor2 be the
cluster satisfying that the edge e0 of minimum rank in E(A, Vor2 ) is in E(A, D). Note that Vor2 is
connected to Vor0 (which we saw to be connected to Vor1 ), as there is some cluster D0 โ Vor(D)
that is adjacent to C and selects the edge of minimum rank in E(D0 , C) by Condition 1.
Overall, we see that it is sufficient to show that Vor gets connected to Vor2 , where Vor2 has
smaller rank than Vor1 . We now repeat the above reasoning inductively. In step i, we either succeed
in establishing connectivity between Vor and Vori , or we determine a cell Vori+1 that has smaller
rank than Vori and is connected to Vori . As any sequence of Voronoi cells of descending ranks
must be finite, the induction halts after finitely many steps. Because the induction invariant is that
Vori+1 is connected to Vori , this establishes connectivity between Vor and Vor1 , completing the
proof.
9
Lemma 4 Denote by GVor the graph obtained from G by contracting Voronoi cells and by HVor its
subgraph obtained when doing the same in H. If the cellsโ ranks are uniformly random, w.h.p. HVor
is a spanner of GVor of stretch O(log n).
Proof: Recall the proof of Lemma 3. We established connectivity by an inductive argument, where
each step increased the number of traversed Voronoi cells by two. Hence, it suffices to show that
the induction halts after O(log n) steps w.h.p.
To see this, observe first that GVor is independent of the ranks assigned to Voronoi cells and
pick any pair of adjacent cells Vor, Vor1 , i.e., neighbors in GVor . We perform the induction again,
assigning ranks from high to low only as needed in each step, according to the following process. In
each step, we query the rank of some cells, and given an answer of rank r, the ranks of all cells of
rank at least r are revealed as well. In step i, we begin by querying the rank of Vori . Consider the
cluster Di โ Vori adjacent to A satisfying that the edge with minimum rank in E(Vori , A) is also
in E(Di , A). We can assume without loss of generality that Di is adjacent to a marked cluster Fi
and that it is participating in C(Fi ) (as otherwise Di connects to A directly and we can terminate
the process). If the ranks of all the cells adjacent to both Fi and A were already revealed, then the
process terminates. Otherwise, we query the rank of all such cells whose rank is still unrevealed.
We set the cell of the queried cluster that has minimum rank to be Vori+1 and we continue to the
next step.
We claim that, in each step i, either the process terminates, or the rank of Vori+1 is at most
half of the rank of Vori with probability at least 1/2. To verify this, observe that in the beginning
of step i, any cell center whose rank was not revealed so far has rank which is uniformly distributed
in [ri โ 1], where ri is the rank of Vori .4 With probability at least 1/2, such a rank is at most ri /2.
If Vori has no adjacent cells whose ranks have not been revealed yet, the process terminates. Hence,
regardless of whether the process terminates or not, the claim holds.
By Chernoffโs bound, we conclude that the process terminates within O(log n) steps w.h.p., as
r1 is bounded by the number of Voronoi cells, which itself is trivially bounded by n. By the union
bound over all pairs of cells Vor and Vor1 , we get the desired guarantee.
Corollary 1 W.h.p., H is a spanner of G of stretch O(log n ยท (โ + log n)/).
Proof: Due to the promise on G, w.h.p. the spanning trees on Voronoi cells have depth ` โ
O((โ + log n)/). Hence, for any edge within a Voronoi cell, the claim holds w.h.p. Moreover, for
an edge connecting different Voronoi cells, by Lemma 4, w.h.p. there is a path of length O(log n) in
HVor connecting the respective cells. Navigating with at most 2` โ O((โ + log n)/) hops in each
traversed cell, we obtain a suitable path of length O(log n ยท (โ + log n)/) in H.
4
The Algorithm for General Graphs
We use a combination of the algorithm in Section 3 with the algorithm by Elkin and Neiman for
ultra-sparse spanners [3]. We call a vertex v remote, with respect to a set of centers, if the `-hop
neighborhood of v does not include a center. Fix S, let R denote the set of remote vertices with
def
respect to S, and abbreviate Rฬ = V \ R.
4
In step 1, we first query Vor1 and then observe that this statement holds.
10
First Step. Run the algorithm from Section 3 on the subgraph induced by Rฬ, i.e., {u, v} โ E
with u, v โ Rฬ is added to E 0 if and only if the algorithm outputs the edge.
Second Step. Run the algorithm of Elkin and Neiman [3] on the subgraph induced by R,
i.e., {u, v} โ E with u, v โ R is added to E 0 if and only if the algorithm outputs the edge.5
Their algorithm proceeds as follows. Given an integer h, each vertex v draws rv according to the
exponential distribution with parameter ฮฒ = ln(n/ฮด)/h, where ฮด is a parameter that controls the
success probability of the algorithm. Each vertex v receives ru from every vertex u within distance h,
and stores mu (v) = ru โd(u, v) and a neighbor on a shortest path between v and u, denoted by nu (v).
The edges that are added to the spanner are C(v) = {{v, nu (v)} | mu (v) โฅ maxwโV {mw (v) โ 1}},
for every v โ R. With probability at least 1 โ ฮด, it holds that rv < h for all v โ V (Claim 2.3 in [3]).
We choose ฮด = 1/nc (i.e., the algorithm succeeds w.h.p.) and h = `, where w.l.o.g. we require c โฅ 1.
The following lemma implies that the total number of edges that we add to H in the second step is
at most |R| ยท (n2 )1/` โค |R|(1 + ) in expectation.
Lemma 5 (Proof of Lemma 2.2 in [3]) For every v โ R, Exp[C(v)] โค (n/ฮด)1/h .
Third Step.
Add to E 0 all edges e โ E(R, Rฬ).
The following lemma implies that the expected number of edges which are added in the third step
is at most n.
Lemma 6 Exp[|E(R, Rฬ)|] โค n.
Proof: Observe that for an edge {u, v} โ E, there is at most one integer r such that ฮr (u) โฉ S = โ
and ฮr (v) โฉ S 6= โ
(or vice versa). If there is no such r or ` 6= r, then the edge is not in E(R, Rฬ).
Over the random choice of `, the probability of the event that the edge is included is at most
Pr[` = r] โค /โ. The desired bound follows by linearity of expectation.
4.1
Stretch Factor
Consider any edge e = {u, v} โ E \ E 0 we removed. If u, v โ Rฬ, e was removed by the Algorithm
from Section 3, which was applied to the subgraph induced by R. Applying Lemma 4 to the
connected component of e, we get that w.h.p. there is a path of length O(log n ยท (โ + log n)/) from
u to v in H. If u, v โ R, by Lemma 5 and the choice of parameters, w.h.p. there is a path of length
O(log n) from u to v in H. As e โ
/ E(R, Rฬ) by the third step, we arrive at the following corollary.
Corollary 2 The above algorithm guarantees stretch O(log n ยท (โ + log n)/) w.h.p. and satisfies
that Exp[|E 0 |] โ (1 + O())n.
5
The Local Algorithm
In this section we prove the our main theorem.
5
The algorithm is described for connected graphs; we simply apply it to each connected component of R.
11
Algorithm 1 LSSG for general graphs
Input: {u, v} โ E
Output: whether {u, v} is in E 0 or not.
1. If u, v โ R, compute the output of algorithm of Elkin and Neiman at u and v when running
it on the connected component of u and v in the subgraph induced by R. Return true if
{u, v} โ C(u) โช C(v) and false otherwise.
2. If {u, v} โ E(R, Rฬ), return true.
3. Otherwise, u, v โ Rฬ and we proceed according to Section 3, where all nodes in R are ignored:
(a) If Vor(u) = Vor(v), return true if {u, v} is in the BFS tree of Vor(u) and false otherwise.
(b) Otherwise, let Q and W denote the clusters of u and v, respectively. Return true if at
least one of the following conditions hold for A = Q and B = W , or symmetrically, for
A = W and B = Q, and false otherwise.
i. A is a marked cluster and {u, v} has minimum rank amongst the edges in E(A, B).
ii. A is not participating in any cluster-of-clusters. Namely, all the clusters which are
adjacent to A are not marked. In this case, we take {u, v} if it has minimum rank
amongst the edges in E(A, Vor(B)).
iii. There exists a marked cluster C such that A is participating in C(C), and the
following holds:
โข Vor(A) has minimum rank amongst Vor(โB) โฉ Vor(โC)
โข {u, v} has minimum rank amongst the edges in E(B, Vor(A)).
Theorem 3 Algorithm 1 is an LSSG algorithm. For any graph G over n vertices of maximum
degree at most โ and > 0, its query complexity, space complexity (length of the random seed), and
running time are Oฬ(n2/3 ) ยท poly(1/, โ).
Proof: The correctness of the algorithm follows from the previous sections. We shall prove that
its complexity is as claimed. We analyze the complexity in terms of n. There are additional factors
that depend polynomially in โ and 1/. The following claims hold w.h.p., simultaneously, for all
vertices.
Recall that a vertex u is remote if ฮ` (u) does not contain a center. Due to the sampling
probability for centers, a center is found after exploring Oฬ(n1/3 ) vertices. Therefore, we can decide
for any vertex u whether it is in R with query and time complexity Oฬ(n1/3 ). Moreover, if u โ Rฬ,
without additional cost the respective subroutine can return c(u), the center of u, and d(u, c(u)) (as
we explore in a BFS fashion).
For Step 1, we need to determine ฮ` (x) โฉ R. Since |ฮ` (u)| = Oฬ(n1/3 ) for every vertex u โ R, we
obtain that the query and time complexity of this step is Oฬ(n2/3 ), in total. Accordingly, Step 2 has
query and time complexity Oฬ(n1/3 ).
If u, v โ Rฬ, the algorithm proceeds as in Section 3. We claim that reconstructing the clusters of
u and v, determining the centers of all adjacent nodes, and deciding whether {u, v} is a BFS edge
(i.e., Vor(u) = Vor(v) and u is the parent of v in the BFS of Vor(u) rooted at c(u) or vice versa)
takes Oฬ(n2/3 ) queries and time.
12
We show first that we can reconstruct clusters efficiently. W.l.o.g., consider u. We determine
c(u) and d(u, c(u)). For each neighbor w of u, we determine whether it is in Rฬ (if not, the node is
discarded), its center c(w), and the distance d(w, c(w)). As u โ Rฬ, and assuming that u =
6 c(u),
it must have at least one neighbor w in distance d(u, c(u)) โ 1 of c(u); any such w satisfies that
c(w) = c(u), as otherwise d(u, c(w)) = d(w, c(w)) and c(w) < c(u), a contradiction to the tiebreaking rule for centers. Among these candidates w, we know that the one with minimum rank is
the parent of u in the BFS tree of Vor(u) rooted at c(u), due to the tie-breaking rule for the BFS
construction. Otherwise, we can use this subroutine to partially explore the BFS of Vor(u): given
any node w โ Rฬ, we can determine its parent and children in Vor(w) at query and time complexity
Oฬ(n1/3 ). We conclude that we can determine p(w) and whether T (w) < k or T (w) โฅ k at query
complexity Oฬ(n2/3 ), by partially or completely exploring T (w); if T (w) < k, we determine T (w)
completely. We collect this information for u and its ` โ 1 ancestors, and determine the cluster
Q of u. Finally, we repeat the procedure to reconstruct the cluster W of v, and determine for all
nodes adjacent to either cluster whether they are in Rฬ and, if so, their centers. The query and time
complexity of this operation is Oฬ(n2/3 ) in total.
For the cases A = Q, B = W and A = W , B = Q, respectively, with the above information we
can determine
โข whether Vor(u) = Vor(v),
โข if Vor(u) = Vor(v), whether p(u) = v or p(v) = u,
โข if Vor(u) 6= Vor(v),
โ whether A is marked (i.e., c(A) has been marked) and whether {u, v} has minimum rank
in E(A, B),
โ whether A is not adjacent to any marked cluster (i.e., none of the adjacent nodesโ centers
has been marked) and whether {u, v} has minimum rank in E(A, Vor(B)), and
โ whether there is a marked cluster C adjacent to A so that A participates in C(C), Vor(A)
has minimum rank in Vor(โB) โฉ Vor(โC), and {u, v} has minimum rank in E(B, Vor(A)).
We note that since we have degree bounded by โ, the number of vertices in A is Oฬ(n1/3 ),
and the probability that a cell is marked is nโ1/3 , the number of cluster-of-clusters that
A participates in is Oฬ(โ) w.h.p.
In other words, we can perform all necessary checks to decide whether {u, v} โ E 0 or not.
The algorithm in Section 3 requires Oฬ(n2/3 ) random bits for the selection of centers and marked
clusters. For the emulation of the algorithm of Elkin and Neiman it suffices that the random
variables {ru } be Oฬ(n1/3 )-wise independent, because the outcome of the algorithm for a vertex
v โ R depends only on the random variables of at most Oฬ(n1/3 ) vertices (the vertices in ฮ` (v)).
Thus, overall Oฬ(n2/3 ) random bits (up to poly(โ/) factors) are sufficient.
References
[1] N. Alon, R. Rubinfeld, S. Vardi, and N. Xie. Space-efficient local computation algorithms.
In Proceedings of the Twenty-Third Annual ACM-SIAM Symposium on Discrete Algorithms
(SODA), pages 1132โ1139, 2012.
13
[2] Artur Czumaj, Oded Goldreich, Dana Ron, C. Seshadhri, Asaf Shapira, and Christian Sohler.
Finding cycles and trees in sublinear time. Random Structures and Algorithms, 45(2):139โ184,
2014.
[3] Michael Elkin and Ofer Neiman. Efficient algorithms for constructing very sparse spanners and
emulators. In Proceedings of the Twenty-Eighth Annual ACM-SIAM Symposium on Discrete
Algorithms, SODA 2017, Barcelona, Spain, Hotel Porta Fira, January 16-19, pages 652โ669,
2017.
[4] G. Even, M. Medina, and D. Ron. Deterministic stateless centralized local algorithms for
bounded degree graphs. In Algorithms - ESA 2014 - 22th Annual European Symposium,
Wroclaw, Poland, September 8-10, 2014. Proceedings, pages 394โ405, 2014.
[5] U. Feige, Y Mansour, and R. E. Schapire. Learning and inference in the presence of corrupted
inputs. In Proceedings of The 28th Conference on Learning Theory, COLT 2015, Paris, France,
July 3-6, 2015, pages 637โ657, 2015.
[6] Hendrik Fichtenberger, Reut Levi, Yadu Vasudev, and Maximilian Woฬtzel. On testing minorfreeness in bounded degree graphs with one-sided error. Unpublished manuscript, 2017.
[7] R. Levi, G. Moshkovitz, D. Ron, R. Rubinfeld, and A. Shapira. Constructing near spanning
trees with few local inspections. Random Structures & Algorithms, pages n/aโn/a, 2016.
[8] R. Levi and D. Ron. A quasi-polynomial time partition oracle for graphs with an excluded
minor. ACM Trans. Algorithms, 11(3):24:1โ24:13, 2015.
[9] R. Levi, D. Ron, and R. Rubinfeld. Local algorithms for sparse spanning graphs. In Proceedings
of the Eighteenth International Workshop on Randomization and Computation (RANDOM),
pages 826โ842, 2014.
[10] R. Levi, D. Ron, and R. Rubinfeld. Local algorithms for sparse spanning graphs. CoRR,
abs/1402.3609, 2014.
[11] R. Levi, R. Rubinfeld, and A. Yodpinyanee. Local computation algorithms for graphs of
non-constant degrees. Algorithmica, pages 1โ24, 2016.
[12] Y. Mansour, A. Rubinstein, S. Vardi, and N. Xie. Converting online algorithms to local
computation algorithms. In Automata, Languages and Programming: Thirty-Ninth International
Colloquium (ICALP), pages 653โ664, 2012.
[13] Y. Mansour and S. Vardi. A local computation approximation scheme to maximum matching.
In Proceedings of the Sixteenth International Workshop on Approximation Algorithms for
Combinatorial Optimization Problems (APPROX), pages 260โ273, 2013.
[14] D. Peleg and A. A. Schaฬffer. Graph spanners. Journal of Graph Theory, 13:99โ116, 1989.
[15] D. Peleg and J. D. Ullman. An optimal synchronizer for the hypercube. SIAM Journal on
Computing, 18:229โ243, 1989.
[16] L. S. Ram and E. Vicari. Distributed small connected spanning subgraph: Breaking the
diameter bound. Technical report, Zuฬrich, 2011.
14
[17] R. Rubinfeld, G. Tamir, S. Vardi, and N. Xie. Fast local computation algorithms. In Proceedings
of The Second Symposium on Innovations in Computer Science (ICS), pages 223โ238, 2011.
[18] Ronitt Rubinfeld. Can we locally compute sparse connected subgraphs? In Computer Science Theory and Applications - 12th International Computer Science Symposium in Russia, CSR
2017, Kazan, Russia, June 8-12, 2017, Proceedings, pages 38โ47, 2017.
15
| 8cs.DS
|
An Adaptive Sampling Scheme to Efficiently
Train Fully Convolutional Networks for
Semantic Segmentation
Lorenz Berger1,2 , Eoin Hyde1,2 , M. Jorge Cardoso1 , and Seฬbastien Ourselin1
arXiv:1709.02764v4 [cs.CV] 22 Dec 2017
1
TIG, CMIC, University College London, London, UK
2
Innersight Labs, London, UK
Abstract
Deep convolutional neural networks (CNNs) have shown excellent performance in
object recognition tasks and dense classification problems such as semantic segmentation. However, training deep neural networks on large and sparse datasets
is still challenging and can require large amounts of computation and memory.
In this work, we address the task of performing semantic segmentation on large
data sets, such as three-dimensional medical images. We propose an adaptive
sampling scheme that uses a-posterior error maps, generated throughout training, to focus sampling on difficult regions, resulting in improved learning. Our
contribution is threefold: 1) We give a detailed description of the proposed sampling algorithm to speed up and improve learning performance on large images.
2) We propose a deep dual path CNN that captures information at fine and
coarse scales, resulting in a network with a large field of view and high resolution outputs. 3) We show that our method is able to attain new state-of-the-art
results on the VISCERAL Anatomy benchmark.
1
Introduction
This paper addresses the problem of efficiently training convolutional neural networks (CNNs) on large and imbalanced datasets. We propose a training strategy
that adaptively samples the training data to effectively speed up training and
avoid over-sampling data that contains little extra information.
In this work, we investigate the problem of automatic segmentation from
high resolution 3D CT scans. Several deep learning techniques [1โ4] have recently been proposed for 3D segmentation of medical datasets. To overcome the
problem of dealing with these large datasets, such as Computed Tomography
(CT) volumes, commonly of dimension 512 ร 512 ร 700, previous approaches
train a CNN on a cropped region of interest which reduces the size of individual
training images by around 100 fold [2, 4]. By reducing the size of training images,
they can now be fit into memory and a network can be trained effectively on
the selected data. However, identifying regions of interest requires an additional
pre-processing step which may not be easy in many applications. Also, training
CNNs on cropped images limits the field of view of the CNN and subsequently
2
Lorenz Berger et al.
can introduce unwanted image boundary induced effects during testing. Other
applications, where training CNNs on very large images is a problem, includes
the segmentation of histology datasets [5] or the segmentation of aerial images.
For example in aerial image segmentation, training a CNN to segment ships [6]
can be difficult because large portions of the image contain water which provide little information during training, resulting in slow learning. Some ideas
to address this have already been proposed, for example in [3] a fixed, handcrafted, pre-computed weight map is used to help learn small separation borders
between touching cells for biomedical image segmentation. In this work the proposed sampling scheme ends up dynamically learning such a weight mapping,
making it generally applicable to many applications.
Curriculum learning [7] and derivative methods like self-paced learning [8]
build on the intuition that, rather than considering all samples simultaneously,
the algorithm should be presented with the training data in a meaningful order
that facilitates learning. These ideas have already successfully been applied to
image classification [9, 10], by ordering images from easy to hard during training.
Also for the problem of weakly supervised semantic segmentation [11] similar
ideas are applied, where predictions from previous training iterations are used
to iteratively learn segmentation maps from just a single class label per image.
The focus of this paper is fully supervised semantic segmentation where a
representative training set is available with dense manual label annotations and
the challenge lies in efficiently learning from this large datasets. We give a detailed account of the implementation, which is a straightforward extension to
any existing CNN segmentation system, and present state-of-the-art segmentation results on the VISCERAL anatomy benchmark.
2
2.1
Methods
Neural Network Architecture
For the dual path network architecture we build on several previous ideas [1,
12, 13]. Compared to the 3D network outlined in [1], we further develop the
architecture by replacing the standard convolution layers with popular resnet
blocks [14], and increase the maximum network depth from 11 layers in [1] to
19 layers. By having a deeper network and a down sampled pathway with input
resolution 1/4 of the original resolution, we obtain a large receptive field of size
1243 whilst maintaining a deep high resolution pathway that does not compromise the resolution through pooling layers. The architecture results in a total of
649,251 parameters. A sketch of the architecture is given in Figure 1a. In Figure
1a, numbers inside round brackets give the input dimensions of each block. For
the training stage these dimensions have been chosen carefully to balance memory usage with processing speed. During testing the dimensions may be chosen
as large as can be fit into memory, to take advantage of the fully convolutional
inference. Numbers in square brackets refer to the number of feature maps used
at each layer. The proposed configuration allows for a large number of samples
isample: Adaptive Sampling for Fully Convolutional Networks
3
(3D patches) per batch to ensure balanced class sampling and effective optimization, whilst maintaining a deep and wide enough network to capture the
high variability and spatial semantics of the data. The blocks labeled โConvโ are
standard convolutional layers with kernel size 3 ร 3 ร 3. The blocks labeled โRes
blockโ are standard and bottleneck resnet blocks, respectively, as detailed in [14].
Each fully connected layer is preceded by a dropout layer with probability 0.5,
and a softmax non-linearity is used as a final classification layer. The rationale
for having a deep low resolution path is to further increase the receptive field
and allow for complex higher level features to be learned i.e where an organ is
positioned in relation to other structures. To minimize the memory footprint,
the high definition path is chosen to be slightly shorter than the low resolution
path. This seems reasonable as this path should learn texture information which
is likely to require fewer layers and non-linearites. Further details on training
hyper-parameters are given in section 3.1.
(a)
(b)
Fig. 1: (a) The proposed dual path CNN architecture. (b) Coronal slice of a CT
scan with overlaid segmentation output, described in section 3.3. The organs
visible in this slice are: lungs (green), liver (red), spleen (light blue), psoas major
muscle (dark blue), kidneys (brown) and bladder (yellow).
4
Lorenz Berger et al.
2.2
Adaptive sampling strategy
The problem of class imbalance as described in [1] can be dealt with by choosing
small patch sizes and evenly sampling from each class [1], and through weighted
loss functions [3, 15, 16]. Both of these methods either load the whole image into
GPU memory, which is not feasible for large images, or select a small subset of
patches, which can lead to inefficient training on sparse datasets. To overcome
both of these issues we propose the simple sampling Algorithm 1.
Algorithm 1 isample: adaptive sampling algorithm
Initialize error maps for every image in the training data: E i (x) = 1.
while CNN training do
while training for 1 epoch do
while filling batch with patches do
Pick an image I j from the training set I โ .
Pick a class k from the corresponding label map Lj .
Pick a patch in image I j , centered at location c, where Lj (c) = k.
Accept patch into batch if E i (c) > U(0, 1) โ .
end while
Back-propagate loss of batch and update the current CNN weights: w.
end while
Select a subset of images, I โ , and label maps, Lโ , from the training set:
for [I k , Lk ] โ [I โ , Lโ ] do
Update error maps: E k (x) = 1 โ CNN(w, I k (x))Lk (x)
end for
end while
In Algorithm 1, U(0, 1) is a random number drawn from the uniform distribution and E i refers to the error map of the ith training image. Error maps
can easily be calculated, either after each epoch or concurrently to the training
process, as
E k (x) = 1 โ CNN(w, I k (x))Lk (x) ,
(1)
where CNN(w, I k (x))Lk (x) is a map of the CNN predictions over the full training image I k , evaluated using the most current weights, w, and outputting the
probability of the true class label Lk (x), at position x. Examples of error maps
produced throughout training are show in Figure 3. The additional parameter
controls the strength of the isample scheme. Setting = 0, corresponds to choosing patches based entirely on the amount of error that they currently produce
by the network. When = 1 the condition E i (c) > U(0, 1) โ is always satisfied and we are left with a standard sampling scheme that accepts every chosen
patch. For all results shown in this paper we have chosen = 0.01, since we are
interested in using the isample scheme to full effect. Detailed investigations into
how to best set this parameter for different datasets with varying amounts of
sparsity is left for future work. The subset of images, I โ , and label maps, Lโ , of
the training set may be chosen in line with how quickly to introduce the isample
scheme during training and the amount of computational resources available. In
isample: Adaptive Sampling for Fully Convolutional Networks
5
our experiments we had access to four GPUs, three were used to train the CNN
continuously and one GPU was used in parallel to continuously perform full predictions of the validation dataset and the training dataset. From this, full dice
scores of the validation dataset and full error maps of the training dataset could
be calculated. A future extension of this work could log the loss of individual
batches during training, and use this information to get an estimate of where the
network is having difficulty. This modification would avoid the need for having
to allocate additional resources for segmenting the training data, which instead
could be used to speed up training. However for practical reasons, and the increasing availability of large multi-GPU cards, we have found this not to be an
issue. Also, having access to dice scores calculated over the full images throughout training has been helpful in development since these true dice scores provide
more meaningful information than dice scores calculated from individual batches
which are biased by the sampling scheme and the size of patches. The error maps
produced can also be useful for debugging purposes during development.
3
Results
We trained, validated and tested the automatic segmentation method on contrast enhanced CT scans from the VISCERAL Anatomy 3 dataset, made up of
20 training scans, and 10 unseen testing scans (currently not available to download) [17]. The scans are form a heterogeneous dataset with various topological
changes between patients, and manual segmentations are available for a number of different anatomical structures. We randomly split the training set into 16
scans for training (80%) and 4 scans for validation (20%), we also present results
of our online submission on the unseen test dataset. For illustrative purposes, the
first experiment, in section 3.2, focuses on segmenting only the kidneys from full
body CT scans. In section 3.3 we present results on simultaneously segmenting
multiple organs from the CT data.
3.1
CNN training setup
During training we perform data augmentation by re-sampling the 3D patches
to a [1mm, 1mm, 1.5mm] + U(โ0.1, 0.1) resolution. We also rotate each patch
by [U(โ10, 10), U(โ4, 4), U(โ4, 4)] degrees. We set voxels with values greater
than 1000 to 1000, and values less than โ1000 to โ1000, and divide all values
by a constant factor of 218 (the standard deviation of the dataset). We use
Glorot initializations [18] on all convolution layers. For batchnorm layers we
use the initializations technique described in [19]. We impose L2 weight decay
of size 0.0001, on all convolutional layers except on the last fully convolutional
layer before the final softmax non-linearity. Using techniques described in [19]
we make use of large batch sizes and large learning rates. We use SGD with
Nestrov momentum set at 0.8 [20], the initial learning rate is 0.001, and each
batch contains 12 patches, sampled from one randomly selected scans in the
training set. We run each epoch for 100 batches. We also employ a learning rate
6
Lorenz Berger et al.
warm up schedule as described in [19] for the first 5 epochs. We use a standard
cross-entropy loss function.
3.2
Segmenting the kidneys from full body CT scans
In this experiment we use labels for kidneys to train the CNN, resulting in a
simple two class, foreground (kidneys) and background (everything else), segmentation problem. Figure 2 shows curves of the training loss (2a) and mean
validation dice score (2b) for segmented kidneys throughout training, averaged
over three separate runs. The blue curve represents training runs where patches
are sampled randomly but evenly from background and kidney foreground, the
red curve represents training runs where patches are sampled using the proposed
sampling algorithm 1. Because isample adaptively selects more difficult patches
as training progresses, the loss is higher, as seen in Figure 2a. In Figure 2b,
the sampler achieves faster generalization, and our current results indicate that
the final generalization of the CNN trained with the proposed sampling scheme
is slightly improved for this sparse segmentation setup, where the kidneys only
make up โผ 0.3% of the voxels within the whole scan.
Table 4a shows the average dice scores achieved by the Dual CNN, with and
without isample, throughout training. When using the isample scheme the CNN
is able to achieve a dice score of 0.855 after only 5k training iterations. This
is close to the end of training performance, a dice score of 0.899 after 40k, of
the Dual CNN without isample in use. Fast training of CNNs using isample can
be useful for debugging and evaluating changes in neural network architectures,
as more experiments can be run using the same computational resources, that
quickly estimate the end performance of the network.
1.4
Dual CNN
Dual CNN + isample
1.0
0.8
0.6
0.4
0.9
Mean Validation Dice
Training Loss
1.2
0
100
200
Epoch
(a)
300
400
0.8
0.7
0.6
0.5
0.4
0
100
Dual CNN
Dual CNN + isample
200
300
400
Epoch
(b)
Fig. 2: (a) Training loss (a) and mean validation dice scores (b), averaged over
3 runs.
In Figure 3 we show coronal slices of a training error volume E k (x), calculated by the algorithm. As seen in Figure 3c, initially there is significant produced
isample: Adaptive Sampling for Fully Convolutional Networks
7
by the CNN prediction at epoch 16, for example misclassifying the aorta (part
of the background class) because it has similar intensity values to the kidneys.
After more training, at epoch 50, Figure 3d shows that the error is much lower.
The CNN has now learned that the aorta is part of the background class. However more subtle regions such as the collecting system and large vessels within
the kidney (see small hole in the true segmentation of the left kidney in Figure
3b) still produce high errors, and further focused training is required to optimize
the weights until they are correctly classified. There also remains a high error
around the border of the kidneys, which will result in the sampling process selecting more patches from the border region, and thus ends up learning to train
the network with a similar loss to the hand-crafted border weighted loss function
designed in [3].
(a)
(b)
(c)
(d)
Fig. 3: Coronal slices: (a) Raw CT scan from the training set (b) Kidney segmentation overlaid onto scan (c) Error map, E k (x), of foreground and background
classification on a training scan after 16 epochs. (d) E k (x) after 50 epochs. For
the error maps, white corresponds to voxels that are incorrectly classified and
black to correctly classified voxels.
# its
5k
10k
20k
40k
Dual CNN
0.797
0.849
0.905
0.899
(a)
+ isample
0.855
0.897
0.920
0.927
Method
Kidney Dice scores
Dual CNN (validation data)
Left + Right 0.899 (0.058)
Dual CNN + isample (validation data)
Left + Right 0.927 (0.037)
Dual CNN + isample + CRF (test data)
Left 0.954
Right 0.96
Wang et al [21] (test data)
Left 0.945 (0.027) Right 0.959 (0.011)
Vincent et al [22] (test data)
Left 0.943 (0.015) Right 0.927 (0.040)
Gass et al [23] (test data)
Left 0.913 (0.029) Right 0.914 (0.027)
(b)
Fig. 4: (a) Mean dice scores and standard deviations at different number of iterations, throughout training. (b) Dice scores and standard deviations, where
available, for different methods automatically segmenting kidneys on the VISCERAL CT enhanced dataset.
Table 4b shows dice scores for segmenting both kidneys using different methods. The proposed method with isample performs significantly better than without. We also submitted our method, with the addition of a CRF [24] as a postprocessing step, to segment the test dataset, and achieved the top score for
8
Lorenz Berger et al.
segmenting the left and right kidneys. Inference on a full size CT scans takes
โผ 65 seconds using four Tesla K50 GPU cards, each with 4GB of RAM.
3.3
Multi-organ segmentation
We now extended the previously described algorithm to include a multi-class
classification output and trained the model on the main organs available on
the VISCERAL CT-enhanced dataset. We post-processes the output segmentation maps (maximum class probability at each voxel), by applying a filter that
only retains the largest connected binary object within the segmentation, thus
removing small objects. The segmentation output of one of the the validation
scans is shown in Figure 1b. The results of our proposed method and other
state-of-the-art methods, also summarized in [17], are given in Table 1.
Method
Dual CNN + isample (val)
Dual CNN (val)
Ga et al [23]
Jimenez et al [25]
Keฬchichian et al [26]
Vincent et al [22]
Inter-annotator agreement
Aorta
0.893
0.843
0.785
0.762
0.681
0.838
0.859
Lung
0.980
0.985
0.963
0.961
0.966
0.972
0.973
Kidney
0.938
0.934
0.914
0.899
0.912
0.935
0.917
PMajor
0.824
0.779
0.813
0.797
0.802
0.869
0.823
Liver
0.941
0.927
0.908
0.887
0.933
0.942
0.965
Abdom
0.769
0.755
0.463
0.538
0.673
Spleen
0.951
0.946
0.781
0.730
0.895
0.934
Sternum
0.900
0.904
0.635
0.721
0.713
0.810
Trachea
0.926
0.926
0.847
0.855
0.824
0.877
Bladder
0.912
0.918
0.683
0.679
0.823
0.857
Table 1: Dice scores for different automatic multi-organ segmentation methods
and inter-annotator agreement results [17] on the VISCERAL dataset.
We note that because the cloud-based evaluation service [17] containing the test
data was closed at the time of running these experiments, we were not able
to evaluate our method on the test data, thus making direct comparisons to
previous methods difficult. As previously mentioned, we trained our method on
80% of the data (16 scans) and validated it on the remaining 20% (4 scans).
From having evaluated the kidney only CNN on the test data, we found that the
testing dataset gave better dice scores than the validation set. We are therefore
confident that our results in Table 1 are representative. As soon as the test data
set is made available we will update our results. Also for organs โLungโ, โKidneyโ, โPMajorโ (psoas major) and โAbdomโ (rectus abdominis) we give mean
dice scores of both the left and right organs. For this experiment we modified
the training schedule such that the initial learning rate is 0.05, and each batch
contains 24 patches, sampled from 2 randomly selected scans from the training
set. We run each epoch for 200 batches, and halve the learning rate after every
25 epochs. The Dual CNN without using the isample scheme (average organ
dice 0.8917) slightly underperformed compared to when using the isample (average organ dice 0.9034). However this difference is far less notable than during
previous experiments, shown in Table 4b. We hypothesize this is because the
background class in the multi-organ segmentation problem is split into background and other organs such as the Lung, Liver etc, thus making the dataset,
isample: Adaptive Sampling for Fully Convolutional Networks
9
especially the background class, easier to sample from. The potential benefit of
using the isample method is therefore problem dependent.
4
Conclusion
We proposed and evaluated a sampling scheme to deal with very large images
such as 3D CT scans. As shown in section 3 the sampler enables fast training, and
our results indicate that the final generalization performance can be improved.
This is inline with previous research that shows the positive effect of curriculum
learning on optimization and end performance of machine learning systems [9,
8]. Our experimental results suggests our algorithm gives new state of the art
performance for the aorta, lung, kidney, rectus abdominis, spleen, sternum, trachea and bladder, on the VISCERAL anatomy benchmark, and improves upon
human inter-annotator agreement scores on the following organs: aorta, lung,
kidney, psoas major, rectus abdominis, spleen, sternum, trachea and bladder.
These encouraging results pave the way for using CNNs for robust automatic
segmentation within clinical practice, such as surgical planning.
References
1. K. Kamnitsas, C. Ledig, V. F. Newcombe, J. P. Simpson, A. D. Kane, D. K. Menon,
D. Rueckert, and B. Glocker, โEfficient multi-scale 3d cnn with fully connected crf
for accurate brain lesion segmentation,โ Medical image analysis, vol. 36, pp. 61โ78,
2017.
2. P. F. Christ, M. E. A. Elshaer, F. Ettlinger, S. Tatavarty, M. Bickel, P. Bilic,
M. Rempfler, M. Armbruster, F. Hofmann, M. DAnastasi, et al., โAutomatic liver
and lesion segmentation in ct using cascaded fully convolutional neural networks
and 3d conditional random fields,โ in International Conference on Medical Image
Computing and Computer-Assisted Intervention, pp. 415โ423, Springer, 2016.
3. O. Ronneberger, P. Fischer, and T. Brox, โU-net: Convolutional networks for
biomedical image segmentation,โ in International Conference on Medical Image
Computing and Computer-Assisted Intervention, pp. 234โ241, Springer, 2015.
4. Q. Dou, H. Chen, Y. Jin, L. Yu, J. Qin, and P.-A. Heng, โ3D deeply supervised network for automatic liver segmentation from CT volumes,โ in International Conference on Medical Image Computing and Computer-Assisted Intervention, pp. 149โ
157, Springer, 2016.
5. Y. Xu, Z. Jia, L.-B. Wang, Y. Ai, F. Zhang, M. Lai, I. Eric, and C. Chang, โLarge
scale tissue histopathology image classification, segmentation, and visualization via
deep convolutional activation features,โ BMC bioinformatics, vol. 18, no. 1, p. 281,
2017.
6. R. Zhang, J. Yao, K. Zhang, C. Feng, and J. Zhang, โS-cnn-based ship detection from high-resolution remote sensing images.,โ International Archives of the
Photogrammetry, Remote Sensing & Spatial Information Sciences, vol. 41, 2016.
7. Y. Bengio, J. Louradour, R. Collobert, and J. Weston, โCurriculum learning,โ
in Proceedings of the 26th annual international conference on machine learning,
pp. 41โ48, ACM, 2009.
10
Lorenz Berger et al.
8. M. P. Kumar, B. Packer, and D. Koller, โSelf-paced learning for latent variable
models,โ in Advances in Neural Information Processing Systems, pp. 1189โ1197,
2010.
9. V. Avramova, โCurriculum learning with deep convolutional neural networks,โ
2015.
10. X. Chen and A. Gupta, โWebly supervised learning of convolutional networks,โ in
Proceedings of the IEEE International Conference on Computer Vision, pp. 1431โ
1439, 2015.
11. X. Qi, Z. Liu, J. Shi, H. Zhao, and J. Jia, โAugmented feedback in semantic
segmentation under image level supervision,โ in European Conference on Computer
Vision, pp. 90โ105, Springer, 2016.
12. H. Zhao, X. Qi, X. Shen, J. Shi, and J. Jia, โIcnet for real-time semantic segmentation on high-resolution images,โ arXiv preprint arXiv:1704.08545, 2017.
13. G. Lin, A. Milan, C. Shen, and I. Reid, โRefinenet: Multi-path refinement networks
with identity mappings for high-resolution semantic segmentation,โ arXiv preprint
arXiv:1611.06612, 2016.
14. K. He, X. Zhang, S. Ren, and J. Sun, โDeep residual learning for image recognition,โ in Proceedings of the IEEE conference on computer vision and pattern
recognition, pp. 770โ778, 2016.
15. L. Fidon, W. Li, L. C. Garcia-Peraza-Herrera, J. Ekanayake, N. Kitchen,
S. Ourselin, and T. Vercauteren, โGeneralised wasserstein dice score for imbalanced
multi-class segmentation using holistic convolutional networks,โ arXiv preprint
arXiv:1707.00478, 2017.
16. C. H. Sudre, W. Li, T. Vercauteren, S. Ourselin, and M. J. Cardoso, โGeneralised
dice overlap as a deep learning loss function for highly unbalanced segmentations,โ
arXiv preprint arXiv:1707.03237, 2017.
17. O. Jimenez-del Toro, H. Muฬller, M. Krenn, K. Gruenberg, A. A. Taha, M. Winterstein, I. Eggel, A. Foncubierta-Rodrฤฑฬguez, O. Goksel, A. Jakab, et al., โCloudbased evaluation of anatomical structure segmentation and landmark detection
algorithms: Visceral anatomy benchmarks,โ IEEE transactions on medical imaging, vol. 35, no. 11, pp. 2459โ2475, 2016.
18. X. Glorot and Y. Bengio, โUnderstanding the difficulty of training deep feedforward
neural networks,โ in Proceedings of the Thirteenth International Conference on
Artificial Intelligence and Statistics, pp. 249โ256, 2010.
19. P. Goyal, P. Dollaฬr, R. Girshick, P. Noordhuis, L. Wesolowski, A. Kyrola, A. Tulloch, Y. Jia, and K. He, โAccurate, large minibatch sgd: Training imagenet in 1
hour,โ arXiv preprint arXiv:1706.02677, 2017.
20. Y. Nesterov, Introductory lectures on convex optimization: A basic course, vol. 87.
Springer Science & Business Media, 2013.
21. C. Wang and Oฬ. Smedby, โMulti-organ segmentation using shape model guided
local phase analysis,โ in International Conference on Medical Image Computing
and Computer-Assisted Intervention, pp. 149โ156, Springer, 2015.
22. G. Vincent, G. Guillard, and M. Bowes, โFully automatic segmentation of the
prostate using active appearance models,โ MICCAI Grand Challenge: Prostate
MR Image Segmentation, vol. 2012, 2012.
23. T. Gass, G. Szekely, and O. Goksel, โMulti-atlas segmentation and landmark localization in images with large field of view,โ in International MICCAI Workshop
on Medical Computer Vision, pp. 171โ180, Springer, 2014.
24. P. Kraฬhenbuฬhl and V. Koltun, โEfficient inference in fully connected crfs with
gaussian edge potentials,โ in Advances in neural information processing systems,
pp. 109โ117, 2011.
isample: Adaptive Sampling for Fully Convolutional Networks
11
25. O. A. J. del Toro and H. Muฬller, โHierarchic multiโatlas based segmentation for
anatomical structures: Evaluation in the visceral anatomy benchmarks,โ in International MICCAI Workshop on Medical Computer Vision, pp. 189โ200, Springer,
2014.
26. R. Keฬchichian, S. Valette, M. Sdika, and M. Desvignes, โAutomatic 3d multiorgan
segmentation via clustering and graph cut using spatial relations and hierarchicallyregistered atlases,โ in International MICCAI Workshop on Medical Computer Vision, pp. 201โ209, Springer, 2014.
| 1cs.CV
|
arXiv:1411.4691v3 [math.ST] 8 Nov 2016
Group Regularized Estimation under
Structural Hierarchy
Yiyuan She, Zhifeng Wang and He Jiang
Department of Statistics, Florida State University
Abstract
Variable selection for models including interactions between explanatory variables often needs to obey certain hierarchical constraints.
The weak or strong structural hierarchy requires that the existence of
an interaction term implies at least one or both associated main effects
to be present in the model. Lately, this problem has attracted a lot of
attention, but existing computational algorithms converge slow even
with a moderate number of predictors. Moreover, in contrast to the
rich literature on ordinary variable selection, there is a lack of statistical theory to show reasonably low error rates of hierarchical variable
selection. This work investigates a new class of estimators that make
use of multiple group penalties to capture structural parsimony. We
give the minimax lower bounds for strong and weak hierarchical variable selection and show that the proposed estimators enjoy sharp rate
oracle inequalities. A general-purpose algorithm is developed with
guaranteed convergence and global optimality. Simulations and real
data experiments demonstrate the efficiency and efficacy of the proposed approach.
Keywords: hierarchical variable selection, scalable computation, oracle
inequality, minimax optimality
1
Introduction
In statistical applications, it is often noticed that an additive model including
main effects only is inadequate. Including some higher-order terms, such as
1
interactions, in particular, are often of great help in prediction and modeling.
Sometimes, interactions may be of independent interest; one example is the
moderation analysis in behavioral sciences (Cohen et al., 2013). In this paper,
we focus on the full quadratic model with all two-term interactions taken into
account.
Let X = [x1 , x2 , . . . , xp ] โ Rnรp be the (raw) predictor matrix and
y โ Rn be the response vector. We assume the following nonlinear additive regression model
X
X
y = bโ0 1 +
bโj xj +
ฯโjk xj xk + ฮต,
(1)
1โคjโคp
1โคj,kโคp
where ฮต โผ N (0, ฯ 2 I) and
denotes
the Hadamard product. The num
p
ber of predictors is then p + 2 , posing a challenge in variable selection
even when p is moderate. Moreover, in this scenario, statisticians are often
interested in obtaining a model satisfying certain logical relations, such as
the structural hierarchy discussed in Nelder (1977), McCullagh and Nelder
(1989), and Hamada and Wu (1992). Hierarchy is a natural requirement in
gene regulatory network studies (Davidson and Erwin, 2006), banded covariance matrix estimation (Bien et al., 2016) and lagged variable selection in
time series. Hierarchical variable selection leads to reduced number of variables in measurement, referred to as practical sparsity (Bien et al., 2013).
For instance, a model consisting of x1 , x2 , and x1 x2 may be more parsimonious to practitioners than a model involving x1 , x2 , and x3 x4 . In our
setting, there are two types of hierarchy (Chipman, 1996; Bien et al., 2013):
strong hierarchy (SH) and weak hierarchy (WH). Let ฯjk be the coefficient
of xj xk and xk xj . SH means that if an interaction term exists in
the model, then both of its associated main effects must be present, i.e.,
ฯjk 6= 0 โ bj 6= 0 and bk 6= 0, while WH requires that the inclusion of an
interaction implies at least one of its associated main effects to be added into
the model, i.e., ฯjk 6= 0 โ bj 6= 0 or bk 6= 0. We will show in Section 3 that
WH is relatively easy to realize compared with SH. SH is invariant to linear
transformations of predictors (Peixoto, 1990) and is the primary concern in
this work.
It is a nontrivial task to maintain hierarchy in model selection using
conventional approaches. LASSO (Tibshirani, 1996) may violate SH and WH
as well. We refer to Nelder (1977), Peixoto (1987), Bickel et al. (2010), Wu
et al. (2010), and Hao and Zhang (2014) for some well-developed multi-step
2
procedures which, however, might be ad hoc and greedy. This paper focuses
on regularization-based approaches. The past works in this direction include
SHIM (Choi et al., 2010), VANISH (Radchenko and James, 2010) and HL
(Bien et al., 2013). SHIM reparametrizes ฯjk as ฯjk bj bk and enforces sparsity
in both b = [bj ] and ฯ = [ฯjk ]. The formulation is motivating, and we could
also use ฯjk = ฯjk (b2j + b2k ) for WH. However, the corresponding optimization
problem is nonconvex and the computational algorithm of SHIM is quite slow
in large-scale problems. VANISH is one of the main motivations of our work
and will be discussed in detail in Section 3. HL is a recent breakthrough in
hierarchical variable selection. One of its key ideas is to enforce a magnitude
constraint on the coefficients, kฯj k1 โค |bj |, to make hierarchy naturally hold.
Here, ฯj is a vector of coefficients of the predictors xj xk , 1 โค k โค p. To
handle the nonconvex constraint, Bien et al. (2013) rephrased it with the
โ
pesudo-positive and pesudo-negative parts b+
j , bj of bj but dropped all zero+ โ
product constraints bj bj = 0, 1 โค j โค p. The quality of such a convex
relaxation seems to have no theoretical justification in the literature. In our
experience, HL has excellent performance when the main effects are strong
and p is not very large. But it can miss some interaction effects and become
computationally prohibitive on large datasets. For example, when p = 1000,
HL can take days to obtain a 20-point solution path.
In this work, we propose and study group regularized estimation under
structural hierarchy (GRESH). In theory, we are able to establish nonasymptotic oracle inequalities to show the error rates of the proposed estimators are minimax optimal up to some logarithm factors. We come up with a
new recipe to conquer the theoretical difficulties when analyzing overlapping
regularization terms in pursuing structural parsimony. Moreover, we develop
a computational algorithm which guarantees the convergences of iterates and
function values; it is not only efficient but also simple to implement.
The rest of the paper is organized as follows. Some notation and symbols
are introduced in Section 2. Section 3 presents the general framework of
GRESH. A fast computational algorithm with theoretical support is given
in Section 4. Section 5 builds oracle inequalities for GRESH, and Section 6
shows the minimax optimal rates. In Section 7, simulation studies and real
data analysis are conducted to show the prediction accuracy and computational efficiency of the proposed approach. All technical proofs are given in
the Appendices.
3
2
Notation
We introduce some convenient notation and symbols to be used through>
out the paper. First, for any matrix A = [a1 , . . . , aP
โ Rpรn , define its
p]
p
(2, 1)-norm, (2, โ)-norm and `1 -norm as kAk2,1 = i=1 kai k2 , kAk2,โ =
max1โคiโคp kai k2 and kAk1 = k vec (A)k1 , respectively, where vec is the standard vectorization operator. The spectral norm and Frobenius norm of A
are denoted by kAk2 and kAkF , respectively. For any p-dimensional vector
a that is divided into K groups with aj representing the j-th subvector, its
P
(2, 1)-norm is defined by kak2,1 = K
j=1 kaj k2 .
The following two operators diag and dg are introduced for notational
simplicity. For a square matrix A := [aij ]nรn , diag(A) := [a11 , . . . , ann ]> ,
and for a vector a = [a1 , . . . , an ]> โ Rn , diag{a} is defined as an n ร n
diagonal matrix with diagonal entries given by a1 , . . . , an . Define dg(A) :=
diag{diag(A)} = diag{[a11 , . . . , ann ]> }. We use A[I, J ] to denote a submatrix of A with rows and columns indexed by I and J , respectively.
For any arbitrary b โ Rp , ฮฆ โ Rpรp , we define
J 11 (b, ฮฆ) : = {j โ [p] : bj 6= 0, ฯj 6= 0},
J 10 (b, ฮฆ) : = {j โ [p] : bj 6= 0, ฯj = 0},
J 01 (b, ฮฆ) : = {j โ [p] : bj = 0, ฯj 6= 0},
J 00 (b, ฮฆ) : = {j โ [p] : bj = 0, ฯj = 0},
(2)
Je (ฮฆ) : = {j โ [p2 ] : (vec (ฮฆ))j 6= 0},
JG (b, ฮฆ) : = {j โ [p] : b2j + kฯj k22 6= 0},
where [p] = {1, . . . , p}, and the coefficient vector ฯj denotes the j-th column
of ฮฆ. With |ยท| standing for set cardinality, we define J 11 (b, ฮฆ) := |J 11 (b, ฮฆ)|,
J 10 (b, ฮฆ) := |J 10 (b, ฮฆ)|, J 01 (b, ฮฆ) := |J 01 (b, ฮฆ)|, J 00 (b, ฮฆ) := |J 00 (b, ฮฆ)|,
Je (ฮฆ) := |Je (ฮฆ)| and JG (b, ฮฆ) := |JG (b, ฮฆ)|. Clearly, J 11 +J 10 +J 01 +J 00 =
p, and J 11 + J 10 + J 01 = JG . In addition, under SH, JG (b, ฮฆ) equals the
number of nonzero elements of b. Given the true signal (bโ , ฮฆโ ), the following
abbreviated symbols are used: J 11โ = J 11 (bโ , ฮฆโ ), J 10โ = J 10 (bโ , ฮฆโ ), J 01โ =
J 01 (bโ , ฮฆโ ), Jeโ = Je (ฮฆโ ), and JGโ = JG (bโ , ฮฆโ ).
In the paper, we frequently use the concatenated coefficient matrix for
convenience
โฆ = [b, ฮฆ> ]> ,
(3)
4
>
and its j-th column is denoted by โฆj = [bj , ฯ>
j ] . Given โฆ, โฆb and โฆฮฆ stand
>
for (โฆ[1, :]) and โฆ[2 : (p + 1), :], respectively.
Let X = [x1 , . . . , xp ] โ Rnรp be the raw predictor matrix. Define
Xฬ = [x1
x1 , . . . , x1
Xฬ = [x1 , x1
xp , . . . , xp
x1 , . . . , x1
x1 , . . . , xp
xp , . . . , xp , xp
2
xp ] โ Rnรp ,
x1 , . . . , xp
xp ] โ R
(4)
nร(p2 +p)
.
(5)
Then Xฬ consists of all interactions, and Xฬ includes all p2 +p predictors in the
quadratic model. Given any subset J โ [p], we abbreviate X[:, J ] as X J . It
is also easy to see that diag(XฮฆX > ) = Xฬ vec (ฮฆ) and Xb+diag(XฮฆX > ) =
Xฬ vec (โฆ).
For any two real numbers a and b, a . b means that a โค b holds up to a
multiplicative numerical constant. For two equally sized matrices A = (aij )
and B = (bij ), A โฅ B means aij โฅ bij , for โ i, j.
3
Group regularized estimation under structural hierarchy
For simplicity, we assume for now that there exists no intercept term in the
model. Then (1) can be written as
y = Xbโ + diag(Xฮฆโ X > ) + ฮต,
(6)
where ฮต โผ N (0, ฯ 2 I) with ฯ 2 > 0, y = [y1 , . . . , yn ]> โ Rn is the response
vector, and X = [x1 , . . . , xp ] โ Rnรp is the design matrix consisting of main
effects only.
We describe a general framework for hierarchical variable selection, referred to as group regularized estimation under structural hierarchy or GRESH.
GRESH has two different types, depending on which objects to regularize.
Denoting the squared error loss by `, i.e.,
1
(7)
`(b, ฮฆ) = ky โ Xb โ diag(XฮฆX > )k22 ,
2
the first type is given by
Type-A :
min
โฆ=[b,ฮฆ> ]> โR(p+1)รp
`(b, ฮฆ) + ฮป1 kฮฆk1 + ฮป2
p
X
j=1
s.t. ฮฆ = ฮฆ> (for SH only),
5
k[bj , z(ฯj )]kq
(8)
where ฮป1 , ฮป2 are regularization parameters, 1 < q โค +โ and z(x) is a
function satisfying the property that z(x) = 0 implies x = 0 for any vector
x โ Rp . For instance, z can take the `r -norm function (r > 0)
z(x) = kxkr ,
(9)
z(x) = x> .
(10)
or simply the identity function
The first `1 penalty imposes elementwise sparsity on ฮฆ and the second group`1 penalty enforces column sparsity in โฆ. We argue that with the two penalties and the constraint, (8) can be used for strong hierarchical variable selection. Indeed, the sparsity of b comes from the second group-penalty alone,
i.e., bj = 0 implies k[bj , z(ฯj )]kq = 0 (with probability 1) or z(ฯj ) = 0. By
the property of the z function, ฯj = 0, and thus ฯjk = 0. The symmetry
condition indicates further that ฯkj = 0. Hence (ฯjk + ฯkj )/2, the coefficient
for xj xk , is zero. Consequently, whenever bj = 0, xj xk will be removed from the model and SH is automatically obeyed. We can describe the
reasoning as follows
bj = 0 โ k[bj , z(ฯj )]kq = 0 โ z(ฯj ) = 0 โ ฯj = 0 โ ฯjk = 0
ฯjk + ฯkj
= 0.
โ ฯkj = 0 โ
2
(11)
Without the symmetry constraint, we can only complete the argument in
the first line of (11), and so SH dose not hold. But interestingly, WH is
guaranteed, because from bj = bk = 0, we have (ฯjk + ฯkj )/2 = 0. Therefore,
WH gives a relatively simpler problem.
As pointed out by a reviewer, when the model contains an intercept,
centering the response and the p raw predictors does not make it vanish due
to the presence of nonlinear terms, and so 1b0 + Xb + diag(XฮฆX > ) should
be used to approximate y. In the SH scenario, if at least one x-predictor is
relevant, substituting X 0 = [1, X] for X in (7) suffices.
We focus on convex forms of GRESH in this work. But surely the `1
penalty and the group-`1 penalty in (8) can be replaced by their nonconvex
alternatives; see, e.g., She (2012).
GRESH is related to some methods in the literature. HL makes a special
case of (8) because one of its formulations corresponds to q = โ and r = 1,
6
with a single regularization parameter being used. Another instance is given
by q = 2 and z(x) = x> :
min
โฆ=[b,ฮฆ> ]>
`(b, ฮฆ) + ฮป1 kฮฆk1 + ฮป2 kโฆ> k2,1
s.t. ฮฆ = ฮฆ> .
(12)
Bien et al. (2013) incorrectly described VANISH (Radchenko and James,
2010) in this form, without the symmetry condition. We will focus on (12)
in the theoretical and computational studies of Type-A GRESH.
As a matter of fact, Radchenko and James (2010) defined VANISH in a
different way, which motivates another type of GRESH
X
Type-B: min `(b, ฮฆ) + ฮป1
kฯjk xj xk k2 +
โฆ=[b,ฮฆ> ]>
1โคj,kโคp
p
ฮป2
X
k[bj xj , z(ฯj1 xj
x1 , . . . , ฯjp xj
xp )]kq , s.t. ฮฆ = ฮฆ> (SH only),
j=1
(13)
where ฮป1 , ฮป2 , q, and z are defined as in (8). Similarly, we can argue that (13)
keeps hierarchy. When q = 2 and z takes the form of (10), the penalty part
in (13) become
X
X
X
1
(14)
kฯjk xj xk k22 ) 2 ,
ฮป1
kฯjk xj xk k2 + ฮป2
(kbj xj k22 +
j,k
j
k
as considered by Radchenko and James (2010). VANISH constructs main
effects and interactions from two small sets of orthonormal basis functions
in a functional regression setting. We do not pose such a restriction on the
design matrix, and p can be arbitrarily large.
The key difference between the two types of GRESH is that the penalties
are imposed on the coefficients in (8), but on the terms in (13). A common
practice before calling a shrinkage method is normalizing/standardizing all
predictors, so that it is more reasonable to use a common regularization parameter in penalizing different coefficients. In this way, (8) builds a model
on the normalized predictors and their interactions, while Type-B amounts
to forming the overall design Xฬ first and then performing the standardization. They are not equivalent because in general, (xj /kxj k2 ) (xk /kxk k2 ) 6=
(xj xk )/kxj xk k2 . Then, which type of GRESH is preferable? An answer will be given in Section 5.
7
GRESH offers some general schemes for hierarchical variable selection.
But it is no ordinary lasso or group lasso, since ฮฆ appears in both penalties
as well as the symmetry constraint. The main goal of this paper is to tackle
some computational and theoretical challenges arising from the overlapping
regularization terms in high dimensions. In computation, we would like to
develop fast and scalable algorithms (cf. Section 4); in theory, how to treat
the penalties and the constraint jointly to derive a sharp error bound for
GRESH is intriguing and challenging (cf. Sections 5, 6).
4
Computation
It is perhaps natural to think of using the alternating direction method of
multipliers (ADMM, cf. Boyd et al. (2011)) to deal with the computational
challenge. ADMM recently gains its popularity among statisticians. In fact,
Bien et al. (2016) designed an algorithm of HL based on ADMM, where one
of the main ingredients is the augmented Lagrangian
ฯ
+
โ
โ
2
> +
`(b
โ
b
,
ฮฆ)
+
ฮป1
(b
+
b
)
+
ฮปkฮฆk
1 + hฮฆ โ ฮจ, Li + kฮฆ โ ฮจkF ,
ยฑ
p
p
2
b โR ,ฮฆโR
min
โ +
โ
s.t. ฮจ = ฮจ> , kฯj k1 โค b+
j + bj , bj โฅ 0, bj โฅ 0, 1 โค j โค p.
(15)
Here, L is a Lagrange multiplier matrix, and ฯ > 0 is a given constant,
sometimes referred as the penalty parameter. Although ADMM enjoys some
nice convergence properties in theory, practically only when ฯ is large enough
can we obtain a solution with good statistical accuracy. But often the larger
the value of ฯ is, the slower the (primal) convergence is. For example, the R
package HierNet (version 1.6) for computing HL recommends ฯ = n, but for
p = 1000, the algorithm may take several days to compute a single solution
path. There are some empirical schemes on how to vary ฯ during the iteration, but they are ad hoc and do not always behave well.
In this section, we consider a slightly more general optimization problem
which includes both types of GRESH as particular instances
min
โฆ=[b,ฮฆ> ]>
1
ky โ Xb โ diag(ZฮฆZ > )k22 + kฮปb
2
+kฮฮฆ
ฮฆk1 +
kฮ>
โฆ
>
โฆ k2,1
8
bk1
>
s.t. ฮฆ = ฮฆ ,
(16)
where X, Z โ Rnรp , and ฮปb , ฮฮฆ and ฮโฆ are non-negative regularization
vector and matrices. Let Zฬ = [z 1 z 1 , . . . , z 1 z p , . . . , z p z 1 , . . . , z p z p ],
and Zฬ = [x1 , z 1 z 1 , . . . , z 1 z p , . . . , xp , z p z 1 , . . . , z p z p ]. We assume
p
that ฮโฆ = 1ฮป>
โฆ for some ฮปโฆ โ R in developing the algorithm. (Since our
2
algorithm applies to a general Zฬ โ Rnรp that is not necessarily symmetric,
this is without loss of generality.) In (16), the `1 -type penalties are imposed
on overlapping groups of variables. It is worth noting that the symmetry
constraint considerably complicates the grouping structure. Without it, the
variable groups can be shown to follow a tree structure, for which efficient
algorithms can be developed on Jenatton et al. (2011) or Simon et al. (2013).
Our algorithm follows a different track than ADMM. The details are
presented in Algorithm 1. Step 1 updates ฮ and results from a linearizationbased surrogate function. Step 2 carries out a Dykstra-like splittingโsee,
e.g., Bauschke and Combettes (2008) and She et al. (2014), by use of two
~ S and ฮS . Concretely, for any real number a, ฮS (a; ฮป)
proximity operators, ฮ
is given by sgn(a)(|a| โ ฮป)+ with sgn(ยท) representing the sign function. For
any vector a, ฮS (a; ฮป) is defined componentwise and the multivariate version
~ S (a; ฮป) is given by aฮS (kak2 ; ฮป)/kak2 if a 6= 0 and 0 otherwise.
ฮ
The GRESH algorithm is easy to implement and involves no complicated
matrix operations such as matrix inversion. Moreover, it does not contain
sensitive algorithmic parameters like ฯ in ADMM, and needs no line search.
Theorem 1 provides a universal theoretical choice for ฯ to guarantee the
global optimality of โฆฬ. In particular, strict iterate convergence, in addition to function-value convergence, can be established, which is considerably
stronger than an โevery accumulation pointโ type conclusion in many numerical studies. For clarity, we assume that the inner iteration runs till
convergence, but this is unnecessary; see Remark 2 below.
Theorem 1. Suppose ฮปb โฅ 0, ฮฮฆ โฅ 0, ฮปโฆ > 0. For any ฯ > kZฬk2 and any
starting point โฆ(0) , the sequence of iterates {โฆ(i) } converges to a globally
optimal solution of (16).
Remark 1. The conclusion in the theorem holds for โ`1 + `2 โ type penalties
as well (Zou and Hastie, 2005; Owen, 2007). For the associated proximity
operators, see He et al. (2013). In hierarchical variable selection, adding an
`2 -type shrinkage is particularly helpful to compensate for model collinearity.
Remark 2. Neither the convergence of iterates nor the optimality guarantee
requires the full convergence of the inner loop; see Appendix A.1 for more
9
Algorithm 1 The GRESH algorithm for solving the general problem (16)
Inputs:
Data:X, Z, y. Regularization parameters: ฮปb , ฮฮฆ , ฮปโฆ .
Initialization:
i โ 0, ฯ large enough (say ฯ = kZฬk2 );
2
2
ฮปb โ ฮปb /ฯ 2 , ฮฮฆ โ (ฮฮฆ + ฮ>
ฮฆ )/(2ฯ ), ฮปโฆ โ ฮปโฆ /ฯ .
repeat
1. ฮฮฆ โ ฮฆ(i) + Z > diag{y โ Xb(i) โ Zฬ vec (ฮฆ(i) ))}Z/ฯ 2 ,
>
ฮb โ b(i) + X > (y โ Xb(i) โ Zฬ vec (ฮฆ(i) ))/ฯ 2 , ฮ โ [ฮb , ฮ>
ฮฆ] ;
2. P โ 0, Q โ 0;
repeat
~ S (ฮ[:, k] + P [:, k]; ฮปโฆ [k]), โk : 1 โค k โค p;
(i) โฆ[:, k] โ ฮ
(ii) P โ P + ฮ โ โฆ;
(iii) ฮ[1, :] โ ฮS (โฆ[1, :] + Q[1, :]; ฮป>
b );
(iv) โฆ[2:end, :] โ (โฆ[2:end, :] + โฆ[2:end, :]> )/2;
(v) ฮ[2:end, :] โ ฮS (โฆ[2:end, :] + Q[2:end, :]; ฮฮฆ );
(vi) Q โ Q + โฆ โ ฮ;
until convergence
3. โฆ(i+1) โ ฮ;
4. i โ i + 1;
until convergence
Output โฆฬ
detail. Various stopping criteria can be employed, e.g., Schmidt et al. (2011).
In our experience, running (i)โ(vi) for a few steps (say 10) usually suffices.
Remark 3. Algorithm 1 and Theorem 1 can be extended beyond quadratic
loss functions. When ` takes the binomial deviance in classification problems, the first step of Algorithm 1 becomes ฮb โ b(i) + X > (y โ ฯ(Xb(i) +
Zฬ vec (ฮฆ(i) )))/ฯ 2 , ฮฮฆ โ ฮฆ(i) + Z > diag{y โ ฯ(Xb(i) + Zฬ vec (ฮฆ(i) ))}Z/ฯ 2 ,
>
ฮ โ [ฮb , ฮ>
ฮฆ ] , where ฯ(t) = 1/(1 + exp(โt)) and extends componentwise
to vectors. We can show that theoretically, choosing ฯ > kZฬk2 /2 guarantees
the convergence of the algorithm.
Remark 4. We recommend applying Nesterovโs first acceleration in implementations (Nesterov, 2007). In more detail, it uses a momentum update
of ฮ in Step 1: If i = 0, ฮb โ b(i) + X > (y โ Xb(i) โ Zฬ vec (ฮฆ(i) ))/ฯ 2 ,
10
ฮฮฆ โ ฮฆ(i) + Z > diag{y โ Xb(i) โ Zฬ vec (ฮฆ(i) ))}Z/ฯ 2 ; if i > 0, ฮb โ
(1 โ ฯi )ฮb + ฯi (b(i) + X > (y โ Xb(i) โ Zฬ vec (ฮฆ(i) ))/ฯ 2 ), ฮฮฆ โ (1 โ ฯi )ฮฮฆ +
ฯi (ฮฆ(i) +Z > diag{y โXb(i) โ Zฬ vec (ฮฆ(i) )}Z/ฯ 2 ), where ฯi = (2i+3)/(i+3).
Empirically, the number of iterations can be reduced by about 40% in comparison to the non-relaxed form.
5
Non-asymptotic analysis
In this section, given any โ โ R(p+1)รp and JG โ [p], we use โJG to
denote the submatrix โ[:, JG ]. Given any Je โ [p2 ], k vec (โฮฆ )Je k1 and
k vec (โฮฆ )Je k2 are abbreviated as k(โฮฆ )Je k1 and k(โฮฆ )Je k2 , respectively,
when there is no ambiguity.
In this multi-regularization setting, some standard treatments of the
stochastic term do not give sharp error rates. In particular, applying hฮต,
>
>
Xฬ vec (โฮฆ )i โค kXฬ ฮตkโ kโฮฆ k1 and hฮต, Xฬ vec (โ)i โค kXฬ ฮตk2,โ kโ> k2,1 as
commonly used in the literature (Bickel et al., 2009; Lounici et al., 2011; Negahban et al., 2012; van de Geer, 2014) would yield a prediction error bound
of the order ฯ 2 (Je log p + JG p), which is, ironically, much worse than the
error rate of LASSO or Group LASSO (G-LASSO). Our analysis relies on
two interrelated inequalities derived from the statistical and computational
properties of GRESH estimators. See Appendix A.2 for more technical detail.
First, letโs consider the Type-A problem (12), with ฮป1 , ฮป2 redefined:
1
kyโXbโXฬ vec (ฮฆ)k22 +ฮป1 kXฬk2 kฮฆk1 +ฮป2 kXฬk2 kโฆ> k2,1 s.t. ฮฆ = ฮฆ> .
โฆ=[b,ฮฆ> ]> 2
(17)
> >
Let โฆฬ = [bฬ, ฮฆฬ ] be any global minimizer of (17). We are interested in its
prediction accuracy measured by M (bฬ โ bโ , ฮฆฬ โ ฮฆโ ), where
min
M (b, ฮฆ) = kXb + Xฬ vec (ฮฆ)k22 .
(18)
The predictive learning perspective is always legitimate in evaluating the
quality of the estimator regardless of the signal-to-noise ratio. To guarantee small predictor errors when using a convex method, the design matrix
must satisfy certain incoherence conditions, one of the most popular being
the restricted eigenvalue (RE) assumption (Bickel et al., 2009; Lounici et al.,
2011). In the following, we give an extension of RE in the hierarchy setting,
with the restricted cone defined with both `1 and group-`1 penalties. A less
11
intuitive but technically much less demanding condition is used in the proof.
Assumption A(Je , JG , ฯ, ฮบ). Given Je โ [p2 ], JG โ [p], ฮบ โฅ 0 and a
>
(p+1)รp
constant ฯ โฅ 0, for any โ = [โb , โ>
satisfying โฮฆ = โ>
ฮฆ] โ R
ฮฆ and
>
k(โฮฆ )Jec k1 + k(โJGc ) k2,1 โค (1 + ฯ)(k(โฮฆ )Je k1 + k(โJG )> k2,1 ), the following
inequality holds
ฮบkXฬk22 (k(โฮฆ )Je k22 + kโJG k2F ) โค kXโb + Xฬ vec (โฮฆ )k22 .
(19)
The rate choices of the regularization parameters play a major role in
prediction. We choose ฮป1 and ฮป2 in (17) according to
p
p
(20)
ฮป1 = A1 ฯ log(ep), ฮป2 = A2 ฯ log(ep),
where A1 , A2 are large constants. (20) is quite different from the typical
choice in group-`1 penalization; see Remark 2 for more detail.
The following theorem states a non-asymptotic oracle inequality as well
as a model cardinality bound for GRESH estimators. For convenience, we
use abbreviated symbols JหG = JG (bฬ, ฮฆฬ) and Jหe = Je (ฮฆฬ) for the estimate,
and JG = JG (b, ฮฆ) and Je = Je (ฮฆ) for the reference signal.
> >
Theorem 2. Assume โผ N (0, ฯ 2 I). Let โฆฬ = bฬ, ฮฆฬ
be a global minimizer of (17). Then under (20), for any sufficiently large constants A1 , A2 ,
the following oracle inequality holds for any (b, ฮฆ) โ Rp ร Rpรp
1
E[M (bฬ โ bโ , ฮฆฬ โ ฮฆโ )] . M (b โ bโ , ฮฆ โ ฮฆโ ) + (1 โจ )ฯ 2 (Je + JG ) log p + ฯ 2 ,
ฮบ
(21)
provided that (X, Xฬ, Xฬ) satisfies A(Je , JG , ฯ, ฮบ) for some ฮบ > 0 and some
constant ฯ โฅ 0. Furthermore, under the same regularity condition, the overall
sparsity of the obtained model is controlled by
E[Jหe ] + E[JหG ] . {M (bโ โ b, ฮฆโ โ ฮฆ) + ฯ 2 }/{ฯ 2 log(ep)} + Je + JG . (22)
Remark 1. Letting b = bโ and ฮฆ = ฮฆโ in (21), we obtain an error bound
no larger than ฯ 2 (Jeโ + JGโ ) log p (omitting constant factors). This indicates
that GRESH not only guarantees SH, but can give an error rate as low as
that of LASSO. The existence of the bias term M (b โ bโ , ฮฆ โ ฮฆโ ) makes
our results applicable to approximately sparse signals, which is of practical
significance. The theorem does not require the spectral norms of the design
12
โ
matrices X, Xฬ and Xฬ to be bounded above by O( n) as assumed in, for
example, Zhang and Huang (2008) and Bickel et al. (2009). In addition, the
true signal โฆโ and the reference signal โฆ in the theorem need not obey SH.
Remark 2. It is widely acknowledged that the penalty parameter for a
grouped `1 penalty should be adjusted
โ by the group size (Yuan and Lin,
2006). In fact, ฮป2 would be of order ฯ p + log p from Lounici et al. (2011)
and Wei and Huang (2010), in light of the fact that there are p groups of
size (p + 1) in kโฆk2,1 . Perhaps surprisingly, this parameter choice becomes
suboptimal in hierarchical variable selection. In fact, due to the presence
of multiple penalties, we show in the proof that (20) suffices to suppress
the noise, which in turn leads to a reduced error rate. Such a novel finding
is owing to the careful treatment of the stochastic term, which is generally
applicable to overlap group lasso (Jenatton et al., 2011). The conclusion that
ฮป1 and ฮป2 are of essentially the same rate also facilitates parameter tuning,
since one just needs to search along a one-dimensional grid.
Remark 3. Theorem 2 can be extended to sub-Gaussian vec (ฮต) with mean
0 and its ฯ2 -norm bounded by ฯ, which covers more noise distributions.
High probability form results of the prediction error can be obtained as well:
(21) and (22), without the expectation and the additive ฯ 2 term, hold with
2
2
probability at least 1 โ Cpโc min{A1 ,A2 } for some universal constants C and
c, and so Jหe + JหG . Jeโ + JGโ with high probability. Moreover, in Appendix
B, we show how to adapt our proof to deliver a coordinatewise error bound
which can be used for recovering the sparsity pattern of the true signal.
Remark 4. For the WH version of (17) (without the symmetry condition),
following the lines of the proof of Theorem 2, we can show its error rate is of
the order ฯ 2 {Jew (ฮฆ)+JGw (โฆ)} log p, where JGw (โฆ) = JG (โฆ0 ), Jew (ฮฆ) = Je (ฮฆ0 ),
with โฆ0 = [b, ฮฆ0> ]> and ฯ0kj = ฯkj + ฯjk for k โฅ j and 0 otherwise. The
associated regularity condition uses Jew , JGw , in place of Je , JG , respectively,
and does not require โฮฆ to be symmetric. Details are not reported in the
paper.
Similarly, we can derive an oracle inequality for GRESH estimators of
Type-B. Let X s be the column-scaled X such that the `2 -norm of each of
s
s
its columns equals 1. Xฬ and Xฬ are similarly defined. The corresponding coefficients, denoted by bs and ฮฆs , satisfy Xb = X s bs , Xฬ vec (ฮฆ) =
s
s
s
Xฬ vec (ฮฆs ). Let (bฬ , ฮฆฬ ) be a global minimizer of the scaled Type-B
s
s
problem: minโฆs =[bs ,ฮฆs> ]> 21 ky โ X s bs โ Xฬ vec (ฮฆs )k22 + ฮป1 kXฬ k2 kฮฆs k1 +
13
s
ฮป2 kXฬ k2 k(โฆs )> k2,1 s.t. ฮฆs = (ฮฆs )> . As aforementioned, the problem can
s
not be reduced to (17) because Xฬ [:, jk] does not equal X s [:, j] X s [:, k] in
general.
Assumption A0 (Je , JG , ฯ, ฮบ0 ). Given Je โ [p2 ], JG โ [p], and positive
>
constants ฮบ0 and ฯ, for any โ = [โb , โ>
satisfying โฮฆ = โ>
ฮฆ]
ฮฆ and
>
>
c
c
k(โฮฆ )Je k1 + k(โJG ) k2,1 โค (1 + ฯ)(k(โฮฆ )Je k1 + k(โJG ) k2,1 ), the following
inequality holds
s
s
ฮบ0 kXฬ k22 (k(โฮฆ )Je k22 + kโJG k2F ) โค kX s โb + Xฬ vec (โฮฆ )k22 .
Theorem 2โ Under the same conditions as in Theorem 2 and with A0 (Je , JG , ฯ, ฮดJ0 e ,JG )
in place of A(Je , JG , ฯ, ฮบ), (21) and (22) hold.
The error bounds of the two types of GRESH are of the same order,
but their regularity conditions place different requirements on the design.
We performed extensive simulation studies to compare A and A0 , and found
that for the same ฯ, ฮบ < ฮบ0 usually holds, which suggests the penalization
on the basis of terms seems more appropriate than that on the coefficients.
Therefore, we recommend Type-B regularization for hierarchical variable selection.
6
Minimax lower bound and error rate comparison
In this section, we show that in a minimax sense, the error rate we obtained
in Theorem 2 is minimax optimal up to some logarithmic factors. Consider
two signal classes having hierarchy and joint sparsity:
SH(JG , Je ) = {โฆ = [b, ฮฆ> ]> : โฆ obeys SH, ฮฆ = ฮฆ> , JG (โฆ) โค JG , Je (ฮฆ) โค Je },
(23)
WH(JG , Je ) = {โฆ = [b, ฮฆ> ]> : โฆ obeys WH, JGw (โฆ) โค JG , Jew (ฮฆ) โค Je },
(24)
where 1 โค JG โค p, 1 โค Je โค pJG . Recall the definitions of JGw and Jew in
Remark 4 following Theorem 2. Let `(ยท) be a nondecreasing loss function
with `(0) = 0, ` 6โก 0. Under some regularity assumptions, we study the
14
minimax lower bounds for strong and weak hierarchical variable selection.
Assumption B S (JG , Je ). For any โฆ = [b, ฮฆ> ]> โ R(p+1)รp satisfying that
ฮฆ is symmetric, Je (ฮฆ) โค Je and JG (โฆ) โค JG , ฮบkโฆk2F โค kXฬ vec (โฆ)k22 โค
ฮบkโฆk2F holds, where ฮบ/ฮบ is a positive constant.
Assumption B W (JG , Je ). For any โฆ = [b, ฮฆ> ]> โ R(p+1)รp satisfying that
Jew (ฮฆ) โค Je and JGw (โฆ) โค JG , ฮบkโฆk2F โค kXฬ vec (โฆ)k22 โค ฮบkโฆk2F holds,
where ฮบ/ฮบ is a positive constant.
Theorem 3. (i) Strong hierarchy. Assume y = Xbโ + Xฬ vec (ฮฆโ ) + ฮต with
ฮต โผ N (0, ฯ 2 I), JG โฅ 2, p โฅ 2, Je โฅ 1, n โฅ 1, JG โค p/2, Je โค JG2 /2, and
B S (2JG , 2Je ) is satisfied. Then there exist positive constants C, c (depending
on `(ยท) only) such that
sup
inf
โ
โฆฬ โฆ โSH(JG ,Je )
E[`(M (bฬ โ bโ , ฮฆฬ โ ฮฆโ )/(CPo (Je , JG )))] โฅ c > 0,
(25)
where โฆฬ denotes any estimator, and
Po (Je , JG ) = ฯ 2 {Je log(eJG2 /Je ) + JG log(ep/JG )}.
(26)
(ii) Weak hierarchy. Let JG โฅ 1, Je โฅ 1, n โฅ 1, p โฅ 2, JG โค p/2, Je โค
JG p/2. Under the same model assumption and B W (2JG , 2Je ), (25) holds if
SH(JG , Je ) is replaced by WH(JG , Je ) and Po is replaced by
Po0 (Je , JG ) = ฯ 2 {Je log(eJG p/Je ) + JG log(ep/JG )}.
(27)
We give some examples of ` to illustrate the conclusion. For SH, using
the indicator function `(u) = 1uโฅ1 , we know that for any estimator (bฬ, ฮฆฬ),
M (bฬ โ bโ , ฮฆฬ โ ฮฆโ ) & ฯ 2 Je log(eJG2 /Je ) + JG log(ep/JG )
occurs with positive probability, under some mild conditions. For `(u) = u,
Theorem 3 shows that the risk E[M (bฬ โ bโ , ฮฆฬ โ ฮฆโ )] is bounded from below
by Po (Je , JG ) up to some multiplicative constant. Because JG โค Je โค JG p
and JG โค p, it is easy to see that the minimax rates are no larger than the
error rate obtained in Theorem 2.
A comparison of some popular methods follows, where we can see the
benefits of hierarchical variable selection. In our context, LASSO solves
15
minb,ฮฆ:ฮฆ=ฮฆ> `(b, ฮฆ) + ฮป(kbk1 + kฮฆk1 ). From Bickel et al. (2009), the estimator has a prediction error of the order ฯ 2 (Je + J 10 + J 11 ) log p. G-LASSO,
with the optimization problem defined by minb,ฮฆ:ฮฆ=ฮฆ> `(b, ฮฆ) + ฮปkโฆ> k2,1 ,
automatically maintains SH and has an error rate of ฯ 2 JG p (Lounici et al.,
2011). In general, there is no clear winner between the two. Letโs turn
to a particularly interesting case where Jeโ JGโ p, i.e., the existence of a
main effect in the model does not indicate that all its associated interactions
must be relevant. In this scenario, LASSO always outperforms G-LASSO,
although it does not possess the SH property. GRESH achieves the same low
error rate and guarantees hierarchy, because under SH, J 11 + J 10 = JG .
The error rate proved in (21) does not always beat that of G-LASSO,
because only large values of A are considered in Theorem 2. Yet, even in
the worst case when Jeโ JGโ p, GRESH is only a logarithmic factor worse.
In practical data analysis, there will be no performance loss, because when
ฮป1 = 0, GRESH degenerates to G-LASSO.
Table 1: Error rate comparison between LASSO, G-LASSO, and GRESH,
where ฯ 2 and other constant factors are omitted.
LASSO
G-LASSO
GRESH
Minimax:
7
7.1
(Je + J 11 + J 10 ) log p
JG p
(JG + Je ) log p
2 /J )
JG log(ep/JG ) + Je log(eJG
e
Experiments
Simulations
In this part, we perform some simulation studies to compare the performance
of HL and GRESH (of Type B, cf. (14)) in terms of prediction accuracy, selection consistency, and computational efficiency. We use a Toeplitz design
to generate all main predictors, with the correlation between xi and xj given
by 0.5|iโj| . The true coefficients bโ and ฮฆโ (symmetric) are generated according to the following three setups.
Example 1. n = 40, p = 100 or 200 (and so p + p2 = 5050 or 20100).
bโ = [3, 1.5, 0, 0, 2, 2, 0, ยท ยท ยท , 0]> , ฮฆโ = 0, ฯ 2 = 1. No interactions are relevant
16
to the response variable. SH is satisfied.
Example 2. n = 150, p = 50 or 100 (and so p + p2 = 1275 or 5050). bโ =
[3, 3, 3, 3, 3, 3, 3, 3, 3, 0, ยท ยท ยท , 0]> , ฮฆโ [1, 2] = ฮฆโ [1, 3] = ฮฆโ [4, 5] = ฮฆโ [4, 6] =
ฮฆโ [7, 8] = ฮฆโ [7, 9] = 3, ฯ 2 = 1. The model involves both main and interaction effects and obeys SH.
Example 3. n = 100, p = 50 or 100 (and so p + p2 = 1275 or 5050).
bโ = [1, 1, 1, 1, 1, 1, 1, 0, ยท ยท ยท , 0]> , ฮฆโ [i, j] = 5, 1 โค i, j โค 5, i 6= j, ฮฆโ [4, 5] =
ฮฆโ [4, 6] = ฮฆโ [4, 7] = 5, ฯ 2 = 1. The true model does not have very strong
main effects but satisfies SH.
All regularization parameters are tuned on a (separate) large validation
dataset containing 10K observations. There is no need to perform a full twodimensional grid search to find the optimal parameters in GRESH. Rather,
motivated by Theorem 2, we set ฮป2 = cฮป1 , and chose c = 0.5 according to
experience. Because of the convex nature of the problem, pathwise computation with warm starts is used. After variable selection, a ridge regression
model is always refitted to be used for prediction. The official R package for
HL is HierNet, implemented in C. We set strong=TRUE and post-calibrate HL
by a restricted ridge refitting, which substantially enhances its accuracy. To
make a fair comparison between HL and GRESH, we use the same error tolerance (1e-5) and the same number of grid values (20). All other algorithmic
parameters in HierNet are set to their default values. Given each setup, we
repeat the experiment for 50 times and evaluate the performance of each algorithm according to the measures defined below. The test error (Err) is the
mean squared error between the true mean of y and its estimate; for robustness and stability, we report the median test error from all runs. The joint
detection (JD) rate is the fraction of |{(i, j) : โฆโij 6= 0}| โ |{(i, j) : โฆฬij 6= 0}|
among all experiments. The missing (M) rate and the false alarm (FA) rate
are the mean of |{(i, j) : โฆโij 6= 0, โฆฬij = 0}|/|{(i, j) : โฆโij 6= 0}| and the
mean |{(i, j) : โฆโij = 0, โฆฬij 6= 0}|/|{(i, j) : โฆโij = 0}|, respectively. The path
computational cost is the average running time of an algorithm in seconds.
All the experiments were run on a PC with 3.2GHz CPU, 32GB memory
and 64-bit Windows 8.1. Table 2 and Table 3 summarize the statistical and
computational results.
From Table 2, GRESH and HL behaved equally well in Example 1, the
model of which contains main effects only, but GRESH is faster. In Example
2 and Example 3, the two methods show more differences; see their test errors
17
Table 2: Statistical performance of HL and GRESH, measured in test error,
joint detection rate, missing rate, and false alarm rate on simulation data.
All numbers are multiplied by 100.
Ex 1 (p = 100)
Ex 2 (p = 50)
Ex 3 (p = 50)
Err JD M
FA Err JD M
FA Err JD
M
FA
HL
13.7 100 0.00 0.00 14.2 95 0.24 0.31 68.0 90 0.65 2.71
GRESH 13.6 100 0.00 0.00 11.6 100 0.00 0.12 26.2 100 0.00 0.23
Ex 1 (p = 200)
Ex 2 (p = 100)
Ex 3 (p = 100)
Err JD M
FA Err JD M
FA Err JD
M
FA
HL
13.8 100 0.00 0.00 17.3 90 0.48 0.11 92.2 15 24.03 1.44
GRESH 13.5 100 0.00 0.00 14.3 100 0.00 0.05 26.9 100 0.00 0.08
Table 3: Path computation costs of GRESH and HL when p = 200 and 1000.
The computational times are in seconds unless otherwise specified.
p = 200
HL
GRESH
p = 1000
Ex1
Ex2
Ex3
Ex1
Ex2
Ex3
574
110
3057
158
2.9 hours
128
7.6 hours
1066
โ
2.5 hours
โ
3194
and joint identification rates, for example. We also noticed that GRESH
often gave a more parsimonious model. When the main effects are weak
as in Example 3, HL may miss some genuine interaction effects. Overall,
GRESH showed comparable or better test errors. In fact, this is observed
even when SH is not satisfied (results not shown in the table). We suspect
that the performance differences between HL and GRESH largely result from
the fact that HL compares |bj | with kฯj k1 , the `1 -norm of the overall ฯj , to
realize SH, while (14) groups bj xj , ฯj1 xj x1 , . . ., and ฯjp xj xp , on the
term basis, to select main effects.
The computational times in Table 3 show the scalability of each algorithm
as p varies. When p = 1000, there are 500500 variables in total, and so
HL became computationally prohibitive, also evidenced by Lim and Hastie
(2015). GRESH offered impressive computation gains in the experiment.
18
7.2
Comparison with ADMM
This part shows that directly applying ADMM does not give a scalable algorithm for solving the optimization problem (16) which has a large number
of groups with large group size. The detailed algorithm design is given in
Appendix C. We set ฯ = 1 in ADMM and compared it to Algorithm 1. The
results are reported in Table 4 and Table 5. The statistical performances of
the two algorithms are close. This is reasonable because they solve the same
optimization problem. However, ADMM is much slower. In the experiments,
ADMM became infeasible when p = 200 or larger.
Table 4: Statistical performance of GRESH and ADMM, measured in test
error, joint detection rate, missing rate, and false alarm rate.
Ex 1 (p = 50)
Ex 2 (p = 50)
Ex 3 (p = 50)
Err JD M
FA Err JD M
FA Err JD M
FA
GRESH 11.6 100 0.00 0.02 11.6 100 0.00 0.12 26.2 100 0.00 0.23
ADMM 11.7 100 0.00 0.02 11.9 100 0.00 0.12 26.3 100 0.00 0.22
Ex 1 (p = 100)
Ex 2 (p = 100)
Ex 3 (p = 100)
Err JD M
FA Err JD M
FA Err JD M
FA
GRESH 13.6 100 0.00 0.00 14.3 100 0.00 0.05 26.9 100 0.00 0.08
ADMM 16.8 100 0.00 0.01 14.5 100 0.00 0.06 27.1 100 0.00 0.09
Table 5: Path computation costs of GRESH and ADMM.
p = 50
p = 100
Ex1 Ex2 Ex3
GRESH
ADMM
7.3
8
66
11
70
9
60
Ex1
Ex2
Ex3
27
36
30
1027 1571 1439
Real data example
We performed hierarchical variable selection on the California housing data
(Pace and Barry, 1997). The dataset consists of 9 summary characteristics
for 20640 neighborhoods in California. The response variable is the median
19
house value in each neighborhood. Following Hastie et al. (2009), we obtained eight household-related predictor variables: median income, housing
median age, average number of rooms and bedrooms per household, population, average occupancy (population/households), latitude, and longitude,
denoted by MedInc, Age, AvgRms, AvgBdrms, Popu, AvgOccu, Lat, and Long,
respectively. Similar to Ravikumar et al. (2007) and Radchenko and James
(2010), 50 nuisance features generated as standard Gaussian random variables were added, to make the problem more challenging. The full quadratic
model on this enlarged dataset contains 3422 unknowns.
To prevent from getting over-optimistic error estimates, we used a hierarchical cross-validation procedure where an outer 10-fold cross-validation
(CV) is for performance evaluation and the inner 10-fold selective CVs (She,
2012) are for parameter tuning. We managed to run both HL and GRESH
for hierarchical variable selection, with the estimates post-calibrated by a
local ridge fitting as described in Section 7.1. It took us approximately one
and half days to complete the CV experiment for HL, and about 1.6 hours for
GRESH. The median and mean test errors of the models obtained by HL are
530.8 and 553.5, respectively, and the average number of selected variables
is 31.2. GRESH gave 516.9 and 521.1 for the median and mean test errors, ,
respectively, and selected 17.1 variables on average, about half of the model
size of HL.
To help the reader get an intuition of the selection frequencies of all
predictors, we display heat maps in Figure 1. The two heat maps in the
top panel include all variables, and the bottom panel only shows the heat
maps restricted to the original covariates and their interactions. According to
the figure, both methods successfully removed most of the artificially added
noisy features. On average, only 9.3 nuisance covariates exist in the models
obtained by HL, and 5.4 in the GRESH models. The heat maps of GRESH
are however neater. The HL selection results are less parsimonious and are
perhaps more difficult to interpret. The nonlinear terms in GRESH include
the interaction between MedInc and Age, in addition to the quadratic effects
of MedInc, Age, and AvgBdrms. Popu and all its associated interaction terms
never got selected by GRESH. The insignificance of Popu can be confirmed
by more elaborate analysis based on gradient boosting (Hastie et al., 2009).
20
Main
Main
5
5
10
10
15
15
20
20
25
25
30
30
35
35
40
40
45
45
50
50
55
55
5
10
15
20
25
30
35
40
45
50
55
5
Main
Main
1
1
2
2
3
3
4
4
5
5
6
6
7
7
8
10
15
20
25
30
35
40
45
50
55
8
1
2
3
4
5
6
7
8
1
2
3
4
5
6
7
8
Figure 1: Top panel: heat maps of HL (left) and GRESH (right) on California
housing data. Bottom panel: heat maps of HL (left) and GRESH (right) restricted
to the original 8 variables and their interactions.
Appendices
A
A.1
Proofs of main theorems
Proof of Theorem 1
Denote the object function of (16) by f (โฆ; ฮปb , ฮฮฆ , ฮปโฆ ) = `(โฆ) + P1 (โฆ; ฮปb ,
ฮฮฆ ) + P2 (โฆ; ฮปโฆ ), where P1 (โฆ; ฮปb , ฮฮฆ ) = kฮปb
bk1 + kฮฮฆ
ฮฆk1 , and
P2 (โฆ; ฮปโฆ ) = k(ฮปโฆ 1> ) โฆ> k2,1 . Define g(โฆ, โฆ0 ; ฮปb , ฮฮฆ , ฮโฆ ) = `(โฆ0 ) +
ฯ2
kโฆ0 โ โฆk2F + hX > (y โ Xb0 โ Zฬ vec (ฮฆ0 )), b โ b0 i + hZ > diag{y โ Xb0 โ
2
Zฬ vec (ฮฆ0 )}Z, ฮฆโฮฆ0 i+P1 (โฆ; ฮปb , ฮฮฆ )+P2 (โฆ; ฮปโฆ ). To simplify the notation,
we sometimes write them as f (โฆ) and g(โฆ, โฆ0 ) when there is no ambiguity.
21
Given โฆ0 , by simple algebra, the minimization of g(โฆ, โฆ0 ; ฮปb , ฮฮฆ , ฮปโฆ )
subject to ฮฆ = ฮฆ> reduces to
min
โฆโR(p+1)รp
1
kโฆ โ ฮk2F + P1 (โฆ; ฮปb /ฯ 2 , ฮฮฆ /ฯ 2 ) + P2 (โฆ; ฮปโฆ /ฯ 2 ) + ฮน{ฮฆ=ฮฆ> } ,
2
(28)
>
where ฮ = [ฮb , ฮ>
with ฮb = b0 + X > (y โ Xb0 โ Zฬ vec (ฮฆ0 ))/ฯ 2 and
ฮฆ]
ฮฮฆ = ฮฆ0 + Z > diag{y โ Xb0 โ Zฬ vec (ฮฆ0 )}Z/ฯ 2 , and ฮน{ฮฆ=ฮฆ> } = 0 if ฮฆ = ฮฆ>
and +โ otherwise, which is a lower semicontinuous convex function.
Lemma 1. Let P โ 0, Q โ 0, ฮ โ ฮ0 . Consider the following iterative
procedure:
~ S (ฮ[:, k] + P [:, k]; ฮปโฆ [k]), โk : 1 โค k โค p,
โฆ[:, k] โ ฮ
P โ P + ฮ โ โฆ,
ฮ[1, :] โ ฮS (โฆ[1, :] + Q[1, :]; ฮปb ),
โฆ[2 : end, :] โ (โฆ[2 : end, :] + โฆ[2 : end, :]> )/2,
(29)
ฮ[2 : end, :] โ ฮS (โฆ[2 : end, :] + Q[2 : end, :]; (ฮฮฆ + ฮ>
ฮฆ )/2),
Q โ Q + โฆ โ ฮ,
till convergence. Then both the sequence of ฮ and the sequence of โฆ converge
to the globally optimal solution to minโฆโR(p+1)รp 12 kโฆ โ ฮ0 k2F + kฮปb โฆb k1 +
kฮฮฆ โฆฮฆ k1 + k(ฮปโฆ 1> ) โฆ> k2,1 s.t. โฆฮฆ = โฆ>
ฮฆ.
Now we prove the convergence of โฆ(i) in Algorithm 1. First, we notice
the following fact.
~ S (ยท; ฮป) is non-expansive, that is, kฮ(a;
~
Lemma 2. Given any ฮป โฅ 0, ฮ
ฮป) โ
p
~
ฮ(aฬ;
ฮป)k2 โค ka โ aฬk2 for all a, aฬ โ R .
Therefore, the mapping of the iteration in Algorithm 1 is non-expansive.
We use the tool provided by Opial (1967) for nonexpansive operators to
prove the strict convergence of โฆ(i) . First, the fix point set of the mapping
is non-empty due to the convexity and the KKT conditions. The mapping
is also asymptotically regular in the sense that for any starting point โฆ(0) ,
kโฆ(i+1) โ โฆ(i) k โ 0 as i โ โ. This property is implied by the following
lemma with ฯ > kZฬk2 .
22
Lemma 3. For the sequence {โฆ(i) } generated by Algorithm 1,
1
f (โฆ(i) ; ฮปb , ฮฮฆ , ฮปโฆ ) โ f (โฆ(i+1) ; ฮปb , ฮฮฆ , ฮปโฆ ) โฅ (ฯ 2 โ kZฬk22 )kโฆ(i+1) โ โฆ(i) k2F ,
2
(30)
(i)
for any i โฅ 0. Moreover, {โฆ } is uniformly bounded.
(30) actually does not require the optimality of โฆ(i+1) in minimizing
g(ยท, โฆ(i) ) (cf. (28)). From the proof of Lemma 3, any โฆ(i+1) satisfying
g(โฆ(i+1) , โฆ(i) ) โค g(โฆ(i) , โฆ(i) )(= f (โฆ(i) )) makes (30) hold. There is no need
to run the inner loop till convergence. Moreover, to get the asymptotic regularity and the uniform boundedness of {โฆ(i) }, it suffices to terminate the
inner loop when g(โฆ(i+1) , โฆ(i) ) โค g(โฆ(i) , โฆ(i) ) + ฮธkโฆ(i+1) โ โฆ(i) k2F /2 or
g(โฆ(i+1) , โฆ(i) ) โ g(โฆ(i) , โฆ(i) )
โค ฮธ,
kโฆ(i+1) โ โฆ(i) k2F /2
where ฮธ is a pre-specified constant satisfying โฯ 2 โค ฮธ < ฯ 2 โ kZฬk22 . When
โฆ(i+1) exactly solves (28), ฮธ = โฯ 2 is satisfied.
With all Opialโs conditions satisfied, the sequence {โฆ(i) } has a unique
limit point โฆโ = [bโ , ฮฆโ> ]> , and โฆโ is a fixed point of Algorithm 1.
Next we prove the optimality of any fixed point โฆโ regarding problem
(16). By Lemma 1, โฆโ satisfies the Karush-Kuhn-Tucker (KKT) conditions
of (28):
(
0 โ โฆโ โ ฮ + โP1 (โฆ; ฮปb /ฯ 2 , ฮฮฆ /ฯ 2 ) + โP2 (โฆ; ฮโฆ /ฯ 2 ) + โh(ฮฆโ ),
ฮฆโ โ ฮฆโ> = 0,
where h(ฮฆ; L) = hL, ฮฆ โ ฮฆ> i. With the fixed point property established
above, substituting ฮ with ฮb = bโ + X > (y โ Xbโ โ Zฬ vec (ฮฆโ ))/ฯ 2 and
ฮฮฆ = ฮฆโ + Z > diag{y โ Xbโ โ Zฬ vec (ฮฆโ )}Z/ฯ 2 , we have
๏ฃฑ
0 โ X > (y โ Xbโ โ Zฬ vec (ฮฆโ )) + โb P1 (โฆ; ฮปb , ฮฮฆ ) + โb P2 (โฆ; ฮโฆ ),
๏ฃด
๏ฃด
๏ฃด
๏ฃฒ0 โ Z > diag{y โ Xbโ โ Zฬ vec (ฮฆโ )}Z + โ (P (โฆ; ฮป , ฮ ) + P (โฆ; ฮ ))
ฮฆ
1
b
ฮฆ
2
โฆ
โ
2
๏ฃด
+โh(ฮฆ ; ฯ L),
๏ฃด
๏ฃด
๏ฃณ
0 = ฮฆโ โ ฮฆโ> ,
which are exactly the KKT conditions for the convex problem (16). Hence
โฆโ is a global minimizer of problem (16).
23
Similarly, the global optimality of limiโโ โฆ(i) = โฆโ does not require solving (28) exactly. In the following, we use kAkฮฃ to denote {tr(A> ฮฃA)}1/2 .
Let โฆo be an arbitrary optimal solution to (16). From the proof of Lemma 3,
2
the optimal โฆ(i+1) satisfies g(โฆ(i+1) , โฆ(i) ) + ฯ2 kโฆ(i+1) โ โฆo k2F โค g(โฆo , โฆ(i) ).
We can relax it to
1
g(โฆ(i+1) , โฆ(i) ) + kโฆ(i+1) โ โฆo k2ฯ 2 IโฮธX > X โค g(โฆo , โฆ(i) )
2
for some ฮธ : 0 โค ฮธ โค 1. Then by the construction of g, we obtain
1
1
f (โฆ(i+1) ) โ f (โฆo ) โค kโฆ(i) โ โฆo k2ฯ 2 IโX > X โ kโฆ(i+1) โ โฆo k2ฯ 2 IโฮธX > X
2
2
1 (i+1)
โ kโฆ
โ โฆ(i) k2ฯ 2 IโX > X
2
1
โค kโฆ(i) โ โฆo k2ฯ 2 IโX > X โ kโฆ(i+1) โ โฆo kฯ 2 IโฮธX > X
2
1 (i)
1
โค kโฆ โ โฆo k2ฯ 2 IโฮธX>X โ kโฆ(i+1) โ โฆo kฯ 2 IโฮธX>X .
2
2
It follows that
fยฏi+1 โ f (โฆo ) โค
1
kโฆ(0) โ โฆo k2ฯ 2 IโฮธX>X ,
2(i + 1)
(31)
Pi+1
(k)
โ
(i)
1
where fยฏi+1 = i+1
k=1 f (โฆ ). Letting i โ โ, we get f (โฆ ) = f (limiโโ โฆ ) =
limiโโ fยฏi = f (โฆo ), and so โฆโ must also be a global minimizer of (16).
Proof of Lemma 1 First, we consider
min
โฆ=[b,ฮฆ]>
1
kโฆ โ ฮ0 k2F + kฮปb
2
bk1 + kฮฮฆ
ฮฆk1 + ฮน{ฮฆ=ฮฆ> } .
Let ฮฆ0 = ฮ0ฮฆ , b0 = ฮ0b . By some simple algebra, kฮฆ โ ฮฆ0 k2F = kฮฆ โ (ฮฆ0 +
ฮฆ0> )/2k2F + C(ฮฆ0 ), where the last term does not depend on ฮฆ. Based on
Lemma 1 of She (2012), it is not difficult to show that the global minimizer
is given by bo = ฮS (b0 ; ฮปb ), ฮฆo = ฮS ((ฮฆ0 + ฮฆ0> )/2; (ฮฮฆ + ฮ>
ฮฆ )/2).
1
Similarly, the globally optimal solution to minโฆ=[b,ฮฆ]> 2 kโฆ โ ฮ0 k2F +
~ S (ฮ0 [:, k]; ฮปโฆ [k]), 1 โค
k(ฮปโฆ 1> ) โฆ> k2,1 is given by โฆo with โฆo [; , k] = ฮ
k โค p. Applying Theorem 3.2 and 3.3 in Bauschke and Combettes (2008)
guarantees the strict convergence of the iterates and the global optimality of
the limit point.
24
~ is a
Proof of Lemma 2 The conclusion follows from the fact that ฮ
proximity operator associated with a convex function.
Proof of Lemma 3 From the optimality of โฆ(i+1) and the convexity of
the penalties in (28), it is easy to see that for any โฆ,
g(โฆ(i+1) , โฆ(i) ; ฮปb , ฮฮฆ , ฮโฆ ) +
ฯ 2 (i+1)
kโฆ
โ โฆk2F โค g(โฆ, โฆ(i) ; ฮปb , ฮฮฆ , ฮปโฆ ).
2
(32)
It follows from the construction of g that
g(โฆ(i+1) , โฆ(i) ; ฮปb , ฮฮฆ , ฮโฆ ) โค g(โฆ(i) , โฆ(i) ; ฮปb , ฮฮฆ , ฮปโฆ ) = f (โฆ(i) ; ฮปb , ฮฮฆ , ฮปโฆ ).
On the other hand, noticing that the gradient of l with respect to ฮฆ is
Z > diag{y โ Xb0 โ Zฬ vec (ฮฆ0 ))}Z, Taylor expansion yields
g(โฆ, โฆ0 ; ฮปb , ฮฮฆ , ฮโฆ ) โฅ f (โฆ; ฮปb , ฮฮฆ , ฮปโฆ ) +
(ฯ 2 โ kZฬk22 ) 0
kโฆ โ โฆk2F
2
for any โฆ, โฆ0 .
Furthermore, k(ฮปโฆ 1> ) โฆ(i)> k2,1 โค f (โฆ(i) ; ฮปb , ฮฮฆ ) โค f (โฆ(0) ; ฮปb , ฮฮฆ ).
Because ฮปโฆ > 0, the conclusion follows.
A.2
Proof of Theorem 2
In this proof, we use C, c to denote universal constants. They are not necessarily the same at each occurrence. Throughout the proof, P (b, ฮฆ; ฮป1 , ฮป2 )
is short for ฮป1 kฮฆk1 + ฮป2 kโฆ> k2,1 , ฮป01 is short for ฮป1 kXฬk2 , and ฮป02 is short for
ฮป2 kXฬk2 . We prove the theorem under a less restrictive condition.
First, because โฆฬ is a global minimizer of (8) and P is convex, for any
(b, ฮฆ) โ Rp ร Rpรp with ฮฆ symmetric (not necessarily satisfying SH), we
have
1
`(bฬ, ฮฆฬ) + P (bฬ, ฮฆฬ; ฮป01 , ฮป02 ) + M (b โ bฬ, ฮฆ โ ฮฆฬ) โค `(b, ฮฆ) + P (b, ฮฆ; ฮป01 , ฮป02 ).
2
Based on the model assumption, it is easy to see that
1
1
M (bโ โ bฬ, ฮฆโ โ ฮฆฬ) + P (bฬ, ฮฆฬ; ฮป01 , ฮป02 ) + M (โb , โฮฆ )
2
2
1
โ
โ
0
0
โค M (b โ b, ฮฆ โ ฮฆ) + P (b, ฮฆ; ฮป1 , ฮป2 ) + hฮต, Xโb + diag(Xโฮฆ X > )i,
2
25
where โb = bฬ โ b, โฮฆ = ฮฆฬ โ ฮฆ.
ห = [โ> , (vec (โฮฆ ))> ]> and Jห = J โช Jห, where J := {j :
Introduce โ
b
vec (โฆ)j 6= 0}. and Jห := {j : vec (โฆฬ)j 6= 0}. Denote by P Jห the orthogonal
projection matrix onto the column space of Xฬ Jห . Then
hฮต, Xโb + diag(Xโฮฆ X > )i
ห
=hฮต, Xฬ โi
ห หi
=hฮต, P Jห Xฬ Jห โ
J
=hP Jห ฮต, Xโb + diag(Xโฮฆ X > )i
1
a1
โค
M (โb , โฮฆ ) + kP Jห ฮตk22 ,
2a1
2
for any a1 > 0. Representing kโฆฬk2,1 as k(โฆฬJG )> k2,1 + k(โฆฬJGc )> k2,1 and kฮฆฬk1
as kฮฆฬJe k1 + kฮฆฬJec k1 , respectively, and applying the triangle inequalities of
k ยท k1 and k ยท k2,1 , we have
1
1
M (bโ โ bฬ, ฮฆโ โ ฮฆฬ) + ฮป01 k(โฮฆ )Jec k1 + ฮป02 k(โJGc )> k2,1 + M (โb , โฮฆ )
2
2
1
1
M (โb , โฮฆ ) + ฮป01 k(โฮฆ )Je k1 + ฮป02 k(โJG )> k2,1
โค M (bโ โ b, ฮฆโ โ ฮฆ) +
2
2a1
a1
+ kP Jห ฮตk22 .
2
(33)
How to treat the key term kP Jห ฮตk22 is nontrivial. We derive two inequalities from statistical analysis and computational analysis.
First, we bound kP Jห ฮตk22 with some cardinality measures. The goal of this
step is to show for a large constant L, supJ โ[p(p+1)] {kP J ฮตk22 โLPo (JG (J ), Je (J ))}
is negative with high probability, where Po (JG , Je ) = ฯ 2 {JG log(ep/JG ) +
Je log(epJG /Je )}. (If the reference signal (b, ฮฆ) satisfies SH, so does Jห, for
which Po can be strengthened to ฯ 2 {JG log(ep/JG ) + Je log(eJG2 /Je )} following the lines of the proof of Lemma 4.)
For notational convenience, we extend the J -measures defined in (2) to
an index set: Given any J โ [p(p + 1)], with โฆ = [b, ฮฆ> ]> a binary matrix
satisfying (vec (โฆ))J = 1 and (vec (โฆ))J c = 0, define JG (J ) = JG (โฆ),
Je (J ) = Je (ฮฆ). Given J โ [p(p + 1)], JG (J ) โ [p] and Je (J ) โ [p2 ].
26
Lemma 4. Given 1 โค JG โค p and 0 โค Je โค p2 , for any t โฅ 0,
!
sup
P
|JG |=JG ,|Je |=Je
kP J ฮตk22 โฅ L0 Po (JG , Je ) + tฯ 2
โค C exp(โct),
(34)
where L0 , C, c > 0 are universal constants. Here, we omit the dependence of
JG and Je on J for brevity.
Define
!
RJG ,Je =
sup
|JG |=JG ,|Je |=Je
kP J ฮตk22 โ Lฯ 2 {Je log(ep) + JG log(ep)}
,
+
and R = sup1โคJG โคp,0โคJe โคp2 RJG ,Je (when JG (J ) = 0, P J ฮต = 0). Then
kP Jห ฮตk22 โคLฯ 2 {Jหe log(ep) + JหG log(ep)} + R
โคLฯ 2 (Je + JG ) log(ep) + Lฯ 2 {Jหe log(ep) + JหG log(ep)} + R. (35)
Set L > L0 . Then, by Lemma 4 and Je โฅ JG ,
P(R โฅ tฯ)
2
โค
p
p
X
X
P(RJG ,Je โฅ tฯ)
JG =1 Je =0
2
โค
p
p
X
X
C exp(โct) exp {โc (L โ L0 )(Je log(ep) + JG log(ep))}
JG =1 Je =0
0
โคC exp(โct2 ),
from which it follows that ER โค Cฯ 2 . It is also easy to see that for sufficiently large L, R โค 0 occurs with probability at least 1 โ CpโcL .
Next, we derive an inequality based on the computational optimality of
(bฬ, ฮฆฬ). Due to the convexity of the problem, (bฬ, ฮฆฬ) is a stationary point of
1
ky โ Xb โ diag(XฮฆX > )k22 + ฮป01 kฮฆk1
2
X
+ ฮป02 kโฆ> k2,1 +
lj,k (ฯj,k โ ฯk,j ),
j<k
27
where lj,k are Lagrangian multipliers. By the KKT conditions, for any j โ
JหG , bฬj is nonzero (with probability 1) and so satisfies
ฮป02
bฬj
= โx>
j (Xฬ vec (โฆฬ) โ y).
kโฆฬj k2
(36)
0
Similarly, for any j 0 โ Jหe , letting jc = d jp e, jr = j 0 โ (jc โ 1)p, ฯฬjr ,jc satisfies
>
ฯฬ
ฮป01 sgn(ฯฬjr ,jc ) + ฮป02 kโฆฬjr ,jkc + ljr ,jc sgn(jr โ jc ) = โXฬ j 0 (Xฬ vec (โฆฬ) โ y), where
jc 2
sgn(t) = 1, 0, โ1 for t > 0, = 0, < 0, respectively. Adding the equations for
ฯฬjr ,jc and ฯฬjc ,jr can cancel ljr ,jc . So when jr 6= jc , we have
2ฮป01 sgn(ฯฬjr ,jc ) + ฮป02
ฯฬjr ,jc
kโฆฬjc k2
+ ฮป02
ฯฬjr ,jc
kโฆฬjr k2
>
= โ2Xฬ j 0 (Xฬ vec (โฆฬ) โ y),
(37)
and when jc = jr , we have
ฮป01 sgn(ฯฬjr ,jc ) + ฮป02
ฯฬjr ,jc
>
kโฆฬjc k2
= โXฬ j 0 (Xฬ vec (โฆฬ) โ y).
(38)
Notice that sgn(ฯฬjr ,jc )ฯฬjr ,jc is always non-negative. Squaring both sides of
(36), (37) and (38) and summing over all j โ JหG and j 0 โ Jหe , we obtain
ห
ฮป02
1 Je
+
ฮป02
2
X bฬ2j +
jโJหG
P
k:ฯฬk,j 6=0
ฯฬ2k,j
kโฆฬj k22
>
โค 2kXฬ Jห (Xฬ vec (โฆฬ) โ y)k22 ,
>
02 ห
2
ห
ห
ห
and so ฮป02
1 Je + ฮป2 JG โค 2kXฬ Jห (Xฬ vec (โฆฬ) โ y)k2 . It follows from J โ J and
the Cauchy-Schwarz inequality that
ฮป21 Jหe + ฮป22 JหG โค 3M (bโ โ bฬ, ฮฆโ โ ฮฆฬ) + 6kP Jห ฮตk22 .
(39)
Now, combining the optimization inequality (39) and the statistical
inp
equality (35) can yield a bound of kP Jห ฮตk22 . In fact, with ฮปo = ฯ log(ep),
ฮป1 == A1 ฮปo , ฮป2 = A2 ฮปo , Ai โฅ A, A2 = A0 L for some A0 > 0, we get
(1 โ
3
6
)kP Jห ฮตk22 โค Lฯ 2 (Je + JG ) log(ep) +
M (bโ โ bฬ, ฮฆโ โ ฮฆฬ) + R.
A0
A0
28
Plugging this into (33) gives
1
M (bโ โ bฬ, ฮฆโ โ ฮฆฬ) + Aฮปo kXฬk2 k(โฮฆ )Jec k1 + Aฮปo kXฬk2 k(โJGc )> k2,1
2
3a1
1 1
1
โ
โ
1+
M (b โ b, ฮฆ โ ฮฆ) +
โ 1 M (โb , โฮฆ )
โค
2
A0 โ 6
2 a1
a1 L
+ Aฮปo kXฬk2 k(โฮฆ )Je k1 + Aฮปo kXฬk2 k(โJG )> k2,1 +
ฯ 2 (Je + JG ) log(ep)
2(1 โ 6/A0 )
a1
+
R.
2(1 โ 6/A0 )
Assume the following condition holds
kXฬk2 (k(โฮฆ )Je k1 + k(โJG )> k2,1 )
โคkXฬk2 (k(โฮฆ )Jec k1 + k(โJGc )> k2,1 ) + K
p
Je + JG kXโb + Xฬ vec (โฮฆ )k2 ,
(40)
for some K large enough. Then we have
1
M (bโ โ bฬ, ฮฆโ โ ฮฆฬ)
2
1
3a1
1 1
a1 R
โ
โ
โค
1+
M (b โ b, ฮฆ โ ฮฆ) +
โ 1 M (โb , โฮฆ ) +
2
A0 โ 6
2 a1
2(1 โ 6/A0 )
p
a
L
1
+ Aฮปo K Je + JG kXโb + Xฬ vec (โฮฆ )k2 +
ฯ 2 (Je + JG ) log(ep)
2(1 โ 6/A0 )
1
3a1
1 1
1
โ
โ
โค
1+
M (b โ b, ฮฆ โ ฮฆ) +
+
โ 1 M (โb , โฮฆ )
2
A0 โ 6
2 a1 a2
a1
a2 A0 2
a1
+
K Lฯ 2 (Je + JG ) log(ep) +
R.
+
2(1 โ 6/A0 )
2
2(1 โ 6/A0 )
Hence we get EM (bโ โ bฬ, ฮฆโ โ ฮฆฬ) . M (bโ โ b, ฮฆโ โ ฮฆ) + (1 โจ K 2 )ฯ 2 (Je +
JG )ฯ 2 log(ep)+ฯ 2 if we choose the constants a1 , a2 , A0 satisfying, say, a1 = 2,
a2 = 2, A0 โฅ 7.
To complete the proof, we show that A(Je , JG , ฯ, ฮบ) with ฮบ > 0 and
ฯ โฅ 0 implies (40). Consider two cases. The case (1 + ฯ)(k(โฮฆ )Je k1 +
k(โJG )> k2,1 ) โค k(โฮฆ )Jec k1 + k(โJGc )> k2,1 is trivial. Suppose the reverse
29
inequality holds. Then
kXฬk2 (k(โฮฆ )Je k1 + k(โJG )> k2,1 )
โคkXฬk2 (Je + JG )1/2 (k(โฮฆ )Je k22 + k(โJG )> k2F )1/2
โค(Je + JG )1/2 kXโkF /ฮบ1/2 ,
and so (40) holds with K = 1/ฮบ1/2 .
Finally, we can also plug (35) into (39), resulting in
ฮป21 E[Jหe ] + ฮป22 E[JหG ] . M (bโ โ b, ฮฆโ โ ฮฆ) + ฮป21 Je + ฮป22 JG + ฯ 2 ,
(41)
and so (22) follows.
The proof for Theorem 2โ follows the same lines; the details are omitted.
Proof of Lemma 4 First, notice that for fixed J , kP J ฮตk22 /ฯ 2 โผ ฯ2 (D)
with D โค J. The standard tail bound for X โผ ฯ2 (D) gives P(X โ D โฅ t) โค
exp(โt2 /(4(D + t))), โt โฅ 0 (Laurent and Massart, 2000, Lemma 1).
It is easy to see that
sup
|JG |=JG ,|Je |=Je
kP J ฮตk22 โค
sup
sup
sup
J 11 +J 10 +J 01 =JG
Q(J 11 ,J 10 ,J 01 )
(e)
|Je |=Je ,Je โJG
kP J ฮตk22 ,
where Q(J 11 , J 10 , J 01 ) = {(J 11 , J 10 , J 01 ) โ [p]3 : |J 11 | = J 11 , |J 10 | =
(e)
J 10 , |J 01 | = J 01 , J 11 โฉ J 10 = J 10 โฉ J 01 = J 11 โฉ J 01 = โ
} and JG denotes
the index set {1 โค j โค p2 : d pj e โ JG }. Q(J 11 , J 10 , J 01 ) contains
p
11
10
01
J , J , J , p โ J 11 โ J 10 โ J 01
many elements. This multinomial coefficient is bounded by JpG , and by Stir
lingโs approximation, log JpG โค JG log(ep/JG ). Similarly, sup|Je |=Je ,Je โJ (e)
G
(J 11 +J 01 )p
JG +2
and supJ 11 +J 10 +J 01 =JG involve
and 2 terms, respectively, and
Je
we have
11
J + J 01 )p
JG + 2
log
โค Je log(eJG p/Je ), log
โค C log(eJG ).
Je
2
Applying the union bound gives the desired result.
30
A.3
Proof of Theorem 3
The proof is based on the general reduction scheme in Chapter 2 of Tsybakov (2009). The key is to design proper least favorable signals in different
situations. We consider two cases.
(i) JG log(ep/JG ) โค Je log(eJG2 /Je ). Define a signal subclass
B 1 (JG , Je ) = โฆ = [b, ฮฆ]> : bj = 1 if j โ [JG ] and 0 if JG < j โค p,
ฯk,j = 0 or ฮณR if (k, j) โ [JG ] ร [JG ] and 0 otherwise, ฮฆ = ฮฆ> , Je (ฮฆ) โค Je ,
ฯ
where R = ฮบ1/2
(log(eJG2 /Je ))1/2 and ฮณ > 0 is a small constant to be chosen
later. Because bj = 1 (1 โค j โค JG ), any โฆ โ B 1 (JG , Je ) satisfies SH, and
thus B 1 (JG , Je ) โ SH(JG , Je ). By Stirlingโs approximation,
2
J
1
log |B (JG , Je )| = log G โฅ Je log(JG2 /Je ) โฅ cJe log(eJG2 /Je )
Je
for some universal constant c.
Let ฯ(โฆ1 , โฆ2 ) = kโฆ1 โ โฆ2 k0 be the Hamming distance. By Lemma 8.3 in
Rigollet and Tsybakov (2011), there exists a subset B 10 (JG , Je ) โ B 1 (JG , Je )
such that
log |B 10 (JG , Je )| โฅ c1 Je log(eJG2 /Je ),
ฯ(โฆ1 , โฆ2 ) โฅ c2 Je , โโฆ1 , โฆ2 โ B 10 , โฆ1 6= โฆ2
for some universal constants c1 , c2 > 0. Then kโฆ1 โโฆ2 k2F = ฮณ 2 R2 ฯ(โฆ1 , โฆ2 ) โฅ
c2 ฮณ 2 R2 Je . It follows from the restricted conditional number assumption that
kXฬ vec (โฆ1 ) โ Xฬ vec (โฆ2 )k22 โฅ c2 ฮบฮณ 2 R2 Je
(42)
for any โฆ1 , โฆ2 โ B 10 , โฆ1 6= โฆ2 , where ฮบ/ฮบ is a positive constant.
For Gaussian models, the Kullback-Leibler divergence of N (Xฬ vec (โฆ2 ), ฯ 2 I)
(denoted by Pโฆ2 ) from N (Xฬ vec (โฆ1 ), ฯ 2 I) (denoted by Pโฆ1 ) is K(Pโฆ1 , Pโฆ2 ) =
1
kXฬ vec (โฆ1 ) โ Xฬ vec (โฆ2 )k22 . Let P0 be N (0, ฯ 2 I). By the assumption
2ฯ 2
again, for any โฆ โ B 1 (JG , Je ),
1
ฮณ2 2
2 2
K(P0 , Pโฆ ) โค 2 ฮบฮณ R ฯ(0, โฆ) โค 2 ฮบR Je ,
2ฯ
ฯ
31
where we used ฯ(โฆ1 , โฆ2 ) = Je (ฮฆ1 โ ฮฆ2 ) โค 2Je . Therefore,
2
ฮณ2
J
1 X
2
2
log G .
K(P0 , Pโฆ ) โค ฮณ Je log(eJG /Je ) โค
10
|B |
c
Je
10
(43)
โฆโB
Combining (42) and (43) and choosing a sufficiently small value for ฮณ, we
can apply Theorem 2.7 of Tsybakov (2009) to get the desired lower bound.
(ii) JG log(ep/JG ) > Je log(eJG2 /Je ). Define a signal subclass
B 2 (JG ) = {โฆ = [b, ฮฆ> ]> : bj โ {0, 1} โj โ [p], ฮฆ = 0, JG (โฆ) โค JG },
ฯ
where R = ฮบ1/2
{log(ep/JG )}1/2 and ฮณ > 0 is a small constant. The afterward
treatment is similar to (i). The details are omitted.
For WH, we redefine B 1 as B 1 (JG , Je ) = {โฆ = [b, ฮฆ> ]> : bj = 1 if
j โ [JG ] and 0 otherwise, ฯk,j = 0 or ฮณR if k โฅ j and 1 โค j โค JG ,
ฯ
and 0 otherwise, Jew (ฮฆ) โค Je }, where R = ฮบ1/2
(log(eJG p/Je ))1/2 . Then
B 1 (JG , Je ) โ WH(JG , Je ). The rest follows the same lines as the proof for
SH.
B
Coordinatewise error bound for support
recovery
In this part, we show that GRESH estimators can recover the sparsity pattern
of the true signal, i.e., J โ = {j : vec (โฆโ )j 6= 0}, with high probability. The
result is of the type of Lounici (2008) and Ravikumar et al. (2010), but we
do not have to assume the stringent irrepresentable conditions or mutual
coherence conditions. For more discussions, see Zhang (2009).
Assumption C(Je , JG , ฮถ, ฮป1 , ฮป2 ). Given Je โ [p2 ], JG โ [p], ฮถ โฅ 0, ฮป1 , ฮป2 >
>
0, for any โ = [โb , โ>
โ R(p+1)รp satisfying โฮฆ = โ>
ฮฆ]
ฮฆ , the following
inequality holds
kXฬk2 (k(โฮฆ )Je k1 + k(โJG )> k2,1 ) + (Je + JG )k vec (โ)k2โ /(2ฮป1 โง 2ฮป2 )
p
โค kXฬk2 (k(โฮฆ )Jec k1 + k(โJGc )> k2,1 ) + ฮถ Je + JG kXโb + Xฬ vec (โฮฆ )k2 .
(44)
p
Theorem
4. Assume โผ N (0, ฯ 2 I). Take ฮป1 = A1 ฯ log(ep) and ฮป2 =
p
A2 ฯ log(ep) in (17)and suppose (X, Xฬ, Xฬ) satisfies C(Jeโ , JGโ , ฮถ, ฮป1 , ฮป2 ) for
32
> >
be a
some ฮถ โฅ 0, where Jeโ = Je (ฮฆโ ), JGโ = JG (bโ , ฮฆโ ). Let โฆฬ = bฬ, ฮฆฬ
p
global minimizer of (17). Define Jห = {j : | vec (โฆฬ)j | > 1 + ฮถ 2 (ฮป1 โง ฮป2 )},
and J โ = {j : vec (โฆโ )j 6= 0}. Then for sufficiently large constants A1 and
2
2
A2 , with probability at least 1 โ Cpโc(A1 โงA2 ) , the estimate โฆฬ satisfies
p
k vec (โฆฬ โ โฆโ )kโ โค 1 + ฮถ 2 (ฮป1 โง ฮป2 ).
If, in addition, the minimum signal strength satisfies
p
minโ | vec (โฆโ )j | > 2 1 + ฮถ 2 (ฮป1 โง ฮป2 ),
jโJ
(45)
2
2
then Jห = J โ , with probability at least 1 โ Cpโc(A1 โงA2 ) .
To recover the true support, signal strength conditions like (45) must be
imposed. Interestingly, compared with Theorem 5.1 in Lounici et al. (2011),
hierarchical variable selection can accommodate smaller signals than group
variable selection.
Proof. From the proof of Theorem 2, we get the following inequality with
probability at least 1 โ CpโcL
1
M (bโ โ bฬ, ฮฆโ โ ฮฆฬ) + Aฮปo ฯk(โฮฆ )Jec k1 + Aฮปo ฯk(โJGc )> k2,1
2
1
3a1
1 1
โค (1 +
)M (bโ โ b, ฮฆโ โ ฮฆ) + ( โ 1)M (โb , โฮฆ )
2
A0 โ 6
2 a1
a1 L
+ Aฮปo ฯk(โฮฆ )Je k1 + Aฮปo ฯk(โJG )> k2,1 +
ฯ 2 (Je + JG ) log(ep),
2(1 โ 6/A0 )
p
where ฯ = kXฬk2 , L is a universal constant, ฮปo = ฯ log(ep), A2 = A0 L, and
a1 , A0 are positive constants to be determined. Also recall that ฮป1 = A1 ฮปo ,
ฮป2 = A2 ฮปo , A = A1 โง A2 .
33
By the regularity condition, we have
1
1
(Je + JG )k vec (โ)k2โ + M (bโ โ bฬ, ฮฆโ โ ฮฆฬ)
2
2
1
3a1
1 1
โ
โค (1 +
)M (b โ b, ฮฆโ โ ฮฆ) + ( โ 1)M (โb , โฮฆ )
2
A0 โ 6
2 a1
p
a1 L
+ Aฮปo ฮถ Je + JG kXโb + Xฬ vec (โฮฆ )k2 +
ฯ 2 (Je + JG ) log(ep)
2(1 โ 6/A0 )
1
3a1
1 1
1
)M (bโ โ b, ฮฆโ โ ฮฆ) + ( +
โ 1)M (โb , โฮฆ )
โค (1 +
2
A0 โ 6
2 a1 a2
a2 A0 2
a1
+
ฮถ Lฯ 2 (Je + JG ) log(ep),
+
2(1 โ 6/A0 )
2
for any a2 > 0. Taking b = bโ , ฮฆ = ฮฆโ and choosing a1 = a2 = 1, A0 โฅ 7 give
(Jeโ +JGโ )k vec (โฆฬโโฆโ )k2โ โค A0 (1 + ฮถ 2 )Lฯ 2 (Jeโ +JGโ ) log(ep). The conclusion
follows.
C
An ADMM algorithm
We describe an ADMM algorithm for solving problem (16). Recall Zฬ =
[z 1 z 1 , ยท ยท ยท , z 1 z p , ยท ยท ยท , z p z 1 , ยท ยท ยท , z p z p ], Zฬ = [x1 , z 1 z 1 , ยท ยท ยท , z 1
z p , ยท ยท ยท , xp , z p z 1 , ยท ยท ยท , z p z p ], and ฮโฆ = 1ฮป>
โฆ . To apply ADMM, we
rewrite (16) into
1
min ky โ Xb โ diag(ZฮฆZ > )k22 + kฮ>
โฆ
+ kฮปb ฮb k1 + kฮฮฆ ฮฮฆ k1
โฆ,ฮ,ฮฅ 2
ฮฅ> k2,1
(46)
s.t. ฮฮฆ = ฮ>
ฮฆ , ฮ = โฆ, ฮฅ = โฆ,
2
2
2
>
p
p รp
where ฮฅ โ Rnร(p +p) , ฮ = [ฮb , ฮ>
. The augฮฆ ] with ฮb โ R , ฮฮฆ โ R
mented Lagrangian of (46) can be formed by use of two Lagrangian multiplier
matrices (L1 , L2 ) and a penalty parameter ฯ:
Lฯ (โฆ, ฮ, ฮฅ, L1 , L2 )
1
= ky โ Zฬvec(โฆ)k22 + kฮปb ฮb k1 + kฮฮฆ ฮฮฆ k1 + ฮน{ฮฮฆ =ฮ>ฮฆ } + kฮ>
ฮฅ> k2,1
โฆ
2
ฯ
+ ฯ1> (L1 (โฆ โ ฮ) + L2 (โฆ โ ฮฅ))1 + (kโฆ โ ฮk2F + kโฆ โ ฮฅk2F ).
2
34
Based on the proof of Theorem 1, we can solve the sub-optimization
problems of ฮ and ฮฅ by some proximity operators; the details are omitted.
The full ADMM algorithm is given as follows.
Algorithm 2 An ADMM algorithm
Inputs:
Data: X, Z, y. Regularization parameters: ฮปb , ฮฮฆ , ฮปโฆ .
repeat
โ1 >
>
1. vec(โฆ) โ Zฬ Zฬ + 2ฯI
Zฬ y + ฯ vec(ฮ + ฮฅ โ L1 โ L2 ) ;
~ S (โฆ[:, k] + L2 [:, k]; ฮปโฆ [k]/ฯ), โk : 1 โค k โค p;
2. ฮฅ[:, k] โ ฮ
3. โฆ[2 : end, :] โ (โฆ[2 : end, :] + โฆ[2 : end, :]> )/2;
>
4. ฮ โ ฮS (โฆ + L1 ; [ฮปb , ฮ>
ฮฆ ] /ฯ);
5. L2 โ L2 + โฆ โ ฮฅ;
6. L1 โ L1 + โฆ โ ฮ;
until convergence
Output: โฆ
References
Bauschke, H. H. and P. L. Combettes (2008). โA Dykstra-like Algorithm for
Two Monotone Operatorsโ. Pacific Journal of Optimization 4 (3), 383โ
391.
Bickel, P. J., Y. Ritov, and A. B. Tsybakov (2009). โSimultaneous Analysis
of Lasso and Dantzig Selectorโ. The Annals of Statistics, 1705โ1732.
Bickel, P. J., Y. Ritov, and A. B. Tsybakov (2010). โHierarchical Selection of
Variables in Sparse High-Dimensional Regressionโ. In Borrowing Strength:
Theory Powering ApplicationsโA Festschrift for Lawrence D. Brown, pp.
56โ69. Institute of Mathematical Statistics.
Bien, J., F. Bunea, and L. Xiao (2016). โConvex Banding of the Covariance
Matrixโ. Journal of the American Statistical Association 111 (514), 834โ
845.
Bien, J., J. Taylor, and R. Tibshirani (2013). โA Lasso for Hierarchical
Interactionsโ. The Annals of Statistics 41 (3), 1111โ1141.
35
Boyd, S., N. Parikh, E. Chu, B. Peleato, and J. Eckstein (2011). โDistributed Optimization and Statistical Learning via the Alternating Direction Method of Multipliersโ. Foundations and Trends R in Machine
Learning 3 (1), 1โ122.
Chipman, H. (1996). โBayesian Variable Selection with Related Predictorsโ.
Canadian Journal of Statistics 24 (1), 17โ36.
Choi, N. H., W. Li, and J. Zhu (2010). โVariable Selection With the Strong
Heredity Constraint and its Oracle Propertyโ. Journal of the American
Statistical Association 105 (489), 354โ364.
Cohen, J., P. Cohen, S. G. West, and L. S. Aiken (2013). Applied Multiple
Regression/Correlation Analysis for the Behavioral Sciences. Routledge.
Davidson, E. H. and D. H. Erwin (2006). โGene Regulatory Networks and
the Evolution of Animal Body Plansโ. Science 311 (5762), 796โ800.
Hamada, M. and C. J. Wu (1992). โAnalysis of Designed Experiments With
Complex Aliasingโ. Journal of Quality Technology 24 (3), 130โ137.
Hao, N. and H. H. Zhang (2014). โInteraction Screening for Ultra-High Dimensional Dataโ. Journal of the American Statistical Association 109 (1),
1285โ1301.
Hastie, T., R. Tibshirani, and J. Friedman (2009). The Elements of Statistical
Learning (2nd ed.). New York: Springer-Verlag.
He, Y., Y. She, and D. Wu (2013). โStationary-Sparse Causality Network
Learningโ. Journal of Machine Learning Research 14 (1), 3073โ3104.
Jenatton, R., J. Mairal, G. Obozinski, and F. Bach (2011). โProximal Methods for Hierarchical Sparse Codingโ. Journal of Machine Learning Research 12, 2297โ2334.
Laurent, B. and P. Massart (2000). โAdaptive Estimation of a Quadratic
Functional by Model Selectionโ. The Annals of Statistics, 1302โ1338.
Lim, M. and T. Hastie (2015). โLearning Interactions via Hierarchical GroupLasso Regularizationโ. Journal of Computational and Graphical Statistics 24 (3), 627โ654.
36
Lounici, K. (2008). โSup-Norm Convergence Rate and Sign Concentration
Property of Lasso and Dantzig Estimatorsโ. Electronic Journal of Statistics 2, 90โ102.
Lounici, K., M. Pontil, S. Van De Geer, and A. B. Tsybakov (2011). โOracle
Inequalities and Optimal Inference Under Group Sparsityโ. The Annals
of Statistics 39 (4), 2164โ2204.
McCullagh, P. and J. A. Nelder (1989). Generalized Linear Models. London
England Chapman and Hall.
Negahban, S. N., P. Ravikumar, M. J. Wainwright, and B. Yu (2012). โA
Unified Framework for High-Dimensional Analysis of M -Estimators With
Decomposable Regularizersโ. Statistical Science 27 (4), 538โ557.
Nelder, J. A. (1977). โA Reformulation of Linear Modelsโ. Journal of the
Royal Statistical Society. Series A (General), 48โ77.
Nesterov, Y. (2007). โGradient Methods for Minimizing Composite Objective
Functionโ. Technical report, Universiteฬ catholique de Louvain, Center for
Operations Research and Econometrics (CORE).
Opial, Z. (1967). โWeak Convergence of the Sequence of Successive Approximations for Nonexpansive Mappingsโ. Bulletin of the American Mathematical Society 73 (4), 591โ597.
Owen, A. B. (2007). โA Robust Hybrid of Lasso and Ridge Regressionโ.
Contemporary Mathematics 443, 59โ72.
Pace, R. K. and R. Barry (1997). โSparse Spatial Autoregressionsโ. Statistics
& Probability Letters 33 (3), 291โ297.
Peixoto, J. L. (1987). โHierarchical Variable Selection in Polynomial Regression Modelsโ. The American Statistician 41 (4), 311โ313.
Peixoto, J. L. (1990). โA Property of Well-Formulated Polynomial Regression
Modelsโ. The American Statistician 44 (1), 26โ30.
Radchenko, P. and G. M. James (2010). โVariable Selection Using Adaptive Nonlinear Interaction Structures in High Dimensionsโ. Journal of the
American Statistical Association 105 (492), 1541โ1553.
37
Ravikumar, P., M. J. Wainwright, and J. D. Lafferty (2010). โHighDimensional Ising Model Selection Using `1 -Regularized Logistic Regressionโ. The Annals of Statistics 38 (3), 1287โ1319.
Ravikumar, P. D., H. Liu, J. D. Lafferty, and L. A. Wasserman (2007).
โSpAM: Sparse Additive Modelsโ. In In Advances in Neural Information
Processing Systems 20, pp. 1201โ1208. MIT Press.
Rigollet, P. and A. Tsybakov (2011). โExponential Screening and Optimal
Rates of Sparse Estimationโ. The Annals of Statistics 39 (2), 731โ771.
Schmidt, M., N. L. Roux, and F. R. Bach (2011). โConvergence Rates of Inexact Proximal-Gradient Methods for Convex Optimizationโ. In J. ShaweTaylor, R. Zemel, P. Bartlett, F. Pereira, and K. Weinberger (Eds.), Advances in Neural Information Processing Systems 24, pp. 1458โ1466.
She, Y. (2012). โAn Iterative Algorithm for Fitting Nonconvex Penalized
Generalized Linear Models With Grouped Predictorsโ. Computational
Statistics & Data Analysis 56 (10), 2976โ2990.
She, Y., Y. He, and D. Wu (2014). Learning topology and dynamics of large
recurrent neural networks. IEEE Transactions on Signal Processing 62,
5881โ5891.
Simon, N., J. Friedman, T. Hastie, and R. Tibshirani (2013). โA SparseGroup Lassoโ. Journal of Computational and Graphical Statistics 22 (2),
231โ245.
Tibshirani, R. (1996). โRegression Shrinkage and Selection via the Lassoโ.
Journal of the Royal Statistical Society. Series B (Methodological), 267โ
288.
Tsybakov, A. (2009). Introduction to Nonparametric Estimation. Springer
Series in Statistics. New York: Springer.
van de Geer, S. (2014). โWeakly Decomposable Regularization Penalties and
Structured Sparsityโ. Scandinavian Journal of Statistics 41 (1), 72โ86.
Wei, F. and J. Huang (2010). โConsistent Group Selection in HighDimensional Linear Regressionโ. Bernoulli 16 (4), 1369โ1384.
38
Wu, J., B. Devlin, S. Ringquist, M. Trucco, and K. Roeder (2010). โScreen
and Clean: A Tool for Identifying Interactions in Genome-Wide Association Studiesโ. Genetic epidemiology 34 (3), 275โ285.
Yuan, M. and Y. Lin (2006). โModel Selection and Estimation in Regression
With Grouped Variablesโ. Journal of the Royal Statistical Society: Series
B (Statistical Methodology) 68 (1), 49โ67.
Zhang, C.-H. and J. Huang (2008). โThe Sparsity and Bias of the Lasso Selection in High-Dimensional Linear Regressionโ. The Annals of Statistics,
1567โ1594.
Zhang, T. (2009). โSome Sharp Performance Bounds for Least Squares Regression With L1 Regularizationโ. The Annals of Statistics 37 (5A), 2109โ
2144.
Zou, H. and T. Hastie (2005). โRegularization and Variable Selection via the
Elastic Netโ. Journal of the Royal Statistical Society: Series B (Statistical
Methodology) 67 (2), 301โ320.
39
| 10math.ST
|
Making up for the deficit in a marathon run
Iztok Fister Jr.,1 Dusฬan Fister,2 Suash Deb,3, 4 Urosฬ Mlakar,5 Janez Brest,5 and Iztok Fister5
1
University of Maribor, Faculty of Electrical Engineering and Computer Science,
Smetanova 17, 2000 Maribor, Slovenia; Email: [email protected]
2
University of Maribor, Faculty of Mechanical Engineering, Smetanova 17, 2000 Maribor, Slovenia
3
arXiv:1705.03302v1 [cs.NE] 9 May 2017
4
IT & Educational Consultant, Ranchi, Jharkhand, India
Distinguished Professorial Associate, Decision Sciences and Modelling Program,
Victoria University, Melbourne, Australia
5
University of Maribor, Faculty of Electrical Engineering and
Computer Science, Smetanova 17, 2000 Maribor, Slovenia
(Dated: 10 February 2017)
To predict the final result of an athlete in a marathon run thoroughly is the eternal
desire of each trainer. Usually, the achieved result is weaker than the predicted one due
to the objective (e.g., environmental conditions) as well as subjective factors (e.g., athleteโs
malaise). Therefore, making up for the deficit between predicted and achieved results is the
main ingredient of the analysis performed by trainers after the competition. In the analysis,
they search for parts of a marathon course where the athlete lost time. This paper proposes
an automatic making up for the deficit by using a Differential Evolution algorithm. In this
case study, the results that were obtained by a wearable sports-watch by an athlete in a
real marathon are analyzed. The first experiments with Differential Evolution show the
possibility of using this method in the future.
2
I.
INTRODUCTION
Running a marathon is a very challenging task for every athlete. Good and efficient preparation
for a marathon is a very complex process that must be performed many time before the competition.
The marathon is not just an ordinary running competition, but it is an epic distance having roots
in ancient Greece. The marathon name was coined by the legend of soldier Philippides, who ran
from the Battle of Marathon to Athens in order to announce the victory of the united Greeks
against the Persian force.
Nowadays, most of the big cities organize marathon competitions annually that attract a lot
of people. Some athletes just want to finish a marathon, while others have higher goals. In line
with this, the amateur athletes are satisfied with an achievement of around four hours, while more
competitive amateur athletes try to beat the so-called magic line, the three hours. Although this
magic result was set many years ago, running a marathon race sub three hours is still considered
as a good result for a well-trained amateur athletes. However, those who would like to reach the
result of sub three hours not only need the proper sports training, but also a lot of knowledge
about a race course. Additionally, awareness of characteristics about an athleteโs body is a crucial
step in the evolution of runners, i.e., when to go faster, when to eat, when to slow down, how to
pace on hills are some of the most significant questions that runners ask themselves when planning
their running pace.
Making up for the deficit time in a marathon run is a very demanding task4 that comes into
play when the final results as predicted by sports trainers are slower than the achieved one by only
a few seconds. Thus, more experienced athletes also calculate the pace for each kilometer of a race
many weeks before the race start in order to predict their final achievement. However, the achieved
result can distinguish from the predicted, because of objective, as well as subjective factors. The
objective factors represent environmental conditions such as weather, temperature, wind position
and even humidity, while the subjective factors refer to the athleteโs psycho-physical conditions
such as feelings on the race day. Nowadays, predicting the final result is a little bit easier using the
modern mobile technology. In this group, we can count professional sports-watches that consist
also of Global Positioning System (GPS) sensors3 , heart rate measuring sensors, cadence meters,
etc. Additionally, there is a comprehensive software support and some intelligent systems have
also been arisen recently.
In this paper, we present a novel solution for making up for the deficit marathon run that is based
on the data collected from sports-watches worn by the athlete during the run. The primary aim of
3
this study is to help athletes who did not achieve the predicted final results by a few seconds and
show them on which parts of the predefined course they could improve the intermediate pace so that
the predicted results could be reached. This solution is implemented using Differential Evolution
(DE)6 , which calculates the improvement of the intermediate pace, based on the configuration of
the running course. These improvements are considered as constraints in the DE and they base on
the traditional rule of the marathon run, i.e., more seconds can be caught up when the running
course is flat. The secondary aim of this approach is also to help athletes in their analysis of the
already performed marathon race. In our case study, we focus on the situation where an athlete
tries to achieve the magic marathon time of three hours.
The paper is structured in the remainder as follows. In Section II, making up for the deficit in
a marathon run is formulated as a Constraint Satisfaction Problem (CSP). Section III is devoted
to Differential Evolution. Section IV illustrates the case study, in which the case of an athlete in
the Three hearts marathon in 2012 is taken into consideration. Experiments are presented in the
second part of Section IV. The paper is concluded with Section V, where the work done is reviewed
and directions are outlined for further research.
II.
PROBLEM FORMULATION
Making up for the deficit time can be formulated as a CSP2 , where the solution is specified as a
vector p = (p1 , . . . , pn )T of n problem variables representing the intermediate pace deficit for each
of the observed kilometer. Additionally, a variable bound constraint is attached to each problem
(L)
(U )
(L)
variable that limits the proper values of each variable to the interval pi โ [pi , pi ], where pi
(U )
and pi
are lower and upper bounds, respectively. In the case of a marathon race, where the
length of the whole course equals 42.195 km, the length of each vector is, consequently, n = 43
elements. Then, the problem is defined in generalized form as follows:
n
X
max f (p) =
pi โค Ta โ Tp ,
(1)
i=1
subject to
(L)
pi
โค pi โค
(U )
pi ,
i = 1, . . . , n;
where Ta โ Tp denotes the deficit time that must be made up and the relation Ta โฅ Tp is valid.
Thus, the following inequality constraints must be satisfied:
n
X
(L)
pi โฅ Ta โ Tp ,
(2)
i=1
which ensures that the problem is solvable. Although the upper bounds can be set as negation
(U )
of the corresponding lower bounds (i.e., pi
(L)
= โpi
in general, here the upper bounds are fixed to
4
(U )
zero (i.e., pi
= 0). This mean that only negative values of intermediate pace deficits are allowed
in our study.
(L)
The lower bound values pi
are calculated from the configuration of the course according to
the following assumptions:
๏ฃฑ
๏ฃด
๏ฃด
= 0, flat,
7 โ2 sec,
โ
๏ฃด
๏ฃฒ
Alt i = < 0, downhill, โ
7 โ4 sec,
๏ฃด
๏ฃด
๏ฃด
๏ฃณ > 0, uphill,
7 0 sec,
โ
(3)
where Alt i is an average altitude obtained in the appropriate kilometer. The speculation behind
the assumptions is to speed up, when the course is flat or downward and to retain the speed when
running upward. The quantitative values for estimation of deficit time is also taken from the real
marathon practice, where it holds that the deficit time can be a maximum of 4 seconds in one
kilometer when the course is flat.
III.
DIFFERENTIAL EVOLUTION
Differential Evolution (DE) is an Evolutionary Algorithm appropriate for continuous and combinatorial optimization that was introduced by Storn and Price in 19951,6 . DE is a population-based
algorithm5 that consists of Np real-coded vectors representing the candidate solutions, as follows:
(t)
(t)
(t)
xi = (xi,1 , . . . , xi,n ),
for i = 1, . . . , Np,
(t)
(L)
(U )
(4)
(L)
where each element of the solution is in the interval xi,1 โ [xi , xi ], and xi
(U )
and xi
denote
the lower and upper bounds of the i-th variable, respectively.
The variation operator in DE supports a differential mutation and a differential crossover. In
particular, the differential mutation selects two solutions randomly and adds a scaled difference
between these to the third solution. This mutation can be expressed as follows:
(t)
(t)
(t)
(t)
ui = xr1 + F ยท (xr2 โ xr3 ),
for i = 1, . . . , Np,
(5)
where F denotes the scaling factor as a positive real number that scales the rate of modification
while r1, r2, r3 are randomly selected values in the interval [1 . . . Np]. Note that, typically, the
interval F โ [0.1, 1.0] is used in the DE community.
As a differential crossover, uniform crossover is employed by the DE, where the trial vector is
built from parameter values copied from two different solutions. Mathematically, this crossover
5
can be expressed as follows:
(t+1)
wi,j
=
๏ฃฑ
๏ฃด
๏ฃฒu(t)
i,j
randj (0, 1) โค CR โจ j = jrand ,
๏ฃด
๏ฃณx(t)
i,j
otherwise,
(6)
where CR โ [0.0, 1.0] controls the fraction of parameters that are copied to the trial solution. Note,
(t)
the relation j = jrand ensures that the trial vector is different from the original solution xi .
A differential selection is, in fact, a generalized one-to-one selection that can be expressed
mathematically as follows:
(t+1)
xi
=
๏ฃฑ
๏ฃด
๏ฃฒw(t)
i
if f (wi ) โค f (xi ),
๏ฃด
๏ฃณx(t)
i
otherwise .
(t)
(t)
(7)
In a technical sense, crossover and mutation can be performed in several ways in Differential
Evolution. Therefore, a specific notation is used to describe the varieties of these methods (also
strategies) generally. For example, โDE/rand/ 1/binโ denotes that the base vector is selected
randomly, 1 vector difference is added to it, and the number of modified parameters in the mutant
vector follows binomial distribution.
A.
Making up for the deficit time using DE
Modifying the original DE to solve a problem of making up for the deficit time in a marathon
run (let us call a new variant marathon DE or simply mDE) is relatively simple, because DE
implements the variable bounds implicitly. Therefore, the main problem remains how to set the
appropriate variable bounds for elements of solution vectors. The answer to this question is given
when intermediate pace of an athlete is taken into consideration. The intermediate paces are,
nowadays obtained using the mobile sports-watches worn by the marathon runner during the run.
There are four phases of modifying the original DE for making up for the deficit time in a
marathon run, as follows:
โข defining the objective
โข preparing the bounds for problem variables
โข mapping the solution from decision space to problem space
โข evaluating the solution in problem space
6
Indeed, defining the objective refers to the expression Ta โ Tp in Eq. (2), where we define the total
deficit of time that must be made up. Preparing the bounds for problem variables pi,j bases on
tracked data from sports-watches referring to the information about altitude as overcome by the
marathon runner in each kilometer (Eq. (3)). According to these data, the appropriate boundary
(t)
values are calculated according to Eq. (3). The mapping of solution from decision space xi to its
(t)
counterpart in the problem space pi is straightforward and obeys the following equation:
&
(t)
pi,j
=
(U )
pj
(U )
xj
(L)
โ pj
โ
(L)
xj
'
ยท
(t)
xi,j
ยท 10 ยท 10โ1 ,
(8)
where multiplying by 10โ1 ensures that the given result in seconds is extended with the most
significant digit of milliseconds after decimal point. Finally, the fitness function presented in
Eq. (1) is used in our study.
(t)
In order to simplify solving of the problem, the last element in vector pi that does not represent
the whole kilometer is excluded from the optimization, i.e., it is taken as an uphill part, although
it can be downhill in practice as is in our case.
IV.
CASE STUDY: THE THREE HEARTS
MARATHON 2012
The Three Hearts marathon has been organized annually in the city of Radenci (Slovenia) since
1981. During the years, the organizers have changed the marathon course slightly. In 2012, the
marathon course consisted of two 21.1 kilometer long laps as can be seen in Figure 1. The goal of
FIG. 1. Three Hearts marathon course in 2012.
an athlete in our study was to run the marathon sub 3:00 hours. However, to run the marathon
in this time, the intermediate pace should be on average 4:15 minutes per kilometer (min/km)
(Figure 2) or better (less than 4:15). The athleteโs plan was to run the first kilometers a little
bit faster than the others. Although the course was flat on average, he did not focus enough on
7
FIG. 2. Average pace for each kilometer.
some ascents with a slight uphill that were large enough to lose a power, especially in bad weather
conditions. After 30 km, the time was still good enough for achieving the result under 3:00 hours,
but the last kilometers were pretty hard to overcome because of a formerly broken nail, abrasions
from the heat and many blisters. Therefore, the athlete was one minute slower at the finish than
planned.
FIG. 3. Ascents and descents on the course of Three Hearts marathon at 2012.
The proposed approach for making up for the deficit time works as follows. The objective is
expressed as:
3 : 01 : 09.4 โ 3 : 00 : 00.0 = 1 : 09.4 min
โ 70 sec.
An altitude graph of the marathon course, from which problem variable bounds were prepared, is
presented in Figure 3.
8
The graph in Figure 3 presents differences of altitudes in meters according to the run distances
in kilometers that is divided into two parts denoting 21.1 km by a vertical line. Although both parts
must be the same in theory, this assumption does not hold in practice, because GPS technology,
used by sports-watches, is far from ideal for now. However, the tracked data are accurate enough
for the purposes of our study.
The results of an analysis of altitude data are as follows. The GPS receiver detected 4 flat
parts, 22 uphillโs and 17 downhills. The last 195 meters were downward. Essentially, the difference
between the number of uphillโs and downhills is a consequence of errors in the GPS receiver. On
the other hand, there were no serious uphillโs and downhills on the marathon course as can be
seen from the maximum and minimum differences of the altitude (i.e., ยฑ10 meters). In fact, the
difference between average ascent and average descent values at the end of each kilometer higher
than ยฑ1 meter is declared as uphill or downhill in the study.
(t)
Bounds for problem variables pi
were prepared based on the analysis of the altitude data
according to Eq. (3). The results of this phase are illustrated in Table I under columns โLower
P
(L)
boundsโ and โUpper boundsโ. The sum of the lower bounds of all problem variables is nj=1 pi,j =
82, whereby a condition of the problem solvability in Eq. (2) was satisfied.
The last two phases, i.e., mapping and evaluating the solution, were performed using the mDE.
For our experiments, mDE was coded in Python programming language and the โDE/rand/1/binโ
strategy was employed. The input of the algorithm were data obtained from the Three Hearts
marathon. The dimension of the problem was n = 43, population size was set to Np = 100,
scaling factor F = 0.5 and crossover rate CR = 0.9. Lower and upper bounds were set in the
(t)
interval xi,j โ [0, 1]. The algorithm terminated when either fitness function fulfilled the objective
and, thus, all constraints were satisfied 100 times, or the number of fitness function evaluations
exceeded 80,000. Only one run of the mDE was performed in this study.
The obtained results of the mDE algorithm are presented in Table I that consists of six columns.
The first column counts kilometers during the marathon run, while the second illustrates actual
intermediate pace, as already presented in Figure 2. The third column depicts the predicted
intermediate pace obtained after decrementing the actual intermediate pace by the intermediate
pace deficit found in the first run that is presented in column four. The last values are obtained
after conducting the mDE algorithm. As already mentioned, the last two columns present lower
and upper bounds.
9
TABLE I. Results of making up for the deficit in the Three Hearts marathon
Distance Actual pace (sec) Predicted pace (sec) Difference Lower bounds Upper bounds
[km]
[min/km]
[min/km]
[sec]
[sec]
[sec]
1
04:03.80
04:03.80
0
0
0
2
04:05.40
04:03.60
1.8
2
0
3
04:09.70
04:05.90
3.8
4
0
4
04:12.20
04:08.50
3.7
4
0
5
04:15.00
04:15.00
0
0
0
6
04:07.70
04:04.30
3.4
4
0
7
04:09.70
04:09.70
0
0
0
8
04:11.20
04:11.20
0
0
0
9
04:11.00
04:07.80
3.2
4
0
10
04:10.30
04:10.30
0
0
0
11
04:13.80
04:10.00
3.8
4
0
12
04:08.80
04:07.00
1.8
2
0
13
04:09.10
04:07.30
1.8
2
0
14
04:10.70
04:09.70
1
2
0
15
04:07.90
04:07.90
0
0
0
16
04:14.40
04:12.70
1.7
2
0
17
04:11.20
04:07.30
3.9
4
0
18
04:13.00
04:13.00
0
0
0
19
04:10.00
04:06.40
3.6
4
0
20
04:13.60
04:13.60
0
0
0
21
04:03.00
04:03.00
0
0
0
22
04:06.40
04:06.40
0
0
0
23
04:10.00
04:08.30
1.7
2
0
24
04:12.00
04:08.50
3.5
4
0
25
04:23.80
04:21.20
2.6
4
0
26
04:08.40
04:08.40
0
0
0
27
04:08.00
04:04.30
3.7
4
0
28
04:07.60
04:03.80
3.8
4
0
29
04:24.40
04:22.80
1.6
2
0
30
04:17.00
04:14.40
2.6
4
0
31
04:09.30
04:09.30
0
0
0
32
04:13.70
04:10.30
3.4
4
0
33
04:14.70
04:10.80
3.9
4
0
34
04:12.60
04:11.00
1.6
2
0
35
04:18.60
04:18.60
0
0
0
36
04:31.90
04:31.90
0
0
0
37
04:27.80
04:27.80
0
0
0
38
04:37.70
04:33.90
3.8
4
0
39
04:37.40
04:34.60
2.8
4
0
40
04:45.20
04:43.70
1.5
2
0
41
04:53.70
04:53.70
0
0
0
42
04:52.40
04:52.40
0
0
0
42.195
01:45.30
01:45.30
0
0
0
Total:
03:01:09.40
02:59:59.40
70
82
0
A.
Discussion
At a first glance, the conducted experiments are in contrast with the principles of stochastic
population-based optimization, where we are interested in the mean values obtained after the number of runs. Strictly speaking, this is true, when the results are obtained from the aforementioned
10
point of view. However, the aim of our study was twofold: On the one hand, to show that the
mDE algorithm can be employed for making up the deficit in a marathon race, while on the other
hand, to prove that there are many solutions of this problem. Both assumptions were justified by
finding numerous feasible solutions in just one run. Here, the question arises โCould we say, which
of the solutions found is really optimal?โ. However, the answer to the question must be answered
by professionals, i.e., sports trainers and coaches together with athletes.
V.
CONCLUSION
This paper reports the first successful application of the mDE for making up for the deficit
in a marathon run based on the history data obtained by a sports-tracker on the corresponding
marathon course. Making up for the deficit in a marathon run is a complex task that is usually
performed by professional trainers and even athletes themselves. We defined this problem as
a constraint problem and solved it by the mDE. Preliminary experiments shown that proposed
approach may be used in the real-world.
However, there are still many open directions for further research in this problem, e.g., to
determine the most appropriate solution for a specific athlete from a huge set of solutions. In line
with this, context dependent information need to be accumulated, on which basis such a solution
can be proposed by the mDE algorithm automatically. However, extending input data with a heart
rate monitor might also increase the prediction possibilities of the proposed algorithm.
1
S. Das, S. S. Mullick, and P. Suganthan. Recent advances in differential evolutionโan updated survey.
Swarm and Evolutionary Computation, 27:1โ30, 2016.
2
A. E. Eiben and J. E. Smith. Introduction to evolutionary computing, volume 53. Springer, 2003.
3
I. Fister, D. Fister, S. Fong, and I. Fister Jr. Widespread mobile devices in applications for real-time
drafting detection in triathlons. Journal of emerging technologies in web intelligence, 5(3):310โ321, 2013.
4
I. Fister Jr., K. Ljubicฬ, P. N. Suganthan, M. Perc, and I. Fister. Computational intelligence in sports:
Challenges and opportunities within a new research domain. Applied Mathematics and Computation,
262:178โ186, 2015.
5
I. Fister Jr., X.-S. Yang, I. Fister, J. Brest, and D. Fister. A brief review of nature-inspired algorithms
for optimization. Elektrotehnisฬki vestnik, 80(3):116โ122, 2013.
6
R. Storn and K. Price. Differential evolutionโa simple and efficient heuristic for global optimization over
continuous spaces. Journal of global optimization, 11(4):341โ359, 1997.
| 9cs.NE
|
1
Hybrid Precoder and Combiner Design with Low
Resolution Phase Shifters in mmWave MIMO
Systems
arXiv:1710.06192v1 [cs.IT] 17 Oct 2017
Zihuan Wang, Student Member, IEEE, Ming Li, Senior Member, IEEE, Qian Liu, Member, IEEE, and A. Lee
Swindlehurst, Fellow, IEEE
AbstractโMillimeter wave (mmWave) communications have
been considered as a key technology for next generation cellular
systems and Wi-Fi networks because of its advances in providing orders-of-magnitude wider bandwidth than current wireless
networks. Economical and energy-efficient analog/digial hybrid
precoding and combining transceivers have been often proposed
for mmWave massive multiple-input multiple-output (MIMO)
systems to overcome the severe propagation loss of mmWave
channels. One major shortcoming of existing solutions lies in the
assumption of infinite or high-resolution phase shifters (PSs) to
realize the analog beamformers. However, low-resolution PSs are
typically adopted in practice to reduce the hardware cost and
power consumption. Motivated by this fact, in this paper, we
investigate the practical design of hybrid precoders and combiners with low-resolution PSs in mmWave MIMO systems. In
particular, we propose an iterative algorithm which successively
designs the low-resolution analog precoder and combiner pair for
each data stream, aiming at conditionally maximizing the spectral
efficiency. Then, the digital precoder and combiner are computed
based on the obtained effective baseband channel to further
enhance the spectral efficiency. In an effort to achieve an even
more hardware-efficient large antenna array, we also investigate
the design of hybrid beamformers with one-bit resolution (binary)
PSs, and present a novel binary analog precoder and combiner
optimization algorithm with quadratic complexity in the number
of antennas. The proposed low-resolution hybrid beamforming
design is further extended to multiuser MIMO communication
systems. Simulation results demonstrate the performance advantages of the proposed algorithms compared to existing lowresolution hybrid beamforming designs, particularly for the onebit resolution PS scenario.
Index TermsโMillimeter wave (mmWave) communications,
hybrid precoder, multiple-input multiple-output (MIMO), phase
shifters, one-bit quantization.
I. I NTRODUCTION
The past decade has witnessed the exponential growth of
data traffic along with the rapid proliferation of wireless deZihuan Wang and Ming Li are with the School of Information and Communication Engineering, Dalian University of Technology, Dalian, Liaoning
116024, China, (e-mail: [email protected], [email protected]).
Qian Liu is with the School of Computer Science and Technology,
Dalian University of Technology, Dalian, Liaoning 116024, China (e-mail:
[email protected]).
A. L. Swindlehurst is with the Center for Pervasive Communications and
Computing, University of California, Irvine, CA 92697 USA and also with
the Institute for Advanced Study, Technical University of Munich,Munchen
80333, Germany (e-mail: [email protected]).
This paper is supported by the National Natural Science Foundation
of China (Grant No. 61671101 and 61601080) and the Fundamental Research Funds for the Central Universities (Grant No. DUT15RC(3)121 and
DUT17JC10).
vices. This flood of mobile traffic has significantly exacerbated
spectrum congestion in current frequency bands, and therefore
stimulated intensive interest in exploiting new spectrum bands
for wireless communications. Millimeter wave (mmWave)
wireless communications, operating in the frequency bands
from 30-300 GHz, have been demonstrated as a promising
candidate to fundamentally solve the spectrum congestion
problem [1]-[3].
However, challenges always come along with opportunities.
MmWave communications still need to overcome several technical difficulties before real-world deployment. As a negative
result of the ten-fold increase of the carrier frequency, the
propagation loss in mmWave bands is much higher than
that of conventional frequency bands (e.g. 2.4 GHz) due to
atmospheric absorption, rain attenuation, and low penetration
[4]. From a positive perspective, the smaller wavelength of
mmWave signals allows a large antenna array to be packed in
a small physical dimension [5]. With the aid of pre/post-coding
techniques in massive multiple-input multiple-output (MIMO)
systems, the large antenna array can provide sufficient beamforming gain to overcome the severe propagation loss of
mmWave channels. It also enables simultaneous transmission
of multiple data streams resulting in significant improvements
to spectral efficiency.
For MIMO systems operating in conventional cellular frequency bands, the full-digital precoder and combiner are
completely realized in the digital domain by adjusting both
the magnitude and phase of the baseband signals. However,
these conventional full-digital schemes require a large number of expensive and energy-intensive radio frequency (RF)
chains, analog-to-digital converters (ADCs), and digital-toanalog converters (DACs). Since mmWave communication
systems operate at much higher carrier frequencies and wider
bandwidths, the enormous cost and power consumption of the
required RF chains and ADCs/DACs make the adoption of
full-digital precoding and combining schemes impractical for
mmWave systems. Recently, economical and energy-efficient
analog/digital hybrid precoders and combiners have been
advocated as a promising approach to tackle this issue. The
hybrid precoding approaches adopt a large number of phase
shifters (PSs) to implement high-dimensional analog precoders
to compensate for the severe path-loss at mmWave bands,
and a small number of RF chains and DACs to realize lowdimensional digital precoders to provide the necessary flexibility to perform advanced multiplexing/multiuser techniques.
The investigation of hybrid precoder and combiner design
has attracted extensive attention in recent years because of
its potential energy efficiency for mmWave MIMO communications. The major challenges in designing hybrid precoders
are the practical constraints associated with the analog components, such as the requirement that the analog precoding
be implemented with constant modulus PSs. Thus, hybrid
precoder design typically requires the solution of various matrix factorization problems with constant modulus constraints.
In particular, a popular solution to maximize the spectral
efficiency of point-to-point transmission is to minimize the
Euclidean distance between the hybrid precoder and the fulldigital precoder [6]-[10]. Hybrid precoder design for partiallyconnected architectures are also studied in [11]-[13]. Due to
the special characteristics of mmWave channels, codebookbased hybrid precoder designs are commonly proposed [14][18], in which the columns of the analog precoder are selected
from certain candidate vectors, such as array response vectors
of the channel and discrete Fourier transform (DFT) beamformers. Extensions of the hybrid beamformer design to multiuser mmWave MIMO systems have also been investigated in
[19]-[27].
The aforementioned existing hybrid precoder and combiner
designs generally assume that infinite or high-resolution PSs
are used for implementing the analog beamformers in order
to achieve satisfactory performance close to the full-digital
scheme. However, implementing infinite/high-resolution PSs
at mmWave frequencies would significantly increase the energy consumption and complexity of the required hardware
circuits [28], [29]. Obviously, it is impractical to employ
infinite/high-resolution PSs for mmWave systems and realworld analog beamformers will be implemented with lowresolution PSs. Consequently, an important research direction
is the exploration of signal processing techniques for hybrid
analog/digital architectures that can mitigate the loss of beamforming accuracy due to the low-resolution PSs.
A straightforward approach to obtain the finite-resolution
beamformer is to design the infinite-resolution analog beamformer first, and then directly quantize each phase term to
a finite set [30]. However, this solution becomes inefficient
when the PSs have very low resolution. An alternative solution for hybrid beamforming with finite-resolution PSs is
codebook-based design [14]-[18]. However, for low-resolution
PSs, the size of the codebook is very small and the resulting
performance is not satisfactory. In [31], [32], Sohrabi and
Yu proposed to iteratively design the low-resolution hybrid
precoder to maximize the spectral efficiency. However, the
performance of this algorithm often suffers when one-bit
quantized PSs are applied.
In this paper, we first consider the problem of designing
hybrid precoders and combiners with low-resolution PSs for
a point-to-point mmWave MIMO system. The objective of
the proposed algorithm is to minimize the performance loss
caused by the low-resolution PSs while maintaining a low
computational complexity. To achieve this goal, we propose
to successively design the low-resolution analog precoder and
combiner pair for each data stream, aiming at conditionally
maximizing the spectral efficiency. An iterative phase match-
ing algorithm is introduced to implement the low-resolution
analog precoder and combiner pair. Then, the digital precoder
and combiner are computed based on the obtained effective
baseband channel to further enhance the spectral efficiency.
Note that the power consumption and cost of the PS are
proportional to its resolution. For example, a 4-bit (i.e. 22.5โฆ)
resolution PS at mmWave frequencies requires 45-106 mW,
while a 3-bit (i.e. 45โฆ ) resolution PS needs only 15 mW
[29]. In an effort to achieve maximum hardware efficiency,
we also investigate the design of hybrid beamformers with
one-bit resolution (binary) PSs. Inspired by the findings in
[33], we present a binary analog precoder and combiner
optimization algorithm under a rank-1 approximation of the
interference-included equivalent channel. This algorithm has
quadratic complexity in the number of antennas and can
achieve almost the same performance as the optimal exhaustive
search method. Finally, our investigation of low-resolution
hybrid precoders and combiners is extended to multiuser
mmWave MIMO systems. Numerical results in the simulation
section demonstrate that the proposed algorithms can offer
a performance improvement compared with existing lowresolution hybrid beamforming schemes, especially for the
one-bit resolution PS scenario.
Notation: The following notation is used throughout this
paper. Boldface lower-case and upper-case letters indicate column vectors and matrices, respectively. (ยท)T and (ยท)H denote
the transpose and transpose-conjugate operations, respectively.
E{ยท} represents statistical expectation. Re{ยท} extracts the real
part of a complex number; sign(ยท) denotes the sign operator;
angle{ยท} represents the phase of a complex number. IL
indicates an L ร L identity matrix. C denotes the set of
complex numbers. |A| denotes the determinant of matrix A.
|A| denotes the cardinality of set A. |a| and kak are the
magnitude and norm of a scalar a and vector a, respectively.
kAkF denotes the Frobenius norm of matrix A. Finally, we
adopt a Matlab-like matrix indexing notation: A(:, i) denotes
the i-th column of matrix A; A(i, j) denotes the element of
the i-th row and the j-th column of matrix A; a(i) denotes
the i-th element of vector a.
II. S YSTEM M ODEL AND P ROBLEM F ORMULATION
A. Point-to-Point mmWave MIMO System Model
We first consider a point-to-point mmWave MIMO system
using a hybrid precoder and combiner with low-resolution
PSs, as illustrated in Fig. 1. The transmitter employs Nt
antennas and NtRF RF chains to simultaneously transmit
Ns data streams to the receiver which is equipped with Nr
antennas and NrRF RF chains. To ensure the efficiency of the
mmWave communication with a limited number of RF chains,
the number of data streams and the number of RF chains are
constrained as Ns = NtRF = NrRF .
The transmitted symbols are first processed by a baseband
RF
digital precoder FBB โ CNt รNs , then up-converted to the
RF
RF domain via Nt RF chains before being precoded with
an analog precoder FRF of dimension Nt ร NtRF . While
the baseband digital precoder FBB enables both amplitude
and phase modifications, the elements of the analog precoder
Fig. 1.
The point-to-point mmWave MIMO system using hybrid precoder and combiner.
FRF , which are implemented by the PSs, have a constant
amplitude โ1N and quantized phases: FRF (i, j) = โ1N ejฯi,j ,
t
t
in which the phase ฯi,j is quantized as ฯi,j โ B , { 2ฯb
2B | b =
1, 2, . . . , 2B }, and B is the number of bits to control the phase.
We denote the constraint set of the analog precoder as follows:
2ฯb
FRF (i, j) โ F , { โ1N ej 2B | b = 1, 2, . . . , 2B }. Obviously,
t
a larger number of bits B leads to finer resolution for the PSs
and potentially better performance, but also results in higher
hardware complexity and power consumption.
The discrete-time transmitted signal can be written in the
following form
โ
(1)
x = P FRF FBB s
where s is the Ns ร 1 symbol vector, E{ssH } = N1s INs , P
represents transmit power and this power constraint is enforced
by normalizing FBB such that kFRF FBB k2F = Ns .
We consider a narrow-band slow-fading propagation channel, which yields the following received signal
y
=
=
Hx + n
โ
P HFRF FBB s + n
R = log2
INs +
P โ1 H
H
R WBB WRF
HFRF FBB ร
Ns n
!
H
H
FH
BB FRF H WRF WBB
where WRF is the Nr ร NrRF analog combiner whose
elements have the same constraint as FRF , i.e. WRF (i, j) =
โ1 ejฯi,j , ฯi,j
โ B and thus WRF (i, j) โ W ,
N
,
(4)
H
H
WRF
WRF WBB is the noise covariwhere Rn , ฯn2 WBB
ance matrix after combining. We aim to jointly design the
digital beamformers FBB , WBB as well as the low-resolution
analog beamformers FRF , WRF to maximize the spectral
efficiency:
o
n
โ
โ
= arg max R
, WBB
FโRF , FโBB , WRF
s. t.
(2)
where y is the Nr ร 1 received signal vector, H is the Nr ร
Nt channel matrix, and n โผ CN (0, ฯ 2 INr ) is the complex
Gaussian noise vector corrupting the received signal.
The receiver employs an analog combiner implemented
by the PSs and a digital combiner using NrRF RF chains
to process the received signal. The signal after the spatial
processing has the form
โ
H
H
H
H
b
WRF
HFRF FBB s + WBB
WRF
n
(3)
s = P WBB
r
hardware constraint, we aim to jointly design the hybrid
precoder and combiner for a mmWave MIMO system. When
Gaussian symbols are transmitted over the mmWave MIMO
channel, the achievable spectral efficiency is given by
FRF (i, j) โ F , โi, j,
WRF (i, j) โ W, โi, j,
kFRF FBB k2F
(5)
= Ns ,
kWRF WBB k2F
= Ns .
Obviously, the optimization problem (5) is a non-convex NPhard problem. In the next section, we attempt to decompose
the original problem into a series of sub-problems and seek
a sub-optimal solution with low-complexity and satisfactory
performance.
III. L OW-R ESOLUTION H YBRID P RECODER
C OMBINER D ESIGN
AND
2ฯb
{ โ1N ej 2B | b = 1, 2, . . . , 2B }, WBB is the NrRF รNs digital
r
baseband combiner and the combiner matrices are normalized
such that kWRF WBB k2F = Ns .
B. Problem Formulation
We consider the practical and hardware-efficient scenario
in which the PSs have very low-resolution (e.g. B = 1, 2)
to reduce the power consumption and complexity. Under this
To simplify the joint hybrid precoder and combiner design,
the objective problem is decomposed into two separate optimizations. We first focus on the joint design of the analog
precoder FRF and combiner WRF . Then, having the effective
baseband channel associated with the obtained optimal analog
precoder and combiner, the digital precoder FBB and combiner WBB are computed to further maximize the spectral
efficiency.
A. Low-Resolution Analog Precoder and Combiner Design
We observe that under the assumption of high signal-tonoise-ratio (SNR), the achievable spectral efficiency in (4) can
be approximated as
R โ log2
P โ1 H
H
R WBB WRF
HFRF FBB ร
Ns n
!
H
H
FH
BB FRF H WRF WBB
.
(6)
While the per-antenna SNR in mmWave systems is typically
low, the post-combining SNR should be high enough to justify
this approximation. In addition, it has been verified in [32]
that for large-scale MIMO systems, the optimal analog beamformers are approximately orthogonal, i.e. FH
RF FRF โ INtRF .
RF
2
=
โ
ฮถ
I
This enables us to assume FBB FH
N
s when Nt
BB
2
Ns , where ฮถ is a normalization factor. Similarly, we have
H
H
H
WRF
WRF WBB โ INs .
WBB WBB
โ ฮพ 2 INs and WBB
2
2 2
Let ฮณ , ฮถ ฮพ , then (6) can be further simplified as
!
P ฮณ2
H
R โ log2
(7)
WH HFRF FH
RF H WRF
Ns ฯ 2 RF
!
P ฮณ2
(a)
H
(8)
+ 2 ร log2 WRF HFRF
= Ns log2
Ns ฯ 2
where (a) follows since |XY| = |X||Y| when X and Y
are both square matrices. Therefore, the analog precoder and
combiner design with low-resolution PSs can be approximately
reformulated as:
โ
โ
H
{FRF , WRF } = arg max log2 WRF HFRF
s. t. FRF (i, j) โ F , โi, j,
WRF (i, j) โ W, โi, j.
(9)
Unfortunately, the optimization problem (9) is still NP-hard
RF
RF
and has exponential complexity O(|F |Nt Nt |W|Nr Nr ).
Therefore, we propose to further decompose this difficult
optimization problem into a series of sub-problems, in which
each transmit/receive RF chain pair is considered one by
one and the analog precoder and combiner for each pair are
successively designed.
In particular, we define the singular value decomposition
(SVD) of H as
H = UฮฃVH
(10)
where U is an Nr รNr unitary matrix, V is an Nt รNt unitary
matrix, and ฮฃ is a rectangular diagonal matrix of singular
values. Due to the sparse nature of the mmWave channel, the
matrix H is typically low rank. In particular, the effective rank
of the channel serves as an upper bound for the number of data
streams Ns that the channel can support. Thus, we assume that
the channel H can be well approximated by retaining only the
bฮฃ
bV
b H , where U
b , U(:, 1 :
Ns strongest components H โ U
b
b
Ns ), ฮฃ , ฮฃ(1 : Ns , 1 : Ns ), and V , V(:, 1 : Ns ). Then,
the objective in (9) can be converted to
H b b bH
H
โ log2 WRF UฮฃV FRF .(11)
log2 WRF HFRF
Next, we write the analog precoding and combining
matrices as FRF , [fRF,1 . . . fRF,Ns ] and WRF ,
[wRF,1 . . . wRF,Ns ], respectively, where fRF,l and wRF,l ,
l = 1, . . . , Ns , are the analog precoder and combiner pair
for the l-th data stream. Furthermore, we denote FRF,\l
as the precoding matrix excluding the l-th precoder vector
fRF,l and WRF,\l as the combining matrix excluding the lth combiner vector wRF,l . Then, the formulation (11) can be
further transformed to (12)-(16), which are presented at the top
of following page, where ฮฑ is a very small scalar to assure
invertibility. Thus, the objective in (9) can be reformulated as:
log2
H
WRF
HFRF
โ log2
+log2
H
HFRF,\l
WRF,\l
H
wRF,l
Ql fRF,l
!
!
(17)
where we define the interference-included channel matrix Ql
as
H
b โ1 ฮฃ
bV
b H.
b bH
b
Ql , U(ฮฑI
Ns + ฮฃV FRF,\l WRF,\l U)
(18)
According to (17), if FRF,\l and WRF,\l are known, the
problem (9) can be reformulated as finding a corresponding
precoder fRF,l and combiner wRF,l pair to conditionally
maximize the achievable spectral efficiency:
โ
โ
H
fRF ,l , wRF
,l = arg max wRF,l Ql fRF,l
s. t. fRF ,l (i) โ F , i = 1, . . . , Nt ,
(19)
wRF ,l (j) โ W, j = 1, . . . , Nr .
This motivates us to propose an iterative algorithm, which
starts with appropriate initial RF precoding and combining
matrices then successively designs fRF ,l and wRF ,l according
to (19) with an updated Ql as in (18) until the algorithm
converges.
The complexity of obtaining an optimal solution to (19) for
each iteration is now reduced to O(|F |Nt |W|Nr ), which is still
too high. To practically solve the problem (19), in what follows
we present an iterative phase matching algorithm, which
searches the conditionally optimal phase of each element of
the analog precoder fRF ,l and combiner wRF ,l . Specifically,
we first design the analog precoder fRF ,l assuming the analog
combiner wRF,l is fixed. Let ฯl,i be the phase of the i-th
element of the analog precoder fRF ,l and let ฯl,j be the
phase of the j-th element of the analog combiner wRF,l .
If we temporarily remove the discrete phase constraint, the
optimal continuous phase ฯฬl,i of the i-th element of the analog
precoder fRF,l is given by the following proposition, whose
proof is provided in Appendix A.
Proposition 1: Given the phases ฯl,j of the analog combiner
wRF,l and the phases ฯl,u , u 6= i, of the analog precoder fRF,l ,
the optimal continuous phase ฯฬl,i of the i-th element of analog
log2
H b b bH
WRF
UฮฃV FRF
= log 2
โ log 2
= log 2
= log 2
precoder fRF,l is
ฯฬl,i
bV
b H FRF,\l
ฮฃ
H b
bV
b H FRF WRF
ฮฃ
U
!
H
b
fRF,l WRF,\l wRF,l U = log2
= log2
H
bV
b H FRF,\lWRF,\l
b
ฮฃ
U
H
bV
b H FRF,\l WRF,\l
b
ฮฃ
U
H
bฮฃ
bV
b H FRF,\l
WRF,\l
U
(12)
H
H
bV
b H FRF,\l WRF,\l
b +ฮฃ
bV
b H fRF,l wRF,l
b
ฮฃ
U
U
h
โ1
i
H
H
bV
b H FRF,\l WRF,\l
b
bV
b H fRF,l wRF,l
b
INs + ฮฑINs + ฮฃ
U
ฮฃ
U
!
!
+ log 2
+ log 2
!
h
โ1
i
H
H
bV
b H FRF,\lWRF,\l
b
bV
b H fRF,l wRF,l
b
INs + ฮฑINs + ฮฃ
U
ฮฃ
U
h
โ1
i
H
H
b ฮฑINs + ฮฃ
bV
b H fRF,l
bV
b H FRF,\l WRF,\l
b
1 + wRF,l
U
ฮฃ
U
๏ฃผ
Nt
๏ฃฝ
X
ejฯl,j
ejฯl,u Ql (j, u)
= angle
๏ฃพ
๏ฃณ
j=1
u6=i
๏ฃผ
๏ฃฑ
Nr
๏ฃฝ
๏ฃฒX
ejฯl,j Ql (j, i) . (20)
โangle
๏ฃพ
๏ฃณ
๏ฃฑ
Nr
๏ฃฒX
j=1
Then, after finding the optimal continuous phase ฯฬl,i by
(20), we reconsider the discrete phase constraint and find the
optimal low-resolution phase ฯl,i by quantization:
ฯl,i = arg min ฯฬl,i โ ฯฬl,i .
(21)
ฯฬl,i โB
Similarly, if the analog precoder fRF,l is determined, the
optimal continuous phase ฯฬl,j of the j-th element of wRF,l is
๏ฃผ
๏ฃฑ
Nt
Nt
๏ฃฝ
๏ฃฒX
X
ejฯl,i
ejฯl,u Ql (u, i)
ฯฬl,j = angle
๏ฃพ
๏ฃณ
i=1
u6=j
)
(N
t
X
jฯl,i
e
Ql (j, i) , (22)
โangle
!
!
(13)
(14)
!
(15)
(16)
Algorithm 1 Iterative Phase Matching Algorithm for LowResolution Analog Precoder and Combiner Design
Input: F , W, H.
โ
Output: FโRF and WRF
.
โ
โ
1: Initialize FRF = 0, WRF
= 0.
2: for l = 1 : Ns do
โ
3:
Obtain FRF,\l from FโRF and WRF,\l from WRF
.
โ1 b b H
H
H
b
b
b
b
4:
Update Ql =U(ฮฑINs+ฮฃV FRF,\l WRF,\l U) ฮฃV .
5:
6:
7:
8:
9:
10:
11:
12:
13:
14:
15:
16:
while no convergence of ฯl,i and ฯl,j do
for i = 1 : Nt do
Obtain quantized phase ฯl,i by (20) and (21).
end for
for j = 1 : Nr do
Obtain quantized phase ฯl,j by (22) and (23).
end for
end while
โ
โ
Construct fRF,l
by ฯl,i and wRF,l
by ฯl,j .
end for
โ
โ
โ
and WRF
by wRF,l
.
Construct FโRF by fRF,l
โ
โ
Goto Step 2 until convergence of FRF and WRF
.
i=1
and the optimal low-resolution phase ฯl,j is obtained by
ฯl,j = arg min ฯฬl,j โ ฯฬl,j .
ฯฬl,j โB
(23)
Motivated by (20)-(23), the iterative procedure to design the
precoder fRF ,l and combiner wRF ,l as in (19) is straightforward. With appropriate initial ฯl,i , ฯl,j , we design the precoder
fRF ,l by finding the conditionally optimal phases ฯl,i as in
(20) and (21). Then, with the obtained ฯl,i , i = 1, . . . , Nt ,
we design the combiner wRF ,l by finding the conditionally
optimal phases ฯl,j as in (22) and (23). We alternate the
designs of fRF ,l and wRF ,l iteratively until the obtained
phase of each element of fRF ,l and wRF ,l does not change
and the convergence is achieved. Note that since in each
precoder and combiner design step, the objective function of
(19) is monotonically non-decreasing, and thus our proposed
algorithm is guaranteed to converge to at least a locally optimal
solution.
We summarize the proposed joint low-resolution analog
precoder and combiner design in Algorithm 1.
B. Digital Precoder and Combiner Design
After all analog precoder-combiner pairs have been detere as
mined, we can obtain the effective baseband channel H
e , (Wโ )H HFโ ,
H
RF
RF
(24)
e =U
eฮฃ
eV
eH
H
(25)
e
FโBB = V,
โ
e
W
= U.
(26)
โ
โ
โ
where FโRF
,
[fRF,1
, . . . , fRF,N
] and WRF
,
s
โ
โ
[wRF,1 , . . . , wRF,Ns ]. For the baseband precoder and
combiner design, we define the SVD of the effective
e as
baseband channel H
e and V
e are Ns ร Ns unitary matrices, ฮฃ
e is an
where U
Ns ร Ns diagonal matrix of singular values. Then, to further
enhance the spectral efficiency, an SVD-based baseband digital
precoder and combiner are employed:
BB
(27)
Finally, the baseband precoder and combiner are normalized
FโBB =
โ
WBB
=
โ
N s Fโ
BB
โ
kFโ
RF FBB kF
โ
โ
Ns WBB
โ Wโ
kWRF
BB kF
,
(28)
.
Now, the joint optimization problem (33) can be decoupled
into individually designing the analog precoder fRF ,l and
combiner wRF ,l :
(29)
โ
fRF
,l = arg
max
fRF ,l โ โ1
Nt
IV. O NE -B IT R ESOLUTION A NALOG P RECODER
C OMBINER D ESIGN
AND
โ
wRF
,l = arg
{ยฑ1}Nt
max
1
wRF ,l โ โN
{ยฑ1}Nr
H
fRF,l
gl,1 ,
H
wRF,l
pl,1 .
(34)
(35)
r
In the previous section, we proposed a novel hybrid beamformer design for maximizing the spectral efficiency of a
mmWave MIMO system, in which the analog precoder and
combiner are implemented with low-resolution PSs. In order
to achieve maximum hardware efficiency, in this section we
focus on the design of analog precoders and combiners using
โone-bitโ resolution (binary) PSs, which can maximally reduce
the power consumption and simplify the hardware complexity.
Although the iterative phase matching algorithm proposed in
the previous section can also be applied, a simpler approach
is possible in the one-bit case. Therefore, in this section,
we present an efficient one-bit resolution analog beamformer
design, which can achieve good performance with much lower
complexity.
We follow the procedure of the hybrid beamforming design proposed in the previous section, but only modify the
optimization problem (19), which attempts to determine the
l-th analog precoder and combiner pair. Particularly, we reformulate this analog beamformer design problem (19) with the
constraint of one-bit resolution PSs as
โ
H
โ
wRF,l
Ql fRF,l .
max
fRF ,l , wRF
,l = arg
fRF ,l โ โ1 {ยฑ1}Nt
Nt
1
wRF ,l โ โN
{ยฑ1}Nr
r
(30)
The optimization problem (30) can be solved through exhaustive search with exponential complexity O(2Nt Nr ), which
would not be possible with large antenna arrays. Therefore,
in the following we attempt to develop an efficient one-bit
resolution beamformer design with polynomial complexity in
the number of antennas.
We first define the SVD of Ql as
Ql =
Ns
X
H
ฮปl,i pl,i gl,i
,
(31)
i=1
where pl,i and gl,i are the i-th left and right singular vectors
of Ql , respectively, and ฮปl,i is the i-th largest singular value,
ฮปl,1 โฅ ฮปl,2 โฅ . . . โฅ ฮปl,Ns . Then, the objective in (30) can be
rewritten as
H
Ql fRF,l | =
|wRF,l
Ns
X
H
H
ฮปl,i wRF,l
pl,i gl,i
fRF,l .
(32)
i=1
If we utilize a rank-1 approximation by keeping only the
H
strongest term, i.e. Ql โ ฮปl,1 pl,1 gl,1
, the optimization function in (30) can be approximated by
โ
โ
H
H
fRF ,l , wRF
max
wRF,l
pl,1 gl,1
fRF,l .
,l = arg
fRF ,l โ โ1
Nt
1
wRF ,l โ โN
r
{ยฑ1}Nt
{ยฑ1}Nr
(33)
These two optimization problems (34) and (35) require only
the singular vectors pl,1 and gl,1 associated with the largest
singular value, which can be quickly obtained by the power
iteration algorithm [34] instead of the complete SVD calculation. However, solving (34) and (35) by exhaustive search still
has exponential complexity in the number of antennas. In order
to further reduce the complexity without a significant loss of
performance, we propose to construct a smaller dimension candidate beamformer set, from which the optimal beamformer
can be found with linear complexity. In the following, we
present this algorithm for the precoder design (34) as an
example, while the combiner design (35) follows the same
procedure.
We introduce an auxiliary variable ฯ โ [โฯ, ฯ) and we
reformulate the optimization problem (34) as:
o
n
o
n
H
โ
(36)
Re fRF,l
gl,1 eโjฯ
= arg
max
ฯโ , fRF,l
ฯโ[โฯ,ฯ)
fRF ,l โ โ1 {ยฑ1}Nt
Nt
= arg
max
Nt
P
ฯโ[โฯ,ฯ)
i=1
fRF ,l โ โ1 {ยฑ1}Nt
Nt
fRF,l (i)|gl,1 (i)| cos(ฯ โ ฯi ) (37)
where ฯi denotes the phase of gl,1 (i). Obviously, given
any ฯ โ [โฯ, ฯ), the corresponding binary precoder that
maximizes (37) is
1
fRF,l (i) = โ sign (cos (ฯ โ ฯi )) , i = 1, . . . , Nt .
Nt
(38)
With the conditionally optimal fRF,l for any given ฯ shown
in (38), we will now show that we can always construct a set
of Nt candidate binary precoders Fl , {fl,1 , . . . , fl,Nt } and
โ
guarantee fRF
,l โ Fl . Then, the maximization in (34) can be
carried out over a set of only Nt candidates without loss of
performance.
We first define the angles ฯbi , i = 1, . . . , Nt , as
๏ฃฑ
ฯ 3ฯ
๏ฃด
๏ฃฒ ฯi โ ฯ, if ฯi โ
,
,
2 2
ฯbi ,
(39)
h
๏ฃด
ฯ ฯ
๏ฃณฯ ,
,
if ฯi โ โ ,
i
2 2
so that ฯbi โ [โ ฯ2 , ฯ2 ). Then, we map the angles ฯbi to ฯei , i =
1, . . . , Nt , which are rearranged in ascending order, i.e. ฯe1 โค
ฯe2 โค . . . โค ฯeNt . Because of the periodicity of the cosine
function, the maximization problem (37) with respect to ฯ can
be carried out over any interval of length ฯ. If we construct Nt
non-overlapping sub-intervals [ฯe1 โ ฯ2 , ฯe2 โ ฯ2 ), [ฯe2 โ ฯ2 , ฯe3 โ
ฯ e
ฯ
ฯ
โ
e
2 ), . . . , [ฯNt โ 2 , ฯ1 + 2 ), then the optimal ฯ must be located
in one of Nt sub-intervals since the full interval is [ฯe1 โ
ฯ e
2 , ฯ1
+ ฯ2 ) of length ฯ. Therefore, the optimization problem
(37) can be solved by examining each sub-interval separately.
Assuming the optimal ฯโ is in the k-th sub-interval, the
corresponding optimal
binary
can be obtained by (38)
precoder
as e
fl,k (i) = โ1N sign cos ฯโ โ ฯei , i = 1, . . . , Nt , and
t
has the form
1
e
. . 1} โ1 . . . โ 1]T .
(40)
fl,k = โ [1| .{z
| {z }
Nt
k
Nt โk
After that, given the inverse sorting that maps ฯei to ฯbi , we
rearrange the corresponding elements of e
fl,k and obtain b
fl,k .
Then, based on the relationship between ฯi and ฯbi defined in
(39), we can achieve the conditionally optimal precoder fl,k
by
๏ฃฑ
ฯ 3ฯ
๏ฃด
b
๏ฃฒ โ fl,k (i), if ฯi โ
, i = 1, . . . , Nt ,
,
2 2
fl,k (i) ,
h
ฯ ฯ
๏ฃด
๏ฃณ b
fl,k (i), if ฯi โ โ ,
, i = 1, . . . , Nt ,
2 2
(41)
for the case that ฯโ is in the k-th sub-interval.
Since the optimal ฯโ must be located in one of Nt subintervals, we can obtain Nt conditionally optimal precoders
by examining all Nt sub-intervals and construct a candidate
precoder set Fl as
Fl , {fl,1 , . . . , fl,Nt },
(42)
โ
which must contain the optimal precoder fRF,l
. Therefore,
without loss of performance, the problem in (34) can be
transformed to an equivalent maximization task over only the
set Fl
H
โ
fRF,l
gl,1 ,
(43)
fRF
,l = arg max
fRF ,l โFl
which has linear complexity O(Nt ). Similarly, we can also
construct a candidate analog combiner set Wl and obtain
โ
wRF
,l by the same procedure.
The rank-1 solution returned by (43) is based on the rank-1
approximation of the interference-included equivalent channel
Ql . The approximation of Ql may cause a performance degradation when we revisit the original problem (30). Therefore,
in order to enhance the performance, we propose to jointly
select the precoder and combiner over candidate sets Fl and
Wl as
n
o
โ
โ
H
fRF
,
w
(44)
wRF,l
Ql fRF,l
,l
RF ,l = arg max
fRF ,l โFl
wRF ,l โWl
which may return the rank-1 or a better solution with quadratic
complexity O(Nt Nr ). This low-complexity analog beamformer design with one-bit resolution PSs is summarized in
Algorithm 2.
V. H YBRID P RECODER AND C OMBINER D ESIGN
M ULTIUSER MM WAVE MIMO S YSTEMS
FOR
In this section, we consider a mmWave multiuser MIMO
uplink system and extend the low-resolution hybrid precoder
and combiner designs proposed in the previous sections to the
multiuser system.
Algorithm 2 One-Bit Resolution Analog Beamformer Design
Input: Ql .
โ
โ
Output: fRF
,l and wRF ,l .
1: Calculate pl,1 and gl,1 by an SVD of Ql .
bi , i = 1, . . . , Nt , by (39).
2: Define the angles ฯ
b
e
3: Map ฯi to ฯi , i = 1, . . . , Nt , in an ascending order.
4: for k = 1 : Nt do
5:
Obtain e
fl,k by (40).
6:
Obtain b
fl,k from e
fl,k based on inverse mapping from ฯei
b
to ฯi , i = 1, . . . , Nt .
7:
Obtain fl,k from b
fl,k by (41).
8: end for
9: Construct Fl = {fl,1 , . . . , fl,Nt }.
10: Construct Wl by a similar procedure as Steps 2-9.
โ
โ
11: Find the optimal fRF
,l and wRF ,l by (44).
A. System Model and Problem Formulation
We consider a multiuser mmWave MIMO uplink system as
presented in Fig. 2, where a base-station (BS) is equipped with
Nr antennas and NRF RF chains and simultaneously serves
K mobile users. Due to power consumption and hardware
limitations, each mobile user has Nt antennas and a single RF
chain to transmit only one data stream to the BS. We further
assume the number of RF chains at the BS is equal to the
number of users, i.e. NRF = K.
Let fRF,k be the analog precoder of the k-th user, where
each element of fRF,k has a constant magnitude โ1N and lowt
resolution discrete phases, i.e. fRF,k (i) โ F , โi = 1, . . . , Nt .
The transmitted signal of the k-th user after precoding can be
formulated as
p
xk = Pk fRF,k sk
(45)
2
where sk is the symbol of the k-th user, E{|sk | } = 1, and
Pk is the k-th userโs transmit power.
Let Hk โ CNr รNt , k = 1, . . . , K, denote the uplink
channel from the k-th user to the BS. The received signal
at the BS can be written as
r=
K p
X
Pk Hk fRF,k sk + n
(46)
k=1
where n โผ CN (0, ฯ 2 INr ) is complex Gaussian noise. The
BS first applies an Nr ร K analog combining matrix WRF ,
[wRF ,1 . . . wRF ,K ] to process the received signal, in which the
analog combiner wRF,k corresponding to the k-th user is also
implemented by low-resolution PSs, i.e. wRF ,k (j) โ W, j =
1, . . . , Nr . Then, a baseband digital combiner wBB,k โ CKร1
is employed to retrieve the information of the k-th user. Let
wk , WRF wBB,k denote the hybrid combiner corresponding
to the k-th user. After the combining process at the BS, the
estimated symbol of the k-th user can be expressed as
sฬk =
K p
X
p
Pk wkH Hk fRF,k sk + wkH
Pi Hi fRF,i si + wkH n.
i=1
i6=k
(47)
Fig. 2.
The multiuser mmWave MIMO system using hybrid precoder and combiner.
Given the received signal at the BS in (47), the signal-tointerference-plus-noise ratio (SINR) of the k-th user can be
expressed as
โ
| Pk wkH Hk fRF,k |2
ฮณk = K
โ
P
(48)
| Pi wkH Hi fRF,i |2 +ฯ 2 k wk k2
i=1,i6=k
and the achievable sum-rate of the multiuser uplink system is
Ru =
K
X
log(1 + ฮณk ).
(49)
k=1
We aim to jointly design the analog precoders and combiners
implemented by low-resolution PSs as well as the digital
combiners to maximize the sum-rate of the uplink multiuser
system:
n
โ
โ
โ
wRF
,k , wBB,k , fRF,k
s. t.
K
k=1
o
= arg max
fRF,k (i) โ F , โk, i,
K
X
log (1 + ฮณk )
k=1
wRF ,k (j) โ W, โk, j.
(50)
B. Low-Resolution Hybrid Precoder and Combiner Design
Obviously, the optimization problem (50) cannot be directly solved. Thus, we adopt an approach similar to [26]
and propose to successively design the low-resolution analog
beamformer pair for each user, aiming at enhancing the
channel gain as well as suppressing the inter-user interference.
Then, the baseband combiner at the BS is calculated to further
mitigate the interference and maximize the sum-rate.
In particular, for the first user, the analog precoder and
combiner pair is designed to maximize the corresponding
channel gain, which can be formulated as follows:
โ
H
โ
wRF ,1 , fRF
,1 = arg max wRF ,1 H1 fRF ,1
s. t.
fRF ,1 (i) โ F , i = 1, . . . , Nt ,
wRF ,1 (j) โ W, j = 1, . . . , Nr .
(51)
This analog precoder and combiner design problem can be
efficiently solved by the algorithm presented in Sec. III-A
when low-resolution PSs are utilized, or the algorithm proposed in Sec. IV if only one-bit resolution PSs are available.
Then, the analog precoders fRF,k and combiners wRF ,k ,
k = 2, 3, . . . , K, for the remaining K โ 1 users are successively designed by an iterative procedure. In each iteration, we
attempt to find the analog beamformer pair that suppresses the
interference from the users whose analog beamformers have
already been determined. To achieve this goal, the channel of
the user whose combiner is to be calculated is projected onto
the space orthogonal to the collection of previously designed
analog combiners. This approach leads to orthogonal analog
combiners that suppress the inter-user interference.
Specifically, to design the k-th userโs analog beamformer
pair, we first extract the orthonormal components di of the preโ
viously determined analog combiners wRF
,i , i = 1, . . . , k โ 1
by the Gram-Schmidt procedure:
โ
qi = wRF
,i โ
iโ1
X
โ
dH
j wRF ,i dj ,
(52)
j=1
di = qi /kqi k.
(53)
โ
โ
Note that d1 = wRF
,1 and wRF ,1 is the analog combiner
calculated for the first user. Then, the combiner components
are removed from the k-th userโs channel to obtain the
b k as
modified channel H
bk =
H
INr โ
kโ1
X
i=1
di dH
i
!
Hk .
(54)
b k , the analog beamFinally, based on the modified channel H
former pair for the k-th user is found by solving the following
optimization using the algorithms proposed in the previous
s. t.
fRF,k (i) โ F , i = 1, . . . , Nt ,
120
(55)
wRF ,k (j) โ W, j = 1, . . . , Nr .
After finding the analog beamformers for all users, the
effective baseband
channel for each user can be obtained
โ
H
โ
โ
as hek , Pk (WRF
) Hk fRF
,k . Then, a minimum mean
square error (MMSE) baseband digital combiner for the k-th
user is employed to further suppress the interference:
h
iโ1
โ
โ
โ
wBB,k
= He (He )H + ฯ 2 (WRF
)H WRF
hek , (56)
100
where He , [he1 , . . . , heK ]. The proposed low-resolution
hybrid precoder and combiner design for multiuser mmWave
systems is summarized in Algorithm 3.
wRF ,1 (i)โW
fRF,1 (j)โF
3:
4:
โ
d1 = wRF
,1 .
for k = 2: K do
kโ1
P
H
b
di di H k .
Hk = INr โ
i=1
5:
โ
โ
Obtain wRF
,k and fRF ,k for user-k by solving
โ
โ
H
b
max |wRF
wRF ,k , fRF
,k = arg
,k Hk fRF,k |.
wRF ,k (i)โW
fRF,k (j)โF
6:
7:
8:
9:
โ
qk = wRF
,k โ
kโ1
P
i=1
โ
dH
i wRF ,k di ;
dk = qk /kqk k.
end for
โ
Obtain digital combiners wBB,k
, k = 1, . . . , K, by
h
iโ1
H
โ
โ
โ
) WRF
wBB,k
= He (He )H + ฯ 2 (WRF
hek .
VI. S IMULATION R ESULTS
In this section, we provide simulation results for the proposed joint hybrid precoder and combiner designs with lowresolution PSs for point-to-point mmWave systems as well as
multiuser mmWave systems. MmWave channels are expected
to be sparse and have a limited number of propagation paths.
In the simulations, we adopt a geometric channel model with
L paths [32]. In particular, the discrete-time narrow-band
mmWave channel H is formulated as
r
L
Nt Nr X
H=
ฮฑi ar (ฮธir )at (ฮธit )H
(57)
L i=1
90
80
70
60
102
50
100
40
98
30
96
34
20
0
5
10
15
20
34.5
25
35
30
35.5
35
40
SNR (dB)
Fig. 3. Spectral efficiency versus SNR (Nt = 64, Nr = 64, NtRF =
NrRF = 6, Ns = 6).
65
60
Spectral Efficiency (b/s/Hz)
Algorithm 3 Low-Resolution Hybrid Precoder and Combiner
Design for Multiuser mmWave Systems
Input: F , W, Hk , k = 1, . . . , K.
โ
โ
โ
Output: fRF,k
, wRF
,k , wBB,k , k = 1, . . . , K.
โ
โ
1: Obtain wRF ,1 and fRF ,1 for user-1 by solving
โ
โ
H
= arg max |wRF
wRF ,1 , fRF,1
,1 H1 fRF,1 |.
2:
Fullโdigital
PEโAltMin [6] (B=โ)
CDM [30] (B=2)
CDM [30] (B=1)
HBF [32] (B=2)
HBF [32] (B=1)
Proposed (B=2)
Proposed (B=1)
110
Spectral Efficiency (b/s/Hz)
sections:
โ
H
โ
b
wRF ,k , fRF
,k = arg max wRF ,k Hk fRF,k
55
50
45
Fullโdigital
PEโAltMin [6] (B=โ)
CDM [30] (B=2)
CDM [30] (B=1)
HBF [32] (B=2)
HBF [32] (B=1)
Proposed (B=2)
Proposed (B=1)
40
35
30
25
20
40
60
80
100
120
140
Number of Antenna
Fig. 4. Spectral efficiency versus number of antenna (NtRF = NrRF = 4,
Ns = 4, SNR = 20dB).
where ฮฑi โผ CN (0, L1 ) are the independent and identically
distributed complex gains of the i-th propagation path (ray)
ฮธit and ฮธir โ [โ ฯ2 , ฯ2 ] are the angles of departure (AoD) and
the angles of arrival (AoA), respectively. Finally, the array
response vectors at (ฮธt ) and ar (ฮธr ) depend on the antenna
array geometry. We assume that the commonly used uniform
linear arrays (ULAs) are employed, and the transmit antenna
array response vector at (ฮธt ) and the receive antenna array
response vector ar (ฮธr ) can be written as
t
t
2ฯ
2ฯ
1
at (ฮธt ) = โ [1, ej ฮป d sin(ฮธ ) , . . . , ej(Nt โ1) ฮป d sin(ฮธ ) ]T ,
Nt
(58)
r
r
2ฯ
1
j 2ฯ
d
sin(ฮธ
)
j(N
โ1)
d
sin(ฮธ
)
T
r
r
ฮป
,...,e
] ,
ar (ฮธ ) = โ [1, e ฮป
Nr
(59)
respectively, where ฮป is the signal wavelength, and d is the distance between antenna elements. In the following simulations,
we consider an environment with L = 6 scatterers between the
60
20
58
18
Exhaustive search
Proposed (B=1)
Spectral Efficiency (b/s/Hz)
Spectral Efficiency (b/s/Hz)
56
54
52
50
48
Fullโdigital
CDM [30] (B=2)
CDM [30] (B=1)
HBF [32] (B=2)
HBF [32] (B=1)
Proposed (B=2)
Proposed (B=1)
46
44
42
40
38
1
2
3
4
5
6
7
8
9
10
52
Spectral Efficiency (b/s/Hz)
50
51.4
51.2
51
44
4.95
40
38
5
5.05
Fullโdigital
PEโAltMin [6] (B=โ)
CDM [30]
HBF [32]
Proposed
42
1
2
3
4
12
10
8
6
2
โ10
0
10
20
30
40
SNR (dB)
Fig. 5. Spectral efficiency versus number of iteration (Nt = 64, Nr = 64,
NtRF = NrRF = 4, Ns = 4, SNR = 20dB).
46
14
4
Number of Iterations
48
16
5
6
Resolution (bits)
Fig. 6. Spectral efficiency versus resolution of PSs (Nt = 64, Nr = 64,
NtRF = NrRF = 4, Ns = 4, SNR = 20dB).
transmitter and the receiver. The antenna spacing is d = ฮป2 .
A. Simulation Results of a Point-to-Point mmWave System
We first consider a point-to-point mmWave communication
system, in which the transmitter and receiver are both equipped
with 64-antenna ULAs. The number of RF chains at the
transmitter and receiver are NtRF = NrRF = 6, so the number
of data streams is also assumed to be Ns = 6.
Fig. 3 shows the average spectral efficiency versus SNR over
106 channel realizations. We evaluate the spectral efficiency of
the algorithm proposed in Sec. III for the case of 2-bit (B = 2)
resolution PSs and the algorithm proposed in Sec. IV for the
case of 1-bit (B = 1) resolution PSs. For comparison purposes,
we also plot the spectral efficiency of two state-of-the-art lowresolution hybrid beamformer designs: the coordinate descent
method (CDM) algorithm in [30] and the hybrid beamforming
(HBF) algorithm in [32]. To the best of our knowledge, the
Fig. 7. Spectral efficiency versus SNR (Nt = 8, Nr = 8, Ns = 1, B = 1).
algorithm in [32] achieves the best performance with lowresolution PSs in the existing literature. The performance
of a fully digital approach using SVD-based beamforming
and the hybrid beamforming scheme with infinite-resolution
(B = โ) PSs using the phase extraction (PE-AltMin) algorithm in [6] are also included as performance benchmarks.
Fig. 3 illustrates that the proposed algorithm outperforms the
competitors, particularly for the case of 1-bit resolution PSs.
Moreover, it can be observed that the proposed algorithm
with B = 2 achieves performance close to optimal full-digital
beamforming and hybrid beamforming with infinite-resolution
PSs. For additional simulation validation, Fig. 4 illustrates the
spectral efficiency versus the number of antennas and similar
conclusions can be drawn.
In order to illustrate the convergence of the proposed
algorithm, we show the spectral efficiency versus the number
of iterations in Fig. 5, which also includes other algorithms
for comparison. It is observed that our proposed algorithms
converge faster than the other two iterative schemes, which is
a highly favorable property. In Fig. 6, we show the spectral
efficiency as a function of B to illustrate the impact of the
resolution of PSs on the spectral efficiency. As expected,
increasing the PS resolution will improve the system performance, but using only B = 3 bits is sufficient to closely
approach the performance of the ideal unquantized case.
Beyond B = 3, the additional cost and complexity associated
with using higher-resolution PSs is not warranted given the
very marginal increase in spectral efficiency. Moreover, our
proposed algorithms outperform the other two low-resolution
beamforming methods for all PS resolutions.
To examine the impact of the approximations used in
deriving the proposed one-bit resolution hybrid beamformer
scheme, in Fig. 7 we compare it with the optimal exhaustive
search approach. The number of antennas at both transmitter
and receiver is chosen to be 8 and the number of data streams
is Ns = 1. A relatively simple case is examined here due to
the exponential complexity of the exhaustive search method.
We see from Fig. 7 that the spectral efficiency achieved by
(I-HB) in [26]. All three algorithms are codebook-based approaches and the size of the beamsteering codebook is set at 32
(i.e. B = 5 quantization bits) for fairness of the comparison.
It can be observed from Fig. 8 that our proposed lowresolution hybrid beamforming design outperforms the other
three algorithms using only 2-bit resolution PSs. Moreover,
the performance with 1-bit resolution PSs is also comparable.
Fig. 9 further shows the sum-rate versus the number of users
K. From Fig. 9, we see that our proposed algorithm with 2-bit
resolution PSs always outperforms the other codebook-based
algorithms. Furthermore, even with 1-bit resolution PSs, the
proposed algorithm can still achieve competitive performance
compared with the TS-HB and MMSE-HB approaches when
K > 5.
60
Sumโrate (b/s/Hz)
50
40
Fullโdigital
TSโHB [24]
MMSEโHB [25]
IโHB [26]
Proposed (B=2)
Proposed (B=1)
30
20
10
0
โ20
โ15
โ10
โ5
0
5
10
15
20
SNR (dB)
VII. C ONCLUSIONS
Fig. 8. Spectral efficiency versus SNR (Nt = 64, Nr = 16,
K = 4).
NtRF
= 4,
100
90
Sumโrate (b/s/Hz)
80
70
Fullโdigital
TSโHB [24]
MMSEโHB [25]
IโHB [26]
Proposed (B=2)
Proposed (B=1)
60
50
40
This paper considered the problem of hybrid precoder and
combiner design for mmWave MIMO systems with lowresolution quantized PSs. We proposed an efficient iterative
algorithm which successively designs the low-resolution analog precoder and combiner pair for each data stream. Then,
the digital precoder and combiner were computed based on
the obtained effective baseband channel to further enhance the
spectral efficiency. The design of low-resolution hybrid beamformers for multiuser MIMO communication systems was also
investigated. Simulation results verified the effectiveness of the
proposed algorithms, particularly for scenarios in which onebit resolution phase shifters are used.
30
A PPENDIX A
P ROOF OF P ROPOSITION 1
20
10
1
2
3
4
5
6
7
8
Number of users
The optimization problem (19) can be equivalently formulated as
Fig. 9. Spectral efficiency versus K (Nt = 64, Nr = 16, NtRF = K,
SNR = 20dB).
the proposed algorithm is the same as that of the optimal
exhaustive search method, suggesting that the proposed hybrid beamforming algorithm with one-bit resolution PSs can
provide optimal or near-optimal performance.
B. Simulation Results of a Multiuser mmWave System
Next, we evaluate the performance of the proposed lowresolution beamformer algorithm in a multiuser uplink system.
We assume there are K = 4 users, each of which is equipped
with Nt = 16 antennas and only one RF chain to transmit
a single data stream. The BS has Nr = 64 antennas and
NrRF = 4 RF chains. Fig. 8 illustrates the sum-rate versus
SNR for various hybrid beamformer designs. In particular, we
include three state-of-the-art multiuser hybrid beamforming
approaches for comparison: i) two-stage hybrid beamforming (TS-HB) in [24], ii) MMSE-based hybrid beamforming
(MMSE-HB) in [25], and iii) iterative hybrid beamforming
Nt
Nr
X
l
l X
1
ejฯi Ql (j, i) .
ejฯj
max โ
Nt Nr j=1
i=1
(60)
โ
By discarding the constant coefficient 1/ Nt Nr , (60) can be
further transformed as
๏ฃผ
๏ฃฑ
Nt
Nr
๏ฃฝ
๏ฃฒ
X
X
l
l
l
ejฯu Ql (j, u) . (61)
ejฯj ejฯi Ql (j, i) +
max
๏ฃพ
๏ฃณ
u6=i
j=1
l
Since the term ejฯi does not involve the summation index j,
it can be put outside the first summation, resulting in
max e
jฯli
Nr
X
j=1
e
jฯlj
Ql (j, i) +
Nr
X
j=1
e
jฯlj
Nt
X
l
ejฯu Ql (j, u) .
u6=i
(62)
Obviously, the optimal value of ฯli makes the phases of the
first and second term equal to obtain the largest amplitude,
and (20) is proved.
R EFERENCES
[1] Z. Pi and F. Khan, โAn introduction to millimeter-wave mobile broadband systems,โ IEEE Commun. Mag., vol. 49, no. 6, pp. 101-107, June
2011.
[2] T. Rappaport, S. Sun, R. Mayzus, H. Zhao, Y. Azar, K. Wang, G. N.
Wong, J. K. Schulz, M. Samimi, and F. Gutierrez โMillimeter wave
mobile communications for 5G cellular: It will work!โ IEEE Access,
vol. 1, pp. 335-349, 2013.
[3] A. Lee Swindlehurst, E. Ayanoglu, P. Heydari, and F. Capolino,
โMillimeter-wave massive MIMO: The next wireless revolution?โ IEEE
Commun. Mag., vol. 52, no. 9, pp. 56-62, Sept. 2014.
[4] T. S. Rappapport, G. R. MacCartney, M. K. Samimi, and S. Sun,
โWideband millimeter-wave propagation measurements and channel
models for future wireless communication system designโ, IEEE Trans.
Commun., vol. 63, no. 9, pp. 3029-3056, Sept. 2015.
[5] R. W. Heath Jr., N. Gonzaฬlez-Prelcic, S. Rangan, W. Roh, and A. M.
Sayeed, โAn overview of signal processing techniques for millimeter
wave MIMO systems,โ IEEE J. Sel. Topics Signal Process., vol. 10, no.
3, pp. 436-453, April 2016.
[6] X. Yu, J.-C. Shen, J. Zhang, and K. B. Letaief, โAlternating minimization
algorithms for hybrid precoding in millimeter wave MIMO systems,โ
IEEE J. Sel. Topics Signal Process., vol. 10, no. 3, pp. 485-500, April
2016.
[7] C. Rusu, R. Meฬndez-Rial, N. Gonzaฬlez-Prelcic, and R. W. Heath
Jr., โLow complexity hybrid precoding strategies for millimeter wave
communication systems,โ IEEE Trans. Wireless Commun., vol. 15, no.
12, pp. 8380-8393, Sept. 2016.
[8] R. Loฬpez-Valcarce, N. Gonzaฬlez-Prelcic, C. Rusu, and R. W. Heath Jr.,
โHybrid precoders and combiners for mmWave MIMO systems with
per-antenna power constraints.โ in Proc. IEEE Global Communication
Conference (GLOBECOM), Washington, DC, Dec. 2016, pp. 1-6.
[9] C.-E. Chen, โAn iterative hybrid transceiver design algorithm for millimeter wave MIMO systems,โ IEEE Wireless Commun. Lett., vol. 4,
no. 3, pp. 285-288, June 2015.
[10] W. Ni, X. Dong, and W.-S. Lu, โNear-optimal hybrid processing for
massive MIMO systems via matrix decomposition,โ IEEE Trans. Signal
Process., vol. 65, no. 15, pp. 3922-3933, Aug. 2017.
[11] X. Gao, L. Dai, S. Han, C.-L. I, and R. W. Heath Jr., โEnergy-efficient
hybrid analog and digital precoding for mmWave MIMO systems with
large antenna arrays,โ IEEE J. Sel. Areas Commun., vol. 34, no. 4, pp.
998-1009, April 2016.
[12] L. Dai, X. Gao, J. Quan, S. Han, and C.-L. I, โNear-optimal hybrid
analog and digital precoding for downlink mmWave massive MIMO
systemsโ, in Proc. IEEE Int. Conf. Commun. (ICC), London, UK, June
2015, pp. 1334-1339.
[13] S. He, C. Qi, Y. Wu, and Y. Huang, โEnergy-efficient transceiver design
for hybrid sub-array architecture MIMO systems,โ IEEE Access, vol. 4,
pp. 9895-9905, 2016.
[14] O. E. Ayach, S. Rajagopal, S. Abu-Surra, Z. Pi, and R. W. Heath Jr.,
โSpatially sparse precoding in millimeter wave MIMO systems,โ IEEE
Trans. Wireless Commun., vol. 13, no. 3, pp. 1499-1513, Mar. 2014.
[15] A. Alkhateeb, O. El Ayach, G. Leus, and R. W. Heath Jr., โChannel
estimation and hybrid precoding for millimeter wave cellular systems,โ
IEEE J. Sel. Topics Signal Process., vol. 8, no. 5, pp. 831-846, Oct.
2014.
[16] C. Rusu, R. Meฬndez-Rial, N. Gonzaฬlez-Prelcic, and R. W. Heath Jr.,
โLow complexity hybrid sparse precoding and combining in millimeter
wave MIMO systems,โ IEEE Int. Conf. on Commun. (ICC), London,
UK, June 2015, pp. 1340-1345.
[17] J.-C. Chen, โEfficient codebook-based beamforming algorithm for
millimeter-wave massive MIMO systems,โ IEEE Trans. Veh. Technol.,
to Appear.
[18] X. Gao, L. Dai, C. Yuen, and Z. Wang, โTurbo-like beamforming based
on Tabu search algorithm for millimeter-wave massive MIMO systems,โ
IEEE Trans. Veh. Technol., vol. 65, no. 7, pp. 5731-5737, July 2016.
[19] S. Han, C.-L. I, Z. Xu, and C. Rowell, โLarge-scale antenna systems
with hybrid analog and digital beamforming for millimeter wave 5G,โ
IEEE Commun. Mag., vol. 53, no. 1, pp. 186-194, Jan. 2015.
[20] A. Li and C. Masouros, โHybrid analog-digital millimeter-wave MUMIMO transmission with virtual path selection,โ IEEE Commun. Lett.,
vol. 21, no. 2, pp. 438-441, Feb. 2017.
[21] L. Liang, W. Xu, and X. Dong, โLow-complexity hybrid precoding in
massive multiuser MIMO systems,โ IEEE Wireless Commun. Lett., vol.
3, no. 6, pp. 653-656, Dec. 2014.
[22] A. Li and C. Masouros, โHybrid precoding and combining design for
millimeter-wave multi-user MIMO based on SVD,โ IEEE Int. Conf. on
Commun. (ICC), Paris, France, May 2017, pp. 1-6.
[23] M. Kim and Y. H. Lee, โMSE-based hybrid RF/baseband processing
for millimeter-wave communication systems in MIMO interference
channels,โ IEEE Trans. Veh. Technol., vol. 64, no. 6, pp. 2714-2720,
June 2015.
[24] A. Alkhateeb, G. Leus, and R. W. Heath Jr., โLimited feedback hybrid
precoding for multi-user millimeter wave systems,โ IEEE Trans. Wireless
Commun., vol. 14, no. 11, pp. 6481-6494, Nov. 2015.
[25] D. H. N. Nguyen, L. B. Le, and T. Le-Ngoc, โHybrid MMSE precoding
for mmWave multiuser MIMO systems,โ IEEE Int. Conf. on Commun.
(ICC), Kuala Lumpur, Malaysia, May 2016.
[26] Z. Wang, M. Li, X. Tian, and Q. Liu, โIterative hybrid precoder
and combiner design for mmWave multiuser MIMO systems,โ IEEE
Commun. Lett., vol. 21, no. 7, pp. 1581-1584, July 2017.
[27] T. E. Bogale, L. B. Le, A. Haghighat, and L. Vandendorpe, โOn the
number of RF chains and phase shifters, and scheduling design with
hybrid analog-digital beamforming,โ IEEE Trans. Wireless Commun.,
vol. 15, no. 5, pp. 3311-3326, May 2016.
[28] A. S. Y. Poon and M. Taghivand, โSupporting and enabling circuits for
antenna arrays in wireless communications,โ Proc. IEEE, vol. 100, no.
7, pp. 2207-2218, July 2012.
[29] R. Meฬndez-Rial, C. Rusu, N. Gonzaฬlez-Prelcic, and A. Alkhateeb,
โHybrid MIMO architectures for millimeter wave communications:
Phase shifters or switches?โ, IEEE Access, vol. 4, pp. 247-267, March
2016.
[30] J.-C. Chen, โHyrbrid beamforming with discrete phase shifters for
millimeter-wave massive MIMO systems,โ IEEE Trans. Veh. Technol.,
to Appear.
[31] F. Sohrabi and W. Yu, โHybrid beamforming with finite-resolution phase
shifters for large-scale MIMO systems,โ in Proc. IEEE Workshop Signal
Process. Adv. Wireless Commun. (SPAWC), Stockholm, Sweden, June
2015, pp. 136-140.
[32] F. Sohrabi and W. Yu, โHybrid digital and analog beamforming design
for large-scale antenna arrays,โ IEEE J. Sel. Topics Signal Process., vol.
10, no. 3, pp. 501-513, April 2016.
[33] G. N. Karystinos and D. A. Pados, โRank-2-optimal adaptive design of
binary spreading codes,โ IEEE Trans. Inf. Theory, vol. 53, no. 9, pp.
3075-3080, Sept. 2007.
[34] G. H. Golub and C. F. Van Loan, Matrix Computations. Baltimore, USA:
JHU Press, 2012.
| 7cs.IT
|
Phaseless compressive sensing using partial support
information
arXiv:1705.04048v2 [cs.IT] 13 Dec 2017
Zhiyong Zhouโ, Jun Yu
Department of Mathematics and Mathematical Statistics, Umeaฬ University,
Umeaฬ, 901 87, Sweden
December 14, 2017
Abstract: We study the recovery conditions of weighted โ1 minimization for real-valued signal reconstruction from phaseless compressive sensing measurements when partial support information is available.
A strong restricted isometry property condition is provided to ensure the stable recovery. Moreover, we
present the weighted null space property as the sufficient and necessary condition for the success of k-sparse
phaseless recovery via weighted โ1 minimization. Numerical experiments are conducted to illustrate our
results.
Keywords: Phaseless compressive sensing; Partial support information; Strong restricted isometry property; Weighted null space property.
1
Introduction
Compressive sensing aims to recover an unknown signal from the underdetermined linear measurements
(see [8, 9] for a comprehensive view). It is known as phase retrieval or phaseless compressive sensing
when there is no phase information. The phaseless compressive sensing problem has recently attracted
considerable research interests and many algorithms have been proposed to solve this problem. Existing
literature include [2โ4,7,12,14,16], to name a few. Specifically, the goal of phaseless compressive sensing is to
recover x โ RN up to a unimodular scaling constant from noisy magnitude measurements y = |Ax|+e โ Rm
with the measurement matrix A = (a1 , ยท ยท ยท , am )T โ RmรN , |Ax| = (|ha1 , xi|, ยท ยท ยท , |ham , xi|)T and the noise
term e โ Rm . When x is sparse or compressible, the stable recovery can be guaranteed by solving the
following โ1 minimization problem
min kzk1 subject to k|Az| โ yk2 โค ฮต,
zโRN
(1)
provided that the measurement matrix A satisfies the strong restricted isometry property (SRIP) [11, 17].
In the noiseless case, the first sufficient and necessary condition was presented in [18] by proposing a new
version of null space property for the phase retrieval problem.
In this paper, we generalize the existing theoretical framework for phaseless compressive sensing to
incorporate partial support information, where we consider the case that an estimate of the support of
the signal is available. We follow the similar notations and arguments in [10, 20]. For an arbitrary signal
x โ RN , let xk be its best k-term approximation, so that xk minimizes kx โ f k1 over all k-sparse vectors
f . Let T0 be the support of xk , where T0 โ {1, ยท ยท ยท , N } and |T0 | โค k. Let Tฬ , the support estimate, be a
subset of {1, 2 ยท ยท ยท , N } with cardinality |Tฬ | = ฯk, where ฯ โฅ 0 and |Tฬ โฉ T0 | = ฮฑฯk with 0 โค ฮฑ โค 1. Here the
parameter ฯ determines the ratio of the size of the estimated support to the size of the actual support of xk
โ
Corresponding author, [email protected].
1
(or the support of x if x is k-sparse), while the parameter ฮฑ determines the ratio of the number of indices
in the support of xk that are accurately estimated in Tฬ to the size of Tฬ , i.e., ฮฑ =
prior support information Tฬ , we adopt the weighted โ1 minimization
N
X
(
ฯ โ [0, 1]
min
wi |zi |, subject to k|Az| โ yk2 โค ฮต, where wi =
N
zโR
1
i=1
|Tฬ โฉT0 |
.
|Tฬ |
To incorporate
i โ Tฬ ,
i โ Tฬ c .
(2)
We present the SRIP condition and weighted null space property condition to guarantee the success of the
recovery via the weighted โ1 minimization problem above.
The paper is organized as follows. In Section 2, we introduce the definition of SRIP and present the stable recovery condition with this tool. In Section 3, the sufficient and necessary weighted null space property
condition for the real sparse noise free phase retrieval is given. In Section 4, some numerical experiments
are presented to illustrate our theoretical results. Finally, Section 5 is devoted to the conclusion.
P
Throughout the paper, for any vector x โ RN , we denote the โp norm by kxkp = ( pi=1 |xi |p )1/p for
P
p > 0 and the weighted โ1 norm as kxk1,w = N
i=1 wi |xi |. For any matrix X, kXk1 denotes the entry-wise
โ1 norm. For any set T , we denote its cardinality as |T |. The vector x โ RN is called k-sparse if at most k
of its entries are nonzero, i.e., if kxk0 = |supp(x)| โค k, where supp(x) denotes the index set of the nonzero
entries. We denote the index set [N ] := {1, 2, ยท ยท ยท , N }. For a matrix A = (a1 , ยท ยท ยท , am )T โ RmรN and
an index set I โ [m], we denote AI the sub-matrix of A where only rows with indices in I are kept, i.e.,
AI = (aj , j โ I)T .
2
SRIP
To recover sparse signals via โ1 minimization in the classical compressive sensing setting, [5] introduced
the notion of restricted isometry property (RIP) and established a sufficient condition. We say a matrix A
satisfies the RIP of order k if there exists a constant ฮดk โ [0, 1) such that for all k-sparse vectors x we have
(1 โ ฮดk )kxk22 โค kAxk22 โค (1 + ฮดk )kxk22 .
(3)
q
Cai and Zhang [1] proved that the RIP of order tk with ฮดtk < tโ1
t where t > 1 can guarantee the exact
recovery in the noiseless case and stable recovery in the noisy case via โ1 minimization. This condition is
sharp when t โฅ 43 , see [1] for details. Very recently, Chen and Li [6] generalized this sharp RIP condition
to the weighted โ1 minimization problem when partial support information was incorporated. We first
present the following useful lemma, which is an extension of the result in [6].
N
m
Lemma 1 Let
qx โ R , y = Ax + e โ R with kek2 โค ฮถ, and ฮทโโฅ 0. Suppose that A satisfies RIP of order
tโd
1 + ฯ โ 2ฮฑฯ and
tk with ฮดtk < tโd+ฮณ
2 for some t > d, where ฮณ = ฯ + (1 โ ฯ)
d=
(
1,
1 โ ฮฑฯ + a,
ฯ=1
0โคฯ<1
(4)
with a = max{ฮฑ, 1 โ ฮฑ}ฯ. Then for any
xฬ โ {z โ RN : kzk1,w โค kxk1,w + ฮท, kAz โ yk2 โค ฮต},
we have
kxฬ โ xk2 โค C1 (ฮถ + ฮต) + C2
2(ฯkxT0c k1 + (1 โ ฯ)kxTฬ c โฉT c k1 )
ฮท
0
โ
+ C2 โ ,
k
k
2
(5)
where
p
2(t โ d)(t โ d + ฮณ 2 )(1 + ฮดtk )
q
,
tโd
(t โ d + ฮณ 2 )( tโd+ฮณ
โ
ฮด
)
2
tk
r
q
โ
tโd
2ฮดtk ฮณ + (t โ d + ฮณ 2 )( tโd+ฮณ
2 โ ฮดtk )ฮดtk
1
q
+โ .
C2 =
tโd
d
(t โ d + ฮณ 2 )( tโd+ฮณ
2 โ ฮดtk )
C1 =
Remark 1 Note that if xโ2 is the solution of the weighted โ1 minimization problem:
min kzk1,w , subject to kAz โ yk2 โค ฮต,
zโRN
then xโ2 โ {z โ RN : kzk1,w โค kxk1,w + ฮท, kAz โ yk2 โค ฮต} with ฮท = 0. Therefore, this lemma is an
extension of Theorem 3.1 in [6] by letting ฮถ = ฮต and ฮท = 0. The proof follows from almost the same
procedure for the proof of Theorem 3.1 in Section 4 of [6] via replacing the P =
2(ฯkxT c k1 +(1โฯ)kxTฬ c โฉT c k1 )
0
0
โ
kฮณ
2(ฯkxT c k1 +(1โฯ)kxTฬ c โฉT c k1 )+ฮท
0
0
โ
with P โฒ =
, and letting ฮถ = ฮต. In order not to repeat, we leave out all the
kฮณ
details. In addition, this result also generalizes the Lemma 2.1 in [11], which is the special case with the
noise term e = 0, ฮถ = 0 and ฯ = 1. This lemma will play a crucial role in establishing the stable phaseless
recovery result via weighted โ1 minimization later on.
To address the phaseless compressive sensing problem (2), a stronger version of RIP is needed. Its
definition is provided as follows.
Definition 1 (SRIP [11, 17]) We say a matrix A = (a1 , ยท ยท ยท , am )T โ RmรN has the Strong Restricted
Isometry Property (SRIP) of order k with bounds ฮธโ , ฮธ+ โ (0, 2) if
ฮธโ kxk22 โค
min
kAI xk22 โค
Iโ[m],|I|โฅm/2
max
kAI xk22 โค ฮธ+ kxk22
Iโ[m],|I|โฅm/2
(6)
holds for all k-sparse vectors x โ RN , where [m] = {1, ยท ยท ยท , m}. We say A has the Strong Lower Restricted Isometry Property of order k with bound ฮธโ if the lower bound in (6) holds. Similarly, we say A
has the Strong Upper Restricted Isometry Property of order k with bound ฮธ+ if the upper bound in (6) holds.
Next, we present the conditions for the stable recovery via weighted โ1 minimization by using SRIP.
Theorem 1 Let x โ RN , y = |Ax| + e โ Rm with kek2 โค ฮถ. Adopt the notations in Lemma 1 and assume
that A โ RmรN satisfies the SRIP of order tk with bounds ฮธโ , ฮธ+ โ (0, 2) such that
ฮณ 2 (1 โ ฮธ+ )2
ฮณ 2 (1 โ ฮธโ )2
.
(7)
t โฅ max d +
2 , d + 2ฮธ โ ฮธ 2
2ฮธโ โ ฮธโ
+
+
Then any solution xโฏ of (2) satisfies
min{kxโฏ โ xk2 , kxโฏ + xk2 } โค C1 (ฮถ + ฮต) + C2
where C1 and C2 are constants defined in Lemma 1.
3
2(ฯkxT0c k1 + (1 โ ฯ)kxTฬ c โฉT c k1 )
0
โ
.
k
(8)
Remark 2 As it has been proved in [17] that Gaussian matrices with m = O(tk log(N/k)) satisfy SRIP
of order tk with high probability, thus the stable recovery result (8) can be achieved by using Gaussian
measurement matrix with appropriate number of measurements m.
Remark 3 Note that when the weight ฯ = 1, we have ฮณ = d = 1. Then, by assuming ฮถ = ฮต = 0 and
x is exactly k-sparse, our theorem reduces to Theorem 2.2 in [17]. That is, if A satisfies the SRIP of
order tk with bounds ฮธโ , ฮธ+ and t โฅ max{ 2ฮธ 1โฮธ2 , 2ฮธ 1โฮธ2 }, then for any k-sparse signal x โ RN we have
โ
โ
+
+
arg minzโRN {kzk1 : |Az| = |Ax|} = {ยฑx}. Similarly, if we let the noise term e = 0, ฮถ = 0 and ฯ = 1, this
theorem goes to Theorem 3.1 in [11].
Remark 4 If ฮฑ = 21 , we have ฮณ = d = 1. The sufficient condition (7) of Theorem 1 is identical to that
โ
2(1+ฮดtk )
of Theorem 2.2 in [17] and that of Theorem 3.1 in [11]. And the constants C1 = c1 = โ
, C2 =
1โ t/(tโ1)ฮดtk
q โ
โ
2ฮดtk + ( t(tโ1)โฮดtk t)ฮดtk
โ
c2 =
(see Theorem 3.1 in [11]). In addition, if 0 โค ฯ < 1 and ฮฑ > 21 , then d = 1
t(tโ1)โฮดtk t
and ฮณ < 1. The sufficient condition (7) in Theorem 1 is weaker than that of Theorem 2.2 in [17] and that
of Theorem 3.1 in [11]. In this case, the constants C1 < c1 , C2 < c2 .
o
n
2
2
ฮณ 2 (1โฮธ+ )2
โ)
. We illustrate how the constants tฯ , C1 and C2 change
,
d
+
Set tฯ = max d + ฮณ 2ฮธ(1โฮธ
โฮธ 2
2ฮธ โฮธ 2
โ
โ
+
+
with ฯ for different values of ฮฑ in Figure 1. In all the plots, we set ฯ = 1. In the plot of tฯ , we set ฮธโ =
ฮณ2
1
2
and ฮธ+ = 23 , then tฯ = d + 3 . In the plots of C1 and C2 , we fix t = 4 and ฮดtk = 0.3. Note that if ฯ = 1 or
ฮฑ = 0.5, then tฯ โก 1 + 13 = 34 , C1 โก c1 and C1 โก c2 . And it shows that tฯ decreases as ฮฑ increases, which
means that the sufficient condition (7) becomes weaker as ฮฑ increases. For each ฮฑ > 0.5, the sufficient
condition becomes stronger (tฯ increases) as ฯ increases. For instance, if 90% of the support estimate is
accurate (ฮฑ = 0.9) and ฯ = 0.6, we have tฯ = 1.2022, while tฯ = 1.3333 for standard โ1 minimization
(ฯ = 1). The opposite conclusion holds for the case ฮฑ < 0.5. In addition, as ฮฑ increases, the constant C1
decreases with t = 4 and ฮดtk = 0.3. Meanwhile, the constant C2 with ฮฑ 6= 0.5 is smaller than that with
ฮฑ = 0.5.
Proof of Theorem 1. For any solution xโฏ of (2), we have
kxโฏ k1,w โค kxk1,w
and
k|Axโฏ | โ |Ax| โ ek2 โค ฮต.
If we divide the index set {1, 2, ยท ยท ยท , m} into two subsets
T = {j : sign(haj , xโฏ i) = sign(haj , xi)} and T c = {j : sign(haj , xโฏ i) = โsign(haj , xi)},
then it implies that
kAT xโฏ โ AT x โ ek2 + kAT c xโฏ + AT c x โ ek2 โค ฮต.
(9)
Here either |T | โฅ m/2 or |T c | โฅ m/2. If |T | โฅ m/2, we use the fact that
kAT xโฏ โ AT x โ ek2 โค ฮต.
Then, we obtain
xโฏ โ {z โ RN : kzk1,w โค kxk1,w , kAT z โ AT x โ ek2 โค ฮต}.
4
(10)
2.4
2.75
1.56
ฮฑ=0.1
ฮฑ=0.3
ฮฑ=0.5
ฮฑ=0.7
ฮฑ=0.9
2.7
2.2
ฮฑ=0.1
ฮฑ=0.3
ฮฑ=0.5
ฮฑ=0.7
ฮฑ=0.9
2
1.54
2.65
1.52
2.6
1.8
1.5
2.5
1.6
ฮฑ=0.1
ฮฑ=0.3
ฮฑ=0.5
ฮฑ=0.7
ฮฑ=0.9
C2
tฯ
C1
2.55
1.48
2.45
1.4
1.46
2.4
1.2
1.44
2.35
1
2.3
0
0.2
0.4
0.6
0.8
1
1.42
0
0.2
Weights (ฯ)
0.4
0.6
0.8
1
0
0.2
Weights (ฯ)
0.4
0.6
0.8
1
Weights (ฯ)
Figure 1: Comparison of the constants tฯ , C1 and C2 for various of ฮฑ. In all the plots, we set ฯ = 1. In
the plot of tฯ , we set ฮธโ = 21 and ฮธ+ = 32 . In the plots of C1 and C2 , we fix t = 4 and ฮดtk = 0.3.
Since A satisfies SRIP of order tk with bounds ฮธโ , ฮธ+ and
ฮณ 2 (1 โ ฮธโ )2
ฮณ 2 (1 โ ฮธ+ )2
t โฅ max d +
> d,
2 , d + 2ฮธ โ ฮธ 2
2ฮธโ โ ฮธโ
+
+
therefore, the definition of SRIP implies that AT satisfies the RIP of order tk with
s
tโd
.
ฮดtk โค max{1 โ ฮธโ , ฮธ+ โ 1} โค
t โ d + ฮณ2
(11)
Thus, by using Lemma 1 with ฮท = 0, we have
kxโฏ โ xk2 โค C1 (ฮถ + ฮต) + C2
2(ฯkxT0c k1 + (1 โ ฯ)kxTฬ c โฉT c k1 )
0
โ
.
k
Similarly, if |T c | โฅ m/2, we obtain the other corresponding result
kxโฏ + xk2 โค C1 (ฮถ + ฮต) + C2
2(ฯkxT0c k1 + (1 โ ฯ)kxTฬ c โฉT c k1 )
0
โ
.
k
The proof of Theorem 1 is now completed.
3
Weighted Null Space Property
In this section, we consider the noiseless weighted โ1 minimization problem, i.e.,
(
ฯ โ [0, 1], i โ Tฬ
.
min kzk1,w , subject to |Az| = |Ax|, where wi =
N
zโR
1,
i โ Tฬ c
5
(12)
We denote the kernel space of A by N (A) := {h โ RN : Ah = 0} and denote the k-sparse vector space
N
ฮฃN
k := {x โ R : kxk0 โค k}.
Definition 2 The matrix A satisfies the w-weighted null space property of order k if for any nonzero
h โ N (A) and any T โ [N ] with |T | โค k it holds that
khT k1,w < khT c k1,w ,
(13)
where T c is the complementary index set of T and hT is the restriction of h to T .
Remark 5 Obviously, when the weight ฯ = 1, the weighted null space property reduces to the classical
null space property. And according to the specific setting of wi , the expression (13) is equivalent to
ฯkhT โฉTฬ k1 + khT โฉTฬ c k1 < ฯkhT c โฉTฬ k1 + khT c โฉTฬ c k1 โ ฯkhT k1 + (1 โ ฯ)khG k1 < khT c k1 ,
where G = (T โฉ Tฬ c ) โช (T c โฉ Tฬ ) (see [13] for more arguments).
It is known that a signal x โ ฮฃN
k can be recovered via the weighted โ1 minimization problem if and only if
the measurement matrix A has the weighted null space property of order k. We state it as follows (see [19]):
Lemma 2 Given A โ RmรN , for every k-sparse vector x โ RN it holds that
arg min {kzk1,w : Az = Ax} = x
zโRN
if and only if A satisfies the w-weighted null space property of order k.
Next, we extend Lemma 2 to the following theorem on phaseless compressive sensing for the real-valued
signal reconstruction.
Theorem 2 The following statements are equivalent:
(a) For any k-sparse x โ RN , we have
arg min{kzk1,w : |Az| = |Ax|} = {ยฑx}.
(14)
ku + vk1,w < ku โ vk1,w
(15)
zโRN
(b) For every S โ [m], it holds
for all nonzero u โ N (AS ) and v โ N (AS c ) satisfying ku + vk0 โค k.
Remark 6 If ฯ = 1, then Theorem 2 reduces to Theorem 3.2 in [18]. Since wi = ฯ when i โ Tฬ , and
wi = 1 otherwise, the expression (15) is equivalent to
ฯku + vk1 + (1 โ ฯ)k(u + v)Tฬ c k1 < ฯku โ vk1 + (1 โ ฯ)k(u โ v)Tฬ c k1 .
6
Proof of Theorem 2. The proof follows from the proof of Theorem 3.2 in [18] with minor modifications.
First we show (a) โ (b). Assume (b) is false, that is, there exist nonzero u โ N (AS ) and v โ N (AS c ) such
that
ku + vk1,w โฅ ku โ vk1,w
N
and u + v โ ฮฃN
k . Now set x = u + v โ ฮฃk , obviously for i = 1, ยท ยท ยท , m, we have
|hai , xi| = |hai , u + vi| = |hai , u โ vi|,
since either hai , ui = 0 or hai , vi = 0. In other words |Ax| = |A(uโ v)|. Note that uโ v 6= โx, for otherwise
we would have u = 0, which is a contradiction. Then, it follows from (a) that we obtain
kxk1,w = ku + vk1,w < ku โ vk1,w ,
This is a contradiction. Thus, (b) holds.
T
Next we prove (b) โ (a). Let b = (b1 , ยท ยท ยท , bm )T = |Ax| where x โ ฮฃN
k . For a fixed ฯ = (ฯ1 , ยท ยท ยท , ฯm ) โ
{โ1, 1}m , we set bฯ = (ฯ1 b1 , ยท ยท ยท , ฯm bm )T . We now consider the following weighted โ1 minimization problem:
min kzk1,w subject to Az = bฯ .
(16)
zโRN
Its solution is denoted as xฯ . Then, we claim that for any ฯ โ {1, โ1}m , if xฯ exists (it may not exist), we
have
kxฯ k1,w โฅ kxk1,w
and the equality holds if and only if xฯ = ยฑx.
โ
To prove the claim, we assume ฯ โ โ {1, โ1}m such that bฯ = Ax. First note that the statement
(b) implies the classical weighted null space property of order k. To see this, for any nonzero h โ N (A)
and T โ [N ] with |T | โค k, we set u = h, v = hT โ hT c and S = [m]. Then, we have u โ N (AS ) and
v โ N (AS c ). Therefore, the statement (b) now implies
2khT k1,w = ku + vk1,w < ku โ vk1,w = 2khT c k1,w .
โ
As a consequence, we have xฯ = x by Lemma 2. And,
ฯ โ {โ1, 1}m 6= ยฑฯ โ , if xฯ doesnโt exist then we have
Sโ = {i : ฯi = ฯiโ }. Then
(
hai , xi
hai , xฯ i =
โhai , xi
โ
similarly we have xโฯ = โx. Next, for any
nothing to prove. Assume it does exist, set
i โ Sโ ,
i โ Sโc .
Set u = x โ xฯ and v = x + xฯ . Obviously, u โ N (ASโ ) and v โ N (ASโc ). Furthermore, u + v = 2x โ ฮฃN
k .
Then, by the statement (b), we have
2kxk1,w = ku + vk1,w < ku โ vk1,w = 2kxฯ k1,w .
This proves (a) and the proof is completed.
7
4
Simulations
In this section, we present some simple numerical experiments to illustrate the benefits of using weighted
โ1 minimization to recover sparse and compressible signals when partial prior support information is available in the phaseless compressive sensing case. In order to facilitate the computation, we follow a nonstandard noise model:
b = |Ax|2 + e = {aTi xxT ai }1โคiโคm + e,
where e โ Rm is a noise term with kek2 โค ฮต. Then the weighted โ1 minimization goes to
(
N
X
ฯ โ [0, 1] i โ Tฬ ,
2
wi |zi |, subject to k|Az| โ bk2 โค ฮต, where wi =
min
zโRN
1
i โ Tฬ c .
i=1
(17)
(18)
Here we adopt the compressive phase retrieval via lifting (CPRL) algorithm developed in [15] to solve
this phaseless recovery problem. By using a lifting technique, this problem can be rewritten as a semidefinite
program (SDP). More specifically, given the ground truth signal x โ RN , let X = xxT โ RN รN be an
induced rank-1 semidefinite matrix. We further denote ฮฆi = ai aTi , a linear operator B of Z = zz T โ RN รN
as
B : Z 7โ {Tr(ฮฆi Z)}1โคiโคm โ Rm
and the weight matrix W = diag{wi , 1 โค i โค N } โ RN รN . Then the phaseless vector recovery problem
(18) can be cast as the following rank-1 matrix recovery problem:
min
ZโRNรN
kW ZW T k1 ,
subject to kB(Z) โ bk2 โค ฮต,
rank(W ZW T ) = 1, Z 0.
This is of course still a non-convex problem due to the rank constraint. The lifting approach addresses this
issue by replacing rank(W ZW T ) with Tr(W ZW T ). This leads to an SDP:
min
ZโRNรN
Tr(W ZW T ) + ฮปkW ZW T k1 ,
subject to kB(Z) โ bk2 โค ฮต,
Z 0,
(19)
where ฮป > 0 is a design parameter. Then the estimate of x can be finally be found by computing the
rank-1 decomposition of the recovered matrix via singular value decomposition.
The recovery performance is assessed by the average reconstruction signal to noise ratio (SNR) over 10
experiments. The SNR is measured in dB and it is given by
kxk2
โฏ
,
(20)
SNR(x, x ) = 20 log10
min{kxโฏ โ xk2 , kxโฏ + xk2 }
where x is the true signal and xโฏ is the recovered signal. For all the experiments, we fix the parameter
i.i.d
ฮป = 1. In the experiments where the measurements are noisy, we set the noise {ei , 1 โค i โค m} โผ N (0, ฯ 2 )
with ฯ = 0.1 and ฮต = kek2 .
8
4.1
Sparse Case
We first consider the case that x is exactly sparse with an ambient dimension N = 32 and fixed sparsity
k = 4. The sparse signals are generated by choosing k nonzero positions uniformly at random, and then
choosing the nonzero values from the standard normal distribution for these k nonzero positions. The
recovery is done via (19) using a support estimate of size |Tฬ | = 4 (i.e., ฯ = 1).
Figure 2 shows the recovery performances for different ฮฑ and ฯ with an increasing number of measurements m, both in the noise free and noisy cases. It can be observed that when ฮฑ = 0.75 > 0.5, the best
recovery is achieved for very small ฯ whereas a ฯ = 1 results in the lowest SNR for both cases. On the
other hand, when ฮฑ = 0.25 < 0.5, the performance of the recovery algorithms is better for large ฯ than
that for small ฯ. The case ฯ = 0 results in the lowest SNR. When ฮฑ = 0.5, the performance gaps for
different ฯ are not particularly large and it seems that a medium ฯ (ฯ = 0.5) achieves the best recovery.
In the noise free case, a perfect recovery can be achieved as long as the number of measurements m is large
enough. As is also expected that in all settings, comparing to the noise free case, we have a lower SNR in
the noisy case. These findings are largely consistent with the theoretical results provided in Section 2.
ฮฑ=0.75
ฮฑ=0.5
200
ฮฑ=0.25
200
120
100
150
100
0
10
100
ฯ=0
ฯ=0.2
ฯ=0.5
ฯ=0.8
ฯ=1
50
14
18
22
26
80
30
40
ฯ=0
ฯ=0.2
ฯ=0.5
ฯ=0.8
ฯ=1
50
0
10
60
SNR
SNR
SNR
150
14
18
22
26
number of measurements m
number of measurements m
ฮฑ=0.75
ฮฑ=0.5
ฯ=0
ฯ=0.2
ฯ=0.5
ฯ=0.8
ฯ=1
20
0
30
-20
10
14
18
22
26
30
number of measurements m
(a)
ฮฑ=0.25
25
30
25
15
20
10
20
15
SNR
SNR
SNR
15
5
10
10
ฯ=0
ฯ=0.2
ฯ=0.5
ฯ=0.8
ฯ=1
5
0
10
14
18
22
26
number of measurements m
ฯ=0
ฯ=0.2
ฯ=0.5
ฯ=0.8
ฯ=1
5
30
0
10
14
18
22
26
number of measurements m
ฯ=0
ฯ=0.2
ฯ=0.5
ฯ=0.8
ฯ=1
0
30
-5
10
14
18
22
26
30
number of measurements m
(b)
Figure 2: Performance of weighted โ1 recovery in terms of SNR averaged over 10 experiments for sparse
signals x with N = 32, k = 4, while varying the number of measurements m. From left to right, ฮฑ = 0.75,
ฮฑ = 0.5 and ฮฑ = 0.25. (a) Noise Free. (b) ฯ = 0.1.
4.2
Compressible Case
Here we generate a signal x whose coefficients decay like j โฮธ where j โ {1, ยท ยท ยท , N } and ฮธ = 4.5. This
kind of signal itself is not sparse, but can be well approximated by an exactly sparse signal. For this
experiment, we set k = 4, i.e., we use the best 4-term approximation. We fix ฯ = 1 as in the sparse case.
The phaseless recovery results are presented in Figure 3. It shows that on average a mediate value of ฯ
(ฯ = 0.5) results in the best recovery. In general, when ฮฑ > 0.5, smaller ฯ favours better reconstruction
results. The opposite conclusion holds for the case that ฮฑ < 0.5. Therefore, as is expected that the
behaviors that occur in the exactly sparse case also occur in the compressible case.
9
ฮฑ=0.75
ฮฑ=0.5
ฮฑ=0.25
80
120
100
100
80
60
80
60
60
SNR
SNR
SNR
40
40
20
40
ฯ=0
ฯ=0.2
ฯ=0.5
ฯ=0.8
ฯ=1
20
0
10
14
18
22
26
30
-20
10
20
ฯ=0
ฯ=0.2
ฯ=0.5
ฯ=0.8
ฯ=1
0
14
18
22
26
number of measurements m
number of measurements m
ฮฑ=0.75
ฮฑ=0.5
ฯ=0
ฯ=0.2
ฯ=0.5
ฯ=0.8
ฯ=1
0
30
-20
10
14
18
22
26
30
number of measurements m
(a)
25
30
20
25
15
20
ฯ=0
ฯ=0.2
ฯ=0.5
ฯ=0.8
ฯ=1
15
10
14
18
22
26
number of measurements m
30
30
ฯ=0
ฯ=0.2
ฯ=0.5
ฯ=0.8
ฯ=1
20
10
15
10
5
5
0
0
-5
10
14
ฯ=0
ฯ=0.2
ฯ=0.5
ฯ=0.8
ฯ=1
25
SNR
35
5
10
ฮฑ=0.25
30
SNR
SNR
40
18
22
26
number of measurements m
30
-5
10
14
18
22
26
30
number of measurements m
(b)
Figure 3: Performance of weighted โ1 recovery in terms of SNR averaged over 10 experiments for compressible signals x with N = 32, ฮธ = 4.5, while varying the number of measurements m. From left to right,
ฮฑ = 0.75, ฮฑ = 0.5 and ฮฑ = 0.25. (a) Noise Free. (b) ฯ = 0.1.
5
Conclusion
In this paper, we established the sufficient SRIP condition and the sufficient and necessary weighted null
space property condition for phaseless compressive sensing using partial support information via weighted
โ1 minimization, and we conducted some numerical experiments to illustrate the theoretical results.
Some further problems are left for future work. As we only consider the real-valued signal reconstruction
case, it will be challenging to generalize the present results to the complex-valued signal case. Besides it
will be very interesting to construct the measurement matrix A โ RmรN satisfying the weighted null space
property given in (15) directly.
Acknowledgements
This work is supported by the Swedish Research Council grant (Reg.No. 340-2013-5342).
References
[1] Cai, T. T. and Zhang, A. (2014). Sparse representation of a polytope and recovery of sparse signals
and low-rank matrices. IEEE Transactions on Information Theory 60(1) 122โ132.
[2] Candes, E. J., Eldar, Y. C., Strohmer, T. and Voroninski, V. (2015). Phase retrieval via matrix completion. SIAM review 57(2) 225โ251.
[3] Candes, E. J., Li, X. and Soltanolkotabi, M. (2015). Phase retrieval via Wirtinger flow: Theory and
algorithms. IEEE Transactions on Information Theory 61(4) 1985โ2007.
10
[4] Candes, E. J., Strohmer, T. and Voroninski, V. (2013). Phaselift: Exact and stable signal recovery from
magnitude measurements via convex programming. Communications on Pure and Applied Mathematics
66(8) 1241โ1274.
[5] Candes, E. J. and Tao, T. (2005). Decoding by linear programming. IEEE Transactions on Information
Theory 51(12) 4203โ4215.
[6] Chen, W. and Li, Y. (2016). Recovery of signals under the high order RIP condition via prior support
information. arXiv preprint arXiv:1603.03464.
[7] Chen, Y. and Candes, E. (2015). Solving random quadratic systems of equations is nearly as easy as
solving linear systems. In Advances in Neural Information Processing Systems (pp. 739โ747).
[8] Eldar, Y. C. and Kutyniok, G. (2012). Compressed Sensing: Theory and Applications. Cambridge
University Press.
[9] Foucart, S. and Rauhut, H. (2013). A Mathematical Introduction to Compressive Sensing. New York,
NY, USA: Springer-Verlag.
[10] Friedlander, M. P., Mansour, H., Saab, R. and Yilmaz, O. (2012). Recovering compressively sampled
signals using partial support information. IEEE Transactions on Information Theory 58(2) 1122โ1134.
[11] Gao, B., Wang, Y. and Xu, Z. (2016). Stable signal recovery from phaseless measurements. Journal
of Fourier Analysis and Applications 22(4) 787โ808.
[12] Gao, B. and Xu, Z. (2017). Phaseless recovery using the GaussNewton method. IEEE Transactions
on Signal Processing 65(22) 5885โ5896.
[13] Mansour, H. and Saab, R. (2017). Recovery analysis for weighted โ1 -minimization using the null space
property. Applied and Computational Harmonic Analysis 43(1) 23โ38.
[14] Netrapalli, P., Jain, P. and Sanghavi, S. (2015). Phase retrieval using alternating minimization. IEEE
Transactions on Signal Processing 18(63) 4814โ4826.
[15] Ohlsson, H., Yang, A. Y., Dong, R. and Sastry, S. S. (2011). Compressive phase retrieval from squared
output measurements via semidefinite programming. arXiv preprint arXiv:1111.6323.
[16] Shechtman, Y., Beck, A. and Eldar, Y. C. (2014). GESPAR: Efficient phase retrieval of sparse signals.
IEEE Transactions on Signal Processing 62(4) 928โ938.
[17] Voroninski, V. and Xu, Z. (2016). A strong restricted isometry property, with an application to
phaseless compressed sensing. Applied and Computational Harmonic Analysis 40(2) 386โ395.
[18] Wang, Y. and Xu, Z. (2014). Phase retrieval for sparse signals. Applied and Computational Harmonic
Analysis 37(3) 531โ544.
[19] Zhou, S., Xiu, N., Wang, Y. and Kong, L. (2013). Exact recovery for sparse signal via weighted โ1
minimization. arXiv preprint arXiv:1312.2358.
[20] Zhou, Z. and Yu, J. (2017). Recovery analysis for weighted mixed โ2 /โp minimization with 0 < p โค 1.
arXiv preprint arXiv:1709.00257.
11
| 7cs.IT
|
Inferential results
for a new measure of inequality
Youri Davydova , Francesca Greselinb
a
Laboratoire Paul Painleveฬ, Universiteฬ des Sciences et Technologies de Lille (Lille 1),
arXiv:1706.05576v1 [math.ST] 17 Jun 2017
Lille, France
and Saint Petersburg State University, Saint Petersburg, Russia
b
Dipartimento di Statistica e Metodi Quantitativi, Universitaฬ di Milano Bicocca, Milan,
Italy
Abstract. In this paper we derive inferential results for a new index of inequality, specifically defined for capturing significant changes observed both
in the left and in the right tail of the income distributions. The latter shifts
are an apparent fact for many countries like US, Germany, UK, and France
in the last decades, and are a concern for many policy makers. We propose
two empirical estimators for the index, and show that they are asymptotically
equivalent. Afterwards, we adopt one estimator and prove its consistency and
asymptotic normality. Finally we introduce an empirical estimator for its variance and provide conditions to show its convergence to the finite theoretical
value. An analysis of real data on net income from the Bank of Italy Survey
of Income and Wealth is also presented, on the base of the obtained inferential
results.
Keywords and phrases: Income inequality, Lorenz curve, Gini Index, consistency, asymptotic normality, economic inequality, confidence interval, nonparametric estimator.
1
Introduction
In view of measuring economic inequality in a society, suppose that we are interested,
for instance, in incomes. Let X be an โincomeโ random variable with non negatively
supported cdf F (x).
1
Next, define Q(p) = F โ1 (p) = inf{x : F (x) โฅ p, p โ [0, 1]} as the p-th quantile of
X, and suppose that X possesses a finite mean
Z
Z โ
xF (dx) =
ยตF =
0
1
F โ1 (p)dp.
0
The Lorenz curve, introduced by Lorenz (1905), is an irreplaceable tool in this domain.
It is defined by
1
lF (p) =
ยตF
Z
p
F โ1 (t)dt.
(1.1)
0
The curve lF (p) expresses the share of income possessed by the p% poorer part of population. It has been expressed firstly by Pietra (1915, with English translation now available
as Pietra, 2014), and mathematically formulated as in (1.1) by Gastwirth (1971).
In the following we will also employ mF (p) = 1 โ lF (1 โ p), which provides the share of
income owned by the richer p% of the population. Obviously, mF (p) is the curve obtained
by applying a central symmetry to lF (p), with respect to the center of the unit square, as
R1
shown in Figure 1.1 and allows us also to rephrase the Gini into GF = 0 (mF (p)โlF (p))dp.
1.0
We recall that the Gini can be rephrased as the weighted average of all comparisons made
0.0
0.2
0.4
0.6
0.8
l F (t )
m F (t )
0.0
0.2
0.4
0.6
0.8
1.0
Figure 1.1: Curves lF (p) and mF (p)
among the mean income of the poorest and the overall mean (Greselin et al. 2012, Greselin
2014). When dealing with skewed distributions, as it is the case for many economic size
distributions, the median should be preferred to the mean, in such a way that Gastwirth
(2014) proposed to modify the Gini accordingly.
Very recently, motivated by the observed shifts toward the extreme values in income
distributions, a new focus is introduced in Gastwirth (2016), almost contemporarily to
2
Davydov and Greselin (2016). Policy makers are nowadays interested in understanding
what happens in the more critical portions of the population, as significant changes have
been observed both in the left and in the right tail of the income distributions in countries
like US, Germany, UK, France in the last decades. Notice that the classical Lorenz curve
provides useful pointwise information with reference to poorest people, while on the other
hand, as L(p) approaches 1 as p approaches 1, it does not display the variation within
the upper end (f.i., top 5% or 1%) of the distribution clearly. The novel approach is to
consider equally sized and opposite groups of population, and compare their mean income.
Aiming at contrasting the economic position of the group of the poorer p% to the one of
the p% of the richest, the following inequality curve has been introduced
DF (p) =
mF (p) โ lF (p)
.
mF (p)
(1.2)
In the case of perfect equality, each fraction p of population has same mean income, hence
DF (p) = 0 for all p โ [0, 1]. While the income distribution moves toward more variability,
the mean income
income
ยตF lF (p)
p
ยตF mF (p)
p
of the p% of richest people will be moving far from the mean
of the p% of poorest part of the population, and DF (p) raises toward 1.
Hence, we can represent the pointwise measure of inequality in the population by plotting
DF (p).
Naturally, we can summarize all the information given by the curve DF (p) in a single
measure of inequality DF , by taking the expected value
Z 1
DF (p)dp.
DF =
(1.3)
0
Notice that DF is the area between the observed inequality curve DF (p) and the curve of
perfect equality, which is the horizontal line passing through the origin of the axes.
The structure of the paper is as follows. Section 2 introduces two estimators for the new
inequality measure, and provide reasons for selecting them in view of their main purpose.
The third section, which is the core of the paper, states the main inferential results,
in more detail we will show the consistency of the estimators, state their asymptotical
distribution, and the asymptotic negligibility of their difference. We also introduce an
empirical estimator for the variance, and establish its convergence to the finite variance
of the estimator. Some lemmas useful for the inferential theory have been presented in
Section 4, along with their proof. Section 5 shows how the inferential results can be
employed to develop an analysis on real income data. Final considerations are given in
Section 6.
3
2
Estimators
Economic data on the entire (or complete) population is rarely available, so most studies
are based on data obtained from well-designed sample surveys. Hence we usually have to
estimate summary measures from samples. We introduce here two empirical estimators,
b n and D
e n for estimating DF . The first one is derived, in a very natural way,
say D
by replacing the population cdf F (x) and mean value ยตF in (1.3) by their empirical
P
P
counterparts Fn (x) = n1 ni=1 1[0,x] Xi , and X n = n1 ni=1 Xi , and then considering the
empirical Lorenz curve, say
Z p
1
ln (p) =
Fnโ1 (s)ds,
Xn 0
and its dual
mn (p) =
1
Xn
Z
1
Fnโ1 (s)ds,
1โp
as follows
1
mn (p) โ ln (p)
dp
mn (p)
0
Z 1
:= 1 โ
Gn (p)dp
Z
bn =
D
(2.1)
0
where we set Gn (p) = ln (p)/mn (p).
Then, the second estimator is defined in terms of the order statistics X1:n โค ยท ยท ยท โค Xn:n
of the i.i.d. sample X1 , X2 , ..., Xn drawn from X, therefore we define
Pi
n
X
X
1
en = 1 โ
Pn k=1 k:n
D
n i=1 k=nโi+1 Xk:n
n
1X
:= 1 โ
Gn (i/n)
n i=1
(2.2)
where Gn (i/n) expresses the ratio between the mean income of the poorest i and of the
richest i elements in the sample.
b n and D
e n are asympWe will show later, in Theorem 3.5, that the two estimators D
b n is suitable for developing inferential results,
totically equivalent. While the estimator D
e n is much simpler when it comes to implement code for the analysis of real data.
D
3
Inferential results
In this Section we will present our main results, starting from the consistency of the
b n , next we state its asymptotic normal distribution, and then we deal with
estimator D
its variance estimation. Finally, we will show the asymptotic equivalence of the two
e n and D
b n.
estimators D
4
Unless explicitly stated otherwise, we assume throughout that the cdf F (x) of X is a
continuous function. This is a natural choice when modeling income or wealth distributions, and for many other economic size distributions.
3.1
bn
Consistency of D
b n is a consistent estimator for DF .
Theorem 3.1. D
Proof. From the normalized definition of the empirical Lorenz curve and its dual, say
ln (p) and mn (p), it is useful here to introduce their absolute versions, given by Ln (p) =
R p โ1
R1
b n as
Fn (s)ds and Mn (p) = 1โp Fnโ1 (s)ds. We may rephrase D
0
Z
bn =
D
0
1
Mn (p) โ Ln (p)
dp
Mn (p)
(3.1)
For all p โ [0, 1], we have that Ln (p) converges, with probability 1, uniformly to
Rp
L(p) = 0 F โ1 (s)ds (see Goldie, 1977). With the same approach, we have that Mn (p)
R1
converges, with probability 1, uniformly to M (p) = 1โp F โ1 (s)ds. As L(p) โค M (p), due
to the Lebesgue dominated convergence theorem we get the thesis.
3.2
bn
Asympthotic normality of the estimator D
Theorem 3.2. If the moment E|X|2+ฮด is finite for some ฮด > 0, then we have the asymptotic representation
n
โ
1 X
b
n Dn โ D = โ
h(Xi ) + oP (1),
n i=1
(3.2)
where oP (1) denotes a random variable that converges to 0 in probability when n โ โ,
and
Z
h(Xi ) =
+โ
1[0,x] (Xi ) โ F (x) ฯ F (x) dx
0
with the weight function ฯ(t) = ฯ1 (t) + ฯ2 (t), where
Z t
Z 1
1
L(1 โ s)
ฯ1 (t) =
ds and ฯ2 (t) =
2 ds.
t M (s)
0 [M (1 โ s)]
(3.3)
b n is asymptotically
Corollary 3.3. Under the conditions of Theorem 3.2, we have that D
normally distributed, that is
โ
b n โ D =โ N (0, ฯ 2 ),
n D
F
nโโ
5
where
ฯF2
โ
Z
Z
=
0
y
F (x) ฯ F (x) dx 1 โ F (y) ฯ F (y) dy.
0
The proof follows immediately from (3.2) by applying the Central Limit Theorem of
P. Leฬvy.
Proof of Theorem 3.2
b n and D, we get
From the definition of D
Z 1
โ
โ
Ln (t)
L(t)
b
n Dn โ D = โ n
โ
dt
Mn (t) M (t)
0
Z 1
Z 1
โ
โ
Ln (t) โ L(t)
L(t) [Mn (t) โ M (t)]
=โ n
dt + n
dt + Rn (t) (3.4)
M (t)
[M (t)]2
0
0
(1)
(2)
where the remainder term is given by Rn (t) = Rn + Rn and
Z 1
โ
1
1
(1)
Ln (t) โ L(t)
โ
dt,
Rn = n
M (t) Mn (t)
0
Z 1
โ
L(t)
1
1
(2)
Rn = n
โ
Mn (t) โ M (t) dt.
Mn (t) M (t)
0 M (t)
(1)
(3.5)
(3.6)
(2)
We will later show (Lemma 4.1 and 4.2, respectively) that Rn and Rn are of order
oP (1). The proof follows the approach of Greselin, Pasquazzi and Zitikis (2010), to state
the asymptotic normality for the Zenga inequality index (Zenga, 2007). Hence we now
proceed our analysis of the first two terms in (3.4), by using the Vervaat process
Z p
Z F โ1 (p)
โ1
โ1
Vn (p) =
Fn (t) โ F (t) dt +
Fn (x) โ F (x) dx
0
(3.7)
0
and its dual,
Vnโ (p)
Z
=
1
Fnโ1 (t)
โF
โ1
(t) dt +
Z
โ
Fn (x) โ F (x) dx
(3.8)
F โ1 (p)
p
for which we know that Vnโ (p) = โVn (p). For mathematical and historical details on the
Vervaat process, see Zitikis (1998), Davydov and Zitikis (2004), and Greselin et al. (2009).
โ
Now, denoting the uniform on [0, 1] empirical process by en (p) = n(Fn (F โ1 (p)) โ p) and
using one property of the Vervaat process, namely
โ
nVn (p) โค |en (p)||Fnโ1 (p) โ F โ1 (p)|,
(3.9)
we find a bound for the first term in (3.4) as follows
"Z โ1
#
Z 1
Z 1
F (t)
โ
โ
Ln (t) โ L(t)
1
โ n
dt = n
Fn (x) โ F (x) dx dt + O(Rn(3) )
M (t)
0
0 M (t)
0
6
where
Rn(3)
โ
=โ n
1
Z
0
1
Z
1
Vn (t) dt
M (t)
1
|en (t)| Fnโ1 (t) โ F โ1 (t) dt.
M (t)
โค
0
(3)
We will later show (Lemma 4.3) that Rn = oP (1).
Now we deal with the second term in (3.4), and we obtain, using similar arguments
as before
โ
1
Z
n
0
L(t) [Mn (t) โ M (t)]
dt
[M (t)]2
Z +โ
Z 1
โ
L(t)
=โ n
Fn (x) โ F (x) dx dt + O(Rn4 ),
2
โ1
[M
(t)]
0
F (1โt)
where
Rn(4)
=
โ
Z
1
n
Vnโ (1 โ t)
0
Z
L(t)
dt
[M (t)]2
1
|en (t)| Fnโ1 (t) โ F โ1 (t)
โค
0
L(t)
dt.
[M (t)]2
(4)
In Lemma 4.4 we show that Rn = oP (1), therefore we have
"Z โ1
#
โ Z 1 1
F (t)
โ
bn โ D = n
n D
Fn (x) โ F (x) dx dt
0 M (t)
0
Z +โ
Z 1
โ
L(t)
โ n
Fn (x) โ F (x) dx dt + oP (1).
2
0 [M (t)]
F โ1 (1โt)
(3.10)
We notice that the first term in the right hand side of equation (3.10) could be rewritten
as
โ
n
Z
0
1
1
M (t)
"Z
#
Fn (x) โ F (x) dx dt
F โ1 (t)
0
โ
Z
1
Z
+โ
Fn (x) โ F (x) 1[0,F โ1 (t)] (x)dx
1
dt
M (t)
0
0
Z +โ Z 1
โ
1
= n
Fn (x) โ F (x) 1[F (x),1] (t)
dt dx
M (t)
0
0
Z 1
Z +โ
โ
1
= n
Fn (x) โ F (x)
dt dx
0
F (x) M (t)
n
1 X
=โ
h1 (Xi )
n i=1
=
n
7
where
+โ
Z
h1 (Xi ) =
1[0,x] (Xi ) โ F (x) ฯ1 F (x) dx,
0
and
1
Z
ฯ1 (t) =
t
1
ds.
M (s)
For the second term in the right hand side of equation (3.10), using the change of variable
t = 1 โ s, we obtain:
โ
โ n
Z
0
1
L(1 โ s)
[M (1 โ s)]2
+โ
Z
F โ1 (s)
where
Z
n
1 X
Fn (x) โ F (x) dx ds = โ โ
h2 (Xi ),
n i=1
+โ
h2 (Xi ) =
1[0,x] (Xi ) โ F (x) ฯ2 F (x) dx,
0
and
t
L(1 โ s)
ฯ2 (t) =
2 ds =
0 [M (1 โ s)]
This completes the proof of Theorem 3.2.
Z
3.3
Z
1
1โt
L(s)
ds.
[M (s)]2
Convergence of the empirical variance
We deal here with the theoretical variance V ar h(X1 ) , that is
Z โ Z y
2
F (x) ฯ F (x) dx 1 โ F (y) ฯ F (y) dy
ฯF =
0
and its empirical counterpart
Z โ Z y
2
Fn (x) ฯ Fn (y) dx 1 โ Fn (y) ฯ Fn (y) dy.
ฯn =
0
(3.11)
0
(3.12)
0
Let x0 โฅ 0 be the minimum value in the support of F (x), i.e. the value such that F (y) = 0
for y < x0 and F (y) > 0 if y > x0 . Analogously, let T0 be maximum value in the support
of F (x), i.e. such that F (x) < 1 โx < T0 and F (T0 ) = 1. Notice that we may have
T0 = +โ. Then we have
โข Fn (x) = 0 โx < x0 because X โฅ x0 a.s.,
โข ฯF2 =
Rโ
โข ฯn2 =
Rโ
x0
x0
[. . .] . . . dy,
[. . .] . . . dy.
Therefore, without loss of generality, we can take x0 = 0.
8
Theorem 3.4. Assume that E|X|2+ฮด < +โ for some ฮด > 0. Then, we have a.s.
ฯn2 โโ ฯF2 .
(3.13)
nโโ
Proof. The proof is composed by three steps.
Step 1 :
For all , T such that 0 < < T < T0 , we will show that, with probability 1, for almost
all y โ [, T ], and with ฯ(t) = ฯ1 (t) + ฯ2 (t) given by (3.3) we have
Z y
Z y
Fn (x) ฯ Fn (y) dx โโโโ
F (x) ฯ(F (x)) dx.
nโโ
0
(3.14)
0
We begin by the study of the first part of (3.14) related to ฯ1 (t), i.e.
Z yZ 1
Z y
Z yZ 1
1
Fn (x) ฯ1 (Fn (x)) dx =
1[Fn (x),1] (s)Fn (s)
ฯn (x, s) ds dx.
ds dx :=
Mn (s)
0
0
0
0
0
We know that
โข as Fn (x) โ F (x) a.s. (uniformly), we have the convergence 1[Fn (x),1] (s) โ 1[F (x),1] (s)
with probability 1 for almost all s โ [0, 1] and x โ R+ ,
โข โs โ [0, 1] and with probability 1, we have that
Z 1
Z
โ1
Mn (s) =
Fn (y)dy
โโโโ
nโโ
1โs
โข Mn (s) โฅ sX n
1
F โ1 (y)dy = M (s),
1โs
โs โ [0, 1].
As X n โ ยตF a.s., with probability 1 there exists a constant C > 0 such that
ฯn (x, s) โค 1[Fn (x),1] (s)Fn (x)
1
sX n
โค C.
Hence, Lebesgue theorem gives (3.14), with ฯ replaced by ฯ1 .
Now we consider the second part of (3.14), where ฯ2 (t) takes the place of ฯ:
Z y
Z yZ 1
Z yZ 1
Ln (1 โ s)
Fn (x) ฯ2 (Fn (x)) dx =
1[0,Fn (x)] (s)Fn (x)
ds dx :=
ฯen (x, s) ds dx
[Mn (s)]2
0
0
0
0
0
and observe that
โข 1[0,Fn (x)] (s) โ 1[0,F( x)] (s) with probability 1 for almost all s โ [0, 1] and x โ R+ ,
9
โข โs โ [0, 1], with probability 1, we have that Ln (1 โ s) โ L(1 โ s), and Mn (1 โ s) โ
M (1 โ s),
โข Ln (1 โ s) โค M (1 โ s) โs โ [0, 1].
Therefore
ฯen (x, s) โค 1[0,Fn (x)] (s)Fn (x)
โค 1[0,Fn (x)] (s)Fn (x)
โค
Fn (x)
1 โ Fn (x) X n
1
Mn (1 โ s)
1
(1 โ s)X n
1
โค
1 โ Fn (T ) X n
Once more using Lebesgue theorem we get โy โค T
Z y
Z
a.s.
Fn (x) ฯ2 (Fn (x)) dx โโ
0
โ
1
< +โ.
1 โ F (T ) ยตF
y
F (x) ฯ2 (F (x)) dx
0
which completes the proof of (3.14).
Step 2 :
For all , T such that 0 < < T < T0 and given
Z T
2
ฯn [, T ] =
ฮจn (y)dy
where
y
Z
Fn (x)ฯ Fn (x) dx
ฮจn (y) =
1 โ Fn (y) ฯ Fn (y) ,
0
we will show that, with probability 1,
ฯn2 [, T ] โโโโ ฯ 2 [, T ].
(3.15)
nโโ
Due to the previous step, for every y we know that ฮจn (y) converges, with probability 1,
to
Z
y
ฮจ(y) =
F (x) ฯ F (x) dx
1 โ F (y) ฯ F (y) .
0
We have shown that, with probability 1,
lim sup sup Fn (x) ฯ Fn (x) โค 1 +
n
โคxโคT
and using
ฯ1 Fn (y) =
Z
1
Fn (y)
1
1 โ F (T )
1
1
ds โค
,
Mn (s)
Fn (y)X n
10
1
,
ยตF
it follows that we have a.s.
sup ฯ1 Fn (y)
lim sup
n
โค
โคyโคT
1
.
F ()ยตF
Hence
lim sup
n
sup ฮจn (y) โค y 1 +
โคxโคT
1
1 โ F (T )
1
1
+
F () 1 โ F (T )
1
.
ยต2F
(3.16)
Observing now that the function at the right hand side in (3.16) is integrable on [, T ],
we can apply Lebesgueโs dominated convergence theorem and prove (3.15).
Step 3 :
To complete the proof of Theorem 3.4 we need to obtain a bound for the integrals ฯn2 [0, ]
and ฯn2 [T, โ]. We use the following more delicate estimation of ฯ(t), for all ฮณ > 0: there
exists a positive constant Cฮณ such that
Cฮณ
1
.
ฮณ
ยตF t (1 โ t)ฮณ
ฯ(t) โค
(3.17)
Indeed, as L(t) โค tยตF โค M (t), for t โ [0, 1], we have
Z 1
1
1
1
ฯ1 (t) โค
ds =
| ln t|.
ยตF t s
ยตF
and
1
ฯ2 (t) โค
ยตF
Z
0
t
1
1
| ln(1 โ t)|.
ds =
1โs
ยตF
Hence, for every ฮณ > 0, there exists a constant 0 < Cฮณ < +โ, depending only on ฮณ, such
that for all t โ (0, 1)
ฯ1 (t) โค
Cฮณ
,
ยตF tฮณ
ฯ2 (t) โค
which jointly give the estimation (3.17).
11
Cฮณ
,
ยตF (1 โ t)ฮณ
For ฮณ โค 1/2, we have
Z Z y
2
Fn (x) ฯ Fn (x) dx 1 โ Fn (y) ฯ Fn (y) dy
ฯn [0, ] =
0
0
Z "Z
y
#
Cฮณ
Cฮณ
dx 1 โ Fn (y) ฮณ
dy
ฮณ
ฮณ
1 โ Fn (x) X n
Fn (x) 1 โ Fn (x) X n
0
0
Z Z y
1โ2ฮณ
Cฮณ2
1โฮณ
โค
Fn (x) dx 1 โ Fn (y)
Fn (y)โฮณ dy
2
0
Xn 0
Z
1โ2ฮณ
Cฮณ2
dy
y Fn1โ2ฮณ (y) 1 โ Fn (y)
โค
2
Xn 0
Z
Cฮณ2
โค
y dy
2
Xn 0
โค
=
Fn (x)
2 Cฮณ2
2
Fnฮณ (x)
.
(3.18)
2 Xn
We have similarly
ฯn2 [T, โ]
โค
โค
Cฮณ2
Z
2
Xn
Cฮณ2
2
Xn
Z
โ
1โ2ฮณ
yFn1โ2ฮณ (y) 1 โ Fn (y)
dy
T
โ
1โ2ฮณ
y 1 โ Fn (y)
dy.
(3.19)
T
e and a new random variable Y ,
e F,
e P)
Let us introduce a new probability space (โฆ,
e Y = Xi = 1 . Then
taking the values Xi , for i = 1, . . . , n, such that P
n
e {Y > y}
1 โ Fn (y) = P
e |2+p
E|Y
y 2+p
)
( n
1
1 X 2+p
= 2+p
X
.
y
n i=1 i
โค
If p โค ฮด then, due to the strong law of large numbers,
n
1 X 2+p
X
n i=1 i
a.s.
โโ
E|X|2+p < +โ,
hence, with probability 1, we have
lim sup
n
ฯn2 [T, โ]
Cฮณ2
โค
E(X 2+ฮด )
ยต2F
12
Z
T
โ
y (1โ(1โ2ฮณ)(2+ฮด)) dy.
(3.20)
Rโ
Observing now that, for ฮณ < ฮด/[2(2 + ฮด)], the integral T y (1โ(1โ2ฮณ)(2+ฮด)) dy converges,
and defining ฮฒ such that 1 โ (1 โ 2ฮณ)(2 + ฮด) = โ(1 + ฮฒ), then (3.20) takes the form
lim sup ฯn2 [T, โ]
n
Cฮณ2
1
โค
E(X 2+ฮด )
.
2
ยตF
ฮฒ Tฮฒ
(3.21)
Evidently, replacing Fn (x) by F (x) in (3.18) and (3.21), we obtain their theoretical
counterparts
ฯF2 [0, ]
2 Cฮณ2
,
โค
2 ยต2F
(3.22)
and
ฯF2 [T, โ] โค
Cฮณ2
1
E(X 2+ฮด )
.
2
ยตF
ฮฒ Tฮฒ
(3.23)
Now, collecting the bounds (3.18) and (3.22), the convergence stated in (3.15), and
finally bounds (3.21) and (3.23) from the three steps
lim sup ฯn2 โ ฯF2
n
โค lim sup ฯn2 [0, ] โ ฯF2 [0, ] + lim sup ฯn2 [, T ] โ ฯF2 [, T ] + lim sup ฯn2 [T, โ] โ ฯF2 [T, โ]
โค
n
C2
2 ฮณ
2
ยตF
n
+
2
ฮฒ
Cฮณ2
ยต2F
E(X 2+ฮด )
n
1
.
Tฮฒ
(3.24)
Taking โ 0 and T โ โ in (3.24), we arrive at (3.13).
b n,
Having established the consistency and asymptotic normality for the estimator D
e n defined in (2.2).
we would like to prove similar properties for the second estimator D
bn โ D
e n and prove its asymptotic
To do this, we will focus on their difference โn := D
negligibility.
Theorem 3.5. If the moment E|X|2+ฮด is finite for some ฮด > 0, then we have
โ
p
n|โn | โโ 0.
(3.25)
Before proving Theorem 3.5, it is worth to state two useful Corollaries.
Corollary 3.6. If the moment E|X|2+ฮด is finite for some ฮด > 0, then we have
โ
e n โ DF ) =โ N (0, ฯF2 )
n(D
where ฯF2 = V ar h(X1 ) is the theoretical variance.
13
(3.26)
Corollary 3.7. Under the same assumptions, we have also
e n โ DF )
โ (D
n
=โ N (0, 1)
ฯn
(3.27)
where ฯn2 is the empirical counterpart for ฯF2 given by (3.12).
e n by D
b n.
The same is true if we replace D
Proof. (of Theorem 3.5). Let := n =
โผ nโฮฑโ1/2 , where 0 < ฮฑ <
mn
n
ฮด
.
2(2+ฮด)
We have
Z 1
mn
n
1 X
1X
Gn (t)dt โ
Gn (t)dt โ
Gn (i/n) +
Gn (i/n)
|โn | โค
n i=1
n i=m +1
0
n
Z i/n
n
X
โค 2 +
[Gn (t) โ Gn (i/n)] dt
Z
i=mn +1
(iโ1)/n
[,1]
โค 2 + ฯGn (1/n)
(3.28)
[,1]
where ฯGn is the modulus of continuity of Gn on the interval [, 1] given by
[,1]
ฯGn (h) =
|Gn (t) โ Gn (s)|.
sup
โคt, sโค1, |tโs|โคh
Let t โ [(i โ 1)/n, i/n], then
Ln (t)
Ln (i/n)
โ
Mn (t) Mn (i/n)
|Gn (t) โ Gn (i/n)| =
1
Ln (i/n)
|Ln (t) โ Ln (i/n)| +
|Mn (i/n) โ Mn (t)|
Mn (t)
Mn (t)Mn (i/n)
โค
2
โค
t Xn
[,1]
ฯLn (1/n),
(3.29)
where we used Mn (s) = 1 โ Ln (1 โ s) and the inequalities Ln (s) โค Mn (s), s X n โค Mn (s)
that hold true โs โ [0, 1]. From the bounds in (3.28) and (3.29) we get
|โn | โค 2 +
2
X n
[,1]
ฯLn (1/n).
(3.30)
As for t โ [(i โ 1)/n, i/n]
Z
|Ln (t) โ Ln (i/n)| =
i/n
Fnโ1 (s)ds = Xi:n (i/n โ t) โค
t
1
Xi:n ,
n
we get
[,1]
ฯLn (1/n) โค
1
n
max Xk:n โค
mn โคkโคn
1
Mn
n
14
where
Mn = max Xk:n .
kโคn
Therefore, due to (3.30), we obtain
โ
n|โn | โค
2
2Mn
.
+
ฮฑ
n
X n n1/2โฮฑ
As 2/nฮฑ โ 0 and X n โ ยตF , it is sufficient to state the convergence in probability of
Mn /n1/2โฮฑ to 0. We have, for t > 0 :
Mn
P
โฅt
= P Mn โฅ tn1/2โฮฑ โค n P X โฅ tn1/2โฮฑ
1/2โฮฑ
n
E|X|2+ฮด
โค n 1/2โฮฑ 2+ฮด โโโโ 0
nโโ
(tn
)
as we have chosen ฮฑ <
4
ฮด
.
2(2+ฮด)
Proofs
Lemma 4.1. Under the conditions of Theorem 3.2, we have that
Rn(1) = oP (1).
(1)
Proof. We estimate Rn by splitting the integral in two parts, by choosing ฯ โ (0, 1)
Z 1
โ
1
1
(1)
Ln (t) โ L(t)
โ
dt
Rn = n
M (t) Mn (t)
0
Z ฯ
Z 1
โ
โ
= n
. . . dt + n
. . . dt
0
ฯ
:= Rn(1,1) + Rn(1,2) .
(4.1)
(1,1)
We now look for getting a bound for Rn and initially deal with its first part, given by
Z ฯ
1
โ
n
Ln (t) โ L(t)
dt.
(4.2)
M (t)
0
Provided that t < ฯ, we have that M (t) โฅ t F โ1 (1 โ ฯ), and
Z ฯ
โ
1
n
Ln (t) โ L(t) dt
0 t
Z ฯ
Z F โ1 (t)
โ
1
Vn (t) โ
Fn (x) โ F (x) dx dt
= n
0 t
0
Z ฯ
Z ฯ Z F โ1 (t)
โ
โ
1
1
= n
Vn (t)dt โ n
Fn (x) โ F (x) dx dt.
0 t
0 t
0
(4.3)
Now we consider the lefthand term in (4.3), and set
Kn = sup
tโ(0,1)
|en (t)|
,
1/2โ
t
(1 โ t)1/2โ
15
(4.4)
where en (t) =
โ
n Fn (F โ1 (t)) โ t . We know that (see (9.2) in Greselin et al. 2010)
Kn = OP (1).
(4.5)
Therefore, employing the inequality in (3.9) related to the Vervaat process, and choosing
such that 0 < < 21 , we obtain
Z ฯ
Z ฯ
โ
1
1
n
Vn (t)dt โค
|en (t)||Fnโ1 (t) โ F โ1 (t)| dt
t
t
0
0
Z ฯ
1 1/2โ
t
(1 โ t)1/2โ Fnโ1 (t) โ F โ1 (t) dt
โค Kn
t
Z0 ฯ
1
โค Kn
Fnโ1 (t) โ F โ1 (t) dt.
1/2+
0 t
a.s.
As |Fnโ1 (t)โF โ1 (t)| โค Fnโ1 (ฯ)+F โ1 (ฯ) โโ 2 F โ1 (ฯ), by Lebesgue dominated convergence
theorem the integral
Z
ฯ
1
a.s.
Fnโ1 (t) โ F โ1 (t) dt โโ 0 as n โ โ.
t1/2+
0
Hence
โ
Z
ฯ
n
0
1
Vn (t)dt = oP (1).
t
The righthand term in (4.3) may be estimated as follows
Z
0
ฯ
1
t
F โ1 (t)
Z
โ
n Fn (x) โ F (x) dx dt
0
Z
Z F โ1 (t)
1/2โ
1
1/2โ
F (x)
1 โ F (x)
dx dt
t
0
Z +โ
1/2โ
1 1/2โ
t
1 โ F (x)
dx dt
t
0
ฯ
โค Kn
0
Z
ฯ
โค Kn
0
Z
โค C1 Kn
ฯ
tโ1/2โ dt = C1 Kn ฯ(ฯ)
(4.6)
0
Z
for all 0 < < 1/2, where we set ฯ(ฯ) =
ฯ
tโ1/2โ dt, and C1 =
0
R +โ
0
1/2โ
1โF (x)
dx <
+โ. The latter quantity is finite, due to the existence of the 2 + ฮด moment of X.
(1,1)
To complete the analysis of Rn we have to deal now with its second part, given by
Z ฯ
1
โ
Ln (t) โ L(t)
n
dt.
(4.7)
Mn (t)
0
a.s.
As Mn (t) โฅ tFnโ1 (1 โ ฯ) for t โ [0, 1] and Fnโ1 (1 โ ฯ) โโ F โ1 (1 โ ฯ), the bound for (4.7)
can be found by following the same steps as for (4.2).
16
(1,2)
We continue our proof now by finding a bound for the second term Rn
ฯ โค t โค 1, then
Z
in (4.1). As
1
F โ1 (s)ds > 0
M (t) โฅ
1โฯ
and
1
Z
Fnโ1 (s)ds
Mn (t) โฅ
Z
โฅ
1โฯ
Therefore, setting Hn :=
F โ1 (s)ds + oP (1).
1โฯ
1
= OP (1), we have
Mn (s) M (s)
sup
sโ[1โฯ,1]
โ
1
1
Z
Ln (t) โ L(t) Mn (t) โ M (t) dt
n
ฯ
โ
1
Z
โค Hn n
Ln (t) โ L(t) Mn (t) โ M (t) dt.
(4.8)
ฯ
We observe that (4.8) is oP (1) if the following two equalities hold true:
Z 1
โ
n X n โ ยตF
Ln (t) โ L(t) dt = oP (1),
(4.9)
ฯ
and
โ
Z
1
Ln (t) โ L(t)
n
Ln (1 โ t) โ L(1 โ t) dt = oP (1),
(4.10)
ฯ
by recalling that
Mn (t) โ M (t) = (X n โ ยตF ) โ [Ln (1 โ t) โ L(1 โ t)]
due to
Z
1โt
โ1
Fn (s) โ F โ1 (s) ds +
X n โ ยตF =
Z
0
1
Fnโ1 (s) โ F โ1 (s) ds.
1โt
To get (4.9), remark that
โ
Z
n X n โ ยตF = OP (1), and
1
Ln (t) โ L(t) dt
ฯ
Z
1
Z
โค
Z0 1
โค
t
Fnโ1 (s) โ F โ1 (s) ds dt
0
Fnโ1 (s) โ F โ1 (s) ds = oP (1).
0
Finally, to get (4.10), we begin with the inequality
Z 1
โ
n
Ln (t) โ L(t) Ln (1 โ t) โ L(1 โ t) dt
ฯ
โค
โ
Z
n
1
2
Ln (t) โ L(t) dt,
ฯ
17
(4.11)
and use the following bound for the latter integrand
2
2
โ
โ
โ
n Ln (t) โ L(t) โค 2 n Vn (t) + 2 n
Z
F โ1 (t)
2
Fn (x) โ F (x) dx
.
0
Recalling that
โ
Z
n
1
2
Vn (t) dt = oP (1),
ฯ
and exploiting (4.4) we get
โ
Z
F โ1 (t)
2
Fn (x) โ F (x) dx
n
0
1
=โ
n
Z
F โ1 (t)
โ
2
n Fn (x) โ F (x) dx
0
Z F โ1 (t)
2
1/2โ
1
1/2โ
โค Kn โ
F (x)
1 โ F (x)
dx
n
0
Z
1/2โ 2
1 +โ
1 โ F (x)
dx = oP (1).
โค Kn โ
n 0
Integrating in dt on [ฯ, 1] we hence obtain the desired bound.
From the previous estimates it follows that โฯ : 0 < ฯ < 1 we have
Rn(1) = Un (ฯ) + Tn (ฯ),
where
Un (ฯ) = oP (1),
Tn (ฯ) โค C1 Kn ฯ(ฯ),
ฯโ0
with Kn = OP (1) and ฯ(ฯ) โโ 0.
Fixing > 0, let C > 0 be such that P {|Kn | > C} < โn, and let ฯ > 0 be such that
for ฯ < ฯ we have ฯ(ฯ) < /2C1 C. Then, having
P Rn(1) > โค P {Un (ฯ) > /2} + P {Tn (ฯ) > /2} ,
we get, for ฯ < ฯ ,
lim sup P {Tn (ฯ) > /2} โค P |Kn | >
n
2C1 ฯ(ฯ)
โค P {|Kn | > C} < ,
(1)
which finally gives Rn = oP (1).
Lemma 4.2. Under the conditions of Theorem 3.2, we have that
Rn(2) = oP (1).
18
(2)
Proof. We start from the definition of Rn in (3.6) here recalled for convenience
Z 1
โ
L(t)
1
1
(2)
Rn = n
โ
Mn (t) โ M (t) dt.
Mn (t) M (t)
0 M (t)
Observing that L(t) โค M (t) for t โ [0, 1] and using (4.11) to rewrite Mn (t) โ M (t) , the
proof can be established following the proof of Lemma (4.1) with minor modifications.
Lemma 4.3. Under the conditions of Theorem 3.2, we have that
Rn(3) = oP (1).
(3)
Proof. We estimate Rn by splitting it in two integrals as follows
Z 1
1
(3)
|en (t)| Fnโ1 (t) โ F โ1 (t) dt
Rn =
M
(t)
0
Z 1
Z 1/2
. . . dt
. . . dt +
=
0
Rn(3,1)
:=
(3,1)
Let us consider the first term Rn
1/2
+
Rn(3,2) .
(4.12)
and observe that
1
1
โค โ1 1
M (t)
F (2) t
where we assume that F โ1 ( 12 ) > 0, otherwise we may replace F โ1 ( 12 ) by F โ1 (a) > 0,
with a โ (0, 1) appropriately chosen. Hence, by choosing โค
โ
en (t) = n Fn F โ1 (t) โ t , we arrive at
Rn(3,1)
1
โค
F โ1 ( 12 )
Z
Kn
โ1
F ( 12 )
Z
โค
1/2
0
1
t
1/2
and recalling that
โ
n |Fn (F โ1 (t)) โ t| |Fnโ1 (t) โ F โ1 (t)| 1/2โ
t
(1 โ t)1/2โ dt
t1/2โ (1 โ t)1/2โ
1
Fnโ1 (t) โ F โ1 (t) = oP (1).
t1/2+
0
1
,
2
a.s.
as Kn = OP (1) and Fnโ1 (t) โโ F โ1 (t) for t โ [0, 1].
(3,2)
Now we deal with Rn , i.e. the second term in (4.12). Observing that M (t) =
R1
R 1 โ1
โ1
F
(s)ds
โฅ
F (s)ds = c > 0, we obtain
1โt
1/2
Rn(3,2)
1
โค
c
Z
1
|en (t)| Fnโ1 (t) โ F โ1 (t) dt
1/2
Kn
โค
c
Z
1
Fnโ1 (t) โ F โ1 (t) dt = oP (1).
1/2
19
Lemma 4.4. Under the conditions of Theorem 3.2, we have that
Rn(4) = oP (1).
(4)
Proof. We will deal with Rn , as for the previous Lemma, by splitting it as follows
Z 1
L(t)
(4)
|en (1 โ t)| Fnโ1 (t) โ F โ1 (t)
Rn =
dt
[M (t)]2
0
Z 1
Z 1/2
. . . dt
. . . dt +
=
0
Rn(4,1)
:=
1/2
+
Rn(4,2)
(4.13)
(4,1)
. Observing that M (t) โฅ tF โ1 (1/2) for t < 1/2, we have
Z
Kn 21/2โ 1
โค
/2tโ1/2โ Fnโ1 (t) โ F โ1 (t) dt = oP (1).
F โ1 (1/2) 0
and we initially consider Rn
Rn(4,1)
(4,2)
Finally, the result on Rn
comes from observing that for t โ (1/2, 1) there exists a
constant C such that M (t) โฅ C, and that suptโ(0,1) en (1 โ t) โค Kn , we have
Rn(4,2)
Kn
โค
C
Z
1
Fnโ1 (t) โ F โ1 (t) dt = oP (1),
1/2
due to the assumption on the second (hence the first) moment finite on X.
5
The new inequality measure on real data
The purpose of this section is to show, through a real data application, the theoretical
results obtained in the previous sections. We employ the Bank of Italy Survey on Household Income and Wealth (hereafter named by its acronym, SHIW) dataset, published in
2016. This survey contains information on household post-tax income and wealth in the
year 2014, covering 8,156 households, and 19,366 individuals. The sample is representative of the Italian population, which is composed of about 24,7 million households and
60,8 million individuals. The SHIW provides information on each individualโs Personal
Income Tax net income, but does not contain the corresponding gross income. We employ an updated version of the microsimulation model described in Morini and Pellegrino
(2016) to estimate the latter for each taxpayer. A comparison of the results from the
microsimulation model with the official statistics published by the Italian Ministry of Finance (2016) shows that the distribution of gross income and of net tax, according to
bands of gross income and type of employment, are close to each other. The empirical
20
analysis we develop here is based on the observed net income from the SHIV, while tax
data and gross income arise from the microsimulation model.
e n , we
To appreciate the asymptotic results of Section 3 on the empirical estimator D
calculate four types of confidence intervals: the normal, the basic, the percentile and the
BCa confidence intervals. After drawing the bootstrap samples, the empirical estimator
is evaluated at each sample, and Figure 5.1 show the histograms of the obtained values
when considering Gross Income in panel (a), Net Income in panel (b) and Taxes in panel
(c). While inequality estimators have a skewed distribution in case of low sample size,
here the accuracy of the normal approximation is apparent, due to the large sample size.
As a further check of the quality of the first order approximation, Figure 5.2 shows the
0.655
0.660
0.665
0.670
0.675
0.680
0.685
0.690
1400
1000
400
0
0
0
200
200
400
500
600
600
800
800
1000
1000
1200
1200
1400
1500
Q-Q plots obtained for the three cases.
0.615
0.620
(a)
0.625
0.630
0.635
0.640
0.645
0.795
0.800
(b)
0.805
0.810
0.815
0.820
0.825
(c)
e n on Gross Income in panel (a), on Net Income in panel (b) and on Taxes
Figure 5.1: Histograms for D
โ2
0
2
4
Theoretical Quantiles
(a)
0.825
0.820
0.815
0.810
Sample Quantiles
0.800
0.795
0.620
0.615
0.660
0.655
โ4
0.805
0.635
0.630
Sample Quantiles
0.625
0.675
0.670
0.665
Sample Quantiles
0.680
0.640
0.685
0.645
in panel (c)
โ4
โ2
0
Theoretical Quantiles
(b)
2
4
โ4
โ2
0
2
4
Theoretical Quantiles
(c)
e n vs Gaussian quantiles on Gross Income in panel (a), on Net Income in
Figure 5.2: Q-Q plots for D
panel (b) and on Taxes in panel (c)
21
0.85
0.80
0.75
0.60
0.65
0.70
Normal CI
Basic CI
Percentile CI
BCa CI
Gross Income
Net Income
Taxes
e n on Gross Income, on Net Income and on Taxes
Figure 5.3: Confidence Intervals for D
Finally, from Figure 5.3 we observe that the four methods for constructing Confidence
Intervals have a substantial agreement. They all agree in assuring that there is a statistically significant increase in inequality when passing from Net Income to Gross Income
(the redistributive effect of taxation) and from Gross Income to Taxes. We recall that
adjusted percentile methods (also named BCa) for calculating confidence limits are inherently more accurate than the basic bootstrap and percentile methods (Davison and
Hinkley, 1997).
6
Concluding remarks
Moved from the considerations that nowadays, in many developed countries, the more
critical (i.e the extremes) portions of the population are facing great reshaping of their
economic situation, a new index for measuring inequality have been proposed in Davydov
and Greselin (2016). In the cited paper, a discussion of the properties of the index has been
given, to motivate its introduction in the literature and to show its descriptive features.
Inferential results for the index were still missing, and this paper is a first contribution to
fill the gap. After proposing two empirical estimators, we have shown their asymptotic
22
equivalence. Then, consistency and asymptotic normality for the first estimator have been
derived. We also proved the convergence of the empirical estimator for the variance to its
finite theoretical value. Finally, we used the new statistical inferential results to analyze
data on Net Income from the Bank of Italy Survey on Household Income and Wealth,
and to compare them with Gross Income and Taxes.
References
Atkinson A. B. 1970. On the Measurement of Inequality, Journal of Economic Theory,
2, 244โ263.
Cobham A., Sumner A. 2013. Putting the Gini back in the bottle? The Palma as a
Policy-Relevant Measure of Inequality, Technical report, Kings College London.
Davydov Yu., Zitikis R. 2004. Convex rearrangements of random elements in Asymptotic
Methods in Stochastics, vol. 44 of Fields Institute Communications, pp. 141โ171,
American Mathematical Society, Providence, RI, USA.
Davydov Yu., Greselin F. 2016. Comparisons between poorest and richest to measure
inequality, (under revision)
Davison A. C., Hinkley D. V. 1997. Bootstrap methods and their application (Vol. 1).
Cambridge University Press.
Gastwirth J.L. 2016. Measures of Economic Inequality Focusing on the Status of the
Lower and Middle Income Groups, Statistics and Public Policy, 3:1, 1-9.
Gastwirth J.L. 2014. Median-based measures of inequality: reassessing the increase in
income inequality in the U.S. and Sweden, Journal of the International Association
for Official Statistics, 30, 311โ320.
Gini C. 1914. Sulla misura della concentrazione e della variabilitaฬ dei caratteri, Atti del
Reale Istituto Veneto di Scienze, Lettere ed Arti, 73, 1203โ1248. (English translation
in Gini, C. 2005. On the measurement of concentration and variability of characters.
Metron, 63, 3โ38.)
Greselin F. 2014. More equal and poorer, or richer but more unequal?, Economic Quality
Control, 29, 2, 99โ117.
Greselin F., Pasquazzi L., Zitikis R. 2010. Zengaโs new index of economic inequality, its
estimation, and an analysis of incomes in Italy, Journal of Probability and Statistics,
26 pp., DOI:10.1155/2010/718905.
23
Greselin F., Pasquazzi L., Zitikis R. 2012. Contrasting the Gini and Zenga indices of
economic inequality, Journal of Applied Statistics, 40, 2, 282โ297.
Greselin F., Puri M. L., Zitikis R. 2009. L-functions, processes, and statistics in measuring
economic inequality and actuarial risks, Statistics and Its Interface, 2, 2, pp. 227โ245.
Goldie C. M. 1977. Convergence theorems for empirical Lorenz curves and their inverses
Advances in Applied Probability, 9, 765โ791.
Lorenz M.C. 1905. Methods of measuring the concentration of wealth, Journal of the
American Statistical Association, 9, 209โ219.
Morini M., Pellegrino S. 2016. Personal income tax reforms: A genetic algorithm ap-
proach, European Journal of Operational Research, first online, https://doi-org.proxy.unimib.it/10.1016/
Pietra G. 1915. Delle relazioni tra gli indici di variabilitaฬ. Note I. Atti del Reale Istituto
Veneto di Scienze, Lettere ed Arti, 74, 775โ792
Pietra G. 2014. On the relationships between variability indices. Note I. Metron, 72, 5โ16
Zenga M. 2007. Inequality curve and inequality index based on the ratios between lower
and upper arithmetic means, Statistica & Applicazioni, 5, 3โ27.
Zitikis R. 1998. The Vervaat process, in Szyszkowicz, B. (ed.), Asymptotic Methods in
Probability and Statistics, Elsevier Science, Amsterdam, pp. 667-694.
24
| 10math.ST
|
1
Scalable Co-Optimization of Morphology and
Control in Embodied Machines
Nick Cheney1,2โ , Josh Bongard3 , Vytas SunSpiral4 , and Hod Lipson5
Department of Computational Biology and Biological Statistics, Cornell University, Ithaca, NY
2 Department of Computer Science, University of Wyoming, Laramie, WY
3 Department of Computer Science, University of Vermont, Burlington, VT
Intelligent Robotics Group, Intelligent Systems Division, NASA Ames/SGT Inc., Mountain View, CA
5 Department of Mechanical Engineering, Columbia University, New York, NY
โ [email protected]
1
arXiv:1706.06133v2 [cs.AI] 12 Dec 2017
4
AbstractโEvolution sculpts both the body plans and nervous
systems of agents together over time. In contrast, in AI and
robotics, a robotโs body plan is usually designed by hand, and
control policies are then optimized for that fixed design. The task
of simultaneously co-optimizing the morphology and controller
of an embodied robot has remained a challenge. In psychology,
the theory of embodied cognition posits that behavior arises
from a close coupling between body plan and sensorimotor
control, which suggests why co-optimizing these two subsystems
is so difficult: most evolutionary changes to morphology tend
to adversely impact sensorimotor control, leading to an overall
decrease in behavioral performance. Here, we further examine
this hypothesis and demonstrate a technique for โmorphological innovation protectionโ, which temporarily reduces selection
pressure on recently morphologically-changed individuals, thus
enabling evolution some time to โreadaptโ to the new morphology
with subsequent control policy mutations. We show the potential
for this method to avoid local optima and converge to similar
highly fit morphologies across widely varying initial conditions,
while sustaining fitness improvements further into optimization.
While this technique is admittedly only the first of many steps
that must be taken to achieve scalable optimization of embodied
machines, we hope that theoretical insight into the cause of
evolutionary stagnation in current methods will help to enable
the automation of robot design and behavioral training โ while
simultaneously providing a testbed to investigate the theory of
embodied cognition.
I. I NTRODUCTION
Designing agile, autonomous machines has been a longstanding challenge in the field of robotics [31]. Animals,
including humans, have served as examples of inspiration for
many researchers, who meticulously and painstakingly attempt
to reverse engineer the biological organisms that navigate even
the most dynamic, rugged, and unpredictable environments
with relative ease [11], [32], [38]. However, another competing
approach is the use of evolutionary algorithms to search for
robotic designs and behaviors without presupposing what those
designs and behaviors may be. These methods often take
inspiration from the evolutionary method itself, rather than
the exact specifications of any given organism produced by it.
The use of an evolutionary algorithm for automated design
comes with many benefits: It removes the costly endeavour
of determining which traits of a given organism are specific
to its biological niche, and which are useful design features
that can provide the same beneficial functions if instantiated
in a machine. It can yield machines that do not resemble any
animals currently found on earth [23], as it allows for machines
that are specialized for behaviors and environments that differ
from those of the model organism. Additionally, the optimization process can serve as a controlled and repeatable test-bed
for the study of evolutionary, developmental, or behavioral
theory [25], [26], [4].
However, the generalization of design automation to include
both the optimization of robot neural controllers and body
plans has proven to be problematic. While recent successes
have demonstrated the potential of effective optimization for
the control policies of agents with fixed morphologies [17],
[13], [27] or โ to a lesser extent โ the optimization of
morphologies (body plans) for agents with minimal and fixed
control policies [12], [10], [1], the co-optimization of the two
has seen very limited success [16], [8].
This inability to perform robot brain-body co-optimization
at scale has been experienced and noted informally by many
researchers involved with robot optimization, yet published
rarely. Thus the lack of publication is presumably because
the field lacks incentives for the publication of negative
results [14], rather than a lack of negative results in unpublished works. Joachimczak et al. provide an anecdotal
example of premature convergence in the co-optimization of
robot brain and body plan (Fig. 19 of [22]). Cheney et al. [8]
further analyze the phenomenon of premature convergence in
embodied machines and suggest that traditional evolutionary
algorithms are hindered in this setting primarily in their ability
to perform continued optimization on the morphology of the
robot. They hypothesized that the premature convergence may
be due to an effect of embodied cognition, in which an
individualโs body plan and brain have an incentive to specialize
their behaviors to complement one another. This specialization
makes improvements to either subsystem difficult without
complementary changes in the other (a highly unlikely event
given current algorithms) and thus results in an embodied
agent which is fragile with respect to design perturbations.
II. BACKGROUND
Attempts to solve this problem of fully-automated robot
evolution are frequently traced back to the work of Sims [34].
2
This work introduced the use of evolutionary algorithms to
produce goal-directed behaviors and morphologies simultaneously. Despite the advance this work represented, the evolved
robots tended to be composed of a small number of components (figures show a mean of 6.042 segments per robot,
with each typically controlled by a few neurons). It has been
suggested that current computational power should have vastly
increased the scale and complexity of robots evolved using
Simsโ and similar methods. Yet surveys of evolved robots
(e.g. [16], [5]) fail to exhibit any significant increase in size
or complexity.
A wide range of hypotheses for the lack of scalability
have been proposed. Some focused on a lack of efficient
evolutionary search algorithms [20], [24], [29] or genetic
encodings [21], [6], [10], while others pointed to a lack of
incentives for complexity in the simple tasks and environments [1], [7]. Yet attempts to evolve robots using methods
designed to overcome these challenges have yet to obviously
surpass Simsโ work in terms of complexity and scale. This
work investigates a different hypotheses, first suggested in [8],
that considers the way in which an agentโs brain and body plan
interact during the optimization process.
III. M ETHODS
A. The Interdependency of Body and Brain
We investigate the notion that the specialization of brain and
body plan to one another during evolution creates a fragile
co-dependent system that is not easily amenable to change.
This specialization creates local optima in the search space
and premature convergence to suboptimal designs. In this
paper, we explore a direct solution to the problem of fragile
coupled systems: explicitly readapting one subsystem (e.g. the
body plan or the brain) after each evolutionary perturbation
to the other. The proposed method differs from a traditional
evolutionary algorithm, which evaluates the fitness of a newly
proposed variation immediately (i.e. with no readaptation), and
uses only this valuation of fitness to determine the long term
potential of that variation.
As a thought experiment, consider a hypothetical robot with
a partially optimized body plan (for example a quadrupedal
form) and a partially optimized controller (for example the legs
swing forward and back through the sagittal plane). Suppose
that this controller has co-adapted to the morphology during
evolution such that for each step forward, the robot contracts
a muscle near its hip with enough force to swing one of its
legs forward with just enough force to land in front of the
body and successfully take a step. Consider a variation of this
morphology proposed by an evolutionary algorithm in which
the new robot possesses longer legs but the controller has not
changed.
If this machine were being evolved for rapid locomotion,
having longer legs and being able to take longer strides would
be beneficial and this variation should be more successful than
the original design. However, during evaluation of this new
robot, the original controller applies the same amount of force
to the now-longer leg, failing to move it, and thus frustrating
the robotโs ability to walk in a coordinated fashion. Current
evolutionary methods would treat this robot as the recipient
of a detrimental mutation and remove it from the population.
If all such variations display an immediate detrimental fitness
impact and are rejected (regardless of their long term potential), then the evolutionary algorithm has converged to a local
optima in the search space.
However, the newly proposed morphology would have
resulted in a robot which outperformed its predecessor, if
coupled with a controller suited to that morphology. We can
determine that the newly proposed morphology is superior
by suppressing mutations to that body plan and allowing
readaptation of its controller to properly coordinate behavior.
Herein lies the foundation for our proposed algorithm:
readapt each controller until the new proposed morphology
is more fit than its predecessor.
B. Controller Readaptation
The most obvious method for modeling controller readaptation would be to protect any lineage that has recently
experienced a mutation to the body plan by allowing it to
undergo several generations of evolutionary change restricted
to the control subsystem. If any member of the lineage
achieves higher fitness than the pre-mutation ancestor during
that time period, the descendant is retained. Otherwise, the
new morphological variant dies out.
However, it is unclear how to set the time period for this
protection a priori. Surely the amount of time a controller
takes to readapt to a new morphology depends on many
specific features of the complexity, genetic encoding, desired
behavior, and current ability level of the robot (which changes
over optimization time). Determining the correct value of this
parameter would require a full parameter sweep over various
values of readaptation time for each new combination of brain,
body, and environment. If our goal is simply to optimize a
robot, then searching for this value in each unique optimization
scenario is intractable.
C. Proposed Method: Morphological Innovation Protection
In response to the unintuitive nature of the optimal value
for readaptation length, our proposed approach is free of this
parameter. Descendants of robots that experience morphological mutations are retained in the population and the number of
generations that have elapsed since that mutation occurred are
tracked (referred to as the โmorphological ageโ of the robot). If
two individuals are found in the population such that the latter
robot exhibits better performance on the desired task and has
experienced fewer generations since a morphological mutation
than the former robot, this latter robot is said to โdominateโ
the former robot in this mutli-objective optimization (on โageโ
and โfitnessโ) โ and the former robot is removed from the
population. In effect, the latter robot has exhibited an ability
to not only recover from its ancestorโs morphological mutation
but improve upon it (and others in the population). The concept
of tracking age using it as an optimization objective are
borrowed from [20], [33]. The major difference here being
that the age refers to the length of time that a subsystem of
the agent (e.g. the morphology) has remained unvaried, rather
3
than (the original definition of) the total time since a random
individual was introduced to the population.
This procedure has the effect of โprotectingโ new morphologies with poorly adapted controllers, and thus we will
henceforth refer to this procedure as โmorphological innovation protection.โ This protection is a form a diversity maintenance, though reduced selection pressure for newly mutated
morphologies. Various other methods exist for encouraging
diversity (e.g. fitness sharing, crowding, random restart parallel
hillclimbers [18], novelty [24], or speciation [36]), however
age was chosen for its simplicity of implementation, its
parallels to multi-timescale learning in biology, and because
it helps to avoid the cost of extended control re-optimization
for non-promising morphologies โ since the the age-pareto
optimization allows fitness comparisons between all new
โchildโ morphologies that have had equal readaptation time,
even if they are not yet fully readapted (rather than making
comparisons only after a predefined amount of readaptation).
D. Evolutionary Algorithm
All optimization is performed by a population-based evolutionary algorithm. All trials follow a (ยต, ฮป)-Evolutionary
Strategy [3] with ยต = 25 parents and ฮป = 25 mutants for
a population size of 50. Trials last for 5000 generations.
Crossover was not considered in this work. Mutation had a
50% chance of creating a variation to either the morphology
or the controller of a given robot, but not both. Other ratios
of morphology:controller mutations were considered (1:99,
20:80, 50:50, 80:20, and 99:1), but none showed a significant
effect on resolving the premature convergence and resulting
fitness in preliminary trials without innovation protection.
E. Genetic Encoding for Soft Robot Morphologies
Consistent with prior work studying the co-optimization of
robot morphologies [10] and controllers [8], we choose soft
robots as our model system due to the open-ended complexity of deformable voxel-based morphologies and distributed
controllers. The soft robot morphologies are encoded with
a Compositional Pattern Producing Network (CPPN) [35].
The CPPN encoding produces the cell fate of each voxel in
the robot through a type of neural network that takes each
cellโs geometric location (x, y, z Cartesian coordinates and r
radial polar coordinate) and outputs a variety of โmorphogensโ
(in this work, there is one to determine whether a cell is
present in that location and one to determine whether a present
voxel should be a muscle or a passive tissue cell). Since
nearby voxels tend to have similar coordinate inputs, they also
tend to produce similar outputs from the network โ creating
continuous muscle or tissue patches. CPPNs also produce
complex geometric patterns, as the activation functions at
each node can take on a variety of functions (here: sigmoid,
sine, absolute value, negative absolute value, square, negative
square, square root, and negative square root). These functions tend to produce regular patterns and features across the
coordinate inputs (for example: an absolute value node with
an x input would produce left-right symmetry, or a sine node
with a y input would produce front-to-back repetition).
This network is optimized to produce high performing morphologies by iterating through various proposed perturbations
to it. These include the addition or removal of a node, or edge
to the network, as well as the mutation of the weight of any
edge or the activation function at each node.
F. Soft Robot Resolution
As the CPPN genetic encoding is a continuous function
(mapping the location of a cell to its cell fate) it may be
discretized into a phenotype at any resolution (i.e. creating
any number of voxels in the morphology, and a unique
controller for each voxel), and in practice this resolution is
only limited by computational resources (as more elements are
more computationally expensive to simulate). In the default
lower-resolution treatment, this discretization occurs over a
5 ร 5 ร 5 space. The higher-resolution robots use phenotypes
created at a 10 ร 10 ร 10 resolution. Note that the distance
values are noted in absolute number of voxels, so higher fitness
values tend to be produced by phenotypes of higher resolution.
G. Controllers and their Genetic Encoding
A unique controller is optimized for each muscle cell
in the robotโs morphology. For each voxelโs controller, two
parameters are optimized (the outputs of a separate CPPN with
the same inputs as before). One is the phase offset between
each individual cellโs muscle oscillations and that of the global
sinusoidal oscillator (which acts as a central pattern generator),
and the second is the frequency of this global clock (since
CPPNs donโt currently enable global parameters, this is done
by averaging the local values at each cell to produce a single
global value).
All controllers output a value between โ1 and 1 at each time
step, which corresponds to a linear change in each dimension
of a muscle cell (ยฑ14% of its original length, or ยฑ48% of its
original volume), defining a robotโs behavior. Passive tissue
cells remain at their original size (though they also deform
based on their intrinsic compliance).
While this encoding is simple and straightforward, it has the
ability to produce complex behaviors, such as multiple patches
of muscle groups that are in sync, counter-sync, or any real
valued phase offset from each other. It also has the ability to
produce gradually varying sweeps of phase offset, resulting in
propagating waves of excitation across large muscle groups.
Furthermore, the optimization of the global frequency is able
to produce oscillation speeds which are fine tuned to the
properties of individual morphologies (such as optimizing to
maximize the resonance of soft tissues in appendages).
The encoding of the morphology and the controller of the
robot into two separate CPPN networks emphasizes the false
dichotomy of robot brains and body plans. However, this
explicit separation allows us to make changes specific and
isolated to either the brain or the body. This is necessary
for the proposed algorithm, as controller readaptation requires
iterating through controller changes without affecting the
morphology.
4
H. Physics Simulation for Evaluation
Once the morphology and controller for a given robot are
specified, the fitness (locomotion distance) of that robot is
determined by constructing and simulating that robot in the
VoxCad soft-body physics simulator [19]. Simulations last for
20 actuation cycles (which may be a variable amount of time,
depending on the length of the globally optimized frequency โ
though this method of normalizing for the number of โstepsโ
taken leads to a more fair comparison than normalizing by the
amount of time per simulation).
I. Morphological Innovation Protection
In our newly proposed method we set the โmorphological
ageโ to zero for each new โchildโ that was the result of a
morphological mutation to a current individual in the population. This means that for an individual to have a large value in
their age objective, that individual must have been the result
of a large number of successive controller mutations without
any change to that robotโs body plan. This setup thus allows
a simple comparison method for individuals who have had
similar amounts of controller (re)adaptation to their current
morphologies โ as a dominated individual would have to have
been out-competed in fitness ability by a morphology that is
paired with a controller that is less-well adapted to it. This
diversity maintenance mechanism encourages the exploration
of new peaks in the rugged landscape of brain-body plans
โ with the implicit assumption that unique morphologies
correspond to peaks in this landscape.
The method of age resets corresponding to morphological mutations to existing individuals differs from the prior
technique (e.g. [20], [33]) of inserting completely random
individuals, as it allows the improvement in the fitness levels
of age-zero individuals over time. In the case of traditional
age-fitness optimization, age-zero individuals are drawn from
the same distribution of fitness values for random genotypes
regardless of when they are created. However, in the case
of morphological innovation protection, age-zero individuals
are not random and inherit many of the properties of their
parents โ meaning that they show higher fitness values over
time. To demonstrate this empirically, we performed linear
regression on the age-zero individuals from Fig. 2 (containing
morphological innovation protection), which showed a significant (p < 0.001) increase in fitness over time (from 18.715
at generation 0 to 22.916 at generation 5000). This confirms
a major difference between our proposed technique and the
standard approach of age-based diversity maintenance through
the introduction of random individuals.
J. Statistical Analysis
All treatments were performed for 30 independent trials,
with random seeds consistent between treatments. All plots
show mean values averaged across the most fit individual of
30 trials for each condition with shaded areas representing
95% bootstrapped confidence intervals of this average, and all
p-values are generated by a Wilcoxon Rank-Sum Test [37].
IV. R ESULTS
A. The Effect of Morphological Innovation Protection on
Fitness
For the task of locomotion ability (a standard task in
evolutionary robotics [5]), we first optimize the robots using
the traditional method of โgreedyโ fitness evaluations for our
selection criteria (where immediate locomotion ability determines survival in the population of candidate morphologies
โ i.e. with no โinnovation protectionโ). In this setup, the
traditional method produces robots with an average fitness of
21.717 voxels (with 95% bootstrapped confidence (CI) interval
of 19.457 to 22.426 voxels).
Additionally, we optimized robots in the same task and environment setup, but this time using โmorphological innovation
protectionโ for our selection method โ in which individuals can
only be out-competed by those with equal or lesser amounts
of controller (re)adaptation to their current morphologies.
This treatment produces significantly more effective robots
(p = 6.067 โ 10โ6 ), with a mean distance travelled of 31.953
voxels (and 95% CI of 28.157 to 36.511 voxels).
The increase in fitness shows that morphological innovation
protection is a more effective way of optimizing robots, yet it
does not conclusively demonstrate that the intuition of [8] is
correct, as that work demonstrated the asymmetric difficulty in
optimizing the morphology of a robot (as compared to optimizing its controller) and drew the hypotheses that this because the
morphology encapsulated the controller (acting as a translator
between the โlanguageโ of the โcognitiveโ functions and the
outside environment). While the above experiment does help
to support the intuition that the controller must readapt to a
new morphological encoding, it also introduces confounding
effects, such as the added population diversity afforded by
โprotectionโ and the added dimensionality of the search space
from its this protection age โ moving search from a singleobjective to multi-objective optimization problem.
To tease apart the influence of these two confounds, we
present a treatment where the controllers of the robot undergo
an equivalent protection to which the morphologies did in the
above experiment. In this treatment, individuals can only be
out-competed by others whose morphology has had equal or
lesser amounts of readaptation to their newly mutated controllers โ deemed โcontroller innovation protectionโ. This condition provides the potential advantages of multi-dimensional
search and the added diversity from temporary reductions in
selection pressure. Yet it does not rely on the idea of a broken
โmorphological language.โ In this treatment, robots locomote
22.049 voxels on average (95% CI of 20.726 to 22.641 voxels),
which fails to show a significant improvement over the singleobjective case of no protection (p = 0.240), and performs
significantly worse (p = 1.211 โ 10โ4 ) than the protection of
morphological innovations.
The fitness trajectories over evolutionary time (Fig. 1)
demonstrate a typical logarithmic fitness improvement over
the first 1000 generations or so, but then show a stagnation
for the traditional optimization procedure without innovation
protection. The mean fitness value of the treatment without
protection shows no significant improvement (p = 0.085)
5
turnover of morphologies, with just 10.115 unique robot body
plans doing so.
Fig. 1. The fitness impact (distance travelled, in voxels) over optimization
time (in generations) for various types of brain/body plan protection mechanisms. Values plotted represent the mean value of 30 independent trials, with
95% bootstrapped confidence intervals denoted by colorized regions.
from generation 1000 to 5000 (with average fitness values
of 20.988 and 21.717 voxels, respectively). Contrary to this,
the treatment with morphological innovation protection shows
significant improvements over this time (p = 0.013) from
25.925 at generation 1000 to 31.953 voxels at generation 5000.
The rapid improvement in the controller innovation protection and no protection cases during the first 1000 generations
does not contradict the hypotheses of a fragile โmorphological language,โ as the coupling between the morphology and
controller takes time to become established โ and would not
introduce fragility into the system before then.
B. The Effect of Morphological Innovation Protection on
Population Stagnation
Perhaps more telling than the average locomotion ability
at the end of optimization time is the examination of the
optimization process within each individual run. Figs. 2 and 3
represent typical runs, and help to give an intuition of the
optimization process. In these figures, each randomly colored
line represents a unique morphology, plotted by its locomotion
ability over optimization time.
Note the continued improvement in performance of the most
fit individual over optimization time in the case of morphological innovation protection (Fig. 2) โ which is consistent
with the trend seen on average in Fig. 1. This is not seen
in the case without innovation protection (Fig. 3), where the
best individual was found before generation 2000 โ and by
generation 1000, fitness has reached 99.6% of its final value.
Consistent with the above observation, we see that the most
fit individual in Fig 2 changes rapidly, continually turning
over in the trial with morphological innovation protection. As
each color in the figure represents a unique morphology, we
notice that a wide variety of different morphologies hold the
title of โbest-so-farโ. On average, in runs with morphological
innovation protection, 24.179 unique morphologies are the
best-so-far at some point in optimization, where the runs
without protection show significantly (p = 1.555 โ 10โ6 ) less
The question of how temporary reduced selection pressure
(via the morphological-age dimension) of morphological innovation protection may help to improve overall fitness and
continued optimization may be best demonstrated in the pop
out box for Fig. 2. Here we see the current best morphology,
in teal. This morphology was unable to improve on itself for
some time, as we see its fitness value (y-xais) flatlining. This
โparentโ morphology has a โchild,โ a new proposed variation
of its morphology, highlighted in red. As the original fitness
value of this morphology falls below its parent, this individual empirically shows worse performance than its parent
โ and thus would not be considered as a viable solution in
a traditional evolutionary method. However, since this new
morphology does not have a controller that is well adapted to
it (as the controller is specialized for the previous morphology,
in teal), morphological innovation protection does not expect
this new robot to immediately outperform its parent, and keeps
this individual in consideration as one which could hold long
term potential but does not show immediate promise.
Indeed, we see that after a number of controller optimization iterations later (occurring in equal amounts to both the
parent and child during this intermediate period), the child
morphology (in red) overtakes the parent morphology (in teal)
โ achieving higher fitness and demonstrating that it did indeed
hold a better long term potential than its parent, despite the
immediate drop in fitness. As the fitness of the parent is
outperformed by the child (which has had less time to fine-tune
its controller to its morphology), we assume that the parent is
unlikely to be the most promising robot body plan in the long
run, and thus remove it from the population.
We see this trend of โovertakesโ โ where children start out
with worse fitness than their parents, but eventually outperform
them โ continuing throughout this run (as the blue child then
overtakes the red parent, and green overtakes blue in the pop
out of Fig. 2). We see morphological overtakes significantly
(p โค 6.939 โ 10โ10 ) more often in runs with morphological
innovation protection (an average of 76.714 overtakes in the
first 5000 generations) than without any innovation protection
(where there are only 1.432 overtakes) or in the trials with
controller innovation protection (where there are just 1.333
morphological overtakes on average).
Interestingly, the number of morphological overtakes in the
morphological innovation protection treatment is not significantly different (p = 0.533) than the number of controller
overtakes in the controller innovation protection treatment
(where a โchildโ is a robot with a new controller variation,
that readapts its morphology to catch back up to its โparentโ
controller โ which happens 74.542 times on average). Combined with the finding in Fig. 1 that morphological innovation
protection outperforms the other two treatments, this suggests
a greater potential for the relative importance of morphological
overtakes over controller overtakes โ and again reinforces the
asymmetry between morphologies and controllers from an
optimization perspective.
6
Fig. 2. A single optimization trial featuring morphological innovation
protection. Each unique morphology is represented by a random color. The
pop out in this figure highlights an example of an โovertakeโ where the new
child morphology (in red) initially performs worse than its parent morphology
(in teal), only to outperform that previous morphology after successive control
optimization to both the parent and child.
Fig. 3. The fitness over time of a single optimization trial with the same initial
conditions as Fig. 2, but without any innovation protection. Again, each unique
color represents a unique morphology. The prevalence of colored dots filling
the space underneath the best performing individual, which represent new
morphologies which initially performed worse than the current best individual
and were thus rejected and thrown out of the population (as opposed to those
individuals which were protected and eventually led to โovertakesโ in Fig. 2).
pronounced in Fig. 6.
C. The Effects of Morphological Innovation Protection on the
Progression of Morphologies over Evolutionary Time
D. The Potential for Convergence Across Initial Conditions
Visual inspection of actual morphologies over evolutionary time further supports the proposed methodโs improved
optimization efficiency and ability to escape local optima.
Fig. 4 shows the current best individual at various points over
evolutionary time for each of the top 10 runs in the treatment
with morphological innovation protection. Note how the fitness
values of the robots increase over time (from left to right, and
indicated by the color of each robot). Also note how the final
morphology of some robots (e.g. runs 24, 27, 18, 11, and
16) result in identical morphologies, despite starting from a
range of starting morphologies and not finding this convergent
morphology until hundreds or thousands of generations into
the optimization process.
In contrast to the sustained turnover of morphologies shown
above, Fig. 5 shows the snapshots of the 10 best runs in the
treatment without innovation protection. Notice how the colors
of the robots tend to show little change over the evolutionary
process, mirroring the stagnation shown in Fig. 1. While
convergence of the final morphologies is present here as well,
the gross morphologies found here (variants of the a full cube
with no appendages) are found early on in the search โ and
often provided in the set of random initial morphologies. In
this treatment, gross morphological changes tend to be absent
after generation 50 (just 1% into the full 5000 generations).
The differences between Figs. 4 and 5 suggests that the
traditional method without morphological innovation protection tends to converge prematurely to morphologies early
in the evolutionary search, while morphological innovation
protection may allow search to escape these local optima
and converge to โmore globalโ optima. The convergence of
morphologies across varied initial conditions is even further
To explore the question of scale, we apply morphological
innovation protection to the evolution of robots with higher
resolution morphologies โ up to 103 = 1000 voxels rather
than the lower resolution morphologies (53 = 125 voxels)
employed in the previous experiments.
The increased number of voxel cells that make up each
robot allows for greater expressiveness and finer details in
its morphology. However this also presents a challenge for
the above algorithm. As the number of cells increases, the
effect of changing a single voxel (the minimum morphological
variation) is reduced. In the extreme, the concept of readapting controllers since the last โmorphological changeโ is less
straightforward โ as increasingly small changes can modify
minor details of the morphology without affecting its overall
function.
To help address the problem of non-functional morphology
changes, we introduce a parameter to represent the minimum
percentage of voxels that must be varied in order to qualify
as a โgross morphological changeโ. It is important to note
that this parameter is specific to the voxel-based soft robot
implementation employed in this work โ and thus the optimal
setting of this parameter is not of great importance for its
generalization outside of this soft robot encoding. But the
general concept of a threshold for the minimum morphological
change is a universal concept that could be applied to any robot
instantiation, as necessary.
In the case of robots with higher-resolution morphologies,
we find that resetting the โmorphological ageโ of an individual
only after a mutation that changes more than 20% of their
voxels produces optimal results. The value was found via a
parameter sweep (of minimum age-resets of 0%, 5%, 10%,
7
Fig. 4. The progression of morphologies over evolutionary time with
morphological innovation protection. Rows represent the top 10 (out of 30)
performing runs at generation 5000, while columns represent snapshots of
the morphology at various points during the optimization process. Note how
some of the runs converge upon the same morphology (a front and back
โleggedโ robot), despite starting from varying initial conditions. The color of
the morphologies represent their fitness values.
20%, 30%, 40%, and 50% of voxels changed). We also investigated a minimum change threshold for controller innovation
protection and found that its benefit falls as the threshold
increases (showing optimal performance with no threshold),
so we ignore the threshold for minimum controller change
here.
In this setting, basic morphological innovation protection
(with no threshold) travels significantly farther (60.728 voxels) than both the case with no protection (32.575 voxels,
p = 1.208 โ 10โ4 ) and the case with controller innovation
protection (35.375 voxels, p = 0.018). While trials employing
the threshold on morphological changes did achieve higher
average fitness than the case of morphological innovation
protection without a threshold (where robots traveled 43.340
voxels on average), this difference was not significant at the
p = 0.05 level (p = 0.063).
As a side note, in other more difficult trials (where the robots
need to optimize a closed-loop neural network controller โ
not depicted visually due to space constraints), trials with the
morphological change threshold significantly outperform all
other treatments (as they travel 31.313 voxels โ while trials
with no protection, controller protection, and morphological
innovation protection with no threshold travel 13.941, 15.356,
and 17.224 voxels, respectively; all p โค 7.287 โ 10โ8 ).
Fig. 5. The progression of morphologies over evolutionary time for the top 10
performing runs with no innovation protection. The color legend and column
snapshots times are identical to Fig. 4.
Visualization of these soft robot morphologies over time
in the trials with a 20% morphological change threshold is
depicted in Fig. 6 and compared to the case with no protection
in Fig. 7. The ability of evolution to converge to the same
high-performing morphology across many independent trials,
despite starting from different initial conditions suggests that
(in this particular soft robot implementation) the inclusion
of thresholded morphological innovation protection is able to
escape the local optima around these starting conditions and
find โmore globalโ optima in this search space.
In the case without any protection, search stagnates quickly
and again appears unable to escape the local optima near its
initial conditions (Fig. 7).
Interestingly, the low resolution soft robot implementation
(in Figs. 4 and 5) does not benefit from the inclusion of a
threshold. As presumably the more discrete construction of
these robots mean that all mutations are large enough to create
a meaningful โmorphological changeโ.
V. D ISCUSSION
The above results demonstrate a new method for entire robot
evolution (i.e. both brain and body-plan) that is more scalable
in terms of continued optimization for longer periods of time
and better resulting fitness than the traditional evolutionary
methods. This method for โmorphological innovation protectionโ helps prevent premature convergence to the many local
8
Fig. 6. The progression of morphologies over evolutionary time in the
setting with high-resolution morphologies and evolution with morphological
innovation protection with a 20% threshold. The rows represent the top
10 (of 30) independent trials, while the columns represent the progression
over evolutionary time. Color represent the fitness values of the robot (their
locomotion speed), with warmer values depicting more fit individuals. Note
the convergence of all 10 of these runs to the same final morphology.
optima which appear to be present in the rugged search space
of robot morphologies and controllers [8].
The hypothesis from [8] that the fragile co-optimization
of brain and body plan caused by specialization of one subcomponent to the other is consistent with the findings above.
This work also reveals that there is an asymmetry between the
brain and body plan: protecting innovations to the morphology
leads to more effective optimization that protecting innovations
to the controller.
The benefits of the temporarily reduced selection pressure
provided by morphological innovation protection suggests that
the long-term potential and immediate fitness impact of a
morphological mutation are not always correlated. Thus, we
require a form of diversity maintenance to help evolution
to rate proposed solutions based on their long-term potential
rather than on immediate fitness impact. As was shown here,
using morphological innovation protection for this purpose can
help to reduce premature convergence in the search space and
stagnation at suboptimal values.
We believe this to be the first example of a design automation algorithm for robotics that considers the interdependence
of neural controllers and body plans arising from the psychological theory of embodied cognition [30] and uses this
intuition to propose a method to escape local optima in the
Fig. 7. The progression of high-resolution morphologies over evolutionary
time for the top 10 performing runs with no innovation protection. The color
legend and column snapshots times are identical to Fig. 6.
fitness landscape.
Despite the significant improvement to our ability to simultaneously optimize the brain and body plan of embodied
robots, there is much work still to be done. Firstly, the
proposed method was only applied to one class of robot. This
class may actually represent the simplest form of brain-body
co-optimization because the distributed sensing, actuation, and
information processing that the cellular soft robot paradigm
was designed to possess helps to blur the line between physical
interactions of the morphology with the environment and
information processing of a controller [10], [9].
In the case of centralized controllers and robots composed
of rigid components, topological (rather than parametric)
changes to the cognitive architecture would be required for
control readaptation if morphological mutations add or remove
physical components (e.g. limbs). Future work should explore
the effect of morphological innovation protection in such
a paradigm, where there is the potential for morphological
changes to more drastically change the function of the robot
โ and thus for readaptation to those morphologies to play an
even more critical role in optimization.
In these experiments, the genotype encoding of the soft
robots was modularized such that one part of the genome
dictated the shape and material properties of the robot and a
separate part encoded the actuations in the form of volumetric
deformations of the voxels during behavior. In these robots
(and those with even more complex phenotypes), one can
9
envision different splits as to what constitutes morphology and
control โ and what qualifies as a โmorphological changeโ in
this proposed algorithm. It would be of interest to investigate
the effect of various splitting points of this dichotomy on the
efficacy of morphological innovation protection.
Furthermore, the very idea of a distinct split between body
and brain is a false dichotomy, as information processing and
physical processes happen throughout the agent [2]. Rather
than various mutation operators which affect only the โbrainโ
or the โbody-planโ of a robot, we desire agents that grown
and develop as the result of rich crosstalk and feedback loops
between the processes responsible for creating both of these
components (creating complex adaptive systems like we see
in biological organisms).
How this proposed method relates to, and informs, biological analogs not entirely clear, but some rough analogies
can be drawn. For example, the observation that brains learn
and adapt at a much faster rate than bodies grow fits into
this paradigm, as does the even slower change of gross
morphological features over evolutionary time. In this way, the
readaptation of controller strategies for varying body plans is
built into the neuroplasticity of the brain.
One could also imagine periods of evolutionary time when
an entire species is under relatively little morphological
selection pressure before an environmental shock suddenly
reapplies that pressure. Also possible are periods of a single individualโs lifetime when selection pressure varies: For
example, human infants may not be selected highly for their
locomotion speed, as their parents tend to physically carry and
protect them early in life.
We do not believe that the methods introduced here are
restricted to this particular domain. The above algorithm is
simple to implement (requiring only: an age counter, a check
for variations in brain and/or body for each mutation, and โ
optionally โ a criterion for the minimal gross morphological
change), and thus we believe it will be widely applicable.
Future work will test this supposition.
Due to the recent interest in co-optimization of neural
network topology and weights [15], [28], we should also note
that this work โ an agentโs controller embodied within its morphology โ is closely related to that of neural networkโs weights
embodied within its topology. Future work will show whether
the method proposed here will show similar optimization gains
in the design of neural network topologies as well.
VI. C ONCLUSION
We demonstrate an example of a robot design automation algorithm that considers the interdependence of neural
controllers and body plans (due to the theory of embodied
cognition) on the optimization process. We use this intuition to
temporarily reduce selection pressure on newly mutated robot
morphologies, thus allowing the agents to readapt their controllers and better escape local optima in the fitness landscape.
We have shown that this technique โ deemed โmorphological
innovation protectionโ โ produces evolutionary optimization
which delays premature convergence and stagnation, and results in more efficient evolved robots. We showcase the ability
of this technique to escape local optima in the search space
by demonstrating the convergence to a similar morphology
across many independent trials from randomly initial conditions. While we hope that this technique will be surpassed in
the future by a developmental process with feedback loops
between the body and brain, we propose the above algorithm
as a short term improvement over the current techniques for the
co-optimization of morphology and control in virtual creatures.
VII. ACKNOWLEDGMENT
We thank NASA Space Technology Research Fellowship #NNX13AL37H and Army Research Office Contract
#W911NF1610304 for support, Steve Strogatz for advice,
Kathryn Miller for copy editing, and the UVM Morphology,
Evolution & Cognition Lab for feedback.
R EFERENCES
[1] J. E. Auerbach and J. C. Bongard. Environmental influence on the
evolution of morphological complexity in machines. PLoS Comput Biol,
10(1):e1003399, 2014.
[2] F. Baluska and M. Levin. On having no head: Cognition throughout
biological systems. Frontiers in Psychology, 7:902, 2016.
[3] H.-G. Beyer and H.-P. Schwefel. Evolution strategiesโa comprehensive
introduction. Natural computing, 1(1):3โ52, 2002.
[4] J. Bongard. Morphological change in machines accelerates the evolution
of robust behavior. Proc. of the National Academy of Sciences,
108(4):1234โ1239, 2011.
[5] J. C. Bongard. Evolutionary robotics. Comm. of the ACM, 56(8):74โ83,
2013.
[6] J. C. Bongard and R. Pfeifer. Evolving complete agents using artificial
ontogeny. In Morpho-functional Machines: The new species, pages 237โ
258. Springer Japan, 2003.
[7] N. Cheney, J. Bongard, and H. Lipson. Evolving soft robots in tight
spaces. In Proceedings of the 2015 Annual Conference on Genetic and
Evolutionary Computation, pages 935โ942. ACM, 2015.
[8] N. Cheney, J. Bongard, V. SunSpiral, and H. Lipson. On the difficulty of
co-optimizing morphology and control in evolved virtual creatures. In
ALIFE XV, The Fifteenth International Conference on the Synthesis and
Simulation of Living Systems, volume 15, pages 226โ233. MIT Press.
[9] N. Cheney, J. Clune, and H. Lipson. Evolved electrophysiological soft
robots. In ALIFE 14: The Fourteenth Conference on the Synthesis and
Simulation of Living Systems, volume 14, pages 222โ229, 2014.
[10] N. Cheney, R. MacCurdy, J. Clune, and H. Lipson. Unshackling
evolution: evolving soft robots with multiple materials and a powerful
generative encoding. In Proc. of the 15th Genetic and Evol. Comp.
Conf., pages 167โ174. ACM, 2013.
[11] J. Chestnutt, M. Lau, G. Cheung, J. Kuffner, J. Hodgins, and T. Kanade.
Footstep planning for the honda asimo humanoid. In Robotics and Automation, 2005. ICRA 2005. Proceedings of the 2005 IEEE International
Conference on, pages 629โ634. IEEE, 2005.
[12] S. Collins, A. Ruina, R. Tedrake, and M. Wisse. Efficient bipedal
robots based on passive-dynamic walkers. Science, 307(5712):1082โ
1085, 2005.
[13] A. Cully, J. Clune, D. Tarapore, and J.-B. Mouret. Robots that can adapt
like animals. Nature, 521(7553):503โ507, 2015.
[14] D. Fanelli. Negative results are disappearing from most disciplines and
countries. Scientometrics, 90(3):891โ904, 2011.
[15] C. Fernando, D. Banarse, C. Blundell, Y. Zwols, D. Ha, A. A. Rusu,
A. Pritzel, and D. Wierstra. Pathnet: Evolution channels gradient descent
in super neural networks. arXiv preprint arXiv:1701.08734, 2017.
[16] T. Geijtenbeek and N. Pronost. Interactive character animation using
simulated physics: A state-of-the-art review. In Computer Graphics
Forum, volume 31, pages 2492โ2515. Wiley Online Library, 2012.
[17] T. Geijtenbeek, M. van de Panne, and A. F. van der Stappen. Flexible
muscle-based locomotion for bipedal creatures. ACM Transactions on
Graphics (TOG), 32(6):206, 2013.
[18] V. S. Gordon and D. Whitley. Serial and parallel genetic algorithms as
function optimizers. In ICGA, pages 177โ183, 1993.
[19] J. Hiller and H. Lipson. Dynamic simulation of soft multimaterial 3dprinted objects. Soft Robotics, 1(1):88โ101, 2014.
10
[20] G. S. Hornby. Alps: the age-layered population structure for reducing
the problem of premature convergence. In Proceedings of the 8th annual
conference on Genetic and evolutionary computation, pages 815โ822.
ACM, 2006.
[21] G. S. Hornby and J. B. Pollack. Body-brain co-evolution using lsystems as a generative encoding. In Proceedings of the 3rd Annual
Conference on Genetic and Evolutionary Computation, pages 868โ875.
Morgan Kaufmann Publishers Inc., 2001.
[22] M. Joachimczak, R. Suzuki, and T. Arita. Artificial metamorphosis:
evolutionary design of transforming, soft-bodied robots. Artificial life,
2016.
[23] C. G. Langton et al. Artificial life. Addison-Wesley Publishing Company
Redwood City, CA, 1989.
[24] J. Lehman and K. O. Stanley. Evolving a diversity of virtual creatures
through novelty search and local comp. In Proc. of 13th Genetic &
Evol. Comp. Conf, pages 211โ8. ACM, 2011.
[25] R. E. Lenski, C. Ofria, T. C. Collier, and C. Adami. Genome complexity, robustness and genetic interactions in digital organisms. Nature,
400(6745):661โ664, 1999.
[26] R. E. Lenski, C. Ofria, R. T. Pennock, and C. Adami. The evolutionary
origin of complex features. Nature, 423(6936):139โ144, 2003.
[27] S. Levine, C. Finn, T. Darrell, and P. Abbeel. End-to-end training of deep
visuomotor policies. Journal of Machine Learning Research, 17(39):1โ
40, 2016.
[28] R. Miikkulainen, J. Liang, E. Meyerson, A. Rawal, D. Fink, O. Francon,
B. Raju, A. Navruzyan, N. Duffy, and B. Hodjat. Evolving deep neural
networks. arXiv preprint arXiv:1703.00548, 2017.
[29] J.-B. Mouret and J. Clune. Illuminating search spaces by mapping elites.
arXiv preprint arXiv:1504.04909, 2015.
[30] R. Pfeifer and J. C. Bongard. How the body shapes the way we think:
a new view of intelligence. MIT press, 2006.
[31] R. Pfeifer, M. Lungarella, and F. Iida. Self-organization, embodiment,
and biologically inspired robotics. science, 318(5853):1088โ1093, 2007.
[32] M. Raibert, K. Blankespoor, G. Nelson, R. Playter, and T. B. Team.
Bigdog, the rough-terrain quadruped robot. In Proceedings of the 17th
world congress, volume 17, pages 10822โ10825. Proceedings Seoul,
Korea, 2008.
[33] M. Schmidt and H. Lipson. Age-fitness pareto optimization. In Genetic
Programming Theory and Practice VIII, pages 129โ146. Springer, 2011.
[34] K. Sims. Evolving virtual creatures. In Proceedings of the 21st annual
conference on Computer graphics and interactive techniques, pages 15โ
22. ACM, 1994.
[35] K. O. Stanley. Compositional pattern producing networks: A novel
abstraction of development. Genetic Programming and Evolvable
Machines, 8(2):131โ162, 2007.
[36] K. O. Stanley and R. Miikkulainen. Evolving neural networks through
augmenting topologies. Evolutionary computation, 10(2):99โ127, 2002.
[37] F. Wilcoxon and R. A. Wilcox. Some rapid approximate statistical
procedures. Lederle Laboratories, 1964.
[38] R. J. Wood. The first takeoff of a biologically inspired at-scale robotic
insect. IEEE transactions on robotics, 24(2):341โ347, 2008.
| 2cs.AI
|
Criteria for universality of quantum gates
Adam Sawicki1 and Katarzyna Karnas1โ
1
Center for Theoretical Physics PAS, Al. Lotnikรณw 32/46, 02-668, Warsaw, Poland
arXiv:1610.00547v6 [quant-ph] 17 May 2017
We consider the problem of deciding if a set of quantum one-qudit gates S = {U1 , . . . , Un } is
universal. We provide the compact form criteria leading to a simple algorithm that allows deciding
universality of any given set of gates in a ๏ฌnite number of steps. Moreover, for a non-universal S
our criteria indicate what type of gates can be added to S to turn it into a universal set.
Universal quantum gates play an important role in
quantum computing and quantum optics [15, 24, 30].
The ability to effectively manufacture gates operating on
many modes, using for example optical networks that
couple modes of light [9, 29], is a natural motivation to
consider the universality problems not only for qubits but
also for higher dimensional systems, i.e. qudits (see also
[27, 28] for fermionic linear optics and quantum metrology). For quantum computing with qudits, a universal
set of gates consists of all one-qudit gates together with
an additional two-qudit gate that does not map separable
states onto separable states [10] (see [11, 35โ37] for recent
results in the context of universal Hamiltonians). The set
of all one-qudit gates can be, however, generated using a
finite number of gates [23]. We say that one-qudit gates
S = {U1 , . . . , Un } โ SU (d) are universal if any gate from
SU (d) can be built, with an arbitrary precision, using
gates from S. It is known that almost all sets of qudit
gates are universal, i.e. non-universal sets S of the given
cardinality are of measure zero and can be characterised
by vanishing of a finite number of polynomials in the
gates entries and their conjugates [17, 23]. Surprisingly,
however, these polynomials are not known and it is hard
to find operationally simple criteria that decide one-qudit
gates universality. Some special cases of optical 3-mode
gates have been recently studied in [5, 32] and the approach providing an algorithm for deciding universality
of a given set of quantum gates that can be implemented
on a quantum automata has been proposed [13] (see also
[1, 2, 14] for algorithms deciding if a finitely generated
group is infinite). The main obstruction in the problems
considered in [5, 32] is the lack of classification of finite
subgroups of SU (d) for d > 4. Nevertheless, as we show
in this paper one can still provide some reasonable conditions for universality of one-qudit gates without this
knowledge.
The efficiency of universal sets is typically measured by
the number of gates that are needed to approximate other
gates with a given precision วซ. The Solovay-Kitaev theorem states that all universal sets are roughly the same
efficient. More precisely, the number of gates needed
to approximate any gate U โ SU (d) is bounded by
O(logc (1/วซ)) [26], where c may depend only on d and
c โฅ 1. Recently there has been a bit of flurry in the
โ
E-mail: [email protected], [email protected]
area of single qubit gates [3, 21, 22, 34] showing that using some number theoretic results and conjectures one
can construct universal sets with c = 1. The approach
presented in these contributions has been unified in [31]
where the author pointed out the connection of these new
results with the seminal work about distributing points
on the sphere S 2 [25] that uses results concerning optimal spectral gap for the averaging operator. Moreover,
the authors of [20] showed that the existence of the spectral gap implies c = 1 for all symmetric universal sets
of single qudit gates, where by symmetric we mean the
set S = {U1 , . . . , Un } with n = 2k and Uk+i = Uiโ1 for
i โ {1, . . . , k}. Although there are still some problems to
solve in this area it seems that any further progress would
require development of more advanced methods in pure
mathematics rather than in quantum information. These
developments should include verification of the spectral
gap conjecture. Currently it is known to be true under
the additional assumption that gates have algebraic entries [6, 7].
In this paper we present an approach that allows to decide universality of S by checking the spectra of the gates
and solving some linear equations whose coefficients are
polynomial in the entries of the gates and their complex
conjugates. Moreover, for non-universal S, our method
indicates what type of gates can be added to make S
universal. The paper is organised as follows. We start
from presenting basic facts concerning the adjoint representation of SU (d). The adjoint representations assigns
to every matrix U โ SU (d) a matrix AdU โ SO(d2 โ 1).
We give the explicit formula for AdU . The necessary
condition for universality (Lemmas 1 and 2) is then formulated using matrices AdU and AdU โ1 , where U โ S
and boils down to checking the dimension of the kernel
of the matrix MS given by (10). Next, we assume that
the necessary condition for universality is satisfied and
provide sufficient conditions for < S > to be infinite and
thus dense in SU (d). More precisely, if < S > contains at
least one element whose Hilbert-Schmidt distance from
d
Z(SU
โ (d)) = {ฮฑI : ฮฑ = 1} is both nonzero and less than
1/ 2 then < S > is infinite. Combining this with basic
results in number theory we arrive at our main results.
In Theorem 1 we state that S is universal if S contains
at least one matrix whose spectrum does not belong to
some finite list of exceptional spectra. We also provide the
algorithm which allows deciding universality of any given
set of gates S (also when S contains matrices with exceptional spectra) in a finite number of steps. We discuss
2
the correctness of the algorithm and provide instructive
examples for S โ SU (2).
I.
THE NECESSARY CONDITION FOR
UNIVERSALITY
Let us begin with introducing the basic notation used
in this paper and explaining the adjoint representation.
The set of gates S = {U1 , . . . , Un } โ SU (d) is called
universal if the set generated by elements of S
< S >:= {Ui1 ยท . . . ยท Uim : Uij โ S, m โ N}
(1)
is dense in SU (d), i.e. the closure < S > = SU (d). In
fact < S > is always a Lie group [33]. If this this group
is SU (d) we will say that S generates SU (d).
Let us denote by su(d) the Lie algebra of SU (d). Recall
that X โ su(d) iff X is an antihermitian traceless matrix.
Moreover, the Lie algebra su(d) is a real vector space
equipped with a nondegenerate positive inner product
defined by (X|Y ) = โ 21 trXY . For U โ SU (d) and X โ
su(d) we define
AdU X := U XU โ1 .
One easily checks that AdU is a linear operator acting
on su(d). It is also invertible as (AdU )โ1 = AdU โ1 and
preserves the inner product as
1
(AdU X|AdU Y ) = โ trU XU โ1 U Y U โ1 =
2
1
= โ trXY = (X|Y )
2
(2)
Therefore AdU is an orthogonal transformation acting on
d2 โ 1 dimensional vector space su(d). Upon a choice of
d2 โ1
an orthonormal basis {Xi }i=1
in su(d), i.e. basis that
statisfies (Xi |Xj ) = ฮดij the transformation AdU can be
expressed in this basis as a matrix belonging to SO(d2 โ
1), i.e AdtU AdU = I and det AdU = 1. The entries of this
matrix, (AdU )ij , are real and defined by the identity:
AdU Xj = U โ1 Xj U =
d
X
(AdU )ij Xi ,
(3)
i=1
thus they are give by
1
(AdU )ij = โ tr Xi U Xj U โ1 .
2
(4)
Ad : SU (d) โ SO(d2 โ 1),
(5)
Note that we also have AdU1 U2 = AdU1 AdU2 and this
way we obtain the homomorphism
that is known as the adjoint representation.
For a set of d ร d real matrices M , let us denote the
set of all d ร d matrices commuting with matrices from
M by
C(M ) = {L : [L, m] = 0, โm โ M }.
(6)
The adjoint representation of SU (d) is an absolutely irreducible real representation and therefore by the extended
version of Schurโs lemma [8, 19], the only (d2 โ1)ร(d2 โ1)
matrix that commutes with all matrices AdSU(d) =
{AdU : U โ SU (d)} is proportional to the identity matrix, I. In other words C(AdSU(d) ) = {ฮปI : ฮป โ R}.
Example 1. The adjoint representation for d = 2, i.e.
Ad : SU (2) โ SO(3) has a particularly nice form. Any
matrix from SU (2) can be written in a form
U (ฯ, ~k) = I cos ฯ + sin ฯ(kx X + ky Y + kz Z),
(7)
where Y = iฯ1 , X = iฯ2 , Z = iฯ3 and ฯi are Pauli
matrices, ~k = (kx , ky , kz )T satisfies kx2 + ky2 + kz2 = 1.
Similarly, any matrix from SO(3) has a form
O(ฯ, ~k) = I + sin ฯ(โkx X12 + ky X13 โ kz X23 )+
ฯ
+2 sin2 (โkx X12 + ky X13 โ kz X23 )2 ,
2
(8)
where Xij = Eij โ Eji , and Eij is a matrix whose only
non vanishing entry is (i, j). One easily verifies that the
adjoint representation is given by
AdU(ฯ,~k) = O(2ฯ, ~k).
(9)
For U โ SU (d), where d > 2 calculation of matrices
AdU can be done using formula (4) upon the choice of
orthonormal basis in su(d). For d = 3 this basis is given
by, for example, the Gell-Mann matrices multiplied by
imaginary unit i. For higher d one can construct an orthonormal basis of su(d) in an analogous way as for d = 3.
General considerations that can be found in [33] show
that the group < S > can be either:
1. < S > = SU (d), or
2. < S > is infinite and connected, or
3. < S > is infinite and consists of k < โ connected
components, where each component has the same
dimension (as a manifold), or
4. < S > is finite.
Note that in cases 1, 2, and 3 the group < S > has infinite number of elements. Thus we first provide criteria that distinguish between case 1 and cases 2 and 3.
To this end we will use the adjoint representation. For
S = {U1 , . . . , Un } โ SU (d) let AdS = {AdU : U โ S}.
Note that if [L, AdU1 ] = 0 and [L, AdU2 ] = 0 then
[L, AdU1 U2 ] = [L, AdU1 ]AdU2 + AdU1 [L, AdU2 ] = 0.
Thus if S generates SU (d) and L is a matrix that commutes with AdS then L commutes with AdSU(d) . Therefore for universal S we have C(AdS ) = C(AdSU(d) ) =
{ฮปI : ฮป โ R}. It turns out (see [33]) that the converse is true under one additional assumption, namely
that < S > is infinite.
3
Lemma 1. For a set of special unitary matrices
S = {U1 , . . . , Un } assume that < S > is infinite and
C(AdS ) = {ฮปI : ฮป โ R}. Then < S > = SU (d).
The proof of this lemma is based on the structure theory for semisimple Lie groups and can be found in [33].
Here we only make some additional remarks regarding
calculation of C(AdS ). Let vec(L) be the vectorisation
of matrix L, i.e. the vector obtained by stacking the
columns of the matrix L on top of one another. One
easily calculates that
[L, AdU ] = 0 โ (I โ AdU โ AdU โ โ I) vec(L) = 0,
where U โ is the complex conjugate and transpose of U ,
i.e. U โ = Uฬ t . Let
๏ฃถ
๏ฃซ
I โ AdU1 โ AdU โ โ I
1
๏ฃท
๏ฃฌ
..
MS = ๏ฃญ
(10)
๏ฃธ
.
I โ AdUn โ AdUnโ โ I
Lemma 2. C(AdS ) = {ฮปI : ฮป โ R} if and only if the
kernel of MS is one-dimensional.
We emphasise the role of the adjoint representation
which is crucial in Lemma 1. In particular there are infinite subgroups < S > such that C(S) = C(SU (d)) but
< S > 6= SU (d). In Example 1 we provide such a subgroup for d = 2. We next characterise space C(AdS ) for
SU (2).
Let us recall that the composition of two unitary matrices U (ฮณ, ~k12 ) = U (ฯ1 , ~k1 )U (ฯ2 , ~k2 ) is a unitary matrix
with ฮณ and ~k12 determined by:
~k12
cos ฮณ = cos ฯ1 cos ฯ2 โ sin ฯ1 sin ฯ2~k1 ยท ~k2 ,
1 ~
=
(k1 sin ฯ1 cos ฯ2 + ~k2 sin ฯ2 cos ฯ1 +
sin ฮณ
+~k1 ร ~k2 sin ฯ1 sin ฯ2 ).
(11)
(12)
Moreover, two unitary matrices U1 (ฯ1 , ~k1 ), U2 (ฯ2 , ~k2 )
commute iff ~k1 k ~k2 or ฯ = kฯ. Similarly two orthogonal
matrices O1 (ฯ1 , ~k1 ), O2 (ฯ2 , ~k2 )) commute if ~k1 k ~k2 or
one of ฯi โs is an even multiple of ฯ, or ฯ1 = ยฑฯ = ฯ2 and
~k1 โฅ ~k2 . Making use of these facts in [33] we show:
Fact 1. For noncommuting U1 (ฯ1 , ~k1 ), U2 (ฯ2 , ~k2 ), the
space C(AdU1 (ฯ1 ,~k1 ) , AdU2 (ฯ2 ,~k2 ) ) is larger than {ฮปI : ฮป โ
R} if and only if: (1) ฯ1 = kฯ
2 = ฯ2 , (2) one of ฯi โs is
kฯ
~
~
equal to 2 and k1 โฅ k2 , where k is an odd integer.
II.
WHEN IS < S > INFINITE?
We next describe the conditions under which < S >
is infinite. For U1 , U2 โ SU (d) the group commutator is defined as [U1 , U2 ]โข = U1 U2 U1โ1 U2โ1 . Note that
[U1 , U2 ] = 0 is equivalent to [U1 , U2 ]โข = I. The distance
between elements of SU (d) can be measured using the
โ
Hilbert-Schmidt norm ||U || = trU U โ . For two elements
U1 , U2 we have the following relation between their distances from the identity and the distance of their group
commutator from the identity [12]:
โ
||[U1 , U2 ]โข โ I|| โค 2||U1 โ I|| ยท ||U2 โ I||,
(13)
[U1 , [U1 , U2 ]โข ]โข = I and ||U2 โ I|| < 2 โ [U1 , U2 ]โข = I.
Let
1
Bฮฑ = {U โ SU (d) : kU โ ฮฑIk โค โ } โ SU (d),
2
(14)
be a ball of radius โ12 that is centred at elements ฮฑI. As
det ฮฑI = 1 we need to assume ฮฑd = 1. Let
[
B=
Bฮฑ .
(15)
ฮฑd =1
It turns out that noncommuting elements belonging to B
generate infinite subgroups of SU (d):
Lemma 3. Assume that [U1 , U2 ]โข โ
/ Z(SU (d)) and
U1 , U2 โ B. Then < U1 , U2 > is infinite.
One of the steps in the proof of lemma 3 uses relations
(13) to show that the sequence g0 = U1 , g1 = [U1 , U2 ]โข ,
gk = [gkโ1 , U2 ]โข converges to I and gn 6= I for any integer
n [17] (see [33] for the full discussion).
We next describe when U โ Bฮฑm , where ฮฑm = eiฮธm
and ฮธm = 2m
d ฯ. To this end note that
kU โ ฮฑm Ik2 = 2trI โ ฮฑm trU โ โ ฮฑโm trU.
(16)
As the trace of U is determined by its spectrum, the
desired condition can be expressed in terms of the eigenvalues of U that are given by {eiฯ1 , ..., eiฯd }, ฯi โ [0, 2ฯ[
P
and di=1 ฯi = 0 mod 2ฯ. Direct calculations lead to:
U โ Bฮฑm โ
d
X
i=1
sin2
ฯi โ ฮธm
1
< .
2
8
(17)
Let us next assume that U โ SU (d) does not belong to
B. Then one can show that there always exists an integer
n such that U n belongs to some Bฮฑ [33], ฮฑI โ Z(SU (d)).
For a given U , let nU be the smallest integer satisfying
this condition. In [33] we prove the modified version of
the Dirichletโs approximation theorem and use it to find
an upper bound for NSU(d) := maxU nU . This way, for
every U โ SU (d) there is 1 โค n โค NSU(d) such that
U n โ Bฮฑ for some ฮฑI โ Z(SU (d)). Thus by taking
powers 1 โค n โค NSU(d) we can move every element of
SU (d) into B. Assume next that the necessary condition
for universality is satisfied, i.e. C(AdS ) = {ฮปI : ฮป โ R}.
From Lemma 1 one can easily deduce that under the
assumption that < S > is infinite the intersection < S >
โฉB is dense in B. As we have shown in [33] the necessary
condition for universality places significant constrains on
the structure of < S > also in the case when < S > is a
4
finite group, namely we have that < S > โฉB is a subset
of Z(SU (d)). Thus < S > is finite if and only if there
are no elements in < S > that belong to B other than
those in Z(SU (d)). The above discussion is summarised
by:
Lemma 4. Let S = {U1 , . . . , Un } and assume that
C(AdS ) = {ฮปI : ฮป โ R}. Then < S > = SU (d) if and
only if there is at least one matrix U โ< S > that belongs
to B \ Z(SU (d)).
We know that every element of S can be put to B
by taking powers (that are bounded by NSU(d) ). Hence
when < S > is finite introducing U โ< S > to B must
be equivalent to introducing it to Z(G). This condition
can be phrased in terms of specra of the matrices from
S.
Definition 1. Assume U โ
/ B. The spectrum of U is
called exceptional if it consists of nth roots of ฮฑ โ C
where ฮฑd = 1 and 1 โค n โค NSU(d) .
The set of exceptional spectra is a finite set.
To illustrate the above ideas we find NSU(d) and the list
of exceptional spectra for d = 2. Note that for any U โ
SU (2) the spectrum is given by {eiฯ , eโiฯ } and therefore
is determined by one angle ฯ. The angle corresponding
to an exceptional spectrum will be called an exceptional
angle. Moreover, the centre of SU (2) consists of two
matrices Z(SU (2)) = {I, โI}. We start with recalling
the Dirichlet approximation theorem [16].
Fact 2 (Dirichlet). For a given real number b and a positive integer N there exist integers 1 โค n โค N and p such,
that nb differs from p by at most N1+1 , i.e.
|nb โ p| โค
1
.
N +1
(18)
Let [0, 2ฯ) โ ฯ = 2bฯ be the spectral angle of U . By
Fact 2 for a given N there are integers p and 1 โค n โค N
such that |nb โ p| โค N1+1 . Multiplying this inequality
by ฯ2 we obtain |n ฯ2 โ p ฯ2 | โค 2(Nฯ+1) . Note that (17)
1
simplifies to | sin ฯ2 | < 14 or | sin ฯโฯ
2 | < 4 . Thus for a
ฯ
given ฯ we search for n satisfying |n 2 โ p ฯ2 | < arcsin 14 .
ฯ
< arcsin 41 and
Thus 2(n+1)
nโค
ฯ
2
โ arcsin
arcsin 14
1
4
= 6.
(19)
The above upper bound for NSU(d) is attained for ฯ =
arcsin 14 (see figure 17). Hence NSU(2) = 6.
Exceptional spectra for SU (2), are determined by roots
of 1 or โ1 of order 1 โค n โค 6, or equivalently, by primitive roots of unity of order 1 โค n โค 6 and 8, 10, 12. More
precisely, they are given by {eiฮธ , eโiฮธ }, where
k2 ฯ k3 ฯ k4 ฯ k5 ฯ k6 ฯ
,
,
,
,
},
ฮธ โ {kฯ,
2
3
4
5
6
(20)
1
0.5
0
FIG. 1. Condition (17) for SU (2). The gray segments
are determined by | sin ฯ2 | < 14 and the white segments by
| sin ฯโฯ
| < 14 .
2
and gcd(ki , i) = 1. The number of exceptional angles
can be calculated
using
P6
P6 the Euler totient function, and
is equal i=1 ฯ(i) + i=4 ฯ(2i) = 24. For higher dimensional groups, as we discuss in [33], the number NSU(d)
grows exponentially with d. Our main result is:
Theorem 1. Assume that C(AdU1 , . . . , AdUn ) = {ฮปI :
ฮป โ R} and at least one matrix Ui has a nonexceptional
spectrum. Then < U1 , . . . , Un > = SU (d).
III. THE ALGORITHM FOR DECIDING
UNIVERSALITY OF S = {U1 , . . . , Un } โ SU (d)
The case when all matrices {U1 , . . . , Un } have exceptional spectra requires an algorithm which we next
present. Our algorithm allows deciding universality of
any given set of SU (d) gates in a finite number of steps.
The algorithm
Step 1: Check if C(AdS ) = {ฮปI : ฮป โ R}. This can
be done by checking the dimension of the kernel of
the matrix MS (10) constructed from the entries
of matrices {AdU1 , . . . , AdUn } and thus is a linear
algebra problem. If the answer is NO stop as the
set S is not universal. If YES, set l = 1 and go to
step 2.
Step 2: Check if there is a matrix U โ S for which U nU
belongs to B but not to Z(SU (d)), where 1 โค nU โค
NSU(d) . This can be done using formula (16). If the
answer is YES S is universal. If the answer is NO,
set l = l + 1.
Step 3: Define the new set S by adding to S words of
length l, i.e products of elements from S of length
l. If the new S is equal to the old one, the group
< S > is finite. Otherwise go to step 2.
The major advantage of our approach is the fact that
we can make decisions in steps 2 and 3 in finite โtimeโ.
It is also clear that for randomly chosen matrices S =
5
{U1 , . . . , Un } โ SU (d) our algorithm terminates with
probability 1 in Step 2 for l = 1. This is a direct consequence of the fact that exceptional spectra form a finite
set.
Let us next discuss the correctness of our algorithm.
Assume that S passes positively the necessary condition
for universality, i.e. the Step 1. If the group < S > is
finite the algorithm terminates in Step 3 for some finite
l. On the other hand, as a direct consequence of Lemma
4, for an infinite < S > the algorithm must terminate in
Step 2 for some finite l. One can also argue that if all
finite-length words have exceptional spectra then they
cannot form a dense subset. Thus if < S > is dense
then it must contain words of a finite length that have
non-exceptional spectra. These words terminate the algorithm in Step 2. Moreover, we have the following:
Fact 3. Assume < S > is dense in SU (d). The length
of a word that gives termination of the universality algorithm is at most the length l such that words of length
k โค l form an วซ-net that covers SU (d), where วซ = 2โ12+ฮด
and ฮด > 0 is arbitrary small.
Proof. Assume that words of the length k โค l built from
elements S form an วซ-net for SU (d), where วซ = 2โ12+ฮด
and ฮด > 0 is arbitrary small. Let U be an element of
1
SU (d) whose distance from the identity is exactly 2โ
2
(see Figure 2). Then by the definition of วซ-net there must
be at least one word w โ< S > of length k โค l contained
in the ball C of radius วซ = 2โ12+ฮด centred at U . But this
ball is contained in B1 \ I. Hence w gives termination of
the universality algorithm in Step 2. The result follows.
both ฯ1 and ฯ2 are exceptional angles and the product
U (ฯ12 , ~k12 ) = U (ฯ1 , ~k1 )U (ฯ2 , ~k2 ) has exceptional ฯ12 as
otherwise the algorithm terminates in Step 2 with either
l = 1 or l = 2. For each such pair (there are finitely many
of them) we find the Step and l that gives termination
of our algorithm. The detailed discussion of the results
and their connection to finite subgroups of SU (2) can
be found in [33]. In short words, it turns out that our
algorithm terminates at Step 2 if and only if 1 โค l โค 4
and at Step 3 when 5 โค l โค 13.
Fact 4. For S = {U (ฯ1 , ~k1 ), U (ฯ2 , ~k2 )} โ SU (2) the
algorithm for checking universality terminates for l โค
13. Moreover, the set S is universal if and only if the
algorithm terminates for l โค 4.
The main conclusion from Fact 4 is that one can decide universality of any two-element subset of SU (2) by
looking at words of the length at most 4.
IV.
EXAMPLES FOR SU (2)
In the remaining part of this paper we demonstrate our
approach calculating a few examples. They are chosen
particularly to elucidate the importance of the conditions
given by Theorem 1.
a. Example 1 Let S = {U (ฯ, ~k1 ), U (ฯ/2, ~k2 )},
where ~k1 โฅ ~k2 and ฯ1 is an irrational multiple ฯ. For
example, when ~k1 = (0, 0, 1) and ~k2 = (1, 0, 0), we have
โiฯ
e
0
0 1
~
.
U (ฯ, ~k1 ) =
,
U
(ฯ/2,
k
)
=
2
โ1 0
0 eiฯ
(21)
U (ฯ, ~k1 ) is of an infinite order and since U (ฯ, ~k1 ) and
U (ฯ/2, k~2 ) do not commute we have that < S > is infinite
and not abelian. By Fact 1, however,
C(AdU(ฯ,~k1 ) , AdU(ฯ/2,~k2 ) ) 6= {ฮปI : ฮป โ C},
and hence < S > 6= SU (2). For example O(ฯ, ~k1 ) โ
SO(3) commutes with both AdU(ฯ1 ,~k1 ) = O(2ฯ1 , ~k1 ) and
Ad
= O(ฯ, ~k2 ). Interestingly, however
~
U(ฯ/2,k2 )
C(U1 , U2 ) = {ฮปI : ฮป โ C}.
FIG. 2. The proof of Fact 3.
The formulation of Fact 3 is related to the results contained in [18].
In order to demonstrate how efficient is our algorithm
we determine the maximal l which gives its termination in
Step 2 and Step 3 respectively for SU (2). For simplicity
we consider S of the form S = {U (ฯ1 , ~k1 ), U (ฯ2 , ~k2 )} โ
SU (2). To this end it is enough to consider the case when
To understand the structure of the group < S > note that
U (ฯ/2, k~2 )U (ฯ1 , ~k1 )U โ1 (ฯ/2, k~2 ) = U โ1 (ฯ1 , ~k1 ). Hence
U (ฯ/2, k~2 ) is a normaliser of < U (ฯ1 , ~k1 ) >. Thus
the group < S > consists of two connected components.
The first one is given by one-parameter group U (t, ~k1 ),
where t โ R and the other one by elements of the form
U (ฯ/2, k~2 )U (t, ~k1 ). The adjoint representation is able
to identify infinite disconnected subgroups whereas the
defining representation is not. Moreover, we know exactly how to fix non-universality of the set S. For example, we can add one matrix U (ฮณ, ~kฮณ ) such that ฮณ 6= kฯ
and ~kฮณ is neither parallel nor orthogonal to ~k1 and ~k2 .
6
non-exceptional spectrum and whose ~k is neither
parallel nor orthogonal to ~kH and ~kTฯ/2 .
Case 3: For ฯ 6= kฯ
2 , again by Fact 1, C(AdH , AdT (ฯ) ) =
{ฮปI : ฮป โ R} and we just need to check if < H, Tฯ >
is infinite. We distinguish three possibilities:
1. We first assume that ฯ is not exceptional. Then
by Theorem 1 hH, Tฯ i = SU (2). Our algorithm
for deciding universality terminates at step 2 with
l = 1.
2. We next consider the exceptional angles. For
ฯโ{
FIG. 3.
Two component group generated by S
{U (ฯ, ~k1 ), U (ฯ/2, ~k2 )}.
=
b. Example 2 Let H be the Hadamard gate and
Tฯ a phase gate with an arbitrary phase ฯ:
i
H=โ
2
1 1
1 โ1
, Tฯ =
eโiฯ 0
0 eiฯ
.
(22)
Using our notation H = U (ฯ/2, ~kH ), where ~kH =
โ1 (0, 1, 1) and Tฯ = U (ฯ, ~
kTฯ ), where ~kTฯ = (0, 0, 1),
2
~k1 ยท ~k2 = โ1 .
2
Our goal is to check for which ฯ, < H, Tฯ > = SU (2).
Case 1: If ฯ = kฯ then Tฯ = ยฑI and the generated
group is the finite cyclic group of the order 4 when
ฯ = 0 or the order 8 when ฯ = ฯ.
Case 2: When ฯ = kฯ
2 and k is odd, by Fact 1 we have
that C(AdH , AdTฯ ) is larger than {ฮปI : ฮป โ R}
and hence < H, T kฯ > 6= SU (2). In fact it is the
2
finite dicyclic group of order 16 whose generators
are HT and T . Fixing universality in this case
requires, for example, adding a matrix that has a
[1] L. Babai, Proceedings of the Third Annual ACM SIAM
Symposium on Discrete Algorithms (Orlando, FL, 1992).
ACM, New York, pp. 33-40, (1992).
[2] L. Babai, R. Beals, D. N. Rockmore, Proc. of International Symposium on Symbolic and Algebraic Computation. ISSAC 93. ACM Press, pp. 117-126, (1993).
[3] A. Bocharov et al., Phys. Rev. A 88, 012313 (2013).
[4] A. Bรถttcher, D.Wenzel, Linear Algebra Appl. 429 (2008).
k3 ฯ k5 ฯ k6 ฯ
,
,
}, gcd(ki , i) = 1,
3
5
6
we look at the product U (ฮณ, ~kHT ) = HTฯ =
U (ฯ/2, ~kH )U (ฯ, ~kT ). Using formula (11) we calculate cos ฮณ, compare it with cos ฯ for all exceptional
angles ฯ and find out they never agree. Hence
ฮณ is not exceptional. Thus by Theorem 1 we get
< HTฯ > = SU (2). Our algorithm for deciding
universality terminates in Step 2 with l = 2.
3. We are left with ฯ = k44ฯ where gcd(k4 , 4) = 1.
There are exactly four such angles. Calculations of
U (ฮณ, ~kHTฯ ) = HTฯ shows that ฮณ is exceptional, i.e
ฮณ = k33ฯ , where gcd(k3 , 3) = 1. Moreover, taking
further products results in a finite subgroup consisting of 48 elements (all have exceptional spectra)
known as the binary octahedral group. Our algorithm for deciding universality terminates in Step 3
with l = 8. Fixing non-universality can be accomplished by, for example, adding one gate U (ฯ, ~kฯ )
with a non-exceptional ฯ and an arbitrary ~kฯ .
As we can see from the above example our algorithm
requires at most words of length l = 8 to terminate for
any H and Tฯ .
V.
ACKNOWLEDGMENT
We would like to thank the anonymous referees for
suggestions that led to improvements of the paper. This
work was supported by National Science Centre, Poland
under the grant SONATA BIS: 2015/18/E/ST1/00200.
[5] A. Bouland, S. Aaronson, Phys. Rev. A 89, 062316
(2014).
[6] J. Bourgain and A. Gamburd , J. Eur. Math. Soc. 014.5,
1455-1511, (2012).
[7] J. Bourgain and A. Gamburd, Invent. Math., 171, Issue
1, 83-12, (2008).
[8] T. Brรถcker and T. Dieck, Representations of Compact Lie Groups, Springer-Verlag, New York, MR
86i:22023,(1985).
7
[9] Y. Bromberg et al., Phys. Rev. Lett. 102, 253904 (2009).
[10] R. Bryliลski, G. Chen, Mathematics of Quantum Computation (Boca Raton, FL: Chapman and Hall/CRC Press,
2002)
[11] A. M. Childs et al. Quantum Info. Comput. 11, (2011).
[12] W. Curtis, I. Reiner, Representation theory of finite
groups and associative algebras (Interscience Publishers,
John Wiley and sons, 1962)
[13] H. Derksen et al., J. Symb. Comput. 39, 357-371, (2005).
[14] A. S. Detinko, D. L. Flannery, Journal of Symbolic Computation 44 1037-1043, (2009).
[15] D. Deutsch, Proc. Roy. Soc. Lond. A 425 (1989).
[16] G. H. Hardy, E.M. Wright, An introduction to the Theory of Numbers, Oxford at the Clarendon Press, (1960).
[17] M. Field, Proc. Amer. Math. Soc. 127 (2011).
[18] M. H. Freedman et al., Math. Res. Lett. 10, 11, (2003).
[19] B. C. Hall, Lie Groups, Lie Algebras and Representations: An Elementary Introduction, (Springer, GTM, 2nd
ed., 2015).
[20] A. W. Harrow et al., J. Math. Phys. 43, 4445-4451,
(2002).
[21] V. Kliuchnikov et al., arXiv:1510.03888, (2015).
[22] V. Kliuchnikov et al., IEEE Transactions on Computers,
vol.65, no. 1, pp. 161-172, (2016).
[23] M. Kuranishi, Nagoya Math. J. 2, (1951).
[24] S. Lloyd Phys. Rev. Lett. 75, 2 (1995).
[25] A. Lubotzky, et al., Comm. Pur. Appl. Math. 40, 4 401420, (1987).
[26] M. Nielsen, I. Chuang, Quantum Computation and Quantum Information (Cambridge University Press, 2000).
[27] M. Oszmaniec et al., Phys. Rev. A, vol. 90, p. 020302,
(2014).
[28] M. Oszmaniec et al., Phys. Rev. X 6, 041044 (2016).
[29] A. Politi et al., Science 320, (2008).
[30] M. Reck et al., Phys. Rev. Lett. 73, 1 (1994).
[31] P. Sarnak, Letter to Scott Aaronson and Andy Pollington
on the Solovay-Kitaev theorem, (2015).
[32] A. Sawicki, Quantum Info. Comput. 16, 3&4 (2016).
[33] A. Sawicki, K. Karnas, Universality of single qudit gates,
arXiv:1609.05780, (2016).
[34] P. Selinger, Quant. Inf. Comp. 15, 159-180 (2015).
[35] R. Zeier, T. Schulte-Herbrรผggen, J. Math. Phys. 52,
113510, (2011).
[36] R. Zeier, Z. Zimborรกs, J. Math. Phys. 56, 081702, (2015).
[37] Z. Zimborรกs et al., Phys. Rev. A 92, 042309 (2015).
| 4math.GR
|
Iterators, Recursors and Interaction Nets
Ian Mackie1 , Jorge Sousa Pinto2 , and Miguel Vilacฬงa2
[email protected],{jsp,jmvilaca}@di.uminho.pt
1
arXiv:0910.3321v1 [cs.PL] 17 Oct 2009
2
LIX, CNRS UMR 7161, Eฬcole Polytechnique, 91128 Palaiseau Cedex, France
Departamento de Informaฬtica / CCTC, Universidade do Minho, Braga, Portugal
Abstract. We propose a method for encoding iterators (and recursion
operators in general) using interaction nets (INs). There are two main
applications for this: the method can be used to obtain a visual notation for functional programs; and it can be used to extend the existing
translations of the ฮป-calculus into INs to languages with recursive types.
1
Introduction
The use of visual notations for functional programs has long been an active
research topic, whose main goal is to have a notation that can be used (i) to
define functional programs visually, and (ii) to animate their execution.
In this paper we propose a graphical system for functional programming,
based on token-passing INs [9]. The system offers an adequate solution for classic
problems of visual notations, including the treatment of higher-order functions,
pattern-matching, and recursion (based on the use of recursion operators). The
system implements a call-by-name semantics, with a straightforward correspondence between functional programs and graphical objects.
Most approaches to visual programming simply propose a notation for programs. Program evaluation is animated by representing visually the intermediate
programs that result from executing reduction steps on the initial program, using
the operational semantics of the underlying functional language. Our approach
is different in that we use a graph-rewriting formalism with its own semantics.
The advantages of using INs for visual programming are:
โ
โ
โ
โ
Both programs and data are represented in the same graphical formalism.
Programs can be animated without leaving the interaction formalism.
Pattern-matching for external constructors is in-built.
Recursive definitions are expressed very naturally as interaction rules involving agents that are reintroduced on the right-hand side.
But the interaction net formalism does not offer a satisfactory semantic interpretation for the behaviour of functional symbols. Moreover, many interaction
net systems can be defined that do not have a functional reading. What is missing is a clear correspondence between functional definitions and interaction systems.In this paper we establish a correspondence between agents with โobviously
functionalโ interaction rules and functions defined with recursion operators.
2
The Token-passing Encoding of the ฮป-calculus
The token-passing encodings [9] use an interaction system where two different
symbols exist for application: one is the syntactic symbol @ introduced by the
translation; the corresponding agents have their principal ports facing the root
b exists that will
of the term and will be depicted by triangles. A second symbol @
be used for computation; to simplify the figures, the corresponding agents will
be depicted by circles equally labelled with @. Their principal ports face the net
that represents the applied function, to make possible interaction with ฮป agents.
The translation Ttp (ยท) encodes terms in the system (ฮฃtp , Rtp ) where ฮฃtp =
b ฮป, c, ฮต, ฮด}. It generates nets containing no active pairs.The special sym{โ, @, @,
bol โ is used as an evaluation token: an agent โ traverses the net, transforming
b The evaluation rules involving โ can be tailored to a
occurrences of @ into @.
specific evaluation strategy. For call-by-name, Rtp consists of the following rules
which comprises evaluation rules involving โ and a computation rule involving
@ and ฮป. Management (copying and erasing) rules are omitted here.
To start the reduction a โ symbol must be connected to the root port of
the term. Let โ N denote such net; then the following correctness result holds:
t โ z iff โ Ttp (t) โโโ Ttp (z), where the evaluation relation ยท โ ยท is defined by
the standard evaluation rules for call-by-name.
The language used in this paper is the simply-typed ฮป-calculus extended with
natural numbers, booleans, lists, and iterators for these types. BNL is defined
by the following syntax for terms (x, y range over a set of variables):
t, u, v ::= x | ฮปx.t | t u | tt | ff | iterbool(t, u, v) | 0 | suc(t) | iternat(ฮปx.t, u, v)
| nil | cons(t, u) | iterlist(ฮปxy.t, u, v)
3
A Token-passing Encoding of BNL
We extend to BNL the token-passing call-by-name translation of the ฮป-calculus
into the interaction system (ฮฃtp , Rtp ). The novelty of this encoding is not the
token-passing aspect, but rather the approach to recursion.
We first consider data structures. In a token-passing implementation, there
will be an interaction rule between the token agent and each constructor symbol
that will stop evaluation. For BNL we define the system (ฮฃBNL , RBNL ) where
ฮฃBNL consists of the symbols tt, ff, 0 and nil with arity 0; suc with arity 1;
and cons with arity 2. Each recursive program will be encoded in an interaction
system specifically generated for it. This is a major novelty of our approach. The
interaction system for the ฮป-calculus will not be extended by introducing a fixed
set of symbols; instead a new symbol will be introduced for each occurrence of
a recursion operator, with an interaction rule for each different constructor, so a
dedicated interaction system (ฮฃt0 , Rt0 ) is generated for each term t. This system
is constructed by a recursive function (ฮฃt0 , Rt0 ) = S (t), defined as:
.
.
.
.
.
S (x) = S (tt) = S (ff) = S (0) = S (nil) = (โ
, โ
)
.
.
S (ฮปx.t) = S (suc(t)) = S (t)
.
.
S (t u) = S (cons(t, u)) = S (t) โช S (u)
.
d
Bool
S (iterbool(V, F, b)) = ({ItBool
V,F , ItV,F } โช ฮฃ, RItBool โช R),
V,F
where (ฮฃ, R) = S (b) โช S (V ) โช S (F ).
.
Nat
S (iternat(ฮปx.S, Z, n)) = ({ItNat , Itd
} โช ฮฃ, R
S,Z
S,Z
ItNat
S,Z
where (ฮฃ, R) = S (n) โช S (S) โช S (Z)
.
List
S (iterlist(ฮปxy.C, N, l)) = ({ItList , Itd
} โช ฮฃ, R
C,N
C,N
โช R)
ItList
C,N
โช R)
where (ฮฃ, R) = S (l) โช S (C) โช S (N )
RItList
consists of the following interaction rules (the others are similar).
C,N
...
c
Iterator symbols are introduced in pairs (It...
... , It... ) where the first symbol is
used for syntactic agents and the second for computation agents (similarly to
b
@, @).
A BNL program t will be translated into a net defined in the system (ฮฃt , Rt ) =
(ฮฃtp โช ฮฃBNL โช ฮฃt0 , Rtp โช RBNL โช Rt0 ) where (ฮฃtp , Rtp ) was defined in Section 2.
Given a BNL program t, where t is iterbool(V, F, b), iternat(ฮปx.S, Z, n) or
iterlist(ฮปxy.C, N, l), then the net T (t) is given as follows.
In token-passing implementations, all terms are translated as syntax trees.
Syntactic iterator agents i are turned into their computation counterparts bi by
token agents. A first key aspect of our approach is that the interaction rules of the
(computation) iterator agents internalise the iteratorโs parameters. For instance
the net T (iterlist(ฮปxy.C, N, cons(h, t))) reduces to โ T (C[h/x, iterlist(ฮปxy.C, N, t)/y]).
A second key aspect is that each such new symbol will have auxiliary ports
in a one-to-one correspondence with the free variables in the iterator term. We
end the section with a correctness result. The proofs can be found in [1].
Proposition 1. (Correctness) If t is a closed BNL term and z a canonical
form, then: t โ z โโ โ T (t) โโโ T (z).
4
Conclusions and Future Work
We have presented an approach to encoding in INs functional programs defined
with recursion operators, and given the full details of the application of this approach to the token-passing implementation of a call-by-name language, which
results in a very convenient visual notation for this language. The approach can
be easily extended to richer sets of recursive types and other recursion operators and also to new strategies. The novel characteristics of the encoding are
(i) the interaction system is generated dynamically from the program, and (ii)
the internalisation of some of the parameters of the recursion operator in the
interaction rules. With respect to previous work on encoding recursion in interaction nets, fixpoint operators have been studied elsewhere for interaction net
implementations [4, 6], and we have shown elsewhere how a binding recursion
operator (as in PCF) can be implemented in the token-passing setting [2].
A prototype system for visual functional programming has been developed,
integrated in the tool INblobs [3, 10] for interaction net programming. The tool
consists of an evaluator for interaction nets together with a visual editor and a
compiler module that translates programs into nets. The latter module allows
users to type in a functional program, visualize it, and then follow its evaluation
visually step by step. The current compiler module automatically generates callby-name or call-by-value systems. Additionally, a visual editing mode is available
that allows users to construct nets corresponding to functional programs. In
the current implementation there is no way to convert visual programs back to
textual ones.
The token-passing translation is not however very representative of most
work in this area, which has concentrated on designing efficient translations;
[5, 7, 8] are some samples. Let T (ยท) be one such translation. Typically T (t u) is
constructed from T (t) and T (u) by introducing an application symbol @ with
its principal port connected to the root port of T (t). Our treatment of iterators
can be adapted to this setting by removing the evaluator tokens and introducing
the iterator agents with the principal port immediately facing the argument.
When the iterated function is a closed term, a correctness result can be easily
established. Let ฮปx.S be a closed term, then T (iternat(ฮปx.S, Z, 0)) โโ T (Z)
and T (iternat(ฮปx.S, Z, suc(n))) โโ T (S[iternat(ฮปx.S, Z, n)/x])
References
1. J. B. Almeida, I. Mackie, J. S. Pinto, and M. Vilacฬงa. Encoding iterators in interaction nets. Available from http://www.di.uminho.pt/~jmvilaca.
2. J. B. Almeida, J. S. Pinto, and M. Vilacฬงa. Token-passing Nets for Functional
Languages. In J. Giesl, editor, Proceedings of the 7th International Workshop
on Reduction Strategies in Rewriting and Programming (WRSโ07), volume 204 of
Electronic Notes in Theoretical Computer Science, pages 181โ198, 2007.
3. J. B. Almeida, J. S. Pinto, and M. Vilacฬงa. A Tool for Programming with Interaction
Nets. In Proceedings of the The Eighth International Workshop on Rule-Based
Programming (RULEโ07), 2007. To appear in Elsevier ENTCS.
4. A. Asperti and S. Guerrini. The Optimal Implementation of Functional Programming Languages, volume 45 of Cambridge Tracts in Theoretical Computer Science.
Cambridge University Press, 1998.
5. G. Gonthier, M. Abadi, and J.-J. Leฬvy. The geometry of optimal lambda reduction. In Proceedings of the 19th ACM Symposium on Principles of Programming
Languages (POPLโ92), pages 15โ26. ACM Press, Jan. 1992.
6. I. Mackie. The geometry of interaction machine. In Proceedings of the 22nd ACM
Symposium on Principles of Programming Languages (POPLโ95), pages 198โ208.
ACM Press, January 1995.
7. I. Mackie. YALE: Yet another lambda evaluator based on interaction nets.
In Proceedings of the 3rd International Conference on Functional Programming
(ICFPโ98), pages 117โ128. ACM Press, 1998.
8. I. Mackie. Efficient ฮป-evaluation with interaction nets. In V. van Oostrom, editor, Proceedings of the 15th International Conference on Rewriting Techniques and
Applications (RTAโ04), volume 3091 of Lecture Notes in Computer Science, pages
155โ169. Springer-Verlag, June 2004.
9. F.-R. Sinot. Call-by-name and call-by-value as token-passing interaction nets. In
P. Urzyczyn, editor, TLCA, volume 3461 of Lecture Notes in Computer Science,
pages 386โ400. Springer, 2005.
10. M. Vilacฬงa. Inblobs webpage. http://haskell.di.uminho.pt/jmvilaca/INblobs/.
| 6cs.PL
|
Generalization without Systematicity:
On the Compositional Skills of Sequence-to-Sequence Recurrent Networks
Brenden Lake 1 2 Marco Baroni 2
arXiv:1711.00350v2 [cs.CL] 11 Feb 2018
Abstract
Humans can understand and produce new utterances effortlessly, thanks to their compositional
skills. Once a person learns the meaning of a
new verb โdax,โ he or she can immediately understand the meaning of โdax twiceโ or โsing and
dax.โ In this paper, we introduce the SCAN domain, consisting of a set of simple compositional
navigation commands paired with the corresponding action sequences. We then test the zero-shot
generalization capabilities of a variety of recurrent neural networks (RNNs) trained on SCAN
with sequence-to-sequence methods. We find that
RNNs can make successful zero-shot generalizations when the differences between training and
test commands are small, so that they can apply โmix-and-matchโ strategies to solve the task.
However, when generalization requires systematic compositional skills (as in the โdaxโ example
above), RNNs fail spectacularly. We conclude
with a proof-of-concept experiment in neural machine translation, suggesting that lack of systematicity might be partially responsible for neural
networksโ notorious training data thirst.
1. Introduction
Human language and thought are characterized by systematic compositionality, the algebraic capacity to understand
and produce a potentially infinite number of novel combinations from known components (Chomsky, 1957; Montague,
1970). For example, if a person knows the meaning and
usage of words such as โtwice,โ โand,โ and โagain,โ once
she learns a new verb such as โto daxโ she can immediately
understand or produce instructions such as โdax twice and
then dax again.โ This type of compositionality is central to
the human ability to make strong generalizations from very
1
Dept. of Psychology and Center for Data Science, New York
University 2 Facebook Artificial Intelligence Research. Correspondence to: Brenden Lake <[email protected]>, Marco Baroni
<[email protected]>.
limited data (Lake et al., 2017). In a set of influential and
controversial papers, Jerry Fodor and other researchers have
argued that neural networks are not plausible models of the
mind because they are associative devices that cannot capture systematic compositionality (Fodor & Pylyshyn, 1988;
Marcus, 1998; Fodor & Lepore, 2002; Marcus, 2003; Calvo
& Symons, 2014, a.o.).
In the last few years, neural network research has made
astounding progress in practical domains where success crucially depends on generalization. Perhaps most strikingly,
end-to-end recurrent neural networks currently dominate
the state-of-the-art in machine translation (Bojar et al., 2016;
Wu et al., 2016). Since the overwhelming majority of sentences or even word sequences in a language only occur
once, even in a large corpus (Baroni, 2009), this points
to strong generalization abilities. Still, it is commonly observed that neural networks are extremely sample inefficient,
requiring very large training sets, which suggests they may
lack the same algebraic compositionality that humans exploit, and they might only be sensitive to broad patterns over
lots of accumulated statistics (Lake et al., 2017).
In this paper, we introduce a grounded navigation environment where the learner must translate commands given in a
limited form of natural language into a sequence of actions.
This problem is naturally framed as a sequence-to-sequence
task, and, due to its simplicity, it is ideal to study systematic
generalization to novel examples in a controlled setup. We
thus use it to test a wide range of modern recurrent network
architectures in terms of their compositional abilities. Our
results suggest that standard architectures such as LSTMs
with attention (Bahdanau et al., 2015) generalize very well
when novel examples feature a mixture of constructions that
have been observed in training. However, the models are
catastrophically affected by systematic differences between
training and test sentences, of the sort that would be trivial
for an agent equipped with an โalgebraic mindโ (Marcus,
2003).
Generalization without Systematicity
2. The SCAN tasks
We call our data set SCAN because it is a Simplified version
of the CommAI Navigation tasks (Mikolov et al., 2016).1
For a learner, the goal is to translate commands presented in
simplified natural language into a sequence of actions. Since
each command is unambiguously associated to a single action sequence, SCAN (unlike the original CommAI tasks)
can be straightforwardly treated as a supervised sequenceto-sequence semantic parsing task (Dong & Lapata, 2016;
Jia & Liang, 2016; Herzig & Berant, 2017), where the input
vocabulary is given by the set of words used in the commands, and the output by the set of actions available to the
learner.
Several examples from SCAN are presented in Fig. 1. Formally, SCAN consists of all the commands generated by a
phrase-structure grammar (presented in the Appendix) and
the corresponding sequence of actions, produced according
to a semantic interpretation function (see Appendix). Intuitively, the SCAN grammar licenses commands denoting
primitive actions such as JUMP (denoted by โjumpโ; Fig. 1),
WALK (denoted by โwalkโ) and LTURN (denoted by โturn
leftโ). We will refer to these as primitive commands.2 It
also accepts a set of modifiers and conjunctions that compositionally build expressions referring to action sequences.
The โleftโ and โrightโ modifiers take commands denoting
undirected primitive actions as input and return commands
denoting their directed counterparts (โjump leftโ; Fig. 1).
The โoppositeโ modifier produces an action sequence that
turns the agent backward in the specified direction before executing a target action (โjump opposite leftโ), while โaroundโ
makes the agent execute the action at each step while turning around in the specified direction (โjump around rightโ;
Fig. 1). The โtwice/thriceโ modifiers trigger repetition of
the command they take scope over, and โand/afterโ combine two action sequences. Although the SCAN examples in
Fig. 1 focus on the โjumpโ/JUMP primitive, each instance of
JUMP can be replaced with either WALK, RUN, or LOOK
to generate yet more commands. Many more combinations
are possible as licensed by the grammar.
The SCAN grammar, lacking recursion, generates a finite
but large set of unambiguous commands (20,910, to be
precise). Commands can be decoded compositionally by
applying the corresponding interpretation function. This
means that, if it discovers the right interpretation function,
a learner can understand commands it has not seen during
training. For example, the learner might have only observed
the primitive โjumpโ command during training, but if it has
1
SCAN available at: https://ANONYMIZED
Introducing the primitive turning actions LTURN and
RTURN considerably simplifies the interpretation function, compared to capturing orientation by specifying arguments to the movement actions (e.g., JUMP[L], JUMP[R]).
2
learned the meaning of โafterโ, โtwiceโ and โaround leftโ
from other verbs, it should be able to decode, zero-shot, the
complex command: โjump around left after jump twiceโ.
3. Models and setup
We approach SCAN through the successful sequence-tosequence (seq2seq) framework, in which two recurrent networks work together to learn a mapping between input sequences and output sequences (e.g., Sutskever et al., 2014).3
Fig. 2 illustrates the application of the seq2seq approach
to a SCAN example. First, a recurrent network encoder
receives the input sequence word-by-word, forming a lowdimensional representation of the entire command. Second,
the low-dimensional representation is passed to a recurrent
network decoder, which then generates the output sequence
action-by-action. The decoderโs output is compared with
the ground truth, and the backpropagation algorithm is used
to update the parameters of both the encoder and decoder.
Note that although the encoder and decoder share the same
network structure (e.g., number of layers and hidden units),
they do not otherwise share weights/parameters with each
other. More details regarding the encoder-decoder RNN are
provided in the Appendix.
Using the seq2seq framework, we tested a range of standard
recurrent neural network models from the literature: simple
recurrent networks (SRNs; Elman, 1990), long short-term
memory networks (LSTMs; Hochreiter & Schmidhuber,
1997), and gated recurrent units (GRUs; Chung et al., 2014).
Recurrent networks with attention have become increasingly
popular in the last few years, and thus we also tested each
network with and without an attentional mechanism, using
the model from Bahdanau et al. (2015) (see Appendix for
more details). Finally, to make the evaluations as systematic
as possible, a large-scale hyperparameter search was conducted that varied the number of layers (1 or 2), the number
of hidden units per layer (25, 50, 100, 200, or 400), and
the amount of dropout (0, 0.1, 0.5; applied to recurrent layers and word embeddings). Varying these hyperparameters
leads to 180 different network architectures, all of which
were run on each experiment and replicated 5 times each
with different random initializations.4
In reporting the results, we focus on the overall-best architecture as determined by the extensive hyperparameter
search. The winning architecture was a 2-layer LSTM with
200 hidden units per layer, no attention, and dropout
applied at the 0.5 level. Although the detailed analyses to
follow focus on this particular model, the top-performing ar3
Very recently, convolutional seq2seq networks have reached
comparable or superior performance in machine translation
(Gehring et al., 2017). We will investigate them in future work.
4
A small number of runs (23/3600) did not complete, and thus
not every network had 5 runs.
Generalization without Systematicity
jump
jump left
jump around right
turn left twice
jump thrice
jump opposite left and walk thrice
jump opposite left after walk around left
โ
โ
โ
โ
โ
โ
โ
JUMP
LTURN JUMP
RTURN JUMP RTURN JUMP RTURN JUMP RTURN JUMP
LTURN LTURN
JUMP JUMP JUMP
LTURN LTURN JUMP WALK WALK WALK
LTURN WALK LTURN WALK LTURN WALK LTURN WALK
LTURN LTURN JUMP
Figure 1. Examples of SCAN commands (left) and the corresponding action sequences (right).
JUMP
jump
twice
and
walk
<EOS>
<SOS>
JUMP
JUMP
WALK
JUMP
<EOS>
WALK
Figure 2. The seq2seq framework is applied to SCAN. The symbols <EOS> and <SOS> denote end-of-sentence and start-ofsentence, respectively. The encoder (left) ends with the first
<EOS> symbol, and the decoder (right) begins with <SOS>.
4. Experiments
In each of the following experiments, the recurrent networks
are trained on a large set of commands from the SCAN tasks
to establish background knowledge as outlined above. After
training, the networks are then evaluated on new commands
designed to test generalization beyond the background set
in systematic, compositional ways. In evaluating these new
commands, the networks must make zero-shot generalizations and produce the appropriate action sequence based
solely on extrapolation from the background training.
Experiment 1: Generalizing to a random subset of
commands
chitecture for each experiment individually is also reported
and analyzed.
Networks were trained with the following specifications.
Training consisted of 100,000 trials, each presenting an
input/output sequence and then updating the networks
weights.5 The ADAM optimization algorithm was used
with default parameters, including a learning rate of 0.001
(Kingma & Welling, 2014). Gradients with a norm larger
than 5.0 were clipped. Finally, the decoder requires the
previous stepโs output as the next stepโs input, which was
computed in two different ways. During training, for half the
time, the networkโs self-produced outputs were passed back
to the next step, and for the other half of the time, the groundtruth outputs were passed back to the next step (teacher
forcing; Williams & Zipser, 1989). The networks were
implemented in PyTorch and based on a standard seq2seq
implementation.6
Training accuracy was above 99.5% for the overall-best
network in each of the key experiments, and it was at least
95% or above for the top-performers in each experiment
specifically.
5
Note that, in all experiments, the number of distinct training
commands is well below 100k: we randomly sampled them with
replacement to reach the target size
6
The code we used is publicly available at the link:
http://pytorch.org/tutorials/intermediate/
seq2seq_translation_tutorial.html
In this experiment, the SCAN tasks were randomly split
into a training set (80%) and a test set (20%). The training
set provides broad coverage of the task space, and the test
set examines how networks can decompose and recombine
commands from the training set. For instance, the network is
asked to perform the new command, โjump opposite right
after walk around right thrice,โ as a zero-shot generalization in the test set. Although the conjunction as a whole is
novel, the parts are not: The training set features many examples of the parts in other contexts, e.g., โjump opposite
right after turn opposite rightโ and โjump right twice after
walk around right thriceโ (both bold sub-strings appear
83 times in the training set). To succeed, the network needs
to generalize by recombining pieces of existing commands
to interpret new ones.
Overall, the networks were highly successful at generalization. The top-performing network for this experiment
achieved 99.8% correct on the test set (accuracy values here
and below are averaged over the five training runs). The topperforming architecture was a LSTM with no attention, 2
layers of 200 hidden units, and no dropout. The best-overall
network achieved 99.7% correct. Interestingly, not every
architecture was successful: Classic SRNs performed very
poorly, and the best SRN achieved less than 1.5% correct at
test time (performance on the training set was equally low).
However, attention-augmented SRNs learned the commands
much better, achieving 59.7% correct on average for the test
set (with a range between 18.4% and 94.0% across SRN
Generalization without Systematicity
value of 4 times.
Experiment 2: Generalizing to commands demanding
longer action sequences
Figure 3. Zero-shot generalization after training on a random subset of the SCAN tasks. The overall-best network was trained on
varying proportions of the set of distinct tasks (x-axis) and generalization was measured on new tasks (y-axis). Each bar shows the
mean over 5 training runs with corresponding ยฑ1 SEM.
architectures). For LSTMs and GRUs, attention was not essential, since many of the highest performing architectures
did not use it.
As indicated above, the main split was quite generous, providing 80% of the commands at training time for a total of
over 16,700 distinct examples (with strong combinatorial
coverage). We next re-trained the best-overall network with
varying numbers of distinct examples (the actual number
of training presentations was kept constant at 100K). The
results are shown in Fig. 3. With 1% of the commands
shown during training (about 210 examples), the network
performs poorly at about 5% correct. With 2% coverage,
performance improves to about 54% correct on the test set.
By 4% coverage, performance is about 93% correct. Our results show that not only can networks generalize to random
subsets of the tasks, they can do so from relatively sparse
coverage of the compositional command space. This is well
in line with the success of seq2seq architectures in machine
translation, where most test sentences are likely never encountered in training. Still, even with this sparser coverage,
differences between training and test instances are not dramatic. Let us for example consider the set of all commands
without a conjunction (e.g., โwalk around thriceโ, โrunโ,
โjump opposite left twiceโ). All the commands of this sort
that occur in the test set of the 2% training coverage split
(either as components of a conjunction or by themselves)
also occur in the corresponding training set, with an average
of 8 occurrences. Even for the 1% split, there is only one
conjunction-less test command that does not also occur in
the training split, and the frequency of occurrence of such
commands in the training set is at a non-negligible average
We study next a more systematic form of generalization,
where models must bootstrap to commands requiring longer
action sequences than those seen in training.7 Now the training set contains all 16,990 commands requiring sequences
of up to 22 actions, whereas the test set includes all remaining commands (3,920, requiring action sequences of lengths
from 24 to 48). Under this split, for example, at test time the
network must execute the command โjump around left twice
and walk opposite right thriceโ, requiring a sequence of 25
actions. Although all the elements used in the command
have been observed during training, the network has never
been asked to produce a sequence of this length, nor it has
ever seen an โaround * twiceโ command conjoined with an
โopposite * thriceโ command (although it did observe both
components conjoined with others). Thus, it must productively generalize familiar verbs, modifiers and conjunctions
to generate longer action sequences. This is a fair task for
a system that is correctly translating the input commands.
If you know how to โwalk around,โ how to โjump,โ and the
function of the โandโ conjunction, you will be immediately
able to โwalk around and jump,โ even if you have never
performed an action sequence of that length.
This test turns out to be very challenging for all models. The
best result (20.8% on average, again over 5 runs) is achieved
by a GRU with attention, one 50-dimensional hidden layer,
and dropout 0.5 (interestingly, a model with considerably
less capacity than the best for the random-split setup). The
overall-best model achieves 13.8% accuracy.
Fig. 4 (top) shows partial success is almost entirely explained by generalization to the shortest action sequence
lengths in the test set. Although we might not expect even
humans to be able to generalize to very long action sequences, the sharp drop between extrapolating to 25 and
26 actions is striking. The bottom panel of Fig. 4 shows
accuracy in the test set organized by command length (in
word tokens). The model only gets right some of the longest
commands (8 or 9 tokens). In the training set, the longest action sequences (โฅ20) are invariably associated to commands
containing 8 or 9 tokens. Thus, the model is correctly generalizing only in those cases that are most similar to training
instances.
7
We focus on action sequence length rather than command
length since the former exhibits more variance (1-48 vs. 1-9). The
longest commands (9 words) are given by the conjunction of two
directed primitives both modified twice, e.g.: โjump around left
twice and run opposite right thrice.โ On the other hand, a relatively
short command such as โjump around left thriceโ demands 24
actions.
Accuracy on new commands (%)
Generalization without Systematicity
a strong effect of action sequence length, with average accuracy ranging from 95.76% for commands requiring 24
actions to 22.8% for commands requiring 48 actions).
100
80
Experiment 3: Generalizing composition across
primitive commands
60
40
20
0
24 25 26 27 28 30 32 33 36 40 48
Accuracy on new commands (%)
Ground-truth action sequence length
100
80
60
40
20
0
4
6
7
8
Command length
9
Figure 4. Zero-shot generalization to commands with action sequence lengths not seen in training. Top: accuracy distribution by
action sequence length. Bottom: accuracy distribution by command length (only lengths attested in the test set shown, in both
cases). Bars show means over 5 runs of overall-best model with
ยฑ1 SEM.
Finally, we studied whether the difficulty with long sequences can be mitigated if the proper length was provided
by an oracle at evaluation time.8 If this difficulty is a relatively straightforward issue of the decoder terminating too
early, then this should provide an (unrealistic) fix. If this
difficulty is symptomatic of deeper problems with generalization, then this change will have only a small effect. With
the oracle, the overall-best network performance improved
from 13.8% to 23.6% correct, which was notable but insufficient to master the long sequences. The top-performing
model showed a more substantial improvement (20.8% to
60.2%). Although improved, the networks were far from perfect and still exhibited key difficulties with long sequences
of output actions (again, even for the top model, there was
8
Any attempt from the decoder to terminate the action sequence with an <EOS> was ignored (and the second strongest
action was chosen) until a sequence with proper length was produced.
Our next test is closest to the โdaxโ thought experiment presented in the introduction. In the training phase, the model
is exposed to the primitive command only denoting a certain
basic action (e.g., โjumpโ). The model is also exposed to
all primitive and composed commands for all other actions
(e.g., โrunโ, โrun twiceโ, โwalkโ, โwalk opposite left and
run twiceโ, etc.). At test time, the model has to execute
all composed commands for the action that it only saw in
the primitive context (e.g., โjump twiceโ, โjump opposite
left and run twiceโ, etc.). According to the classic thought
experiments of Fodor and colleagues, this should be easy:
if you know the meaning of โrunโ, โjumpโ and โrun twiceโ,
you should also understand what โjump twiceโ means.
We run two variants of the experiment generalizing from
โturn leftโ and โjumpโ, respectively. Since โturn rightโ is
distributionally identical to โturn leftโ (in the sense that
it occurs in exactly the same composed commands) and
โwalkโ, โrunโ and โlookโ are distributionally identical to
โjumpโ, it is redundant to test all commands. Moreover, to
ensure the networks were highly familiar with the target
primitive command (โjumpโ or โturn leftโ), it was overrepresented in training such that roughly 10% of all training
presentations were of the command.9
We obtain strikingly different results for โturn leftโ and
โjumpโ. For โturn leftโ, many models generalize very well to
composed commands. The best performance is achieved by
a GRU network with attention, one layer with 100 hidden
units, and dropout of 0.1 (90.3% accuracy). The overallbest model achieved 90.0% accuracy. On the other hand, for
โjump,โ models are almost completely incapable to generalize to composed commands. The best performance was
1.2% accuracy (LSTM, attention, one layer, 100 hidden
units, dropout 0.1). The overall-best model reached 0.08%
accuracy.
In the case of โturn leftโ, although models are only exposed
to the primitive command during training, they will see
the action it denotes (LTURN) many times, as it is used to
accomplish many directed actions. For example, a training
example is: โwalk left and jump leftโ, with ground-truth
interpretation: LTURN WALK LTURN JUMP. Apparently,
seeing action sequences containing LTURN suffices for
the model to understand composed commands with โturn
leftโ, probably because the model receives direct evidence
9
Without over-sampling, performance was consistently worse
than what we report.
Generalization without Systematicity
Table 1. Nearest training commands for a sample of commands, with the respective cosines. Here, โjumpโ was trained in isolation while
โrunโ was trained compositionally. Italics mark low similarities (cosine <0.2).
run
jump
look
walk
.73
.65
run
walk
.15
.13
walk after run
.55
turn right
.12
run thrice
after run
run twice
after run
.50
look right twice
after walk twice
turn right
after turn right
.09
.49
.09
run twice
look twice
run twice and
look opposite right thrice
run twice and
run right twice
run twice and
look opposite right twice
walk twice and run twice
about how LTURN is used in context. On the other hand,
the action denoted by โjumpโ (JUMP) only occurs with
this primitive command in training, and the model does
not generalize from this minimal context to new composed
ones.
We now take a closer look at the results, focusing on the
median-performance run of the overall-best model (as the
most representative run of this model). We observe that
even in the successful โturn leftโ case model errors are
surprising. One would expect such errors to be randomly
distributed, or perhaps to pertain to the longest commands or
action sequences. Instead, all 45 errors made by the model
are conjunctions where one of the components is simple
โturn leftโ (22 cases) or โturn left thriceโ (23 cases). This
is particularly striking because the network produced the
correct mapping for โturn leftโ during training, as well as
for โturn left thriceโ at test time, and it gets many more
conjunctions right (ironically, including โturn left thrice
and turn leftโ, โturn left thrice after turn leftโ etc.). We
conclude that, even when the network has apparently learned
systematic composition almost perfectly, it got at it in a very
non-human-like way. Itโs hard to conceive of someone who
understood the meaning of โturn leftโ, and โjump right and
turn left twiceโ (which the network gets right), but not that of
โjump right and turn leftโ (one of the examples the network
missed). In the โjumpโ experiment, the network could only
correctly decode two composite cases, both starting with the
execution of primitive โjumpโ, conjoined with a different
action: โjump and run opposite rightโ, โjump and walk
around left thriceโ.
It is instructive to look at the representations that the network induced for various commands in the latter experiment.
Table 1 reports the 5 nearest neighbours for a sample of
commands. Command similarity is measured by the cosine
between the final encoder hidden state vectors, and computed with respect to all commands present in the training
set. โRunโ is provided as an example primitive command
for which the model has been exposed to the full composed
paradigm in training. As one would expect, โrunโ is close
.72
.65
.64
jump twice
walk and walk
run and walk
.19
.16
.12
.63
walk opposite right
and walk
look right and walk
.63
walk right and walk
.11
.12
to the other primitive commands (โlookโ, โwalkโ), as well
as to short conjoined commands that contain primitive โrunโ
as one of the conjuncts (we observe a similar pattern for
the non-degenerate โjumpโ representation induced in Experiment 1). Instead, since โjumpโ had a different training
distribution than the other primitive commands, the model
does not capture its similarity to them, as shown by the
very low cosines of its nearest commands. Since it fails to
establish a link to other basic commands, the model does
not generalize modifier application from them to โjumpโ.
Although โrun twiceโ is similar to (conjunctions of) other
primitive tasks composed with โtwiceโ, โjump twiceโ is
isolated in representational space, and its (far) nearest neighbours look arbitrary.
We tested here systematicity in its purest form: the model
was only exposed to โjumpโ in isolation, and asked to bootstrap to its compositional paradigm based on the behaviour
of other primitive commands such as โwalkโ, โlookโ and
โrunโ. Although we suspect humans would not have problems with this setup, it arguably is too opaque for a computational model, which could lack evidence for โjumpingโ
being the same sort of action as โwalkingโ. Suppose we give
the network some evidence that โjumpingโ composes like
โwalkingโ by showing a few composed โjumpโ command
during training. Is the network then able to generalize to the
full composed paradigm?
This question is answered in Figure 5. Again, the new primitive command (and its compositions) were over-sampled
during training to make up 10% of all presentations. Here,
even when shown 4 different composed commands with
โjumpโ at training time, the network does not generalize to
other composed commands (4.1% correct). Weak generalization starts appearing when the network is presented 8
composed tasks in training (15.3%), and significant generalization (still far from perfect) shows up when the training
set contains 16 and especially 32 distinct composed commands (70.2% and 89.9%, respectively). We conclude that
the network is not failing to generalize simply because, in
the original setup, it had no evidence that โjumpโ should
Generalization without Systematicity
Figure 5. Zero-shot generalization after adding the primitive โjumpโ
and some compositional jump commands. The overall-best network was trained on different numbers of composed โjumpโ commands (x-axis), and generalization was measured on new composed โjumpโ commands (y-axis). Each bar shows the mean over
5 runs with varying training commands along with the corresponding ยฑ1 SEM.
behave like the other commands. On the other hand, the
runs with more composed examples confirm that, as we
found in Experiment 1, the network does display powerful
generalization abilities. Simply, they do not conform to
the โall-or-nothingโ rule-based behaviour we would expect
from a systematically compositional deviceโand, as a consequence, they require more positive examples to emerge.
Experiment 4: Compositionality in machine
translation
Our final experiment is a proof-of-concept that our findings are more broadly applicable; that is, the limitations of
recurrent networks with regards to systematic compositionality extend beyond SCAN to other sequence-to-sequence
problems such as machine translation. First, we trained our
standard seq2seq code on short (โค 9 words) English-French
sentence pairs that begin with English phrases such as โI
am,โ โhe is,โ โthey are,โ and their contractions (randomly
split with 10,000 for training and 1180 for testing).6 An
informal hyperparameter search led us to pick a LSTM with
attention, 2 layers of 400 hidden units, and 0.05 dropout.
With these hyperparameters and the same training procedure
used for the SCAN tasks (Section 3), the network reached a
respectable 28.6 BLEU test score after 100,000 steps.
Second, to examine compositionality with the introduction
of a new word, we trained a fresh network after adding 1,000
repetitions of the sentence โI am daxyโ (fr. โje suis daxisteโ)
to the training data (the BLEU score on the original test set
dropped less than 1 point).10 We tested this network by embedding โdaxyโ into the following constructions: โyou are
daxyโ (โtu es daxisteโ), โhe is daxyโ (โil est daxisteโ), โI am
not daxyโ (โje ne suis pas daxisteโ), โyou are not daxyโ (โtu
nโes pas daxisteโ), โhe is not daxyโ (โil nโest pas daxisteโ),
โI am very daxyโ (โje suis treฬs daxisteโ), โyou are very daxyโ
(โtu es treฬs daxisteโ), โhe is very daxyโ (โil est treฬs daxisteโ). During training, the model saw these constructions
occurring with 22 distinct predicates on average (limiting
the counts to perfect matches, excluding, e.g., โyou are not
very Xโ). Still, the model could only get one of the 8 translations right (that of โhe is daxyโ). For comparison, for the
adjective โtiredโ, which occurred in 80 different constructions in the training corpus, our network had 8/8 accuracy
when testing on the same constructions as for โdaxyโ (only
one of which also occurred with โtiredโ in the training set).
Although this is a small-scale machine translation problem,
our preliminary result suggests that models will similarly
struggle with systematic compositionality in larger data sets,
when adding a new word to their vocabulary, in ways that
people clearly do not.
5. Discussion
In the thirty years since the inception of the systematicity
debate, many have tested the ability of neural networks
to solve tasks requiring compositional generalization, with
mixed results (e.g., Christiansen & Chater, 1994; Marcus,
1998; Phillips, 1998; Chang, 2002; van der Velde et al.,
2004; Botvinick & Plaut, 2006; Wong & Wang, 2007; Bowers et al., 2009; Botvinick & Plaut, 2009; Brakel & Frank,
2009; Frank et al., 2009; Frank, 2014; Bowman et al., 2016).
However, to the best of our knowledge, ours is the first study
testing systematicity in modern seq2seq models, and our
results confirm the mixed picture. On the one hand, Experiment 1 and the โturn leftโ results in Experiment 3 show
how standard recurrent models can reach very high zeroshot accuracy from relatively few training examples. We
would like to stress that this is an important positive result,
showing in controlled experiments that seq2seq models can
make powerful zero-shot generalizations. Indeed, an interesting direction for future work is to understand what are,
precisely, the generalization mechanisms that subtend the
networksโ success in these experiments. After all, human
language does have plenty of generalization patterns that
are not easily accounted for by algebraic compositionality
(see, e.g., Goldberg, 2005).
On the other hand, the same networks fail spectacularly
when the link between training and testing data is dependent on the ability to extract systematic rules. This can
10
Results do not change if, instead of repeating โI am daxyโ
1,000 times, we insert it 100 times; with just 1 or 10 occurrences
of this sentence in the training data, we get 0/8 translations right.
Generalization without Systematicity
be seen as a trivial confirmation of the basic principle of
statistical machine learning that your training and test data
should come from the same distribution. But our results
also point to an important difference in how humans and current seq2seq models generalize, since there is no doubt that
human learners can generalize to unseen data when such
data are governed by rules that they have learned before.
Crucially, the training data of experiments 2 and 3 provide
enough evidence to learn composition rules affording the
correct generalizations. In Experiment 2, the training data
contain examples of all modifiers and connectives that are
needed at test time for producing longer action sequences.
In Experiment 3, the usage of modifiers and connectives
is illustrated at training time by their application to many
combinations of different primitive commands, and, at test
time, the network should apply them to a new command it
encountered in isolation during training.
We thus believe that the fundamental component that current
models are missing is the ability to extract systematic rules
from the training data. A model that can abstract away
from surface statistical patterns and operate in โrule spaceโ
should extract rules such as: translate(x and y) = translate(x)
translate(y); translate(x twice) = translate(x) translate(x).
Then, if the meaning of a new command (translate(โjumpโ))
is learned at training time, and acts as a variable that rules
can be applied to, no further learning is needed at test time.
When represented in this more abstract way, the training
and test distributions are quite similar, even if they differ in
terms of shallower statistics such as word frequency.
How can we encourage seq2seq models to extract rules from
data rather than exploiting shallower pattern recognition
mechanisms? We think there are several, non-mutually
exclusive avenues to be explored.
First, in a โlearning-to-learnโ approach (Thrun & Pratt,
1997; Risi et al., 2009; Finn et al., 2017, a.o.), a network can
be exposed to a number of different learning environments
regulated by similar rules. An objective function requiring successful generalization to new environments might
encourage learners to discover the shared general rules.
Another promising approach is to add more structure to the
neural networks. Taking inspiration from recent neural program induction and modular network models (e.g., Reed &
de Freitas, 2016; Hu et al., 2017; Johnson et al., 2017), we
could endow RNNs with a set of manually-encoded or (ideally) learned functions for interpreting individual modifiers,
connectives, and primitives. The job of the RNN would
be to learn how to apply and compose these functions as
appropriate for interpreting a command. Similarly, differentiable stacks, tapes, or random-access memory (e.g., Joulin
& Mikolov, 2015; Graves et al., 2016) could equip seq2seq
models with quasi-discrete memory structures, enabling separate storage of variables, which in turn might encourage
abstract rule learning.
Other solutions, such as ad-hoc copying mechanisms or
special ways to initialize the embeddings of novel words,
might help to solve the SCAN tasks specifically. But they
are unlikely to help with more general seq2seq problems.
It remains to be seen, of course, if any of our proposed
approaches offer a truly general solution. Nonetheless, we
see all of the suggestions as directions worth pursuing, perhaps simultaneously and in complementary ways, with the
goal of achieving human-like systematicity on SCAN and
beyond.
Given the astounding successes of seq2seq models in challenging tasks such as machine translation, one might argue
that failure to generalize by systematic composition indicates that neural networks are poor models of some aspects
of human cognition, but it is of little practical import. However, systematicity is an extremely efficient way to generalize. Once a person learns the new English adjective โdaxyโ,
he or she can immediately produce and understand an infinity of sentences containing it. The SCAN experiments and
a proof-of-concept machine translation experiment (Experiment 4) suggest that this ability is still beyond the grasp
of state-of-the-art neural networks, likely contributing to
their striking need for very large training sets. These results
give us hope that neural networks capable of systematic
compositionality could greatly benefit machine translation,
language modeling, and other applications.
ACKNOWLEDGMENTS
We thank Germaฬn Kruszewski, Adam Liska, Tomas
Mikolov, Kristina Gulordava, Gemma Boleda, Michael Auli,
Matt Botvinick, Sam Bowman, Jeff Dean, Jonas Gehring,
David Grangier, Angeliki Lazaridou, Gary Marcus, the
CommAI team and the audiences at the Facebook Dialogue
Summit, 2017 Paris Syntax and Semantics Colloquium and
CLIC-it 2017 for feedback and advice. The SCAN tasks
are based on the navigation tasks available at: https://
github.com/facebookresearch/CommAI-env
References
Bahdanau, Dzmitry, Cho, Kyunghyun, and Bengio, Yoshua.
Neural machine translation by jointly learning to align
and translate. In Proceedings of ICLR Conference Track,
San Diego, CA, 2015. Published online: http://www.
iclr.cc/doku.php?id=iclr2015:main.
Baroni, Marco. Distributions in text. In Luฬdeling, Anke and
Kytoฬ, Merja (eds.), Corpus Linguistics: An International
Handbook, volume 2, pp. 803โ821. Mouton de Gruyter,
Berlin, Germany, 2009.
Bojar, Ondrฬej, Chatterjee, Rajen, Federmann, Christian,
Generalization without Systematicity
Graham, Yvette, Haddow, Barry, Huck, Matthias, Jimeno Yepes, Antonio, Koehn, Philipp, Logacheva, Varvara, Monz, Christof, Negri, Matteo, Neveol, Aurelie,
Neves, Mariana, Popel, Martin, Post, Matt, Rubino,
Raphael, Scarton, Carolina, Specia, Lucia, Turchi, Marco,
Verspoor, Karin, and Zampieri, Marcos. Findings of the
2016 Conference on Machine Translation. In Proceedings of the First Conference on Machine Translation, pp.
131โ198, Berlin, Germany, 2016.
Botvinick, Matthew and Plaut, David. Short-term memory for serial order: A recurrent neural network model.
Psychological Review, 113(2):201โ233, 2006.
Dong, Li and Lapata, Mirella. Language to logical form
with neural attention. In Proceedings of ACL, pp. 33โ43,
Berlin, Germany, 2016.
Elman, Jeffrey. Finding structure in time. Cognitive Science,
14:179โ211, 1990.
Finn, Chelsea, Abbeel, Pieter, and Levine, Sergey. Modelagnostic meta-learning for fast adaptation of deep networks. In Proceedings of ICML, pp. 1126โ1135, Sydney,
Australia, 2017.
Fodor, Jerry and Lepore, Ernest. The Compositionality
Papers. Oxford University Press, Oxford, UK, 2002.
Botvinick, Matthew and Plaut, David. Empirical and computational support for context-dependent representations
of serial order: Reply to Bowers, Damian, and Davis
(2009). Psychological Review, 116(4):998โ1002, 2009.
Fodor, Jerry and Pylyshyn, Zenon. Connectionism and
cognitive architecture: A critical analysis. Cognition, 28:
3โ71, 1988.
Bowers, Jeffrey, Damian, Markus, and David, Colin. A
fundamental limitation of the conjunctive codes learned
in PDP models of cognition: Comment on Botvinick and
Plaut (2006). Psychological Review, 116(4):986โ997,
2009.
Frank, Stefan. Getting real about systematicity. In Calvo,
Paco and Symons, John (eds.), The architecture of cognition: Rethinking Fodor and Pylyshynโs systematicity
challenge, pp. 147โ164. MIT Press, Cambridge, MA,
2014.
Bowman, Samuel R, Manning, Christopher D, and Potts,
Christopher. Tree-Structured Composition in Neural
Networks without Tree-Structured Architectures. arXiv
preprint, 2016.
Frank, Stefan, Haselager, Willem, and van Rooij, Iris. Connectionist semantic systematicity. Cognition, 110(3):358โ
379, 2009.
Brakel, Phileฬmon and Frank, Stefan. Strong systematicity
in sentence processing by simple recurrent networks. In
Proceedings of CogSci, pp. 1599โ1604, Amsterdam, the
Netherlands, 2009.
Calvo, Paco and Symons, John (eds.). The architecture of
cognition: Rethinking Fodor and Pylyshynโs systematicity
challenge. MIT Press, Cambridge, MA, 2014.
Chang, Frankilin. Symbolically speaking: a connectionist
model of sentence production. Cognitive Science, 26:
609โ651, 2002.
Chomsky, Noam. Syntactic Structures. Mouton, Berlin,
Germany, 1957.
Christiansen, Morten and Chater, Nick. Generalization and
connectionist language learning. Mind & Language, 9(3):
273โ287, 1994.
Chung, Junyoung, Gulcehre, Caglar, Cho, Kyunghyun, and
Bengio, Yoshua. Empirical evaluation of gated recurrent neural networks on sequence modeling. In Proceedings of the NIPS Deep Learning and Representation Learning Workshop, Montreal, Canada, 2014. Published online: http://www.dlworkshop.org/
accepted-papers.
Gehring, Jonas, Auli, Michael, Grangier, David, Yarats,
Denis, and Dauphin, Yann. Convolutional sequence to sequence learning. https://arxiv.org/abs/1705.
03122, 2017.
Goldberg, Adele. Constructions at work: The nature of
generalization in language. Oxford University Press,
Oxford, UK, 2005.
Graves, Alex, Wayne, Greg, Reynolds, Malcolm, Harley,
Tim, Danihelka, Ivo, Grabska-Barwinska, Agnieszka,
Colmenarejo, Sergio Gomez, Grefenstette, Edward,
Ramalho, Tiago, Agapiou, John, Badia, Adriaฬ Puigdomeฬnech, Hermann, Karl Moritz, Zwols, Yori, Ostrovski, Georg, Cain, Adam, King, Helen, Summerfield,
Christopher, Blunsom, Phil, Kavukcuoglu, Koray, and
Hassabis, Demis. Hybrid computing using a neural network with dynamic external memory. Nature, 538(7626):
471โ476, 2016.
Herzig, Jonathan and Berant, Jonathan. Neural semantic
parsing over multiple knowledge-bases. In Proceedings of
ACL (Volume 2: Short Papers), pp. 623โ628, Vancouver,
Canada, 2017.
Hochreiter, S and Schmidhuber, J. Long short-term memory.
Neural computation, 9:1735โ1780, 1997.
Generalization without Systematicity
Hu, Ronghang, Andreas, Jacob, Rohrbach, Marcus, Darrell,
Trevor, and Saenko, Kate. Learning to reason: End-toend module networks for visual question answering. In
Proceedings of ICCV, pp. 804โ813, Venice, Italy, 2017.
Jia, Robin and Liang, Percy. Data recombination for neural
semantic parsing. In Proceedings of ACL, pp. 12โ22,
Berlin, Germany, 2016.
Johnson, Justin, Hariharan, Bharath, van der Maaten, Laurens, Hoffman, Judy, Fei-fei, Li, Zitnick, C Lawrence,
and Girshick, Ross. Inferring and Executing Programs
for Visual Reasoning. In International Conference on
Computer Vision, 2017.
Joulin, Armand and Mikolov, Tomas. Inferring algorithmic patterns with stack-augmented recurrent nets. In
Proceedings of NIPS, Montreal, Canada, 2015.
Kingma, Diederik P and Welling, Max. Efficient GradientBased Inference through Transformations between Bayes
Nets and Neural Nets. In International Conference on
Machine Learning (ICML 2014), 2014.
Lake, Brenden, Ullman, Tomer, Tenenbaum, Joshua, and
Gershman, Samuel. Building machines that learn and
think like people. Behavorial and Brain Sciences, 2017.
In press.
Marcus, Gary F. Rethinking Eliminative Connectionism.
Cognitive Psychology, 282(37):243โ282, 1998.
Marcus, Gary F. The Algebraic Mind: Integrating Connectionism and Cognitive Science. MIT Press, Cambridge,
MA, 2003.
Mikolov, Tomas, Joulin, Armand, and Baroni, Marco.
A Roadmap towards Machine Intelligence. arXiv
preprint, 2016. URL http://arxiv.org/abs/
1511.08130.
Montague, Richard. Universal Grammar. Theoria, 36:373โ
398, 1970.
Phillips, Steven. Are feedforward and recurrent networks
systematic? analysis and implications for a connectionist
cognitive architecture. Connection Science, 10:137โ160,
1998.
Reed, Scott and de Freitas, Nando. Neural programmerinterpreters. In Proceedings of ICLR, San Juan, Puerto
Rico, 2016. Published online: http://www.iclr.
cc/doku.php?id=iclr2016:main.
Risi, Sebastian, Vanderbleek, Sandy, Hughes, Charles, and
Stanley, Kenneth. How novelty search escapes the deceptive trap of learning to learn. In Proceedings of GECCO,
pp. 153โ160, Montreal, Canada, 2009.
Sutskever, Ilya, Vinyals, Oriol, and Le, Quoc. Sequence to
sequence learning with neural networks. In Proceedings
of NIPS, pp. 3104โ3112, Montreal, Canada, 2014.
Thrun, Sebastian and Pratt, Lorien (eds.). Learning to Learn.
Kluwer, Dordrecht, 1997.
van der Velde, Frank, , van der Voort van der Kleij, Gwendid,
and de Kamps, Marc. Lack of combinatorial productivity
in language processing with simple recurrent networks.
Connection Science, 16(1):21โ46, 2004.
Williams, Ronald J and Zipser, David. A Learning Algorithm for Continually Running Fully Recurrent Neural
Networks. Neural Computation, 1:270โ280, 1989.
Wong, Francis and Wang, William. Generalisation towards
combinatorial productivity in language acquisition by
simple recurrent networks. In Proceedings of KIMAS, pp.
139โ144, Waltham, MA, 2007.
Wu, Yonghui, Schuster, Mike, Chen, Zhifeng, Le, Quoc,
Norouzi, Mohammad, Macherey, Wolfgang, Krikun,
Maxim, Cao, Yuan, Gao, Qin, Macherey, Klaus, Klingner,
Jeff, Shah, Apurva, Johnson, Melvin, Liu, Xiaobing,
Kaiser, Lukasz, Gouws, Stephan, Kato, Yoshikiyo, Kudo,
Taku, Kazawa, Hideto, Stevens, Keith, Kurian, George,
Patil, Nishant, Wang, Wei, Young, Cliff, Smith, Jason,
Riesa, Jason, Rudnick, Alex, Vinyals, Oriol, Corrado,
Greg, Hughes, Macduff, and Dean, Jeffrey. Googleโs
neural machine translation system: Bridging the gap
between human and machine translation. http://
arxiv.org/abs/1609.08144, 2016.
| 2cs.AI
|
arXiv:1604.07227v1 [math.GR] 25 Apr 2016
Alternate modules are subsymplectic
Cleฬment Gueฬrinโ
April 26, 2016
Abstract
In this paper, an alternate module (A, ฯ) is a finite abelian group A
with a Z-bilinear application ฯ : A ร A โ Q/Z which is alternate (i.e.
zero on the diagonal). We shall prove that any alternate module is
subsymplectic, i.e. if (A, ฯ) has a Lagrangian of cardinal n then there
exists an abelian group B of order n such that (A, ฯ) is a submodule
of the standard symplectic module B ร B โ .
Keywords : alternate modules, symplectic modules, Lagrangians, finite
abelian groups.
Mathematics Subject Classification : 20K01.
Contents
1 Definitions and statement of the result
2
2 Lagrangians in alternate modules
5
3 Any alternate module is subsymplectic
10
3.1 Preliminaries . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
3.2 Proof of the fundamental lemma . . . . . . . . . . . . . . . . . 15
3.3 Proof of the theorem . . . . . . . . . . . . . . . . . . . . . . . 20
4 Remarks
20
IRMA Institut de Recherche Matheฬmatiques avanceฬe, University of Strasbourg, 7 rue
Reneฬ Descartes, F-67084 Strasbourg , France, e-mail : [email protected]
โ
1
1
Definitions and statement of the result
Before stating the result, we give some standard definitions along with some
properties regarding the alternate modules. The concept is defined by Wall
in [Wal64] and by Tignol, Amitsur in [AT86]. Among the results, we will
establish here, some might be directly read in those references and also in
[TW15].
Let A be an abelian group. If we are given an application ฯ : A ร A โ
Q/Z, then we say that (A, ฯ) is a bilinear module if ฯ is bilinear when A
is seen as a Z-module. By definition, the underlying group of the bilinear
module (A, ฯ) is A and the associated bilinear form to (A, ฯ) is ฯ.
In the sequel, all bilinear modules are assumed to be finite.
Let (A, ฯ) a bilinear module, we say that (A, ฯ) is an alternate module
if ฯ(a, a) = 0 for all a โ A. If (A, ฯ) is an alternate module, then for all
a, b โ A :
0 = ฯ(a + b, a + b)
= ฯ(a, a) + ฯ(a, b) + ฯ(b, a) + ฯ(b, b)
= ฯ(a, b) + ฯ(b, a)
since (A, ฯ) is alternate
by โbilinearityโ
since (A, ฯ) is alternate
Whence for all a, b โ A, ฯ(a, b) = โฯ(b, a). We will sum up this by saying
that if (A, ฯ) is an alternate module then, in particular ฯ is anti-symmetric.
Let (A, ฯ) be an alternate module and a, b โ A, we say that a is orthogonal to b if ฯ(a, b) = 0. Since A is alternate, any element of A is orthogonal
to itself and the relation of orthogonality is symmetric by anti-symmetry of
the bilinear form ฯ.
Let (A, ฯ) be an alternate module and S a subset of A. We define S โฅ the
orthogonal of S as the subset of elements in A which are orthogonal to S.
One can directly check that S โฅ is a subgroup of A.
Let (A, ฯ) be an alternate module and B a subgroup of A then the bilinear
module induced by A on B : (B, ฯBรB ) is also an alternate module called
the induced submodule on B by ฯ.
2
Let (A1 , ฯ1 ) and (A2 , ฯ2 ) be two alternate modules, we define the orthogonal sum of those modules by :
โฅ
(A1 , ฯ1 ) โ (A2 , ฯ2 ) := (A, ฯ)
With A := A1 โ A2 and ฯ((a1 , a2 ), (b1 , b2 )) := ฯ1 (a1 , b1 ) + ฯ2 (a2 , b2 ). It
is a straightforward verification that (A, ฯ) is an alternate module, verifying
โฅ
A1 โค Aโฅ
2 , A2 โค A1 and the induced submodule by ฯ on Ai is (Ai , ฯi ).
Conversly, if (A, ฯ) is an alternate module and B, C two subgroups of
A such that A = B โ C with B โค C โฅ , then (A, ฯ) can be written as the
orthogonal sum of the two induced modules on B and C by ฯ.
Let A be a finite module, we define Aโ , the dual of A as the group Aโ :=
Mor(A, Q/Z). A non-trivial result (direct consequence of the classification of
finite abelian groups) states that A is isomorphic to Aโ as a group. Remark
that the isomorphism between A and Aโ is not canonical.
Let (A, ฯ) be an alternate module, we define the dual application associated to (A, ฯ) as :
ฯโ :
A โโ Aโ
a 7โโ b 7โ ฯ(a, b)
The kernel Kฯ of (A, ฯ) is, by definition, the kernel Ker(ฯโ ) of the dual
application ฯโ . In other words, Kฯ = Aโฅ i.e. the set of elements in A which
are orthogonal to any element of A.
Let (A, ฯ) be an alternate module, we say that (A, ฯ) is a symplectic
module if its kernel Kฯ is trivial (i.e. the application ฯ is non-degenerate).
To any alternate module (A, ฯ), we can associate a symplectic module
(B, ฯB ) setting B := A/Kฯ and :
ฯB (a1 mod Kฯ , a2 mod Kฯ ) := ฯ(a1 , a2 )
The fact that (B, ฯB ) is well defined and is a symplectic module is clear.
This symplectic module will always be denoted (A/Kฯ , ฯ) and called the
symplectic module associated to (A, ฯ).
An important example of symplectic module is the following :
3
Example 1. Let B be an abelian group. We define A := B ร B โ and :
ฯ:
A ร A โโ Q/Z
((a1 , ฯ1 ), (a2 , ฯ2 )) 7โโ ฯ2 (a1 ) โ ฯ1 (a2 )
Then (A, ฯ) is a symplectic module. In the sequel, such symplectic module
will always be denoted B ร B โ (the underlying bilinear form being the form
ฯ as above).
Proof. Clearly (A, ฯ) is an alternate module. Let (a, ฯ) be in Kฯ then for all
bโA:
ฯ((a, ฯ), (b, 0)) = 0 โ ฯ(b) = 0
This implies that ฯ is the trivial morphism, i.e. ฯ = 0. Furthermore for
all ฯ โฒ โ Mor(A, Q/Z) :
ฯ((a, 0), (0, ฯ โฒ)) = 0 โ ฯ โฒ (a) = 0
Since A is isomorphic to Mor(A, Q/Z) (although the isomorphism is not
canonical) this implies that a = 0. Therefore Kฯ is trivial and (A, ฯ) is a
symplectic module.
Let (A, ฯ) be an alternate module and S a subset of A. We say that S
is isotropic if S โ S โฅ . Furthermore, if S = S โฅ then S is a subgroup of
A and is called a Lagrangian of (A, ฯ). In general (see proposition 3) the
cardinal of a Lagrangian
of (A, ฯ) only depends on |A| and |Kฯ |. We shall
p
denote nA,ฯ := |A||Kฯ | the cardinal of any Lagrangian of (A, ฯ).
In the example 1, the subgroups B and B โ of A are both Lagrangians of
the module (A, ฯ).
Let (A, ฯ) and (Aโฒ , ฯโฒ ) be alternate modules, we say that (A, ฯ) and
(Aโฒ , ฯโฒ ) are isometric if there exists a group isomorphism g : A โ Aโฒ verifying ฯ = g โฯโฒ . The isometric relation is clearly an equivalence relation.
Now, we come to the most important definition of this paper. Let (A, ฯ)
be an alternate module. We say that (A, ฯ) is subsymplectic if there exists
an abelian group B of order nA,ฯ such that (A, ฯ) is included in the standard
symplectic module B ร B โ . The result we are going to prove here is :
Theorem. Any alternate module is subsymplectic.
4
Whereas the classification of symplectic modules is easily delt with, it
seems hopeless to do the same thing for alternate modules in general. The
statement that alternate modules are subsymplectic appears as the closest
possible result to a classification of alternate modules.
In another paper, we will use this result to classify conjugacy classes of
centralizers of irreducible subgroups in P SL(n, C).
In the second section, we shall characterize and study the Lagrangians in
alternate modules. In the third section we will prove the theorem. In the
last section, we make some remarks about this proof and alternate modules
in general.
2
Lagrangians in alternate modules
Some results in this section have been proven in other papers, we shall only
give the references. We begin with an elementary propoosition :
Proposition 1. Let (A, ฯ) be a symplectic module and B a subgroup of A
then :
1. |B||B โฅ | = |A| and (B โฅ )โฅ = B.
2. If the induced submodule on B by (A, ฯ) is a symplectic module then
the induced submodule on B โฅ by (A, ฯ) is also a symplectic module,
Furthermore
โฅ
A = B โ Bโฅ
Proof. See proposition 2.2 of [AT86] or lemma 1 in [Wal64].
Whereas, alternate modules are very hard to classify, the following property implies that any symplectic module is isometric to one constructed as
in the example 1. In particular, the set of symplectic modules is quite rigid.
Corollary 1. Let (A, ฯ) be a symplectic module. There exists B โค A such
that (A, ฯ) is isomorphic to B ร B โ .
5
Proof. See lemma 7 in [Wal64] or theorem 4.1 in [AT86].
This construction can be seen as the analogous of a symplectic base for
(A, ฯ) (i.e. a โbaseโ of B as a finite abelian group and its โdual baseโ in B โ ).
A direct consequence of this corollary is that any two symplectic modules
(A, ฯ) and (Aโฒ , ฯโฒ) are isometric if and only if A and Aโฒ are isomorphic as
groups.
It is, somehow, surprising that such symplectic base exists for those finite
modules (in a similar fashion than for bilinear forms on K-vector spaces).
Whereas K-vector spaces endowed with an alternate form (not necessarily
symplectic) are always the sum of the kernel of the form and a non-degenerate
complementary, this is not the case for alternate modules in general. Indeed,
one can consider the following counter-example :
Counter-example 1. Let A := Z/2 ร Z/4 ร Z/8. We denote e1 := (1, 0, 0),
e2 := (0, 1, 0) and e3 := (0, 0, 1). Then, on the base e1 , e2 , e3 , we define the
alternate bilinear form ฯ on A with its associated matrix :
๏ฃซ
๏ฃถ
0 1/2 1/2
Mฯ := ๏ฃญ1/2 0 โ1/4๏ฃธ
1/2 1/4
0
Then the kernel Kฯ of (A, ฯ) is not a direct factor of A, in particular, A
is not the sum of a non-degenerate module and its kernel.
Proof. With a straightforward computation, one can check that Kฯ = he1 +
2e2 +2e3 i is isomorphic to Z/4. We remark that 2(e1 +2e2 +2e3 ) = 4e3 โ Kฯ .
Furthermore if (x, y, z) โ A then 4(x, y, z) = (0, 0, 4z) so any element a โ A
of order 8 will verify that 4a = 4e3 โ Kฯ . In particular, Kฯ is not a direct
factor of A.
This little example shows that the kernel of (A, ฯ) is not necessarily a
direct factor of A. Furthermore, one can check that A cannot be written
as the orthogonal sum of strictly smaller submodules. In some sense, it is
irreducible, this suggests that if there is a classification of alternate modules (in some sense, we would like to have one in the sequel), it should be
complicated. Another corollary of the proposition 1 :
Corollary 2. Let
p (A, ฯ) be a symplectic module, then any Lagrangian L of
A is of cardinal |A|.
6
Proof. By definition, L = Lโฅ , applying the first point of proposition 1, we
get |L|2 = |A|.
In their paper, [AT86], J.-P. Tignol and S.A. Amitsur are interested in
Lagrangian of symplectic modules, they apply this to division algebra (cf.
[AT85]). We need to understand, Lagrangians of alternate modules. We
recall some results about Lagrangians in this case :
Proposition 2. Let (A, ฯ) be an alternate module. The Lagrangians of A
are exactly the maximal elements for the inclusion within the set of isotropic
subsets of A. In other words a subset L in A is a Lagrangian of A if and
only if for any K โฒ isotropic subset of A containing L, K โฒ = L.
Proof. Let L be an isotropic subset of A. Assume that L is a Lagrangian,
then if K โฒ is an isotropic subset of A containing L, then Lโฅ โ K โฒ since K โฒ
is orthogonal to K โฒ whence to L. Since L is a Lagrangian, L = Lโฅ whence
K โฒ โ L, since K โฒ โ L by assumption L = K โฒ and L is thus maximal among
the isotropic subsets of A.
Assume that L is not a Lagrangian. Since L is isotropic, L โค Lโฅ and
there exists a โ Lโฅ which does not belong to L. We define K โฒ := hL, ai,
clearly L โค K โฒ and K โฒ 6= L, furthermore L being isotropic is orthogonal to
a by assumption, whence K โฒ is an isotropic subspace of A. Whence L is not
maximal among the isotropic subsets of A.
Let (A, ฯ) be an alternate module then the set of isotropic subspaces of
A is not empty (it contains the trivial group) and finite (since A is finite).
Therefore, there exists a maximal element for the inclusion. Whence any
alternate module admits a Lagrangian. Furthermore, if K is any isotropic
subset, there will always be a maximal isotropic subset containing it, therefore any isotropic subset is contained in a Lagrangian. In particular, for any
a โ A, there exists a Lagrangian containing a (applying what we have just
done to K = hai).
The next proposition is a generalization of corollary 2 :
Proposition 3. Let (A, ฯ)
p be an alternate module. For any Lagrangian L
of A, the cardinal of L is |A||Kฯ |.
7
Proof. We define (A/Kฯ , ฯ) to be the associated symplectic module to (A, ฯ)
and ฯ be the projection of A onto A/Kฯ . Clearly the application ฯ leads to
a bijective correspondance between isotropic subgroups of A containing Kฯ
and isotropic subgroups of A/Kฯ .
Since maximal elements among isotropic subsets of A are isotropic subgroups of A containing Kฯ , it follows that ฯ induces a bijective correspondance between Lagrangians in A and Lagrangians in A/Kฯ (by sending L to
ฯ(L)). In particular, any Lagrangian L of A is of the form ฯ โ1 (L) where L
is a Lagrangian in A/Kฯ .
|L| = |ฯ โ1 (L)|
= |Kฯ ||L|
s
= |Kฯ |
=
q
|A|
by corollary 2
|Kฯ |
|A||Kฯ |
We see that the cardinal of Lagrangians is constant in alternate modules.
However, the isomorphism class of Lagrangians may vary (see also [AT86]).
Example 2. Let (A, ฯ) be the alternate module defined in counter-example
1. Then A = Z/2 ร Z/4 ร Z/8, and if we denote e1 := (1, 0, 0), e2 = (0, 1, 0)
and e3 = (0, 0, 1) in A then the subgroups L1 := he3 , e1 + 2e2 i and L2 :=
he1 , 2e2 , 2e3 i are Lagrangians in A and :
L1 is isomorphic to Z/2 ร Z/8
L2 is isomorphic to Z/2 ร Z/2 ร Z/4
In particular, L1 is not isomorphic to L2 .
Proof. From the counter-example
1, |Kฯ | = 4, hence the cardinal of a Laโ
grangian in (A, ฯ) is 2 ยท 4 ยท 8 ยท 4 = 16 using proposition 3.
We directly check that both L1 and L2 are isotropic.
8
Furthermore e1 + 2e2 is of order 2 and not in he3 i, therefore L1 is isomorphic to he1 + 2e2 i ร he3 i. Whence L1 is isomorphic to Z/2 ร Z/8. In
particular, L1 is isotropic and has the cardinal of a Lagrangian, by maximality of Lagrangians (proposition 2) it is Lagrangian.
Finally, L2 is clearly isomorphic to Z/2 ร Z/2 ร Z/4. Likewise, the L2 is
isotropic of cardinal 16, by maximality of Lagrangians (proposition 2) it is
Lagrangian.
In general, it is much more convenient to work with abelian p-groups than
finite abelian groups. We remark that :
Proposition 4. Let (A, ฯ) be an alternate module such that (A, ฯ) is isometric to the orthogonal sum of (A1 , ฯ1 ) and (A2 , ฯ2) :
โฅ
(A, ฯ) = (A1 , ฯ1 ) โ (A2 , ฯ2 )
If both (A1 , ฯ1 ) and (A2 , ฯ2 ) are subsymplectic then (A, ฯ) is subsymplectic.
Proof. We begin by showing that Kฯ = Kฯ1 โ Kฯ2 . Clearly, Kฯ contains Kฯ1
and Kฯ2 and both are in direct sum. Finalely, if k = (l1 , l2 ) โ Kฯ โค A1 โ A2
then for all a1 โ A1 , we have :
0 = ฯ(k, (a1 , 0)) = ฯ1 (l1 , a1 ) + ฯ2 (l2 , 0) = ฯ1 (l1 , a1 )
This is true for any a1 โ A1 so l1 โ Kฯ1 . Likewise, l2 โ Kฯ2 , whence
Kฯ = Kฯ 1 โ K ฯ 2 .
It follows that |Kฯ | = |Kฯ1 ||Kฯ2 |, since |A| = |A1 ||A2 |, we have :
nA,ฯ = nA1 ,ฯ1 nA2 ,ฯ2
(1)
By hypothesis, for i = 1, 2, there exists Bi , an abelian gorup of order
nAi ,ฯi such that (Ai , ฯi ) โค Bi ร Biโ . Whence :
โฅ
(A, ฯ) = (A1 , ฯ1 ) โ (A2 , ฯ2 )
โฅ
โค (B1 ร B1โ ) โ (B2 ร B2โ )
โค B ร B โ where B := B1 ร B2
9
We have included (A, ฯ) (as an alternate module) in B ร B โ , since |B| =
|B1 ||B2 | = nA1 ,ฯ1 nA2 ,ฯ2 = nA,ฯ by equation 1, it follows, by definition, that
(A, ฯ) is subsymplectic.
As a result :
Corollary 3. Let (A, ฯ) be an alternate module then, we denote, for p any
prime dividing |A|, Sp the unique p-Sylow of A. If for all p dividing |A|, the
induced submodule on Sp by ฯ is subsymplectic then (A, ฯ) is subsymplectic.
Proof. It is a well known result that if p1 , . . . , pr are the r distinct primes
dividing |A| then, as a group, A is isomorphic to the product of its p-Sylows
A = Sp 1 โ ยท ยท ยท โ Sp r
Furthermore, if 1 โค i 6= j โค r and ai โ Spi , aj โ Spj then ฯ(ai , aj ) is of
order dividing some power of pi and some power of pj , it follows that ฯ(ai , aj )
is of order 1, i.e. is trivial. In particular, for i 6= j, the induced modules Spi
and Spj are orthogonal to each other. It follows that :
โฅ
โฅ
(A, ฯ) = Sp1 โ ยท ยท ยท โ Spr
The corollary is a direct consequence of this decomposition and proposition 4.
With those classical properties, we will show the theorem.
3
Any alternate module is subsymplectic
Basically, the idea is to make an induction on the cardinal of the kernel. The
following lemma is the major step of the proof :
Fundamental lemma. Let p be a prime number and (A, ฯ) an alternate
module which is not symplectic with A a p-group. Then there exists an alternate module (Aฬ, ฯฬ) such that (A, ฯ) is a submodule of (Aฬ, ฯฬ), |A| < |Aฬ| and
nA,ฯ = nAฬ,ฯฬ .
10
In the sequel, we will say that (Aฬ, ฯฬ) is an extension of modules of
(A, ฯ) via the inclusion ฮนA if ฮนA : A โ Aฬ is an inclusion of alternate modules,
i.e. ฮนAโ ฯฬ = ฯ and ฮนA is an inclusion of modules. The extension will be with
constant Lagrangians if nAฬ,ฯฬ = nA,ฯ .
The first subsection gathers some preliminary results. The second subection is the proof of the fundamental lemma. For subsections 3.1 and 3.2, p
is a fixed prime number and any alternate module (A, ฯ) is assumed to have
its underlying group A to be a p-group. In the third subsection, we prove
the theorem.
3.1
Preliminaries
The next lemma is interesting in itself, it generalizes the second point of
proposition 1.
Lemma 1. Let (A, ฯ) be an alternate module. If there exists a submodule B
of (A, ฯ) such that B is a symplectic module then :
โฅ
(A, ฯ) is isometric to B โ B โฅ
Proof. Let (A, ฯ) be an alternate module and B be a submodule of A which
is symplectic. Then B โฅ is also a submodule of (A, ฯ). Since B is symplectic,
B โฅ โฉ B is trivial. It follows that B โ B โฅ is a subgroup of A. By definition,
B is orthogonal to B โฅ it follows that :
โฅ
B โ B โฅ is a submodule of (A, ฯ)
Let ฯ be the canonical projection of A on A/Kฯ . Since B is symplectic,
B โฉ Kฯ is trivial and B is isomorphic to B := ฯ(B). Using the first point of
proposition 1 :
โฅ
|A/Kฯ |
|B|
|A|
=
|Kฯ ||B|
B =
11
โฅ
โฅ
Clearly, ฯ โ1 (B ) = B โฅ , it follows that |B โฅ | = |Kฯ ||B |. Finally, we
have that :
โฅ
|B โ B โฅ | = |B||B โฅ |
โฅ
= |B||Kฯ ||B |
|A|
= |B||Kฯ |
|Kฯ ||B|
= |A|
โฅ
Since B โ B โฅ is a submodule of (A, ฯ) and both modules have the same
cardinal, we have that :
โฅ
(A, ฯ) is isometric to B โ B โฅ
The next lemma gives a sufficient condition for an extension of modules
to be with constant Lagrangians :
Lemma 2. Let p be a prime number, (Aฬ, ฯฬ) be an alternate module and A
be a subgroup of Aฬ of index p. We denote (A, ฯ) the induced submodule on
A by ฯฬ. If Kฯ is not included in Kฯฬ then nA,ฯ = nAฬ,ฯฬ .
Proof. Let eฬ be an element of Aฬ which is not in A. Since [Aฬ : A] is of cardinal
p, any element in aฬ โ Aฬ can uniquely be written as :
Define :
aฬ = ฮปeฬ + a where 0 โค ฮป โค p โ 1 and a โ A
f:
Then for all k โ Kฯ :
Kฯ โโ Q/Z
k 7โโ ฯฬ(eฬ, k)
p ยท f (k) = p ยท ฯฬ(eฬ, k)
= ฯฬ(peฬ, k)
= ฯ(peฬ, k) since peฬ and k are in A
= 0 since k โ Kฯ and peฬ โ A
12
As a result Im(f ) is a finite subgroup of Q/Z of exponent dividing p.
Whence Im(f ) is either trivial or the unique cyclic subgroup of order p in
Q/Z.
If Im(f ) is trivial, then Kฯ is orthogonal to eฬ, since Kฯ is orthogonal
to A and Aฬ is generated by eฬ and A, it follows that Kฯ is orthogonal to Aฬ,
whence Kฯ โค Kฯฬ . By assumption, this is a contradiction. It follows that
Im(f ) is cyclic of cardinal p.
Let x = ฮปeฬ + a โ Kฯฬ where 0 โค ฮป โค p โ 1 and a โ A. Let k0 โ Kฯ such
that f (k0 ) is of order p. Since x โ Kฯฬ , we have ฯฬ(x, k0 ) = 0. On the other
hand :
ฯฬ(x, k0 ) = ฮปฯฬ(eฬ, k0 ) + ฯฬ(a, k0 )
= ฮปf (k0 ) + ฯ(a, k0 )
= ฮปf (k0 ) + 0 since k0 โ Kฯ
It follows that ฮปf (k0 ) = 0. Since f (k0 ) is of order p, we have that p
divides ฮป and since 0 โค ฮป โค p โ 1, we end up with ฮป = 0 which implies that
x โ A. As a result, we have shown that Kฯฬ โค Kฯ .
Finally :
nAฬ,ฯฬ =
q
|Aฬ||Kฯฬ |
p
p|A||Kฯ |
=q
[Kฯ : Kฯฬ ]
s
p
nA,ฯ
=
[Kฯ : Kฯฬ ]
Let L be a Lagrangian of A, then L is isotropic in Aฬ and by proposition
2, there exists a Lagrangian Lฬ of Aฬ containing L. Using Lagrangeโs theorem,
we have that |L| divides |Lฬ| and using proposition 3, nA,ฯ divides nAฬ,ฯฬ . It
q
follows that [Kฯp:K ] is a positive integer which cannot but be equal to one
ฯฬ
(because p is a prime number). In particular, we have that nAฬ,ฯฬ = nA,ฯ .
13
The last lemma in those preleminaries allows us to construct extension of
modules in a fairly simple way.
Lemma 3. Let p be a prime number, (A, ฯ) an alternate module where A is
a p group. Assume that there exist r + 1 non-trivial elements e, e1 , . . . , er in
A such that :
A = hei ร he1 i ร ยท ยท ยท ร her i
Assume furthermore that for any 1 โค i โค r the order of ฯ(e, ei ) is strictly
lesser than the order of ei then there exists an alternate module (Aฬ, ฯฬ) such
that Aฬ = heฬi ร he1 i ร ยท ยท ยท ร her i where eฬ is of order p times the order of e and
the inclusion :
ฮนA :
A โโ Aฬ
e 7โโ peฬ
ei 7โโ ei for 1 โค i โค r
is an inclusion of submodules.
Proof. Let Aฬ be heฬi ร he1 i ร ยท ยท ยท ร her i where eฬ is of order p times the order
of e. Clearly, the mapping :
ฮนA :
A โโ Aฬ
e 7โโ peฬ
ei 7โโ ei for 1 โค i โค r
defines an injective morphism of groups. In order to define the bilinear
form ฯฬ, it suffices to define it on a generating set of Aฬ ร Aฬ. Define :
ฯฬ(ei , ej ) := ฯ(ei , ej ) for all 1 โค i, j โค r
We also define ฯฬ(eฬ, eฬ) := 0. Finally, remark that the group Q/Z is pdivisible (i.e. any element admits a p-th root). Then for any 1 โค i โค r,
define ฮปi to be one element verifying pฮปi = ฯ(e, ei ).
Remark that the order of ฮปi thus defined divides p times the order of
ฯ(e, ei ). By assumption, this divides the order of ei and also divides the
order of eฬ which is p times the order of e. It follows that ฮปi divides both the
order of eฬ and ei . Whence the following equations :
14
ฯฬ(ei , ej ) := ฯ(ei , ej ) for all 1 โค i, j โค r
ฯฬ(eฬ, eฬ) := 0
ฯฬ(eฬ, ei ) := ฮปi
ฯฬ(ei , eฬ) := โฮปi
allow us to define a group morphism on Aฬ which is clearly an alternate
module. Let ฯ be the induced module on A via ฮนA by ฯฬ :
ฯ(ei , ej ) = ฯฬ(ei , ej ) = ฯ(ei , ej )for all 1 โค i, j โค r
ฯ(e, ej ) = ฯฬ(peฬ, ej ) = pฮปj = ฯ(e, ej ) for all 1 โค j โค r
Whence ฯ = ฯ on A ร A (since they are alternate forms). In particular
we have shown that (A, ฯ) is a submodule of (Aฬ, ฯฬ) via ฮนA .
We have the tools to prove the fundamental lemma.
3.2
Proof of the fundamental lemma
We recall first the statement of the fundamental lemma :
Fundamental lemma. Let p be a prime number and (A, ฯ) an alternate
module which is not symplectic with A a p-group. Then there exists an alternate module (Aฬ, ฯฬ) such that (A, ฯ) is a submodule of (Aฬ, ฯฬ), |A| < |Aฬ| and
nA,ฯ = nAฬ,ฯฬ .
Proof. We prove the lemma doing a strong induction on the cardinal of the
module. Let pk be such that the lemma is true for any alternate module M
with |M| < pk . Let (A, ฯ) be an alternate module which is not symplectic
and A be of cardinal pk . There are two different cases to consider :
Case 1 : Kฯ is not included in p ยท A
15
By the classification of abelian p-groups, decompose the group A as a
product of cyclic subgroups :
A = he0 i ร he1 i ร ยท ยท ยท ร her i
(2)
Denote di the order of ei , then we may assume that diโ1 divides di for
1 โค i โค r.
Let k0 โ Kฯ which is not in p ยท A. By the decomposition 2, we may write
k0 =
r
X
i=0
ฮฑi ei where ฮฑ0 , . . . , ฮฑr โ N
Since k0 is not in p ยท A there exists at least one coefficient among the
ฮฑ0 , . . . , ฮฑr which is not divisible by p. Denote i0 to be one index such that
ฮฑi0 is not divisible by p.
Define the group Aฬ := Z/p ร A. Let ฮณ be a generator of Z/p. Then we
define an alternate form ฯฬ on Aฬ by :
ฯฬ(ei , ej ) := ฯ(ei , ej ) for 0 โค i, j โค r
ฯฬ(ฮณ, ei ) := 0 for 0 โค i โค r and i 6= i0
ฯฬ(ei , ฮณ) := 0 for 0 โค i โค r and i 6= i0
ฯฬ(ฮณ, ฮณ) := 0
1
ฯฬ(ฮณ, ei0 ) :=
p
ฯฬ(ei0 , ฮณ) := โ
1
p
Clearly, ฯฬ is an alternate form on Aฬ, furthermore, the inclusion of A in
Aฬ given by a is mapped to (0, a) clearly leads to an inclusion of modules.
Finally :
16
ฯฬ(ฮณ, k0 ) =
r
X
ฮฑi ฯฬ(ฮณ, ei )
i=0
= ฮฑi0 ฯฬ(ฮณ, ei0 ) since ฮณ is orthogonal to ei where i 6= i0
ฮฑi
= 0 6= 0 in Q/Z since p does not divide ฮฑi0
p
Hence we found an element in Kฯ which is not in the kernel of Kฯฬ .
Applying lemma 2, we have nA,ฯ = nAฬ,ฯฬ , hence (Aฬ, ฯฬ) contains (A, ฯ), has
the same cardinality of Lagrangians and is strictly greater than A. In this
case, we have constructed the extension with constant Lagrangians (without
using the induction hypothesis).
Case 2 : Kฯ is included in p ยท A
Write :
A = hei ร he1 i ร ยท ยท ยท ร her i
(3)
Denote d the order of e, di the order of ei , then we may assume that d
divides d1 and di divides di+1 for 1 โค i โค r โ 1.
Assume that there exists 1 โค i โค r such that the order of ฯ(e, ei ) is equal
to di (the order of ei ), since the order of ฯ(e, ei ) divides d, the order of e (by
bilinearity), it follows that di divides d. Since we also have d divides di by
definition, we have two elements e and ei in A whose order is equal to d and
such that ฯ(e, ei ) is of order d. As a result, the submodule B generated by e
and ei is isometric to Z/d ร (Z/d)โ . In particular B is a submodule of (A, ฯ)
which is symplectic, by lemma 1, it follows that :
โฅ
(A, ฯ) = B โ B โฅ
Let (B โฅ , ฯ) be the induced submodule on B โฅ by ฯ. By induction hypothesis, there exists a module (C, ฯฬ) such that nBโฅ ,ฯ = nC,ฯฬ with |B โฅ | < |C|
and (B โฅ , ฯ) is a submodule of (C, ฯฬ). Denote :
โฅ
(Aฬ, ฯฬ) := B โ (C, ฯฬ)
17
โฅ
Clearly A = B โ B โฅ is a submodule of (Aฬ, ฯฬ) and |A| < |Aฬ|. Remark
that Kฯ = Kฯ and Kฯฬ = Kฯฬ since B is symplectic. Whence :
q
|A||Kฯ |
p q
= |B| |B โฅ ||Kฯ |
p
= |B|nBโฅ ,ฯ
p
= |B|nC,ฯฬ by construction of (C, ฯฬ)
p q
= |B| |C||Kฯฬ |
q
= |Aฬ||Kฯฬ |
nA,ฯ =
= nAฬ,ฯฬ
In this case we can also construct an extension (Aฬ, ฯฬ) of (A, ฯ) with
constant Lagrangians.
Assume now that for 1 โค i โค r, the order of ฯ(e, ei ) strictly divides the
order of di . Then we are in the condition of applications of lemma 3. Define
Aฬ = heฬi ร he1 i ร ยท ยท ยท ร her i where eฬ is of order p times the order of e and the
inclusion :
ฮนA :
A โโ Aฬ
e 7โโ peฬ
ei 7โโ ei for 1 โค i โค r
then we have defined on Aฬ a bilinear form ฯฬ such that ฮนAโ ฯฬ = ฯ.
We recall that we are in the second case where Kฯ โค p ยท A. Denote ฯ
the canonical projection of A onto A/Kฯ . Since Kฯ โค p ยท A, it follows that
ฯ โ1 (p ยท (A/Kฯ )) = p ยท A. In particular (since e is clearly not an element of
p ยท A) it follows that ฯ(e) is not in p ยท (A/Kฯ ).
We know that A/Kฯ is isomorphic to B ร B โ by corollary 1. Denote
g1 , . . . , gs a โbaseโ of B and g1โ , . . . , gsโ the corresponding โdual baseโ of B โ
and write :
18
ฯ(e) =
r
X
ฮณi gi + ฮณiโ giโ
i=1
Since ฯ(e) is not in p ยท (A/Kฯ ), it follows that at least one of the ฮณi or ฮณiโ
is not divisible by p. Up to exchanging gi and giโ , we may assume that ฮณiโ0 is
not divisible by p.
Let pk (with k โฅ 1) be the order of gi0 and a0 โ A such that ฯ(a0 ) = gi0 .
Since gi0 is of order pk , pk ยท a0 โ Kฯ . Furthermore :
ฯ(e, pkโ1 ยท a0 ) = ฯ(ฯ(e), pkโ1 ยท ฯ(a0 )) by definition of (A/Kฯ , ฯ)
= pkโ1 ฯ(ฯ(e), gi0 )
r
X
kโ1
ฮณi ฯ(gi , gi0 ) + ฮณiโ ฯ(giโ, gi0 )
=p
=
i=1
kโ1 โ
p ฮณi0 ฯ(giโ0 , gi0 )
Remark that, by definition ฯ(giโ0 , gi0 ) is of order pk , since ฮณiโ0 is not divisible
by p :
ฯ(e, pkโ1 ยท a0 ) = pkโ1 ฮณiโ0 ฯ(giโ0 , gi0 ) is of order p, whence not trivial.
Remark now that, in (Aฬ, ฯฬ) we have :
ฯฬ(eฬ, pk ยท a0 ) = ฯฬ(p ยท eฬ, pkโ1 ยท a0 ) by Z-bilinearity
= ฯ(e, pkโ1 ยท a0 ) since p ยท eฬ = ฮนA (e) and ฮนAโ ฯฬ = ฯ
6= 0 in Q/Z
In particular, pk ยท a0 is an element of Kฯ which is not in Kฯฬ . Applying
lemma 2, we have that nA,ฯ = nAฬ,ฯฬ .
Now that the fundamental lemma is proven, we shall see that the theorem
follows by an easy induction on the cardinal of the kernel of the alternate
module.
19
3.3
Proof of the theorem
Recalling that the result we want to prove is the following theorem :
Theorem. Any alternate module is subsymplectic.
Proof. By corollary 3, it suffices to prove it for alternate modules (A, ฯ)
where A is a p-group and p is a prime number.
Let us show the following by induction on k : Let (A, ฯ) be an alternate
module which is a p-group with |Kฯ | = pk then (A, ฯ) is subsymplectic.
If k = 0 then (A, ฯ) ispsymplectic. Therefore, by corollary 1, it is isometric
to B ร B โ where |B| = |A| = nA,ฯ . It follows that (A, ฯ) is subsymplectic
by definition.
If k > 0 then (A, ฯ) is an alternate module which is not symplectic (its
kernel is not trivial) whence, by the fundamental lemma, there exists an
alternate module (Aฬ, ฯฬ) such that (A, ฯ) is a submodule of (Aฬ, ฯฬ), |A| < |Aฬ|
and nA,ฯ = nAฬ,ฯฬ .
We have n2A,ฯ = n2Aฬ,ฯฬ so |A||Kฯ | = |Aฬ||Kฯฬ |, since |A| < |Aฬ| we have that
|Kฯฬ | < |Kฯ | = pk . It follows that we can apply the induction hypothesis to
(Aฬ, ฯฬ) and there exists an abelian group B of order n := nAฬ,ฯฬ such that :
(Aฬ, ฯฬ) โค B ร B โ
Since (A, ฯ) is a submodule of (Aฬ, ฯฬ), we finally have included the module
(A, ฯ) in B ร B โ where |B| = n = nAฬ,ฯฬ = nA,ฯ . It follows that (A, ฯ) is
subsymplectic by definition.
4
Remarks
The proof is constructive. Indeed, it explicitely gives the construction (by
induction) of a symplectic module B ร B โ containing (A, ฯ) with |B| =
nA,ฯ . Basically, in order to define an algorithm computing B, one needs an
20
algorithm that, given (A, ฯ) computes its kernel and a โdiagonalizationโ of
its associated symplectic module (A/Kฯ , ฯ).
Remark that, given (A, ฯ), an alternate module, there might exist B1 6=
B2 , both of cardinal nA,ฯ such that (A, ฯ) is included in Bi ร Biโ for i = 1, 2 :
Counter-example 2. Let A be the abelian group Z/2รZ/4 endowed with the
trivial bilinear form. It follows that nA,ฯ = |A|. Let B1 := A and B2 := Z/8.
Then we have two inclusions :
ฮนA,1 :
A โโ B1 ร B1โ
(u, v) 7โโ ((u, v), (0, 0))
and ฮนA,2 :
A โโ B2 ร B2โ
(u, v) 7โโ (4u, 2v)
Those two inclusions are inclusions of submodules (when Bi ร Biโ is endowed with its natural structure of symplectic form, defined in example 1).
Furthermore, it is clear that they are extensions with constant Lagrangians.
However B1 6= B2 .
As we have stated in the introduction of this paper, the theorem will
be used in another paper in order to give a classification of centralizer of
irreducible subgroups of P SL(n, C). An interesting thing to have would be
a classification of alternate modules.
Let (A, ฯ) be an alternate module, we say that (A, ฯ) is indecomposable
if, whenever (A, ฯ) is the orthogonal sum of (A1 , ฯ1 ) and (A2 , ฯ2 ) then (A1 , ฯ1 )
or (A2 , ฯ2) is ({0}, 0).
Since any alternate module is clearly the sum of indecomposable ones by
induction, if we want to classify alternate modules, we only need to characterize indecomposable ones. This leads to the following question :
Question. Let (A, ฯ) be an indecomposable alternate module. Does it follow
that rk(A) โค 3? Does it follow that rk(A/Kฯ ) โค 2?
We computed many examples and this conjecture seems to be verified.
However we still do not have a proof for it.
21
Acknowledgements
All computations performed on examples leading to this result have been
performed using the GAP system [GAP].
I would like to thank my thesis advisor Olivier Guichard, whose suggestions have been very helpful. I would also like to thank Gaeฬl Collinet
who encouraged me to fully investigate this topic and Jean-Pierre Tignol for
pointing out some helpful references. Finally, I would like to thank my fellow
Ph.D student, Mohamad Maassarani for carefully listening to my proofs and
his helpful comments.
References
[AT85] S.A. Amitsur, J.-P. Tignol. Kummer subfields of Malcev-Neumann
division algebras. Israel Journal of mathematics, Vol. 50, Nos 1-2,
1985.
[AT86] S.A. Amitsur, J.-P. Tignol. Symplectic modules. Israel Journal of
mathematics, Vol. 54, No 3, 1986.
[GAP] The GAP Group, GAP โ Groups, Algorithms, and Programming,
Version 4.8.3 ; 2016, (http://www.gap-system.org).
[TW15] J.-P. Tignol, A. Wadsworth. Value Functions on Simple Algebras,
and Associated Graded Rings. Springer Monographs in Mathematics, 2015.
[Wal64] C.T.C. Wall. Quadratic forms on finite groups, and related topics.
Topology, Vol. 2:281-298, 1964.
22
| 4math.GR
|
arXiv:1206.5112v1 [cs.PL] 22 Jun 2012
Lucretia โ a type system for objects in languages
with reflectionโ
Viviana Bono1 , Marcin Benke2 , and Aleksy Schubert2
1
Dipartimento di Informatica dellโUniversitร di Torinoโ
2
University of Warsawโก
May 1, 2012
Abstract
Object-oriented scripting languages such as JavaScript or Python gain in
popularity due to their flexibility. Still, the growing code bases written in the
languages call for methods that make possible to automatically control the
properties of the programs that ensure their stability in the running time. We
propose a type system, called Lucretia, that makes possible to control the object structure of languages with reflection. Subject reduction and soundness
of the type system with respect to the semantics of the language is proved.
1
Introduction
Scripting object-oriented languages such as JavaScript, Python, Perl or Ruby became very popular [Sof12] due to their succinctness of program expressions and
flexibility of idioms [WNV09]. These languages optimise the programmer time,
rather than the machine time and are very effective when small programs are constructed [Pre00, WEF+ 09]. The advantages of the languages that help when a
short programs are developed can be detrimental in case big applications are created. Short code that has clear advantages when small programs are constructed
[Ous98] can provide less information for a person that looks for clues on what
particualr piece of code is doing (and this is one of the most frequent activities
โ
See http://www.youtube.com/watch?v=IuezNswtRfo
This work was partly supported by the PRIN 12008 DISCO grant.
โก
This work was partly supported by the Polish government grant no N N206 355836.
โ
1
1
INTRODUCTION
2
during software maintenance tasks, see e.g. [Sas96, KMCA06]). Moreover, the
strong invariants a programmer can rely on in case of statically typed languages
are no longer valid as type of a particular value can change with each instruction
and mostly in an uncontrolled way with each function call in the program.
Still, systems that handle complex and critical tasks such as Swedish premium
pension system [Ste01] are deployed and continuously maintained. Therefore, it
is desirable to study methods which help programmers in understanding their code
and keeping it consistent. Therefore we propose a type system that handles dynamic features of scripting languages and can help in understanding of the existing
code.
The type system we propose is presented in the style where many type annotations must be present to guarantee correct typechecking. In particular, we require
that function declarations as well as labelled instructions are decorated with their
types. What is more, the type system is so strong that the reconstruction of the
types is (most probably) undecidable. However, the system is designed in such a
way that it will primarily be used on top of a type inference algorithm and admits
a wide range of type inference heuristics that are not complete, but provide correct type annotations for wide range of programs. In addition, we would like to
encourage programmers to add type annotations to their programs since the annotations can serve as an important documentation of the code invariants assumed by
developers in the program construction phase.
The inherent feature of the scripting languages is that a running time type of
a particular variable may change in the course of program execution. This problem can be solved to some extent through introduction of single assignment form
for local variables. Still, this cannot be applied to object fields. The natural semantics of programs is such that the fields change and the efforts to circumvent
this principle will most probably result in a complicated solution. Therefore, the
statement that statically describes evolution of the running time type of a variable
cannot be just a type name, but must reflect the journey of the running time type
throughout the control flow graf of the program. It would be very inconvenient to
repeat the structure of the whole control flow graf at each variable in the program.
Therefore, it makes more sense to describe the type of each visible variable at each
statically available program point. This is the approach we follow in this paper and
present a type system which is inspired by the works on type-and-effect systems
[MM09, GL86]. However, we present our typing judgements in a slightly different
manner, i.e. one where the effect is described by a pair of constraints that express
the update performed by a particular instruction. In a sense the pair together with
the typed expression can be viewed as a triple in a variant of Hoare logic. The constraints we use to express the type information for an object are approximations of
the actual types by the matching constraints similar to the ones in [BB99].
2
MODEL LANGUAGE AND ITS SEMANTICS
3
This paper is structured as follows. The language in which we model the scripting languages is presented in Section 2. The type system is presented in Section 3.
Its properties are demonstrated in Section 4. At the end we present related work in
Section 5 and conclude in Section 6.
2
Model language and its semantics
The syntax of expressions we work with is presented in Fig 1. The figure presents
not only the raw syntax of programs, but also the syntax of evaluation contexts that
represent ifnormation on the particular point in the program the semantical reduction rules elaborate. Moreover, we present here the full syntax of the expressions
that may show up in the evolution of the expression being reduced. This is reflected
by the fact that we permit locations to occur in the expressions while the intent is
they are not directly visible in programs in the source form.
Definition 2.1 (Types) The type information associated with an expression of the
language we consider here is combined of two items. One is a representation of
the actual type and the second is the constraint expression which approximates
the shape of the type. These components are generated with help of the following
grammar:
tb
t
tr
ฮจ
::=
::=
::=
::=
c | X | tb,1 โจ tb,2 | [t1 , . . . , tn ; ฮจ1 ] =โ [tn+1 ; ฮจ2 ]
tb | t1 โจ t2 | โฅ
{l : t} | {}
X <# tr , ฮจ | โ
where c is a type constant from ConstT , X โ VT is a type variable. The set Types is
the set of elements generated from t, the set Typesb is the set of elements generated
from tb , the set Typesr is the set of elements generated from tr , and the set Constr
is the set of elements generated from ฮจ.
The set of objects O is the set of partial functions from identifiers to values.
The set of stores H is the set of finite partial functions from the set of locations to
the set of objects. The set of evaluation contexts EC is the set of sequences of basic
evaluation contexts as presented in Figure 1. The set of expressions EX is the set
of expressions as given in Figure 1. The semantics is defined by the relation ;
which relates triples (ฯ, E, e) โ H ร EC ร EX . Let s be a (partial) function we
write s[x/v] to denote function such that s[x/v](x) = v and s[x/v](y) = s(y) for
y 6= x and y โ dom(s).
When an evaluation context is a sequence E1 , E2 , . . . , En , we write it as
E1 hE2 h. . . En hโขi . . .ii.
2
MODEL LANGUAGE AND ITS SEMANTICS
identifiers
labels
locations
constants
function value
values
objects
fields list
function expression
expressions
x
n
l
c
vf
v
o
Lf
ef
e
::= . . . (identifiers). . .
::= . . . (identifiers). . .
::= . . .
::= func(x1 , ยท ยท ยท , xn ).t {e}
::= x | c | vf | l
::= {} | {Lf }
::= n : v | n : v, L
::= x | vf
::= v | let x = e1 in e2 | ef (e1 , ยท ยท ยท , en )
| opn (e1 , ยท ยท ยท , en )
| if (e1 ) then e2 else e3
| ifhasattr (x, a) then e1 else e2
| break n e | n.t {e}
| new | x1 .x2 = v | x1 .x2
basic evaluation con- E ::= โข | let x = E in e
texts
| vf (v1 , ยท ยท ยท , viโ1 , E, ei+1 , ยท ยท ยท , en )
| opn (v1 , ยท ยท ยท , viโ1 , E, ei+1 , ยท ยท ยท , en )
| if (E) then e2 else e3
| break n E
| n.t {E}
stores
ฯ ::= ยท | (l, o)ฯ
Figure 1: Syntax of ฮปM
4
2
MODEL LANGUAGE AND ITS SEMANTICS
~
~
(Let-Enter) ฯ, Ehlet
x = e1 in e2 i ; ฯ, Ehlet
x = he1 i in e2 i
~
~
(Let)
ฯ, Ehlet x = hvi in ei ; ฯ, Ehe[x/v]i
~
(Op-Enter) ฯ, Ehop
n (e1 , ยท ยท ยท , ek )i ;
~
ฯ, Ehop
n (he1 i, ยท ยท ยท , ek )i
~
(Op-Prop) ฯ, Ehop
(v
,
n 1 ยท ยท ยท , viโ1 , hvi i, ei+1 , ยท ยท ยท , ek )i ;
~
ฯ, Ehop
n (v1 , ยท ยท ยท , viโ1 , vi , hei+1 i, ยท ยท ยท , vk )i
~
(Op-Back) ฯ, Ehopn (v1 , ยท ยท ยท , hvk i)i ;
~
ฯ, Ehop
n (v1 , ยท ยท ยท , vk )i
~
~
(Op-Eval) ฯ, Ehop
(v
,
n 1 ยท ยท ยท , vk )i ; ฯ, Ehฮดn (opn , v1 , ยท ยท ยท , vk )i
(ฮฒ-Enter)
(ฮฒ-Prop)
(ฮฒv)
(If-Enter)
(If-True)
(If-False)
~
ฯ, Ehfunc(x
1 , ยท ยท ยท , xn ).t {e}(e1 , ยท ยท ยท , ek )i ;
~
ฯ, Ehfunc(x1 , ยท ยท ยท , xn ).t {e}(he1 i, ยท ยท ยท , ek )i
~
ฯ, Ehfunc(x
1 , ยท ยท ยท , xn ).t {e}(v1 , ยท ยท ยท , viโ1 , hvi i, ei+1 , ยท ยท ยท , en )i ;
~
ฯ, Ehfunc(x
1 , ยท ยท ยท , xn ).t {e}(v1 , ยท ยท ยท , viโ1 , vi , hei+1 i, ยท ยท ยท , en )i
~
ฯ, Ehfunc(x1 , ยท ยท ยท , xn ).t {e}(v1 , ยท ยท ยท , hvk i)i ;
~
ฯ, Ehe[x
1 /v1 , ยท ยท ยท , xn /vn ]i
~ (e1 ) then e2 else e3 i ; ฯ, Ehif
~ (he1 i) then e2 else e3 i
ฯ, Ehif
~ (htruei) then e2 else e3 i ; ฯ, Ehe
~ 2i
ฯ, Ehif
~
~ 3i
ฯ, Ehif (hfalsei) then e2 else e3 i ; ฯ, Ehe
~
~ 1i
(Ifhtr-True) ฯ, Ehifhasattr
(l, a) then e1 else e2 i ; ฯ, Ehe
when a โ dom(ฯ(l))
~
~ 2i
(Ifhtr-False) ฯ, Ehifhasattr
(l, a) then e1 else e2 i ; ฯ, Ehe
when a 6โ dom(ฯ(l))
~
~
(Brk-Enter) ฯ, Ehn.t
{e}i ; ฯ, Ehn.t
{hei}i
~ 1 hn.t {E
~ 2 hbreak n vi}i ; ฯ, E
~ 1 hvi,
(Brk-P)
ฯ, E
~2
when n does not occur as label in E
~
~
(Lbl-Pop) ฯ, Ehn.t {hvi}i ; ฯ, Ehvi
(New)
(SetRef)
(Deref)
~
~
ฯ, Ehnewi
; (l, โ
)ฯ, Ehli
l fresh
~
~
ฯ, Ehl.f
= vi ; ฯ[l/ฯ(l)[f /v]], Ehvi
~
~
ฯ, Ehl.f i ; ฯ, Ehฯ(l)(f )i
when f โ dom(ฯ(l))
Figure 2: Semantic rules of ฮปM
5
3
THE TYPE SYSTEM
6
When the relation holds between triples (ฯ, E, e), (ฯ 0 , E 0 , e0 ) we write the relation
as ฯ, Ehei ; ฯ 0 , E 0 he0 i. The precise semantical rules are given in Figure 2
We do not model inheritance and multiple inheritance of the scripting languages. We assume that this can be viewed as a notational shortcut for direct
presentation of objects and therefore we cannot model all features of the class
models (e.g. the method updates in classes in Python).
Constructs of the language The language we propose has object-oriented features such as object creation (new), field reference (the dot notation x1 .x2 ), and
field modification (x1 .x2 = v). In addition we have object introspetion operation
available through ifhasattr (ยท, ยท) then ยท else ยท construct. The flow of information
is controlled by let x = e1 in e2 expression that in addition to creation of a local
variable x makes possible to execute e1 and e2 in sequence. The traditional split of
control flow depending on a computed condition is realised by if (ยท) then ยท else ยท.
The exceptional flow can be realised by our labelled instructions combined with
break statements. At last loops can be organised by recursively defined functions.
Notably we use types in labelled instructions and in function declarations.
These types can in fact be omitted since they do not play part in the respective
reduction rules. The possible errors that may result by execution of an operation
on a value that the operation is not prepared to take are present in our system
through appropriate definition of ฮดn that can check the types of the values supplied
in the arguments.
3
The type system
Typing judgements are of the form ฮจ1 ; ฮ; ฮฃ ` e : tb ; ฮจ2 where ฮ is an environment
(i.e. mapping from variables to tb ), ฮฃ is a mapping from locations to type variables
VT , ฮจi for i = 1, 2 is a set of constraints of the form X <# t.
The intended meaning of such a judgment is: evaluating e in the environment
ฮ with types of locations that match the mapping ฮฃ and with the store satisfying
ฮจ1 leads to a value of type tb and store satisfying ฮจ2 .
Record update The information about the record being updated is represented
by a constraint on a variable X. The rule for record update comes in two variants,
depending on whether the constraint mentions the field being updated.
ฮจ1 ; ฮ; ฮฃ ` x : X; ฮจ1
ฮจ1 ; ฮ; ฮฃ ` e : t2 ; ฮจ2 , X <# {a : t02 , l : s}
ฮจ1 ; ฮ; ฮฃ ` x.a = e : t2 ; ฮจ2 , X <# {a : t2 , l : s}
(update-old)
3
THE TYPE SYSTEM
7
If (we know that) the record contains the field a that is to be updated, we forget the
old value, hence its type (t02 ) is ignored; the store after the update reflects the new
value of a.
ฮจ1 ; ฮ; ฮฃ ` x : X; ฮจ1
ฮจ1 ; ฮ; ฮฃ ` e : t2 ; ฮจ2 , X <# {l : s}
a 6โ l
ฮจ1 ; ฮ; ฮฃ ` x.a = e : t2 ; ฮจ2 , X <# {a : t2 , l : s}
(update-fresh)
otherwise the constraint for X is amended with information about the new value
of a.
Record access We can access a field a provided the constraint on the record
guarantees that it has the field a and it is of a definite type (it cannot be โฅ).
` u ฮจ 3 X <# {a : u, l : t}
(access)
ฮจ; ฮ, x : X; ฮฃ ` x.a : u; ฮจ
A type is definite (` u) if it is a type constant, type variable, function type or a
disjunction of definite types. This is defined inductively as follows:
`c
`X
` t1 ` t2
` t1 โจ t2
` [t1 , . . . , tn ; ฮจ1 ] =โ [u; ฮจ2 ]
Conditional instruction The basic way to split the processing depending on
some value is to use a conditional instruction. This instruction is typed in our
system in the following way.
ฮจ; ฮ; ฮฃ ` e1 : bool ; ฮจ1 ฮจ1 ; ฮ; ฮฃ ` e2 : u; ฮจ2 ฮจ1 ; ฮ; ฮฃ ` e3 : u; ฮจ2
(if)
ฮจ; ฮ; ฮฃ ` if (e1 ) then e2 else e3 : u; ฮจ2
The typing of the branches need to be typable into the same type. However,
the constraints in each of them can be in principle different. Therefore we need a
rule to weaken the constraint so that they result in the same set. For this we need
an operation that merges type constraint from two branches. This is defined in the
following way.
โข ฮจ, X <# {l : t} ] ฮจ0 , X <# {l0 : t0 } = ฮจ ] ฮจ0 , X <# {l : t} ] {l0 : t0 }
โข ฮจ]โ
=ฮจ
3
THE TYPE SYSTEM
8
โข โ
]ฮจ=ฮจ
โข {l0 : t0 , l : t} ] {l0 : t00 , l0 : t0 } = {l0 : t0 โจ t00 , l00 : t00 } where {l00 : t00 } =
{l : t} ] {l0 : t0 }
โข {} ] {l0 : t0 } = {l0 : t0 โจ โฅ}
โข {l0 : t0 } ] {} = {l0 : t0 โจ โฅ}
This combination of two sets of constraints need to be incorporated into type
derivation and this can be done using the following weakening rule.
ฮจ; ฮ; ฮฃ ` e : t; ฮจ1
(weaken-])
ฮจ; ฮ; ฮฃ ` e : t; ฮจ1 ] ฮจ2
Object structure introspection Dynamic languages split the processing not only
depending on some condition defined in terms of the actual values, but also depending on types of expressions. Therefore, we introduce the construct that performs
appropriate check and provide a typing rule that handles it.
ฮจ[X โ {a}]; ฮ, x : X; ฮฃ ` e1 : t; ฮจ2 ฮจ; ฮ, x : X; ฮฃ ` e2 : t; ฮจ02
(ifhasattr)
ฮจ; ฮ, x : X; ฮฃ ` ifhasattr (x, a) then e1 else e2 : t; ฮจ2 ] ฮจ02
The typing rule must update the typing information available in the branches of
the instruction. Type information in one branch takes as granted that the attribute
a is present. We need not pass the information that the attribute a is missing in the
other branch since the case that the actual value does not have the field a must be
expressed in the type description by an alternative with โฅ.
โข (ฮจ, X <# t)[X โ {a}] = ฮจ, X <# (t[X โ {a}]),
โข {a : t1 โจ ยท ยท ยท โจ tn , l : u}[X โ {a}] = {a : ti1 โจ ยท ยท ยท โจ tik , l : u} where
{ti1 , . . . , tik } = {ti | ti 6= โฅ and ti โ {t1 , . . . , tn }}.
We assume that base types are implemented so that they have a distinguished
field which makes possible to check for base type with ifhasattr (?, ?) then ? else ?.
Variable and location access The information about a type of a variable is
recorded in the type environment so we use it when a variable is referred in an
expression.
ฮจ; ฮ, x : t; ฮฃ ` x : t; ฮจ
(v-access)
3
THE TYPE SYSTEM
9
Similarly, the information about locations is stored in the location environment
ฮฃ and we exploit it in an analogous way.
ฮจ; ฮ; ฮฃ, l : t ` l : t; ฮจ
(l-access)
Function definition and call Whenever we want to type a function definition
we must rely on the type annotation that is associated with the function. We have
to add the type decoration to functions since they can be used in a recursive way.
The inference of a type in such circumstances must rely on some kind of a fixpoint
computation which is a difficult task. We assume here that the type is given in the
typechecking procedure either by hand with help of programmer or by some kind
of automatic type inference algorithm.
The type we obtain for a function definition is just the type that is explicitly
given in the function. However, we have to check in addition that the body of the
function indeed obeys the declared type. Therefore, we assume that the formal
parameters have the types expressed in the precondition of the function type and
obey the constraints noted in the constraint set from the same precondition. We
expect then that the resulting type is equal to the one in the postcondition of the
type and the constraints match the constraints in the postcondition. It is worth
noting that the constraints in the precondition and postcondition should take into
account not only the formal parameters, but also the global variables that are visible
in the function body.
Notably, we type the function body so that the typing does not interfere with
the typing of the function definition. This reflects the dynamic character of the
language. In particular the running time type of a global variable may differ at the
function definition point from the expected one so that the typing is impossible at
that particular moment. However, the situation may be different at the execution
site. Therefore, we defer the check of the compatibility of global variables to the
function call site.
t โก [t1 , . . . , tn ; ฮจ1 ] =โ [u; ฮจ2 ]
ฮจ1 ; ฮ, x1 : t1 , . . . , xn : tn ; ฮฃ ` e : u; ฮจ2
ฮจ; ฮ; ฮฃ ` func(x1 , ยท ยท ยท , xn ).t {e} : t; ฮจ
(fdecl)
In case a real application of a function expression is made to arguments we
have to check that the application indeed does not lead to type error in this case.
Therefore, the typing rule for application must check that the type information
for global variables at the call site (i.e. after all actual parameters of the call are
elaborated) is in accordance with the type information available in the functional
type. This is checked with the relation c .
3
THE TYPE SYSTEM
10
Definition 3.1 (c ) The rules that operate on constraint sets are as follows.
ฮจ c โ
ฮจ c ฮจ0 t c t0
ฮจ, X <# t c ฮจ0 , X <# t0
They reduce the problem to the one on record types where the relation is defined
as follows.
t c t
{l : t} c {}
{a : u, l : t} c {l : t}
u c u0
{a : u, l : t} c {a : u0 , l : t}
u c u
u1 c u1 โจ u2
u2 c u1 โจ u2
u1 c u01 u2 c u02
u1 โจ u2 c u02 โจ u01
Proposition 3.2 The relation c is reflexive and transitive.
Proposition 3.3 For any constraint sets ฮจ1 , ฮจ2 we have ฮจ1 c ฮจ1 ] ฮจ2 .
Execution of a function body causes changes of values held in global variables.
Such changes may give rise to changes in the types. This must by reflected and the
type information must be updated accordingly. Therefore, we need an operation of
such an update.
Definition 3.4 (type information update โ-) For two sets of constraints ฮจ1 , ฮจ2
we define inductively the set of constraints ฮจ1 โ- ฮจ2 , in words constraints ฮจ1
updated with ฮจ2 , as follows.
โข ฮจ โ- โ
= ฮจ,
โข ฮจ, X <# t โ- ฮจ0 , X <# t0 = (ฮจ โ- ฮจ0 ), X <# t0 ,
โข ฮจ โ- ฮจ0 , X <# t0 = (ฮจ โ- ฮจ0 ), X <# t0 when X 6โ dom(ฮจ).
It is important to observe that the update preserves at least the type information
that is present in the constraint with which we make the update.
Lemma 3.5 For any constraint sets ฮจ1 , ฮจ2 ,
ฮจ2 c ฮจ1 โ- ฮจ2
3
THE TYPE SYSTEM
11
We can now present the rule for function application. This rule elaborates
first all the expressions in the actual parameters and updates the constraints so
that their side effects are taken into account and then weakens the result to match
the constraints for the input part of the function type. Then the resulting set of
constraint is just the set of constraints after the last argument updated with the
constraint information contained in the result type of the function.
ฮจi ; ฮ; ฮฃ ` Ni : ti ; ฮจi+1 for i = 1, . . . , n
ฮจn+1 c ฮจ01
0
ฮจ1 ; ฮ; ฮฃ ` ef : [t1 , . . . , tn ; ฮจ1 ] =โ [u; ฮจ02 ]; ฮจ1
ฮจ1 ; ฮ; ฮฃ ` ef (N1 , . . . , Nn ) : u; ฮจn+1 โ- ฮจ02
(fapp)
Control flow with break instructions The language we propose includes nonlocal control flow instructions that may be used to simulate exceptions or jumps
out of loops (recursive calls in our case). The labelled instruction resembles a
call to an anonymous function with no parameters. We only have to remember
type information that we want to achieve as the result of the execution. Note that
the prospective break instructions can reside inside of a recursive function call.
Therefore, we cannot assume that the type we give here explicitely is a result of a
finitary collecting of a non-local typing information from all the break statements
inside e.
ฮจ; ฮ, n : [; โ
] =โ [t; ฮจ2 ]; ฮฃ ` e : t; ฮจ02
ฮจ02 c ฮจ2
(label)
ฮจ; ฮ; ฮฃ ` n.[; โ
] =โ [t; ฮจ2 ]{e} : t; ฮจ2
In case we encounter break instruction we have to check that the expression the
value of which it given as the result indeed obeys the expected result type of the
labelled instruction surrounding the break.
ฮจ; ฮ, n : [; โ
] =โ [t; ฮจ2 ]; ฮฃ ` e : t; ฮจ02
ฮจ02 c ฮจ2
(break)
ฮจ; ฮ, n : [; โ
] =โ [t; ฮจ2 ]; ฮฃ ` break n e : t0 ; ฮจ0
Let-expression The let expression is our language statement that does the instruction sequencing operation. Therefore, we have to compute the constraints for
the first step, then for the second one and at last combine them together as in the
logical cut rule that forgets the middle formula.
ฮจ1 ; ฮ; ฮฃ ` e1 : t1 ; ฮจ2
ฮจ2 ; ฮ, x : t1 ; ฮฃ ` e0 : t; ฮจ3
(let)
ฮจ1 ; ฮ; ฮฃ ` let x = e1 in e0 : t; ฮจ3
4
PROPERTIES OF THE TYPE SYSTEM
12
Object creation The object creation rule should just introduce information that a
new object is created. This is expressed by the fact the set of constraints is extended
with information on an object that has no known to the type system fields.
X fresh
(new)
ฮจ; ฮ; ฮฃ ` new : X; X <# {}, ฮจ
Disjunction We also add a rule to weaken the assumptions about an expression.
This is primarily necessary to obtain the subject reduction property. In case an if
instruction is reduced to one of its branches the type system infers only information
from one of the branches and the information from the other one must be added
artificially.
ฮจ1 ; ฮ; ฮฃ ` e : ti ; ฮจ2 i = 1 or 2
(weaken-โจ)
ฮจ1 ; ฮ; ฮฃ ` e : t1 โจ t2 ; ฮจ2
4
Properties of the type system
Soundness and subject reduction need to take the store into account. Hence we
need to express the fact that a store instance satisfies certain constraints:
ฯ; ฮฃ |= ฮจ
where ฯ is a store, ฮฃ a mapping between locations and types, and ฮจ a set of
constraints of the form X <# t.
Definition 4.1 (|=) If c is a constant of type tc :
ฯ; ฮฃ |= c : tc
For function values:
ฮจ; โ
; ฯ ` f unc(~x).t{e} : t; ฮจ ฯ; ฮฃ |= ฮจ
(|= fun)
ฯ; ฮฃ |= f unc(~x).t{e} : t
ฯ; ฮฃ |= โ
If l is a location:
ฯ; ฮฃ |= ฮจ ฯ, ฮฃ |= v : t
(|= obj)
ฯ[l/{a : v, y : s}]; ฮฃ(l : X) |= X <# {a : t}, ฮจ
4
PROPERTIES OF THE TYPE SYSTEM
13
in particular, for every object o:
ฯ(l/o); ฮฃ(l : X) |= X <# {}
For any ฮจ, ฮจ0
ฯ; ฮฃ |= ฮจ
(|= ])
ฯ; ฮฃ |= ฮจ ] ฮจ0
For any t1 , t2 ,
ฯ; ฮฃ |= v : ti
(|= โจ)
ฯ; ฮฃ |= v : t1 โจ t2
Lemma 4.2 (soundness of c ) For any ฯ, ฮฃ and constraint sets ฮจ1 , ฮจ2 , if ฯ, ฮฃ |=
ฮจ1 and ฮจ1 c ฮจ2 then ฯ, ฮฃ |= ฮจ2
Proof:
It is sufficient to prove that if ฯ, ฮฃ |= X <# o1 and o1 c o2 then ฯ, ฮฃ |= X <# o2 .
We proceed first by induction on the derivation of |=. The only nontrivial rules are
(|= obj) โ again, the only (marginally) nontrivial case is when o1 c o2 was derived
via the disjunction rule:
{l : t} c {l : t0 }
{a : u, l : t} c {a : u โจ u0 , l : t0 }
In this case we can derive ฯ, ฮฃ |= X <# o2 by inserting (|= โจ) before the
โa : uโ premise of the final (|= obj) rule in the original derivation.
(|= ]) โ we have ฯ, ฮฃ |= X <# o1 , o2 = o1 ] o0 , o2 c o3 and need to prove
ฯ, ฮฃ |= X <# o3 , which can be done by induction on the definition of
o2 c o3 .
Lemma 4.3 If
ฯ; ฮฃ(l : X) |= X <# {a : t; f : s}, ฮจ0
and ` t (i.e. t contains no โฅ), then
(i) ฯ(l)(a) is defined
(ii) ฯ; ฮฃ |= ฯ(l)(a) : t
(iii) ฯ; ฮฃ |= ฮจ0
4
PROPERTIES OF THE TYPE SYSTEM
14
Proof:
By induction on the derivation of ฯ; ฮฃ(l : X) |= X <# {a : t; f : s}.
If the last rule is (|= obj) then the thesis follows immediately. On the other
hand, if the last rule is (|= ]), we have
X <# {a : t, f : u}, ฮจ0 = ฮจ1 ] ฮจ2
ฯ; ฮฃ |= ฮจi
(|= ])
ฯ; ฮฃ |= ฮจ1 ] ฮจ2
By the definition of ], one of the following holds:
(a) ฮจ1 = X <# {a : t, f : u}, ฮจ01 , X 6โ dom(ฮจ2 )
(b) ฮจ2 = X <# {a : t, f : u}, ฮจ02 , X 6โ dom(ฮจ1 )
(c) ฮจ1 = X <# {l : s}, ฮจ01 , ฮจ2 = X <# {l0 : s0 }, ฮจ02
If (a) or (b) holds, the thesis follows directly from the induction hypothesis.
In the (c) case, by the assumption that ` t, we have a โ l, a โ l0 as well as
t = t1 โจ t2 with ` t1 and ` t2 .
Moreover, either
ฯ; ฮฃ |= X <# {a : t1 , f : u}, ฮจ01
or
ฯ; ฮฃ |= X <# {a : t2 , f 0 : u0 }, ฮจ01
Then by the induction hypothesis ฯ(l)(a) is defined, and
ฯ; ฮฃ |= ฮจ0i
ฯ; ฮฃ |= ฯ(l)(a) : ti
for appropriate i. Thus by the rule (|= โจ) we have
ฯ; ฮฃ |= ฯ(l)(a) : t1 โจ t2
which completes the proof. 2
Lemma 4.4 (value completeness) For any ฯ, ฮฃ, ฮ, ฮจ and value v if ฯ, ฮฃ |= ฮจ
and ฯ, ฮฃ |= v : t then ฮจ; ฮ; ฮฃ ` v : t; ฮจ
4
PROPERTIES OF THE TYPE SYSTEM
15
Proof:
By induction on the derivation of ฯ, ฮฃ |= v : t. For the constant and function rules,
the thesis follows directly.
On the other hand if the last rule used was
ฯ; ฮฃ |= v : ti
(|= โจ)
ฯ; ฮฃ |= v : t1 โจ t2
then by the induction hypothesis ฮจ; ฮ; ฮฃ ` v : ti ; ฮจ, hence ฮจ; ฮ; ฮฃ ` v : t1 โจ
t2 ; ฮจ.
Lemma 4.5 (Progress) If ฮจ1 ; ฮ; ฮฃ ` e : t; ฮจ2 and ฯ; ฮฃ |= e : t; ฮจ1 then either e
is a value, or
ฯ, e ; ฯ 0 , e0
Proof:
The only expressions which may get stuck are record access (in case of lack of a
field) and function application (in case of arity mismatch). Reducibility of record
access follows from the Lemma 4.3.
Lemma 4.6 (value stability) If v is a value and
ฮจ1 ; ฮฃ ` v : t; ฮจ2
then ฮจ1 c ฮจ2 .
Moreover, for any ฮจ we have ฮจ; ฮฃ ` v : t; ฮจ
Proof:
By induction on the derivation. The thesis follows directly for axioms and the
function definition. For the disjunction rule use the induction hypothesis. For the
] rule the thesis follows from Proposition 3.3.
Since v is a value, no other rules can be used in the derivation.
Lemma 4.7 (weakening) If ฮจ1 ; ฮ; ฮฃ ` e : t; ฮจ2 and ฮ โ ฮ0 , ฮฃ โ ฮฃ0 then
ฮจ1 ; ฮ; ฮฃ0 ` e : t; ฮจ2
Proof:
By routine induction on derivation.
Lemma 4.8 (subject reduction) Reduction preserves typings, i.e. if
ฮจ1 ; ฮ; ฮฃ ` e : t; ฮจ2
ฯ; ฮฃ |= ฮจ1
4
PROPERTIES OF THE TYPE SYSTEM
16
~
~ 0i
ฯ, Ehei
; ฯ 0 , Ehe
then there exist ฮฃ0 , ฮจ0 such that ฮฃ โ ฮฃ0 and
ฮจ0 ; ฮ; ฮฃ ` e0 : t; ฮจ2
ฯ 0 ; ฮฃ0 |= ฮจ0
Moreover if ฯ = ฯ 0 then the thesis holds for ฮฃ0 = ฮฃ and ฮจ0 = ฮจ.
Proof:
By induction on the derivation. We now consider several cases depending on the
last rule used
Case e = new:
ฮจ; ฮ; ฮฃ ` new : X; X <# {}, ฮจ
If ฯ; ฮฃ |= ฮจ1 then
ฯ(l/{}); ฮฃ(l : X) |= X <# {}, ฮจ
Case e = l.a:
` u ฮจ 3 X <# {a : u, f : t}
ฮจ; ฮ; l : X, ฮฃ ` l.a : u; ฮจ
~ hl.xi ; ฯ, ฯ(l)(a). Since ฯ; l : X, ฮฃ |= ฮจ then by Lemma 4.3, ฯ(l)
We have ฯ, E
has field a of type u:
ฯ; ฮฃ |= ฯ(l)(a) : u
Hence by Lemma 4.4
ฮจ; ฮ; l : X, ฮฃ ` ฯ(l)(a) : u; ฮจ
Case e = if (e1 ) then e2 else e3 :
ฮจ; ฮ; ฮฃ ` e1 : bool ; ฮจ1 ฮจ1 ; ฮ; ฮฃ ` e2 : u; ฮจ2 ฮจ1 ; ฮ; ฮฃ ` e3 : u; ฮจ2
ฮจ; ฮ; ฮฃ ` if (e1 ) then e2 else e3 : u; ฮจ2
~ hei reduces to ฯ, E
~ he0 i where e0 is either e2 or e3 . In
If e1 is a value then ฯ, E
both cases we have
ฮจ1 ; ฮ; ฮฃ ` e0 : t; ฮจ2
ฯ 0 ; ฮฃ |= ฮจ2
~ he1 i ; ฯ 0 , E
~ he0 i. By induction hypothesis, there are ฮฃ0 , ฮจ0
Otherwise, ฯ, E
1
such that
ฮจ0 ; ฮ; ฮฃ ` e01 : t; ฮจ2
4
PROPERTIES OF THE TYPE SYSTEM
17
ฯ 0 ; ฮฃ0 |= ฮจ0
By the typing rule for if and Lemma 4.7, we have
ฮจ0 ; ฮ; ฮฃ0 ` if (e1 ) then e2 else e3 : t; ฮจ2
Case e = func(x1 , ยท ยท ยท , xn ).t {eb }(v1 , ยท ยท ยท , vk ) :
ฮจ01 ; ฮ, ~x : ~t; ฮฃ ` eb : u; ฮจ02
ฮจ1 ; ฮ; ฮฃ ` func(~x).t {eb } : [t1 , . . . , tn ; ฮจ01 ] =โ [u; ฮจ02 ]; ฮจ1
ฮจi ; ฮ; ฮฃ ` Ni : ti ; ฮจi+1 for i = 1, . . . , n
ฮจn+1 c ฮจ01
ฮจ1 ; ฮ; ฮฃ ` func(~x).t {eb }(~v ) : u; ฮจn+1 โ- ฮจ02
For simplicity consider case when n = 1:
ฮจ01 ; ฮ, x : t1 ; ฮฃ ` eb : u; ฮจ02
ฮจ1 ; ฮ; ฮฃ ` func(x).t {eb } : [t1 ; ฮจ01 ] =โ [u; ฮจ02 ]; ฮจ1
ฮจ1 ; ฮ; ฮฃ ` v1 : t1 ; ฮจ2
ฮจ2 c ฮจ01
ฮจ1 ; ฮ; ฮฃ ` func(x).t {eb }(v) : u; ฮจ2 โ- ฮจ02
We have
~ hfunc(x).t {eb }(v)i ; ฯ, E
~ h(eb [x/v])i
ฯ, E
Consider an occurrence of a variable axiom for x in the type derivation for eb :
ฮจx ; ฮ0 ` x : t1 ; ฮจx
By the stability lemma (4.6), ฮจx ; ฮ0 ` v : t1 ; ฮจx . Hence by replacing all such
occurrences by appropriate type derivations for v, we get
ฮจ01 ; ฮ, x : t1 ; ฮฃ ` eb [x/v] : u; ฮจ02
By the Lemma 4.6 ฮจ1 c ฮจ2 , and ฮจ2 c ฮจ01 is the side condition of the
application. Hence by transitivity of c we have ฮจ1 c ฮจ01 .
By Lemma 3.5, we have ฮจ02 c ฮจ2 โ- ฮจ02 , hence
ฮจ1 ; ฮ, x : t1 ; ฮฃ ` eb [x/v] : u; ฮจ2 โ- ฮจ02
. Which was to be proved.
5
RELATED WORK
Structural rules (], โจ)
18
If the last rule used is
ฮจ1 ; ฮ; ฮฃ ` e : ti ; ฮจ2
ฮจ1 ; ฮ; ฮฃ ` e : t1 โจ t2 ; ฮจ2
then by the induction hypothesis the thesis holds for ti , hence by reapplying the
disjunction rule also for t1 โจ t2 .
If the last rule used is
ฮจ; ฮ; ฮฃ ` e : t; ฮจ2
ฮจ; ฮ; ฮฃ ` e : t; ฮจ2 ] ฮจ3
Then by the induction hypothesis
ฮจ0 ; ฮ; ฮฃ ` e0 : t; ฮจ2
ฯ 0 ; ฮฃ0 |= ฮจ0
And we can get the thesis by applying the ] rule.
~
Theorem 4.9 (soundness) If ฮจ1 ; ฮ; ฮฃ ` |Ehei|
: t; ฮจ2 and
ฯ; ฮฃ |= ฮจ1
~
then either ฯ, Ehei
has an infinite reduction path, or it reduces to a value v,
0
0
i.e. there exist ฯ , ฮฃ and value v such that
~
ฯ, Ehei
;โ ฯ 0 , v
and
ฯ 0 ; ฮฃ0 |= v : t, ฮจ2 .
Proof:
By the progress lemma (4.5), the reduction can stop only at a value. Required
properties of the final value and state follow from lemmas 4.8 (by induction on the
lreduction length) and 4.6.
5
Related work
The starting point of our research is the paper by Guha et al [GSK11] where a type
system for scripting languages is presented. The type system there does not address
the types of objects and only infers the typing information concerning base types
(including special type of references to take into account object in a very simple
6
CONCLUSIONS AND FUTURE WORK
19
way). We provide here a type system which in addition to the one by Guha et al
can infer meaningful typing information for objects.
In addition, the paper by Guha et al relies on runtime tags which are present in
the semantics of dynamicly typed languages such as JavaScript. The checks over
runtime type tags can be viewed as asserts that check if the particular value is of
an expected type. This primitive has, however, one disadvantage. Namely, it does
not reflect the split in the control flow that makes possible to use particular type.
Still, the scripting languages have operators that check for the actual running time
type of a value (e.g. typeof function and in operator in JavaScript, or hasattr,
getattr, and getattr_static in Python). We consider it more natural to rely on these
operators instead of the tagchecks.
Our typing framework works in a fashion such that, in principle, all the typing
information should be present. This scenario is not realistic when the expectations
of the scripting languages programmers are taken into account. Each real effort
to bring static information into the program development here must consider what
was explicated in [WEF+ 09] and realised in a scpecific way in Thorn scripting language [BFN+ 09] and led to interesting type architecture [WNL+ 10a, WNL+ 10b].
6
Conclusions and future work
The type system presented in this paper gives an expressible framework for typing
objects in dynamic languages such as Python or JavaScript. It follows the general
view of type-and-effect systems where running time program property must be
expressed as a dynamical change. We express this change by means of Hoarelike triples that describe the structure of relevant objects before an expression is
executed and after the execution.
The type system is presented in a fashion similar to Church-style. The necessary typing information must be provided by a programmer. We work now on
helpful heuristics that will infer most of the type information to make the annotational effort of a programmer minimal and on the way a system with types can be
integrated to real program development in scripting languages.
References
[BB99]
Viviana Bono and Michele Bugliesi. Matching for the lambda calculus of objects. Theoretical Computer Science, 212(1โ2):101โ140,
1999.
REFERENCES
20
[BFN+ 09]
Bard Bloom, John Field, Nathaniel Nystrom, Johan รstlund, Gregor
Richards, Rok Strniลกa, Jan Vitek, and Tobias Wrigstad. Thorn: robust, concurrent, extensible scripting on the jvm. In Proceedings of
the 24th ACM SIGPLAN Conference on Object Oriented Programming Systems Languages and Applications, pages 117โ136, New
York, NY, USA, 2009. ACM.
[GL86]
David K. Gifford and John M. Lucassen. Integrating functional and
imperative programming. In Proceedings of the 1986 ACM Conference on LISP and Functional Programming, LFP โ86, pages 28โ38,
New York, NY, USA, 1986. ACM.
[GSK11]
Arjun Guha, Claudiu Saftoiu, and Shriram Krishnamurthi. Typing
local control and state using flow analysis. In Proceedings of the
20th European conference on Programming languages and systems:
part of the joint European conferences on theory and practice of
software, ESOPโ11/ETAPSโ11, pages 256โ275, Berlin, Heidelberg,
2011. Springer-Verlag.
[KMCA06] Andrew J. Ko, Brad A. Myers, Michael J. Coblenz, and Htet Htet
Aung. An exploratory study of how developers seek, relate, and collect relevant information during software maintenance tasks. IEEE
Transactions on Software Engineering, 32(12):971โ987, December
2006.
[MM09]
Daniel Marino and Todd Millstein. A generic type-and-effect system. In Proceedings of the 4th International Workshop on Types in
Language Design and Implementation, TLDI โ09, pages 39โ50, New
York, NY, USA, 2009. ACM.
[Ous98]
John K. Ousterhout. Scripting: Higher-level programming for the
21st century. Computer, 31(3):23โ30, March 1998.
[Pre00]
Lutz Prechelt. An empirical comparison of seven programming languages. Computer, 33(10):23โ29, October 2000.
[Sas96]
William Sasso. Cognitive processes in program comprehension: An
empirical analysis in the context of software reengineering. Journal
of Systems and Software, 34(3):177โ189, September 1996.
[Sof12]
Tiobe Software. Tiobe programming community index for april
2012.
Web page http://www.tiobe.com/index.php/
content/paperinfo/tpci/index.html, April 2012.
REFERENCES
21
[Ste01]
Ed Stephenson. A fallback application built in six months earns
the prime role. a fallback application built in six months earns
the prime role. http://oreilly.com/pub/a/oreilly/
perl/news/swedishpension_0601.html, June 2001.
[WEF+ 09]
Tobias Wrigstad, Patrick Eugster, John Field, Nate Nystrom, and Jan
Vitek. Software hardening: a research agenda. In Proceedings for
the 1st Workshop on Script to Program Evolution, STOP โ09, pages
58โ70, New York, NY, USA, 2009. ACM.
[WNL+ 10a] Tobias Wrigstad, Francesco Zappa Nardelli, Sylvain Lebresne, Johan รstlund, and Jan Vitek. Integrating typed and untyped code
in a scripting language. SIGPLAN Notices, 45(1):377โ388, January
2010.
[WNL+ 10b] Tobias Wrigstad, Francesco Zappa Nardelli, Sylvain Lebresne, Johan รstlund, and Jan Vitek. Integrating typed and untyped code
in a scripting language. In Proceedings of the 37th Annual ACM
SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pages 377โ388, New York, NY, USA, 2010. ACM.
[WNV09]
Tobias Wrigstad, Nate Nystrom, and Jan Vitek, editors. STOP โ09:
Proceedings for the 1st Workshop on Script to Program Evolution,
New York, NY, USA, 2009. ACM.
| 6cs.PL
|
1
arXiv:1711.09305v2 [cs.PL] 28 Nov 2017
A Language for Probabilistically Oblivious Computation
DAVID DARAIS, University of Maryland
CHANG LIU, University of California, Berkeley
IAN SWEET, University of Maryland
MICHAEL HICKS, University of Maryland
An oblivious computation is one that is free of direct and indirect information leaks, e.g., due to observable
di๏ฌerences in timing and memory access patterns. This paper presents L obliv , a core language whose type
system enforces obliviousness. Prior work on type-enforced oblivious computation has focused on deterministic programs. L obliv is new in its consideration of programs that implement probabilistic algorithms, such
as those involved in cryptography. L obliv employs a substructural type system and a novel notion of probability region to ensure that information is not leaked via the distribution of visible events. The use of regions
was motivated by a source of unsoundness that we discovered in the type system of ObliVM, a language for
implementing state of the art oblivious algorithms and data structures. We prove that L obliv โs type system
enforces obliviousness and show that it is nevertheless powerful enough to check state-of-the-art, e๏ฌcient
oblivious data structures, such as stacks and queues, and even tree-based oblivious RAMs.
1
INTRODUCTION
Cloud computing allows clients to conveniently outsource computation, but they must trust that
cloud providers do not exploit or mishandle sensitive information. To remove the provider from
the trusted computing base, work in both industry and research has strived to realize a โsecureโ
abstract machine comprising an execution engine and protected memory: The adversary cannot
see sensitive data as it is being operated on, nor can it observe such data at rest in memory. Such
an abstract machine can be realized by encrypting the data in memory and then performing computations using cryptographic mechanisms (e.g., secure multi-party computation [Yao 1986]) or
secure processors [Hoekstra 2015; Suh et al. 2003; Thekkath et al. 2000].
Unfortunately, a secure abstract machine does not defend against an adversary that can observe
memory access patterns [Islam et al. 2012; Maas et al. 2013; Zhuang et al. 2004] and instruction
timing [Brumley and Boneh 2003; Kocher 1996], among other โsideโ channels of information. For
cloud computing, such an adversary is the cloud provider itself, which has physical access to its
machines, and so can observe tra๏ฌc on the memory bus.
A countermeasure against an unscrupulous provider is to augment the secure processor to store
code and data in oblivious RAM (ORAM) [Maas et al. 2013; Suh et al. 2003]. First proposed by
Goldreich and Ostrovsky [Goldreich 1987; Goldreich and Ostrovsky 1996], ORAM obfuscates the
mapping between addresses and data, in e๏ฌect โencryptingโ the addresses along with the data. Replacing RAM with ORAM solves (much of) the security problem but incurs a substantial slowdown
in practical situations [Liu et al. 2015, 2013; Maas et al. 2013] as reads/writes add overhead that is
polylogarithmic in the size of the memory.
Recent work has explored methods for reducing the cost of programming with ORAM. Liu et al.
[2015, 2013, 2014] developed a family of type systems to check when partial use of ORAM (alongside normal, encrypted RAM) results in no loss of security; i.e., only when the addresses of secret
data could (indirectly) reveal sensitive information must the data be stored in ORAM. This optimization can provide order-of-magnitude (and asymptotic) performance improvements. Wang
Working draft as of July 7, 2017.
1:2
David Darais, Chang Liu, Ian Sweet, and Michael Hicks
et al. [2014] explored how to build oblivious data structures (ODSs), such as queues or stacks, that
are more e๏ฌcient than their standard counterparts implemented on top of ORAM. Their technique involves specializing ideas from ORAM algorithms to particular data structures, resulting in
asymptotic performance gains in common cases. In followup work, Liu et al. [2015] devised a programming language called ObliVM1 for implementing such oblivious data structures. While Liu et
al.โs earlier work treats ORAM as a black box, in ObliVM one can program ORAM algorithms as
well as ODSs. A key feature of ObliVM is careful treatment of random numbers, which are at the
heart of state-of-the-art ORAM and ODS algorithms. While the goal of ObliVM is that well-typed
programs are secure, no formal argument to this e๏ฌect is made.
In this paper, we present L obliv , a core language for oblivious computation, inspired by ObliVM.
L obliv extends a core imperative language equipped with an information ๏ฌow type system [Sabelfeld
and Myers 2006] with primitives for generating and using uniformly distributed random numbers.
We prove that L obliv โs type system guarantees probabilistic memory trace obliviousness (MTO), i.e.,
that the possible distribution of adversary-visible execution traces is independent of the values of
secret variables. This property generalizes the deterministic MTO property enforced by Liu et al.
[2015, 2013], which did not consider the use of randomness. In carrying out this work, we discovered that the ObliVM type system is unsound, so an important contribution of L obliv is to address
the problem without overly restricting or complicating the language.
L obliv โs type system aims to ensure that no probabilistic correlation forms between secrets and
publicly revealed random choices. With oblivious computations it is frequently the case that a
random choice is made (e.g., where to store a particular block in an ORAM), and eventually that
choice is made visible to the adversary (e.g., when that or another block is later looked up). This
visibility is OK as long as the revealed value does not communicate information about a secret,
which L obliv ensures by guaranteeing the number is always (still) uniformly distributed.
L obliv โs type system, presented in Section 4, ensures uniform revelations in part by treating randomly generated numbers as a๏ฌne, meaning they cannot be freely copied. This prohibition prevents revealing the same number twice (where the second revelation will not be uniform). Unfortunately, a๏ฌnity is too strong for practical algorithms, which do make copies of random numbers.
L obliv โs type system thus allows random numbers to be coerced to merely-secret numbers but only
so long as the secret version is never revealed. Moreover, L obliv requires that previously-random
numbers not be allowed to in๏ฌuence the choice of to-be-revealed random numbers, since such
in๏ฌuence might violate the latterโs uniformity. For example, we should not be able to coerce a random number to a secret, look at the secret, and then decide to reveal that random number or some
other one. The type system prevents this problem by using a new mechanism we call probability regions to track the transitive (in)dependence of numbers in one region from those in another. (That
probability regions are missing in ObliVM is the source of its unsoundness.) Section 5 outlines
proof that L obliv enjoys MTO, i.e., if a L obliv program is well typed, then its observable behavior is
oblivious. Further details of the proof are in the Appendix.
While we have not retro๏ฌtted L obliv โs type system into ObliVM, we have implemented a type
checker for L obliv . Section 6 presents a version of Tree ORAM [Shi et al. 2011], a state-of-the-art
ORAM implementation, that our language type checks. We also show, in Section 3, that oblivious
stacks, a kind of oblivious data structure [Wang et al. 2014], can be type checked when implemented
on top of a non-recursive ORAM. As far as we are aware, our implementations constitute the ๏ฌrst
automated proofs that these data structures are indeed oblivious. We believe L obliv is a promising
step forward, generalizing the work that came before it (Section 7 discusses related work).
1 http://www.oblivm.com
A Language for Probabilistically Oblivious Computation
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
1:3
let add (mem : ( int S โ int S) array ) (a : int S) (v : int S) =
let len = length (m) in
let rec iterate ( curr_idx : int P) ( pair : ( int S โ int S) ) : unit =
if curr_idx = len then ()
else (โ WRONG code first โ)
(โ let (_, curr_addr ) = mem[curr_idx] in โ)
(โ if curr_addr = โ1 then mem[curr_idx] โ pair โ)
(โ else iterate ( curr_idx + 1) pair โ)
(โ CORRECT code below โ)
let (_, curr_addr) as curr_pair = mem[curr_idx] in
let (_, addr) = pair in
let ( t_pair , f_pair ) = mux (curr_addr = โ1 && not(addr = โ1)) pair curr_pair in
mem[curr_idx] โ t_pair ;
iterate ( curr_idx + 1) f_pair in
iterate 0 (v , a)
Fig. 1. Adding to an โassociation arrayโ obliviously (aka add for trivial ORAM)
2 BACKGROUND
This section presents the de๏ฌnition of the threat model and background on type-enforced deterministic oblivious execution. The next section motivates and sketches our novel type system for
enforcing probabilistic oblivious execution.
2.1
Threat Model
We assume a powerful adversary that can make ๏ฌne-grained observations about a programโs execution. In particular, we use a generalization of the program counter (PC) security model [Molnar
et al. 2006]: The adversary knows the program being executed, can observe the PC during execution as well as the contents and patterns of memory accesses. Some secret memory contents may
be encrypted (while public memory is not) but all memory addresses are still visible.
As a relevant instantiation, consider an untrusted cloud provider using a secure processor, like
SGX [Hoekstra 2015]. Reads/writes to/from memory can be directly observed, but secret memory
is encrypted (using a key kept by the processor). The pattern of accesses, timing information, and
other system features (e.g., instruction cache misses) provide information about the PC. Another
instantiation is secure multi-party computation (MPC) using secret shares [Goldreich et al. 1987].
Here, two parties simultaneously execute the same program (and thus know the program and
program counter), but certain values, once entered by one party or the other, are kept hidden from
both using secret sharing.
Our techniques can also handle weaker adversaries, such as those that can observe memory
tra๏ฌc but not the PC, or can make timing measurements but cannot observe the PC or memory.
2.2
Oblivious execution
Our goal is to ensure memory trace obliviousness (MTO), which is a kind of noninterference property [Goguen and Meseguer 1982; Sabelfeld and Myers 2006]. This property states that despite
being able to observe each address (of instructions and data) as it is fetched, and each public value,
the adversary will not be able to infer anything about manipulated secret values. To see how such
an inference could occur, consider the program in Figure 1 (in OCaml-style syntax). This program
takes an array of pairs of secret integers mem, a secret address a, and a secret value v and adds the
1:4
David Darais, Chang Liu, Ian Sweet, and Michael Hicks
pair (v , a) to a free slot in the array, as de๏ฌned by its value having address โ1. The commented out
code on lines 6โ8 illustrate a non-oblivious implementation. The code works by (on line 6) extracting the current array element, (on line 7) checking if its address is โ1 and updating the element if
so, and otherwise (on line 8) continuing to consider the next array element. Notice that curr_index
is designated as non-secret ( int P means โpublic intโ) because the index to an array is e๏ฌectively
revealed when the adversary can observe memory accesses. If the program executes mem[idx] then
the adversary can observe some address a being read. Knowing the starting address s of array mem,
the adversary can compute idx = a โ s.
By watching the address trace, an adversary can learn something about the arrayโs contents. In
particular, a sequence of N reads followed by a write implies that the ๏ฌrst N โ 1 slots were not
free while slot N was; no writes means no free slots. The adversary can also watch the program
counter to notice when the true vs. the false branch of the conditional is taken, revealing the same
information. The code on lines 10โ16 ๏ฌxes these problems. The mux on line 12 is the key part. It
takes three arguments. The ๏ฌrst is a boolean condition, which here is whether the current slot is
free and also whether pair โs address is not โ1. If so then the mux evaluates to a pair comprised of
the muxโs second and third arguments, in that order; otherwise the pairโs contents are reversed.
Line 13 updates memโs current slot with the ๏ฌrst element of the pair, and recurses to consider the
next element, passing the second element of the pair. This code is oblivious: it reads and writes
every slot in the array, and always executes exactly the same statements, no matter the contents
of the array, index, or value arguments. As such, observing the codeโs execution reveals nothing
about the secrets it manipulates.
This code is actually the add operation of a โtrivialโ oblivious RAM (ORAM) implementation [Goldreich 1987; Goldreich and Ostrovsky 1996]. ORAM provides an API that is like an array, but makes
sure the address trace does not reveal the relationship between the index and the value. That is, for
read oram i and write oram i v operations, the index i is e๏ฌectively kept secret. We will later consider
sophisticated ORAM algorithms, which use trivial ORAM as a building block.
2.3
Obliviousness by typing
Liu et al. [2015, 2013] developed a type system that ensures programs are MTO. Types are extended
to indicate where values are allocated; as per our above example data can be public or secret, but
can also reside in ORAM. Liu et al.โs small-step operational semantics ฯ ; e โโt ฯ โฒ; e โฒ reduces
an expression e in memory ฯ to heap ฯ โฒ and expression e โฒ while emitting trace event t. Trace
events include fetched instruction addresses, public values, and the addresses of public and secret
values, that are read and written, but not the addresses or values of data stored in ORAM, which
is modeled as a black box: Basically it is treated as if it were an array whose accesses are opaque
to the adversary (similar to the Dolev-Yao modeling of encrypted messages [Dolev and Yao 1981]).
Under this model, the MTO property means that running e in two low-equivalent memories ฯ1
and ฯ2 โmeaning they agree on public valuesโwill produce the exact same memory trace, along
with low-equivalent output heaps and results. More formally, if ฯ1 โผ ฯ2 then ฯ1 ; e โโt1 ฯ1โฒ; e 1 and
ฯ2 ; e โโt2 ฯ2โฒ ; e 2 imply t 1 = t 2 , ฯ1โฒ โผ ฯ2โฒ , and e 1 โผ e 2 , where operator โผ denotes low-equivalence.
3 TYPE-BASED ENFORCEMENT OF PROBABILISTIC OBLIVIOUSNESS
Liu et alโs type system enforces obliviousness of deterministic programs that use ORAM. However,
work on oblivious data structures [Wang et al. 2014] has shown that probabilistic uses of ORAM can
be far more e๏ฌcient. In such uses, visible memory and traces need not be identical when computing
with di๏ฌerent secrets, but rather they only must be identically distributed; i.e., all possible memory
traces are equally likely, no matter the secrets used. Indeed, this is the same property that ORAM
A Language for Probabilistically Oblivious Computation
1
2
3
4
5
6
7
8
1:5
let stackop (( oram,rid_r ) :' a Stack) (ispush : Bool S) (d :' a) : ' a =
let rid = ! rid_r in
let old_d = read oram rid in
let (d ', _) = mux ispush d old_d in
let ( id , _) = mux ispush (rid +1) rid in
write oram id d ';
let ( rid ', _) = mux ispush (rid+1) ( rid โ1) in
rid_r := rid '; d'
Fig. 2. A deterministic oblivious stack built using a full (recursive) ORAM.
algorithms, if we open up the black box, are actually providing. This section motivates the bene๏ฌts
of probabilistic programming with ORAMs, and sketches our type system that enforces MTO for
such programs. Section 6 shows this type system is actually powerful enough to implement ORAM
algorithms directly, so they need not be treated as black boxes.
3.1
Motivation: naive oblivious stack is ine๏ฌicient
The goal of an oblivious stack is to hide both its data and which operations (pushes or pops) are
taking placeโonly the total number of operations should be revealed. An incorrect approach would
be to implement the stack as usual but using a secret (encrypted) array. While doing this would hide
the contents of the array, indexes into that array would be visible to the adversary (as discussed in
Section 2.2), which would reveal the operationโincreasing indexes indicate pushes, and decreasing
ones indicate pops. To hide the index we can store the stack in an ORAM instead of an array, and
merge the code of the push and pop operations, as shown in the stackop function in Figure 2, so
that observation of the PC does not reveal which operation is taking place.
In the code, a stack consists of an ORAM of secret numbers and a reference storing the index
of the root. Function stackop takes a stack, a ๏ฌag indicating whether the operation is a push or pop,
and the value to push, and returns a value. The code reads the value at the root index (line 3). The
next line copies that value to d' if the operation is pop, or else puts d there if it is a push. Line 5
determines the index of the write it will perform on line 6: this index ( id ) is one more than the root
index if itโs a push and itโs the current root index if not. As such, the write on line 6 puts the given
value in the next slot in case of a push, or writes back the value at the current root, if itโs a pop.
Finally, line 7 adjusts the root index, and line 8 returns the result, which is either the popped value
or pushed value (if it was a push).
While this code works perfectly well (and would typecheck in Liu et alโs system) a probabilistic
version of the stack, using a non-recursive ORAM, would be more space-e๏ฌcient. In particular, it
will require only O(L) extra space where L is the current size of the stack, whereas this version
requires O(N ) extra space, where N is the size of the ORAM. We will see why, next.
3.2
Recursive and non-recursive ORAM
To understand the source of ine๏ฌciency, we now digress to consider features of state-of-the-art
ORAM algorithms. In particular, consider a tree-based ORAM [Shi et al. 2011; Stefanov et al. 2013;
Wang et al. 2015]. It has two parts: a tree-like structure for storing the actual data blocks, and a
position map that maps logical data block indexes to position tags that indicate the blockโs position
in the tree. In the simplest instantiation, an ORAM of size N has a position map of size N which
is hidden from the adversary; e.g., it could be stored in on-chip memory in a processor-based
deployment of ORAM. The position tags mask the relationship between a logical index and the
1:6
David Darais, Chang Liu, Ian Sweet, and Michael Hicks
location of its corresponding block in the tree. As blocks are read and written, they are shu๏ฌed
around in the data structure, and their new locations are recorded in the position map. Note that
the position map need not be hidden on chip; rather, much of it can be stored recursively in ORAM
itself, reducing the space overhead on the client. As such, the tree part that contains the data blocks
is sometimes called a non-recursive ORAM (or NORAM for short).
The ORAM read and write operations are implemented as a sequence of two NORAM operations,
called readAndRemove (or rr , for short) and add.
rr : ' a NOram โ (idx:int S) โ (tag : int P) โ ' a
add: ' a NOram โ (idx:int S) โ (tag : int S) โ ( block :' a) โ unit
Here, the type ' a NORam designates the tree portion of the ORAM data structure, which stores data
blocks of type ' a. Operation rr โs int S argument is the desired blockโs logical index, which is hidden
from the adversary; the int P argument is its position tag extracted from the map; and the ' a is the
returned data block. The add operation is similar except that its position tag can be secret, and it
adds a block to the tree, rather than removing it. A full ORAM read at index i requires looking up
the tag in the position map, performing an rr to read and remove the value at i, and adding back
that value (updating the position map with a fresh tag). A write to i requires a rr to remove the
old value at i, and an add to write the new value (again updating the position map).
Depending on the details of the NORAM algorithm, rr and add may perform many reads and
writes to/from the tree. For simplicity, we can think of a call to rr noram id pos as producing a single
abstract event RR(noram,pos). The event indicates the operation, the NORAM it is performed on
(there may be more than one), and the position tag, which is visible because it correlates with the
actual memory addresses accessed to retrieve the requested block. The add operationโs behavior
does not depend on the position tag, so it simply generates event ADD(noram). The fact that rr
โs position tag is visible to the adversary means that traces involving rr operations might di๏ฌer
not because of a dependence on particular secret values, but due to innocuous random variation.
Hence we require a more general de๏ฌnition of obliviousness, discussed below.
The running time of both rr and add are O(log N ). The position map requires O(N ) storage and
O(1) access time when stored non-recursively on the client, hidden from the adversary. When
stored recursively in ORAM, the position map imposes O(1) storage on the client, and O(log N
access time; this is the standard deployment for (full, recursive) ORAM, and is necessary when the
position map accesses are visible to the adversary (as in MPC-based deployments).
It turns out that L obliv is powerful enough to implement tree-based ORAMs from scratch; we
present more details about this in Section 6.
3.3
An optimized oblivious stack
Returning to the question of how to more e๏ฌciently implement an oblivious stack, consider that
we always access a stack via its head, using the root index. Thus, in the code in Figure 2, the full
oram internally only ever uses one slot in its position map. Thus we can do better by using an
NORAM directly, having the stack manage the position tag of the root. In short, we implement an
oblivious stack as a triple comprising a NORAM, the index of the root element, and its position
tag. The latter two act as a kind of pointer into the NORAM. Each block stored in the NORAM
contains the data and the position tag of the next block in the stack.
A Language for Probabilistically Oblivious Computation
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
1:7
type ' a OStack = (' a โ rnd R) noram โ int S ref โ rnd R ref
let stackop (( noram,rid_r , pos_r) :' a OStack) (ispush : Bool S) (d :' a) : ' a =
let ( rid , pos) = ! rid_r ,! pos_r in
let ( rid ', pos ', d ') =
if ispush then
let (d ', _) = rr noram (โ1) (reveal (rnd () ) ) in
let b = (d,pos) in
let pos ' = rnd () in
let _ = add noram (rid+1) (use pos ') b in
( rid +1,pos ', d ')
else
let (d ', pos ') = rr noram rid (reveal pos) in
let b = (d,rnd () ) in
let _ = add noram (โ1) 0 b in
( rid โ1,pos ', d ') in
rid_r := rid ';
rpos_r := pos ';
d'
Fig. 3. A probabilistic oblivious stack built using a non-recursive ORAM. (Does not use mux, for simplicity.)
Code implementing the stack following this design is given in Figure 3. Note the code branches
on the ispush variable to make it easier to read; the actual implementation must use muxs to conditionally execute each statement in both branches to ensure obliviousness.2 Line 3 extracts the
current root index and position tag. Lines 6โ10 handle a push operation. Line 6 ๏ฌrst does a โdummy
readโ from the NORAM; just as we saw with the oblivious add in Figure 1, using index โ1 results
in a dummy block being returned (the position tag argument is unimportant in this case). Line
7 constructs a new block b to push: it consists of the given data d paired with the current rootโs
position tag pos, thus creating a โpointerโ to that block. We then generate a fresh position tag pos'
for this (the new rootโs) block, add the block to the noram. Random numbers generated by rnd ()
have type rnd R; the coercion reveal ascribes a random number the type int P (per line 6), while use
gives it type int S (line 9); we explain these constructs in the next subsection. The new root index
(the old one plus one), the rootโs tag, and the dummy block passed in are returned on line 10. Lines
12โ15 handle a pop. Here, the ๏ฌrst rr does real work, extracting the block that corresponds to the
root index and position tag. We then generate a dummy block to โaddโ to the ORAM. The updated
root index (the old one minus one), its position tag (returned by the rr ) and the fetched block are
returned.
This version of an oblivious stack performs better than the version from Figure 2. The space
overhead, due to the added pointers at the root and within the ORAM, is O(L) where L is the size
of the current stack, not the size N of the ORAM. The running time is still O(loะด N ).
The random numbers generated on lines 6 and 8 are eventually revealed by rr operations on
lines 4 and/or 12. As such, there can be many possible RR(...) events for the same sequence of
secret inputs. While this code is safe, there is the possibility that a di๏ฌerence in the visible trace
reveals secret information. We need to ensure that traces are identically distributed. More formally,
if ฯ1 โผ ฯ2 then for all traces t the probability that evaluating e under ฯ1 produces trace t is the
2 Notice
that the structure of both branches is roughly parallel, which makes converting to the use of muxes
straightforward.
1:8
David Darais, Chang Liu, Ian Sweet, and Michael Hicks
same as the probability that evaluating e under ฯ2 also produces t. This property, which we call
probabilistic trace obliviousness, is ensured by the underlying NORAM implementation, and we
need to ensure that the programs that use it preserve it. It turns out this property holds for our
stack, and is con๏ฌrmed by our type system, as described next.
3.4 L obliv : Obliviousness by typing for probabilistic programs
The main contribution of this paper is L obliv , a core language for ensuring obliviousness of programs that use randomness. L obliv โs type system establishes that programs like the one in Figure 3
are oblivious by employing two mechanisms: a๏ฌne treatment of random values, and probability
regions to track dependences between random values that could leak information when a value is
revealed.
A๏ฌnity. Random numbers, produced by executing rnd () , are given type rnd R, where R is a probability region, explained shortly. Values of this type are, like secret values, invisible to the adversary.
They can be converted to int S numbers with the use coercion and can be converted to int P numbers with the reveal coercion. For example, in Figure 3, line 8 creates a random value pos ' , which it
converts to a secret number and passes to the add operation on line 9, and sets to be the position
tag of the root on line 10. On line 12, the root position tag is converted to a public number which
is passed as an argument to rr (e๏ฌectively revealing it to the adversary).
L obliv โs type system enforces that a random number can be made public at most once. It does
this by treating values of type Rnd R a๏ฌnely: they cannot be duplicated, e.g., through assignments,
and they are consumed by operations other than use. For example, variable pos ' is not consumed on
line 9 when passed to use, but is consumed when assigned to rpos_r on line 17; subsequent reference
to n_rpos on line 18 would be illegal. Similarly, on line 3 variable pos is read from the root of the
tree; it has type Rnd R. It is then consumed on line 6 when given to reveal.
Why is a๏ฌnity important? Consider this example, in which variable s has type int S.
1
2
3
4
let ( r1 , r2 ) = (rnd () , rnd () ) in
let (z , _) = mux (s = 0) r1 r2 in
output (reveal z) ; (โ OK โ)
output (reveal r1 ) ; (โ Bad โ)
Lines 1โ3 in this code are safe: we generate two random numbers that are invisible to the adversary,
and then store one of them in z depending on whether the secret s is zero or not. Revealing z at line
3 is safe: regardless of whether z contains the contents of r1 or r2, the fact that both are uniformly
distributed means that whatever is revealed, nothing can be learned about s. However, revealing
r1 on line 4, after having revealed z, is not safe. This is because seeing two zeroes in a row is more
likely when z is r1, which happens when s is zero. So this violates obliviousness.
A similar problem would arise in our oblivious stack if we changed line 8 in Figure 3 to be let
pos ' = pos in ... This would set the position tag for the new root to the old rootโs tag, pos, which
has just been revealed. As a result, we will leak information about the secret ispush variable at the
next operation, i.e., whether a push was previously performed, vs. a pop. With a๏ฌne revelation,
the type system catches this mistake; assigning pos to b on line 7 consumes it, so reading it again
on line 8 would be disallowed.
Probability regions. Unfortunately, a๏ฌnity on its own is insu๏ฌcient. This is because, for reasons of needed expressiveness, use can convert random numbers to non-a๏ฌne, secret ones, and
then computing on these can a๏ฌect the distribution of revealed values. To see how, consider this
program:
A Language for Probabilistically Oblivious Computation
1
2
3
4
5
1:9
let (x , y) = (rnd () , rnd () ) in
let s_x = use(x) in
let ( r1 , r2 ) = mux (s_x = 0) x y in
let (z , _) = mux (s = 0) r1 r2 in
output (reveal z) ; (โ Bad โ)
Line 1 generates two random numbers, and line 2 creates a secret copy of x, which does not consume
it. Line 3 sets r1 to x if it is 0, and to y otherwise; the reverse is true for r2. The problem now is that
r1 and r2 are not uniformly distributed: r1 is more likely to contain zero than any other number. As
a result, outputting z on line 5 is dangerous: seeing a zero here is more likely if z was r1 and thus
that says that s is more likely to be zero, than not. Notice that we have not violated a๏ฌnity here:
no random number has been revealed publicly more than once.
Our type system addresses this problem with a novel construct we call probability regions. Both
normal and random number types are ascribed a region R. The region represents the set of random numbers generated at program points whose rnd instructions are annotated with R. (We have
elided the region name so far, but normally should write rnd R () ). Regions allow the type system
to reason that random numbers are probabilistically independent. In particular, regions follow a
lattice ordering, and we can say that two regions R1 and R2 are independent if their meet is โฅ.
Otherwise, regions may depend on one another, meaning that revelation of a random number in
one region may compromise the uniformity of the distribution of a number in the other, which
could result in a leak.
We can see this in our example: the region of the number s_x = 0 is the same region as x, since
s_x was derived from x. As such, the two are not independent. But this lack of independence is
problematic when conditioning on s_x = 0 to return x; it means that the output is no longer uniform.
On the other hand, if the guard of a mux has a region that is independent of the regions of its
branches, then the uniformity of the output is not threatened. Normal numbers that never were
(or were in๏ฌuenced by) random numbers have region โฅ because they are independent of any
random number; as a notational convenience, when we write only the secrecy label (e.g., int P or
int S) this means the region is โฅ. Looking at our ๏ฌrst example, line 2 is perfectly safe assuming
that s has type int S because then its region โฅ is independent of the region of r1 and r2. Allowing
such safe code is critical for implementing e๏ฌcient oblivious algorithms.
4
FORMAL LANGUAGE
This section presents L obliv : Its syntax, sampling semantics, and type system. The next section
presents our main metatheoretic result, that typing ensures memory trace obliviousness.
4.1 Syntax
Figure 4 shows the syntax for L obliv . The syntax for terms is strati๏ฌed into a kind of a-normal form
to simplify the semantics. We have expressions e, which comprise let binding and conditionals;
atomic expressions a, which comprise various computational forms discussed shortly; and pico
expressions p, which comprise variables x or literals tagged with a security label โ. Literals are
either bits b (which are either O or I) or natural numbers n, and security labels โ are either public
P or secret S. Semantically, literals labeled with S are invisible to the adversary while those labeled
with P are not. (Think of S-labeled literals as encrypted.)
Returning to atomic expressions, p โฆ takes the complement of a bit; p โ p represents an arbitrary
arithmetic operation; asnat(p) converts from bits to nats, and asbit(p) does the reverse. Expression flipฯ () randomly generates a bit of type flipฯ ; we call values of this type โcoin ๏ฌips.โ The
annotation ฯ is the coin ๏ฌipโs probability region; we defer discussion of these to Section 4.3. Coin
1:10
David Darais, Chang Liu, Ian Sweet, and Michael Hicks
โ label F P | S
โ region F (parameter)
โ
BFO|I
โ
N F {0, 1, . . .}
โ aop F (parameter)
โ var โ {x, y, z, . . .}
โ
lit โ b | n
โ pico F x | ฮน โ
โ atom F p
| pโฆ
| p โp
| asnat(p)
| asbit(p)
| flipฯ ()
| use(x)
| reveal(x)
| mux(p, p, p)
| hp, pi
| arrayN (p, . . . N , p)
| p[p]
| p[p] โ p
e โ expr F a
| let x โ a in e
| let x, x โ a in e
| if p then e else e
โ
ฯ
b
n
โ
x
ฮน
p
a
security label
probability region
bits
natural numbers
arithmetic ops
lexical variables
literals
โpicoโ expressions
โatomicโ expressions
bit complement
arithmetic ops
bit-to-nat conversion
nat-to-bit conversion
coin ๏ฌip
convert ๏ฌip to bit
reveal ๏ฌip to public
atomic conditional
tuple creation
array creation
array read
atomic array read+write
โcompoundโ expressions
local variable binding
local tuple binding
conditional
Fig. 4. Syntax for L obliv
๏ฌips are semantically secret, and have limited use; we can coerce one to public bit via reveal(p)
and to a secret bit via use(p). Expression mux(p, p2, p3 ) unconditionally evaluates p2 and p3 and returns them as a pair in the given order if p evaluates to I, or in the opposite order if it evaluates to
O. This operation is critical for obliviousness because its operation is atomic. By contrast, normal
conditionals if p then e 1 else e 2 evaluate either e 1 or e 2 depending on p, never both, so the
instruction trace communicates which branch is taken. The components of tuples constructed as
hp1 , p2 i can be accessed via let x 1 , x 2 โ a in e. Finally, the last three atomic expression forms
are for (constant size-N ) array creation, read, and update, respectively.
We designed L obliv to capture the key features used when programming oblivious data structures (notably, numbers, tuples, arrays, and random numbers), but it omits obviously useful features to avoid unimportant complexity. Many missing features can be added without di๏ฌculty
(and we have them in our implementation). For example, we can easily encode random N-bit numbers as a tuple of bits, with ready conversions to/from nats, and we can allocate variable-sized
arrays. We can support lambda terms with bounded recursion using standard ideas; we imagine
L obliv programs as post inlining. Allowing non-termination (as opposed to bounded recursion) is
A Language for Probabilistically Oblivious Computation
1:11
more technically delicate, but also doable. We further discuss implementation issues (including the
support for richer types) in Section 6.
4.2 Sampling Semantics
Figure 5 shows a small-step operational semantics for L obliv programs. The main judgment has
q ฯ โฒ which states that a con๏ฌguration ฯ steps to con๏ฌguration ฯ โฒ with probability q
form ฯ
(a rational number). A con๏ฌguration contains an expression e, environment ฮณ , and a store ฯ ; a
special HALT form indicates a terminated computation, with the expression replaced with a value
v. A value is a labeled literal ฮน โ , an address, or a pair of values hv, vi. The environment maps
variables to values, while the store maps (array) addresses ฮฑ to sequences of values.
The bottom of the ๏ฌgure gives rules for the main judgment, and are basically standard; notice
that let-bound variables are put in the environment ฮณ , rather substituted into the target term.
These rules inherit their probability annotation from subsidiary judgment ฮณ ; ฯ โข a ึq v ; ฯ โฒ ,
which states that an atomic expression a under ฮณ and ฯ steps to a value v and output store ฯ โฒ
with probability q. In turn, these rules invoke PJpK to evaluate pico expressionsโvariables x are
looked up in the environment, and literals ฮน โ are returned. All of the atomic expression rules have
probability q = 1 except for the rules for flip, which return OS or IS with probability 1/2. The
rules preceding these are for computing on bits and numbers, and are straightforward; we assume
a given semantics function for operations โ. The rules for mux evaluate both branches and their
values as a pair; the order of these values depends on the bit to which the guard evaluates. Array
allocation stores a sequence of the given values at fresh address ฮฑ in the store; array read extracts
a value at the given index n P (notice it must be public), and array write returns the existing value
before updating the appropriate position in the sequence present at ฮฑ in the store. Having array
update return the old value is critical for coexisting with the type systemโs a๏ฌne treatment of
random numbers, as described below. Attempting to access an array out of bounds is unde๏ฌned;
note that this does not represent an information leak because array indexes are public.
Traces and adversary observations. An execution trace t is a sequence of con๏ฌgurations ฯ 1 . . . ฯ N
q
whereby each ฯ i and ฯ i +1 in the sequence is justi๏ฌed by proof of judgment ฯ i
i +1 , and ฯ N is a
halted con๏ฌguration. We de๏ฌne what parts of the trace the adversary can see according to the function obs. This function takes a sequence of con๏ฌgurations and produces a corresponding sequence
of โbulletedโ con๏ฌgurations. We omit this function for space reasons (it is given in the appendix,
in Figure 21) but its operation is straightforward: a bullet con๏ฌguration is the same as its original except that all secret numbers (both random and non-random) have been replaced with โข. As
such, we capture the idea that the adversary can see the full instruction trace (the structure of expressions is visible) the address trace (addresses ฮฑ are not a๏ฌected), and non-secret values (public
literals are una๏ฌected). Only speci๏ฌcally secret numbers are hidden. Our type system, given next,
is able to ensure even when the adversary can see such a trace, he can learn nothing about the
programโs secret values.
4.3
Typing
Figure 7 shows the type system for L obliv , which de๏ฌnes a judgment ฮ โข e : ฯ ; ฮ โฒ, which states that
under type environment ฮ expression e has type ฯ , and yields residual type environment ฮ โฒ. Types
ฯ
ฯ and environments ฮ are de๏ฌned in Figure 6. Bits and numbers respectively have type bitโ and
ฯ
natโ , where โ and ฯ are the label and probability region, respectively. As mentioned earlier, flipฯ
characterizes a coin ๏ฌip in region ฯ; it implicitly has label S. Types array(ฯ ) and ฯ รฯ characterize
arrays and pairs, respectively. Environments map variables to either types ฯ or inaccessibility tags
โข; the latter is used to support a๏ฌnity, discussed shortly.
1:12
David Darais, Chang Liu, Ian Sweet, and Michael Hicks
ฮณ โ env โ var โ V
ฯ โ store โ addr โ V โ
ฯ โ con๏ฌg F he, ฮณ , ฯ i | HALT(v, ฮณ , ฯ )
ฮฑ โ addr โ N
v โ V F ฮน โ | ฮฑ | hv, vi
PJยทK : pico โ env โ val
PJxK(ฮณ ) โ ฮณ (x)
PJxK(ฮน โ ) โ ฮน โ
ฮณ ; ฯ โข a ึq v ; ฯ
CompO
CompI
Aop
AsNO
AsNI
AsB
FlipO
FlipI
Use
Rev
MuxI
MuxO
Tup
Arr
Read
Write
โข po
ึ1 Iโ ; ฯ when Oโ = PJpK(ฮณ )
o
โขp
ึ1 Oโ ; ฯ when Iโ = PJpK(ฮณ )
โข p1 โ p2
ึ1 JโK(PJp1 K(ฮณ ), PJp2 K(ฮณ )) ; ฯ
โข asnat(p)
ึ1 0โ ; ฯ when Oโ = PJpK(ฮณ )
โข asnat(p)
ึ1 1โ ; ฯ when Iโ = PJpK(ฮณ )
โข asbit(p)
ึ1 (n % 2)โ ; ฯ when n โ = PJpK(ฮณ )
ฯ
โข flip
ึ1/2 OS ; ฯ
ฯ
โข flip
ึ1/2 IS ; ฯ
โข use(x)
ึ1 ฮณ (x) ; ฯ
โข reveal(x)
ึ1 ฮณ (x) ; ฯ
โข mux(p1, p2 , p3 )
ึ1 hPJp2 K(ฮณ ), PJp3 K(ฮณ )i ; ฯ when Iโ = PJp1 K(ฮณ )
โข mux(p1, p2 , p3 )
ึ1 hPJp3 K(ฮณ ), PJp2 K(ฮณ )i ; ฯ when Oโ = PJp1 K(ฮณ )
โข hp1 , p2 i
ึ1 hPJp1 K(ฮณ ), PJp2 K(ฮณ )i ; ฯ
N
โข array (p1, . . . , p N ) ึ1 ฮฑ ; ฯ [ฮฑ 7โ PJp1 K(ฮณ ) . . . PJp N K(ฮณ )]
when ฮฑ = fresh(ฯ )
ฮณ ; ฯ โข p1 [p2 ]
ึ1 ฯ (ฮฑ)[n] ; ฯ when ฮฑ = PJp1 K(ฮณ ), n P = PJp2 K(ฮณ )
ฮณ ; ฯ โข p1 [p2 ] โ p3
ึ1 ฯ (ฮฑ)[n] ; ฯ [ฮฑ 7โ ฯ (ฮฑ)[n 7โ PJp3 K(ฮณ )]]
when ฮฑ = PJp1 K(ฮณ ), n P = PJp2 K(ฮณ )
ฮณ
ฮณ
ฮณ
ฮณ
ฮณ
ฮณ
ฮณ
ฮณ
ฮณ
ฮณ
ฮณ
ฮณ
ฮณ
ฮณ
;ฯ
;ฯ
;ฯ
;ฯ
;ฯ
;ฯ
;ฯ
;ฯ
;ฯ
;ฯ
;ฯ
;ฯ
;ฯ
;ฯ
ฯ
q
Atom
ฮณ ;ฯ โขa ึ v ;ฯ
ha, ฮณ , ฯ i
LetT
q
โฒ
q
โฒ
HALT(v, ฮณ , ฯ )
Let
ฮณ ;ฯ โขa ึ v ;ฯ
hlet x โ a in e, ฮณ , ฯ i
q
IfI
q
he, ฮณ [x 7โ v], ฯ โฒi
he, ฮณ [x 1 7โ v 1 , x 2 7โ v 2 ], ฯ โฒi
ฮณ ; ฯ โข a ึq IP ; ฯ โฒ
hif p then e 1 else e 2 , ฮณ , ฯ i
IfO
q
he 1 , ฮณ , ฯ โฒi
q
he 2 , ฮณ , ฯ โฒi
ฮณ ; ฯ โข a ึq OP ; ฯ โฒ
hif p then e 1 else e 2 , ฮณ , ฯ i
Fig. 5. Sampling Semantics for L obliv
ฯ
โฒ
ฮณ ; ฯ โข a ึq hv 1 , v 2 i ; ฯ โฒ
hlet x 1 , x 2 โ a in e, ฮณ , ฯ i
q
A Language for Probabilistically Oblivious Computation
ฯ
ฯ
ฯ โ type F bitโ | natโ | flipฯ
| array(ฯ ) | ฯ ร ฯ
โข
ฮ โ tenv โ var โ type
K : type โ kind
ฯ
ฯ
K(bitโ ) โ U
K(natโ ) โ U
โข
1:13
โข
ฯ โ type F ฯ | โข
ฮบ โ kind F U | A
โข
ฯ โโข
UโA
K(ฯ1 ร ฯ2 ) โ K(ฯ1 ) โ K(ฯ2 )
K(flipฯ ) โ A
K(array(ฯ )) โ U
Fig. 6. Type and Kind Language for L obliv
At a high level, the type system is enforcing three properties:
(1) No type errors occur at runtime (e.g., operating on an array as if it were a number).
(2) No secrets can be inferred from adversary-visible information.
(3) No probabilistic correlation forms between secrets and publicly revealed random numbers.
Properties (1) and (2) are enforced using standard techniques. For example, no type-correct program can operate on an array as if it were a number because rule Aop only types expression p1 โ p2
when p1 and p2 are numbers (not arrays). Moreover, this operation correctly captures the in๏ฌuence of secret information by annotating the result typeโs security label with โ1 โ โ2 , the join of
the labels of p1 and p2 . (Recall that S โ โ = S for all โ.) Likewise, the rules ensure that array indexes
and conditionals do not leak information improperly. Property (3) is the main novelty of this work,
and its need arises from L obliv โs support for random numbers that are used to enforce secrecy but
can be later be seen by the adversary.
A key invariant is that coin ๏ฌips, which have type flipฯ , always have the following properties:
(1) Their distribution is independent of other ๏ฌip values.
(2) Their distribution is stable, meaning the probability of each possible bit value O or I is 1/2.
The type system only allows creating, manipulating, and eliminating values at ๏ฌip type in ways
that preserve properties (1) and (2). In particular, property (1) is maintained by treating ๏ฌip values
as a๏ฌne, which prevents their duplication, and property (2) is maintained by tracking probability
regions of ๏ฌip values as they are combined and used in computations.
A๏ฌnity. To enforce non-duplicability, when an a๏ฌne variable is used by the program, its type
is removed from the output environment. Figure 6 de๏ฌnes kinding metafunction K that assigns a
type either the kind U (freely duplicatable) or A (non-duplicatable). Arrays, nats, and bits are always
universal, and ๏ฌips are always a๏ฌne; a pair is considered a๏ฌne if either of its components is. Rule
VarU in Figure 7 types universally-kinded variables; the output environment ฮ is the same as the
input environment. Rule VarA types an a๏ฌne variable by marking it โข in the output environment.
This rule is su๏ฌcient to rule out the ๏ฌrst problematic example in Section 3.4.
There are a few other rules that are a๏ฌected by a๏ฌnity. Rules Use and Reveal permit converting
flipฯ types to bits via the use and reveal coercions, respectively. The ๏ฌrst converts a flipฯ to
ฯ
ฯ
a bitS and does not make x inaccessible, while the second converts to a bitP and does make it
inaccessible. In essence, the type system is enforcing that any random number is made adversaryvisible at most once; secret copies (that are never themselves revealed) are allowed.
Arrays are permitted to contain a๏ฌne or universal values. Only in the latter case is it safe to
read out an array element directly, since in the former it would become immediately inaccessible.
Hence rule Read requires that array element type ฯ have kind U. Rule Write applies to all arrays:
1:14
David Darais, Chang Liu, Ian Sweet, and Michael Hicks
ฮ โขe :ฯ ; ฮ
VarU
K(ฮ(x)) = U
VarA
ฮ โข x : ฮ(x) ; ฮ
K(ฮ(x)) = A
LitB
ฮ โข x : ฮ(x) ; ฮ[x 7โ โข]
ฯ
LitN
AsN
ฮ โข n โ : natโฅ
โ ; ฮ
Rev
ฯ
ฮ(x) = flipฯ
ฮ โข p1 : natโ11 ; ฮ โฒ
ฯ โฯ
ฯ
ฮ โฒ โข p2 : bitโ22 ; ฮ โฒโฒ
ฮ โฒโฒ โข p3 : bitโ33 ; ฮ โฒโฒโฒ
ฯ โฯ โฯ
U
ฯ
ฮ โฒ โข p2 : natโ22 ; ฮ โฒโฒ
ฮ โข p1 โ p2 : natโ11โโ22 ; ฮ โฒโฒ
ฯ
ฮ โข p1 : bitโ11 ; ฮ โฒ
ฯ
ฮ โข use(x) : bitS ; ฮ
ฯ
ฯ
ฯ โฯ โฯ
ฮ โข mux(p1 , p2 , p3 ) : bitโ11โโ22โโ33 ร bitโ11โโ22โโ33 ; ฮ โฒโฒโฒ
ฯ
ฮ โข p1 : bitโ 1 ; ฮ โฒ
MuxFlip
ฮ โฒ โข p2 : flipฯ 2 ; ฮ โฒโฒ
ฯ1 โฅ
โฅ ฯ2
ฯ1 โฅ
โฅ ฯ3
ฮ โฒโฒ โข p3 : flipฯ 3 ; ฮ โฒโฒโฒ
A
ฮ โข mux(p1, p2 , p3 ) : flipฯ 2 โฯ 3 ร flipฯ 2 โฯ 3 ; ฮ โฒโฒโฒ
ฮ โข p1 : ฯ1 ; ฮ โฒ
ฮ โฒ โข p2 : ฯ2 ; ฮ โฒโฒ
ฮ โข hp1 , p2 i : ฯ1 ร ฯ2 ; ฮ
ฮ โข p1 : array(ฯ ) ; ฮ โฒ
โฒโฒ
ฮ โฒ โข p2 : natโฅ
P ; ฮ
โฒโฒ
Arr
K(ฯ ) = U
Write
ฮ โข p1 [p2 ] : ฯ ; ฮ โฒโฒ
Let
LetT
ฯ
ฮ โข asbit(p) : bitโ ; ฮ โฒ
Use
ฮ โข p โฆ : flipฯ ; ฮ โฒ
Aop
ฮ โข reveal(x) : bitโฅ
P ; ฮ[x 7โ โข]
Read
ฮ โข p : natโ ; ฮ โฒ
ฮ โข p : flipฯ ; ฮ โฒ
Comp
ฮ(x) = flipฯ
Tup
AsB
ฮ โข asnat(p) : natโ ; ฮ โฒ
ฮ โข flipฯ () : flipฯ ; ฮ
MuxBit
ฯ
ฮ โข p : bitโ ; ฮ โฒ
ฯ,โฅ
Flip
ฮ โข b โ : bitโฅ
โ ; ฮ
ฮ โข a : ฯ1 ; ฮ โฒ
ฮ0 โข
ฮnโ1 โข pn : ฯ ; ฮn
N
array (p1, .., p N ) : array(ฯ )
ฮ โข p1 : array(ฯ ) ; ฮ โฒ
โฒโฒ
ฮ โฒ โข p2 : natโฅ
P ; ฮ
ฮ โฒโฒ โข p3 : ฯ ; ฮ โฒโฒโฒ
ฮ โข p1 [p2 ] โ p3 : ฯ ; ฮ โฒโฒโฒ
ฮ โฒ โ [x 7โ ฯ1 ] โข e : ฯ2 ; ฮ โฒโฒ โ [x 7โ ]
ฮ โข let x โ a in e : ฯ2 ; ฮ โฒโฒ
ฮ โข a : ฯ1 ร ฯ2 ; ฮ โฒ
ฮ โฒ โ [x 1 7โ ฯ1 , x 2 7โ ฯ2 ] โข e : ฯ3 ; ฮ โฒโฒ โ [x 1 7โ , x 2 7โ ]
ฮ โข let x 1 , x 2 โ a in e : ฯ3 ; ฮ โฒโฒ
If
; ฮN
โฒ
ฮ โข p : bitโฅ
P ; ฮ
ฮ โฒ โข e 1 : ฯ1 ; ฮ1โฒโฒ
ฮ โฒ โข e 2 : ฯ2 ; ฮ2โฒโฒ
ฮ โข if p then e 1 else e 2 : ฯ1 โ ฯ2 ; ฮ1โฒโฒ โ ฮ2โฒโฒ
Fig. 7. Typing Judgment for L obliv
A Language for Probabilistically Oblivious Computation
1:15
the returned value is the old one (just as with a read), and the written one serves as its immediate
replacement, guaranteeing the store remains well-typed.
Finally, note that di๏ฌerent variables could be made inaccessible in di๏ฌerent branches of a conditional, so If types each branch in the same initial context, but then joins their the output contents;
if a variable is made inaccessible by one branch, it will be inaccessible in the joined environment.
Probability regions. Now we consider the role of probability regions ฯ in the type system. Probability regions are a partially ordered set. The purpose of regions is to track ๏ฌne-grained, dynamic
probabilistic dependencies between values. Regions must be a distributive lattice with a least element โฅ. A distributive lattice must support both join โ and meet โ operations, and meets must
distribute through joins, that is: ฯ 1 โ (ฯ 2 โ ฯ 3 ) = (ฯ 1 โ ฯ 2 ) โ (ฯ 1 โ ฯ 3 ). We notate the meet of two
โฅ ฯ 2 , which we call region independence. Distributivity is
regions being bottom ฯ 1 โ ฯ 2 = โฅ as ฯ 1 โฅ
necessary for a conjunction of region independence to coincide with region independence for the
join, that is: ฯ 1 โฅ
โฅ ฯ2 โง ฯ1 โฅ
โฅ ฯ 3 โโ ฯ 1 โฅ
โฅ (ฯ 2 โ ฯ 3 ).
Rule Flip types a coin ๏ฌip. The region annotation ฯ is a static name for coin ๏ฌips generated at this
(so-annotated) program point. The region must not be โฅ because โฅ represents independence from
all random values, and a coin ๏ฌip is dependent on itself. When created, a coin ๏ฌip is independent
โฅ ฯ โฒ, and that the distribution
from any other value with an independent region, so ฯ โฒ where ฯ โฅ
is stable, meaning each possible bit value O and I has equal probability. Given this interpretation
of the ๏ฌip type, we are able to typecheck the bit-complement of a value at ๏ฌip type as also having
๏ฌip type, given as rule Comp.
Rules for literals LitB and LitN track the security label โ of the literal, and are given probability
region โฅ to signify they are probabilistically independent of all other random values. Rules Use
and Reveal, mentioned above, crucially preserve the probability region ฯ from the input flipฯ on
the output type. As such, the type system can track their potential dependence on other values.
Rules AsN and AsB convert between bit and nat types, also preserving the region. Per rule Aop, the
result type of an arithmetic operation is given the join of operand labels and the join of operand
regions. In particular, joining the regions indicates that whatever correlates with p1 or p2 may also
correlate with the result of the operation, which is a safe over-approximation of correlation for the
result of any binary arithmetic operation which operates directly on values (i.e., not distributions
of values).
A critical feature of the type system is the handling of mux expressions, which are treated by
rules MuxBit and MuxFlip for bit and ๏ฌip types, respectively. The mux rule for bits treats mux as a
ternary bit operation, and takes the join of security labels and probability regions of each argument.
The mux rule for ๏ฌip types is designed to avoid passing on any probabilistic dependence from the
guard p1 to the resultsโnotice that the labels on the output pair of ๏ฌip types are ฯ 2 โ ฯ 3 and not
ฯ 1 โ ฯ 2 โ ฯ 3 . This is acceptable when the probability region ฯ 1 of the guard p1 is independent of
the regions of the arguments, i.e., ฯ 1 โฅ
โฅ ฯ 2 and ฯ 1 โฅ
โฅ ฯ 3 . As such, any revelation of values in ฯ 1
will not a๏ฌect the stability or independence of ฯ 2 or ฯ 3 .
For example, the following program is well-typed:
1
2
3
4
5
6
let x = rndฯ0 in
let y = rndฯ in
let z = rndฯ in
let s_x = use(x) in
let ( r1 , r2 ) = mux (s_x = 0) y z in
output (reveal x) ;
1:16
David Darais, Chang Liu, Ian Sweet, and Michael Hicks
According to the MuxFlip rule, both r1 and r2 have type flipฯ โthere is no in๏ฌuence from xโs region
ฯ 0 . This is as it should be: because y and z are probabilistically independent from x, the revelation
of x on line 6 does not a๏ฌect their stability. On other hand, rule MuxFlip prevents the second problematic example from Section 3.4 (page 9). In that example the mux on line 3 is disallowed because
the region of the guard s_x = 0 is not independent of the region of its argument xโthey are the
same.
The remaining type rules handle tuples, arrays, let binding, and normal conditionals; we remark
on a few important features of them. First, notice that Read and Write both require that the array
index p2 has label P; this is important because we assume the adversary is able to observe array
accesses. (It also avoids leaks due to programs accessing the array out of bounds.) Rule If similarly
requires the guard p to have label P since the execution trace reveals which branch is taken. Second,
both Let and LetT remove their bound variables from the output environment; we write ฮ โฒโฒ โ [x 7โ
] to split a context into the part that binds x and ฮ โฒโฒ binds the rest; it is the latter part that is
returned, dropping the x binding.
5
PROBABILISTIC MEMORY TRACE OBLIVIOUSNESS
This section describes our proof of memory trace obliviousness for L obliv . We begin by presenting a model for distributions, probabilities, conditional probabilities, and probabilistic dependence.
Next we give a denotational semantics based on this model, and which we prove coincides with the
sampling semantics in Section 4.2. Equipped with a model for distributions and a denotational semantics we then state precisely the de๏ฌnition of memory trace obliviousness. To describe our proof
approach, we proceed in more informal terms and describe the key semantic invariants which hold
of the denotational semantics. These key invariants are su๏ฌcient to prove a strengthened memory
trace obliviousness property, and this strengthened property implies the simpler property initially
stated. Further details of the proof, including precise mathematical de๏ฌnitions and properties, are
given in the Appendix.
5.1 Distributions
We use a discrete model for distributions which are de๏ฌned over a ๏ฌxed universe with ๏ฌnite entropy. In our model, a distribution of elements x โ X in universe R is notated xฬ R . Here, R is the
number of available coin ๏ฌips. So distributions are represented as a mapping from a bitvector bยฎ
of length R to an element of X , that is: xฬ R โ BR โ X . This domain supports modeling the result
of a terminating computation which ๏ฌips an arbitrary, ๏ฌnite number of coins. Our model does
not support nonterminating computations, especially those which may ๏ฌip an in๏ฌnite number of
coins. As an example, suppose we want yฬ R to represent the distribution of the count of coin ๏ฌips
that have come up O. Thus yฬ R is a function that takes a length-R vector of coin ๏ฌips and returns a
natural number that sums the occurrences of O in the vector.
We de๏ฌne a probability measure for distributions p xฬ R = x by counting the occurrences of
x in xฬ R and dividing by 2R . So for our example, the probability p yฬ R = 2 when R = 2 would
be 41 . The model BR โ X for distributions is particularly useful for expressing a measure for
conditional probability. Conditional probabilities for distributions p xฬ R = x yฬ R = y are de๏ฌned
by counting simultaneous occurrences of x in xฬ R and y in yฬ R and dividing by occurrences of y in
yฬ R . Conditional probabilities are therefore a derived notion, as opposed to an axiomatic notion, as
is typically the case when modeling distributions as xฬ โ X โ [0..1]. When the universe R is not
informative, we will omit it and just write xฬ. We notate joint probabilities as p [xฬ = x โง yฬ = y]. We
notate point distributions โxโ where p [โxโ = x] = 1.
A Language for Probabilistically Oblivious Computation
1:17
Key to our approach is careful bookkeeping of a set of coin ๏ฌips ฮธ โ โ(N โคR ) upon which all
information observable to the adversary depends. We notate probabilistic dependency xฬ โ ฮธ and
prove that if two random variables xฬ and yฬ depend on disjoint sets of coin ๏ฌips ฮธ 1 โฉ ฮธ 2 = ย then
they are probabilistically independent, written xฬ โฅ
โฅ yฬ, which means their joint probability factors:
p [xฬ = x โง yฬ = y] = p [xฬ = x] p [yฬ = y]. We will often notate a probability conditioned on some ฮธ
as p [xฬ = x | ฮธ ] = q, which is the probability that xฬ = x no matter the values of each of the coin
๏ฌips in ฮธ . We notate probabilistic dependency conditioned on a set of coin ๏ฌips ฮธ modulo ฮธ โฒ as
xฬ โ ฮธ โฒ ฮธ , and probabilistic independence modulo ฮธ as xฬ โฅ
โฅ ฮธ yฬ.
We call two distributions xฬ 1 and xฬ 2 equivalent, notated xฬ 1 โ xฬ 2 , when their probability measures
coincide for all elements, that is โx . p [xฬ 1 = x] = [xฬ 2 = x]. We call xฬ 1 and xฬ 2 equivalent modulo
ฮธ , notated xฬ 1 โ ฮธ xฬ 2 , when their probability measures coincide for all elements conditioned on ฮธ ,
that is โx . p [xฬ 1 = x | ฮธ ] = p [xฬ 2 = x | ฮธ ].
Another key invariant in our proof will regard a distributionโs stability, notated stable [xฬ]. Stability is the property that each outcome of a distribution is equally likely, that is โx 1 x 2 . p [xฬ = x 1 ] =
p [xฬ = x 2 ]. We call a distribution xฬ stable modulo ฮธ , notated stable [xฬ | ฮธ ], when it is stable conditioned on ฮธ , that is โx 1 x 2 . p [xฬ = x 1 | ฮธ ] = p [xฬ = x 2 | ฮธ ].
5.2 Denotational Semantics
To facilitate the proof of memory trace obliviousness for L obliv , we de๏ฌne a denotational semantics
over distributions, and which we prove corresponds with the sampling semantics de๏ฌned previously in Section 4. We de๏ฌne the denotational semantics in two parts, an evaluation semantics
for expressions, notated EJยทK, and a trace semantics for expressions, notated T JยทK. The evaluation
semantics EJยทK denotes an expression e to a partial function from distributions of environments ฮณฬ
and stores ฯฬ to distributions of values vฬ, environments ฮณฬ โฒ and stores ฯฬ โฒ. Recall that a con๏ฌguration
ฯ is an expression, a (non-distributional) environment, and a store, while an execution trace t is
a sequence of con๏ฌgurations. The trace semantics T JยทK then denotes an expression to a partial
function from distributions of environments ฮณฬ and stores ฯฬ to distributions of traces tห.
e ร eg
g โV
g
EJยทK : exp โ eg
nv ร store
nv ร store
โ
ย
g โ con๏ฌg
T JยทK : exp โ eg
nv ร store
The semantics is partial due to the possibility of runtime type errors. However, type safety
(proved later) guarantees that the denotational semantics is total for well-typed expressions.
Theorem 5.1 (Sampling and Denotation Correspondence). The sampling semantics ฯ q ฯ
and the denotational semantics T JยทK correspond, that is for ฯ 1 โ he 1 , ฮณ 1 , ฯ1 i and ฯ N โ HALT(v, ฮณ N , ฯ N ):
If:
Then:
ฯ 1 q1 ยท ยท ยท qN ฯ N and tห โ T Je 1 K(โฮณ 1 โ, โฯ1 โ)
ร
qn
p tห = ฯ 1 . . . ฯ N =
n โ{1..n }
5.3
Memory Trace Obliviousness
The design of L obliv is such that well typed programs have the property of Memory Trace Obliviousness (MTO). We state and prove MTO with respect to an adversary that is able to observe the
memory and instruction access pattern of the execution. The MTO theorem establishes that the
adversary learns nothing from these observations.
1:18
David Darais, Chang Liu, Ian Sweet, and Michael Hicks
Theorem 5.2 (Memory Trace Obliviousness (MTO)). Given a well typed L obliv expression e and
two value environments ฮณ 1 and ฮณ 2 which are both well-formed and agree on public values, then the
publicly observable traces of executing e using ฮณ 1 or ฮณ 2 yields equivalent distributions, that is:
If:
Then:
ฮ โข e : ฯ ; ฮ โฒ and ฮ โข ฮณ 1 and ฮ โข ฮณ 2
f JeK(โฮณ 1 โ, ย)) โ obs(T
f JeK(โฮณ 2 โ, ย))
obs(T
and
obs(ฮณ 1 ) = obs(ฮณ 2 )
We de๏ฌne the public observations of a value, environment, store or con๏ฌguration using obs (see
f
Section 4.2), and notate its lifting to distributions as obs.
5.4
Proof outline
This section outlines the key ideas and invariants required for the proof of MTO. We provide
further mathematical detail of de๏ฌnitions and key properties in the Appendix.
The ๏ฌrst property we prove is type safety, which shows that the partial denotation functions
are actually total under the assumption that the term is well typed.
Theorem 5.3 (Type Safety). Given a well-typed L obliv expression e, and distributions of value
environments ฮณฬ and value stores ฯฬ which are well-formed, then the evaluation semantics EJeK is
always de๏ฌned, and the result is well-formed, that is:
If:
Then there exists:
Such that:
ฮ โข e : ฯ ; ฮ โฒ and ฮ ; ฮฃ โข ฮณฬ
ฮฃ โฒ, vฬ, ฮณฬ โฒ and ฯฬ โฒ
EJeK(ฮณฬ , ฯฬ ) = hvฬ, ฮณฬ โฒ, ฯฬ โฒi and
and
ฮฃ โฒ โข vฬ
ฮฃ โข ฯฬ
and
ฮ โฒ ; ฮฃ โฒ โข ฮณฬ โฒ
and
ฮฃ โฒ โข ฯฬ โฒ
We then prove type safety for the trace semantics as a consequence of type safety for the evaluation semantics.
The next step in the proof is to:
(1) Give a semantics to regions which appear in types; and
(2) Relate this semantics for regions to the evaluation semantics
We achieve (1) by de๏ฌning a region semantics, notated RJยทK, which when applied to a con๏ฌguration ฯ, produces a map from regions ฯ to the concrete set of coin ๏ฌips ฮธ that occurred at a flipฯ ()
(i.e., with that region annotation) during the evaluation of ฯ. We call this map a region model, notated ฮพ . A key invariant of the region model is that disjoint regions map to disjoint sets, that is:
โฯ 1 ฯ 2 . ฯ 1 โ ฯ 2 = โฅ โ ฮพ (ฯ 1 ) โฉ ฮพ (ฯ 2 ) = ย.
We achieve (2) in two parts. First, we ๏ฌrst de๏ฌne a dependency semantics, notated DJยทK, which
maps con๏ฌgurations to (in the case of base types) a set of coin ๏ฌips ฮธ . This set over-approximates
the ground-truth dependencies of the resulting value vฬ after conditioning on public revelations,
which is given as a set of coin ๏ฌip dependencies ฮฆ, that is vฬ โ ฮฆ ฮธ . The desired relationship between
regions and values is that whenever an expression annotated with region ฯ evaluates to a value vฬ,
then the dependency set ฮธ predicted by the dependency semantics DJยทK is included in the set of
coin ๏ฌips associated with the region model, that is vฬ โ ฮฆ ฮธ โ ฮพ (ฯ). We make each of these steps
precise as theorems used in the (๏ฌnal) proof.
Theorem 5.4 (Dependency Soundness). Given a well-typed L obliv expression e and distributions
of value environments ฮณฬ and value stores ฯฬ which are well-formed w.r.t. models for dependencies in
the environment and store respectively, conditioned on the set of publicly revealed bits ฮฆ, then the
result of the dependency semantics DJยทK is well-formed w.r.t. the results of the evaluation semantics
EJยทK conditioned on some equal or larger set of publicly revealed bits ฮฆโฒ .
A Language for Probabilistically Oblivious Computation
1:19
Theorem 5.5 (Region Soundness). Given a well-typed L obliv expression e and distributions of
value environments ฮณฬ and value stores ฯฬ which are well-formed w.r.t. a region model ฮพ conditioned on
the set of publicly revealed bits ฮฆ, then the result of the region semantics RJยทK is well-formed w.r.t. the
results of the dependency semantics DJยทK conditioned on some equal or larger set of publicly revealed
bits ฮฆโฒ .
The primary purpose of the region semantics, the dependency semantics, and their soundness
โฅ ฯ 2 , then their comproperties is to establish that when terms are typed at disjoint regions ฯ 1 โฅ
โฅ vฬ 2 . We now turn to the two key invariants
puted values will be probabilistically independent vฬ 1 โฅ
that justify memory trace obliviousness in the presence of reveal(p) expressions: partitioning and
stability.
We say that evaluation contexts hฮณฬ , ฯฬ i are well-partitioned if and only if any two bit distribution values bฬ1 and bฬ2 at type flip occurring at di๏ฌerent positions in the evaluation context are
guaranteed to be independent of each other, conditioned on publicly revealed information ฮฆ, that
โฅ ฮฆ bฬ2 . We prove a theorem that the evaluation semantics preserves well partitioning, conis bฬ1 โฅ
ditioned on public information.
Theorem 5.6 (Well-partitioning). Given a well-typed L obliv expression e and distributions of
value environments ฮณฬ and value stores ฯฬ where every contained flip value is well-partitioned w.r.t.
other flip values conditioned on the set of publicly revealed bits ฮฆ, then the result of the evaluation
semantics EJยทK is well-partitioned for some equal or larger set of publicly revealed bits ฮฆโฒ .
The key part of the proof of well-partitioning is for reveal(p) expressions. Before the revelation,
it is assumed all ๏ฌip values are well partitioned. Immediately after the reveal expressions, ๏ฌip values
will remain well-partitioned, but conditioned on a larger set of publicly revealed bits ฮฆโฒ , to which
the publicly revealed ๏ฌip is added. In subsequent execution, the publicly revealed bit may end up
correlating with ๏ฌip values (e.g. as a result of a public if expression), however because partitioning
is quotiented by publicly revealed bits, this correlation ends up being benign.
The mechanism in the type system that enforces this semantic property of well-partitioning is
the a๏ฌne treatment of values at type flip; because flip values cannot be duplicated, there will
always only be one copy of each coin ๏ฌip in the context, and therefore each ๏ฌip value will be
independent of other ๏ฌip values.
We de๏ฌne stability also as a property of evaluation contexts hฮณฬ , ฯฬ i, such that any two bit distribution values bฬ at type flip in the evaluation context (either ฮณฬ or ฯฬ ) are hguaranteed
to be stable distrii
butions conditioned on publicly revealed information, that is: stable bฬ ฮฆ . We prove a theorem
that the evaluation semantics EJยทK preserves stability, again conditioned on public information.
Theorem 5.7 (Stability). Given a well-typed L obliv expression e and distributions of value environments ฮณฬ and value stores ฯฬ where every contained flip value is stable conditioned on the set of
publicly revealed bits ฮฆ, then the result of the evaluation semantics EJยทK is stable conditioned for some
equal or larger set of publicly revealed bits ฮฆโฒ .
The proof of stability uses the proof of partitioning as a lemma. The key part of the proof is for
reveal(p) expressions. Before the revelation, it is assumed all ๏ฌip values are stable. Immediately
after the revelation, it must be shown that all other coin ๏ฌips remain stable. This is a consequence
of well-partitioning, which guarantees that the revealed coin ๏ฌip will not correlate with any other
coin ๏ฌip, and therefore adding the revealed bit to the set of public information does not further
perturb the remaining stable coin ๏ฌips in the context.
The mechanism in the type system which enforces the semantic property of stability is the
typing rules for bit complement and mux. Bit complement is safe w.r.t. stability, which we prove,
1:20
David Darais, Chang Liu, Ian Sweet, and Michael Hicks
and the mux rule is stable under the conditions of region independence, which in turn imply
that the underlying distributions of values are probabilistically independent. Other than public
revelation, these are the only two language forms which manipulate coin ๏ฌips, and their typing
rules guarantee that resulting coin ๏ฌips will remain stable.
In order to prove the desired memory trace obliviousness property, we state a stronger property
which implies the desired property, but which supports a direct proof by induction on the term.
This stronger trace obliviousness property includes all of the assumptions for each of the above
lemmas, so each lemma can be applied in each case of the proof by induction, for which we show
the high-level details.
Theorem 5.8 (Strong Memory Trace Obliviousness (SMTO)). Given a well-typed L obliv expression e and satisfying properties from the above lemmas applied to each of two sets of distribution value environments and stores hฮณฬ 1 , ฯฬ1 i and hฮณฬ 2 , ฯฬ2 i, and where each of ฮณฬ 1 and ฮณฬ 2 and ฯฬ1 and
ฯฬ2 are distributed equally for publicly observable values conditioned on publicly revealed bits ฮฆ (i.e.,
f (ฮณฬ 1 ) โ ฮฆ obs
f (ฮณฬ 2 ) and obs
f (ฯฬ1 ) โ ฮฆ obs
f (ฯฬ2 )), then the observable traces for e applied to either set
obs
of contexts hฮณฬ 1 , ฯฬ1 i or hฮณฬ 2 , ฯฬ2 i will yield identical distributions conditioned on publicly revealed bits ฮฆ
f JeK(ฮณฬ 1 , ฯฬ1 )) โ ฮฆ obs(T
f JeK(ฮณฬ 2 , ฯฬ2 ))).
(i.e., obs(T
Proof. We prove this theorem by induction on the syntax for terms, and by applying each other
theorem developed thus far. For example, for let expressions, the proof goal is of the form:
f Jlet x โ a in eK(ฮณฬ 1 , ฯฬ1 )) โ
obs(T
ฮฆ
f Jlet x โ a in eK(ฮณฬ 2 , ฯฬ2 ))
obs(T
From the de๏ฌnition of the trace semantics T JยทK, this goal becomes:
f ฮณฬ โฒโฒ ) โ obs(
f ฯฬ โฒ) +
f JeK(ฮณฬ โฒโฒ , ฯฬ โฒ)) โ
โeโ โ obs(
+ obs(T
1
1 e
1
1
ฮฆ
f ฮณฬ โฒโฒ ) โ obs(
f ฯฬ โฒ) +
f JeK(ฮณฬ โฒโฒ , ฯฬ โฒ))
โeโ โ obs(
+ obs(T
2
2 e
2
2
e
where hvฬ, ฮณฬiโฒ, ฯฬiโฒi โ EJaK(ฮณฬi , ฯฬi ), ฮณฬiโฒโฒ โ ฮณฬiโฒ [x 7โ vฬ], and โ and +
+ are product and concatenation
operations respectively lifted to distributions. This goal is broken down using the product chain
rule for distributions, which states, using our notation and in the case of three elements:
p[xฬ โ yฬ โ zฬ = hx, y, zi] = p[xฬ = x]p[yฬ = y | xฬ = x]p[zฬ = z | xฬ = x โง yฬ = y]
In the case that two elements of a tuple are independent, then it factors without conditioning, as
per the de๏ฌnition of independence.
Using the product chain rule, in order to show the two distributions in the goal are equivalent, it
su๏ฌces to show each component of the three-tuple is independent of other elements of the threef ฮณฬ โฒโฒ ) โฅ
f ฯฬ โฒ)), that each element of the three-tuple is equivalent to its pairwise
tuple (e.g. obs(
โฅ obs(
1
1
โฒโฒ
f
f ฮณฬ โฒโฒ)), and that the recursive occurrence of the trace is equivalent
element (e.g. obs(ฮณฬ 1 ) โ ฮฆ obs(
2
pairwise conditioned on the three-tuple. That is, after establishing independence of elements in
the three-tuple, it su๏ฌces to show:
h
i
h
i
f ฮณฬ โฒโฒ ) โ ฮฆ p obs(
f ฮณฬ โฒโฒ )
(1) p obs(
1
2
h
i
h
i
f ฯฬ โฒ) โ ฮฆ p obs(
f ฮณฬ โฒโฒ )
(2) p obs(
1
2
h
i
h
i
โฒโฒ
โฒ
f
f
f ฯฬ โฒ) โ ฮฆ p obs(T
f JeK(ฮณฬ โฒโฒ , ฯฬ โฒ )) obs(
f ฮณฬ โฒโฒ ) โง obs(
f ฯฬ โฒ)
(3) p obs(T JeK(ฮณฬ 1 , ฯฬ1 )) obs(ฮณฬ 1โฒโฒ ) โง obs(
1
2
2
2
2
Goals (1) and (2) are consequences of partitioning and stability theorems. Goal (3) is further re๏ฌned
based on the observation that the new contexts hฮณฬ 1โฒโฒ , ฯฬ1โฒi and hฮณฬ 2โฒโฒ, ฯฬ2โฒ i depend uniquely on an equal
or larger set of publicly revealed bits ฮฆโฒ under which the contexts remain well-partitioned and
stable. It is therefore su๏ฌcient to condition on this (potentially) larger set of publicly revealed bits
A Language for Probabilistically Oblivious Computation
ฮฆโฒ , and demonstrate equivalence of distributions module ฮฆโฒ , that is:
h
i
h
f JeK(ฮณฬ โฒโฒ , ฯฬ โฒ)) ฮฆโฒ โ ฮฆโฒ p obs(T
f JeK(ฮณฬ โฒโฒ , ฯฬ โฒ ))
p obs(T
1
1
2
2
1:21
ฮฆโฒ
i
At this point, the inductive hypothesis applies and the proof for let is complete. The proofs for
let on tuples and public if statements follow the same structure, and are analogous.
After proving SMTO, we recover a proof of MTO as an instantiation of SMTO with the empty
ฯ = โยโ and the empty set of publicly revealed bits ฮฆ = {}.
store b
6 CASE STUDY
We have implemented a type checker for an extension to L obliv that adds functions, (bounded) recursion, and various arithmetic operations. We have used it to check two classical probabilistically
oblivious algorithms: non-recursive ORAM (NORAM) and tree-based ORAMs. These were ๏ฌrst
mentioned in Section 3.2, where we used NORAM as a building block to implement an oblivious
stack. In this section, we discuss the implementation of both NORAM and tree ORAM, where the
latter makes use of the former.
In what follows, we write nat S to be a secret number in region โฅ; nat P for a public number in
โฅ; nat R to be a secret in some region R. We also write type rnd R to be a random natural number
in region R; in our implementation we encode these using tuples of flip Rs.
6.1 Non-recursive ORAM
A non-recursive ORAM (NORAM) is the foundation all tree-based ORAMs. Such NORAMs provide the state-of-the-art in performance, and enable e๏ฌcient oblivious data structures. A NORAM
organizes data blocks as a complete tree of depth log N where N is the capacity of the ORAM.
Each node on the tree is a bucket, which is essentially a trivial ORAM of size b, which we call
the bucket size. A trivial ORAM is basically an array in which reads and writes require iterating
through each element in the array; we showed the trivial ORAM add operation in Section 2.2. Each
NORAM data block bucket associated with a randomly generated position tag, which is a log N -bit
random number, corresponding to one leaf of the tree. A key invariant of a tree-based NORAM is
that each data block always resides in a bucket somewhere on the path from the root to the leaf
corresponding to its position tag.
In particular, we have the following signature:
type noram R R' = (bucket R R ') array
type bucket = ( block R R ') array
type block R R' = bit R โ nat R โ nat R โ (rnd R' โ rnd R ') where R โฅ
โฅ R'
A NORAM is an array of 2N โ 1 buckets which represent a complete tree in the style of a heap data
structure: for the node at index i โ {0, ..., 2N โ 2}, its parents, left child, and right child correspond
to the nodes at index (i โ1)/2, 2i +1, and 2i +2, respectively. Each bucket is an array of blocks, each
of which is a 4-tuple, where the last element is the actual data. Ideally, an NORAM should be able
to store data of an arbitrary type ฮฑ, but since our language does not yet support polymorphism we
๏ฌx the data to type rnd R' โ rnd R' where R and R' are independent. We choose this type to illustrate
the a๏ฌne values can be stored in the NORAM, and to set up our implementation of Tree ORAM
next. (In our actual interpreter, we duplicate the code for each type we wish to store.) The other
three components of the block are all secret and in region R; they are (1) a bit indicating whether
the block is dummy or not; (2) the index of the block; and (3) the position tag for the block.
NORAM supports two primitives, rr and add, which we introduced (in greater generality) in
Section 3.2. Their signatures for our implementation are:
1:22
David Darais, Chang Liu, Ian Sweet, and Michael Hicks
rr : noram R R' โ ( idx : nat R) โ (tag :nat P) โ (data :rnd R' โ rnd R ')
add: noram R R' โ ( idx : nat R) โ (tag : nat R) โ (data :rnd R' โ rnd R ') โ unit
Due to the NORAM invariant, when the position tag corresponding to a block is known, rr can
be implemented as a linear scan through the path corresponding to the tag to ๏ฌnd the block with
the given index. In doing so, log N buckets are accessed, each with b blocks. Therefore, the rr
routine can be implemented in O(b log N ) time. In the state-of-the-art ORAM constructions, such
as Circuit ORAM [Wang et al. 2015], b can be parameterized as a constant (e.g., 4), which renders
the overall time complexity of rr to be O(log N ), which is much faster than linear scanning over a
trivial ORAM. Here is the code:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
let rr (noram:noram R R') ( idx :nat R) (tag : nat P) : rnd R 'โ rnd R' =
let noram_cap = (length(noram) + 1) / 2 in
let bucket_size = length(noram[0]) in
let rec read_bucket bucket ( idx : nat R) ( i : nat P) (read : rnd R 'โ rnd R ') =
if i =bucket_size then read
else
(โ read out the current block โ)
let isdummy, blk_idx, pos_tag, data = (bucket[i ] โ ( true , 0, 0, mk_dummy())) in
(โ check if the current block is nonโdummy and its index matches the queried one โ)
let toswap:bit R = isdummy && blk_idx = idx in
let data, read = mux toswap read data in
let isdummy, _ = mux toswap false isdummy in
(โ when toswap is false , this is equivalent to writting the data back ; otherwise , read
stores the found block ' s data field , and is passed into the next iteration โ)
let _ = (bucket[i ] โ (isdummy, blk_idx, pos_tag, data) ) in
read_bucket bucket idx ( i +1) read in
let rec read_level ( level : nat P) (read : nat R) =
let base :Nat P = (pow 2 level ) โ 1 in
(โ compute the first index into the bucket array at depth level โ)
if base >= length (noram) then read
else
let bucket_index:Nat P = base + (tag & base) in (โ the bucket on the path to access โ)
let bucket = noram[bucket_index] in
let read = readBucket bucket idx 0 read in
read_level ( level + 1) read in
let read = mk_dummy () in
read_level 0 read
The implementation involves two nested loops: read_level (line 18-26) implements the outer loop,
which iterates through all buckets on the path from the root to the leaf corresponding to tag; and
read_bucket (line 4-17) iterates through all blocks in a bucket (this is essentially a Trivial ORAM
read). Here are some things to notice. First, the NORAM itself is an array of arrays, and since array
addresses are non-a๏ฌne, we can read out noram[0] directly (line 3). On the other hand, buckets
contain a๏ฌne blocks (the data part), so we must replace a read block with a dummy one, as shown
on lines 8 and 15. On line 10, toswap is computed to determine whether to swap out the block, i.e.,
whether its index matches the queried one. Line 10 muxes on toswap and picks either the blockโs
data, or the argument read, which are each pairs of type rnd R' โ rnd R' . While toswap is in region R,
the pairs are in independent region R' , so rule MuxFlip ensures the returned value is still in R' . If we
were to store non-random data in the NORAM, we would require it to be in region R for this code
to type check.
A Language for Probabilistically Oblivious Computation
1:23
The add routine of NORAM is also simple: it adds the data into the bucket corresponding to the
root node of the tree, which is the bucket at index 0 in the array. This is similar to the read_bucket routine above, so we omit its implementation. To avoid over๏ฌowing the rootโs bucket due to repeated
adds, a tree-based ORAM employs an additional eviction routine to evict blocks in the buckets of
NORAM nodes closer to the leaf buckets. This routine should also maintain the key invariant: each
data block should always reside on the path corresponding to its position tag. Di๏ฌerent tree-based
ORAM implementations di๏ฌer only in their choices of b and the eviction strategies. One simple
eviction strategy picks random nodes at each level of the tree, reads a single non-empty block from
its bucket, and then writes that block one level further down either to the left or right; a dummy
block is written in the opposite direction to make the operation oblivious.
6.2
Tree-based (recursive) ORAM
To use tree-based NORAM we need a way to get the position tag for reads and writes. A tree-based
recursive ORAM employs an additional position map to solve this issue. Such a map PM maps any
index i โ 0..N , where N is the capacity of ORAM, to randomly generated position tag, which will
be given to the rr and add routines of NORAM. The Tree ORAM tree_rr routine will ๏ฌrst access PM
to get the position tag, and invoke NORAMโs rr routine to retrieve the data block.
As mentioned in Section 3.2, one way to implement the position map is to just use a regular array
stored in hidden memory, e.g., on-chip in a secure processor deployment of ORAM. However, this
is not possible for MPC-based deployments, the adversary can observe the access pattern on the
map itself. To avoid this problem, we can use another smaller Tree-based ORAM to store PM. In
particular, the ORAM PM has N /c blocks, where each block contain c elements, where c โฅ 2 is
a parameter of the ORAM. Therefore, PM also contains another position map PM โฒ , which can
be stored as an ORAM of capacity N /c 2 . Such a construction can continue recursively, until the
position map at the bottom is small enough to be constructed as a Trivial ORAM. Therefore, there
are logc N NORAMs constructed to store those position maps, and thus the overall runtime of a
recursive ORAM is logc N times of the runtime of a NORAM. In the following, we implement the
ORAM with c = 2.3
A full ORAM thus has the type oram, given below.
1
2
3
type oram R R' = (( noram R R') array ) โ trivial_oram R R'
type trivial_oram R R' = ( to_block R R ') array
type to_block R R' = bit R โ nat R โ (rnd R' โ rnd R ') where R โฅ
โฅ R'
In short, an ORAM is a sequence of NORAMs, where the ๏ฌrst in the sequence contains the actual
data, and the remainder serve as the position map, which eventually terminate with a trivial ORAM.
A trivial ORAM is simply an array of blocks which contain the isdummy ๏ฌag, the index, and the
data (recall that trivial ORAMs themselves do not use position tags in their implementations). The
data is a pair (i.e., c = 2) of position tags. The main idea is to think of the position map as essentially
an array of size N but โstoredโ as a 2-D array: array[N/2][2]. In doing so, to access PM[idx], we
essentially access PM[idx/2][idx mod 2].
We implement the tree_rr as a call to the function tree_rr_rec , which takes an additional public
level argument, to indicate at which point in the list of NORAMs to start its work; itโs initially
called with level 0.
1
2
3
let rec tree_rr_rec (oram:oram R R') ( idx : nat R) ( level : nat P) : (rnd R' โ rnd R ') =
let (norams,tr_oram) = oram in
let levels :nat P = length(norams) in
3 We
present a readable, almost-correct version of the code ๏ฌrst, and give the full picture in Section 6.3.
1:24
4
5
6
7
8
9
10
11
David Darais, Chang Liu, Ian Sweet, and Michael Hicks
if ( level >= levels ) then ... (โ do trivial ORAM case, returning block (rnd R' โ rnd R ') โ)
else
let ( r0 , r1) : rnd R' โ rnd R' = tree_rr_rec oram (idx /2) ( level +1) in
let r0 ', tag = mux ((idx mod 2) = 0) (rnd R' () ) r0 in
let r1 ', tag = mux ((idx mod 2 ) = 1) tag r1 in
let _ = tree_add_rec oram (idx /2) ( level +1) ( r0 ', r1 ') in
rr norams[level] idx (reveal tag)
let tree_rr (oram:oram R R') ( idx : nat R) : (rnd R' โ rnd R ') = tree_rr_rec oram idx 0
Line 4 checks whether we have hit the base case of the recursion, in which case we lookup idx
in the tr_oram, returning back a rnd R' โ rnd R' pair (code not shown). Otherwise, we enter the recursive case. Here, line 6 essentially reads out PM[idx/2], and lines 7 and 8 obliviously read out
PM[idx/2][idx mod 2] into tag, replacing it with a freshly generated tag, to satisfy the a๏ฌnity
requirement. Finally, line 8 writes the updated block PM[idx/2] back (i.e., ( r0 ', r1 ') ), using an analogous tree_add_rec routine, for which a level can be speci๏ฌed. Finally, line 9 reveals the retrieved
position tag for index idx , so that it can be passed into the rr routine of NORAM. Level 0 corresponds to the actual data of the ORAM, which is returned to the client.
The tree_add routine is similar so we do not show it all. As with tree_rr it recursively adds the
corresponding bits of the position tag into the array of NORAMs. At each level of the recursion
there is a snippet like the following:
1
2
3
4
5
6
7
let new_tag = rnd R' () in
let sec_tag = use new_tag in (โ does NOT consume new_tag โ)
let ( r0 , r1 ) : rnd R' โ rnd R' = tree_rr_rec oram (idx /2) ( level +1) in
let r0 ', tag = mux ((idx mod 2) = 0) new_tag r0 in (โ replaces with new tag โ)
let r1 ', tag = mux ((idx mod 2 ) = 1) tag r1 in
let _ = tree_add_rec oram (idx /2) ( level +1) ( r0 ', r1 ') in
add norams[level] idx sec_tag data (โ adds to Tree ORAM โ)
Lines 1 and 2 generate a new tag, and make a secret copy of it. The new tag is then stored in the
recursive ORAMโlines 3โ5 are similar to tree_add_rec but replace the found tag with new_tag, not
some garbage value, at the appropriate level of the position map (line 6). Finally, sec_tag is used to
store the data in the appropriate level of the NORAM.
6.3
Limitations
The astute reader may have noticed that the code snippet for add will not type check. In particular,
the sec_tag argument has type nat R' but add requires it to have type R. This is because the position
tags for the NORAM at level are stored as the data of the NORAM at level +1, and these are in
di๏ฌerent regions. We cannot put them in the same region because we require a single NORAMโs
metadata and data to reside in di๏ฌerent regions. We can solve this problem by having each level use
the opposite pair of regions as the one above it. This solves the type error and does not compromise
the NORAM independence requirement. Unfortunately, it means our oram type de๏ฌnition is made
a bit more awkward, essentially it will be
1
type oram R R' = (( noram R R' โ noram R' R) array) โ trivial_oram R R'
Basically, tree_rr_rec will have to operate two levels at a time in order to satisfy the type checker,
but the basic logic will be the same. In addition, tree_rr_rec and tree_rr require the type of idx to be
nat S, i.e., probability region โฅ rather than R. Because โฅ โ R and โฅ โ R' in the region lattice, idx
can be passed to rr at both of the unrolled levels, one of which requires it to be R and the other, R' .
A more unfortunate limitation is that we cannot implement an NORAM on which we can also
implement an oblivious stack. To see why, consider the rr operation implemented above, but with
A Language for Probabilistically Oblivious Computation
1:25
the data having type nat R โ rnd R' , as required for an oblivious stack (the ๏ฌrst component is the
stack elementโs value, and the second is the position tag of the stackโs next element). The issue is
that the stack elementโs position tag is from the same region as the position tags in the underlying NORAM, which violates the independence requirement of the mux on line 11 of rr . However,
this violation is a false positive: While the tags happen to be in the same region, they are actually independentโno tagโs generation is conditioned on any otherโs value, and the same tag is
never stored in the same block. Indeed, using the more general NORAM signature presented in
Section 3.2, L obliv โs type system con๏ฌrms that the stack in Figure 3 is secure. Checking the implementation of the stack and the NORAM end-to-end likely requires a more ๏ฌne-grained, generative
treatment of regions and the use of existential types. Such features may simplify the solution to
recursion problem as well. We are pursuing them in ongoing work.
7
RELATED WORK
Lampson ๏ฌrst pointed out various covert, or โside,โ channels of information leakage during a programโs execution [Lampson 1973]. Defending against side-channel leakage is challenging. Previous
works have attempted to thwart such leakage from various angles:
โข Processor architectures that mitigate leakage through timing [Kocher et al. 2004; Liu et al.
2012], power consumption [Kocher et al. 2004], or memory-traces [Fletcher et al. 2014; Liu
et al. 2015; Maas et al. 2013; Ren et al. 2013].
โข Program analysis techniques that formally ensure that a program has bounded or no leakage
through instruction traces [Molnar et al. 2006], timing channels [Agat 2000; Molnar et al.
2006; Russo et al. 2006; Zhang et al. 2012, 2015], or memory traces [Liu et al. 2015, 2013,
2014].
โข Algorithmic techniques that transform programs and algorithms to their side-channel-mitigating
or side-channel-free counterparts while introducing only mild costs โ e.g., works on mitigating timing channel leakage [Askarov et al. 2010; Barthe et al. 2010; Zhang et al. 2011],
and on preventing memory-trace leakage [Blanton et al. 2013; Eppstein et al. 2010; Goldreich 1987; Goldreich and Ostrovsky 1996; Goodrich et al. 2012; Shi et al. 2011; Stefanov et al.
2013; Wang et al. 2015, 2014; Zahur and Evans 2013].
Often, the most e๏ฌective and e๏ฌcient is through a comprehensive co-design approach combining
these areas of advances โ in fact, several aforementioned works indeed combine (a subset of)
algorithms, architecture, and programming language techniques [Fletcher et al. 2014; Liu et al.
2015; Ren et al. 2013; Zhang et al. 2012, 2015].
Our core language not only generalizes a line of prior works on timing channel security [Agat
2000], program counter security [Molnar et al. 2006], and memory-trace obliviousness [Liu et al.
2015, 2013, 2014], but also provides the ๏ฌrst distinct core language that captures the essence of
memory-trace obliviousness without treating key mechanismsโnotably, the use of randomnessโ
as a black box. Thus we can express state-of-the-art algorithmic results and formally reason about
the security of their implementations, thus building a bridge between algorithmic and programming language techniques.
ObliVM [Liu et al. 2015] is a language for programming oblivious algorithms intended to be run
as secure multiparty computations [Yao 1986]. Its type system also employs a๏ฌne types to ensure
random numbers are used at most once. However, there it provides no mechanism to disallow constructing a non-uniformly distributed random number. When such random numbers are generated,
they can be distinguished by an attacker from uniformly distributed random numbers when being
revealed. Therefore, the type system in ObliVM does not guarantee obliviousness. L obliv โs use of
probability regions enforces that all random numbers are uniformly random, and thus eliminates
1:26
David Darais, Chang Liu, Ian Sweet, and Michael Hicks
this channel of information leakage. Moreover, we prove that this mechanism (and the others in
L obliv ) are su๏ฌcient to prove PMTO.
Our work belongs to a large category of work that aims to statically enforce noninterference,
e.g., by typing [Sabelfeld and Myers 2006; Volpano et al. 1996]. Our probabilistic memory trace
obliviousness property bears some resemblance to probabilistic notions of noninterference. Much
prior work [Ngo et al. 2014; Russo and Sabelfeld 2006; Sabelfeld and Sands 2000; Smith 2003] is
concerned with how random choices made by a thread scheduler could cause the distribution of
visible events to di๏ฌer due to the values of secrets. Here, the source of nondeterminism is the
(external) scheduler, rather than the program itself, as in our case. Smith and Alpรญzar [2006, 2007]
consider how the in๏ฌuence of random numbers may a๏ฌect the likelihood of certain outcomes,
mostly being concerned with termination channels. Their programming model is not as rich as
ours, as a secret random number is never permitted to be made public; such an ability is the main
source of complexity in L obliv , and is crucial for supporting oblivious algorithms.
Some prior work aims to quantify the information released by a (possibly randomized) program
(e.g., Kรถpf and Rybalchenko [2013]; Mu and Clark [2009]) according to entropy-based measures.
Work on verifying the correctness of di๏ฌerentially private algorithms [Barthe et al. 2013; Zhang
and Kifer 2017] essentially aims to bound possible leakage; by contrast, we enforce that no information leaks due to a programโs execution.
8
CONCLUSIONS
This paper has presented L obliv , a core language suitable for expressing computations whose execution should be oblivious to a powerful adversary who can observe an executionโs trace of instructions and memory accesses, but not see private values. Unlike prior formalisms, L obliv can be
used to express probabilistic algorithms whose security depends crucially on the use of randomness. To do so, L obliv tracks the use of randomly generated numbers via a substructural (a๏ฌne)
type system, and employs a novel concept called probability regions. The latter are used to track
a random numberโs probabilistic (in)dependence on other random numbers. We have proved that
together these mechanisms ensure that a random numberโs revelation in the visible trace does not
perturb the distribution of possible events so as to make secrets more likely. We have demonstrated
that L obliv โs type system is powerful enough to accept sophisticated algorithms, including forms
of oblivious RAMs and oblivious data structures. Such data structures were out of the reach of
prior type systems. As such, our proof-of-concept implementations represent the ๏ฌrst automated
proofs that these algorithms are secure.
We are currently pursuing two threads of ongoing work. First, we are working on a more powerful notion of probability region that is ๏ฌner grained so as to accept oblivious data structure
algorithms, end to end. Second, we are working to expand the general expressiveness of the language. For example, to support containers requires some form of parametric polymorphism, and
to support some deployments of ORAM requires bit-width polymorphism, implementable with
dependent types. Ultimately we hope to integrate our ideas into ObliVM [Liu et al. 2015], a stateof-the-art compiler for oblivious algorithms, and thereby ensure that well-typed programs are
indeed secure.
ACKNOWLEDGMENTS
We thank Aseem Rastogi and Kesha Heitala for comments on earlier drafts of this paper, and Elaine
Shi for helpful suggestions and comments on the work while it was underway. This material is
based upon work supported by the National Science Foundation under Grant Nos. CNS-1563722,
A Language for Probabilistically Oblivious Computation
1:27
CNS-1314857, and CNS-1111599, and by DARPA under contracts FA8750-15-2-0104 and FA875016-C-0022. Any opinions, ๏ฌndings, and conclusions or recommendations expressed in this material
are those of the author and do not necessarily re๏ฌect the views of the National Science Foundation.
REFERENCES
Johan Agat. 2000. Transforming out Timing Leaks. In POPL.
Aslan Askarov, Danfeng Zhang, and Andrew C. Myers. 2010. Predictive black-box mitigation of timing channels. In CCS.
Gilles Barthe, Boris Kรถpf, Federico Olmedo, and Santiago Zanella Bรฉguelin. 2013. Probabilistic Relational Reasoning for
Di๏ฌerential Privacy. ACM Trans. Program. Lang. Syst. 35, 3 (2013), 9:1โ9:49.
Gilles Barthe, Tamara Rezk, Alejandro Russo, and Andrei Sabelfeld. 2010. Security of multithreaded programs by compilation. ACM Transactions on Information and System Security (TISSEC) 13, 3 (2010), 21.
Marina Blanton, Aaron Steele, and Mehrdad Alisagari. 2013. Data-oblivious Graph Algorithms for Secure Computation
and Outsourcing. In ASIA CCS.
David Brumley and Dan Boneh. 2003. Remote Timing Attacks Are Practical. In USENIX Security.
D. Dolev and A. C. Yao. 1981. On the Security of Public Key Protocols. In Proceedings of the 22nd Annual Symposium on
Foundations of Computer Science (SFCS).
David Eppstein, Michael T. Goodrich, and Roberto Tamassia. 2010. Privacy-preserving data-oblivious geometric algorithms
for geographic data. In GIS.
Christopher W. Fletcher, Ling Ren, Xiangyao Yu, Marten van Dijk, Omer Khan, and Srinivas Devadas. 2014. Suppressing
the Oblivious RAM timing channel while making information leakage and program e๏ฌciency trade-o๏ฌs. In HPCA.
J.A. Goguen and J. Meseguer. 1982. Security policy and security models. In IEEE S & P.
O. Goldreich. 1987. Towards a theory of software protection and simulation by oblivious RAMs. In STOC.
O. Goldreich, S. Micali, and A. Wigderson. 1987. How to play ANY mental game. In STOC.
Oded Goldreich and Rafail Ostrovsky. 1996. Software protection and simulation on oblivious RAMs. J. ACM (1996).
Michael T. Goodrich, Olga Ohrimenko, and Roberto Tamassia. 2012. Data-Oblivious Graph Drawing Model and Algorithms.
CoRR abs/1209.0756 (2012).
Matt
Hoekstra.
2015.
Intel
SGX
for
Dummies
(Intel
SGX
Design
Objectives).
https://software.intel.com/en-us/blogs/2013/09/26/protecting-application-secrets-with-intel-sgx. (2015).
Mohammad Islam, Mehmet Kuzu, and Murat Kantarcioglu. 2012. Access Pattern disclosure on Searchable Encryption:
Rami๏ฌcation, Attack and Mitigation. In Network and Distributed System Security Symposium (NDSS).
Paul Kocher, Ruby Lee, Gary McGraw, and Anand Raghunathan. 2004. Security As a New Dimension in Embedded System
Design. In Proceedings of the 41st Annual Design Automation Conference (DAC โ04). 753โ760. Moderator-Ravi, Srivaths.
Paul C. Kocher. 1996. Timing Attacks on Implementations of Di๏ฌe-Hellman, RSA, DSS, and Other Systems. In CRYPTO.
Boris Kรถpf and Andrey Rybalchenko. 2013. Automation of quantitative information-๏ฌow analysis. In Formal Methods for
Dynamical Systems.
Butler W. Lampson. 1973. A Note on the Con๏ฌnement Problem. Commun. ACM (1973).
Chang Liu, Austin Harris, Martin Maas, Michael Hicks, Mohit Tiwari, and Elaine Shi. 2015. GhostRider: A HardwareSoftware System for Memory Trace Oblivious Computation. In ASPLOS.
Chang Liu, Michael Hicks, and Elaine Shi. 2013. Memory Trace Oblivious Program Execution. In CSF.
Chang Liu, Yan Huang, Elaine Shi, Jonathan Katz, and Michael Hicks. 2014. Automating E๏ฌcient RAM-Model Secure
Computation. In IEEE S & P.
Chang Liu, Xiao Shaun Wang, Kartik Nayak, Yan Huang, and Elaine Shi. 2015. ObliVM: A Programming Framework for
Secure Computation. In IEEE S & P.
Isaac Liu, Jan Reineke, David Broman, Michael Zimmer, and Edward A. Lee. 2012. A PRET microarchitecture implementation with repeatable timing and competitive performance. In ICCD.
Martin Maas, Eric Love, Emil Stefanov, Mohit Tiwari, Elaine Shi, Kriste Asanovic, John Kubiatowicz, and Dawn Song. 2013.
Phantom: Practical Oblivious Computation in a Secure Processor. In CCS.
David Molnar, Matt Piotrowski, David Schultz, and David Wagner. 2006. The Program Counter Security Model: Automatic
Detection and Removal of Control-๏ฌow Side Channel Attacks. In ICISC.
Chunyan Mu and David Clark. 2009. An abstraction quantifying information ๏ฌow over probabilistic semantics. In Workshop
on Quantitative Aspects of Programming Languages (QAPL).
Tri Minh Ngo, Mariรซlle Stoelinga, and Marieke Huisman. 2014. E๏ฌective veri๏ฌcation of con๏ฌdentiality for multi-threaded
programs. Journal of computer security 22, 2 (2014).
Ling Ren, Xiangyao Yu, Christopher W. Fletcher, Marten van Dijk, and Srinivas Devadas. 2013. Design space exploration
and optimization of path oblivious RAM in secure processors. In ISCA.
1:28
David Darais, Chang Liu, Ian Sweet, and Michael Hicks
Alejandro Russo, John Hughes, David A. Naumann, and Andrei Sabelfeld. 2006. Closing Internal Timing Channels by
Transformation. In Annual Asian Computing Science Conference (ASIAN).
Alejandro Russo and Andrei Sabelfeld. 2006. Securing interaction between threads and the scheduler. In CSF-W.
A. Sabelfeld and A. C. Myers. 2006. Language-based Information-๏ฌow Security. IEEE J.Sel. A. Commun. 21, 1 (Sept. 2006).
Andrei Sabelfeld and David Sands. 2000. Probabilistic noninterference for multi-threaded programs. In CSF-W.
Elaine Shi, T.-H. Hubert Chan, Emil Stefanov, and Mingfei Li. 2011. Oblivious RAM with O ((log N )3 ) Worst-Case Cost. In
ASIACRYPT.
Geo๏ฌrey Smith. 2003. Probabilistic noninterference through weak probabilistic bisimulation. In CSF-W.
Geo๏ฌrey Smith and Rafael Alpรญzar. 2006. Secure Information Flow with Random Assignment and Encryption. In Workshop
on Formal Methods in Security (FMSE).
Geo๏ฌrey Smith and Rafael Alpรญzar. 2007. Fast Probabilistic Simulation, Nontermination, and Secure Information Flow. In
PLAS.
Emil Stefanov, Marten van Dijk, Elaine Shi, Christopher Fletcher, Ling Ren, Xiangyao Yu, and Srinivas Devadas. 2013. Path
ORAM โ an Extremely Simple Oblivious RAM Protocol. In CCS.
G. Edward Suh, Dwaine Clarke, Blaise Gassend, Marten van Dijk, and Srinivas Devadas. 2003. AEGIS: architecture for
tamper-evident and tamper-resistant processing. In ICS.
David Lie Chandramohan Thekkath, Mark Mitchell, Patrick Lincoln, Dan Boneh, John Mitchell, and Mark Horowitz. 2000.
Architectural support for copy and tamper resistant software. SIGOPS Oper. Syst. Rev. 34, 5 (Nov. 2000).
Dennis Volpano, Cynthia Irvine, and Geo๏ฌrey Smith. 1996. A Sound Type System for Secure Flow Analysis. J. Comput.
Secur. 4, 2-3 (Jan. 1996).
Xiao Wang, Hubert Chan, and Elaine Shi. 2015. Circuit ORAM: On tightness of the Goldreich-Ostrovsky lower bound. In
CCS.
Xiao Shaun Wang, Kartik Nayak, Chang Liu, T-H. Hubert Chan, Elaine Shi, Emil Stefanov, and Yan Huang. 2014. Oblivious
Data Structures. In CCS.
Andrew Chi-Chih Yao. 1986. How to generate and exchange secrets. In FOCS.
Samee Zahur and David Evans. 2013. Circuit Structures for Improving E๏ฌciency of Security and Privacy Tools. In S & P.
Danfeng Zhang, Aslan Askarov, and Andrew C. Myers. 2011. Predictive Mitigation of Timing Channels in Interactive
Systems. In CCS.
Danfeng Zhang, Aslan Askarov, and Andrew C. Myers. 2012. Language-based Control and Mitigation of Timing Channels.
In PLDI.
Danfeng Zhang and Daniel Kifer. 2017. LightDP: Towards Automating Di๏ฌerential Privacy Proofs. In POPL.
Danfeng Zhang, Yao Wang, G. Edward Suh, and Andrew C. Myers. 2015. A Hardware Design Language for Timing-Sensitive
Information-Flow Security. In ASPLOS.
Xiaotong Zhuang, Tao Zhang, and Santosh Pande. 2004. HIDE: an infrastructure for e๏ฌciently protecting information
leakage on the address bus. SIGARCH Comput. Archit. News 32, 5 (Oct. 2004).
A Language for Probabilistically Oblivious Computation
A APPENDIX
1:29
1:30
David Darais, Chang Liu, Ian Sweet, and Michael Hicks
x
xยฎN
xยฎN
xฬ R
i
ฮธ
โX
โ XN
โ Xโ
eR โ BR โ X
โX
โ idxN โ {1, .., N }
โ dep โ โ(N)
Notation for elements x of a parameterized set X
Sequence of elements X of length N
Sequence of elements X of some length N
Distributions of elements X over R coin ๏ฌips
Index into sequences of length N
Probabilistic Dependency Set
n
o
bยฎ xฬ bยฎ = x
c [xฬ = x]
p [xฬ = x] โ
2R
eR
X
c [xฬ = x] โ
c[ยท = ยท] : โR X .
รX โ N
eR ร X โ Q
p[ยท = ยท] : โR X . X
c[ยท = ยท โง ยท = ยท] : โR X 1 X 2 .
p[ยท = ยท โง ยท = ยท] : โR X 1 X 2 .
p[ยท = ยท | ยท = ยท] : โR X 1 X 2 .
eR ร X 1 ร X
eR ร X 2 โ N
X
1
2
R
e ร X1 ร X
eR ร X 2 โ Q
X
1
2
eR ร X 1 ร X
eR ร X 2 โ Q
X
1
2
o
xฬ 1 bยฎ = x 1 โง xฬ 2 bยฎ = x 2
c [xฬ 1 = x 1 โง xฬ 2 = x 2 ]
p [xฬ 1 = x 1 โง xฬ 2 = x 2 ] โ
2R
c [xฬ 1 = x 1 โง xฬ 2 = x 2 ]
p [xฬ 1 = x 1 | xฬ 2 = x 2 ] โ
c [xฬ 2 = x 2 ]
c [xฬ 1 = x 1 โง xฬ 2 = x 2 ] โ
n
bยฎ
eR ร N
eR โ N
eR
ยทe
โ ยท : โR. N
g : โR X . e
eR ร X
eR โ X
eR
cond
BR ร X
R
R
R
e
e
eR ร X
eR
e
mux
g : โR X . B ร X ร X โ X
ยฎ JโK nฬ 1 bยฎ , nฬ 2 bยฎ
nฬ 1 e
โ ยทnฬ 2 โ ฮปb.
๏ฃฑ
๏ฃด
๏ฃด
๏ฃฒxฬ 2 bยฎ if xฬ 1 bยฎ = O
ยฎ
g (xฬ 1 , xฬ 2 , xฬ 3 ) โ ฮปb.
cond
๏ฃด
๏ฃดxฬ 3 bยฎ if xฬ 1 bยฎ = I
๏ฃณ
D
E
g (xฬ 1 , xฬ 2 , xฬ 3 ) , cond
g (xฬ 1 , xฬ 3 , xฬ 2 )
mux
g (xฬ 1 , xฬ 2 , xฬ 3 ) โ cond
eR
โยทโ : โR X . X โ X
R
eR
sel[ยท] : โR X . idx โ X
eR โ X
eR+R โฒ
โห : โR R โฒ X . X
xฬ 1 โ xฬ 2 โ
xฬ 1 โ ฮธ xฬ 2 โ
stable [xฬ ฮธ ] โ
xฬ 1 โฅ
โฅ xฬ 2 โ
xฬ โ ฮธ โ
โxโ โ
sel[i] โ
โห xฬ R โ
ฮป . x
ฮปbยฎR . bi
โฒ
ฮปbยฎR+R . xฬ R (b1 . . . bR )
โx . p [xฬ 1 = x] = p [xฬ 2 = x]
โx . p [xฬ 1 = x | ฮธ ] = p [xฬ 2 = x | ฮธ ]
โx 1 x 2 . p [xฬ = x 1 | ฮธ ] = p [xฬ = x 2 | ฮธ ]
โx 1 x 2 . p [xฬ 1 = x 1 โง xฬ 2 = x 2 ] = p [xฬ 1 = x 1 ] p [xฬ 2 = x 2 ]
โi < ฮธ . xฬ โฅ
โฅ sel[i]
Fig. 8. Distributions
A Language for Probabilistically Oblivious Computation
ฮฑ โ addr โ {0, 1, . . .}
bR F ฮนฬ R ฮฑฬ R
vbR โ V
โ
b
bR โ V
b
โ : โR R โฒ . V
bR โ {โข}
ฮณbR โ env
c R โ var โ V
bR โ
ฯ R โ env
b
c R โ addr โ V
vbR , vbR
b
โ (หฮน ) โ โห (ฮนฬ)
b
โ (ฮฑฬ) โ โDห (ฮฑฬ)
E
b
โ (hb
v 1 , vb2 i) โ b
โb
v1, b
โb
v2
R+R โฒ
โฒ
b
โ : โR R โฒ . env
c R โ env
c R+R
env
b
d R โ store
d R+R
โ : โR R โฒ . store
store
1:31
โฒ
env
b
โb
ฮณ (x) โ b
โb
ฮณ (x)
!
store
b
โb
ฯ (ฮฑ)n โ b
โb
ฯ (ฮฑ)n
d : โR. V
bR ร V
bR ร V
bR โ V
bR
cond
bR ร V
bR ร V
bR โ V
bR ร V
bR
mux
d : โR. V
d bฬ โ , ฮนห1 , ฮนห2
cond
d bฬ โ , ฮฑฬ 1 , ฮฑฬ 2
cond
d bฬ โ , hb
cond
v 11 , vb21 i , hb
v 12 , vb22 i
mux
d bฬ โ , vb1, vb2
R
g
bR โ V
bR
join : โR. V
g bฬ, ฮนห1 , ฮนฬ 2
โ cond
g bฬ, ฮฑฬ 1 , ฮฑฬ 2
โ cond
E
D
d bฬ โ , vb21, vb22
d bฬ โ , vb11 , vb12 , cond
โ cond
E
D
d bฬ โ , vb2, vb1
d bฬ โ , vb1, vb2 , cond
โ cond
ยฎ ฮนหห bยฎ bยฎ
join ฮนหห โ ฮปb.
ยฎ ฮฑฬห bยฎ bยฎ
join ฮฑฬห โ ฮปb.
E
D
ย
join hb
v 1 , vb2 i โ join vbฬ1 , join vbฬ2
gR รN
bR
e R ร store
dR โ V
read : โR. addr
R
g รN
bR ร store
bR ร store
eR ร V
dR โ V
dR
read+write : โR. addr
ยฎ b
read (ฮฑฬ, nฬ โ , b
ฯ ) โ join ฮปb.
ฯ ฮฑฬ bยฎ [nฬ bยฎ ]
read+write (ฮฑฬ, nฬ โ , vb, b
ฯ ) โ hread (ฮฑฬ, nฬ, b
ฯ),b
ฯ โฒi
๏ฃฑ
๏ฃด
ยฎ = ฮฑ and nฬ bยฎ = n
ฮฑฬ
b
v
b
if
๏ฃด
๏ฃฒ
ยช
ยฉ ยฎ
where b
ฯ โฒ(ฮฑ)[n] โ join ยญฮปb.
ยฎ
๏ฃด
ยฎ
ยฎ
ฯ (ฮฑ)[n] if ฮฑฬ b , ฮฑ or nฬ b , n
๏ฃดb
ยซ
ยฌ
๏ฃณ
Fig. 9. Domains
1:32
David Darais, Chang Liu, Ian Sweet, and Michael Hicks
bR ร env
V
cR
โฒ
โฒ
bR โฒ ร env
d R โ โR โฒ . V
dR
EJยทK : atom โ โR. env
c R ร store
c R ร store
exp
โฒ
โฒ
bR โฒ ร env
d R โ โR โฒ . V
dR
EJยทK : expr โ โR. env
c R ร store
c R ร store
EJยทK : pico โ โR. env
cR
pico
โ
atom
ฮณ ) โ hb
ฮณ (x), b
ฮณi
EJxK (b
pico
U
EJxK (b
ฮณ ) โ hb
ฮณ (x), b
ฮณ [x 7โ โข]i
pico
EJpK (b
ฮณ,b
ฯ ) โ hb
v, b
ฮณ โฒ, b
ฯ i where hb
v, b
ฮณ โฒi โ EJpK (b
ฮณ)
D
E
D
E
pico
atom
โฆ
โฒ
g bฬ, โ0โ, โ1โ , b
EJp K (b
ฮณ,b
ฯ ) โ cond
ฮณ ,b
ฯ
ฮณ)
bฬ, b
ฮณ โฒ โ EJpK (b
where
atom
EJp1 โ p2 K (b
ฮณ,b
ฯ ) โ nฬ 1 e
โ nฬ 2 , b
ฮณ โฒโฒ, b
ฯ
atom
EJฮน โ K (b
ฮณ ) โ hโฮน โ โ, b
ฮณi
pico
L
pico
hnฬ 1 , b
ฮณ โฒi โ EJp1 K (b
ฮณ ) hnฬ 2 , b
ฮณ โฒโฒ i โ EJp2 K (b
ฮณ โฒ)
D
E
D
E
pico
atom
ย bฬ , b
EJasnat(p)K (b
ฮณ)
bฬ, ฮณbโฒ โ EJpK (b
ฮณ,b
ฯ ) โ asnat
where
ฮณ โฒ, b
ฯ
D
E
pico
atom
g (nฬ) , b
ฮณ,b
ฯ ) โ asbit
where hnฬ, b
ฮณ โฒ i โ EJpK (b
ฮณ)
ฮณ โฒ, b
ฯ
EJasbit(p)K (b
*
+
env
store
atom
ฯ
EJflip K b
ฮณ R, b
ฯ R โ sel[R + 1], b
โb
ฮณ R, b
โb
ฯR
pico
pico
where
โ
ฮณ,b
ฯ ) โ hb
ฮณ (x), b
ฮณ, b
ฯi
EJuse(x)K (b
atom
EJreveal(x)K (b
ฮณ,b
ฯ ) โ hb
ฮณ (x), b
ฮณ [x 7โ โข], b
ฯi
atom
ฮณ,b
ฯ ) โ hmux
d (b
v 1 , vb2, vb3 ) , b
ฮณ โฒโฒโฒ , b
ฯi
EJmux(p1, p2 , p3 )K (b
atom
hb
v 1, b
ฮณ โฒ i โ EJp1 K (b
ฮณ)
pico
where
hb
v2, b
ฮณ โฒโฒ i โ EJp2 K (b
ฮณ โฒ)
pico
EJhp1 , p2 iK (b
ฮณ,b
ฯ ) โ hhb
v 1 , vb2 i , b
ฮณ โฒโฒ, b
ฯi
atom
where
hb
v1, b
ฮณ โฒi โ EJp1 K (b
ฮณ)
pico
hnฬ 1 , b
ฮณ โฒi โ EJp1 K (b
ฮณ)
pico
where
hb
v 2, b
ฮณ โฒโฒโฒ i โ EJp2 K (b
ฮณ โฒโฒ )
pico
hb
v2, b
ฮณ โฒโฒ i โ EJp2 K (b
ฮณ โฒ)
pico
hnฬ 2 , b
ฮณ โฒโฒ i โ EJp2 K (b
ฮณ โฒ)
pico
Fig. 10. Denotational Evaluation Semantics (1)
A Language for Probabilistically Oblivious Computation
1:33
EJarrayN (p1 , . . . , p N )K (b
ฮณ0, b
ฯ ) โ hโฮฑโ, b
ฮณn , b
ฯ [ฮฑ 7โ [n 7โ vbn ]]i
atom
hb
vn , b
ฮณn , i โ EJpn K (b
ฮณnโ1 )
pico
where
ฮฑ โ fresh (b
ฯ)
EJp1 [p2 ]K (b
ฮณ,b
ฯ ) โ hread (b
v 1 , vb2, b
ฯ) ,b
ฮณ โฒโฒ, b
ฯi
atom
hb
v1, b
ฮณ โฒi โ EJp1 K (b
ฮณ)
pico
where
hb
v2, b
ฮณ โฒโฒ i โ EJp2 K (b
ฮณ โฒ)
pico
EJp1 [p2 ] โ p3 K (b
ฮณ,b
ฯ ) โ hb
v, b
ฮณ โฒโฒโฒ , b
ฯ โฒi
atom
hb
v 1, b
ฮณ โฒ i โ EJp1 K (b
ฮณ ) hb
v2, b
ฮณ โฒโฒ i โ EJp2 K (b
ฮณ โฒ ) hb
v 3, b
ฮณ โฒโฒโฒ i โ EJp2 K (b
ฮณ โฒโฒ )
โฒ
hb
v, b
ฯ i โ read+write (b
v 1 , vb2, vb3, b
ฯ)
pico
where
pico
pico
EJaK (b
ฮณ,b
ฯ ) โ EJaK (b
ฮณ,b
ฯ)
exp
atom
EJlet x โ a in eK (b
ฮณ,b
ฯ ) โ EJeK (b
ฮณ โฒ [x 7โ vb], b
ฯ โฒ)
exp
exp
hb
v, b
ฮณ โฒ, b
ฯ โฒi โ EJaK (b
ฮณ, b
ฯ)
atom
where
ฮณ,b
ฯ ) โ EJeK (b
ฮณ โฒ [x 1 7โ vb1 , x 2 7โ vb2 ] , b
ฯ โฒ)
EJlet x 1 , x 2 โ a in eK (b
exp
exp
hhb
v 1, vb2 i , b
ฮณ โฒ, b
ฯ โฒ i โ EJaK (b
ฮณ,b
ฯ)
atom
where
EJif p then e 1 else e 2 K (b
ฮณ,b
ฯ ) โ hb
v, b
ฮณ โฒโฒ, b
ฯ โฒi
E
D
pico
R
vbR1 โR2 โ
ฮณ)
vbR , ฮณbโฒ โ EJpK (b
where
E
D
exp
R1 โR2
(x) โ
ฮณ โฒ, b
ฯ ) ฮณcโฒโฒ
vb1R1 , b
ฮณ 1R1 , b
ฯ1R1 โ EJe 1 K (b
E
D
exp
R
โR
โฒ 1 2 (ฮฑ) โ
ฮณ โฒ, b
ฯ ) ฯb
vb2R2 , b
ฮณ 2R2 , b
ฯ2R2 โ EJe 2 K (b
exp
d b
cond
โv, b
โv 1 , b
โv 2
d b
cond
โv, b
โฮณ 1 (x), b
โฮณ 2 (x)
d b
cond
โv, b
โฯ1 (ฮฑ), b
โฯ2 (ฮฑ)
Fig. 11. Denotational Evaluation Semantics (2)
1:34
David Darais, Chang Liu, Ian Sweet, and Michael Hicks
l โ loc F . . . source code locations . . .
v โ V F ฮน โ | ฮฑ | hv, vi
ฮณ โ env โ var โ V
ฯ โ store โ addr โ V โ
t โ trace โ (loc ร V ร env ร store)โ
R
eR ร X
eR โ Xย
ยท โ ยท : โR X 1 X 2 . X
1 ร X2
1
2
fโR ร X
fโ R โ X
fโ
e
ยท+
+ ยท : โR X . X
E
D
ยฎ xฬ 1 bยฎ , xฬ 2 bยฎ
xฬ 1 โ xฬ 2 โ ฮปb.
e
ยฎ e
e
xยฎ2 bยฎ
xยฎ1 +
+e
xยฎ2 โ ฮปb.
xยฎ1 bยฎ ++ e
bR โ V
eR
ฮด : โR. V
V
ฮด (หฮน โ ) โ ฮนหโ
ฮด (ฮฑฬ ) โ ฮฑฬ
ฮด (hb
v 1 , vb2 i) โ ฮด (b
v 1 ) โ ฮด (b
v2)
h
i
xโ
7 ฮด (b
ฮณ (x)) bยฎ
h
h
ii
store
ยฎ ฮฑโ
ฮด (b
ฯ ) โ ฮปb.
7
n 7โ ฮด (b
ฯ (ฮฑ)[n]) bยฎ
env
ฮด : โR. env
c R โ eg
nvR
ยฎ
ฮด (b
ฮณ ) โ ฮปb.
env
d R โ store
gR
ฮด : โR. store
store
R
d R โ โR โฒ . tย
T JยทK : expr โ โR. env
c R ร store
race
โฒ
T Jal K (b
ฮณ,b
ฯ ) โ โlโ โ ฮด (b
v ) โ ฮด (b
ฮณ โฒ) โ ฮด (b
ฯ โฒ)
env
store
where hb
v, b
ฮณ โฒ,b
ฯ โฒ i โ EJaK (b
ฮณ,b
ฯ)
atom
env
store
e
ฮณ,b
ฯ ) โ โlโ โ ฮด (b
v ) โ ฮด (b
ฮณ โฒ) โ ฮด (b
ฯ โฒ) +
+t
T Jlet x โ al in eK (b
hb
v, b
ฮณ โฒ, b
ฯ โฒi โ EJaK (b
ฮณ, b
ฯ ) t โ T JeK (b
ฮณ โฒ [x 7โ vb] , b
ฯ โฒ)
env
store
e
T Jlet x 1 , x 2 โ al in eK (b
ฮณ,b
ฯ ) โ โlโ โ ฮด (b
v ) โ ฮด (b
ฮณ โฒ) โ ฮด (b
ฯ โฒ) +
+t
atom
where
where hhb
v 1 , vb2 i , b
ฮณ โฒ, b
ฯ โฒi โ EJaK (b
ฮณ,b
ฯ ) t โ T JeK (b
ฮณ โฒ [x 1 7โ vb1, x 2 7โ vb2 ] , b
ฯ โฒ)
โฒ
โฒ
T Jif p then e 1 else e 2 K (b
ฮณ,b
ฯ ) โ cond (b
v , T Je 1 K (b
ฮณ ,b
ฯ ) , T Je 2 K (b
ฮณ ,b
ฯ ))
atom
hb
v, b
ฮณ โฒi โ EJpK (b
ฮณ,b
ฯ)
pico
where
Fig. 12. Denotational Trace Semantics
A Language for Probabilistically Oblivious Computation
w โ W F ฮธ | hw, wi
pico
ฯ โ penv โ var โ W
n
all (xฬ) โ x
eR โ โ(X )
all : โR X . X
DJยทK : pico โ
1:35
ฯ โ pstore โ addr โ W
o
ยฎ xฬ bยฎ = x
โb.
penv โ W
d R ร penv ร pstore ร dep โ W ร pstore ร dep
DJยทK : atom โ โR. env
c R ร store
atom
d R ร penv ร pstore ร dep โ W ร pstore ร dep
DJยทK : exp โ โR. env
c R ร store
exp
pico
pico
DJxK(ฯ) โ ฯ(x)
DJlK(ฯ) โ ย
DJpK (b
ฮณ, b
ฯ , ฯ,ฯ , ฮธ ) โ DJpK(ฯ),ฯ , ฮธ
pico
atom
โฆ
DJp K (b
ฮณ, b
ฯ , ฯ,ฯ , ฮธ ) โ DJpK(ฯ),ฯ , ฮธ
pico
pico
atom
DJp1 โ p2 K (b
ฮณ, b
ฯ , ฯ,ฯ , ฮธ ) โ DJp1 K(ฯ) โ DJp2 K(ฯ),ฯ , ฮธ
pico
atom
ฮณ, b
ฯ , ฯ,ฯ , ฮธ ) โ DJpK(ฯ),ฯ , ฮธ
DJasnat(p)K (b
pico
atom
ฮณ, b
ฯ , ฯ,ฯ , ฮธ ) โ DJpK(ฯ),ฯ , ฮธ
DJasbit(p)K (b
atom
ฯ
ฯ R , ฯ,ฯ , ฮธ โ h{R + 1},ฯ , ฮธ i
DJflipโ K ฮณbR , b
atom
pico
DJuse(x)K (b
ฮณ, b
ฯ , ฯ,ฯ , ฮธ ) โ hฯ(x),ฯ , ฮธ i
atom
ฮณ, b
ฯ , ฯ,ฯ , ฮธ ) โ hฯ(x),ฯ , ฮธ โ ฯ(x)i
DJreveal(x)K (b
atom
DJmux(p1 , p2, p3 )K (b
ฮณ, b
ฯ , ฯ,ฯ , ฮธ ) โ hhw, wi,ฯ , ฮธ i
atom
U
pico
pico
pico
where w โ DJp1 K(ฯ) โ DJp2 K(ฯ) โ DJp3 K(ฯ)
DJmux(p1 , p2, p3 )K (b
ฮณ, b
ฯ , ฯ,ฯ , ฮธ ) โ hhw, wi,ฯ , ฮธ i
atom
A
pico
pico
where w โ DJp2 K(ฯ)
โ DJp3 K(ฯ)
pico
pico
atom
DJhp1 , p2 iK (b
ฮณ, b
ฯ , ฯ,ฯ , ฮธ ) โ DJp1 K(ฯ), DJp2 K(ฯ) ,ฯ , ฮธ
Fig. 13. Dependency Semantics (1)
1:36
David Darais, Chang Liu, Ian Sweet, and Michael Hicks
pico
pico
atom
DJarrayN (p1 , . . . , p N )K (b
ฮณ,b
ฯ , ฯ,ฯ , ฮธ ) โ ย,ฯ ฮฑ โ
7 DJp1 K(ฯ) โ ยท ยท ยท โ DJp N K(ฯ) , ฮธ
ฮฑ โ fresh(b
ฯ)
ร
DJp1 [p2 ]K (b
ฮณ,b
ฯ , ฯ,ฯ , ฮธ ) โ
ฯ (ฮฑ),ฯ , ฮธ
where
atom
ฮฑ
hb
v, b
ฮณ i โ EJp
ฮณ ) ฮฑ โ all (b
v)
1 K (b
pico
ร
DJp1 [p2 ] โ p3 K (b
ฮณ,b
ฯ , ฯ,ฯ , ฮธ ) โ
ฯ (ฮฑ),ฯ โ ฮฑ 7โ DJp3 K(ฯ) , ฮธ
where
atom
where
โฒ
hb
v, b
ฮณ โฒi
pico
ฮฑ
pico
โ EJp1 K (b
ฮณ)
ฮฑ โ all (b
v)
DJaK (b
ฮณ,b
ฯ , ฯ,ฯ , ฮธ ) โ DJaK (b
ฮณ,b
ฯ ,ฯ , ฯ, ฮธ )
exp
atom
ฮณ,b
ฯ , ฯ,ฯ , ฮธ ) โ DJeK (b
ฮณ โฒโฒ, b
ฯ โฒ, ฯ โฒโฒ ,ฯ โฒ, ฮธ โฒ)
DJlet x โ a in eK (b
exp
exp
hb
v, b
ฮณ โฒ, b
ฯ โฒi โ EJaK (b
ฮณ,b
ฯ)
ฮณbโฒโฒ โ ฮณbโฒ [x 7โ vb]
โฒโฒ
โฒ
hw,ฯ โฒ, ฮธ โฒi โ DJaK (b
ฮณ,b
ฯ , ฯ,ฯ , ฮธ ) ฯ โ ฯ [x 7โ w]
atom
where
atom
ฮณ,b
ฯ , ฯ,ฯ , ฮธ ) โ DJeK (b
ฮณ โฒโฒ, b
ฯ โฒ, ฯ โฒโฒ ,ฯ โฒ, ฮธ โฒ)
DJlet x 1 , x 2 โ a in eK (b
exp
exp
hhvb1 , vb2 i , b
ฮณ โฒ, b
ฯ โฒ i โ EJaK (b
ฮณ, b
ฯ)
ฮณbโฒโฒ โ ฮณbโฒ [x 1 7โ vb1 , x 2 7โ vb2 ]
โฒโฒ
โฒ
hhw 1 , w 2 i, ฯ โฒ,ฯ โฒ, ฮธ โฒ i โ DJaK (b
ฮณ, b
ฯ , ฯ, ฮธ ) ฯ โ ฯ [x 1 7โ w 1 , x 2 7โ w 2 ]
atom
where
atom
ฮณ,b
ฯ , ฯ,ฯ , ฮธ ) โ DJpK(ฯ) โ w 1 โ w 2 ,ฯ 1 โ ฯ 2 , ฮธ 1 โ ฮธ 2
DJif p then e 1 else e 2 K (b
exp
pico
hw 1 ,ฯ 1 , ฮธ 1 i โ DJe 1 K (b
ฮณ,b
ฯ , ฯ,ฯ , ฮธ )
exp
where
hw 2 ,ฯ 2 , ฮธ 2 i โ DJe 2 K (b
ฮณ,b
ฯ , ฯ,ฯ , ฮธ )
exp
Fig. 14. Dependency Semantics (2)
A Language for Probabilistically Oblivious Computation
1:37
ฮพ โ renv โ region โ dep
d ร renv โ renv
RJยทK : atom โ โR. env
c R ร store
atom
R
d ร renv โ renv
RJยทK : exp โ โR. env
c R ร store
exp
R
atom
ฯ
ฯ R , ฯ,ฯ , ฮพ โ ฮพ โ [ฯ โฒ 7โ {R + 1} | ฯ โ ฯ โฒ ]
RJflipโ K ฮณbR , b
RJ K (b
ฮณ,b
ฯ , ฯ,ฯ , ฮพ ) โ ฮพ
atom
RJaK (b
ฮณ,b
ฯ , ฮพ ) โ RJaK (b
ฯ, ฮพ)
ฮณ , b
exp
exp
atom
โฒโฒ
โฒ
ฮณ,b
ฯ , ฮพ ) โ RJeK b
ฮณ ,b
ฯ , RJaK (b
ฮณ,b
ฯ, ฮพ )
RJlet x โ a in eK (b
exp
atom
hb
v, b
ฮณ โฒ, b
ฯ โฒi โ EJaK (b
ฮณ,b
ฯ ) ฮณbโฒโฒ โ b
ฮณ โฒ [x 7โ vb]
exp
exp
atom
RJlet x 1 , x 2 โ a in eK (b
ฮณ,b
ฯ , ฮพ ) โ RJeK b
ฮณ โฒโฒ, b
ฯ โฒ, RJaK (b
ฮณ,b
ฯ, ฮพ )
atom
where
hhvb1, vb2 i , b
ฮณ โฒ, b
ฯ โฒi โ EJaK (b
ฮณ,b
ฯ ) ฮณbโฒโฒ โ b
ฮณ โฒ [x 1 7โ vb1 , x 2 7โ vb2 ]
atom
where
RJif p then e 1 else e 2 K (b
ฮณ,b
ฯ , ฮพ ) โ RJe 1 K (b
ฮณ,b
ฯ , ฮพ ) โ RJe 2 K (b
ฮณ,b
ฯ, ฮพ )
exp
exp
Fig. 15. Region Semantics
exp
1:38
David Darais, Chang Liu, Ian Sweet, and Michael Hicks
Bit
Arr
โฮฑ โ all ฮฑฬ R . ฮฃ(ฮฑ) = ฯ
ฮนหRโ
โ
ฮฆ
ฮฆ
ฮฑฬ R โ
ฮธ
ฮธ
Arr
R
ฮฑฬ โ
Flip
ฮฃ โข nฬ R : nat
Tup
ฮฃ โข ฮฑฬ R : array(ฯ )
ฮนฬ R โ
Dist
Nat
ฮฃ โข bฬ R : bit
ฮฆ
ฮฆ
ฮพ โข ฮฒ@hโ, ฯi โ ฮธ
Arr
Tup
vb1R โ
ฮฆ w1
R R
vb1 , vb2
Tup
ฮพ โข array(ฯ ) โ ฮธ
ฮฃ โข vb2R : ฯ2
ฮฃ โข vb1R , vb2R : ฯ1 ร ฯ2
ฮธ โ ฮพ (ฯ)
Base
ฮฃ โข bฬ R : flip
ฮฃ โข vb1R : ฯ1
ฮธ
ฮธ
ฮฃ โข vbR : ฯ
โ
ฮฆ
vb2R โ
vbR โ
vbR โ
hw 1 , w 2 i
ฮพ โขฯ โw
ฮพ โข ฯ1 โ w 1
ฮพ โข ฯ โw
ฮฆw
ฮฃ ; ฮพ โข vb : ฯ โ
R
ฮฆ
w
Fig. 16. Value Well-formedness
w
ฮฆ w2
ฮพ โข ฯ2 โ w 2
ฮพ โข hฯ1 , ฯ2 i โ hw 1 , w 2 i
ฮฃ ;ฮพ โขv :ฯ โ
ฮฃ โข vbR : ฯ
ฮฆ
ฮฆ
w
A Language for Probabilistically Oblivious Computation
1:39
ฮ ; ฮฃโขb
ฮณ โ โx . ฮฃ โข ฮณb(x) : ฮ(x)
ฮณ โ ฯ โ โx . ฮณb(x) โ
b
ฮฆ
ฯ(x)
ฮ ; ฮฃ โข ฮณb
ฮณโ
b
ฮฆ
ฯ
ฮพ โข ฮ โฯ
ฮพ โข ฮ โ ฯ โ โx . ฮพ โข ฮ(x) โ ฯ(x)
ฮ ; ฮฃ โข ฮณb
ฮณb โ
ฮฆ
ฮพ โข ฮ โฯ
ฯ
ฮ ; ฮฃ;ฮพ โขb
ฮณโ
ฯ
ฮฆ
ฮฃโขb
ฯ โ โฮฑ . ฮฃ โข b
ฯ (ฮฑ) : ฮฃ(ฮฑ)
b
ฯ โ ฯ โ โฮฑ . b
ฯ (ฮฑ) โ
ฮฆ ฯ (ฮฑ)
ฮพ โข ฮฃ โ ฯ โ โฮฑ . ฮพ โข ฮฃ(ฮฑ ๏ฃพ โ ฯ (ฮฑ)
ฮฃโขb
ฯ
ฯโ
b
ฮฆฯ
ฮฃ;ฮพ โขb
ฯโ
ฮพ โข ฮฃ โฯ
ฮฆฯ
Fig. 17. Env and Store Well-formedness
ฮ ; ฮฃ;ฮพ โขb
ฮณโ
ฮฆ
ฯ
ฮฃโขb
ฯ
ฯโ
b
ฮฆฯ
ฮพ โข ฮฃ โฯ
ฮฃ;ฮพ โขb
ฯโ
ฮฆฯ
1:40
David Darais, Chang Liu, Ian Sweet, and Michael Hicks
z
ฯ
ฯ
ฮฒ
โ loc F
โ cloc F
โ rloc F
โ btype F
R
cc
xt
R
rc
xt
tcxt
trxt
| hz, โขi | hโข, zi
env (x, z) | store (ฮฑ, z)
ret (z) | ฯ
bit | nat | flip
eR
bR ร loc โ lit
ยท@ยท : โR. V
โ
โ
โ
โ
ฮนหโ @ โ ฮนห
vb,
cxt
hb
ฮณ,b
ฯ i @store (ฮฑ, z) โ b
ฯ (ฮฑ)@z
cxt
hb
v, b
ฮณ, b
ฯ i @ret (z) โ vb@z
rxt
R
e
ยท@ยท : โR. rc
xt ร rloc โ lit
ฮณ (x)@z
hb
v, b
ฮณ,b
ฯ i @env (x, z) โ b
R
rxt
hb
v, b
ฮณ,b
ฯ i @store (ฮฑ, z) โ b
ฯ (ฮฑ)@z
rxt
ฯ type
bitโ @ โ bit
type
ยท@ยท : type ร loc โ btype
@hz, โขi โ vb@z
, vb @hโข, zi โ vb@z
hb
ฮณ,b
ฯ i @env (x, z) โ ฮณb(x)@z
R
eR
ยท@ยท : โR. cc
xt ร cloc โ lit
cxt
rxt
dR
env
c R ร store
bR ร env
dR
V
c R ร store
tenv ร tstore
type ร tenv ร tstore
ฯ type
natโ @
type
flipฯ @
ฯ,
โ nat
type
type
type
type
@hz, โขi โ ฯ @z
, ฯ @hโข, zi โ ฯ @z
โ flip
type
tcxt
hฮ, ฮฃi @env (x, z) โ ฮ(x)@z
tcxt
ยท@ยท : tcxt ร cloc โ btype
type
tcxt
hฮ, ฮฃi @store (ฮฑ, z) โ ฮฃ(ฮฑ)@z
trxt
trxt
type
hฯ , ฮ, ฮฃi @ret (z) โ ฯ @z
ยท@ยท : โR. trxt ร rloc โ btype
trxt
type
hฯ , ฮ, ฮฃi @env (x, z) โ ฮ(x)@z
trxt
type
hฯ , ฮ, ฮฃi @store (ฮฑ, z) โ ฮฃ(ฮฑ)@z
Fig. 18. Locations
A Language for Probabilistically Oblivious Computation
1:41
ฮนฬ R :: ฮฒ # ฮนฬ R :: ฮฒ
Flip
bฬ1 โฅ
โฅ bฬ2
ฮฆ
bฬ1 :: flip # bฬ2 :: flip
ฮ ; ฮฃ โข P(b
ฮณ,b
ฯ)
Other
ฮฒ 1 , flip โจ ฮฒ 2 , flip
ฮฆ
ฮนห1 :: ฮฒ 1 # ฮนห2 :: ฮฒ 2
ฮฆ
ฮ ; ฮฃ โข P(b
ฮณ,b
ฯ)
ฮฆโ
โฯ 1 , ฯ 2 . hb
ฮณ,b
ฯ i @ฯ 1 :: hฮ, ฮฃi @ฯ 1 # hb
ฮณ,b
ฯ i @ฯ 2 :: hฮ, ฮฃi @ฯ 2
ฯ ; ฮ ; ฮฃ โข P(b
v, b
ฮณ,b
ฯ)
cxt
tcxt
cxt
tcxt
ฮฆโ
โฯ1 , ฯ2 . hb
v, b
ฮณ, b
ฯ i @ฯ1 :: hฯ , ฮ, ฮฃi @ฯ1 # hv, b
ฮณ, b
ฯ i @ฯ2 :: hฯ , ฮ, ฮฃi @ฯ2
trxt
rxt
ฮฆ
ฮฆ
ฯ ; ฮ ; ฮฃ โข P(b
v, b
ฮณ,b
ฯ)
rxt
ฮฆ
trxt
ฮฆ
ฮฆ
Fig. 19. Partitioning
S (หฮน :: ฮฒ)
h
i
stable bฬ ฮฆ
Flip
ฮฆ
S bฬ :: flip
ฮ ; ฮฃ โข S(b
ฮณ,b
ฯ)
ฮ ; ฮฃ โข S(b
v, b
ฮณ, b
ฯ)
ฮฒ , flip
Other
S (หฮน :: ฮฒ)
cxt
tcxt
ฮฆ โ โฯ. S hb
ฮณ,b
ฯ i @ฯ :: hฮ, ฮฃi @ฯ
ฮฆ
ฮ ; ฮฃ โข S(b
ฮณ,b
ฯ)
ฮฆ
ฮฆ
ฮ ; ฮฃ โข S(b
v, b
ฮณ,b
ฯ)
cxt
tcxt
ฮฆ โ โฯ . S hb
v, b
ฮณ, b
ฯ i @ฯ :: hฯ , ฮ, ฮฃi @ฯ
Fig. 20. Stability
ฮฆ
ฮฆ
ฮฆ
1:42
David Darais, Chang Liu, Ian Sweet, and Michael Hicks
l
โข
ฮน
โข
v
โข
ฮณ
โ
โ
โ
โ
loc F
โข
lit F
โข
VF
โข
env โ
โข
โข
โข
. . . source code locations . . .
bP | nP | โข
โข
โข โข
ฮน | ฮฑ | hv , v i
โข
var โ V
โ
ฯ โ store โ addr โ V
โข
โข
โข
โข
โข
โข
โข
ฯ โ con๏ฌg โ he, ฮณ , ฯ i | HALT (v , ฮณ , ฯ )
โข
โ
โข
โข
t โ trace โ con๏ฌg
lit
โข
โขR
bโข R
V F ฮนฬ
lit
lit
โข
obs(ฮน P ) โ ฮน
obs : lit ร label โ lit
obs : V โ V
D R RE
โข
โข
b
ฮฑฬ R
v
v ,b
โข R
โขR
bโข
b
c
ฮณ โ env
โ var โ V
โข R
โขR
bโข
d
b
โ addr โ V โ
ฯ โ store
โขR
b
v โ
obs(ฮน S ) โ โข
lit
obs(ฮน โ ) โ obs(ฮน โ )
env
obs(hv 1 , v 2 i) โ hobs(v 1 ), obs(v 2 )i
obs(ฮฑ) โ ฮฑ
env
โข
obs : env โ env
store
obs(ฮณ )(ฮฝ ) โ obs(ฮณ (ฮฝ ))
store
โข
obs : store โ store
obs(ฯ )(ฮฑ)[n] โ obs(ฯ (ฮฑ)[n])
D env
E
env
obs(he, ฮณ , ฯ i) โ e, obs(ฮณ ), obs(ฯ )
con๏ฌg
V
env
env
obs(HALT (v, ฮณ , ฯ )) โ HALT obs(v), obs(ฮณ ), obs(ฯ )
con๏ฌg
con๏ฌg
โข
obs : con๏ฌg โ con๏ฌg
trace
โข
obs : con๏ฌgโ โ con๏ฌg
โ
bโข R
c : โR. V
bR โ V
obs
c (ฮฑฬ ) โ ฮฑฬ
obs
โข R
c
c : โR. env
obs
c R โ env
env
โข R
d
c : โR. store
d R โ store
obs
store
con๏ฌg
trace
con๏ฌg
obs(ฯ 1 . . . ฯ N ) โ obs(ฯ 1 ) . . . obs(ฯ N )
๏ฃฑ
๏ฃด
๏ฃด
๏ฃฒฮน if ฮนหโ bยฎ = ฮน P
ยฎ
c (ฮนฬ โ ) โ ฮปb.
obs
๏ฃด
๏ฃด โข if ฮนหโ bยฎ = ฮน S
๏ฃณ
E
D
E
D
โข
โข
โข
โข
c b
c b
c b
obs
v2
v 1, b
v 2 โ obs
v 1 , obs
env
โข
โข
c b
c b
obs
ฮณ (ฮฝ ) โ obs
ฮณ (ฮฝ )
store
โข
โข
c b
c b
obs
ฯ (ฮฑ)n โ obs
ฯ (ฮฑ)n
Fig. 21. Adversary Observations
A Language for Probabilistically Oblivious Computation
1:43
B THEOREMS
Theorem B.1 (Type Safety).
If
ฮ ; ฮฃ โข a : ฯ ; ฮโฒ
then
ฮ ; ฮฃโขb
ฮณ ฮฃโขb
ฯ
โฮฃ โฒ vb b
ฮณโฒ b
ฯ โฒ.
EJaK (b
ฮณ, b
ฯ ) = hb
v, b
ฮณ โฒ, b
ฯ โฒi
โฒ
โฒ
โฒ
ฮฃ โข vb : ฯ ฮ ; ฮฃ โข ฮณb ฮฃ โฒ โข b
ฯโฒ
โฒ
De๏ฌnition B.2 (Well Typed Evaluation).
ฮ ; ฮฃ โข a : ฯ ; ฮ โฒ ; ฮฃ โฒ ;; hb
ฮณ,b
ฯ i โ hb
v, b
ฮณ โฒ, b
ฯ โฒi
ฮ ; ฮฃ โข a : ฯ ; ฮโฒ
ฮ ; ฮฃโขb
ฮณ
hb
v, b
ฮณ ,ฯ
b i โ EJaK (b
ฮณ,b
ฯ)
ฮ โฒ ; ฮฃ โฒ โข vb : ฯ
โฒ
โฒ
ฮฃโขb
ฯ
ฮ โฒ ; ฮฃ โฒ โข ฮณbโฒ
ฮ ; ฮฃ โข a : ฯ ; ฮ โฒ ; ฮฃ โฒ ;; hb
ฮณ,b
ฯ i โ hb
v, b
ฮณ โฒ, b
ฯ โฒi
ฮฃโฒ โข b
ฯโฒ
Theorem B.3 (Dependency Soundness).
If
ฮ ; ฮฃ โข a : ฯ ; ฮ โฒ ; ฮฃ โฒ ;; hb
ฮณ,b
ฯ i โ hb
v, b
ฮณ โฒ, b
ฯ โฒi
ฮณb โ ฯ
c (b
obs
ฮณ) โ ฮฆ
vb โ w
env
c (b
b โฯ
ฯ
obs
ฯ) โ ฮฆ
DJaK (b
ฮณ, b
ฯ , ฯ,ฯ , ฮฆ) = hw,ฯ โฒ , ฮฆโฒi
store
then
bโฒ โ ฯ โฒ
ฯ
c (b
obs
v ) โ ฮฆโฒ
c (b
obs
ฯ โฒ ) โ ฮฆโฒ
store
Theorem B.4 (Region Soundness).
If
ฮ ; ฮฃ โข a : ฯ ; ฮ โฒ ; ฮฃ โฒ ;; hb
ฮณ,b
ฯ i โ hb
v, b
ฮณ โฒ, b
ฯ โฒi
ฮพ |= ฮ โ ฯ
ฮณ โ ฮฆฯ
b
ฮพ |= ฮฃ โ ฯ
ฯ โ ฮฆฯ
b
DJaK (b
ฮณ,b
ฯ , ฯ,ฯ , ฮฆ) = hw,ฯ โฒ , ฮฆโฒ i
RJaK (ฮพ ) = ฮพ โฒ
then
ฮพ โฒ |= ฯ โ w
|= ฮฃ โฒ โ ฯ โฒ
ฮพโฒ
vb โ ฮฆโฒ w
b
ฯ โฒ โ ฮฆโฒ ฯ โฒ
Theorem B.5 (Well-partitioning).
If
ฮ ; ฮฃ โข a : ฯ ; ฮ โฒ ; ฮฃ โฒ ;; hb
ฮณ,b
ฯ i โ hb
v, b
ฮณ โฒ, b
ฯ โฒi
ฮ ; ฮฃ โข P (b
ฮณ, b
ฯ) ฮฆ
DJaK (b
ฮณ,b
ฯ , ฯ,ฯ , ฮฆ) = hw,ฯ โฒ , ฮฆโฒ i
then ฯ ; ฮ โฒ ; ฮฃ โฒ โข P (b
v, b
ฮณ โฒ, b
ฯ โฒ)
ฮฆโฒ
ฮ ; ฮฃ โข a : ฯ ; ฮ โฒ ; ฮฃ โฒ ;; hb
ฮณ, b
ฯ i โ hb
v, b
ฮณ โฒ, b
ฯ โฒi
ฮ ; ฮฃ โข S (b
ฮณ, b
ฯ) ฮฆ
DJaK (b
ฮณ,b
ฯ , ฯ,ฯ , ฮฆ) = hw,ฯ โฒ , ฮฆโฒ i
then ฯ ; ฮ โฒ ; ฮฃ โฒ โข S (b
v, b
ฮณ โฒ, b
ฯ โฒ)
ฮฆโฒ
Theorem B.6 (Stability).
If
1:44
David Darais, Chang Liu, Ian Sweet, and Michael Hicks
Theorem B.7 (Strong Memory Trace Obliviousness (SMTO)).
ฮ โข e : ฯ ; ฮโฒ
If
ฮ ; ฮฃ โข ฮณbi
ฮฃโขb
ฯi
ฯi โ
b
c (b
obs
ฮณ1) โ
env
ฮณbi โ
c (b
obs
ฮณi ) โ ฮฆ
env
ฮฆฯ
ฮฆฯ
c (b
obs
ฮณ2)
P (b
ฮณi , b
ฯi )
env
ฮฆ
c (b
obs
ฯi ) โ ฮฆ
c (b
obs
ฯ1 ) โ
S (b
ฮณi , b
ฯi )
ฮพ |= ฮฃ โ ฯ
then
f (T JeK (b
obs
ฮณ2, b
ฯ2 ))
trace
c (b
obs
ฯ2 )
store
store
ฮฆ
f (T JeK (b
obs
ฮณ1, b
ฯ1 ))
โ ฮฆ
trace
ฮพ |= ฮ โ ฯ
store
Corollary B.8 (Memory Trace Obliviousness (MTO)).
If
ฮ โข e : ฯ ; ฮโฒ
ฮ ; [] โข โฮณi โ
env
env
obs (ฮณ 1 ) = obs (ฮณ 2 )
f (T JeK (โฮณ 1 โ , [])) โ obs
f (T JeK (โฮณ 2 โ , []))
then obs
trace
trace
C LEMMAS REGARDING DISTRIBUTION MODEL
Lemma C.1 (Cond Probability Measure Semantics).
p[cond(bฬ1, bฬ2 , bฬ3 ) = b] = p[bฬ1 = O โง bฬ2 = b] + p[bฬ1 = I โง bฬ3 = b]
Proof.
p[cond(bฬ1 , bฬ2, bฬ3 ) = b]
= p[cond(bฬ1 , bฬ2, bฬ3 ) = b โง bฬ1 = O] + p[cond(bฬ1, bฬ2 , bฬ3 ) = b โง bฬ1 = I]
= p[cond(bฬ1 , bฬ2, bฬ3 ) = b | bฬ1 = O]p[bฬ1 = O] + p[cond(bฬ1 , bฬ2, bฬ3 ) = b | bฬ1 = I]p[bฬ1 = I]
= p[bฬ2 = b | bฬ1 = O]p[bฬ1 = O] + p[bฬ3 = b | bฬ1 = I]p[bฬ1 = I]
= p[bฬ2 = b โง bฬ1 = O] + p[bฬ3 = b โง bฬ1 = I]
= p[bฬ1 = O โง bฬ2 = b] + p[bฬ1 = I โง bฬ3 = b]
A Language for Probabilistically Oblivious Computation
1:45
Lemma C.2 (Cond Stability). Assume bฬ1 โฅ
โฅ bฬ2 , bฬ1 โฅ
โฅ bฬ3 and bฬ2 โ bฬ3 . Then:
cond(bฬ1, bฬ2 , bฬ3 ) โ bฬ2 โ bฬ3
Proof. Given b, the goal is to show p[cond(bฬ1 , bฬ2, bฬ3 ) = b] = p[bฬ2 = b] = p[bฬ3 = b].
p[cond(bฬ1, bฬ2 , bฬ3 ) = b]
= * Cond Probability Measure Semantics (Lemma (C.1)) +
p[bฬ1 = O โง bฬ2 = b] + p[bฬ1 = I โง bฬ3 = b]
= * Conditional independence bฬ1 โฅ
โฅ bฬ2 and bฬ1 โฅ
โฅ bฬ3 +
p[bฬ1 = O]p[bฬ2 = b] + p[bฬ1 = I]p[bฬ3 = b]
= * Distribution equivalence bฬ2 โ bฬ2 +
p[bฬ1 = O]p[bฬ2 = b] + p[bฬ1 = I]p[bฬ2 = b]
= * Common factor +
p[bฬ2 = b](p[bฬ1 = O] + p[bฬ1 = I])
= * Proper Probability Measure (Lemma (C.5)) +
p[bฬ2 = b] = p[bฬ3 = b]
Lemma C.3 (Probabilistic Independence). Assume bฬ1 โ ฮธ 1 , bฬ2 โ ฮธ 2 and ฮธ 1 โฅ
โฅ ฮธ 2 . Then:
bฬ1 โฅ
โฅ bฬ2
Lemma C.4 (Cond Independence). Assume bฬ1 โฮธ 1 , bฬ2 โฮธ 2 , bฬ3 โฮธ 3 , ฮธ 1 โฅ
โฅ ฮธ2, ฮธ1 โฅ
โฅ ฮธ 3 and bฬ2 โ bฬ3 .
Then:
cond(bฬ1, bฬ2, bฬ3 ) โ ฮธ 2 โช ฮธ 3
Our model for probability measures allows for proving the following lemmas.
1:46
David Darais, Chang Liu, Ian Sweet, and Michael Hicks
Lemma C.5 (Proper Probability Measure).
p[bฬ1 = O] + p[bฬ2 = I] = 1
Proof.
p[bฬ1 = O] + p[bฬ2 = I]
c[bฬ1 = O] c[bฬ1 = I]
=
+
2R
2R
โฒ
{b | bฬ1 (b โฒ) = O} + {b โฒ | bฬ1 (b โฒ) = I}
=
2R
โฒ
โฒ
{b | bฬ1 (b ) = O โจ bฬ1 (b โฒ) = I}
=
2R
{b โฒ | b โฒ โ BR }
=
2R
2R
= R =1
2
Lemma C.6 (Joint Probability Symmetry).
p[bฬ1 = b1 โง bฬ2 = b2 ] = p[bฬ2 = b2 โง bฬ1 = b1 ]
Proof is immediate.
Lemma C.7 (Chain Rule).
p[bฬ1 = b1 โง bฬ2 = b2 ] = p[bฬ1 = b1 | bฬ2 = b2 ]p[bฬ2 = b2 ]
Proof.
p[bฬ1 = b1 โง bฬ2 = b2 ]
=
c[bฬ1 = b1 โง bฬ2 = b2 ]
2R
=
c[bฬ1 = b1 โง bฬ2 = b2 ] c[bฬ2 = b2 ]
2R
c[bฬ2 = b2 ]
= p[bฬ1 = b1 | bฬ2 = b2 ]p[bฬ2 = b2 ]
Corollary C.8 (Alt Chain Rule).
p[bฬ1 = b1 โง bฬ2 = b2 ] = p[bฬ2 = b2 | bฬ1 = b1 ]p[bฬ1 = b1 ]
Consequence of Lemma (C.6).
A Language for Probabilistically Oblivious Computation
1:47
Lemma C.9 (Bayesโs Rule).
p[bฬ1 = b1 | bฬ2 = b2 ] =
p[bฬ2 = b2 | bฬ1 = b1 ]p[bฬ1 = b1 ]
p[bฬ2 = b2 ]
Proof.
p[bฬ1 = b1 | bฬ2 = b2 ]
=
=
=
c[bฬ1 = b1 โง bฬ2 = b2 ]
c[bฬ2 = b2 ]
c[bฬ2 = b2 โง bฬ1 = b1 ] c[bฬ1 = b1 ]
2R
c[bฬ1 = b1 ]
c[bฬ2 = b2 ]
2R
p[bฬ2 = b2 | bฬ1 = b1 ]p[bฬ1 = b1 ]
p[bฬ2 = b2 ]
Corollary C.10 (Alt Bayesโs Rule).
p[bฬ1 = b1 | bฬ2 = b2 ] =
Consequence of Lemma (C.7).
p[bฬ1 = b1 โง bฬ2 = b2 ]
p[bฬ2 = b2 ]
1:48
David Darais, Chang Liu, Ian Sweet, and Michael Hicks
Lemma C.11 (Total Probability).
p[bฬ1 = b1 ] =
ร
p[bฬ1 = b1 โง bฬ2 = b2 ]
b 2 โB
Proof.
p[bฬ1 = b1 ]
=
c[bฬ1 = b1 ]
2R
{b โฒ | bฬ1 (b โฒ) = b1 }
=
2R
{b โฒ | bฬ1 (b โฒ) = b1 โง (bฬ2 = O โจ bฬ2 = I)}
=
2R
{b โฒ | bฬ1 (b โฒ) = b1 โง bฬ2 = O โจ bฬ1 (b โฒ) = b1 โง bฬ2 = I}
=
2R
{b โฒ | bฬ1 (b โฒ) = b1 โง bฬ2 (b โฒ) = O} + {b โฒ | bฬ1 (b โฒ) = b1 โง bฬ2 (b โฒ) = O}
=
=
2R
c[bฬ1 = b1 โง bฬ2 = O] c[bฬ1 = b1 โง bฬ2 = I]
+
2R
2R
= p[bฬ1 = b1 โง bฬ2 = O] + p[bฬ1 = b1 โง bฬ2 = I]
ร
b 2 โB
p[bฬ1 = b1 โง bฬ2 = b2 ]
| 6cs.PL
|
arXiv:0809.3187v1 [cs.CE] 18 Sep 2008
A Control Variate Approach for Improving
Efficiency of Ensemble Monte Carlo โ
Tarik Borogovac a,b,โ Francis J. Alexander b Pirooz Vakili c
a Electrical
b CCS-3,
c Division
and Computer Engineering Department, Boston University, 8 Saint
Maryโs St. Boston, MA 02215, USA
Los Alamos National Laboratory, MS-B256, Los Alamos, NM 87545,
USA
of Systems Engineering & Mechanical Engineering Department, Boston
University, 15 Saint Maryโs St. Brookline, MA 02446, USA
Abstract
In this paper we present a new approach to control variates for improving computational efficiency of Ensemble Monte Carlo. We present the approach using simulation of paths of a time-dependent nonlinear stochastic equation. The core idea
is to extract information at one or more nominal model parameters and use this
information to gain estimation efficiency at neighboring parameters. This idea is the
basis of a general strategy, called DataBase Monte Carlo (DBMC), for improving
efficiency of Monte Carlo. In this paper we describe how this strategy can be implemented using the variance reduction technique of Control Variates (CV). We show
that, once an initial setup cost for extracting information is incurred, this approach
can lead to significant gains in computational efficiency. The initial setup cost is
justified in projects that require a large number of estimations or in those that are
to be performed under real-time constraints.
Key words: Monte Carlo, Variance Reduction, Control Variates
PACS: S05.10.Ln, 02.70.Uu, 02.70.Tt
โ Portions of this work, LA-UR-08-05399, were carried out at Los Alamos National
Laboratory under the auspices of the US National Nuclear Security Administration of the US Department of Energy. Tarik Borogovac and Pirooz Vakili were
supported in part by the National Science Foundation grants CMMI-0620965 and
DGE-0221680.
โ Corresponding author
Email address: [email protected] (Tarik Borogovac).
Preprint submitted to Elsevier
13 January 2018
1
Introduction
The purpose of this paper is to present a novel approach for efficient estimation
via the Monte Carlo (MC) method. The approach is very broadly applicable
but here, to present the main ideas, we narrow the focus to Ensemble Monte
Carlo where estimation is based on stochastically independent trajectories of a
system. To illustrate, we use simulation of time-dependent nonlinear processes
for which Monte Carlo is a particularly general and powerful numerical method
compared to available alternatives. Time-dependent nonlinear processes are
very general models used, among others, in statistical mechanics [1], data
assimilation in climate, weather and ocean modeling [2], financial modeling
[3], and quantitative biology [4]. Hence developing efficient MC methods may
significantly impact a wide range of applications.
A known weakness of MC is its slow rate of convergence. Assume Y is a
random quantity defined on paths of a process and let ฯY denote its standard
deviation. The
โ convergence rate of MC for estimating the expected value of
Y is โ ฯY / n where n is the number of independent paths of the process.
In general the canonical nโ1/2 rate of convergence cannot be improved upon,
hence, since the inception of the MC method, a number of variance reduction
(VR) techniques have been devised to reduce ฯY (see, [5] for an early account
and [3] and [6] for more recent discussions).
Most VR techniques lead to estimators of the form
w1 Y1 + ยท ยท ยท + wn Yn ,
i.e., a weighted average of the samples. These techniques prescribe (i) a recipe
for selecting samples Y1 , ยท ยท ยท , Yn and (ii) a set of weights w1 , ยท ยท ยท , wn . To arrive at
these prescriptions, one must rely on the existence of specific problem features
and the ability of the user of the method to discover and effectively exploit
such features. This lack of generality has significantly limited the applicability
of VR techniques.
The point of departure of a new strategy, called DataBase Monte Carlo (DBMC),
is to address this shortcoming and to devise generic VR techniques that can
be generically applied [7]. All VR techniques bring additional information to
bear on the estimation problem, however, as mentioned above, this information is problem specific and relies on exploiting special features of the problem at hand. By contrast, as will be clarified in this paper, DBMC adds a
generic computational exploration phase to the estimation problem that relies on gathering information at one (or more) nominal model parameter(s)
to achieve estimation efficiency at neighboring parameters. The advantage of
this approach is its generality and wide applicability: it is quite easy to im2
plement and it can wrap existing ensemble MC codes. On the other hand,
the computational exploration phase of the DBMC approach may require extensive simulations and can be computationally costly. Therefore, the initial
setup cost needs justification. The setup cost may be justified in projects that
involve estimations at many model parameters and/or in projects where there
is a real-time computational constraint. In the first type of project, the setup
cost may lead to efficiency gain for each subsequent estimation, and for a large
enough number of subsequent estimations it can be easily justified. In projects
with a real-time constraint the setup cost is an off-line โpassiveโ cost that can
lead to estimates of significantly higher quality (lower statistical error); the
higher quality in many such projects more than justifies the setup cost.
In this paper we limit ourselves to presenting the implementation of the VR
technique of Control Variates (CV) in the DBMC setting (see [7] for discussion of other VR techniques). The CV technique, which compared to the VR
technique of Importance Sampling is less utilized in computational physics,
requires identifying a number of random variables called control variates, say
X1 , ยท ยท ยท , Xk , that are correlated with Y and have known means. The correlation
with Y implies that Xi โs carry information about Y . The CV technique is a
way of utilizing the information included in the controls (their known means)
to help with the estimation of the mean of variable Y . In the DBMC setting we
assume that Y = Y (ฮธ) depends on a model parameter ฮธ and use Xi = Y (ฮธi )
where ฮธi โs are in a neighborhood of ฮธ (i = 1, ยท ยท ยท , k). In a departure from the
classical CV technique, we use โhigh qualityโ estimates of E[Xi ] rather than
precise values of E[Xi ] to arrive at the controlled estimator of E[Y ]. As we
argue in this paper (and elsewhere [8]) this departure allows for substantially
broader choices of control variates and makes the CV technique significantly
more flexible and effective.
The DBMC method shares a similar intent as the well-known histogram
reweighing method [9] from the Markov chain Monte Carlo literature (e.g.
[1]), but with a very different setting and implementation, and with broader
applicability. For example, it does not rely on having a Boltzmann distribution
or exp(โH/kT ) structure. Given its generality, it has potential applications,
among others, in ensemble weather prediction, hydrological source location,
climate and ocean, optimal control, and stochastic simulations of biological
systems.
The remainder of the paper is organized as follows. In section 2 we discuss
preliminaries, including the details of the example numerical study โ the timedependent Ginzburg-Landau (TDGL) equation โ as well as the method of
control variates. Estimation of mean outcomes of the TDGL equation over a
range of temperatures is of interest, especially considering the large difference
in behavior below and above the coexistence curve. In section 3 we describe the
DBMC methodology and motivation in a general context. Section 4 discusses
3
the implementation and results of DBMC as applied to estimation of quantities
generated by the TDGL equation, and the results of that numerical study. We
conclude in section 5.
2
Preliminaries
We present aspects of our approach and numerical results in the context of
the time-dependent Ginzburg Landau (TDGL) model. It is worth noting that
this model is chosen for illustrative purposes only and we do not make use of
any of its specific features.
2.1 Time-Dependent Ginzburg Landau
We use a canonical equation of phase-ordering kinetics [10,11] the stochastic
TDGL equation in two spatial dimensions. This is written as
โฯ(x, t)
= Dโฯ(x, t) โ V โฒ (ฯ(x, t)) + ฮท(x, t)
โt
(1)
where ฯ(x, t) represents a local order parameter, e.g. a magnetization at point
x = (x1 , x2 )โค and time t (โค denotes transpose). The noise has mean zero
and covariance hฮท(x, t)ฮท(xโฒ, tโฒ )i = 2ฮด(x โ xโฒ )ฮด(t โ tโฒ ). We choose a double-well
potential V (ฯ) = โ 2ฮธ ฯ2 + ฯ4 ฯ4 . As in [11] ฯ is a constant, and ฮธ is a function
of temperature such that a high ฮธ corresponds to a low temperature.
We use a discrete form of (1) using a forward Euler-Maruyama stochastic
integrator and a 5-point stencil for the Laplacian (denoted โL ) for simulation:
ฯ(x, t + ฮดt) = ฯ(x, t) + DฮดtโL ฯ(x, t) โ ฮดt[โฮธฯ(x, t) + ฯฯ3 (x, t)]
q
+ 2(ฮดt/ฮดx)N(x, t)
with time step ฮดt and lattice spacing ฮดx, and where N(x, t) are independent
and identically distributed standard normal random variables for each spacetime point (x, t). What follows applies to other discretization schemes as well.
2.2 Estimation problem
To cover a broad range of estimation problems, we consider the estimation of
quantities related to a specific space-time point, quantities that are global (en4
tire lattice at a particular time) and quantities that depend on the entire time
evolution of the system. Specifically, we consider the following representative
quantities:
(P1) Point magnetization: ฯ(x, t),
P
(P2) Total magnetization at a specific time t: x ฯ(x, t), and
P P
(P3) Total space-time magnetization: t x ฯ(x, t).
The problem of estimating the expected value of any one of the above quantities can be represented by:
J(ฮธ) = E[Y (ฯ; ฮธ))]
where ฯ is a vector of random numbers representing all the noise/uncertainty
in a single complete path ฯ of the dynamics; ฮธ is the temperature related
parameter; Y (ฯ; ฮธ) is the random sample of a quantity of interest (e.g., the
magnetization from a single sample path), and E[ยท] denotes expectation. Note
that knowing the noise ฯ and parameter ฮธ completely determines the path ฯ
and the sample quantity of interest Y (ฯ; ฮธ).
2.3
The control variate technique
Here we give a brief review of the classical control variate (CV) technique for
variance reduction (see [3] [12]).
Let Y = Y (ฯ; ฮธ), J = E[Y ]. Assume X1 , ยท ยท ยท , Xk are random variables (called
control variates) that are correlated with Y and assume their means E[Xi ]
are known. Let X = (X1 , ยท ยท ยท , Xk )โค , E[X] = (E[X1 ], ยท ยท ยท , E[Xk ])โค , and ฮฒ =
(ฮฒ1 , ยท ยท ยท , ฮฒk )โค . Then Z, defined below, is a controlled estimator of E[Y ]
Z=Y +
k
X
i=1
ฮฒi (Xi โ E[Xi ]) = Y + ฮฒ โค (X โ E[X])
The estimator Z uses information included in samples of the controls (the
degree of their deviation from their known means) to โcorrect/adjustโ the
estimator Y and bring it closer to its unknown mean. This is the key idea of
CV. (Alternatively, Z can be viewed as the fitted value of Y when Y is linearly
regressed on variables X1 , ยท ยท ยท , Xk . In other words, Z includes the part of the
variation in Y that cannot be โexplainedโ by Xi โs.)
Z is an unbiased estimator of E[Y ] for all vectors ฮฒ. The coefficient vector
5
that minimizes the variance of Z is:
ฮฒ o = ฮฃโ1
X ฮฃXY
where ฮฃX is the k ร k covariance matrix of X and ฮฃXY is the k ร 1 vector
of covariances of Y and Xi โs. When ฮฒ o is used, the variance of Z is given by
โ1
2
(1 โ R2 )ฯY2 where R2 = ฮฃโค
XY ฮฃX ฮฃXY /ฯY . Therefore,
V ar(Y )
= (1 โ R2 )โ1
V ar(Z)
(2)
and hence (1 โ R2 )โ1 is precisely the theoretical degree of variance reduction
if the controlled estimator Z = Y + ฮฒ oโค (X โ E[X]) is used to estimate J as
opposed to the crude MC estimator Y , and it is called the Variance Reduction
Ratio (VRR) statistic for control variates. Note that there is no upper limit to
the degree of achievable variance reduction since R2 can potentially be very
close to 1 when the controls are highly correlated with the estimation variable
Y . In other words, the CV technique can potentially be very effective leading
to orders of magnitude of variance reduction.
In practice and in general, ฮฃX and ฮฃXY (i.e. ฮฒ o ) are not known exactly and
need to be estimated from samples of Xi โs and Y . Typically, ฮฒ o is estimated
from the same samples used to construct the controlled estimator Z. While this
practice adds some bias for small sample sizes, and thus makes the effective
decrease in estimator mean squared error not precisely equal to the variance
reduction ratio (1 โ R2 )โ1 , this bias converges to zero faster than the standard
error of Z. Thus, expending computational resources into generating separate
pilot samples for estimating ฮฒ o is not considered to be justifiable. For an
insightful and detailed discussion of the CV technique, see [3].
2.4 Challenges in using the CV technique
The critical task for using the CV technique is in finding effective controls.
Once the controls are selected, the rest of the procedure is fairly routine. An
effective control, say X, needs to satisfy two requirements (to simplify the
discussion we consider a scalar control):
(R1) X needs to be correlated with Y , and
(R2) E[X] needs to be available to the user, i.e., known.
The main barrier to finding effective controls is the second requirement, namely
the requirement of a known mean E[X]. A modification of the CV technique
called Biased Control Variate (BCV) reduces the burden of requirement (R2)
6
by allowing for a good approximation of E[X] when E[X] cannot be evaluated analytically [13]. While BCV lowers the requirement barrier and expands
the range of available choices for effective controls, it nonetheless limits its
potential scope by implicitly assuming an analytic path to arriving at the approximate value. As we describe in the next section, in the DBMC approach
we turn the second requirement into a computational task; in other words, we
use statistical estimation to obtain a good estimate of E[X]. Therefore, barrier
(R2) is completely removed and the range of choices of controls is dramatically
expanded. The relevant question now becomes whether the computational investment in estimating E[X] pays enough dividends to make the investment
worthwhile.
3
DBMC & Control Variate
The starting point of the DBMC approach is the observation that in many
parametric estimation settings, including in the example considered in this
paper, quantities Y (ฮธ) and Y (ฮธโฒ ) are highly correlated when the same random
input ฯ is used to generate them and when ฮธ and ฮธโฒ are close 1 . This suggests
using control variates Xi = Y (ฮธi ), i = 1, ยท ยท ยท , k, when estimating Y (ฮธ) where
ฮธi โs are โcloseโ to ฮธ.
While we have identified potentially effective controls, we do not have sufficient
information about them, i.e., J(ฮธi ) = E[Xi ] is not known and needs to be
evaluated. This brings us to the second feature of the DBMC method that
corresponds to its initial computational information gathering/setup stage.
This stage corresponds to statistical estimation of J(ฮธi ). Details are given
below.
3.1 DBMC + CV algorithm
The DBMC approach consists of a setup stage and an estimation stage.
3.1.1 Setup stage
The DBMC setup phase involves generating a โlargeโ number of input random vectors ฯ and obtaining โhigh qualityโ estimates of J(ฮธi ). Let DB =
1
A similar observation is the basis for the histogram re-weighting methods: โfrom
a simulation at a single state point (characterized in an Ising model by choice of
temperature T and magnetic field H) one does not gain information on properties
at that point only, but also in the neighboring region,โ ([1], page 116)
7
{ฯ1 , ฯ2 , ยท ยท ยท , ฯN } (N โlargeโ) denote a large set of random inputs. This set
represents the database. Given the database, the averages of the controls are
precisely calculated. A schematic of this stage is given in Figure 1.
(1) For j = 1, ยท ยท ยท , N
(a) Generate ฯj according to the distribution of the inputs;
(b) For i = 1, ยท ยท ยท , k
(i) Simulate the path ฯ(ฯj ; ฮธi )
(ii) Evaluate the value of the control Xi (ฯj ) = Y (ฯj ; ฮธi )
(2) For i = 1, ยท ยท ยท , k
(a) Find JDB (ฮธi ), the average of the ith control on the datebase, as
JDB (ฮธi ) =
N
1 X
Y (ฯj ; ฮธi )
N j=1
Fig. 1. DBMC setup stage
3.1.2 Estimation stage
To estimate J(ฮธ), at a ฮธ close to ฮธi โs (i = 1, ยท ยท ยท , k) select a โsmallโ sample
(say of size n โช N) uniformly from the database. For each sample ฯj resimulate the equation using ฯj and ฮธ to obtain Y (ฯj ; ฮธ). For these samples
the values of the controls Xi (ฯj ) are available in the database. Using these
evaluate a controlled estimate of J(ฮธ). A schematic version of these steps is
given in Figure 2.
(1) For
(a)
(b)
(c)
j = 1, ยท ยท ยท , n
Select ฯj uniformly from the database;
Simulate the path ฯ(ฯj ; ฮธ);
Evaluate the estimation variable Y (ฯj ; ฮธ).
(2) Find the controlled estimator of J(ฮธ):
Jbcv (ฮธ) =
n
k
X
1X
[Y (ฯj ; ฮธ) +
ฮฒio (Xi (ฯj ) โ JDB (ฮธi ))]
n j=1
i=1
Fig. 2. DBMC estimation stage
8
(3)
3.2 Implementation choices
There are two general schemes for implementation of our CV approach: (I1)
corresponding to what is described above, requires storing simulation inputs
{ฯj } and outputs {Xi (ฯj )} in a database for later resampling; (I2) does not
utilize resampling, so there is no storage of data beyond recording the calculated control means. Both implementations are feasible, the first is preferable
in most cases; the second may be preferred in some cases. We elaborate below.
Implementation (I1).
โข The database of random inputs, i.e., ฯj โs, are either directly stored or enough
information about them (e.g. input seeds of a pseudo-random number generator) is stored to be able to regenerate ฯj โs precisely.
โข The k paths corresponding to ฮธi , i = 1, ยท ยท ยท , k, i.e., ฯ(ฯj ; ฮธi ) are generally
simulated โin parallelโ as elements of a random vector, ฯi , are progressively
generated.
โข For each random input, say ฯj , the value of the controls, Xi (ฯj ), j =
1, . . . , N, i = 1, . . . , k are stored.
Implementation (I2).
โข Once the setup stage is completed, the only values stored are the โhigh
qualityโ estimates of the means of J(ฮธi )โs, i.e., the k values JDB (ฮธi ), i =
1, ยท ยท ยท , k.
โข At the estimation phase, n random input vectors ฯj , j = 1, . . . , n, are
generated anew; paths at ฮธ and ฮธi , i = 1, ยท ยท ยท , k, are simulated using new
random inputs and for each path Xi (ฯj ) and Y (ฯj ; ฮธ) are calculated; finally,
using these values, the controlled estimator is evaluated.
3.3 Statistical properties & computational efficiency
The promise of the approach is the following: by anchoring estimation via CV
at a few high quality estimates (at ฮธ1 , ยท ยท ยท , ฮธk ), it is possible to obtain high
quality estimates at other locations in the parameter space (at other ฮธ) with
far fewer samples. The actual statistical properties of the resulting estimators,
and the computational efficiency of generating them, reflect choices made in
implementing each given problem. For example, how much computation should
be โinvestedโ in the exploration phase, and which points ฮธi in the parameter
space should be explored are two important questions that need further investigation. Such choices generally involve problem dependent tradeoffs, and we
leave them to future studies.
9
Instead, the analysis that follows is meant to provide a general and qualitative
understanding of the statistical properties, computational efficiency and the
tradeoffs involved. The discussion is as general as possible, but consistent
with the numerical study described in section 4, where such implementation
choices were made utilizing only a basic familiarity with the problem. For
further discussion, see [8].
3.3.1 Statistical properties
We give the analysis for implementation (I1). In other words, assume we are
re-sampling from the database. Analysis of implementation (I2) shows similar
estimator statistical properties.
To simplify the discussion consider a single control, say X1 . Let J(ฮธ) = E[Y ],
2
J(ฮธ1 ) = E[X1 ], ฯY2 = Var(Y ), ฯX
= Var(X1 ). Assume a database of input
1
โ
variables are generated and let Y and X1โ be random variables corresponding
to Y and X1 that are generated by re-sampling (uniformly, with replacement)
2
from the database. Let J โ (ฮธ), ฯY2 โ , J โ (ฮธ1 ), ฯX
โ denote the means and variances
1
โ
โ
of the re-sampled variables Y and X .
Conditioned on the database, the controlled estimator is exactly the classical
CV estimator and all results from classical CV apply. For example, for any
scalar ฮฒ, Z โ = Y โ + ฮฒ(X โ โ J โ (ฮธ1 )) is an unbiased estimator of J โ (ฮธ), J โ (ฮธ1 )
is known, and the optimal ฮฒ o is what is prescribed by classical CV if we take
all random variables as those defined on the database. A measure of variance
reduction due to using a controlled estimator is
V RR =
ฯY2 โ
ฯZ2 โ
(4)
We use the controlled estimator Z โ as an estimator for J(ฮธ). Assume optimal
ฮฒ o is used to define Z โ and assume E[Z โ ] = J โ (ฮธ) 2 . In general J โ (ฮธ) 6= J(ฮธ).
Therefore, Z โ is a biased estimator of J(ฮธ) where the bias is introduced by
sampling from the database, i.e., from Y โ , as opposed to from Y . We have some
probabilistic assessment of this bias and we can reduce it by increasing the
size of the database. Specifically, for this bias we can obtain an approximate
1 โ ฮฑ probability confidence interval:
zฮฑ/2 ฯY
P (|J โ (ฮธ) โ J(ฮธ)| โค โ
)โ1โฮฑ
N
2
i.e. we ignore the low order bias that results from the typical CV procedure of
estimating the optimal ฮฒ o e.g. [3], not to be confused with the resampling bias
discussed in this section
10
where zฮฑ/2 is the 1 โ ฮฑ/2 quantile from the standard normal distribution. In
other words, with high probability the bias is of the order of O(N โ1/2 ). We
assume that for large N the bias is sufficiently small to be disregarded and
that we can focus on V RR in (4) as the key measure of computational gain
in using the controlled estimator to estimate J(ฮธ).
3.3.2 Computational efficiency
Generating the above large database, as we pointed out earlier, corresponds
to an initial โsetupโ cost. Let C be the computational cost of generating a
sample of Y (ฮธ). This cost involves generating an ฯ, simulating the path, and
evaluating Y (ฯ, ฮธ). A reasonable assumption for many problems is that this
cost is about the same for all ฮธ and ฯ. Then the set-up cost of generating the
database and obtaining averages of the controls is approximately N รkรC. Let
V RR(ฮธ) denote the variance reduction ratio at ฮธ, i.e., the ratio of the variance
of an uncontrolled sample and that of a controlled sample at ฮธ. Then, the
statistical error of a controlled estimator based on n samples is approximately
the same as that of n ร V RR(ฮธ) samples of an uncontrolled estimator. Thus,
the ratios of the computational costs of the two estimators (to arrive at the
same statistical accuracy) is (nรV RR(ฮธ)รC)/(nรC) = V RR(ฮธ). Therefore,
V RR(ยท) can serve as a measure of benefit of the DBMC approach.
The setup cost of the DBMC approach can be justified in two types of applications. The first type are those applications that require solving many
instances of the estimation problem, at many ฮธโs. If the total number of instances is sufficiently large, and some variance reduction is achieved on the
average on those instances, then the large fixed set-up cost can be dwarfed by
the total computational savings from the many estimations. The second type
are real-time applications where the setup cost can be viewed as an off-line
cost enabling significant efficiency gains in the critical task of real-time estimation. Typically, the โcostโ of delay in such real-time estimation is higher
and not merely computational, justifying even a much larger computational
effort off-line.
4
Numerical results
The numerical results in this section are intended to give a qualitative illustration of the efficiency gains that can be achieved using the DBMC approach.
Specifically, we estimate the variance reduction that can be achieved over
regular (crude) sampling, when estimating the three quantities of interest (a
point magnetization, total magnetization at a specific time t and the total
time-space magnetization) at a range of the parameter ฮธ. Our choices of the
11
size of the database, number of samples used for estimation, range of parameter values, and the controls are simply for illustration purposes. However, we
expect that the numerical results are, qualitatively, quite representative.
We simulate the TDGL dynamics on a 40 ร 40 lattice (lattice spacing ฮดxk = 1,
k = 1, 2) with fixed ฯ = 1. On each path, we evolve the system for a total
of 5000 time steps (ฮดt = 0.01) which is sufficient for the system to exhibit
behavior that is specific to its temperature region. The critical point for this
system is ฮธc = 1.265 [11], and our parameter range of interest (1.0 to 1.5)
extends to both sides of that critical point.
To build a database, we simulate N = 214 = 16384 paths and evaluate point
magnetization, total magnetization at a specific time, and total space-time
magnetization at two nominal values of ฮธ, 1.2 and 1.35.
For each quantity of interest, we consider three control variate estimators. The
first two estimators, CV1.2 and CV1.35, use single controls corresponding to
ฮธ = 1.2 and ฮธ = 1.35, respectively. We chose to anchor our estimators at
those two nominal values for ฮธ because they are located on opposite sides of
the phase transition line ฮธc . The third estimator, CV2C, uses both controls
simultaneously.
We use n = 28 = 256 samples for crude and CV estimators. To estimate the
variance of these estimators, following the micro-macro simulation approach
(see, e.g., [14]), we use 40 independent macro simulations consisting of 256 independent micro simulations. We obtain variance estimates from each macro
simulation and average the resulting 40 values to obtain an overall variance
estimate. We report the ratios of the variance estimates (crude/controlled, as
in (4)) as V RR. A sampling of VRR results for the total space-time magnetization (problem P3) is given in Table 1 and the corresponding graph is given
in Figure 3. The graph for point magnetization (problem P1) are given in Fig.
4, and the results for the total magnetization at a time t (problem P2) are
quite similar and are excluded.
Table 1
Variance reduction
ratios of the estimators applied to space-time integral of the
P P
magnetization, x t ฯ(x, t), at several values of ฮธ.
Estimator\ฮธ
1.150
1.175
1.225
1.250
1.265
1.300
1.325
1.375
1.400
CV1.2
63
236
219
55
33
15
10
6
5
CV1.35
5
6
11
16
21
59
231
245
67
CV2C
170
709
947
332
259
300
761
513
129
Based on these results, we draw the following conclusions:
โข Controlled estimators produce dramatic variance reduction for parameter
12
Variance Reduction Ratios for the time integral of the magnetization
CV12
CV135
CV2C
2
VRR
10
1
10
1
1.05
1.1
1.15
1.2
1.25
ฮธ
1.3
1.35
1.4
1.45
1.5
Fig. 3. VarianceP
reduction
ratios of the estimators of the space-time integral of the
P
magnetization, x t ฯ(x, t), over a range of values of ฮธ (log scale).
values very close to the nominal parameters and substantial variance reduction at values moderately close to the nominal.
โข For all the estimation problems, adding the second control consistently improves performance, in some cases leading to substantial reduction in variance (compared to single controls). Of course, by incorporating information
from points on both sides of the critical temperature, CV2C is expected to
give better coverage than either of the single control estimators. However,
CV2C does better than either of the single control estimators even in their
own regions, which suggests that each control provides relevant information
to the estimation problem in the opposite region.
โข VRR values for the total space-time magnetization are somewhat larger
than those for the point and total magnetization at a specific time t โ we
expect this to be true more generally for path integrals when compared with
values at specific time instances.
13
Variance Reduction Ratios for the point magnetization
CV12
CV135
CV2C
2
VRR
10
1
10
1
1.05
1.1
1.15
1.2
1.25
ฮธ
1.3
1.35
1.4
1.45
1.5
Fig. 4. Variance reduction ratios of the estimators of the point magnetization over
a range of values of ฮธ, in log scale.
5
Conclusions
In this paper we described a new strategy, DataBase Monte Carlo (DBMC),
for improving computational efficiency of Ensemble Monte Carlo. For a specific
time-dependent nonlinear dynamics we showed that the approach can lead to
significant efficiency gains for a range of estimation problems. Our selection
of the controls has been ad-hoc and for illustration purposes. Further work
is required to better understand the options available and the computational
tradeoffs involved. To this end, our current research is focused on (i) derivation
of more specific guidelines for the selection of effective control variates, (ii)
implementation of the DBMC strategy in conjunction with other variance
reduction techniques, for example, stratification and importance sampling,
and (iii) application of the method in some specific domains, for example,
estimation problems in geophysical fluids and biochemical systems.
14
References
[1] K. K. Binder, D. Heermann, Monte Carlo Simulation in Statistical Physics: An
Introduction, Springer, 2002.
[2] G. Evensen, Data Assimilation, The Ensemble Kalman Filter, Springer, 2006.
[3] P. Glasserman, Monte Carlo Methods in Financial Engineering, Springer-Verlag
New York, Inc, 2004.
[4] D. J. Wilkinson, Stochastic Modelling for Systems Biology, CRC Press, 2006.
[5] J. M. Hammersley, D. C. Handscomb, Monte Carlo Methods, John Wiley, 1964.
[6] S. Asmussen, P. W. Glynn, Stochastic Simulation: Algorithms and Analysis,
Springer, 2007.
[7] P. Vakili, G. Zhao, T. Borogovac, Database monte carlo: A new strategy for
efficient simulation, Tech. rep., Boston University College of Engineering (2008).
[8] T. Borogovac, P. Vakili, Database monte carlo approach to effective control
variates, Tech. rep., Boston University College of Engineering (2008).
[9] A. M. Ferrenberg, R. H. Swendsen, New monte carlo technique for studying
phase transitions, Phys. Rev. Lett. 61 (23) (1988) 2635โ2638.
[10] N. Gulbahce, F. J. Alexander, G. Johnson, Statistical mechanics of histories: A
cluster monte carlo algorithm, Phys. Rev. E 73 (2006) 026701.
[11] A. L. Ferreira, R. Toral, Hybrid monte carlo method for conserved-orderparameter systems, Phys. Rev. E 47 (6) (1993) R3848โR3851.
[12] C. P. Robert, G. Casella, Monte Carlo Statistical Methods, Springer Science &
Business Media Inc., 2004.
[13] B. Schmeiser, M. R. Taaffe, J. Wang, Biased control-variate estimation, IIE
Transactions 33 (2001) 219โ228.
[14] B. Schmeiser, Chapter 7: Simulation experiments, in: D. P. Heyman, M. J. Sobel
(Eds.), Handbooks in OR and MS 2: Stochastic Models, Elsevier B. V., 1990,
Ch. 7, pp. 295โ330.
15
| 5cs.CE
|
Threshold Selection for Multivariate Heavy-Tailed Data
Phyllis Wan and Richard A. Davis
arXiv:1707.00464v2 [math.ST] 26 Mar 2018
Department of Statistics
Columbia University
1255 Amsterdam Avenue, MC 4690
New York, NY 10027
e-mail: [email protected]; [email protected]
Abstract: Regular variation is often used as the starting point for modeling multivariate heavy-tailed
data. A random vector is regularly varying if and only if its radial part R is regularly varying and
is asymptotically independent of the angular part ฮ as R goes to infinity. The conditional limiting
distribution of ฮ given R is large characterizes the tail dependence of the random vector and hence its
estimation is the primary goal of applications. A typical strategy is to look at the angular components
of the data for which the radial parts exceed some threshold. While a large class of methods has been
proposed to model the angular distribution from these exceedances, the choice of threshold has been
scarcely discussed in the literature. In this paper, we describe a procedure for choosing the threshold
by formally testing the independence of R and ฮ using a measure of dependence called distance
covariance. We generalize the limit theorem for distance covariance to our unique setting and propose
an algorithm which selects the threshold for R. This algorithm incorporates a subsampling scheme
that is also applicable to weakly dependent data. Moreover, it avoids the heavy computation in the
calculation of the distance covariance, a typical limitation for this measure. The performance of our
method is illustrated on both simulated and real data.
Keywords and phrases: distance covariance, heavy-tailed data, multivariate regular variation,
threshold selection.
1. Introduction
For multivariate heavy-tailed data, the principal objective is often to study dependence in the โtailโ of the
distribution. To achieve this goal, the assumption of multivariate regular variation is typically used as a
starting point. A random vector X โ Rd is said to be multivariate regularly varying if the polar coordinates
(R, ฮ) = (kXk, X/kXk), where k ยท k is some norm, satisfy the conditions
(a) R is univariate regularly varying, i.e., P(R > r) = L(r)rโฮฑ , where L(ยท) is a slowly varying function at
infinity;
(b) P(ฮ โ ยท|R > r) converges weakly to a measure S(ยท) as r โ โ.
The ฮฑ is referred to as the index of the regular variation, while the S is called the angular distribution
and characterizes the limiting tail dependence. There are other equivalent definitions of regular variation
(Resnick, 2002), but this one is the most convenient for our purposes.
Given observations {Xi }ni=1 and their corresponding polar coordinates {(Ri , ฮi )}ni=1 , a straightforward
procedure for estimating S is to look at angular components of the data for which the radii are greater than
a large threshold r0 , that is, ฮi for which Ri > r0 . In most studies, one takes r0 to be a large empirical
quantile of R. While there has been extensive research on choosing a threshold for which the distribution of
R is regularly varying (i.e., limit condition (a)), little research has been devoted to ensuring the threshold
is large enough for the independence of ฮ and R to be reasonable (i.e., limit condition (b)). To this end,
de Haan and de Ronde (1998) fit a parametric extreme value distribution model to each marginal and
examined the parameter stability plot of each coordinate. The Staฬricaฬ plot (Staฬricaฬ, 1999) looked at the
joint tail empirical measure, but was, in some way, equivalent to only examining the extremal behavior of
R. Resnick (2007) suggested an automatic threshold selection from the Staฬricaฬ plot but observed that the
thresholds were sometimes systematically underestimated. In their study of the threshold based inference
for parametric max-stable processes, Jeon and Smith (2014) suggested choosing the threshold by minimizing
the MSE of the estimated parameters.
In this paper, we propose an algorithm which selects the threshold for modeling S. Our motivation is the
implied property that R and ฮ given R > r become independent as r โ โ. Given a sequence of candidate
1
imsart-generic ver. 2014/10/16 file: thres_arxiv.tex date: March 28, 2018
2
Wan and Davis
threshold levels, we test the degree of dependence between R and ฮ for the truncated data above each level.
The dependence measure we use is the distance covariance introduced by Szeฬkely et al. (2007). This measure
has the ability to account for various types of dependence and to be applicable to data in higher dimensions.
The resulting test statistics are given in the form of p-values and are compared across all levels through a
subsampling scheme. This enables us to extract more accurate information from the test statistics while not
overloading the computational burden.
The remainder of this paper is organized as follows. We first provide some theoretical backgrounds on
multivariate regular variation in Section 2. The distance covariance and its theoretical properties are introduced in Section 3. Applying this dependence measure in our conditioning setting, we propose a test
statistic and prove relevant theoretical results in Section 4. Our proposed algorithm for threshold selection
is presented in Section 5, and illustrated on simulated and real examples in Section 6. The paper concludes
with a discussion.
2. Multivariate regular variation and problem set-up
One way to approach multivariate heavy-tailed data is through the notion of multivariate regular variation.
For a detailed review, see, for example, Chapter 6 of Resnick (2007). Let X = (X1 , . . . , Xd ) be a d-dimensional
random variable defined on the cone Rd+ = [0, โ)\{0}. Define the polar coordinate transformation
T (X) = (kXk, X/kXk) =: (R, ฮ),
(2.1)
where k ยท k denotes some norm. Then X is regularly varying if and only if there exists a probability measure
S(ยท) on Sdโ1 , the unit sphere in Rd , and a function b(t) โ โ, such that
v
tP [(R/b(t), ฮ) โ ยท] โ ฮฝฮฑ ร S,
t โ โ,
(2.2)
v
where โ denotes vague convergence, and ฮฝฮฑ is a measure defined on (0, โ] such that
ฮฝฮฑ (x, โ] = xโฮฑ ,
x > 0.
Here b(t) can be chosen as the 1 โ tโ1 -quantile, i.e.,
b(t) = inf{s|P(R โค s) โฅ 1 โ tโ1 }.
The convergence (2.2) implies that
R
w
, ฮ โ ยท R > r โ ฮฝฮฑ ร S,
P
r
r โ โ,
on [1, โ) ร Sdโ1 ,
(2.3)
w
where โ denotes weak convergence. In other words, given that R > r for r large, the conditional distribution
of R/r and ฮ are independent in the limit. In view of (2.3), we restrict the measure ฮฝฮฑ to [1, โ) throughout
the remainder of the paper. The angular measure S characterizes the tail dependence structure of X. If
S is concentrated on {ei , i = 1, . . . d}, where ei = (0, . . . , 0, 1, 0, . . . , 0), then the components of X are
asymptotically independent in the tail, a case known as asymptotic independence. If S has mass lying in
the subspace {(t1 , . . . , td ) โ Sdโ1 |ti > 0, tj > 0, i 6= j}, then an extreme observation in the Xi direction
implicates a positive probability of an extreme observation in the Xj direction, a case known as asymptotic
dependence. Hence the estimation of S from observations is an important problem, and often the primary
goal, in multivariate heavy-tailed modeling.
The following convergence is implied from (2.3):
w
P(ฮ โ ยท|R > r) โ S(ยท),
r โ โ.
(2.4)
This suggests estimating S using the angular data (ฮi ) whose radial parts satisfy Ri > r0 for r0 large. The
motivation behind our method is to seek r0 such that when R > r0 , R and ฮ are virtually independent.
Given a candidate threshold sequence {rk }, we formally test the independence between (Ri , ฮi ) on the index
set {i|Ri > rk }. The use of Pearsonโs correlation as the dependence measure is unsuitable in this case, for
two reasons. First, correlation is only applicable to univariate random variables, whereas ฮ lies on the sphere
of dimension d โ 1. Second, correlation only describes the linear relationship between two random variables,
thus having zero correlation is not a sufficient condition for independence. Instead, we use a more powerful
dependence measure, the distance covariance, which is introduced in the next section.
Threshold Selection for Multivariate Heavy-Tailed Data
3
3. Distance covariance
In this section, we briefly review the definition and some properties of the distance covariance. More detailed
descriptions and proofs can be found in Szeฬkely et al. (2007) and Davis et al. (2017).
Let X โ Rp and Y โ Rq be two random vectors, then the distance covariance between X and Y is defined
as
Z
2
T (X, Y ; ยต) =
ฯX,Y (s, t) โ ฯX (s) ฯY (t) ยต(ds, dt) , (s, t) โ Rp+q
(3.1)
Rp+q
where ฯX,Y (s, t), ฯX (s), ฯY (t) denote the joint and marginal characteristic functions of (X, Y ) and ยต is a
suitable measure on Rp+q . In order to ensure that T (X, Y ; ยต) is well-defined, one of the following conditions
is assumed to be satisfied throughout the paper (Davis et al., 2017):
1. ยต is a finite measure on Rp+q ;
2. ยต is an infinite measure on Rp+q such that
Z
(1 โง |s|ฮฑ )(1 โง |t|ฮฑ )ยต(ds, dt) < โ
Rp+q
and
E[|XY |ฮฑ + |X|ฮฑ + |Y |ฮฑ ] < โ
for some ฮฑ โ (0, 2].
One advantage of distance covariance over, say, Pearsonโs covariance, is that, if ยต has a positive Lebesgue
density on Rp+q , then X and Y are independent if and only if T (X, Y ; ยต) = 0. Another attractive property
of this dependence measure is that it readily applies to random vectors of different dimensions.
To estimate T (X, Y ; ยต) from observations (X1 , Y1 ), . . . , (Xn , Yn ), define the empirical distance covariance
Z
2
ฯฬX,Y (s, t) โ ฯฬX (s) ฯฬY (t) ยต(ds, dt) ,
Tn (X, Y ; ยต) =
Rp+q
1 Pn
e i hs,Xj i+i ht,Yj i and ฯฬX (s) = ฯฬX,Y (s, 0), ฯฬY (t) = ฯฬX,Y (0, t) are the respective
where ฯฬX,Y (s, t) =
n j=1
empirical characteristic functions. If we assume that ยต = ยต1 ร ยต2 and is symmetric about the origin, then
under the conditions where T (X, Y ; ยต) exists, Tn (X, Y ; ยต) also has the computable form
Tn (X, Y ; ยต)
=
n
1 X
ยตฬ1 (Xi โ Xj ) ยตฬ2 (Yi โ Yj )
n2 i,j=1
+
1
n4
n
X
ยตฬ1 (Xi โ Xj )ยตฬ2 (Yk โ Yl ) โ
i,j,k,l=1
2
n3
n
X
ยตฬ1 (Xi โ Xj )ยตฬ2 (Yi โ Yk ),
i,j,k=1
R
where ยตฬ(x) = (1 โ coshs, xi) ยต(ds) (Davis et al., 2017).
The most popular choice of ยต, first mentioned by Feuerverger (1993) and then more extensively studied
by Szeฬkely et al. (2007), is
ยต(ds, dt) = cp,q |s|โฮบโp |t|โฮบโq ds dt .
(3.2)
where cp,q is as defined in Lemma 1 of Szeฬkely et al. (2007). This choice of ยต gives ยตฬ(x)ยตฬ(y) = |x|ฮบ |y|ฮบ .
Moreover, this is the only choice of ยต for which the distance covariance is invariant relative to scale and
orthogonal transformations. Note that in order for the integral (3.1) to exist, it is required that
E[|X|ฮบ |Y |ฮบ + |X|ฮบ + |Y |ฮบ ] < โ.
We will utilize the described weight measure (3.2) with ฮบ = 1 in our simulations and data analyses in Section
6, but applied to the log transformation on R to ensure that the moment condition is satisfied.
As detailed in Davis et al. (2017), if the sequence {(Xi , Yi )} is stationary and ergodic, then
a.s.
Tn (X, Y ; ยต) โ T (X, Y ; ยต).
(3.3)
4
Wan and Davis
Further, if X and Y are independent, then under an ฮฑ-mixing condition,
Z
d
n Tn (X, Y ; ยต) โ
|G(s, t)|2 ยต(s, t)
(3.4)
Rp+q
for some centered Gaussian field G. On the other hand, if X and Y are dependent, then
โ
d
n(Tn (X, Y ; ยต) โ T (X, Y ; ยต)) โ G0ยต
for some non-trivial limit G0ยต , implying that n Tn (X, Y ; ยต) diverges as n โ โ. Naturally one can devise a
test of independence between X and Y using the statistic n Tn (X, Y ; ยต): the null
R hypothesis of independence
is rejected at level ฯ if n Tn (X, YR; ยต) > c, where c is the upper ฯ-quantile of Rp+q |G(s, t)|2 ยต(s, t).
In practice, the distribution Rp+q |G(s, t)|2 ยต(s, t) is intractable and is typically approximated through
bootstrap. Hence the main drawback of using distance covariance is the computation burden it brings for
large sample size: the computation of a single distance covariance statistic requires O(n2 ) operations, while
finding the cut-off values via resampling requires much more additional computation. Our method, however,
overcomes this problem through subsampling the data, as will be described in Section 5.
4. Theoretical results
Let {Xi }ni=1 be iid observations in Rd from a multivariate regularly varying distribution X satisfying (2.1)
and (2.3), and {(Ri , ฮi )}ni=1 be their polar coordinate transformations. Given a threshold rn , we measure the
dependence between R/rn and ฮ conditional on R > rn by the empirical distance covariance of (R/rn , ฮ)
on the set {R > rn }:
Z
|Cn (s, t)|2 ยต(ds, dt),
Tn :=
(4.1)
Rd+1
with
Cn (s, t) := ฯฬ R ,ฮ|rn (s, t) โ ฯฬ R |rn (s)ฯฬฮ|rn (t),
rn
rn
where ฯฬ R ,ฮ|rn is the conditional empirical characteristic function of (R/rn , ฮ),
rn
n
X
T
1
eisRj /rn +it ฮj 1{Rj >rn } , s โ R, t = (t1 , . . . , td )T โ Rd ,
j=1 1{Rj >rn } j=1
ฯฬ R ,ฮ|rn (s, t) = Pn
rn
and ฯฬ R |rn , ฯฬฮ|rn are the corresponding empirical conditional marginal characteristic functions,
rn
ฯฬ R |rn (s) = ฯฬ R ,ฮ|rn (s, 0),
rn
rn
ฯฬฮ|rn (t) = ฯฬ R ,ฮ|rn (0, t).
rn
In this section, we establish the limiting results (3.3) and (3.4) adapted to the conditional distance covariance. For ease of notation, let
n
pn := P(R > rn ) ,
pฬn :=
1X
1{Rj >rn }
n j=1
be the theoretical and empirical probability of exceedance, and let
i
h
isR/rn +itT ฮ
h
i
E
e
1
R>r
n
T
ฯ R ,ฮ|rn (s, t) := E eisR/rn +it ฮ |R > rn =
,
rn
pn
and
ฯ R |rn (s) := ฯ R ,ฮ|rn (s, 0),
rn
rn
ฯฮ|rn (t) := ฯ R ,ฮ|rn (0, t),
rn
be the theoretical conditional joint and marginal characteristic functions.
Threshold Selection for Multivariate Heavy-Tailed Data
5
Recall from (2.3) that as n โ โ, R/rn and ฮ become asymptotically independent and converge to ฮฝฮฑ
and S respectively. Denote the characteristic functions of the corresponding limit distributions by
Z โ
ฯR (s) :=
exp(isr)ฮฑrโฮฑโ1 dr = lim ฯ R |rn (s),
(4.2)
nโโ rn
1
Z
ฯฮ (t) :=
exp(itฮธ)S(dฮธ) = lim ฯฮ|rn (t).
(4.3)
nโโ
Sdโ1
We have the following results.
Theorem 4.1.
1. Let X1 , . . . , Xn be iid observations generated from X, where X is multivariate regularly
varying with index ฮฑ > 1. Let Tn be the conditional empirical distance covariance between the angular
and radial component defined in (4.1). Further assume that npn โ โ and the weight measure ยต satisfies
Z
(1 โง |s|ฮฒ )(1 โง |t|2 )ยต(ds, dt) < โ,
(4.4)
Rd+1
for some 1 < ฮฒ < 2 โง ฮฑ. Then
p
Tn โ 0.
2. In addition, if {rn } satisfies
Z
npn
Rd+1
|ฯ R ,ฮ|rn (s, t) โ ฯ R |rn (s)ฯฮ|rn (t)|2 ยต(ds, dt) โ 0,
rn
rn
then
d
Z
npฬn Tn โ
|Q(s, t)|2 ยต(ds, dt),
(4.5)
(4.6)
Rd+1
where Q is a centered Gaussian process with covariance function
cov(Q(s, t), Q(s0 , t0 )) = (ฯR (s โ s0 ) โ ฯR (s)ฯR (โs0 ))(ฯฮ (t โ t0 ) โ ฯฮ (t)ฯฮ (โt0 ))
(4.7)
with ฯR , ฯฮ as defined in (4.2) and (4.3).
Remark 4.2. In the case where X is regularly varying with index ฮฑ โค 1, similar results hold if we replace
R/rn with log(R/rn ) for which all moments exist.
The proof of the theorem is delayed to Appendix A. In the following remark, we discuss certain sufficient
conditions for assumption (4.5).
Remark 4.3. Assume that ยต = ยต1 รยต2 , where ยต1 , ยต2 are measures on R and Rd , respectively, and symmetric
about the origin. From Section 2.2 of Davis et al. (2017), condition (4.5) is equivalent to
R
R0
npn E[ยตฬ1 ( โ
) ยตฬ2 (ฮ โ ฮ0 )|R, R0 > rn ]
rn
rn
R
R0
+E[ยตฬ1 ( โ
)|R, R0 > rn ] E[ยตฬ2 (ฮ โ ฮ0 )|R, R0 > rn ]
rn
rn
R
R0
โ2 E[ยตฬ1 ( โ
)ยตฬ2 (ฮ โ ฮ00 )|R, R0 > rn ] โ 0,
(4.8)
rn
rn
where
Z
ยตฬi (x) =
(1 โ cos(xT s)) ยตi (ds),
i = 1, 2.
Let P R ,ฮ|rn denote the conditional joint distribution of (R/rn , ฮ) given R > rn and P R |rn , Pฮ|rn be the
rn
rn
respective conditional marginals. Then (4.8) can be expressed as
Z
Z
npn
ยตฬ1 (T โ T 0 ) ยตฬ2 (ฮ โ ฮ0 )
(1,โ)รSdโ1
(1,โ)รSdโ1
6
Wan and Davis
P R ,ฮ|rn (dT, dฮ)P R ,ฮ|rn (dT 0 , dฮ0 )
rn
rn
+P R |rn (dT )Pฮ|rn (dฮ)P R |rn (dT 0 )Pฮ|rn (dฮ0 )
rn
rn
โ2P R ,ฮ|rn (dT, dฮ)P R |rn (dT 0 )Pฮ|rn (dฮ0 )
r
rn
Zn
ยตฬ1 (T โ T 0 ) ยตฬ2 (ฮ โ ฮ0 )
Z
=
(1,โ)รSdโ1
โ
(1,โ)รSdโ1
npn P R ,ฮ|rn (dT, dฮ) โ P R |rn (dT )Pฮ|rn (dฮ)
r
rn
n
โ
0
0
npn P R ,ฮ|rn (dT , dฮ ) โ P R |rn (dT 0 )Pฮ|rn (dฮ0 ) โ 0,
rn
rn
(4.9)
where (R0 , ฮ0 ), (R00 , ฮ00 ) are iid copies of (R, ฮ). One way to verify (4.9) is to assume a second-order like
condition on the distribution of (R, ฮ). For example, assume that
P R ,ฮ|rn โ ฮฝฮฑ ร S
w
rn
โ ฯ,
A(rn )
where ฯ is a signed measure such that ฯ([r, โ] ร B) is finite for all r โฅ 1 and B Borel set in Sdโ1 , the unit
sphere in Rd , and the scalar function A(t) โ 0 as t โ โ. When the components of X are asymptotically
independent, this is equivalent to the second order condition for multivariate regular variation (Resnick,
โ
โ
2002). If we choose the sequence rn such that npn โ โ and npn A(rn ) โ 0, then
โ
=
โ
npn A(rn )
npn A(rn )
P R ,ฮ|rn ((ยท, ยท)) โ P R |rn (ยท) ร Pฮ|rn (ยท)
rn
rn
A(rn )
P R ,ฮ|rn ((ยท, ยท)) โ ฮฝฮฑ ร S((ยท, ยท))
rn
A(rn )
ฮฝฮฑ (ยท) ร (Pฮ|rn (ยท) โ S(ยท))
w
โ 0
โ
A(rn )
โ
P R |rn (ยท) โ ฮฝฮฑ (ยท) ร Pฮ|rn (ยท)
rn
A(rn )
on [1, โ] ร Sdโ1 . In the case where ยต1 , ยต2 are finite measures, ยตฬ1 , ยตฬ2 are bounded and (4.9) is satisfied since
the integrand can be written as
"Z
Z
ยตฬ1 (T โ T 0 ) ยตฬ2 (ฮ โ ฮ0 )
npn A2 (rn )
(1,โ)รSdโ1
(1,โ)รSdโ1
P R ,ฮ|rn (dT, dฮ) โ P R |rn (dT )Pฮ|rn (dฮ)
rn
#
rn
A(rn )
0
P R ,ฮ|rn (dT , dฮ0 ) โ P R |rn (dT 0 )Pฮ|rn (dฮ0 )
rn
rn
A(rn )
โ 0.
In the special case that |A| โ RVฯ for ฯ < 0, (4.9) is met provided rn is chosen such that
1
1
O(n ฮฑ+2|ฯ| + ) โค rn โค o(n ฮฑ ),
for some > 0.
When the measures ยต1 , ยต2 are infinite, (4.5) can be verified in specific cases. This is illustrated in the
following example.
Example 4.4. Let X follow a bivariate logistic distribution, i.e., X has cdf
โ1/ฮณ
P(X1 < x1 , X2 < x2 ) = exp(โ(x1
โ1/ฮณ ฮณ
+ x2
) ),
ฮณ โ (0, 1).
(4.10)
Then X has asymptotically independent components if and only if ฮณ = 1. It can be shown that X is regularly
varying with index ฮฑ = 1, i.e., pn = P(R > rn ) โผ rnโ1 as rn โ โ. Using the L1 -norm, k(x1 , x2 )k = |x1 |+|x2 |,
Threshold Selection for Multivariate Heavy-Tailed Data
7
the pseudo-polar coordinate transform is (R, ฮ) = (X1 + X2 , X1 /(X1 + X2 ))โ (0, โ) ร [0, 1] and the pdf of
(R, ฮ) is
fR,ฮ (r, ฮธ)
=
r
โ ฮณ+1
ฮณ
โ2
โ ฮณ1
โ ฮณ1
ฮณโ2
ฮธ
(ฮธ(1 โ ฮธ))
+ (1 โ ฮธ)
1
ฮณ ฮณ โ 1
1
โ
rโ1 ฮธโ ฮณ + (1 โ ฮธ)โ ฮณ
.
ฮณ
e
ฮณ
โ1
โ1
โr โ1 ฮธ ฮณ +(1โฮธ) ฮณ
We now consider the case of the infinite weight measure ยต given in (3.2) with ฮบ = 1 and derive the condition
on the sequence {rk } for which the conditions of Theorem 4.1 hold. First observe that
f R ,ฮ|rn (t, ฮธ)
rn
โ ฮณ+1
ฮณ
โ2
โ ฮณ1
โ ฮณ1
ฮณ
โ1
โ1
โ1 โ1
โrn
t
ฮธ ฮณ +(1โฮธ) ฮณ
ฮณโ2
(ฮธ(1 โ ฮธ))
ฮธ
+ (1 โ ฮธ)
e
ฮณ ฮณ โ 1
1
1
โ
rnโ1 tโ1 ฮธโ ฮณ + (1 โ ฮธ)โ ฮณ
ฮณ
1
ฮณโ2
ฮณ+1
1
1
โ
ฮณ
โ
โ tโ2
(ฮธ(1 โ ฮธ)) ฮณ ฮธโ ฮณ + (1 โ ฮธ)โ ฮณ
,
ฮณ
=: fT (t)fฮ (ฮธ),
=
t
as n โ โ,
(4.11)
and
rn f R ,ฮ|rn (t, ฮธ) โ fT (t)fฮ (ฮธ)
rn
โค
fT (t)fฮ (ฮธ) rn e
ฮณ
โ1
โ1
โ1 โ1
โrn
t
ฮธ ฮณ +(1โฮธ) ฮณ
ฮณ
โ1
โ1
โ1 โ1
โrn
t
ฮธ ฮณ +(1โฮธ) ฮณ
+e
tโ1 ฮธ
โ ฮณ1
โ1
โ ฮณ1
+ (1 โ ฮธ)
ฮณ
ฮณ
1โฮณ
!
โค
1
ฮณ
ฮณ
1
1
1
fT (t)fฮ (ฮธ) tโ1 ฮธโ ฮณ + (1 โ ฮธ)โ ฮณ
+ tโ1 ฮธโ ฮณ + (1 โ ฮธ)โ ฮณ
โค
1
2ฮณโ2
1
tโ3 ฮธโ ฮณ + (1 โ ฮธ)โ ฮณ
โค
ctโ3 ,
ฮณ
1โฮณ
1
1โฮณ
for t โฅ 1 and ฮธ โ [0, 1],
where c denotes a generic a constant whose value may change from line to line throughout the paper, and
the last inequality comes from the facts that
1
ฮธ(1 โ ฮธ) โค
4
and
ฮธ
โ ฮณ1
โ ฮณ1
+ (1 โ ฮธ)
2ฮณโ2
2โ2ฮณ
ฮณ
1
โค
< โ.
2
Letting
hn (t, ฮธ)
:=
f R ,ฮ|rn (t, ฮธ) โ f R |rn (t)fฮ|rn (ฮธ)
rn
rn
rnโ1
,
we have
1
Z
Z
โ
Z
1
Z
|hn (t, ฮธ)|dtdฮธ,
max
0
Z
1
1Z โ
โค
โ
| log(t)hn (t, ฮธ)|dtdฮธ
0
1
|thn (t, ฮธ)|dtdฮธ
0
Z
1
1
Z
โค
0
1
โ
f R ,ฮ|rn (t, ฮธ) โ fT (t)fฮ (ฮธ)
rn
tโ1 rnโ1
dtdฮธ
8
Wan and Davis
1
Z
โ
Z
fT (t)
+
dtdฮธ
tโ1 rnโ1
f R |rn (t) โ fT (t)
fฮ|rn (ฮธ) rn โ1 โ1
dtdฮธ,
t rn
1
0
1
Z
โ
Z
+
1
0
fฮ|rn (ฮธ) โ fฮ (ฮธ)
where the first term can be bounded by
1
Z
0
Z
โ
ctโ2 dtdฮธ < โ,
1
and the other terms can be bounded in the same way. Since R has infinite first moment, we apply the distance
correlation to log R and ฮ. The integral in (4.9) is bounded by
npn
rn2
Z
n
c 3
rn
Z
1
0
1
Z
Z
โ
1
โ
Z
Z
1
0
1
Z
Z
โ
| log t โ log t0 ||ฮธ โ ฮธ0 ||hn (t, ฮธ)||hn (t0 , ฮธ0 )|dtdฮธdt0 dฮธ0
1
โ
(| log t| + | log t0 |)|hn (t, ฮธ)||hn (t0 , ฮธ0 )|dtdฮธdt0 dฮธ0
1
0
1
0
Z 1 Z โ
Z 1 Z โ
n
n
โค c 3
| log(t)hn (t, ฮธ)|dtdฮธ
|hn (t, ฮธ)|dtdฮธ โค c 3 ,
rn
r
0
1
0
1
n
โค
which converges to zero if n = o(rn3 ). Therefore if {rn } is chosen such that rn = o(n) and n = o(rn3 ), then
Theorem 4.1 holds.
The result in Theorem 4.1 can be generalized from iid to a regularly varying time series setting, which we
present in the next theorem. For a multivariate stationary time series {Xt } and h โฅ 1, set Yh = (X0 , . . . , Xh ).
Then {Xt } is regularly varying if
P(xโ1 Yh โ ยท) v โ
โ ยตh (ยท),
P(xโ1 kX0 k > 1)
(h+1)d
for some non-null measure ยตโh on R0
=R
(h+1)d
x โ โ,
\{0}, R = R โช {ยฑโ}, with the property that ยตโh (tC) =
(h+1)d
tโฮฑ ยตโh (C) for any t > 0 and Borel set C โ R0
. See, for example, page 979 of Davis and Mikosch (2009).
It follows easily that
P(xโ1 (X0 , Xh ) โ ยท) v
โ ยตh (ยท),
(4.12)
P(kX0 k > x)
where
ยตh (D) = C ยท ยตโh ({s โ R
(h+1)d
: (s1 , sh ) โ D}).
Assume that {Xt } is ฮฑ-mixing. We assume the following conditions between {Xt } and the sequence of
threshold {rn }, which can be verified for various time series models (Davis and Mikosch, 2009).
โ1
(M) Assume pโ1
(kX1 k > rn ) = o(n1/3 ) and that there exists a sequence {ln } such that ln โ โ,
n =P
ln pn โ 0, and
i)
ฮด X
โ
1
ฮฑhฮด โ 0 for some ฮด โ (0, 1);
(4.13)
pn
h=ln
ii)
lim lim sup
hโโ nโโ
ln
1 X
P(kX0 k > rn , kXj k > rn ) = 0;
pn
(4.14)
j=h
iii)
npn ฮฑln โ 0.
(4.15)
Threshold Selection for Multivariate Heavy-Tailed Data
9
Theorem 4.5. Let {Xt } be a multivariate regularly varying time series with tail index ฮฑ > 1 and ฮฑmixing with coefficients {ฮฑh }hโฅ0 . Assume the same conditions for the weight measure ยต and the sequence of
thresholds {rn } in Theorem 4.1, i.e., (4.4), (4.5) hold, and that condition (M) holds. Then
Z
d
npฬn Tn โ
|Q0 (s, t)|2 ยต(ds, dt),
Rd+1
where Q0 is a centered Gaussian process. In particular,
p
Tn โ 0.
The proof of Theorem 4.5 is given in Appendix B.
Note that the limiting distributions Q in Theorem 4.1 and Q0 in Theorem 4.5 are both intractable.
In practice, quantiles of the distributions are calculated using resampling methods. While in the iid case
this can be done straightforwardly, in the weakly dependent case one needs to apply the block bootstrap or
stationary bootstrap to obtain the desired result (see Davis et al. (2012)). In the following section, we present
a threshold selection framework with a subsampling scheme that does not require independence between the
observations.
5. Threshold selection
In this section, we propose a procedure to select the threshold for estimating the spectral measure S from
observations X1 , ยท ยท ยท , Xn . Let us first consider the case where a specific threshold rn is given. Then (4.1)
specifies the empirical distance covariance between R/rn and ฮ conditional on R > rn . Under the assumption
(4.5), we have from Theorem 4.1,
Z
npฬn Tn โ
|Q(s, t)|2 ยต(ds, dt),
Rd+1
R
where npฬn is the number of observations such that Ri > rn . In practice, the limit distribution |Q|2 ยต(s, t)
is intractable, but one can resort to bootstrapping. Consider the hypothesis testing framework:
H0
:
R/rn and ฮ are independent given R > rn
H1
:
R/rn and ฮ are not independent given R > rn .
Define the p-value for testing H0 versus H1 to be
Z
2
pv = P
|Q(s, t)| ยต(ds, dt) > u
Rd+1
.
(5.1)
u=npฬn Tn
Then under H0 , pv follows U (0, 1), while under H1 , pv should be sufficiently small.
Now consider a decreasing sequence of candidate thresholds {rk }. From (5.1), a sequence of p-values {pvk },
each corresponding to a threshold rk , can be obtained. Our goal is to find the smallest threshold rโ such
that conditional on R > rโ , ฮ can reasonably be considered independent of R. Note that the pvk โs are not
independent for each k since they are computed from the same set of data. Conventional multiple testing
procedures, such as Bonferroni correction, are problematic to implement for dependent p-values. To counter
these limitations, we propose an intuitive and direct method based on subsampling.
The idea is outlined as follows: For a fixed level rk , we choose a subsample of size nk from the conditional
empirical cdf Fฬ R ,ฮ|rk of (Ri /rk , ฮi ) with Ri > rk , i = 1, . . . , n. For this subsample, we compute the
rn
distance covariance Tn,k . To compute a p-value of Tn,k under the assumption that the conditional empirical
distribution is a product of the conditional marginals, we take a large number (L) of subsamples of size nk
from
Fฬ R ,ฮ|rk (dฮธ, dr) = Fฬฮ|rk (dฮธ)Fฬ R |rk (dr),
rn
rn
(l)
and calculate the value Tฬn,k , l = 1, . . . , L for each subsample. The p-value of Tn,k , pvk , is then the empirical p(l)
value of Tn,k relative the {Tฬn,k }l=1,...,L . This process, starting with an initial subsample of nk from Fฬ R ,ฮ|rk is
rn
10
Wan and Davis
(j)
repeated m times, which produces m estimates {pvk }j=1,...,m of the pvk , which are independent conditional
on the original sample. These are then averaged
m
pv k =
1 X (j)
pv .
m j=1 k
So for the sequence of levels {rk }, we produce a sequence of independent p-values {pv k }.
Our choice of threshold r at which (ฮ, R)|R > r are independent (and dependent otherwise) will be based
on an examination of the path of the mean p-values, {pv k }. Note the following two observations:
(1)
(m)
โข If R and ฮ are independent given R > rk , then the pvk , . . . , pvk will be iid and approximately
U (0, 1)-distributed, so that pv k should center around 0.5.
(j)
โข If R and ฮ are dependent given R > rk , then the pvk โs will be well below 0.5 (closer to 0), and so
will pv k .
By studying the sequence {pv k }, which we call the mean p-value path, we choose the threshold to be the
smallest rk such that pv l is around 0.5 for l < k. A well-suited change-point method for our situation is
the CUSUM algorithm, by Page (1954), which detects the changes in mean in a sequence by looking at
mean-corrected partial sums. In our algorithm, we use a spline fitting method that is based on the CUSUM
approach called wild binary segmentation (WBS), proposed by Fryzlewicz (2014). The WBS procedure uses
the CUSUM statistics of subsamples and fits a piecewise constant spline to {pv k }. In our setting, we may
choose rk to be the knot of the spline after which the fitted value is comfortably below 0.5.
There are several advantages to using the subsampling scheme. First, recall that the p-value path {pvk },
which is obtained from the whole data set, has complicated serial structure and varies greatly from each
realization. In contrast, the mean p-values pv k from subsampling are conditionally independent and will
center around 0.5 with small variance when the total sample size n and the number of subsample m is large.
This, in turns, helps to present a justifiable estimation for the threshold. Second, the calculation of distance
covariance can be extremely slow for moderate sample size. Using smaller sample sizes for the subsamples,
our computational burden is greatly reduced. In addition, this procedure is amenable to parallel computing,
reducing the computation time even further. Third, the subsampling makes it possible to accommodate
stationary but dependent data, waiving the stringent independent assumption.
The idea of looking at the mean p-value path is inspired by Mallik et al. (2011), which used the mean of
p-values from multiple independent tests to detect change points in population means.
6. Data Illustration
In this section, we demonstrate our threshold selection method through simulated and real data examples.
In practice, we set the sequence of thresholds {rk } to be the corresponding upper quantiles to {qk }, a
pre-specified sequence of quantile levels. The subsample size nk at each threshold rk is set as nk = n0 ยท qk
for some n0 << n. This is designed such that for any rk , each subsample is a n0 /n fraction of all the eligible
data points with R > rk . Then the choice of {nk } boils down to the choice of n0 , which should reflect the
following considerations: i) n0 should be large enough to ensure good resolution of p-values at all levels; ii)
n0 /n should be sufficient small such that the subsamples do not contain too much overlap in observations; iii)
larger n0 requires heavier computation for the distance correlation. In our examples, where the total sample
size n ranges from 3000 to 20000, we find n0 between 500 and 1000 to be a suitable choice. The number of
subsamples m can be set as large as computation capacity allows. In our examples, we take m = 60.
For all the examples, we choose the weight function ยต for distance covariance to be (3.2) with ฮบ = 1, and
the number of replications used to calculate each p-value is L = 200. To ensure that the moment conditions
are met, the distance correlation is applied to the log of the radial part R in all examples.
6.1. Simulated data with known threshold
To illustrate our methodology, we simulate observations from a distribution with a known threshold for which
R and ฮ become independent.
Threshold Selection for Multivariate Heavy-Tailed Data
11
Let R be the absolute value of a t-distribution with 2 degrees of freedom and ฮ1 , ฮ2 be independent
random variables such that ฮ1 โผ U (0, 1), ฮ2 โผ Beta(3, 3). Set
(
ฮ1 ,
if R > r0.2 ,
ฮ|R =
ฮ2 ,
if R โค r0.2 ,
where r0.2 is the upper 20%-quantile of R. Then R and ฮ are independent given R > r if and only if r โฅ r0.2 .
Let (Xi1 , Xi2 ) = (Ri ฮi , Ri (1 โ ฮi )), i = 1, . . . , n, be the simulated observations. We generate n = 10000
iid observations from this distribution. Figures 1(a), 1(b) and 1(c) show the data in Cartesian and polar
coordinates. Our goal is to recover the tail angular distribution by choosing the appropriate threshold.
A sequence of candidate thresholds {rk } is selected to be the empirical upper quantiles of R corresponding
to {qk }, 150 equidistant points between 0.01 and 0.4. We apply the procedure described in Section 5 to the
data. For each rk , the mean p-value pv k is calculated using m = 60 random subsamples, each of size
nk = 500 ยท qk , from the observations with Ri > rk . Figure 1(d) shows the mean p-value path. For the WBS
algorithm, we set the threshold to be the largest rk such that for all thresholds r (quantile level q) such that
r < rk (q > qk ), the fitted spline of the p-value stays below 0.451 . The threshold levels chosen is 20.4%,
which are in good agreement with the true independence level 0.2. The empirical cdfs of the truncated ฮi โs
corresponding to the chosen thresholds is shown in Figure 1(e). We can see that the true tail angular cdf
(i.e., U (0, 1)) is accurately recovered.
6.2. Simulated logistic data
We simulate data from a bivariate logistic distribution, which is bivariate regularly varying. Recall from
Example 4.4 that (X1 , X2 ) follows a bivariate logistic distribution if it has cdf (4.10). In this example, we
set ฮณ = 0.8 and generate n = 10000 iid observations from this distribution. Similar to the previous example,
for each threshold rk corresponding to the upper qk quantile, where {qk } is chosen to be the 150 equidistant
points between 0.01 and 0.3. The mean p-value pv k is calculated using m = 60 random subsamples of size
nk = 500 ยท qk from the observations with Ri > rk .
Figures 2(a) , 2(b) and 2(c) show the scatterplots of the data. Here the L1 -norm is used to transform
the data into polar coordinates. Our algorithms suggests using 7.4% of the data to estimate the angular
distribution. The estimated cdf of the angular distribution is shown with the theoretical limiting cdf, derived
from (4.11), in Figure 2(e). So even though R and ฮ are not independent for any threshold rk , our procedures
produce good estimates of the limiting distribution of ฮ.
6.3. Real data
In this example, we look at the following exchange rate returns relative to the US dollar: Deutsche mark
(DEM), British pound (GBP), Canadian dollar (CAD), and Swiss franc (CHF). The time spans for the data
are 1990-01-01 to 1998-12-31 with a total of 3287 days of observations. We examine the pairs GBP/CHF,
CAD/CHF, DEM/CHF and estimate the angular density in the tail for each pair. Figures 3(a)โ3(c) present
the scatter plots of the data. The marginals of the observations are standardized using the rank transformation proposed in Joe et al. (1992):
Zi = 1/ log{n/(Rank(Xi ) โ .5)},
i = 1, . . . , n.
Again {qk } is chosen to be the 150 equidistant points between 0.01 and 0.3, and the mean p-value pv k is
calculated using m = 60 random subsamples of size nk = 500 ยท qk from the observations with Ri > rk . Note
that while it may not be reasonable to view the observations as iid, the subsampling scheme can still be
applied to choose the threshold of independence between R and ฮ.
1 Of course, other selection rules can be used. For example, a more conservative approach would be choosing the threshold
as the largest rk such that for r > rk , the fitted spline of the p-value stays above 0.45.
โ
โ
โโ โโ
โ
โโโ โ
โ
โ
โโโโโ โโโ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ โโโ
โ
โ
โโโโ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โโ
โ
โโ
โ
โโ
โโ
โ
โ
โ
โโ
โโ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โโโ
โโโโ
โโ
โ
โ
โ
โ
โโโโ
โ
โ
โ
โโ
โ
โโโ
โ
โโ
โ
โโ
โโ
โโ
โโ
โโ
โ
โ
โ
โ
โโ
โโ
โโ
โ
โ
โโโ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โโ
โ
โ
โ
โโ
โโ
โโ
โโ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โโ
โ
โโโ
โโโ
โ
โโ
โ
โ
โ
โ
โโ
โโ
โโโ
โโ
โ
โ
โโ
โ
โ
โโโ
โโ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ โ
โโ
โ
โโ
โโโ
โโ
โ
โ
0
โโ
โ
โ
โ โ โโ โ
โ
โ
20
โ
40
60
80
โ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
radius
โ
โ
โ
โ
โ
โ
1eโ04
1eโ02
1e+00
โ
1e+02
โ
โ
โ
0.0
0.2
โ
โ
โ
โ
โ
0.6
0.8
1.0
angle
(c)
1.0
1.0
โ
โ
0.4
(b)
estimated
truth
0.2
0.2
0.4
0.4
cdf
0.6
0.6
0.8
meanโpv
change point
fitted spline
0.8
โ
โ
โ
โ
x1
(a)
โ
0.0
0.0
โ
โ
โ
โ
โ โ โโ
โโ
โ
โโ
โ
โ
โ โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โ
โ
โ
โ
โ
โ
โ โ
โโ
โ
โ
โ
โโ โ
โ
โ
โ โ
โโ
โ
โ
โ
โ
โ
โ
โ โ
โ
โโ
โ
โ
โ โโ โ
โ
โ
โโ
โ
โ
โโ
โ โ
โ
โโ โ โ
โ
โ โ
โ
โ
โ
โโโโ โ โโ โ
โ
โโ
โ โโ
โโ โ
โ
โ
โ โ
โ โ
โ โ
โ โโโโ โ โ โโโโ
โโ
โ
โ
โ โ
โ
โ
โ โ โ โโ
โโโ
โโ
โโ
โ โ โโ
โ
โ
โโโ โ โ โ โ
โ
โ
โ
โ
โ โโโ
โโ โ โ โ
โ โ โโ
โโโ โโโโโ
โโโ
โ
โ
โ โโโ
โ
โ
โโโโ
โโ โโ โโ
โ โโ โ
โ โโโโ
โโ
โ โโ
โ
โโโ โ
โ โโ โโ โ
โโ โ
โโ โโ
โ
โโ
โ
โ โ
โ
โโโ โโ
โโ โ
โ
โโ โโ
โ โโโ โโโโโ โ โ โโ
โ โ
โ โ โโ โโโโ
โโ
โ
โโ โโ โ โโโโ โ โโ โ
โโ
โโโ
โ โโ โโ
โ
โ
โ
โ
โ
โ
โโ โ
โ โโโโ โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โ
โโ
โ
โ
โ
โ
โ
โโโ
โโโ
โ โ โ
โ โ โ โโ โโ โ โโโ
โโ
โโ โ โโ
โโ โ โ
โ
โ
โโโ โ
โ
โ
โโ
โโ
โ
โโ โ
โ
โ
โโ
โโ
โ
โโ โโ
โ โ โโ
โ โโ โ โ
โโโโ
โโโโโ โ โ
โโ โ
โโ
โ โ
โโ
โ โโ โ โ
โ
โ
โ
โโ
โโ โโ
โ
โ
โโ โโ
โ
โ โ
โ โโโโ
โโ
โ โ
โโ โ โโ โโ
โ
โ โ โ
โ
โโ
โ
โ
โ โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโโ
โ
โ
โ
โโ
โโโ โโโ โโโ โโโโ
โ
โ
โโ โ
โโ
โโ โ
โโโ
โ
โ
โ โโ โ
โ โโ โ
โ
โ
โ โโโ
โ
โ
โโ
โ
โ
โโ
โโโ
โโ โ
โ
โโ โ โ
โ
โ
โโโ โ
โ
โ
โ
โโโโโ
โ
โ
โโ โโโ โโ
โโ
โ
โโ
โโโ
โ
โโ
โ
โ
โ
โ
โโ โ
โโ
โ
โโโ
โ โโ
โ
โ
โ โโ
โโโโโ
โ
โโโโโ
โ โโโ
โโ
โ
โโโ โ
โโ
โ
โ
โ โ
โ
โโ
โ
โ โโโ โ
โโ
โ
โ
โโ
โ
โโ
โ
โโ
โ
โ
โ
โ
โโ โ
โโ
โโ
โโ โ
โโ
โ
โ
โ โโ โ
โโ
โ
โโโ
โ โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โโโ
โโโโ
โ โโโโโ
โโ
โ
โโ
โโ
โ
โโ
โโโ โโโ
โ
โโ
โโ
โโโ
โโ
โ
โ
โ
โ
โ
โโ
โโ โ
โ
โ โโ
โ
โ โโ
โ
โโโ
โ
โ
โโ โโโโ
โ
โ
โโ โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ โโโ
โ
โโโ
โโโ
โ
โ
โ
โโ
โโ
โ
โโ
โ
โโ
โโโโโ
โ
โ
โโโ
โโ โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โโโโ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โโ โ
โโ
โ
โโโ
โ
โ โโ
โ
โ
โ
โ โโโ
โโโ
โโ
โ
โโโ
โ
โ
โ
โโ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ โโ
โ
โ
โ
โโโ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โโ
โโโโ
โ
โ
โ
โโโ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โโโ
โโ
โโ
โโ
โ
โ
โ
โ
โ
โโ
โโโโ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโโ
โ
โโ
โโ โ โ
โโ
โโ
โโ
โโ
โ โโ
โ
โ
โ
โโ
โโโ
โโ
โ
โ
โโ
โ
โโ
โโโ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ โ
โโโ
โโ
โ
โ
โโ โ
โ
โ
โ
โ
โ
โ โโโ
โ
โ
โ
โโ โ
โโ
โ
โ
โโ โ
โโ
โโ
โ
โ
โ
โโโโโ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โโ
โ
โ
โ
โโ
โโโโ
โ
โ
โ โโ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โโ โ โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โโ
โ
โ
โโ
โโ
โ
โ
โ
โโโ
โ
โ
โ
โ โโ
โ
โโ
โโ
โโ
โโ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโโโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโ
โ
โโ
โ
โ
โ
โโ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โโโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โโโโ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโโ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ โโ
โ
โ
โ
โ
โ
โโโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ โโ โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โโโโโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโโโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ โ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โโโโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโโโ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โ โโโโโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โโโ โ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโโ
โ
โ
โโโโโ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโ
โ
โ
โโโโโโ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโโโ
โ
โ
โโ
โ
โ
โ
โ
โโโโ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โโ
โ
โ
โโ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โ โโโโ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โโ
โ โโ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โโ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โโ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โโ
โโ
โ
โ
โ
โโ
โโ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ โ
โ
โโ
โ
โโ
โ
โโ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โโ
โโ
โโโ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโโ
โโ โ โ
โโ
โโ
โ
โ
โ
โโ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโโโ
โ
โ
โโ
โ
โ
โ
โโ
โโ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โ
โ
โ
โ
โ
โ โโโ
โโ
โ
โ
โ
โโ
โโโโโ
โ
โ
โโ
โ
โโ
โโ
โ
โ
โ โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โโโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโโโ
โ
โ
โโ
โ
โโโ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โโโโ
โโโ
โ
โโโ โโ โ
โ
โ
โโ
โ
โ
โโโ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โโ โ โโโ
โ
โโ
โ โ
โโ
โ
โโ
โ
โโ
โโโ
โ
โ
โ
โ
โ
โ
โโ
โโ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโโโ
โ
โ
โโ
โโ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โโโโ
โ
โ
โ
โโโ
โ
โโโ
โ
โ
โโโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ โโโ โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโโ
โโโโโ
โ
โโ
โ
โ
โ
โ
โโ
โ
โโ โ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ โ
โ
โโ
โโ
โโโโ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโโ
โ
โ
โ
โ
โโโ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ โโ
โ
โ
โโ
โ
โโโ
โ
โ
โ
โโ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โโ
โโโ
โ
โ
โ
โ
โโโ โ
โโโ
โ
โ
โ
โ
โ
โโโ โโ
โ
โ
โ
โโโ
โ
โ
โโโโ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โโ
โโ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ โโโโ
โ
โ
โ
โโ
โ
โ
โโ
โโ
โโ
โ
โ
โโ โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ โโ
โโ
โ
โ
โ โ
โ
โ
โโ
โโโ
โ
โ โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโโ
โโ
โ
โโ โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โโ
โโ โโ
โ
โ
โ
โโโ โ
โ
โโ
โ
โ
โโ
โ
โโโ โโโ
โโโ
โโ
โ
โโโ
โ
โ
โ
โ
โโ
โ
โโ
โ
โโ
โ
โ
โโ
โ
โโ
โ
โ
โโ โ
โ โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ โ
โ
โ
โ
โ
โโ
โโโ โ โ
โ
โโโ
โโ โ
โ
โ
โโโ
โ โ
โ
โ
โ
โ โ
โโ
โ
โ
โ
โโ
โ
โ โโโ
โ
โ
โ
โ
โโโโ
โโโ โ
โโโโ
โโ
โ
โ โ
โ
โ
โโ
โโ
โโ
โ
โ
โโ
โ
โ
โ
โ
โโ
โโ
โ
โ โ โ
โ
โ
โโ
โ
โโโ
โ
โโ
โ
โ
โโ
โ
โ
โ
โโโ
โ
โโ
โโโ โโ โโโ
โโ
โ
โ
โ
โ
โโ
โ
โโโ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โโโ โโ
โ โโ
โ
โโ
โ
โ
โ
โโ
โโ
โโโ
โ โ
โโ
โ โ
โ
โ
โ
โโ
โ
โโโโ
โโโโ
โโ
โ
โ
โ
โโ
โโโโ
โ
โ
โโ
โ
โ โ
โโ โ
โ
โ
โโ
โโ
โโ
โ โโ โ โ
โโ โ โโโโโ
โ
โ
โโ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โโโ
โโโ
โ
โโ
โ โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ โ
โโ
โโโ โโโโโโโ
โ
โ
โโ
โ
โโโโโ
โ โโโ
โ โ โโโโโ
โ
โโโโ
โโ
โ
โโโโโ
โ
โโ
โ
โโ
โโโ
โโ
โ
โโ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ โ โ โ
โ โ โ โ โโ
โโ
โ
โ
โ
โโ โ โ โโ โ
โ โโ โ
โโ
โ โโโ โโ
โ
โโ
โโ โโ
โ
โ
โโโ
โ โ
โโ
โ โ โโโ
โโ
โโ โโโโ
โ
โ โโโ
โโ โ
โ โโโ
โ
โ
โ
โโ โ
โโโ โโ โ
โโ
โโโ
โโ
โ โ
โ โ โโโโโโ
โ
โ
โโ โ
โ
โโ
โ
โ โ
โ โ โโ
โ โโ
โ
โ
โ โโ โโโ
โ
โ โโ โ
โ
โโโ
โโ โ
โ โ
โ
โโ
โ โโ โโ
โ
โโโโ โ โโ
โ
โโโ โ โ โ โ โ
โ
โ โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ โ
โ โ โโโโโ
โโ โ
โ โ โโ
โโ โ โโ โ
โ โ
โโ
โ
โ
โโ
โโ โ
โ โโ โโ
โโ
โ
โ โโโ โโโ
โ โโโ โ โ โ
โ โ
โ
โโ
โโ โโโโโ โ
โ
โ
โโ
โ
โโโโ โโ โ
โ โโโ
โ โ
โ
โโ โ
โ
โ
โ โ
โโ โ โ
โ
โ
โ
โ
โโโ โโ
โ
โโโ โ
โโโ
โโ
โ โ โโ
โโ
โ
โโ
โ
โ โโ โ
โ โ โโโ โ
โ โ โโโ
โ โ โ โ โ โโ
โ
โโโ
โ
โ โ
โ โโ โโโ
โโ โโ โ โ
โ โโ
โ โโโโ
โ โ โ
โโ โ โ โ
โ โโ
โ
โ โ
โ
โ
โโ
โ
โ โ
โ
โ
โโโ
โ โโ
โ โ โโโ
โ
โ โ โโ
โ โ โ
โ
โโ โ โโ โ โ
โ
โโโโ โ
โโโ โโโ โ
โ
โ
โโโโโ
โโ
โโ
โ
โโ โ
โ โ โ โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ โ โ โโ
โ
โ
โ
โ
โ โโ โโ โ โ โ
โ โ
โ โ โ
โ โโ
โ โโ โ โโ โ
โ
โ
โ โโ
โ
โโโ
โโ โโโโ
โ
โ
โ
โ
โ
โ
โ
โ โ
โโ
โ โ โ
โโ
โ
โโ โ
โ
โ โ โ
โโ โ โ โโ โ โ
โ
โ
โ
โ โ โ
โ โ โ โ
โ โ
โ โ
โ
โ
โ โ
โ
โโ
โ
โโ
โโ โ
โโโโ โ โ
โ
โ
โ
โ โ
โ โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ โ โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ โโ โ
โ
โ
โ
โ โ
โ
โ
โ
โ โ
โ
โโ
โ โ
โ
โ
โ
โ
โ
โ
โ
โ โ
โ
โ
โ
โ
โ โ
1e+01
โ
โ
โ
โ
โ
โ
1eโ01
โ
โโ
โโ
โโ
โ
โ
โ
โ
โ
โ โ โ
โ โโ โ
โ
โ
โ
โ
โ โ
โ
โ
โ โ โ โ
โ
โโ โโ โ
โ
โ
โ
โโ โโ โ
โ โ โโ โ
โ
โ
โโ
โ
โ โโโ
โโ โ โโโโ โโ
โ
โ
โโ โ โ โ
โ โโโ โ โ
โ โ
โ โ
โ
โ
โโ
โ
โ โ โ โโโ
โ
โ
โ
โ
โโ โ โ
โ โ
โโ
โ โโโ
โ
โ โโ
โ โโ
โ โ
โโ โ โโโ โ
โโ โ
โ
โ
โ
โโโ
โ
โ
โโ
โ โโ โ
โ
โ
โโโ
โโโโ
โ
โ
โ
โ
โโ
โโ โโ
โโ
โ โโโ
โโ
โ
โ
โโ
โ
โ
โ โโ
โ โโโโ
โโ
โ
โ โ โ โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โโโโ
โ
โ
โ
โโ
โโ โโโ โ โ โ โ โ
โ
โโโ
โโโ
โโโ
โ โโ
โ
โโโ
โ
โ
โ
โ
โโโโ
โ
โโ
โ โ
โ
โโ
โโโ
โโโ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโโ
โโโ
โ
โ
โโ
โ
โโ
โโโ โโ
โโ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โโ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ โโ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโโ
โ
โโ
โ
โโ
โโ
โโ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โ โ
โ
โโโ โ
โ
โ
โ
โ โ โ โโ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ โโ
โ
โ
โ
โ
โ
โ
โ
โ โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โโ
โโ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โโโโโ
โ
โ
โ
โ
โ
โ
โ โโ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โโโ
โ
โ
โ
โ
โ
โโ
โ
โโ
โ
โ
โโโ
โ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โโโ โโ
โ
โ
โ
โโ
โโ
โ
โ
โโ
โ
โโโ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ โโ
โโ
โ
โ
โ
โ
โ
โ โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โโโ
โ
โ
โโ โโ โ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโโ โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ โ โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โ โโ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ โ โโ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ โ โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโโโ
โ
โ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโโ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโโโ
โ
โ
โ
โโ
โ
โ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ โโโโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โโ
โ
โโ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โโโโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ โ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโโโโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โโโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โโ โโ โ โ โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ โโ โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โโ โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ โโโ โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโโโ
โ
โ
โ
โโ
โ
โ โ
โ
โ โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โโโโ โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โโโโ โ โโ โ
โ
โ
โ
โโโ โ
โ
โโโโ
โ
โ
โโ
โ
โ
โ
โ
โ โโ
โ
โ
โ โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ โ โ โโโโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โโ
โ
โ
โโโ
โ
โโ
โ
โ โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ โ
โ
โ
โ
โ
โโ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโโโ
โ
โ
โโโ
โ
โ
โ
โโ
โ โโ
โ
โโ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ โโโ
โโ
โ
โ
โ โ โโ โโ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โโ โ
โ โโ
โ
โ
โ
โโ
โ
โ โโ
โ
โ
โโโโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ โโ
โ
โโ
โโ
โโ
โ
โ โ
โ
โโ โโ
โ
โ
โ
โโโ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โโโโโ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ โโโโ โโ โ
โ
โ
โโโ โ
โ
โโ
โโ
โโ
โ
โโ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโโ
โ โโโ
โโ
โโ
โโ
โโโ
โ
โโโ
โ
โ
โ
โ
โ โ โ โโโ
โ โโโ โ
โ
โโ โ
โ
โโโ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โโโโ
โ
โโ
โ โ
โ
โโโ โ
โโ
โ
โ โ
โ
โโ
โ
โ โ
โโโ โ
โ
โโ
โโ
โ
โ โ
โ
โ
โโ
โ
โโ
โโ
โ
โโ
โ
โโโ
โ
โ โ
โโ
โโ
โ
โ
โ โโโ
โโโ
โ
โ
โ
โ
โ
โ
โ
โโโ
โโ
โโ
โ
โ
โ
โโโ โ
โโ โ
โ
โ
โโ
โโ
โ
โโโ
โโโ
โ
โ
โ
โ
โ
โ
โ โ
โ โ
โ
โ โ
โ
โโ โ
โ
โ
โ
โ
โโโ
โ
โโ
โ
โโ โ
โโ
โ
โ
โ
โ
โโ
โ โโโ
โ
โ
โโ
โโ
โ
โ
โ
โ โโ
โ
โโ
โ
โ โโโ
โ
โ โโโโโ โโ
โโ
โโโ
โ
โ โ
โ
โโ
โ โโ
โ
โโ โ โ
โ
โ
โโ โ
โโโ
โโโ
โ
โโ
โโโ
โโ
โ
โโ โโ
โโ
โโ
โ โ โ โโ โ โโ
โ โโ
โ
โ
โ
โ
โ โโ โ
โ
โโ
โ โโโ
โ
โ โ
โ
โ โ
โ
โ โโ
โ
โ
โ
โ
โ
โ โ
โโ โ โ
โ
โ โ
โ
โ
โโโโโ โโ โ โ โ
โ โโ
โ
โ
โ โ
โ โโ โ โ โ โ
โ
โ
โโ
โ
โ โ โ โ
โ
โ โ
โ
โโ
โ โ
โ
โโ
โ
โโ
โ
โโ
โ โโ โ โ
โโ
โโ โ
โ
โโ
โโ
โ
โ
โโ
โ
x1
pโvalue
โ
โ
1eโ03
x2
300
0
100
x2
500
โ
1e+03
Wan and Davis
1eโ04 1eโ02 1e+00 1e+02
12
0.0
0.1
0.2
0.3
0.4
0.0
upper quantile
0.2
0.4
0.6
0.8
1.0
Theta
(d)
(e)
Fig 1. Example 6.1. (a) scatterplot of (Xi1 , Xi2 ); (b) scatterplot of (Xi1 , Xi2 ) in log-log scale; (c) scatterplot of (Ri , ฮi ); (d)
mean p-value path (black triangles), fitted WBS spline (blue line), and the chosen threshold quantile (red vertical line); (e)
estimated cdf of ฮ using the threshold chosen, compared with the truth (black dotted).
The mean p-value paths are shown in Figures 4(a)โ4(c). The threshold levels selected for the three pairs
are 9.6%, 7.4%, 16%, respectively. Figures 3(d)โ3(f) show the shape of the estimated angular densities for
each pairs. As expected, the tails of the two central European exchange rates, DEM and CHF, are highly
dependent. In contrast, that of CAD and CHF are almost independent.
6.4. Simulated non-regularly varying data
In this example, we generate data from a model which is not regularly varying. Let R be a random variable
from the standard Pareto distribution:
P(R > r) = rโ1 ,
r โฅ 1.
Let ฮ1 , ฮ2 be independent random variables such that ฮ1 โผ U (0, 0.5), ฮ2 โผ U (0.5, 1). Set
(
ฮ1 ,
if log R โ (2k, 2k + 1] for some integer k,
ฮ|R โผ
ฮ2 ,
if log R โ (2k + 1, 2k + 2] for some integer k.
For any positive integer k, it can be verify that
P(ฮ โ (0, 0.5)|R > e2k ) =
1 โ eโ1
,
1 โ eโ2
โ
โ
โ โ โ
โ
โ
โ
โ
5000
15000
25000
โ
โ
1eโ01
โ
โ
โ
โ โ
โ
โ
1e+01
โ
โ
โ
โ
โ
โ
1e+03
0.0
0.2
0.4
1.0
0.8
0.6
estimated
truth
cdf
0.6
0.6
0.4
0.4
0.2
0.2
0.0
0.10
0.15
0.20
0.25
โ
0.8
1.0
(c)
1.0
(b)
โ
0.05
โ
angle
meanโpv
change point
fitted spline
0.00
โ
โ
โ
โ
โ
โ
โ
โ โ
โ
โ โ
โ โ
โ
โ
โ
โ
โ
โ โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ โโ
โ
โ
โ
โ
โโ
โ
โ
โ โ
โ โ
โ
โ
โโ
โโโ โ
โ
โ
โ โโ
โ
โ
โ
โ
โ
โ โ โโ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ โ
โ โ
โ
โ
โ โโโ
โ
โ
โโโ โ
โ
โ
โโ
โ โ
โ โ
โโ
โ
โโโ โ
โ
โ
โ
โโ
โ
โ
โโโ
โโ
โ
โ
โ
โ โ
โ
โโ
โ
โ
โ
โ
โ
โ โ โ โ
โ
โ โ โโ
โโ โ โโ
โโ
โ
โโ
โ
โโ
โ
โ
โ
โ โ โโ
โโ
โ
โ โ
โ
โ
โ
โ โโ โโ
โ
โโ
โโ โ โ
โ
โ
โโ
โ
โ โ
โ
โ
โโ
โ
โ โ โโ โโ
โ โ
โโ
โ โ โ โโ โโ
โโ
โ
โ
โ
โ
โ
โ โ
โ
โ
โ
โ
โ
โโโโโโ
โ
โ
โโ
โโ โ โ
โ โโ
โ
โ
โ
โ โ โโ
โ
โ
โ
โ
โโโ
โโ
โ
โ โ โโ โ
โ
โ โโโโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ โโ
โ โ
โโ
โ โ โ โโ โ
โ
โ
โ
โ
โโ
โโ โโ
โ
โ โ โ
โ
โ
โ
โ
โโ โโ โ โ โ โโ
โ
โ โโโ
โโ
โ โโ
โโ
โ โ
โ
โโโ
โโ
โ
โโ
โโ โโ
โ โ
โโโ
โ โ
โ โ โโ
โ
โโ
โ โ โ โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโโ โ
โโ
โโ โโ โโ
โ
โโ
โ โ โโ
โ
โโ โ โ โ โ
โ
โ
โ
โโ
โ
โ
โโ โโโ
โโ โ โ โ โ
โโโ
โโ
โ
โโ โ โ
โ
โโโ โ โ โ โ
โ
โ
โ
โโโโ
โ
โ
โโโโโโ โ
โโ โ
โ
โโโ โ
โโ
โ
โโ โ โ โโ โโ
โโ โ โ โโ
โ
โโ
โโ
โโ โ โโ
โโ
โ โ
โ โโ โ โ
โโ
โ
โ
โโ
โโ
โ
โ
โ โโโ โ โ
โ
โโโ
โ
โ
โโโ
โ โ โ โโ
โ
โ
โโ โ
โ
โ
โ โโโ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ โ โ
โ โโโ
โโโ โโโโโ
โ
โ
โ โ โโโ โ
โโ
โ โโ โ
โ
โ
โ โ
โ
โ
โ โ โโโ
โโ
โ โ
โ
โโโโ
โ
โโ
โ
โโ
โโ
โ
โโ โ
โ โ
โ
โ
โ โโ
โ โ
โโ
โ
โ
โ โ
โ
โโ
โโ
โ โโ โ โ
โ โ
โ
โโ
โ โโโโ
โโโโ
โโโโ
โ
โโ โ
โ โ โโโ โ โ โ โโ
โโ
โ
โโ โ
โ
โ
โ
โ
โ
โโ
โโ
โโโ
โโโ โ
โ
โโ
โ
โโ
โ
โ
โ
โโ
โ โโโ
โ โ โโ โโโ โโ โ โโ โ โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โโโ
โ
โ
โโโ
โ โโโ โ โ
โ
โ
โโโโโ โโ
โ
โ
โ
โ
โโโ โโโโโโ โโโโ โ โโโ
โ โ โโโ
โโโ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ โ โ
โ
โ
โ
โ
โ
โโ
โโ
โ โโ
โโ
โ
โ
โ
โ
โ โโ
โโ
โ โ โ
โ โ โโโ
โโ
โ โโ
โโ
โ
โ โโ โ โ โโ โโ โ
โ โ
โ
โ
โ
โ
โ โโโ
โโ
โโโ โ
โ
โ โ โโ โ โ
โ
โโ
โ
โ
โ
โ โโโ โ โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ โโ โ
โโ
โโ
โโ
โ
โ โ
โ โโ
โโ โโ
โ
โ
โ
โโโโ
โโ
โ โ
โ
โ
โ
โโโ โ โโ โ โโ
โโโโ โ โ โ
โโ โโ
โ
โโ
โ
โ
โ
โโ โ
โโโโ
โโโโ
โโโ
โโ
โโ
โ
โโ
โโโโ
โ
โ โโโ โโโโ
โ
โโ
โ
โโ โ
โ โ โโโ โ โโ
โ
โ โ โ โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ โ
โโโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โ โ
โโ
โ โ โ
โ
โโโ
โ
โ
โ โโโโโโโโโโ
โโโ โ
โโ โโโโโโ
โ
โ
โ
โ
โ โโ
โ
โ
โ
โ
โ
โ
โ
โโโโ
โโ
โ
โโ
โโ
โ
โ
โโ
โ
โ
โโโ โโ โโ
โโโโโโ
โ
โโ
โ
โ
โ
โโ
โ
โ โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ โโโ โโ
โโโ
โโโโโโ
โโ
โ
โโ
โโ โ โโ โ
โ
โ
โ
โโ
โ
โโ
โ โโ
โโ
โโโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โโ
โ
โ
โโโ
โ
โโ โ
โ
โ
โ
โ
โ
โโ โ
โ
โ
โ
โโ โ
โ
โ
โโ โ
โ
โ
โโ
โโ โ
โ
โโโ
โ
โ
โ
โ โโ
โ
โโโ
โโโ
โ โโ
โ
โ
โ
โโโโ
โ
โ
โ
โ
โ
โโโ
โ
โ
โโโโ
โโโ
โ
โ โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโโ
โ
โโ
โ
โโโ
โ
โ
โ
โ
โโ
โ
โโโโ
โ
โโโโ
โ โ โโ
โ
โ
โ
โโ
โ
โโโ
โ โโ
โโโ
โ
โโ โ
โโ
โ โโ
โ
โ
โ
โ
โ
โ
โโโโ
โ
โ
โ
โ
โ
โ
โ โโ
โ
โโ
โ
โ
โโ
โ
โ
โ โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ โโ
โ
โ
โโโ
โ
โ
โโ
โโ
โ
โโ
โ
โ
โ โโ
โ
โ
โโ
โโ
โ
โโ
โ
โโ
โ
โ
โ
โโ
โโโ
โโโ
โ
โโ
โ โ
โ
โ
โโ
โโ โ
โ
โโ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โโ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โโโโ
โ
โ
โโ
โ
โโ
โ
โ
โโ
โโ
โ
โโโ
โ
โโ
โโ
โโโโ
โ
โโ
โโโโ
โ
โโ
โ
โ
โโ
โ
โ
โ
โโ
โโ
โโโ
โ
โ
โ
โ
โ
โโ
โโ
โโ
โ โ
โ
โโ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โโโ
โ
โโ
โ
โ
โ
โ
โ
โโ โ
โโ
โ
โ โ
โ
โโ
โโ
โ
โโโโ โ
โโ
โโ
โ
โโ
โ
โ
โโ โโ
โ
โโ
โโ
โ
โโ
โโ
โ
โโ โ
โ
โ
โ
โ
โโโโ
โโโโ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโโโ
โ
โโ
โ
โ
โโ
โ
โ
โโ
โโ
โโ
โโโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โโโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโโ
โ
โ
โโ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ โโ
โ
โ
โ
โโ
โ
โโ
โ
โโโ
โโ
โ
โ
โโโโ
โโ
โโโ
โ
โ
โโโโ
โ
โ
โ
โ
โโ
โ
โ
โ
โโโโ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โโโโโ
โ
โ
โ
โโ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โโ
โโโ
โ
โ
โโ
โ
โ
โ
โโ
โโโ
โโ
โโ
โ
โ
โ
โ
โโ
โโ
โ
โ
โโ
โ
โ
โ
โ โโ
โโโ
โ
โ
โ
โ
โโโโ
โโ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโ โ
โ
โโ
โ
โ
โโ
โ
โโ
โโ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โโ
โ
โโโ
โ
โ
โ
โ โโโ
โ
โ
โ
โโ
โโโ
โ
โ
โ
โโ
โ
โโ
โ
โ
โ
โโ
โ
โโ
โโ
โ
โ
โโ
โโโ
โ
โ
โ
โ
โโ
โ
โ
โโ
โโโ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โโโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโโ
โโ
โโ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โโโโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โโ
โ
โ
โ
โโ
โโ
โโโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โโโ
โโ
โ
โโ
โ
โโ
โ
โ
โ
โ
โโโ
โ
โ
โโ
โ
โโโโ
โ
โโ
โ
โโ
โ
โ
โโ
โโ
โโ
โ
โ
โโโ
โ
โ
โโโ
โโโ
โโ
โโ
โ
โโ
โ
โ
โ
โโ โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โโ
โโ
โ
โโ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโ
โโ
โ
โโ
โ
โโโ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ โโ
โ
โ
โโโ
โ
โ
โโ
โ
โ
โโ
โโโ
โ
โโ
โ
โ
โโ
โโโ
โ
โ
โ
โ
โ
โโ
โ
โโโโโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโโ
โ
โโ
โ
โ
โ โ
โ
โโ
โ
โโโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโโ
โ
โ
โโ
โ
โโโ
โ
โ
โ
โ
โ
โโโโ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โโ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โโโ
โโโ
โโ
โโ
โ
โโโ
โโ
โโ
โโ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โโ
โโ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโโ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โโ โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โโโโ
โ
โ
โ
โ
โ
โ
โโ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โโ
โโ
โโ
โ
โ
โ
โโ
โโ
โ
โ
โโโ
โ
โโโ
โ
โโ
โ
โโ
โ
โ โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โโโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โโ
โโโ
โโโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โโ
โโ
โโโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโโ
โ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โ โ
โโ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โโ
โ
โโโโ
โโ
โโ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โโ
โโ
โโ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โโโโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโโโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โโ
โ
โ
โโโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โโ
โโโ
โ
โ
โโ
โโโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โโโ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โโโ
โ
โ
โโ
โโโ
โ
โ
โ
โ
โโ
โ
โโ
โโโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโโโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โโโ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โโโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โโโ
โ
โโ
โ
โโโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โโ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โโ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโโ
โโ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โโ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ โ
โ
โ
โโโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โโโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โโโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโโโ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ โโ โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ โโ
โ
โ
โ
โ
โ
โโโ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โโ
โ
โ
โ
โโโ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โโ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ โ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โโ
โโโโ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโโ
โ
โ
โ
โโ
โ
โ
โ
โ โโ
โโ โโ โ โ
โโโโ
โ
โโ
โ
โโโ
โโ
โ
โโโโ
โโโ
โ
โ โโโโ โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ โ
โ
โ
โโโโ
โโ
โ
โโ
โ
โโโ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโโ
โโโ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โโ
โ
โโโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ โโ
โ
โโโโ โ โโ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โโ
โโโโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโโ
โ
โ
โโ
โ
โ
โ
โโ
โโ
โ
โ
โโ
โ
โโ
โ
โ
โ โ โโ
โโ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โโ
โ
โ
โโ
โ
โโโ
โ
โ
โ
โโ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ โโโ โ โโ
โ
โ
โโ
โ โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ โโ โโโโ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โโ
โ
โโ
โ
โโ
โโ
โ
โ
โ
โ
โ
โโ
โ
โโโโ
โโ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโโโ
โ
โ
โโ
โ
โโโ
โ
โ โ
โ
โ
โโ
โ
โ
โโ
โโ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โโ
โโโ
โโ
โ
โ
โโ โ โ
โ
โ
โ
โ
โโ
โโ
โโ
โโโ
โโโโ
โโโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โโ
โโ
โโ
โ
โ
โ
โ
โ โโ โโ
โโโ
โโ
โ
โโ
โ
โ
โโโโ
โ
โโ
โ
โ
โโโโ
โ
โโ
โ
โ
โ
โโโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ โ
โ
โโโ
โ
โ โ
โ
โโ โ
โ
โ
โ
โ โโโ โโ
โ
โ
โ
โ
โโ
โ
โโโโโ โโโโ โ
โโ
โโ
โโโ
โ
โโ
โ
โโ
โ
โโ โ
โโ
โ
โ
โ
โ
โโ
โ โโโ โโ
โ โ โโ
โ โโ
โ โโ โโโโ โโ โ โ
โโ
โ
โโโ โ
โ
โ
โ
โ โโ
โโ
โ โโโ
โ
โ โโ
โ
โโ
โโ
โ
โโ
โโ
โ โโโโ โโโ
โ
โ
โ
โโ
โ
โโโโโ โโ โ โโโ โ โ โ โ
โ
โ
โ
โโโ
โโโ
โ
โ
โ โโ
โ
โ โ โโ
โโ โ
โโ
โ
โ
โโ
โ โโ
โ โ
โโ
โโ
โ
โ โ
โ
โโ
โโ โ โโ
โโ
โ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
x1
(a)
0.0
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ โ โ
x1
pโvalue
โ
โ
โ
โโ
โ
โ
10
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ โ
โโโ
โ โ
โ
โ
โ
โ
โ โ
โ
โ
โ โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ โ
โ โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โโ
โ
โโ
โโ
โ โโ
โ
โ
โ โ
โ โ โ โ
โโ
โโ โ
โ
โ
โ
โ
โ
โ โ
โ โโ โ
โโ
โ โโ
โโโโ โ โ โ
โ
โ
โ โโ
โ โ โ โ
โโ
โ โ
โ
โ โโ โ
โ
โโ โ
โ
โ
โ
โ โ โโ โ
โ
โ โโโโ โ
โ โ โโโ โ โ โโ
โ โโ
โ
โ
โ
โโโ โ
โโโ
โโ
โ โ โ
โ
โ โ โโ โ
โ
โ
โ
โโ
โ
โโ โโโ
โ โ
โ
โ
โ
โโ โโโโโ
โ
โโ
โโโโ โ โ โโ โ โโ
โ
โ
โโ โ โ
โ
โ
โโ โ โ
โ โ
โโ
โ โโ โ
โโโโโ
โ
โ โโโโ
โ โ โโ
โ
โ โ
โ โโ
โโ
โ
โโโโ
โ
โโโ
โ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ โโ
โ โโ
โ
โโโโ โ
โ
โโ
โโโ โโ โโ โโ
โโ โโ
โโ โ
โโ โ โ
โ
โ
โโโ
โ โ โโ
โ
โ
โ โ โ
โโโโ โโ
โโ โโ
โ
โ
โ
โโโโ
โโ โโ โ
โ
โ
โโโ
โ
โ โโ
โโโโโ
โ โ
โ โ
โ
โ
โ
โ โโ
โโ
โโ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โโโ
โโ
โโ
โโ
โ โโ โ
โ
โ โ
โโ
โโ โ โโ
โ
โ
โ
โ
โโ
โ
โโ โ โ
โโโโโโ
โ โ
โ
โ
โ
โโโ
โ
โ
โโโโ
โโโ
โโ
โ
โ
โโ โโโโโ
โโโโ
โ โ โโโโ
โ
โ
โโ โ โโ
โโ โ
โ
โ โ โโ โ โ
โ
โโ
โโโโโ
โ
โ
โโ โโ
โ
โ
โ
โ
โ
โ โ โโโโ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โโโโ
โโ
โ
โ
โโโโ
โ
โ โโ
โ
โโ
โ
โโ
โโโ
โ
โ
โโ
โ โ
โโ
โ โ โโ
โโโโ
โ
โ
โ
โโ
โโโโโโโ
โ
โโ
โโโ
โโ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โโโ
โ
โ
โโ
โโโ โ
โ
โ
โ
โ
โโโ
โโ
โ
โโ โ
โโโโ โ
โโ
โโ
โ โ โ
โ โโโ
โ
โ
โโโ
โโ โ โ โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โโโโ
โโ
โโโ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โโโ
โ โ
โโโ
โโ
โโ
โ
โ
โโ
โ
โ
โ
โ
โโโ
โ
โ
โโ
โโ
โโ
โโโ
โโ
โโ
โ โ โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโโโ
โโ
โ
โ
โโ
โ
โโโโ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ โ โโโ โโ
โ
โ
โ
โ
โ
โโโ
โโ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโโโ
โ
โโโ
โ
โ
โ
โโ โ
โโโ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โโโโโ
โโ
โโโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโ
โโโ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโโ โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โโ
โ โโโ
โโ
โโ
โโ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โโ
โโโโ โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โโ
โ โ
โ
โโโ
โ โ
โ
โ
โโ
โ
โโโ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโโ
โ
โ
โ
โ
โ
โโโโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โโ โโโ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ โโ โโโ
โ
โโ
โ โ โโโ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โโโ
โโ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โโโโ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ โโ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โโ โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โ
โโ
โ
โ
โ
โโ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ โโ
โ
โ
โ
โ
โโ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโโ
โ
โ
โ
โโโโ
โ
โ
โ
โ
โโ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โโ
โ
โ
โ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โโโ
โ
โ
โ โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โโ โ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโโโโ
โ
โ
โ
โโ โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ โ
โ
โโ
โ
โ
โโ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโโโ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ โ
โ
โโ โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โโโ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โโ โโ
โ
โ
โ
โ
โ
โ
โโ โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โ
โ
โ
โโโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โโ โ โโโ โโโ โ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโโ โ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโโโโโโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โ โ โโโโ โโ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โ โ
โ
โ
โ โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ โ โ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โ โโ
โ โโ โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโโโ โ โ โโโ โ
โ
โ
โ
โ
โ โโ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โโ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โโโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โโ โโ
โ
โ
โ
โ โ
โโ
โ
โ
โโ โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โโโโ
โโโ โ
โ
โโ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโโ
โโ
โ โโโ
โ
โ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโโโ โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โโ โ
โ
โโ โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โโ
โ
โ
โ
โโ
โ
โโ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โโโโ
โ
โโ โ
โ
โโ
โ
โโโ โ
โ
โโโ
โโ
โ
โโ
โโ
โ โ
โโโ
โโโ
โโโ
โ
โ
โ โ
โ
โ
โโ
โ
โ โโโ
โ โ
โโ โ โ
โโโ
โ
โ
โ โ โ โ โโโโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
100
โ
radius
โ
โ
โ
0.8
0
โ
โ
โ
โ
โ
1
โ
1eโ01
0
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ โ โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
1e+01
x2
10000
x2
1e+03
25000
โ
13
10000
Threshold Selection for Multivariate Heavy-Tailed Data
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โโ
โ
โโ
โ
โ
โโโ
โ
โโโ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โโโโ
โโ
โโโโ
โ
โโ โ
โ
โ
โโ
โโ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโโ
โ
โ
โ
โ โ
โ โโ
โ
โโ โ
โโ
โ โโ
โ
โโ
โ
โโโ
โโ
โ
โ
โโ
โ
โโ
โโ
โโ
โโ
โโ
โโโโโ
โ
โ
โ
โ โโ
โโโ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ โ
โโ
โโ
โ
โ
โโ
โโ
โโ
โ
โโ
โ
โ โโ
โ
โ
โโโ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โโโ
โ
โ โโ
โ
โ
โโ
โ
โโ
โโ
โ
โโโ
โโ
โโโ
โ
โโโ
โ
โโ
โ
โโ
โโ
โ
โ
โ
โโโ
โ
โ
โ
โโ
โโ
โโ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โโ
โโ โโ
โโ
โ
โ
โโโ
โ โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
0.30
0.0
upper quantile
(d)
0.2
0.4
0.6
0.8
1.0
Theta
(e)
Fig 2. Example 6.2. (a) scatterplot of (Xi1 , Xi2 ); (b) scatterplot of (Xi1 , Xi2 ) in log-log scale; (c) scatterplot of (Ri , ฮi ); (d)
mean p-value path (black triangles), fitted WBS spline (blue line), and the chosen threshold quantile (red vertical line); (e)
estimated cdf of ฮ using the threshold chosen, compared with the theoretical limiting cdf (black dotted).
while
eโ1 โ eโ2
.
1 โ eโ2
Hence P(ฮ โ ยท|R > r) does not convergence as r โ โ and X = (Rฮ, R(1 โ ฮ)) is not regularly varying.
Let (Xi1 , Xi2 ) = (Ri ฮi , Ri (1 โ ฮi )), i = 1, . . . , n, be iid observations from this distribution, where
n = 20000. Figures 5(a), 5(b) and 5(c) show the data in Cartesian and polar coordinates. We apply our
threshold selection algorithm to the data, with the threshold upper quantile levels qk chosen as the 150
equidistant points between 0.01 and 0.2. The mean p-value pv k is calculated using m = 60 random subsamples
of size nk = 500 ยท qk from the observations with Ri > rk . This is shown in Figure 5(d).
In this model, the radial part R is regularly varying, but ฮ and R are dependent given R > r for any r. We
expect the mean p-values to be well below 0.5, as are observed. No threshold is selected by the algorithm.
This suggests that our technique can potentially be used to detect misspecified models from the regular
variation assumption, especially in the scenario where the heavy-tailedness of R is observed but dependence
between R and ฮ is suspected.
P(ฮ โ (0, 0.5)|R > e2k+1 ) =
7. Discussion
In this paper, we propose a threshold selection procedure for multivariate regular variation, for which R and
ฮ are approximately independent for R beyond the threshold. While our problem is set in the multivariate
heavy-tailed setting and we utilize distance covariance as our measure of dependence, our algorithm is
14
Wan and Davis
โ
โ โ
โ
โ
โ
โ
โ
โ
โ โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ โโ
โ โ
โโ
โ
โ
โโ
โ
โ
โ โ
โ โ
โ
โโ โ โ
โ โ โ โโ โ
โ โ
โ
โ
โ โ โโ
โ โโ โ โ โ
โ โโ โ
โ
โ โโ โ โ
โโ
โโโ
โโ
โ
โโโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โ
โ
โ
โ โ
โ
โโ
โโโ โโโโ
โ
โโโโโ โ โ
โ
โ
โโโ
โโ
โโ
โโ
โ
โ
โ
โโ โ
โ
โโ
โ
โ
โโโโ โ โโโโ
โ
โ
โ โโ
โโ
โ
โ โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โโ
โ โ
โ
โ
โโ
โ
โ
โโโโ
โโโโ
โ
โ
โ
โโโ โโโ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ โ
โโ
โ
โ
โโ
โ
โโ
โ
โ
โ โ
โโ
โ
โ
โโ
โโโ
โโโโโ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโโ
โโโ
โ
โ
โ
โโ โ โ
โ
โ
โ โโ
โโ โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โโ
โโโโ โ โโ โโโ โ
โ
โโโโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โโ
โโโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โโโ โโ โโ โ
โ
โ
โ
โ
โ
โ
โโโ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โโ
โ
โ
โ
โ
โ
โโ
โโ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โ โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โโ
โ
โ
โ
โ
โ
โ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ โ
โ
โโ โโ
โโ โ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ โ
โ
โ
โ
โ
โ
โโ โ โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โโ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโโ
โ
โโ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโโโ
โโโ
โ โโโ
โ
โ
โ โ
โ
โโ
0.00
0.01
0.02
0.01
โ
โ
โ
0.03
0.04
0.05
โ
โ
โ
โ
โ
โ
0.03
โ
โ
โ
โ
โ
โ
โ
โ โ
โ
โ
โ
โ
โ
โ โ
โ โ
โโโ โ
โ
โ
โ
โ
โ
โ
โโโโ โ
โ
โ โโ
โ
โ
โ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ โ
โ โ
โ โ
โ
โ
โ โ โโโ โ
โ โ
โ โโ โ
โ
โ
โ
โโ
โโ
โ โโโโ
โ โ โ โ
โโ
โ
โ โโโ โ
โ
โ
โ
โ
โ
โ
โ
โโโโโโ
โ
โ โโ โโ โโ โ
โโ โโโ
โ
โ โ
โ
โโ
โ
โโโโ
โโ
โ
โ
โ
โ โ
โโ โโ
โโ โ โ
โ โโ
โโโ
โ โโ
โโโ
โ
โ
โโ
โโ
โโ โ โ โ
โ
โ
โ
โโ
โโ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ โ โโโโ
โ
โ
โ โ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโโโโ
โ
โ
โ
โ
โโ
โโโ โ โโ
โโโ
โ
โโ โโ
โโโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโ
โ
โ
โโ
โ
โโโโ
โโโโ
โ
โ
โ
โ
โ โโ โ
โ
โ
โโ
โโโ
โ
โ
โ
โ
โ
โ
โโ
โ
โโโโ
โ
โโ
โ
โโ
โ
โโ
โ
โโ
โโ
โ
โโโโ
โ
โโโโ
โ
โ
โ
โโ
โโ
โโ โ
โ โโ โโโโโ
โ
โ
โ
โโโ โ
โ
โ
โโโ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โโ
โโโ
โ
โ
โ โ
โโ
โ
โ
โ
โ
โ
โ โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โโ
โ
โ
โ
โ
โ
โ
โโ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โโ โ โ
โ
โ
โ
โ
โ
โ โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ โ โโโ
โ
โ
โ
โ
โ โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โโ
โ
โโ
โ
โโ
โ
โ
โ
โโ
โ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโโโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ โ
โ
โ
โ
โ
โ โ โโ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โโโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ โโ
โ
โ
โ
โโโ โโ โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ โ
โ
โ
โ
โ
โ
โ
โ
โโโโโโ โ โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โ โ
โ
โ
โ
โ
โโ โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ โ
โโ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโโโโ โ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โ โ โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ โ โ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โโ
โโ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโโโ
โโโ โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโโ โโโโ
โ
โ
โ
โ
โ
โ
โ โ โ โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ โ โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ โ โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
0.005
GBP
โ
โ
โ
โ
โ
0.010
โ
โ
0.000
โ
โ
0.010
0.020
โ
0.030
DEM
(c)
DEM/CHF
5
1.2
CAD/CHF
0.8
Density
0.4
3
2
0.0
0
0.0
1
0.5
1.0
Density
4
1.5
โ
โ
โ
โ
(b)
GBP/CHF
โโ
โ
โ
โ
0.015
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ โ
โโ โ โ
โ โ
โ โ โโ
โ
โ
โ โโ
โ โ โโโ
โ โ
โ โ
โ โโ
โโโ โ โ
โ
โโโโ โ โ โ โ
โ
โ โ โ
โ
โ
โโ โ
โโ
โ
โ
โ โ โโ โ
โโโโ
โโโโ โ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ โโ
โ โ
โ
โ โโ
โโ โโ
โ
โ โ โ
โโ โ โ
โโ
โ
โ
โ โ
โ
โ
โ
โ โโ
โ
โ
โ โโโโโ
โ โโโ โโโ โ
โ
โ โโ
โ
โโ
โ
โ โ
โโโ
โ
โโ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โโ
โ
โ
โโโโ
โ
โ
โ
โ โ
โโ
โโ โ โ
โ
โ
โ
โ
โโ
โ โโโโ
โโ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โโ
โ
โ
โโ
โโ
โ
โ
โ
โ โ
โ
โโ โ โโ
โโ
โโ
โโโ
โ
โ โโ
โ
โ
โโ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ โ โโ
โโโโโ
โ
โ
โ
โ
โโ
โโโโ
โ
โ
โโโ
โ
โโโ
โโ โ โ
โโ
โโ
โ
โ
โ โ
โโโโ
โ
โ
โโ
โ
โโ
โ
โ
โโโ
โโโโ โโโ
โ
โ
โ
โโโ
โ
โโโ โ
โ
โ โ
โ โ
โ
โ
โโโ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โโ
โ
โโ
โโ
โ
โ
โ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โโโ
โ
โ
โ โ
โโโ
โโโโ โ
โโโโ
โ
โ
โ
โโโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ โโโ โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โโ
โ โโโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ โ โโ
โ
โ
โ
โ
โ
โ
โโโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโโ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โโโ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โ โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โ
โ
โ
โ
โ
โ
โ
โ
โ โโ โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ โโ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โโโ
โโโ โโโ
โ
โ
โโโ
โ โ โ
โโ
โ
โโ โ
โ
โ
โโ
โ
โโ
CAD
(a)
Density
โ
โ
โ
โ
โ
0.000
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
0.02
โ
โ
โ
โ
โ
CHF
โ
0.02
โ
0.00
0.02
0.01
โ
โ
CHF
โ
โ
โ
โ
โ
โ
โ
โ
0.00
โ
โ
โ
โ
โ
0.01
โ
โ
โ
0.00
โ
โ
โ
CHF
โ
0.03
0.03
โ
โ
โ
โ
0.0
0.5
1.0
Theta
(d)
1.5
0.0
0.5
1.0
Theta
(e)
1.5
0.0
0.5
1.0
1.5
Theta
(f)
Fig 3. Example 6.3. Analysis of the paired exchange rate returns: CHF/DEM, CHF/GBP, CHF/CAD with respect to USD
between 1990-01-01 to 1998-12-31. (a)โ(c): Scatter plots of the standardized paired exchange rate returns; (d)โ(f ): Estimated
angular densities using the estimated thresholds chosen.
essentially a change point detection method based on p-values generated through subsampling schemes.
Hence this may be generalized to other problem settings and potentially incorporates other dependence
measures. Though we have proposed an automatic selection for the threshold based on the fitted mean
p-value path, we would like to emphasize that, like the Hill plot, this should be viewed as a visual tool
rather than an optimal selection criterion. The final threshold should be based on the automatic procedure
in conjunction with visual inspection of the p-value path.
We note that the choice of norm in the polar coordinate transformation (2.1) may result in significant differences in the choice of thresholds, which indicates the rate of convergence to the limit spectral density. This
is especially evident in the near โasymptotic independenceโ case, where the mass of the angular distribution
concentrates on the axes.
As an illustration, we simulated iid observations {(Xi1 , Xi2 )}i=1,...,n from the bivariate logistic distribution, where the cdf is given in (4.10), with ฮณ = 0.95 and n = 10000. We apply the polar coordinate
transformation with respect to the Lp -norm for p = 0.2, 1, 5. Note that in the case of p = 0.2, Lp is only a
quasi-norm as it does not satisfy the triangular inequality. However, it can be shown that (2.4) holds and
the limiting angular distribution exists for bivariate logistic distribution. We compare the threshold selection
results in Figure 6. Note that in the cases of the L1 and L5 -norms, the threshold levels are chosen to be upper
5% and 12%, respectively, while in the case of the L0.2 -norm, it is not possible to select the threshold as the
dependence between R and ฮ at all levels were shown to be significant. Indeed, this can be seen in Figure 7,
where we compare the histogram of X1p /(X1p + X2p ) given kXkp is large across three levels of truncations, 2%,
5% and 12%, together with the theoretical limiting density curve. For the L0.2 -norm, the limiting angular
density is poorly approximated by the truncated data for all levels. For the other two norms, the truncated
Threshold Selection for Multivariate Heavy-Tailed Data
15
1.0
GBP/CHF
0.6
0.4
0.0
0.2
pโvalue
0.8
meanโpv
change point
fitted spline
โ
0.00
0.05
0.10
0.15
0.20
0.25
0.30
upper quantile
(a)
1.0
CAD/CHF
0.6
0.4
0.0
0.2
pโvalue
0.8
meanโpv
change point
fitted spline
โ
0.00
0.05
0.10
0.15
0.20
0.25
0.30
upper quantile
(b)
1.0
DEM/CHF
0.6
0.4
0.0
0.2
pโvalue
0.8
meanโpv
change point
fitted spline
โ
0.00
0.05
0.10
0.15
0.20
0.25
0.30
upper quantile
(c)
Fig 4. Example 6.3 (cont.). Analysis of the paired exchange rate returns: CHF/DEM, CHF/GBP, CHF/CAD with respect to
USD between 1990-01-01 to 1998-12-31. (a)โ(c): mean p-value paths (black triangles), fitted WBS splines (blue lines) and the
chosen threshold quantiles (red vertical line).
โ
โ
โ
โ
โ
โ
0
2000
4000
6000
โ
โ
โ
โ
โโ
โ
โ
โ
8000
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
1eโ04 1eโ02 1e+00 1e+02 1e+04
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โโ
โ โ โ
โ
โ
โ
โ
โ
โ
โ โ
โ
โ
โ
โ โโ
โ
โ
โ
โ โ
โ
โ โ
โ โโ
โ
โ
โ
โ โโ
โ
โโ โโ
โ โโ
โ
โ
โ โ โโโโ โโ โ โ
โ
โ
โ โ โ โ
โ
โ โ
โ
โ โโ โ
โ โ
โโ โ
โ โโ
โโโ
โโ โ โ
โโ
โ
โโ
โ โโ
โ
โ
โโโ
โโ
โ
โโ โ
โ โ โโโโ โ
โ โ
โ
โโโ
โ โโ โโ โ
โ
โโ โโ
โ โโ
โ
โ
โ โ โ โ โ
โโ โ โ
โ
โ โโ โโ
โ
โ โโ
โ
โ
โ โ โ
โโ
โ
โโ
โโ
โ
โ
โ
โ
โโ โ โ โโ
โ
โ โ โโโ โโโ
โ
โ โ
โ โโ
โ
โ โ โโ โ โ โ โ โโโ โ
โ โโ
โโโโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโ
โโ
โโโโ
โ โ โ
โ
โ
โโโ โโ
โ โโ โ
โโ
โโ โ โ
โโ โ
โ
โ
โ
โ
โโ
โ
โ
โโโโ
โ โ
โ โ
โ โ โ
โ
โโ โโ
โโ
โ
โ โ โโ โโโโ โ โ
โ
โโ
โโโ
โโ โ
โ โโ โ โ โโ
โโ
โ โโโโโโ โ
โโโ โ
โ
โ โโ โโโ
โ โโโ โ โ โโ
โโโโ โ
โ
โโโ โ โโ
โ โ
โโ
โ
โ
โ
โ โ
โ โ โโ โโ โ
โ โ โ โ โ โโ
โ โ
โโโ โ
โ
โ
โ โโ โโ
โ
โ
โโ
โ โ
โโ
โโ
โ
โโ โ
โ
โ
โ
โ โโ
โโโโโโ
โ โ
โโ
โ
โ
โ
โโ
โโ
โโ
โโ โโโ
โ
โโ โ โ โโโโ โโโโ
โ
โโ
โ โโ
โ โโ
โโ
โ
โ
โโ
โ
โโโ
โโโ
โโ
โ
โ โโโโ
โ
โโ
โ
โโ
โ โ
โโโ
โ โ โโ โโ
โ
โ
โ
โโ โ
โ โโ
โ
โโ
โโโ
โ โโโ
โ
โ
โโ
โโ
โโ
โ
โโ
โ
โโโ โ โ
โโ
โโโ โ โ
โโ
โ
โโ
โ
โ โ
โ
โ โ โโโโโ โโ
โ
โโ โโ โโโโโ
โ โ โ
โโ
โโ
โ
โโ
โโโโโ โ
โโโโ
โ
โ
โ โโ
โ
โโโ
โโ
โ
โ โโโ
โ
โ
โ
โโ
โโ
โโ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ โ
โ
โ
โโ
โ
โโ
โ โโโ
โ
โ
โโ
โโโโ
โ โโ โ
โ
โโ
โ
โโโ
โ
โโ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ โ
โ โโโ
โ
โโ
โ
โ โโ โโโโ
โ
โ โ โโ
โ
โ
โ
โ
โโโ
โ โ
โโโโโ
โ
โ
โโโ
โโ
โ
โโโโ โโ
โโ
โ
โ
โโ
โ โโ
โ
โโ
โ
โโ
โ
โ
โโ
โ
โโ
โ
โโ โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโโ
โ
โโ
โ
โ
โ
โโ
โ
โ โ
โ
โ
โ
โ
โโ
โโ
โโโโ
โ
โโ
โ
โ
โ
โ
โโ
โโ
โ โโโ โโ
โโโ โโ
โ
โ
โ
โ
โ
โ
โโ
โ โ
โ
โโโ
โโ
โโ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ โโ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โโ
โ
โโ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโโโ
โโโโ
โ
โ
โ
โ
โโ
โ
โโโ
โ
โ
โ
โ
โ
โโ
โโ
โ โ
โโ
โโโ
โโ
โโ
โโ
โโ
โ
โ โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โโ
โโโโ โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โโโโ
โโโโ
โโ โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โโโ โ
โ
โ
โ
โ
โ
โโโโ
โโ
โ
โ
โโ
โโ โโโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโโ
โโ
โโ
โโ
โ
โ
โ
โโ
โ
โโ
โ
โโ
โ
โโโ
โ โ โโ
โ
โ
โ
โ
โโโ
โ
โ
โโ
โ
โ
โโ
โ
โ
โโ
โ
โโ
โโ
โโ
โโ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โโโ
โ
โโ
โโ
โโ
โ
โ โโ
โ
โ
โโ
โ
โ
โโโ
โโ โ โ
โ
โโ
โโโโโ
โโ
โโ
โ
โโโโโ
โโโโโ
โ
โโ โ
โโโ
โ
โโโโ
โโ
โ
โ
โ
โโ
โโโ โ
โ
โ
โโ
โ
โ
โโโ
โ
โ
โ
โ
โ
โโโ
โ
โโ
โ
โโ
โโโ
โ
โโ โ
โ
โโ
โโ
โโ
โ
โ
โโโ
โโ
โ
โโโโ
โ
โโโ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โโโโ
โโ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโโโ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ โโโ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโ
โ
โโโโ
โโ
โ
โ
โ
โโ
โโ
โ
โโ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โโโโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โโ
โ
โโ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโโ
โโ
โ
โ
โโ โ
โโ
โ
โโ
โ
โ
โ
โ
โโ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โโโโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โโ
โ
โโ
โโโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โโ
โ
โโ
โ
โโ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โโ
โ
โ
โ
โโ
โ
โโ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โโโ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโ
โ
โโ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โโโ
โโ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โโ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโโ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โโ
โโ
โโ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ โ
โโ
โ
โ
โ โ โ
โ
โ
โ
โ
โ
โโโ โ โ
00
x1
โ
02
04
06
08
10
ang e
(b)
(c)
10
(a)
โ
โ
โ
โ
โ
โ
x1
โ
โ
โ
ad us
โ
โ โ
โ
1eโ04
โ
โ
โ
โ
โ
โโ โโ โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โโ
โ
โ
โ
โ
โ โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
1
โ
โโ
โ
โ
โ
โ
โโ
100
1e+00
x2
5000
x2
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ โ
โ
โ
โโ โโ โโโโ
โโโ
โ
โ
โโ
โ
โ
โโโโ โ
โ โโ โ
โ
โ
โโ
โ
โ
โ
โ
โโโ
โ โโ
โ
โโ
โโ
โโ
โ
โโ
โ
โ
โ
โโโโ
โ
โ โ โโ โ
โโ
โโ
โ
โ
โ โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโโโโ
โ
โ
โโ
โ
โ
โ
โโ
โ
โโโ
โโ
โโ โโ
โ
โ
โ โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โโโ
โ
โ
โ
โ โ
โ
โโ
โ
โโโ
โ
โ
โ
โ
โ
โ
โโ โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโโโ
โ
โ
โ
โ
โ
โโ
โโ โโโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโ โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ โโ
โ
โ
โ
โโ
โ
โโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โโ
โ
โ
โโโ
โ
โ
โ
โโ
โโโ
โโ
โโโโ
โ
โ
โ
โ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โโ
โโ
โ
โ
โ
โ
โ โ โ โโ โ โโ โ
โ
โ
โ
โ
โ
โ
โ โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โโโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โโ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โ โ โโโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ โ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโโ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โ
โ
โ
โโ
โ
โ
โ
โ
โโ
โ
โ โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โโ
โ โโโ
โ
โ
โ
โ
โ
โ
โ
โ
โ โโ
โ
โ
โ
โ
โ
โโ
โ
โโ
โ
โ โโ
โ
โ
โโ
โ
โ
โโ
โโ
โ
โโโ
โโ
โโ โโ
โ
โโโโ
โ
โโ
โโโ
โโ โ
โ
โโ
โ โ
โ
โโ โ
โโ
0
โ โโ
โ
โ
โ
10
โ
15000
โ
10000
Wan and Davis
1e+04
16
06
04
00
02
pโva ue
08
m
0 00
0 05
0 10
0 15
0 20
uppe quan e
(d)
F g 5 Examp e 6 1 (a) sca erp o o (X 1 X 2 ) (b) sca erp o o (X 1 X 2 ) n og- og sca e (c) sca erp o o (R ฮ ) (d)
mean p-va ue pa h (b ack r ang es) fi ed WBS sp ne (b ue ne) and he chosen hresho d quan e (red ver ca ne)
observat ons accord ng to the se ected thresho d prov de decent approx mat ons to the true m t ng dens ty
of the angu ar component One poss b e exp anat on for th s s that under the L0 2 -norm the thresho d s
concave and hence observat ons on the d agona are much eas er to be c ass fied as โextremesโ than those
near the ax s As a resu t the est mator of the angu ar dens ty uses more observat ons near the d agona
wh ch may not be n fact c ose enough to the m t Th s cho ce of norm s an nterest ng top c and s the
subject of ongo ng research
Acknowledgement
The fore gn exchange rate data are obta ned from OANDA from through R-package qrmtoo s We wou d
ke to thank Bodh sattva Sen for he pfu d scuss ons We wou d a so ke to thank the ed tor and referees for
the r many construct ve and ns ghtfu comments
References
P J B cke and M J W chura Convergence cr ter a for mu t parameter stochast c processes and some app cat ons Ann. Statist. 42 1656โ1670 1971
P B ngs ey Probabi ity and measure. W ey-Intersc ence 3rd ed t on 1995
R A Dav s and T M kosch The extremogram A corre ogram for extreme events Bernou i 15(4) 977 โ
1009 2009
Threshold Selection for Multivariate Heavy-Tailed Data
17
1.0
L0.2โnorm
0.6
0.4
0.0
0.2
pโvalue
0.8
meanโpv
change point
fitted spline
โ
0.00
0.05
0.10
0.15
0.20
upper quantile
1.0
L1โnorm
0.6
0.4
0.0
0.2
pโvalue
0.8
meanโpv
change point
fitted spline
โ
0.00
0.05
0.10
0.15
0.20
upper quantile
1.0
L5โnorm
0.6
0.4
0.0
0.2
pโvalue
0.8
meanโpv
change point
fitted spline
โ
0.00
0.05
0.10
0.15
0.20
upper quantile
Fig 6. Simulated logistic data of sample size n = 10000 with ฮณ = 0.95. Threshold selection algorithm applied under the L0.2 -,
L1 - and L5 -norms: mean p-value paths (black triangles), fitted WBS splines (blue lines) and the chosen threshold quantiles
(red vertical line).
R.A. Davis, T. Mikosch, and I. Cribben. Towards estimating extremal serial dependence via the bootstrapped
extremogram. J. Econometrics, 170(1):142โ152, 2012.
R.A. Davis, M. Matsui, T. Mikosch, and P. Wan. Applications of distance covariance to time series.
arXiv:1606.05481, 2017.
L. de Haan and J. de Ronde. Sea and wind: Multivariate extremes at work. Extremes, 1:7โ46, 1998.
P. Doukhan. Mixing: Properties and Examples. Springer-Verlag, New York, 1994.
A. Feuerverger. A consistent test for bivariate dependence. Internat. Statis. Rev., 61(3):419โ433, 1993.
P. Fryzlewicz. Wild binary segmentation for multiple change-point detection. Ann. Statist., 42(6):2243โ2281,
2014.
S. Jeon and R.L. Smith.
Dependence structure of spatial extremes using threshold approach.
arXiv:1209.6344v1, 2014.
H. Joe, R.L. Smith, and I. Weissman. Bivariate threshold methods for extremes. JRSS. B., 54(1):171โ183,
1992.
A. Mallik, B. Sen, M. Banerjee, and G. Michailidis. Threshold estimation based on a p-value framework in
dose-response and regression settings. Biometrika, 98(4):887โ900, 2011.
E.S. Page. Continuous inspection schemes. Biometrika, 41(1):100โ115, 1954.
S.I. Resnick. Hidden regular variation, second order regular variation and asymptotic independence. Ex-
18
Wan and Davis
L0.2โnorm, 95%
L0.2โnorm, 88%
2.5
0.4
0.6
0.8
1.0
2.0
1.0
0.0
0.2
0.4
0.6
0.8
1.0
0.0
0.2
0.4
0.6
Theta
Theta
Theta
L1โnorm, 98%
L1โnorm, 95%
L1โnorm, 88%
0.8
1.0
0.8
1.0
0.8
1.0
3
4
0.2
0.4
0.6
0.8
1.0
0.0
0.2
0.4
0.6
0.8
1.0
0.0
0.2
0.4
0.6
Theta
Theta
Theta
L5โnorm, 98%
L5โnorm, 95%
L5โnorm, 88%
0.2
0.4
0.6
0.8
1.0
Density
5
0
5
0
0.0
10
15
20
15
Density
10
20
15
10
0
5
Density
20
25
25
0.0
0
0
0
2
1
2
4
2
4
Density
6
Density
8
6
Density
10
8
5
12
10
14
6
0.2
0.0
0.5
0.5
0.0
0.5
0.0
0.0
1.5
Density
1.5
Density
1.0
1.5
1.0
Density
2.0
2.0
2.5
2.5
L0.2โnorm, 98%
0.0
0.2
Theta
0.4
0.6
0.8
1.0
0.0
Theta
0.2
0.4
0.6
Theta
Fig 7. Simulated logistic data of sample size n = 10000 with ฮณ = 0.95. Histogram of X1p /(X1p + X2p ) for truncated levels 2%,
5% and 12% for p = 0.2, 1, 5.
tremes, 5:303โ336, 2002.
S.I. Resnick. Heavy-tail phenomena: probabilistic and statistical modeling. Springer-Verlag, New York, 2007.
C. Staฬricaฬ. Multivariate extremes for models with constant conditional correlations. J. Empir. Finan., 6:
515โ553, 1999.
G.J. Szeฬkely, M.L. Rizzo, and N.K. Bakirov. Measuring and testing dependence by correlation of distances.
Ann. Statist., 35:2769โ2794, 2007.
Appendix A: Proof of Theorem 4.1
Note from the definition of the empirical distance covariance in (4.1), the integrand can be expressed as
Cn (s, t)
=
n
1 X isRj /rn +itT ฮj
e
1{Rj >rn }
npฬn j=1
โ
n
n
1 X isRj /rn
1 X itT ฮk
e
1{Rj >rn }
e
1{Rk >rn }
npฬn j=1
npฬn
k=1
=
n
T
1 X isRj /rn
e
โ ฯ R |rn (s) eit ฮj โ ฯฮ|rn (t) 1{Rj >rn }
rn
npฬn j=1
โ
n
n
1 X isRj /rn
1 X itT ฮk
e
โ ฯ R |rn (s) 1{Rj >rn }
e
โ ฯฮ|rn (t) 1{Rk >rn } .
rn
npฬn j=1
npฬn
k=1
Threshold Selection for Multivariate Heavy-Tailed Data
T
Writing Ujn = eisRj /rn โ ฯ R |rn (s) 1{Rj >rn } , Vjn = eit ฮj โ ฯฮ|rn (t) 1{Rj >rn } , we have
19
rn
n
pn 1 X Ujn Vjn
Cn (s, t) =
โ
pฬn n j=1 pn
pn
pฬn
2
n
n
1 X Ujn 1 X Vkn
.
n j=1 pn n
pn
k=1
Since EUjn = EVjn = 0 and EUjn Vjn /pn = ฯ R ,ฮ|rn (s, t) โ ฯ R |rn (s)ฯฮ|rn (t), it is convenient to mean
rn
rn
correct the summands and obtain
n
n
n
p 2 1 X
pn 1 X Ujn Vjn
Ujn 1 X Vkn
n
โ
Cn (s, t) =
โ ฯ R ,ฮ|rn (s, t) โ ฯ R |rn (s)ฯฮ|rn (t)
rn
rn
pฬn n j=1
pn
pฬn
n j=1 pn n
pn
k=1
pn
+ (ฯ R ,ฮ|rn (s, t) โ ฯ R |rn (s)ฯฮ|rn (t))
rn
pฬn rn
2
pn
pn
pn
=:
Eฬ1 โ
Eฬ3
Eฬ21 Eฬ22 +
pฬn
pฬn
pฬn
2
pn
pn
pn
Eฬ1 โ
Eฬ3
=:
Eฬ2 +
pฬn
pฬn
pฬn
Note that Eฬ1 , Eฬ21 , Eฬ22 are averages of iid zero-mean random variables and Eฬ3 is non-random. We first prove
the second part of Theorem 4.1. The first part of Theorem 4.1 follows easily in a similar fashion.
Proof of Theorem 4.1(2). In order to show (4.6), it suffices to establish that
2
Z
Z
pn
d
npฬn
|Eฬ1 |2 ยต(ds, dt) โ
|Q(s, t)|2 ยต(ds, dt),
pฬ
d+1
d+1
n
R
R
and
Z
npฬn Tn โ npฬn
Rd+1
pn
pฬn
2
p
|Eฬ1 |2 ยต(ds, dt) โ 0,
where (A.2) can be implied by
2
2
Z
Z
pn
pn
p
npฬn
|Eฬ2 |2 ยต(ds, dt) + npฬn
|Eฬ3 |2 ยต(ds, dt) โ 0.
pฬn
pฬn
Rd+1
Rd+1
(A.1)
(A.2)
(A.3)
Notice that
pฬn
E
โ1
pn
2
n
1X
=E
n j=1
2
1{Rj >rn }
โ1
pn
=
1 1{R1 >rn }
E
โ1
n
pn
2
โค
1
1
O(1) + O(1) โ 0.
npn
n
p
Hence pฬn /pn โ 1 and for (A.1) and (A.3), it is equivalent to prove that
Z
Z
d
npn
|Eฬ1 |2 ยต(ds, dt) โ
|Q(s, t)|2 ยต(ds, dt)
Rd+1
and
Z
Z
2
|Eฬ2 | ยต(ds, dt) + npn
npn
(A.4)
Rd+1
Rd+1
p
|Eฬ3 |2 ยต(ds, dt) โ 0.
(A.5)
Rd+1
We will show the convergence (A.4) in Proposition A.1. By (4.5),
Z
npn
|Eฬ3 |2 ยต(ds, dt) โ 0.
Rd+1
So that (A.5) holds provided
Z
npn
p
|Eฬ2 |2 ยต(ds, dt) โ 0,
Rd+1
which follows in a similar fashion as Proposition A.1.
(A.6)
20
Wan and Davis
Proposition A.1. Assume ยต satisfies
Z
(1 โง |s|ฮฒ )(1 โง |t|2 )ยต(ds, dt) < โ,
Rd+1
and that npn โ โ as n โ โ, then
Z
npn
d
|Eฬ1 |2 ยต(ds, dt) โ
Z
Rd+1
|Q(s, t)|2 ยต(ds, dt),
Rd+1
where Q is a centered Gaussian process with covariance function (4.7).
Proof of Proposition A.1. We first show that
โ
d
npn Eฬ1 โ Q(s, t),
on C(Rd+1 )
(A.7)
โ
which can be implied by the finite distributional convergence of npn Eฬ1 (s, t) and its tightness on C(Rd+1 ).
Write
n
n
1 X
1 X Ujn Vjn โ
โ
npn Eฬ1 = โ
Yjn ,
โ pn (ฯ R ,ฮ|rn (s, t) โ ฯ R |rn (s)ฯฮ|rn (t)) =: โ
โ
rn
rn
pn
n j=1
n j=1
where Yjn โs are iid random variables with mean 0. For fixed (s, t), note that
Var(Y1n ) = E|Y1n |2 =
E1{R1 >rn }
E|U1n V1n |2
(1 + o(1)) =
O(1) < โ.
pn
pn
On the other hand, any ฮด > 0,
E|Y1n |2+ฮด =
E|U1n V1n |2+ฮด
1+ฮด/2
pn
(1 + o(1)) โค c
E1{R1 >rn }
1+ฮด/2
pn
(1 + o(1)) = O(pโฮด/2
)
n
Then we can apply the central limit theorem for triangular arrays by checking the Lyapounov condition (see,
e.g., Billingsley (1995)) for the Yjn โs:
ฮด
Pn
โ
E|Yjn |2+ฮด
O(npn 2 )
โ ฮด2
=
) โ 0.
ฮด
ฮด = O((npn )
P
2+ฮด
1+
1+
2
2
2
n
Var(Y1n )
n
Var
Y
jn
j=1
j=1
It follows easily that for fixed (s, t),
โ
d
npn Eฬ1 โ Q(s, t).
The finite-dimensional distribution can be obtained using the Crameฬr-Wold device and the covariance function can be verified through calculations.
โ
We now show the tightness of npn Eฬ1 . Note that
T
isRj /rn
it ฮj
n
R
e
โ
ฯ
(s)
e
โ
ฯ
(t)
1{Rj >rn }
X
ฮ|r
|r
n
1
n
rn
Eฬ1 (s, t) =
n j=1
pn
โ ฯ R ,ฮ|rn (s, t) โ ฯ R |rn (s)ฯฮ|rn (t)
rn
rn
๏ฃซ
๏ฃถ
T
n
isRj /rn +it ฮj
X
e
1
1
{Rj >rn }
โ ฯ R ,ฮ|rn (s, t)๏ฃธ
= ๏ฃญ
rn
n j=1
pn
๏ฃซ
๏ฃถ
n
isRj /rn
X
e
1
1
{Rj >rn }
โ๏ฃญ
โ ฯ R |rn (s)๏ฃธ ฯฮ|rn (t)
rn
n j=1
pn
Threshold Selection for Multivariate Heavy-Tailed Data
๏ฃซ
๏ฃถ
T
n
X
eit ฮj 1{Rj >rn }
1
pฬ
n
โ๏ฃญ
โ ฯฮ|rn (t) ๏ฃธ ฯ R |rn (s)
rn
n j=1
pn
pn
21
=: Eฬ11 + Eฬ12 + Eฬ13 .
โ
โ
โ
Without loss of generality, we show the tightness for npn Eฬ11 and that of npn Eฬ12 and npn Eฬ13 follows
from the same argument.
First we introduce some notation following that from Bickel and Wichura (1971). Fix (s, t), (s0 , t0 ) โ Rd+1
where s < s0 and t < t0 . Let B be the subset of Rd+1 of the form
B := ((s, t), (s0 , t0 )] = (s, s0 ] ร
d
Y
(tk , t0k ] โ Rd+1 .
k=1
For ease of notation, we suppress the dependence of B on (s, t), (s0 , t0 ). Define the increment of the stochastic
process Eฬ11 on B to be
n
Eฬ11 (B)
P
X
1X X X
(โ1)d+1โ j zj
ยทยทยท
n j=1 z =0,1 z =0,1 z =0,1
:=
0
1
d
0
Eฬ11 (s + z0 (s โ s), t1 + z1 (t01 โ t1 ), . . . , td + zd (t0d โ td )) .
From a sufficient condition of Theorem 3 of Bickel and Wichura (1971), the tightness of
if the following statement holds for any (s, t), (s0 , t0 ) and corresponding B,
d
Y
โ
|tk โ t0k |ฮฒ ,
E| npn Eฬ11 (B)|2 โค c|s โ s0 |ฮฒ
โ
npn Eฬ1 is implied
for some ฮฒ > 1.
k=1
It follows that
โ
E
npn Eฬ11 (B)
= npn E
X
ยทยทยท
z0 =0,1
2
X
(โ1)d+1โ
P
j
n
d
1 X i(s+z0 (s0 โs))Rj /r Y i(tk +zk (t0k โtk ))ฮjk 1{Rj >rn }
e
e
n j=1
pn
zj
zd =0,1
k=1
"
โ
X
X
ยทยทยท
z0 =0,1
(โ1)
d+1โ
P
j
zj
E
e
i(s+z0 (s0 โs))R/r
d
Y
zd =0,1
k=1
n
e
i(tk +zk (t0k โtk ))ฮk
1{R>rn }
pn
#
2
d
Y
1{Rj >rn }
0
0
1 X isRj /rj
= npn E
(e
โ eis Rj /rj )
(eitk ฮjk โ eitk ฮjk )
n j=1
pn
k=1
"
โE (e
isR/r
โe
is0 R/r
)
d
Y
(e
k=1
0
= pn Var (eisR/rj โ eis R/rj )
d
Y
(eitk ฮk
k=1
๏ฃฎ
0
โค E ๏ฃฐ (eisR/r โ eis R/r )
d
Y
1{R>rn }
โe
)
pn
!
it0k ฮk 1{R>rn }
)
โe
pn
๏ฃน
2
itk ฮk
0
(eitk ฮk โ eitk ฮk )
#
2
it0k ฮk
(A.8)
R > rn ๏ฃป .
k=1
From a Taylor series argument,
0
|eix โ eix |2 โค c1 โง |x โ x0 |2 โค c1 โง |x โ x0 |ฮฒ โค c|x โ x0 |ฮฒ ,
for any ฮฒ โ (0, 2].
22
Wan and Davis
Hence for any ฮฒ โ (1, 2 โง ฮฑ),
โ
E
2
โค
npn Eฬ11 (B)
d
Y
0 ฮฒ
c|s โ s |
"
|ti โ
t0i |ฮฒ E
ฮฒ
(R/rn )
k=1
d
Y
c|s โ s0 |ฮฒ
<
d
Y
#
ฮฒ
|ฮk | |R > rn
k=1
|ti โ t0i |ฮฒ ,
k=1
since |ฮk |ฮฒ โs are bounded and supn E[(R/rn )ฮฒ |R > rn ] < โ by the regular variation assumption. This proves
the tightness.
Define the bounded set
Kฮด = {(s, t)| ฮด < |s| < 1/ฮด, ฮด < |t| < 1/ฮด},
for ฮด < .5.
Then, using (A.7), we have from the continuous mapping theorem,
Z
Z
d
npn
|Eฬ1 |2 ยต(ds, dt) โ
|Q(s, t)|2 ยต(ds, dt).
Kฮด
(A.9)
Kฮด
On the other hand, for any ฮฒ < 2 โง ฮฑ, we have
โ
E| npn Eฬ1 |2
2
n
1X
= npn E
n j=1
โค
โค
Ujn Vjn
Ujn Vjn
โE
pn
pn
E|Ujn Vjn โ EUjn Vjn |2
pn
c E|Ujn Vjn |2
p
n
c E eisRj /rn โ ฯ R |rn (s)
(A.10)
2
rn
=
T
eit
ฮj
2
โ ฯฮ|rn (t) 1{Rj >rn }
pn
cE
eisRj /rn โ 1
2
2
+ ฯ R |rn (s) โ 1
rn
โค
cE 1 โง
sRj
rn
2
+E 1โง
ฮฒ
+E 1โง
sRj
rn
2
sRj
rn
sRj
rn
1 โง |s|
cE
โค
โค cE
ฮฒ
Rj
rn
ฮฒ
+E
R
rn
ฮj
2
+ ฯฮ|rn (t) โ 1
โ1
2
1{Rj >rn }
| rRn
| rRn
p
n
h
i
>1
1 โง |tฮj |2 + E 1 โง |tฮj |2 | rRn > 1 1{Rj >rn }
| rRn
p
n
2
>1
1 โง |t| 1{Rj >rn }
ฮฒ
โค
T
eit
p
n
h
i
>1
1 โง |tฮj |2 + E 1 โง |tฮj |2 | rRn > 1 1{Rj >rn }
โค
cE 1 โง
ฮฒ
pn
1 โง |s|ฮฒ (|Rj /rn |ฮฒ + E[|R/rn |ฮฒ |R > rn ]) 1 โง |t|2 |R > rn
โค c(1 โง |s|ฮฒ )(1 โง |t|2 ).
Therefore for any > 0,
"
Z
lim lim sup P npn
ฮดโ0 nโโ
#
2
|Eฬ1 | ยต(ds, dt) >
Kฮดc
โค
1
lim lim sup
ฮดโ0 nโโ
Z
Kฮดc
โ
E| npn Eฬ1 |2 ยต(ds, dt)
Threshold Selection for Multivariate Heavy-Tailed Data
23
1
lim lim sup
ฮดโ0 nโโ
โค
Z
c(1 โง |s|ฮฒ )(1 โง |t|2 )ยต(ds, dt) โ 0
Kฮดc
by Rthe dominated convergence theorem. This combined with (A.9) shows the convergence of npn
to |Q(s, t)|2 ยต(ds, dt), and hence completes the proof of the proposition.
R
|Eฬ1 |2 ยต(ds, dt)
Proof of Theorem 4.1(2) (cont.). Now it remains to show (A.6). Similar to the proof of Proposition A.1, we
can show that
โ
d
npn Eฬ21 โ Q0
for a centered Gaussian process Q0 , and
p
Eฬ22 โ 0.
Hence
โ
npn Eฬ2 =
โ
p
npn Eฬ21 Eฬ22 โ 0.
The argument then follows similarly from the continuous mapping theorem and bounding the tail integrals.
Proof of Theorem 4.1(1). Similar to the proof of Theorem 4.1(2), it suffices to show that
Z
p
|Eฬi |2 ยต(ds, dt) โ 0, i = 1, 2, 3.
(A.11)
The convergence (A.11) for i = 1, 2 follows trivially from the more general results (A.4) and (A.6) in the
proof of Theorem 4.1(2). Hence it suffices to show
Z
|Eฬ3 |2 ยต(ds, dt) โ 0,
(A.12)
where we recall that Eฬ3 := ฯ R ,ฮ|rn (s, t) โ ฯ R |rn (s)ฯฮ|rn (t) is non-random.
h rn
irn
Let P R ,ฮ|rn (ยท) = P rRn , ฮ โ ยท| rRn > 1 and P R |rn , Pฮ|rn be the corresponding marginal measures.
rn
rn
Then from (2.3),
v
P R ,ฮ|rn โ P R |rn Pฮ|rn โ ฮฝฮฑ ร S โ ฮฝฮฑ ร S = 0,
rn
rn
and hence for fixed (s, t),
Z
Eฬ3 (s, t) =
T
eisT +it
ฮ
(P R ,ฮ|rn โ P R |rn Pฮ|rn )(dT, dฮ) โ 0.
rn
rn
For any ฮฒ < 2 โง ฮฑ, using the same argument in (A.10),
|Eฬ3 |2 =
E|Ujn Vjn |
pn
2
โค c(1 โง |s|ฮฒ )(1 โง |t|2 ).
Then (A.12) follows from (4.4) and dominated convergence. This concludes the proof.
Appendix B: Proof of Theorem 4.5
Following the same notation and steps as the proof of Theorem 4.1 in Appendix A, it suffices to prove the
following convergences for the mixing case:
pฬn p
โ 1,
(B.1)
pn
Z
Z
d
npn
|Eฬ1 |2 ยต(ds, dt) โ
|Q0 (s, t)|2 ยต(ds, dt)
(B.2)
Rd+1
Rd+1
24
Wan and Davis
and
Z
npn
p
|Eฬ2 |2 ยต(ds, dt) โ 0.
(B.3)
Rd+1
We prove (B.1) and (B.2) in Propositions B.2 and B.3, respectively. The proof of (B.3) follows in a similar
fashion. The proofs of both propositions rely on the following lemma.
Throughout this proof we make use of the results that if {Zt } is stationary and ฮฑ-mixing with coefficient
{ฮฑh }, then
1โฮด
, for any ฮด โ (0, 1),
(B.4)
|cov(Z0 , Zh )| โค cฮฑhฮด E|Z0 |2/(1โฮด)
see Section 1.2.2, Theorem 3(a) of Doukhan (1994).
Lemma B.1. Let {Xt } be a multivariate stationary time series that is regularly varying and ฮฑ-mixing with
mixing coefficient {ฮฑh }. For a sequence rn โ โ, set pn = P(kX0 k > rn ). Let f1 , f2 be bounded functions
d
which vanish outside R \B1 (0), where B1 (0) is the unit open ball {x|kxk < 1}, with sets of discontinuity of
measure zero. Set,
n
X
X0
Xt
(i)
Sn =
โ Efi
, i = 1, 2.
fi
rn
rn
t=1
Assume that condition (M) holds for {ฮฑh } and {rn }. Then
โ
1
d
(S (1) , Sn(2) )T โ N (0, ฮฃ),
npn n
(B.5)
where the covariance matrix [ฮฃij ]i,j=1,2 = [ฯ 2 (fi , fj )]i,j=1,2 with
ฯ 2 (f1 , f2 ) := ฯ02 (f1 , f2 ) + 2
โ
X
ฯh2 (f1 , f2 )
(B.6)
h โฅ 0.
(B.7)
h=1
and
ฯh2 (f1 , f2 ) =
Z
f1 f2 dยตh ,
In particular,
1
p
(Sn(1) , Sn(2) )T โ 0.
npn
The proof of Lemma B.1 is provided after the proofs of the propositions.
Proposition B.2. Assume that condition (M) holds, then
pฬn p
โ 1,
pn
Proof. We have
n
pฬn
1X
โ1=
pn
n j=1
n
1{Rj >rn }
1 X
โ1 =
(1{Rj >rn } โ pn ).
pn
npn j=1
Apply Lemma B.1 to f (x) = 1{kxk>1} and the result follows.
Proposition B.3. Assume that condition (M) holds, and that ยต and {rn } satisfies (4.4) and (4.5), respectively, then
Z
Z
d
npn
|Eฬ1 |2 ยต(ds, dt) โ
|Q0 (s, t)|2 ยต(ds, dt),
Rd+1
0
where Q is a centered Gaussian process.
Rd+1
Threshold Selection for Multivariate Heavy-Tailed Data
25
โ
Proof. Let us first establish the convergence of npn Eฬ1 (s, t) for fixed (s, t). Take
n
o
f1 (x) = Re eiskxk โ E[eiskxk |kxk > 1] eitx/kxk โ E[eitx/kxk |kxk > 1] 1kxk>1
n
o
f2 (x) = Im eiskxk โ E[eiskxk |kxk > 1] eitx/kxk โ E[eitx/kxk |kxk > 1] 1kxk>1 .
Then from Lemma B.1,
โ
1
โ
d
(Sn(1) , Sn(2) )T = npn (Re{Eฬ1 (s, t)}, Im{Eฬ1 (s, t)}) โ N (0, ฮฃ),
npn
where the covariance structure ฮฃ can be derived from (B.6) and (B.7). This implies that
โ
d
npn Eฬ1 (s, t) โ Q0 (s, t),
where Q0 (s, t) is a zero-mean complex normal process with covariance matrix ฮฃ11 + ฮฃ22 and relation matrix
ฮฃ11 โ ฮฃ22 + i(ฮฃ12 + ฮฃ21 ).
โ
The finite-dimensional distributional convergence of npฬn Eฬ1 to a Q0 (s, t) can be generalized using the
Crameฬr-Wold device and we omit the calculation of the covariance structure. The tightness condition for the
functional convergence follows the same arguments in the proof of Proposition A.1 from Bickel and Wichura
(1971), with equality (A.8) replaced by a variance calculation of the sum of ฮฑ-mixing components using the
inequality (B.4) and condition (A.9) is verified through the same argument. This completes the proof of
Proposition B.3.
of Lemma B.1. The proof follows from that of Theorem 3.2 in Davis and Mikosch (2009). Here we outline
the sketch of the proof and detail only the parts that differ from their proof.
By the vague convergence in (4.12), we have
i)
Z
Z
1
1
X0
X0
2
E fi
โ
fi dยต0 and
E fi
โ
fi2 dยต0 ;
pn
rn
pn
rn
ii)
2
Z
1
X0
1
X0
1
X0
2
Var fi
=
E fi
โ pn
E fi
โ
fi2 dยต0 = ฯ02 (fi , fi );
pn
rn
pn
rn
pn
rn
iii)
1
X0
Xh
cov fi
, fj
pn
rn
rn
Z
โ
fi fj dยตh = ฯh2 (fi , fj ).
(i)
1
Sn for i = 1, 2. Without loss of generality, we suppress
Let us first consider the marginal convergence of โnp
n
the dependency on i and set
Xt
X0
Ytn := f
โ Ef
.
rn
rn
Then
1
Var [Y1n ] โ ฯ02 (f, f )
pn
and
1
cov Y1n , Y(h+1)n โ ฯh2 (f, f ).
pn
We also have the following two results for |cov(Y1n , Y(h+1)n )|:
lim lim sup
hโโ nโโ
ln
X
1
|cov(Y1n , Y(j+1)n )|
pn
j=h
2
ln
ln
X
X
1
X0
Xj
1
X0
โค lim lim sup
E f
f
+
E f
hโโ nโโ
pn
rn
rn
pn
rn
j=h
j=h
26
Wan and Davis
ln
ln
X
X
2
c
c
โค lim lim sup
E 1{kX0 k>rn } 1{kXj k>rn } +
E1{kX0 k>rn }
hโโ nโโ
pn
pn
j=h
j=h
ln
X
c
P (kX0 k > rn , kXj k > rn ) + cln pn
โค lim lim sup
hโโ nโโ
pn
j=h
=
0
(B.8)
from condition (4.14), and
lim
nโโ
โ
X
1
|cov(Y1n , Y(j+1)n )|
pn
โ
X
1
X0
Xj
cov f
,f
nโโ
pn
rn
rn
j=ln
2/(1โฮด) !1โฮด
โ
X
1 ฮด
X0
lim
ฮฑ E f
nโโ
pn j
rn
โค
lim
j=ln
โค
โค
j=ln
โ
X
lim
nโโ
โค
lim
nโโ
=
j=ln
โ
X
2/(1โฮด) 1โฮด
c ฮด
ฮฑj E 1{kX0 k>rn }
pn
cฮฑjฮด pโฮด
n
j=ln
0
(B.9)
from condition (4.13).
We apply the same technique of small/large blocks as used in Davis and Mikosch (2009). Let mn and ln
be the sizes of big and small blocks, respectively, where ln mn n. Let Ikn = {(k โ 1)mn + 1, . . . , kmn }
and Jkn = {(k โ 1)mn + 1, . . . , (k โ 1)mn + ln }, k = 1, . . . , n/mn , be the index sets of big and small blocks
respectively. Set Iหkn = Ikn \Jkn , i.e., Iหkn are the big blocks with the first ln observations removed. For
simplicity, we set mn := 1/pn and assume that the number of big blocks n/mn = npn is integer-valued. The
non-integer case can be generalized without additional difficulties.
Denote
X
Sn (B) :=
Ytn ,
tโB
then
n
X
Ytn = Sn (1 : n) =
t=1
npn
X
Sn (Ikn ) =
k=1
npn
X
Sn (Iหkn ) +
k=1
npn
X
Sn (Jkn ).
k=1
Let {Sฬn (Iหkn )}k=1,...,npn be iid copies of Sฬn (Iห1n ). To prove the convergence of
show the following:
โ 1 Sn (1
npn
: n), it suffices to
npn
npn
1 X
1 X
ห
Sฬ
(
I
)
and
Sn (Iหkn ) has the same limiting distribution,
โ
โ
n kn
npn
npn
(B.10)
npn
1 X
p
Sn (Jkn ) โ 0,
โ
npn
(B.11)
k=1
k=1
k=1
and
โ
npn
1 X
d
Sฬn (Iหkn ) โ N (0, ฯ 2 (f, f )).
npn
(B.12)
k=1
The statement (B.10) holds if
npn ฮฑln โ 0,
as n โ โ.
This follows from the same argument in equation (6.2) in Davis and Mikosch (2009).
(B.13)
Threshold Selection for Multivariate Heavy-Tailed Data
27
For condition (B.11), it suffices to show that
!
npn
X
1
Sn (Jkn ) โ 0.
Var
npn
k=1
Note that
!
npn
np
n โ1
X
X
1
h
Sn (Jkn ) โค Var(Sn (J1n )) + 2
Var
)|cov(Sn (J1n ), Sn (J(h+1)n ))| =: P1 + P2 .
(1 โ
npn
npn
k=1
h=1
We have
lim sup P1
=
nโโ
๏ฃซ
๏ฃถ
ln
X
lim sup Var ๏ฃญ
Yjn ๏ฃธ
nโโ
j=1
๏ฃซ
๏ฃถ
|cov(Y
,
Y
)|
Var(Y1n )
j
1n
(j+1)n
๏ฃธ
โค lim sup ln pn ๏ฃญ
+2
(1 โ )
pn
l
p
nโโ
n
n
j=1
โค
lim sup ln pn
nโโ
lX
n โ1
hโ1
X |cov(Y1n , Y(j+1)n )|
Var(Y1n )
+ lim lim sup 2ln pn
hโโ nโโ
pn
pn
j=1
+ lim lim sup 2ln pn
hโโ nโโ
=
lX
n โ1
|cov(Y1n , Y(j+1)n )|
pn
j=h
0
where the last step follows from dominated convergence and (B.8). And for the other term,
P2
โค 2
np
n โ1
X
X
X
|cov(Ysn , Ytn )|
h=1 sโJ1n tโJ(h+1)n
โค 2
np
n โ1
X
h/pn
X
ln
โ
X
โค 2ln pn
k=1/pn โln +1
โ
X
โค 2ln pn
cov(Y1n , Y(k+1)n )
k=h/pn โln +1
h=1
cov(Y1n , Y(k+1)n )
pn
cov(Y1n , Y(k+1)n )
โ 0.
pn
k=ln +1
Note that 1/pn = mn is the size of big blocks Ikn โs and 1/pn โ ln + 1 = mn โ ln + 1 is the distance between
consecutive small blocks (Jkn , J(k+1)n )โs. The last limit follows from (B.9).
To finish the proof, we need to establish the central limit theorem in (B.12). Note the Sฬn (Iหln )โs are iid
with ESฬn (Iหln ) = 0. We now calculate its variance. Recall that 1/pn โ ln is the size of Iห1n , the big block with
small block removed. Then
๏ฃซ
๏ฃถ
1/pn โln
X
Var Sฬn (Iห1n )
= Var ๏ฃญ
Yjn ๏ฃธ
j=1
=
(
1
โ ln )Var(Yjn ) + 2
pn
1/pn โln โ1
X
๏ฃซ
=
(
(1/pn โ ln โ k)cov(Y1n , Y(k+1)n )
k=1
1
โ ln )Var(Yjn ) + 2 ๏ฃญ
pn
h
X
k=1
+
ln
X
k=h+1
๏ฃถ
1/pn โln โ1
+
X
k=ln +1
๏ฃธ 1 โ ln + k 1 cov(Y1n , Y(k+1)n )
1/pn pn
28
Wan and Davis
:= I0 + I1 + I2 + I3 .
Here
lim I0 = lim (1 โ ln pn )
nโโ
nโโ
1
Var(Yjn ) = ฯ02 (f, f ),
pn
and
lim I1 = lim 2
nโโ
nโโ
h
X
h
(1 โ pn (ln + k))
k=1
X
cov(Y1n , Y(k+1)n )
=2
ฯk2 (f, f ).
pn
k=1
We also have
lim lim sup |I2 | โค lim lim sup
hโโ nโโ
hโโ nโโ
ln
X
|cov(Y1n , Y(k+1)n )|
=0
pn
k=h+1
from (B.8), and
lim |I3 | โค lim
nโโ
nโโ
โ
X
|cov(Y1n , Y(k+1)n )|
=0
pn
k=ln
from (B.9). Therefore
โ
X
lim Var Sฬn (Iห1n ) = lim I0 + lim lim I1 = ฯ02 (f, f ) + 2
ฯk2 (f, f ) =: ฯ 2 (f, f )
nโโ
nโโ
hโโ nโโ
k=1
as defined. To show that this infinite sum converges, it suffices to show that
โ
X
ยตh ({(x, x0 )|kxk > 1, kx0 k > 1}) < โ.
h=1
This follows from (4.14) in condition (M), for if
โ
X
ยตh ({(x, x0 )|kxk > 1, kx0 k > 1}) = โ,
h=1
then
lim sup
nโโ
ln
ln
X
1 X
P(kX0 k > rn , kXj k > rn ) โฅ lim inf
P(kX0 k > rn , kXj k > rn |kX0 k > rn )
nโโ
pn
j=h
j=h
โฅ
โ
X
ยตj ({(x, x0 )|kxk > 1, kx0 k > 1}) = โ,
j=h
which leads to a contradiction.
To apply the central limit theorem, we verify the Lindebergโs condition,
๏ฃฎ๏ฃซ
๏ฃน
๏ฃถ2
1/pn โln
h
i
X
๏ฃฏ
๏ฃบ
โค E ๏ฃฐ๏ฃญ
Yjn ๏ฃธ 1{|Sฬn (Iห1n )|>โnpn } ๏ฃป
E (Sฬn (Iห1n ))2 1{|Sฬn (Iห1n )|>โnpn }
j=1
h
i
โค E c(1/pn โ ln )2 1{|Sฬn (Iห1n )|>โnpn }
i
1 h
โ
โค c 2 P |Sฬn (Iห1n )| > npn
pn
h
i
ห
Var
Sฬ
(
I
)
n 1n
1
1
= O( 3 ) โ 0.
โค c 2
2
pn
npn
npn
This completes the proof for the convergence of
โ 1 Sn (1
npn
: n).
Threshold Selection for Multivariate Heavy-Tailed Data
(1)
29
(2)
1
The joint convergence of โnp
(Sn , Sn )T follows from the same line of argument together with the
n
Craฬmer-Wold device. In particular,
1
cov Sn(i) , Sn(j) = ฯ 2 (fi , fj ),
npn
i, j = 1, 2.
This completes the proof of the lemma.
Remark B.4. Lemma B.1 itself is a more general result of independent interest. The result can be generalized
d
for functions fi defined on R \{0} with compact support. In this case, condition (4.14) should be modified to
lim lim sup
hโโ nโโ
d
ln
1 X
P(kX0 k > rn , kXj k > rn ) = 0
pn
j=h
for some > 0, where support(f ) โ R \B (0). Also, as seen during the proof of the lemma, the conditions
on pn , ln , and ฮฑt can be further relaxed.
| 10math.ST
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.